15:00:25 #startmeeting manila 15:00:26 Meeting started Thu Oct 20 15:00:25 2016 UTC and is due to finish in 60 minutes. The chair is bswartz. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:28 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:30 The meeting name has been set to 'manila' 15:00:42 hello all 15:00:43 Hi 15:00:44 hola 15:00:44 hello 15:00:45 hello 15:00:47 Hello 15:00:50 hey 15:00:53 Hi 15:01:06 \o 15:01:17 #agenda https://wiki.openstack.org/wiki/Manila/Meetings 15:01:38 I dunno if some people have started traveling already 15:01:43 today's meeting should be short in any case 15:01:47 Adding invalid user to the access rule changes existing valid access rules state from 'active' to 'error'.is this expected behavior ? 15:02:02 ravichandran: you're on the agenda, wait your turn 15:02:13 #topic Specs and Deadlines 15:02:14 SORRY 15:02:24 #link https://review.openstack.org/#/c/374883/ 15:02:45 I've responded to all the feedback on this spec 15:03:04 ideally I'd like to merge it before we go to barcelona so I can announce deadlines 15:03:40 if anyone has any remaining issues with the proposal, please raise them now 15:03:54 otherwise I'd looking for two +2s 15:04:27 so regarding deadlines, that spec sets out the deadlines for specs themselves, and related features 15:04:41 however we have some other community deadlines 15:04:59 including the "new driver" deadline and the "major feature" deadline 15:05:19 I hope it's clear that the new spec process is indented to supercede the major feature deadline with a better process 15:05:36 so I intend to drop the major feature deadline 15:05:49 however the question of deadlines for new drivers remains 15:06:10 I feel the deadline we've had (feature freeze minus 3 weeks) has been working pretty well 15:06:43 so.... if there's no disagreement we'll keep that deadline too 15:06:54 * bswartz wonders if he's talking to himself 15:07:02 bswartz: I am a bit confused, or I possibly missed the part where it says the new "major features" deadline, I thought it was only mentioning specs deadlines. Our "major feature" deadline refers to feature freeze 15:07:04 na, listening ;) 15:07:38 ganso: for mitaka and newton we have a "major feature deadline" at feature freeze minus 6 weeks 15:07:45 bswartz: and on a previous meeting, we established that the ocata major feature proposal deadline was before x-mas 15:07:50 s/have/had/ 15:08:31 the new specs process is intended to cover all major features (as well as minor features) 15:08:46 oh yes I remember that 15:08:52 thank you for jogging my memory 15:09:59 ganso: do you have a reference to that discussion 15:10:11 we did agree on a date, and I need to make sure we keep that agreed date 15:10:21 bswartz: let me head over to eavesdrop 15:11:01 #link http://eavesdrop.openstack.org/meetings/manila/2016/manila.2016-09-22-15.00.log.html 15:11:26 bswartz: nice 15:11:44 #agreed driver proposal deadline Dec 19 15:11:52 that's from the previous meeting 15:12:14 I'll make sure that gets on the schedule 15:12:54 I don't think we cover major feature proposal freeze in that meeting 15:13:21 under the new specs process, there will be deadlines for the specs 15:13:54 if we agree to a spec but no code materializes, then we need a mechanism to push out those features too 15:14:08 bswartz: ok so assuming a feature has a spec merged, its patch can be submitted up to which day? 15:14:29 well no later than Dec 19 15:14:47 but ideally even sooner than that 15:15:37 bswartz: including very minor features that do not require specs, as stated in the specs' spec? 15:15:37 I'm worried we don't have enough people here to make a final decision 15:16:09 ganso: I updated the spec to imply that we expect specs for every feature 15:16:22 the only exception would be a "trivial fix" type of feature 15:16:37 bswartz: o_O I guess I missed that part 15:17:07 the thinking is that no matter what we're implementing, it's best to hash out the details in a spec doc rather than code 15:17:17 bswartz: no I did not. "Lastly, I propose that we require specs for any kind of change with broad impacts. It's better to agree on the design before we get too deep into implementation." 15:17:32 bswartz: so, if it has no broad impact, does not require a spec, just a blueprint... right/ 15:17:40 as we've been burned by features that had to be rewritten several times because we never agreed on a design up front 15:18:04 yeah if it's just a new config option in your driver, no spec 15:18:25 if you're implementing an existing interface in your driver, no spec 15:18:33 bswartz: and if it is not driver-related? 