22:02:38 #startmeeting neutron_drivers 22:02:39 Meeting started Thu Apr 6 22:02:38 2017 UTC and is due to finish in 60 minutes. The chair is kevinbenton. Information about MeetBot at http://wiki.debian.org/MeetBot. 22:02:40 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 22:02:42 The meeting name has been set to 'neutron_drivers' 22:02:46 o/ 22:02:51 amotoki, ihrachys, mlavalle: ping 22:02:55 hello! 22:02:59 hi 22:03:06 armax can't join us, he's giving a talk at ONS right now about Neutron 22:03:24 o/ 22:03:38 nice to hear that :) 22:03:47 yeah, that's good 22:03:50 o/ 22:04:26 so the results of the doodle of where to move the drivers meeting are in 22:04:35 good 22:04:40 and the result is that there is no good time we can agree on 22:05:08 yay! /s 22:05:23 kevinbenton: I'll make it simple. You tell the time and I'll accomodate to whatever you and the others decide 22:05:35 it basically comes down to Armando can't do early morning, and that's the only convenient intersection for Ihar and Akihiro 22:06:10 ok, I guess we will stick to what we have 22:06:31 yeah, i think that's the only option for now 22:06:39 I suspect a similar case is for the neutron meeting on Mondays? :-x 22:06:46 I didn't mark 17UTC timeslot but I can get up late but even though we still have no intersection with armando timeslots :( 22:07:14 yeah 22:07:45 Monday might be a little more flexible 22:07:53 ok I guess I will trim my Fridays to the point where I won't work :P 22:07:55 Monday works for me 22:07:55 we can chat about that in next monday team meeting 22:08:02 + 22:08:13 * haleyb reads-up on cloning experiments 22:08:24 mlavalle: ihrachys was referring to the Neutron team meeting time change we attempted and failed :) 22:08:32 ah, ok 22:08:37 #info drivers team meeting staying at the same time for now 22:08:49 #topic RFE's 22:08:52 #link https://bugs.launchpad.net/neutron/+bugs?field.status%3Alist=Triaged&field.tag=rfe 22:09:35 I admit I didn't have time for anything drivers related this week 22:09:42 that's okay 22:09:48 let's do easy ones :) 22:10:08 like SNAT?? :) 22:10:17 yeah that one 22:10:19 now that the dissenting opinion is gone, what do we think about? https://bugs.launchpad.net/neutron/+bug/1671634 ;) 22:10:20 Launchpad bug 1671634 in neutron "[RFE] Allow to set MTU for networks" [Wishlist,Triaged] - Assigned to Ihar Hrachyshka (ihar-hrachyshka) 22:10:30 we'll wait for armando to reply on that 22:10:46 let's skip SNAT as well because i need to see what Igor said on fast exit patch 22:10:48 I am puzzled on why it's controversial, but sure, we need armax 22:11:10 i think there is some confusion there because fast exit was different last time i looked 22:11:46 are we discussing MTU or local SNAT? 22:12:02 I think neither 22:12:08 lol 22:12:29 * manjeets thought its MTU 22:12:30 yeah we wait for kevinbenton to post the next link 22:12:37 mtu will need armax 22:12:41 #link https://bugs.launchpad.net/neutron/+bug/1672852 22:12:42 Launchpad bug 1672852 in neutron "[RFE] Make controllers with different list of supported API extensions to behave identically" [Wishlist,Triaged] - Assigned to Ihar Hrachyshka (ihar-hrachyshka) 22:12:42 agree 22:13:06 that's on me. I posted a spec here: https://review.openstack.org/451993 22:13:23 I know that it may not go further but thought a detailed write-up will benefit discussion 22:13:40 ack 22:13:55 i do want to seriously consider the sticky sessions approach 22:13:59 I am still not sure it's a great idea, because it targets solving issues that are not immediately present in current code but suggests a path to evolve new features in the future 22:14:27 right, that's one solution that solves half of the problem 22:14:27 we need to think through the cases where that would break and clearly illustrate them before undertaking the big pile of work this will take 22:14:39 I actually agree 22:14:48 ihrachys: what's the other half of the problem? 22:14:48 there are also some limitations in the proposal 22:14:58 due to the fact that our api is liberal 22:15:24 the other half is, what if a new resource representation is put into db and then should be parsed by unaware old server 22:15:56 ihrachys: i'm not sure i understand, isn't that what the point of expand-only scripts is? 22:16:00 the proposal targets blocking that case on api level, so that you can't get a new expanded resource in db before all servers are upgraded 22:16:13 we are now using extensions to indicate a new feature and minor versioning. for features the idea would work, but for minor versioning (aka shim extension) I am not sure it works. 22:16:40 kevinbenton, the point of expand scripts is that you can execute them while neutron-server is running; not that plugin code will necessarily behave correctly. 22:16:58 ihrachys: well if it breaks old server i'd say it's not really an expand script 22:17:00 amotoki, not sure which versioning we talk about 22:17:28 let's take time to review the spec and comment there 22:17:30 ihrachys: what I mean is we have shim extension (or light extension) for minor behavior changes. 