14:00:47 #startmeeting networking 14:00:49 Meeting started Tue Mar 16 14:00:47 2021 UTC and is due to finish in 60 minutes. The chair is slaweq. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:00:50 hi 14:00:51 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:00:53 The meeting name has been set to 'networking' 14:01:16 o/ 14:01:26 o/ 14:01:31 hi 14:01:58 hi 14:02:03 hi 14:02:42 let's start 14:02:45 #topic announcements 14:02:47 Hi 14:02:55 Wallaby cycle calendar https://releases.openstack.org/wallaby/schedule.html 14:03:01 next week is RC1 week 14:03:16 so we are almost there with Wallaby 14:03:21 release highlights merged https://review.opendev.org/c/openstack/releases/+/779487 14:03:32 hi (sorry for being late) 14:03:33 we also have accepted RFE for new neutron-lib release for Wallaby: http://lists.openstack.org/pipermail/openstack-discuss/2021-March/021077.html 14:03:53 release patch was just approved by release team https://review.opendev.org/c/openstack/releases/+/780550 14:04:35 we are now after feature freeze deadline so please don't accept patches related to any new features in next weeks 14:04:52 we can accept such patches after we will have stable/wallaby branch created 14:05:23 next reminder is about PTG which will be 19-23th April: http://lists.openstack.org/pipermail/openstack-discuss/2021-March/020778.html 14:05:49 Doodle https://doodle.com/poll/cc2ste3emzw7ekrh?utm_source=poll&utm_medium=link is still active, if You haven't fill it yet, please do so 14:06:12 next week is deadline for booking virtual rooms for the team 14:06:40 there is also etherpad https://etherpad.opendev.org/p/neutron-xena-ptg created 14:07:02 if You have any proposals for topics to discuss during the PTG, please add them there 14:07:21 ok, next one 14:07:33 PTL nominations are now over 14:07:48 there was only one candidate for the Neutron PTL so there is no election 14:08:09 and You will have to live with me one more cycle :) 14:09:18 Thanks for being our PTL another cycle! 14:09:33 thanks mlavalle 14:09:37 thanks Slawek! 14:09:44 thx :) 14:09:54 that are all announcements from today from me 14:10:07 do You have anything else to add/announce to the team? 14:11:01 not me 14:11:06 ok, I guess that this means "no" 14:11:13 so let's move forward 14:11:21 #topic Blueprints 14:11:25 Wallaby RC1 https://bugs.launchpad.net/neutron/+milestone/wallaby-rc1 14:12:01 I today set https://blueprints.launchpad.net/neutron/+spec/address-groups-in-sg-rules as implemented 14:12:35 and I moved other BPs to neutron-next as we don't have any BP for RC1 14:12:47 +1 14:13:03 thx mlavalle and Your team for working on that address-groups BP 14:13:23 one more update from me, regarding secure-rbac 14:13:25 https://blueprints.launchpad.net/neutron/+spec/secure-rbac-roles 14:13:26 Thanks to hangyang 14:13:39 we have merged all patches which introduced new policies 14:13:46 so we have that in neutron for Wallaby 14:14:39 lbragstad found bug related to the access of the resources by system reader 14:15:07 https://bugs.launchpad.net/neutron/+bug/1918506 14:15:09 Launchpad bug 1918506 in neutron "Neutron doesn't honor system-scope" [High,Fix committed] - Assigned to Slawek Kaplonski (slaweq) 14:15:30 fix is in neutron lib and that's why we needed that new release of neutron-lib 14:16:30 there is also additional issue with those roles, that project admin was able to get e.g. system resources which should be available only for system admin/reader 14:16:35 like e.g. list of agents 14:16:43 fix for that is proposed https://review.opendev.org/c/openstack/neutron/+/780548 14:17:39 please review that patch when You will have some time 14:18:03 today I found one more thing with those new personas 14:18:09 this time about network creation 14:18:25 new rules allows create e.g. provider network only for system admin: https://github.com/openstack/neutron/blob/5f6fbcb155e19d0a46cef0e7bbfee553f0472ef3/neutron/conf/policies/network.py#L123 - in context of such system admin user, there is no project_id, so such admin needs always to pass --project_id to specify owner of the network - should we allow it also for project_admin? 