15:00:26 #startmeeting manila 15:00:28 Meeting started Thu Jun 13 15:00:26 2019 UTC and is due to finish in 60 minutes. The chair is tbarron. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:29 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:31 The meeting name has been set to 'manila' 15:00:38 .o/ 15:00:38 hey! :) 15:00:43 o/ 15:00:45 courtesy ping: gouthamr xyang toabctl bswartz ganso erlon tpsilva vkmc amito jgrosso dviroel lseki carloss 15:00:50 o/ 15:00:51 hello 15:00:53 hi 15:00:55 o/ 15:01:10 hi 15:01:20 <_erlon_> Hey 15:01:27 Agenda: https://wiki.openstack.org/wiki/Manila/Meetings 15:01:34 Hi all! 15:02:02 hey 15:02:21 looks like we've got a quorum 15:02:33 #topic announcements 15:03:06 I don't have any, just a reminder to review outstanding specs and new driver submissions. 15:03:14 Anyone else? 15:03:41 #topic launchpad spam 15:04:15 You may have noticed our bug topics and descriptions getting changed to adds for pharmaceuticals. 15:04:40 If you run into one of these it won't do any good to correct it. 15:04:43 #link https://en.wikipedia.org/wiki/Spam_(Monty_Python) 15:04:49 They'll just come back again. 15:04:54 whack-a-mole 15:05:10 bswartz: ty! 15:07:04 Sir Can-A-Lot :'D 15:07:12 Instead, plese file a Question under the Answers tab on launchpad 15:07:34 Is this a problem canonical is working on addressing? 15:07:36 Here's an example 15:07:39 I imagine it affects all of LP 15:07:53 https://answers.launchpad.net/launchpad/+question/681282 15:08:21 bswartz: I don't know what Canonical is doing about the issue structurally but 15:09:02 there are folks working on Launchpad who pay attention to these reports and respond pretty quickly 15:09:22 They ban the user doing it and restore any bugs you tell them about. 15:10:00 There doesn't seem to be a good way to search for bugs that a particular user has polluted though. 15:10:30 So the best thing is to report as soon as we see so that spammers realize that manila folks are vigilant and 15:10:44 they won't find us to be a good playground. 15:11:10 Any questions/thoughts/further remarks on this? 15:11:32 OK, thanks in advance to everyone for helpling clean this stuff up. 15:11:57 #topic allowing toggling visibility of share types 15:12:04 gouthamr: you are up 15:12:12 thanks tbarron 15:12:21 #LINK: : https://review.opendev.org/#/c/661209/ (Spec: Add update share-type API to Share Types) 15:12:46 i see haixin on #openstack-manila, but not here 15:13:16 haixin's the owner of that spec, and therefore interested in the discussion here. 15:14:46 Errr 15:14:54 Why didn't we do this from the beginning? 15:14:59 a question came up during the review of that spec, the proposers are seeking to add support to toggle the name, description and "is_public" attribute of share types 15:15:19 It seems we must have had a reason to not make that field mutable 15:15:26 bswartz: yeah, seems like we missed it, i don't recall a discussion.. 15:15:55 haixin: hello! 15:16:27 private share types have share-type-access rules 15:16:32 we were just trying to remember why we didn't make this field mutable when it was implemented 15:17:14 hello 15:17:19 hey haixin 15:17:28 o/ 15:17:38 I guess one concern is revoking access to shares that were previously public and in use by other tenants 15:17:40 so as haixin suggests, we could safely allow setting private share types to public without deleting any of the accesses 15:17:56 Of course the is_public and the actual access rules are orthagonal 15:18:00 https://review.opendev.org/#/c/661209/ 15:18:14 * tbarron pretends he didn't notice vkmc sneaking in 15:18:39 * vkmc sits silently in the back seats 15:19:30 bswartz: they are; and i did a quick test to confirm nothing really breaks.. we just don't allow retrieving/setting share type accesses for a public share type 15:19:50 Okay there aren't any problems coming to my mind 15:20:05 It just seems weird we didn't do it this way from the start 15:20:09 well, what about when taking a public share type private 15:20:40 users that lose access won't be able to