22:17:45 kevinbenton, well it's one thing that a column added (but not filled) doesn't break a server; it's another thing that server can make sense of the column filled in with data 22:17:57 + for more time to bake/think/review spec... 22:18:13 for such changes, I am not sure we can ensure a plugin works correctly if we disable some a new extension 22:18:20 ihrachys: well the old server would ignore it 22:18:34 amotoki, we should not have cases where we modify behaviour of existing attributes 22:19:00 ok 22:19:11 kevinbenton, server may be scheduled to act on the resource that is represented with new data in db; it may choke on it. (that's hypothetical) 22:19:35 ihrachys: agree. if we find exception we need to fix it 22:19:54 ok, I guess we agree to follow up in lp and gerrit 22:20:12 so, comment on the spec 22:20:20 +1 for spec 22:20:24 ihrachys: right, it sounds like that violates the point of hte expand script. maybe we aren't as strict as i thought. would be good to have some sample scenarios you envision in the spec that would break 22:20:36 ok, next 22:20:43 as high level, there is no reason to block this 22:21:12 #link https://bugs.launchpad.net/neutron/+bug/1674349 22:21:14 Launchpad bug 1674349 in neutron "[RFE] Introduce a new rule with service user role in Neutron policy" [Wishlist,Triaged] - Assigned to Akihiro Motoki (amotoki) 22:21:15 amotoki, complexity 22:21:51 re the service user bug, we actually started work I believe 22:22:02 I think this one is super simple. we already consume more attributes from keystone. 22:22:22 yes we started it. I think this can be handles as a normal bug 22:22:32 it seems like a no brainer 22:22:34 yes 22:22:36 approve 22:22:42 yes, approve 22:22:50 this will be nice 22:23:00 yeah we talk about it for a while 22:23:05 having nova doing network things for the user with admin privileges has always made me nervous 22:23:33 yes. service token is a nice feature 22:23:33 https://en.wikipedia.org/wiki/Confused_deputy_problem 22:23:35 afaik it's also related to timeout issues they had for long operations 22:23:59 ihrachys: can you switch to approved state? 22:24:04 sure 22:24:33 #link https://bugs.launchpad.net/neutron/+bug/1667329 22:24:34 Launchpad bug 1667329 in neutron "[RFE] Floating IP Subnets on Routed Provider Networks" [Undecided,Triaged] 22:25:55 mlavalle: how familiar are you with the plans for this? 22:26:03 somehow familiar 22:26:13 if i understand the proposal correctly, it will be a very limited change on neutron side 22:26:33 it is the completion of the of the routed networks spec 22:26:50 we discussed it this morning during the L3 team meeting 22:27:18 On the Neutron side is not that big 22:28:11 It also needs a change on dynamic-routing-side. this looks a main part. 22:28:23 that is correct 22:28:52 oka 22:28:59 so is john going to work on this then? 22:29:14 yes and I plan to pitch in 22:29:38 He actually proposed this morning to start working on is as WIP while the RFE is approved 22:30:01 sounds good 22:30:13 i'm okay approving this one 22:30:23 i don't see it conflicting with other ongoing work in neutron 22:30:37 yeah, me neither 22:30:49 ihrachys, amotoki: any issues approving this one? 22:30:57 I am fine with approving it 22:31:17 I am ok, though I don't grasp l3 things, so you can also ignore me :) 22:31:33 the next step is a spec? 22:31:43 we don't want to ignore you, ihrachys :-) 22:31:46 I think also a blueprint (though I am not sure why we do it) 22:32:13 ihrachys: blueprint makes visibility in launchpad easier 22:32:29 kevinbenton, well if you target to pike-1 it will show in the target... 22:32:37 so not sure how it helps 22:32:49 ofc except requiring to set approver and author... 22:33:09 ihrachys: as a bug though 22:33:22 ihrachys: separating features from bugs is somewhat useful 22:33:34 well if only that, sure 22:33:44 ihrachys: yeah, i'm not sure if there is another advantage 22:33:59 so tl;dr there is some legwork to set all things correctly, the RFE process in devref has details 22:34:20 someone should just commit now to do the work 22:35:01 ok 22:35:12 there is one more i would like to discuss that has a thorny backward compatibility issue 22:35:16 #link https://bugs.launchpad.net/neutron/+bug/1669630 22:35:17 Launchpad bug 1669630 in neutron "Network RBAC acceptance workflow" [Wishlist,Triaged] 22:36:01 oh I remember that one. we can always introduce new types of rbacs that will need approval ;) 22:36:32 I don't think controlling behaviour with config option is a great idea 22:36:32 ihrachys: oh, i didn't think about that 22:36:40 ihrachys: a new type might not be bad 22:36:48 since it is a step from cross-cloud compatibility 22:37:01 ihrachys: then operators could block access_as_shared with policy.json 22:37:41 yeah, like approve:access_as_shared or smth 22:37:48 maybe even make it a pattern for all rules 22:38:17 yeah, we want to make sure it's a general solution 22:38:29 or make it a new attribute on existing rbac rule that suggests if approval is needed. 