14:01:04 #startmeeting networking 14:01:04 Meeting started Tue Apr 25 14:01:04 2023 UTC and is due to finish in 60 minutes. The chair is ralonsoh. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:01:04 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:01:04 The meeting name has been set to 'networking' 14:01:05 hello 14:01:07 o/ 14:01:08 o/ 14:01:10 hi 14:02:20 lajoskatona told me that, most probably, won't attend 14:02:32 ok, let's start 14:02:38 #topic announcements 14:02:48 #link https://releases.openstack.org/bobcat/schedule.html 14:03:07 o/ 14:03:19 o/ 14:03:19 next week is the Bobcat Cycle-Trailing Release Deadline 14:03:22 https://releases.openstack.org/bobcat/schedule.html#b-cycle-trail 14:03:41 and the PTG is closer 14:03:44 #link https://etherpad.opendev.org/p/neutron-vancouver-2023 14:03:55 slaweq presented two forum sessions (still under review) 14:04:04 1) OpenStack Neutron onboarding 14:04:09 o/ 14:04:11 2) Neutron meet and greet: Operators feedback session 14:04:20 late o/ 14:04:24 thanks slaweq for the document and presenting them 14:04:28 Thanks for proposing 14:04:49 and as usual, please check https://openinfra.dev/live/#all-episodes 14:05:20 any other announcement? 14:05:43 ok, let's move on 14:05:46 #topic bugs 14:05:57 last week report is from lucasgomes 14:06:03 #link https://lists.openstack.org/pipermail/openstack-discuss/2023-April/033448.html 14:06:22 there are some bugs not assigned yet 14:06:30 #link https://bugs.launchpad.net/neutron/+bug/2016413 14:06:41 a low hanging fruit one 14:07:28 ok, next one 14:07:34 #link https://bugs.launchpad.net/neutron/+bug/2016504 14:07:39 Support specify fixed_ip_address for DHCP or Metadata port 14:08:24 for ovn, when you create a network, the metadata port is created at the same time 14:08:36 and then, when the first subnet is created, the IP is assigned 14:08:53 the point is that you can then change the assigned IP 14:08:55 but this sounds more an RFE, am I wrong? 14:08:57 yes 14:09:00 is an RFE 14:09:06 ahh, ok 14:09:49 I'll comment in the bug 14:10:06 if Liu makes a good proposal, we can discuss it in the drivers meeting 14:10:31 feel free to comment on the bug 14:10:38 next one 14:10:40 #link https://bugs.launchpad.net/neutron/+bug/2016960 14:10:45 [RFE] neutron fwaas support l2 firewall for ovn driver 14:10:50 same as before, is a RFE 14:11:12 if I'm not wrong, what is expecting is to have white lists, not present in the in-tree driver 14:11:33 sounds good but to be approved needs an assignee and to be presented in the drivers meeting 14:11:39 I'll comment in the lp bug 14:11:51 next one 14:11:55 #link https://bugs.launchpad.net/neutron/+bug/2017023 14:12:00 lajoskatona, is ^^ still valid? 14:12:23 yes, I discussed it with kopecmartin and on #nova channel sean 14:12:52 I added the conclusion from those discussions so far as comment #2 14:12:56 but we need first to bump the min version of nova api, right? 14:12:59 but as I see gmann also commented 14:13:16 No, that is not necessary 14:13:20 ah ok, I see 14:13:46 what is lightweight and good for us is that we stop executing those tests for Neutron, and keep the test coverage only in Nova 14:14:15 the same is true for glance for example as there's a similar legacy API in nova for images and tempest tests also 14:14:33 so do we need to remove this test from our jobs? 14:14:35 but that is a separate story and not covered in this bug, just as interesting story 14:14:53 this/these 14:15:17 yes as I understand, but have to double check with QA, as they wanted to have it as topic on their meeting 14:15:24 have to check with them again 14:15:53 perfect, can I assign the neutron bug to you? just to track it 14:16:00 sure 14:16:04 thanks a lot 14:16:21 ok, last one 14:16:26 #link https://bugs.launchpad.net/neutron/+bug/2017131 14:16:34 ykarel, fixed the issue with loki jobs 14:16:45 now both (ovs and ovn) are working again 14:16:54 now the problem is in the OVN one, when creating the router 14:16:55 Thanks ralonsoh 14:17:16 I'm testing several options: https://review.opendev.org/q/topic:test_loki 14:17:21 I'll assign this bug to myself 14:17:36 in any case, this is not critical 14:18:02 and now the CI "party" we had, a short report 14:18:21 after these 2 reverts 14:18:22 Revert "Move to python3.9 as minimal python version": https://review.opendev.org/c/openstack/neutron/+/881430 