see these share types any longer 15:21:02 today i try to set share_type from public to private, then try some manila api, all normal 15:21:28 haixin: nice thanks, i hadn't tested that.. 15:23:04 can't think of anything else being affected, besides the fact that it might be confusing to lose access to something and not be able to tell 15:24:52 i.e., for a user without access, their existing shares will still refer to the now hidden share type... but they won't find that share type if they want to seek more details 15:26:17 gouthamr: the alternative of deleting the share type and making a new one like it that's private wouldn't be any better though 15:26:24 at the database level, these shares have been associated with the share-type, and still keep the characteristics of the share-type, does not affect the other share operations. 15:27:15 yes, that means the user without access, can not create share with this share type any more 15:27:34 haixin: yeah true, today we allow share type extra-specs to be modified, and existing shares retain their older properties, so that's already a confusion we allow :) 15:27:49 gouthamr: right 15:28:13 tbarron: ack, i see the need for the feature.. if they want to stop provisioning to a certain class of storage or take away rights to one or more projects 15:28:40 quite helpful indeed to allow modifying the visibility 15:29:14 Maybe we should just make sure that the share type doc mentions that people need to be careful when changing anything significant about a share type b/c 15:29:32 pre-existing shares will use the definition from when they were created. 15:31:18 It seems like we have a consensus? Anyone have further concerns about the change this spec proposes? 15:31:54 I don't hear any. 15:32:00 not me, i like the idea of calling out the doc, and perhaps adding a hint on the UI that modifications will cause confusion to users 15:32:22 haixin and gouthamr thanks for the testing 15:32:24 s/will/may - given we don't know how one treats share types 15:32:27 i agree, tbarron 15:32:39 haixin: thanks for coming to this meeting, I know it's very late for you 15:32:48 * bswartz +1 15:33:04 we'll review the spec and I'm sure there will be some small issues that come up but 15:33:05 it does not matter 15:33:09 this was the main thing. 15:33:44 And it probably saved a lot of back and forth in review to be able to talk it through synchronouly here. 15:34:06 #topic security services testing in tempest 15:34:14 gouthamr: you again 15:34:24 thanks tbarron 15:34:36 alright, this is an old bug 15:34:37 #LINK https://bugs.launchpad.net/manila/+bug/1699856 15:34:38 Launchpad bug 1699856 in Manila "Tempest tests missing adding Security service to share-network" [Medium,Triaged] 15:36:29 there's currently no way to assign one or more security services to share networks created by the tests 15:36:58 this limits testing for CIFS with a backend that supports security services 15:36:58 That sounds like just a limitation of our tempest code 15:37:10 bswartz: +1 15:37:43 and perhaps other protocols too ^ 15:37:46 https://docs.openstack.org/manila/latest/admin/share_back_ends_feature_support_mapping.html#mapping-of-share-drivers-and-security-services-support 15:39:04 ^ so that's all the backends that have testing limitations 15:39:12 * tbarron wonders if anyone has actually done kerberized nfs with netapp in manila 15:39:46 iirc netapp uses a pre-created share network with a security service assigned to it as the common share network for all tempest tests 15:39:52 as a workaround 15:40:12 tbarron: i've done keberized nfs with netapp, but never the manila piece 15:40:25 that severely limits multi-tenancy testing, because on that backend, a share network will ever only need one share server 15:40:55 bswartz: i think in theory ganesha will do kerberized nfs but i've not tried 15:41:09 Well if the real goal is multitenant tesing, you only need multiple share networks. Security services aren't relevant there 15:41:11 side issue 15:41:40 bswartz: NetApp/manila/CIFS won't work without Active Directory 15:41:55 don't know if the other backends have that requirement 15:42:46 as a fix: i feel we can at least have configuration options that allow assigning a configured security service to every share network tempest creates 15:43:23 gouthamr: so this would be a tempest config option, right? 