22:39:09 i suppose policy.json is sort of like having it config driven though 22:39:44 yeah. I don't think we should ask users to make it. just add approval as an auxiliary parameter of rbac 22:39:59 then we can make our CLI clients use it by default 22:40:04 or smth 22:40:33 well then we still have the issue where we are technically breaking the API by changing behavior 22:40:54 since a user using the API will now require the other user to accept the shared thing before using it 22:41:19 IIRC I think some other project (glance?) has similar mechansim. In the impl, even though they do not approve a network share request, they can use it. 22:42:01 kevinbenton, but default behaviour will be as it is now? 22:42:14 not sure I see where compat issue here is 22:42:40 ihrachys: so are you suggesting that we continue to allow users to share without requiring approval? 22:42:49 the original compat issue was that we will change behaviour for rbacs that are created by scripts written pre-fix 22:43:02 kevinbenton, ah well, yeah, I forgot about the use case! 22:43:03 :) 22:43:04 I understand the challenging point is what should be the default. It is a big change for users who some resources are exposed to. 22:43:27 amotoki: right 22:43:37 we can always migrate everything now to the already approved state 22:43:54 the issue is API behavior change going forward of not being approved by default 22:44:02 yeah 22:44:23 yeah, we change the bahavior 22:44:32 ok, I guess a new resource would be the easiest, and we would keep both for some transition time 22:44:51 then just drop it from our code (but not api-ref) 22:45:04 it == old impl 22:45:12 ihrachys: so basically a whole new API endpoint? 22:45:27 ihrachys: and they ultimately do the same thing, but one auto-approves and one doesn't? 22:45:31 that could work 22:45:37 another idea is to allow a user to deny resource sharing.... a resource shared is visible to users but the user can deny the share. 22:46:29 it is a bit different from the original RFE though.. 22:46:36 but that requires user to opt-in to a safety feature 22:46:43 which i would like to avoid if we can 22:47:40 and if operators automate that as part of tenant onboarding, then we basically have the same problem of a user not knowing if they need to accept or not 22:48:16 it is just a brainstorming. of course I think opt-in model looks natural for many users in this case 22:49:07 ok, provide thoughs on the RFE 22:49:14 and we can discuss again next week 22:49:37 i'm actually leaning towards the new API option as of now 22:50:08 I am also leaning in that direction 22:51:12 ok 22:51:18 that's the last of the RFE's 22:51:18 that sounds a good possible direction. I am wondering how glance handles it and need to check it 22:51:35 hi all, sorry to interrupt. I added an rfe the week of the 02/09 drivers meeting bug 1662650. I believe my bug has been acknowledged but it's status has not been moved to confirmed yet, so I think it fell through the cracks some how? 22:51:36 bug 1662650 in neutron "[RFE] Advance configuration of SR-IOV ports- api extension" [Wishlist,New] https://launchpad.net/bugs/1662650 - Assigned to Trevor McCasland (twm2016) 22:51:41 amotoki: yeah, maybe part of the homework is to find that out 22:51:42 I posted a comment with new api suggested 22:52:10 trevormc: ah, hasn't been triaged yet 22:52:15 we can look now 22:52:48 thank you! It's rough but I do have a vf_policy object in review to give an idea. 22:53:33 trevormc: many of these sound like they should be derived from existing APIs 22:53:57 like allowing/dropping broadcast 22:54:12 or antispoofing 22:54:16 kevinbenton, you mean secgroups? 22:54:26 i think those should be higher level properties of neutron network or port security 22:54:28 ihrachys: right 22:54:36 I believe port_security already covers the antispoofing 22:54:52 right. sriov may have its implementation of firewall_driver instead of using noop as they do now 22:54:52 i don't think we want to expose these directly as properties if they sort of overlap with existing abstractions 22:55:13 VLAN_STRIP sounds like vlan_transparency 22:56:12 INSERT_TAG sounds a normal operation as OVS does. 22:56:39 yeah but I thought at the PTG we discussed that vlan transparency only applied to tags in one direction and not both 22:57:23 trevormc: vlan transparency just allows tagged traffic to pass in and out of a port without being modified 22:57:45 trevormc: i think we need to discuss these basically one-by-one in the RFE 22:58:05 trevormc: i'll leave comments and we can talk about it next drivers meeting 22:58:08 yeah, matching with current Neutron capabilities 22:58:20 I am not sure what INSERT_TAG is, you may want to elaborate there on it 22:58:21 I totally agree with kevin 22:58:46 yeah I think that will be better, thanks. I'll have to talk to the guys who are driving this through me :) 22:58:54 ok 22:58:55 + 22:58:57 thanks everyone 22:59:07 same time next week! :) 22:59:08 see you next week! 22:59:12 #endmeeting