15:18:36 I thought you considered most driver features not spec-worthy 15:18:37 if you're modifying an REST API, then write a spec 15:18:47 bswartz: I do not consider driver-related spec worthy 15:18:48 nevermind you answered before I said it 15:19:10 bswartz: but still some core features may have no broad impact 15:19:16 ganso: example? 15:19:35 bswartz: a config option in the data service 15:20:04 ganso: yeah I would say certain config options could be added without specs 15:20:21 bswartz: Do any changes in testing approach require spec too? 15:20:35 however in some cases I could see long arguments about the some config options and those arguments are probably better to have in a document rather than the code 15:20:45 vponomaryov: I think not 15:21:02 testing is not features 15:21:09 bswartz: so, everything related to testing is separate kitchen? 15:21:23 bswartz: couldn't those long arguments be discussed in the patch comments or a weekly meeting if the change is small enough? 15:21:33 vponomaryov: it just seems weird to write a spec about a testing approach 15:21:48 bswartz: not sure 15:22:05 bswartz: agreement on running some specific amount of functional and scenario tests may require spec 15:22:07 If we need to have a discussion and having a written document would help, then we *could* have a spec for testing, but we could just as easily handle those situations with wiki docs 15:22:16 vponomaryov: that's a good point 15:22:21 bswartz: because we will force people to update their third-party CIs in this case 15:22:51 if we're going to increase the burden on our 3rd party CI systems, then those discussion should be formalized and probably a spec is the best way to do that 15:23:07 ganso: yeah possibly 15:23:20 ganso: we'll have to use our judgement for stuff like that 15:23:35 bswartz: I am starting to worry that we may get a big number of lower priority specs 15:23:55 bswartz: because of statement "every feature, even small, requires a spec" 15:24:11 bswartz: I was ok with "features with broad impact require a spec" 15:24:13 ganso: I'm imagining what a spec to add an option to the data service would look like -- and I'm thinking maybe 30 lines of text 15:24:31 that shouldn't be hard to review and agree to 15:24:42 bswartz: concern is getting review attention to that spec 15:24:43 but you're right -- we don't want to go overboard 15:25:03 bswartz: the same people could look at the code, if the feature is small enough, and discuss at the comments 15:25:24 okay so we have 2 open items 15:25:36 bswartz: if we are trying to prevent effort wasted writing code, in this case, if it is small enough, we would be adding more effort, not saving 15:25:43 1) date for major feature proposal freeze 15:26:05 ganso: +1 about efforts 15:26:05 2) spec requirement for "small" features 15:26:30 since we're missing several key people today I propose we make those decisions next week and table them for today 15:26:47 let's allow people to upload code without spec if they are ok if it is not accepted for some reason 15:27:08 so, spec will be guarantee 15:27:17 bswartz: I would like to add a candidate solution for #1: Dec 19. I see it as far back enough to include major features 15:27:45 I'm certainly okay with code that doesn't have specs but I don't want to end up with a sitation were we're disputing whether a feature has broad impact or not 15:28:06 bswartz: I kinda agree with vponomaryov on this, maybe if we see that the feature is deserves a spec, we can say "-1, please write a spec" 15:28:37 ganso: I'm okay with that but depending on when that -1 happens, it could be too late to land in the release 15:29:02 then people will fight the request for a spec on the grounds that it pushes their change out of the release 15:29:11 bswartz: indeed 15:29:29 Need exception process for things that come in late and are needed 15:29:41 and that's exactly what we're trying to avoid -- we want people to just make their proposals early enough that we can make those decisions while being fully informed 15:30:31 okay I think we need to move on 15:30:44 I hope the wording in my spec is clear enough to merge 15:31:11 I haven't heard any argument against the "broad impact" language 15:31:36 we can update the spec deadline spec if we make more decisions to refine that cutoff 15:31:47 #topic Adding invalid user to the access rule changes valid access rule state from 'active' to 'error' 15:31:55 ravichandran: thank you for being patient 15:32:02 ravichandran: you're up now 15:32:10 thank you 15:32:16 Adding invalid user to the access rule changes existing valid access rules state from 'active' to 'error'.is this expected behavior ? 15:32:46 ravichandran: I would say, yes, it is expected 15:32:47 ravichandran: you mean the backend doesn't recognize the user and fails to grant access 15:32:52 ? 