15:43:51 tbarron: yes (or options if necessary) 15:44:08 seems reasonable 15:44:32 * gouthamr thinks we have a DictOpt type to dump all security service data into one config option 15:44:39 Does it make more sense for tempest to do the configuration using tempest options for the values, or for the pre-tempest setup to do the configuration, and tell tempest what to use? 15:46:22 tempest currently creates share networks when it needs them... so having a pre-created manila security service that can be configured as a tempest option would also work 15:46:44 bswartz: gothamr: hmm, tempest is sometimes run w/o our CI pre-tempest setup ... 15:46:47 but, puts the burden on testers and CI hooks 15:47:11 and our hooks might not be the same as we convert legacy jobs? not sure ... 15:48:01 tbarron: ack, it's been harder to ask folks to automate things elsewhere where they use manila-tempest-plugin - it doesn't fit right with their way of doing things 15:48:27 going by experience with RDO, tripleo-ci, downstream redhat CI, certification folks 15:48:59 i.e., easy for us that we use pre-test-hooks to do all sorts of things :) 15:49:01 gouthamr: yeah and I think non-RedHat will have similar issues 15:49:38 so from that POV doing it for tempest plugin itself is the most portable 15:49:55 +1 15:50:21 okay, the real question now: would some one who maintains of the backends affected be kind enough to take this bug? 15:51:46 lseki, dviroel, carloss: ^ 15:51:55 gouthamr: that's sneaky, given the table you put up that means netapp, huawei, emc, or windows and only one of those is here today 15:51:58 I think that question is mostly directed at you 15:52:11 * gouthamr finds a gif for ganso and himself 15:52:18 ganso: you are taking entirely too much fun with that 15:52:25 tbarron: xD 15:52:46 So for the NetApp guys, this one really does interest us 15:53:20 But I'm not sure where the prioritiy is relative to other things 15:53:34 Did I miss the bug portionof the program ? :) 15:53:51 we need to check the priority among other stuff 15:53:53 jgrosso: no man, i stole one from you 15:53:59 what! 15:54:01 :( 15:54:16 I see how it is gouthamr 15:54:21 lseki: it's wouldn't be bad to take ownership, even if it won't get addressed for a little while 15:54:29 let's tag this one with the affected back ends at least 15:54:50 tbarron: ack, will do.. 15:55:04 and it would be great if a netapper would grab this one 15:55:23 we promise to keep jgrosso from hounding you about whey it's not fixed next week 15:55:35 bswartz: in my experience taking ownership sometimes prevents other people from eventually taking ownership if you take a long time to work on it 15:55:43 :) 15:55:54 #topic bugs 15:56:07 jgrosso: you can't just ask netapp for status on this one now 15:56:35 what else do you have for us? 15:56:45 https://bugs.launchpad.net/manila/+bug/1707378 15:56:46 Launchpad bug 1707378 in Manila "Quota usage value error in batch create share" [High,Incomplete] 15:56:57 its old and HIGH 15:57:08 Done! Assigned 1699856 for me 15:57:45 dviroel: thanks 15:57:52 ganso: That's true 15:57:52 jgrosso: we didn't talk about this at PTG 15:57:58 hmm ok 15:58:29 should this be downgraded from HIGH or placed on a wishlist 15:59:24 jgrosso: we don't currently have downstream customers complaining about this bug 15:59:32 sounds good 15:59:35 nor customer reports upstream but 15:59:48 presumably huawei hit this in their public cloud 16:00:11 you could probably set it to medium or low and if someone 16:00:22 has an issue maybe they can bring resources to the problem 16:00:26 tbarron: time check 16:00:30 sounds good 16:00:34 but we're out of time 16:00:39 ok 16:00:40 thanks everyone! 16:00:42 thanks tbarron 16:00:45 #endmeeting