14:18:29 Revert "update constraint for tooz to new release 4.0.0": https://review.opendev.org/c/openstack/requirements/+/881329 14:18:39 we were able to execute py38 jobs again 14:18:55 this is because we are still running on Focal, not in Jammy 14:19:09 ykarel, is testing a Nova patch https://review.opendev.org/c/openstack/nova/+/868419 14:19:18 that could fix the nested virt nodes issue 14:19:35 because of this, during the last release we reverted the migration to Jammy nodes 14:19:50 and, of course, we have new problems in the CI 14:20:02 that are being addressed by 14:20:03 Revert pysaml2 to 7.3.1: https://review.opendev.org/c/openstack/requirements/+/881466 14:20:08 adn 14:20:09 Revert "Drop check-uc jobs for py38": https://review.opendev.org/c/openstack/requirements/+/881433 14:20:41 yes will be discussing that nova patch in nova meeting today 14:21:04 right, we need to keep investigating this issue to be able to migrate to Jammy asap 14:21:09 thanks for the summary and for pushing this topic 14:21:33 so hold re-checks until further notice? 14:21:39 yes, exactly 14:21:49 ack 14:21:55 check upper patches in requirements 14:21:58 thanks for the update 14:22:11 and that's all 14:22:12 ah 14:22:15 This week jlibosva is the deputy, next week will be obondarev 14:22:25 ++ 14:22:39 I'll ping Jakub after this meeting 14:22:57 let's jump to the next topic 14:23:06 #topic community_goals 14:23:17 there are no new specs nor ryu patches 14:23:23 so no need to stop there 14:23:33 1) Consistent and Secure Default RBAC 14:23:42 there is an active list of patches 14:23:50 https://review.opendev.org/c/openstack/neutron/+/879827 14:23:54 ^^ this one is the last one 14:24:03 to enable sRBAC in master 14:24:05 and the most important one 14:24:06 by default 14:24:13 exactly hehehe 14:24:20 it's very big but changes are mostly in tests 14:24:37 slaweq, if I'm not wrong, this is the summary now, right? 14:25:19 as I had to change many tests so it is passing proper context while doing requests to neutron now 14:25:37 logically tests were not changed IIRC 14:25:44 that's all from me about it 14:25:52 just a few tests... 14:26:05 ahh, and once this will be merged we will can say that we completed phase1 of S-RBAC goal 14:26:22 next one is to introduce service-to-service role and identify some APIs for such role 14:26:26 but that's next step 14:26:48 that second one is more obscure, we need to identify these calls 14:26:50 I forgot from last time, is that task for this cycle (bobcat)? 14:26:56 the first one 14:27:04 ack 14:27:17 so for now the goal is to identify only those calls 14:27:25 yeah 14:27:25 lajoskatona actually initial goal was to finish phase1 in Anthelope cycle 14:27:29 but we didn't made it 14:27:34 so we are catching up 14:27:36 ok 14:27:58 thanks for refreshing the history :-) 14:28:42 slaweq, thanks for working on this 14:28:58 ok, next one 14:29:01 2) Neutron client deprecation 14:29:07 #link https://bugs.launchpad.net/neutron/+bug/1999774 14:29:18 and the usual etherpad: https://etherpad.opendev.org/p/python-neutronclient_deprecation 14:29:38 I pushed a patch for fwaas: https://review.opendev.org/c/openstack/python-neutronclient/+/880629 14:29:55 but I have to test a few things on it, so it is WIP 14:30:08 I'll add it to the list in the agenda 14:30:43 thanks, the ocata patch is still open, but ready for review from Tom Weninger: https://review.opendev.org/c/openstack/octavia/+/866327 14:30:54 octavia, not ocata, sorry 14:31:17 ah yes 14:31:27 qq about neutronclient 14:31:35 I see that we finally merged https://review.opendev.org/c/openstack/python-neutronclient/+/871711 14:31:53 should we maybe propose new release of neutronclient with that removed? or it's not needed? 14:32:14 right, we should push a new release with a new mayor version, I think 14:32:20 +1 14:32:20 I'll push this patch today 14:32:23 good idea 14:32:26 ++ 14:32:47 perfect, thanks lajoskatona for working on this 14:33:01 ok, let's move to the last topic 14:33:06 #topic on_deman 14:33:14 ltomasbo, froyo would be interested 14:33:20 o/ sure 14:33:22 #link https://bugzilla.redhat.com/show_bug.cgi?id=2186758 14:33:41 in a nutshell: a non-admin port in a private network 14:34:04 the admin creates a FIP and associates the FIP (admin project) to the non-admin port 14:34:24 --> the user cannot delete the port because cannot disassociate the FIP 14:34:32 (btw, I'll create a LP bug for this) 14:34:34 question 14:34:45 should we allow this disassociation in any case? 14:35:04 in order to allow the non-admin user to delete his/her port in any case 14:36:38 (my opinion: we should allow the disassociation during the port deletion) 14:36:43 if it is only to allow to delete the one port for the FIP, why not? 14:37:09 because that was an admin action, the association 14:37:17 but, IMO, this port belongs to the user 14:37:45 ack 14:38:31 yeah, the main options are: 14:38:33 1) it was an admin action, it an admin issue... 