15:33:29 I don't see any alternative other than putting the access rule state into error in that case 15:33:32 If one rules fails for some reason like invalid user etc 15:33:48 it changes all other rules state to error 15:33:51 I believe we need a better way to manage valid users for cifs shares, but that's sort of a separate problem 15:34:19 well no the only rule that should be in error state is the one with the invalid user 15:34:33 ravichandran: right now, due to bad design, all access rules 'state' field value derivate on share_instance 'access_rules_status' field value 15:34:34 if other rules are going to error state that sounds like a bug 15:34:47 >_< 15:35:04 ravichandran: there is a patch proposed to fix that 15:35:05 * bswartz admits being responsible for "bad design" 15:35:34 ravichandran: #link https://review.openstack.org/#/c/369668/ 15:35:42 oh ok 15:36:04 yes that patch will improve things 15:36:06 ravichandran: if that is your sole concern, you could checkout that patch and test if it solves your problem, and provide feedback on it whenever possible 15:36:13 -1 needs a spec 15:36:18 markstur: lol 15:36:33 ganso: you think I'm joking? 15:36:40 thank you ganso 15:36:41 markstur: no lol 15:36:45 however I want to go further and find a way for manila to have some knowledge of the universe of valid users 15:36:46 I will check 15:37:01 gouthamr: ^ 15:37:03 markstur: it's coming 15:37:12 :-) 15:37:20 one more thing allowing user rule to NFS 15:37:39 is not required 15:37:43 correct ? 15:37:45 that's correct 15:38:09 we may have to add that validation also to the ui and backend 15:38:11 bswartz: list of known users sounds cool. Awesome if UI could allow selection -- but number of users could be too big for manila to know them all 15:38:12 NFS servers traditionally do access by IP 15:38:26 it's something HPE can do... so far as my code reading goes 15:38:27 and individual files/directories have user ACLs 15:38:48 markstur: it gets complicated fast 15:39:08 markstur: but we've been avoiding it for too long and now it's causing problems for testing 15:39:29 so we need to think about how far we want to go towards solving that problem 15:40:01 ravichandran: no user access for NFS 15:40:04 just IP 15:40:14 ravichandran: the case you mentioned could be applied for any protocol 15:40:14 anything else on this topic? 15:40:24 no i am done 15:40:26 gouthamr: HPE did only IP for NFS. It was IP+user for CIFS, but IP is no longer required to make behavior more like other drivers. It's a problem if we behave differently on that 15:40:50 markstur: correction: IP was NEVER required for CIFS, but we did have some drivers that supported it 15:41:16 ravichandran: like, ok, for NFS no user rules, but what if another protocol accepts both, I believe we shouldn't have a mapping that says that hardcoded into manila, or even UI mechanism to behave differently for each protocol, the driver should determine what is compatible or not 15:41:31 Yes. I thought it was a good thing -- but it is BAD if you don't know which backend you got and one need IP access and the other doesn't! 15:41:39 markstur: oh.. yes, i got that the other way around 15:41:54 bswartz: we allow any type of a rule to any protocol via our interfaces 15:41:59 ravichandran: ^ 15:42:07 oh ok 15:42:10 markstur: +1 - goes back to users being confused when they see the UI giving them all these options 15:42:37 so where this gets ugly is that share-server backends behave different from no-share-server backends 15:43:04 we went into depth on this topic at the midcycle 15:43:06 gouthamr: User could create 2 share get 2 backends one works w/ user access, one doesn't (waiting for additional IP access) <-- that's not ideal :( 15:43:13 gouthamr: then I think we should come up with some guidelines on the use of protocols, we don't have such now 15:43:28 ganso: +1 15:43:45 bswartz: there are a few drivers that accept more than one access type for a certain protocol, while other drivers that use that same protocol don't 15:43:47 I'd like to say NFS->IP access, CIFS->user access 15:43:50 i wish we could re-write that portion, just like we have share capabilities.. when you create the share, the backend can tell us the supported access types and we can use that information in the API.. 15:44:22 We should start w/ what bswartz said ^ as the default behaovior 15:44:25 and other protocols just use whatever is appropriate 15:44:38 Probably makes sense to extend it with capabilities at some point 15:44:57 markstur: if we did that, what's the impact on the HPE driver? 15:45:14 HPE driver already changed to do as bswartz prefers 15:45:23 gouthamr: you know he doesn't work for HPE anymore right? 