14:19:12 how can you know he is a project_admin without project id? 14:19:27 project_admin is different role 14:19:48 yes, but project_admin is the admin of a single project 14:19:54 and you don't have it 14:20:24 so system_admin is role which is set when there is system_scope='all' in context and there is no project_id then 14:20:44 but project_admin is role where in context IS project_id given 14:20:57 https://github.com/openstack/neutron/blob/master/neutron/conf/policies/base.py#L60 14:21:14 so the issue is that 14:22:05 1. with old rules there was only one type of ADMIN and such admin user belong to some tenant always, so when such user created network with e.g. provider_network given it was fine as tenant_id was in context 14:23:02 2. now, with new rules we set that such call with provider:physical_network can be done just by SYSTEM_ADMIN and when such user makes API request there is no tenant_id in context 14:23:14 so neutron fail as it needs tenant_id for network 14:23:22 so there are 2 possibilities IMO: 14:23:55 a) we leave it as it is now and update our docs that such SYSTEM_ADMIN user needs to always pass tenant-id for which network is created 14:24:30 b) we will modify our new policy rules to allow creation of e.g. network with provider:physical_network also for users with role PROJECT_ADMIN 14:24:48 a) that's safe but changes the API 14:24:53 is the problem clear now? 14:24:56 b) is less secure but no API change 14:25:06 ralonsoh: yes, exactly 14:25:18 b) mimics what we have now with "less secure rules" 14:25:29 to avoid API changes (and problems), I would prefer b) 14:25:32 by "less secure" I mean old rules 14:25:36 I know 14:25:43 we can improve that later 14:26:13 of course user can modify it on own deployment, it's just matter of defaults 14:26:31 I have patch for option b) ready but I wanted to know Your opinion first 14:27:09 if I understand well b) is like what we have now 14:27:16 and we should probably document profusely if we go with b 14:27:24 lajoskatona: more or less - yest 14:27:26 *yes 14:27:27 I mean before the policy cahnges merged (victoria and before) 14:28:06 so b) looks like a way forward but worth a mail perhaps to list 14:28:21 agree 14:28:29 mail about what exactly? 14:28:46 (anyway, if I prefer (b) now is for not changing the API jsut right now, at the end of the cycle) 14:28:47 that we will go with "less secure" default rules to mimic old behaviour? 14:28:56 exactly 14:29:13 ralonsoh: TBH by default old, deprecated rules are still working fine 14:29:26 we keep the old behaviour with API but from the new rules perspective it is less secure 14:29:36 so API isn't really changed until You will not switch some config knobs to enable usage of new rules only 14:29:51 what lajoskatona said 14:30:04 new rules but same policing 14:30:15 ok, I will send that patch to mimic old rules in new ones as much as possible 14:30:28 we can improve/change them in the future if there will be need for that 14:30:35 thx for Your opinions about it 14:31:45 and with that I think we are done with BPs for today 14:31:54 do You want to talk about any other BP? 14:33:13 ok, let's move on 14:33:21 #topic Community Goals 14:33:32 ralonsoh: any updates about privsep migration? 14:33:46 not for now 14:33:53 k 14:34:00 so we can move on to the next topic 14:34:07 #topic Bugs 14:34:17 hongbin was bug deputy, report: http://lists.openstack.org/pipermail/openstack-discuss/2021-March/021064.html 14:34:39 I see there 2 bugs which needs some attention 14:34:44 https://bugs.launchpad.net/neutron/+bug/1918914 - ovn and DHCP issue 14:34:45 Launchpad bug 1918914 in neutron "Toggling dhcp on and off in a subnet causes new instances to be unreachable" [Medium,Confirmed] 14:34:52 ralonsoh I saw You were commenting on it 14:34:58 will You take care of that LP? 14:35:27 slaweq, ok but I still can't reproduce it 14:35:37 yes, I saw 14:35:50 I don't know why is confirmed (even with c#3) 14:35:59 please keep an eye on it, maybe there will be some more data about how to reproduce it 14:36:01 in any case, I'll check it 14:36:05 thx a lot 14:36:14 and second one is 14:36:17 https://bugs.launchpad.net/neutron/+bug/1918145 - API slowdown 14:36:18 Launchpad bug 1918145 in neutron "Slownesses on neutron API with many RBAC rules" [Medium,Confirmed] 14:36:30 obondarev I was hoping that maybe You could take a look at that one 14:36:45 as You are doing a lot of performance improvements on API/DB level recently :) 14:37:34 @slaweq, yes, this is part of internal activity. Let me check that one. Not promising however I'll have enough time for this in coming days :) 14:37:50 obondarev: thank You 14:38:15 other bugs from the report are at least assigned as far as I checked 14:38:21 so we should be good with them 14:38:29 this week our bug deputy is haleyb :) 14:38:36 and next week will be lajoskatona 14:38:47 are You ok with that? 14:39:04 ack from me 14:39:58 lajoskatona: if You couldn't do it next week, please let me know :) 14:40:11 Yes, I made notes o fit 14:40:14 ok, and that's all regarding bugs from my side 14:40:18 thx lajoskatona 14:40:32 any other bugs You want to talk about today? 14:40:46 or any other topics to discuss? 14:41:48 ok, if not I will give You 19 minutes back today 14:41:58 thx for attending the meeting and have a great week 14:42:00 o/ 14:42:12 o/ 14:42:13 bye 14:42:14 #endmeeting