14:38:33 2) it is a port belong to user, so user can delete it (elevating context to disassociate FIP) 14:39:35 ok, I think froyo you can propose 2) in a patch and wait for feedback. IMO, the association is not covered by the policy rules 14:39:45 so it should be undone during the deletion 14:39:55 slaweq, any feedback? 14:40:20 isn't accociation done as FIP update? 14:40:23 from policy PoV 14:40:41 hmmm let me check 14:41:21 yes, the association is done during the FIP update 14:41:25 I don't think any special API endpoint for that in https://docs.openstack.org/api-ref/network/v2/index.html 14:41:33 no, there isn't 14:42:03 ok, so disassociation of FIP from port is actually removing port_id from fip's attributes, right? 14:42:11 yes 14:42:13 yes 14:42:24 so who is owner of FIP? is it admin in Your case? 14:42:28 yes 14:42:33 yes 14:42:54 so by elevating context we will allow regular user to update fip which belongs to other project 14:43:08 I know it's kind of "special" case but I'm not sure we should do that 14:43:19 imo 1) is a better option then, just make a proper 403 error instead of 500 14:43:22 just on delete_port (to remove port_id and put FIP in DOWN state) 14:44:00 froyo but still, admin user probably did it for some reason 14:44:09 slaweq, sure! 14:46:38 ok, let's change then the scope and the output of the server 14:46:38 but the port deletion can't be done 14:46:38 for the use case, is it mandatory the FIP belongs to admin? they could also create FIP in the tenant project? 14:46:38 maybe better option would then be to introduce some api rule like "PORT_OWNER" and allow update FIPs for port owners 14:46:38 this is a particular case 14:46:38 that was proposed yes 14:46:38 similar what we have for some port related apis where it can be done by "network owner" 14:46:38 the FIp can be assigned to the project 14:46:38 that is easier than creating a new particular rule type 14:46:58 ok, let's propose the error change to 4xx 14:47:15 and you'll probably need to reconsider your deployment and how the FIP is created 14:47:20 when the FIP is assigned to the project, the tenant user will be manage it completely? 14:47:25 yes 14:47:40 good, so move the responsability to the admin ... good for me! 14:47:53 cool, thanks! 14:48:02 please, open a lp bug for this 14:48:03 I would just try to avoid doing hardcoded context.elevate() as much as possible 14:48:04 thanks for comments! 14:48:11 and use API rules as much as we can 14:48:21 it's IMO better for S-RBAC policies 14:48:25 right 14:48:37 ok, let's move ibn 14:48:38 on 14:48:41 #link https://review.opendev.org/c/openstack/neutron/+/875809 14:48:52 qq: should we allow to backport this one? 14:48:59 this is implicitly an API change 14:49:16 but we in the other hand, this limitation is needed 14:49:37 because this is a bug fix, I would accept it, but waiting for opinions 14:50:11 I think we would need opinion from stable-maint team on this 14:50:19 +1 14:50:20 maybe elodilles can take a look 14:50:32 I'll ping him 14:50:34 quite a corner case as ralonsoh said 14:50:34 yeah, we've sought their opinion before 14:50:44 is there an associated api-ref change? 14:50:49 no 14:50:56 this is an implicit API change 14:51:03 because that introduces a limitation 14:51:17 that is implicit by the standard, btw 14:51:28 but api-ref should specify conditions when api calls fail? 14:51:36 or at least it could 14:52:17 I don't know if we report that correctly in the API 14:52:28 the neutron server logs that correctly 14:52:35 that would IMO improve the feasibility of a backport 14:52:48 ok, I'll check that first 14:53:10 and that's all I have in the agenda 14:53:13 anything else?? 14:53:42 so thank you very much and see you in 6 mins in the CI meeting (IRC type this week) 14:53:45 #endmeeting