15:45:44 bswartz: i do :P i don't yet know who their driver maintainer is 15:46:03 #link http://docs.openstack.org/developer/manila/devref/share_back_ends_feature_support_mapping.html 15:46:05 its me 15:46:19 gouthamr: it's ravichandran 15:46:26 okay, that clarifies, thanks ravichandran 15:46:36 welcome 15:46:49 alright... 15:46:52 #topic open discussion 15:46:58 anything else for today? 15:47:10 well we have not decided anything on the topic above, did we? 15:47:21 does anyone have a fancy camera that they can bring to BCN? :) 15:47:43 ganso: we explained that NFS doesn't need user rules and CIFS doesn't need IP rules 15:48:00 and ravichandran will review gouthamr's change and see if it addresses his issue 15:48:23 ok, are we going to come up with some validation or guidelines, will existing drivers have to change? (see link) 15:48:24 gouthamr: I have a shitty camera I will bring 15:48:26 gouthamr: You mean like a polaroid? 15:48:27 bswartz: ^ 15:48:55 i was looking beyond bswartz :P we didn't have a great webex experience from Austin 15:49:21 gouthamr: that's because we used google hangouts not webex in Austin IIRC 15:49:35 i can host the webex/hangouts from our sessions.. but i was hoping we can use a good camera 15:50:35 ganso: which drivers doesn't support the minimum? 15:50:41 bswartz: okay, we'll just use your 199x webcam xD 15:50:52 bswartz: they support more than the minimum 15:51:07 gouthamr: chat with hemna and diablo_rojo and maybe we can get live youtube channels like cinder did (know it is a stretch for barcelona, tho) 15:51:12 bswartz: huawei's driver supports user for NFS, EMC isilon supports IP for CIFS 15:51:25 ganso: ugh 15:51:25 markstur: sure thing... 15:51:27 ganso: that's fine -- we can modify the manager to prevent those if we choose 15:51:32 the driver won't need to change 15:51:57 bswartz: according to what gouthamr and markstur said, users that are unaware of the backends/drivers shouldn't have to see different behavior on certain shares 15:51:57 if a driver is missing minimum required access control then it will need to change 15:52:10 I plan to enforce that with scenario tests 15:52:32 bswartz: but for instance, certain drivers probably create CIFS share without any access 15:52:56 ganso: yes we need to fix that 15:53:02 bswartz: if that access rule is required it would be bad to block it in manager (don't know those, but that was my HPE way) 15:53:03 ganso: new shares should have no access 15:53:14 bswartz: I asked my co-worker to add full IP access by default for CIFS shares, which is not done by default in the backend, so we wouldn't have to worry about this 15:53:42 bswartz: I mean, CIFS shares would have full IP access, and require the user access to have access... 15:53:53 bswartz: otherwise, they would require both access types to work 15:54:10 No access by defualt should be a req. More than 1 driver has run into that. 15:54:11 ganso: the requirement should be simple 15:54:30 for cifs shares, if I create a share, and grant access to a user, then mount as that user, it MUST succeed 15:54:46 it's not okay to also require some kind of IP based access too 15:55:06 bswartz: yes, but some backends have IP + User access, where both need to be allowed so the client can mount the share 15:55:24 bswartz: Hitachi HNAS for instance is like this 15:55:32 bswartz: which is what I said above 15:55:39 it might be okay to further restrict access by IP, but the expectation from end users is that cifs shares should work with user access only 15:56:03 bswartz: if we did not add full IP access in the driver when a CIFS share is created, a user access rule wouldn't be enough because the IP may not be allowed to mount 15:56:11 so the absence of any IP-based access rules must be interpreted as ALL IPs ALLOWED 15:56:30 ^ for CIFS shares 15:56:54 for NFS shares the absence of any IP-based access rules must be interpreted as nobody allowed 15:57:07 I think we need a spec here >_< 15:57:13 so we can have a proper argument 15:57:26 bswartz: yes 15:57:38 bswartz: that's what I meant that maybe some drivers would need to change 15:57:44 okay I agree 15:58:02 I'm hoping that scenario tests will make the expectations clear 15:58:39 I'll include this into our access rules discussion at the summit 15:58:40 scenario tests will add user-access rules for CIFS shares and they won't add IP access rules, and scenario tests will expect that to work 15:59:07 the only open question for me is: how to we pick a user that we know will exist on both the client and the server 15:59:24 I think that's a solvable problem though 15:59:46 okay wer 15:59:51 okay we're out of time 15:59:56 http://docs.openstack.org/admin-guide/identity-integrate-with-ldap.html 15:59:59 :) 16:00:03 see you guys in spain next week! 16:00:13 have a nice flight everyone 16:00:13 #endmeeting