16:00:35 #startmeeting nova 16:00:35 Meeting started Tue May 31 16:00:35 2022 UTC and is due to finish in 60 minutes. The chair is bauzas. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:35 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:00:35 The meeting name has been set to 'nova' 16:00:40 EHLO 16:00:53 o/ 16:00:56 qo/ 16:01:03 o/ 16:01:45 not sure if gibi is around, but let's start to discuss (he told me he couldn't be in our meeting) 16:02:59 #topic Bugs (stuck/critical) 16:03:04 #info No Critical bug 16:03:09 #link https://bugs.launchpad.net/nova/+bugs?search=Search&field.status=New 14 new untriaged bugs (-1 since the last meeting) 16:03:12 thanks elodilles :) 16:03:18 #link https://storyboard.openstack.org/#!/project/openstack/placement 26 open stories (0 since the last meeting) in Storyboard for Placement 16:03:18 o:) 16:03:26 #info Add yourself in the team bug roster if you want to help https://etherpad.opendev.org/p/nova-bug-triage-roster 16:03:36 elodilles: do you want to discuss about some bug ? 16:03:50 bauzas: nothing to discuss i think, 16:03:54 cool 16:04:11 thanks for the bug triage etherpad btw. 16:04:19 i only triaged two bugs and they were more or less clear (or incomplete) 16:04:30 nice 16:04:44 so, after you, we're done with the roster 16:04:58 if someone wants to triage, let me know now 16:05:04 for next week 16:05:57 ok, looks not 16:06:17 then, let's rerun the roster :) 16:06:23 ++ 16:06:31 I'll be the next bug baton folk 16:06:50 I can run it for two weeks if needed as I'll ask to not have a meeting next week 16:07:13 i guess gibi is not here to object :) 16:08:14 heh, I'll see him f2f next week 16:08:20 so I could pass him the baton :p 16:08:32 :) 16:08:39 anyway 16:08:46 #info Next bug baton is passed to bauzas 16:08:59 * bauzas has to run then 16:09:13 meh, joking 16:09:20 next topic, then 16:09:24 #topic Gate status 16:09:28 #link https://bugs.launchpad.net/nova/+bugs?field.tag=gate-failure Nova gate bugs 16:09:35 #link https://zuul.openstack.org/builds?project=openstack%2Fplacement&pipeline=periodic-weekly Placement periodic job status 16:09:38 #link https://zuul.opendev.org/t/openstack/builds?job_name=nova-emulation&pipeline=periodic-weekly&skip=0 Emulation periodic job runs 16:09:43 #info Please look at the gate failures and file a bug report with the gate-failure tag. 16:09:47 #info STOP DOING BLIND RECHECKS aka. 'recheck' https://docs.openstack.org/project-team-guide/testing.html#how-to-handle-test-failures 16:10:02 all the jobs look good to me 16:10:51 something to tell about the gate ? 16:11:57 ok, looks not, continuing 16:12:06 #topic Release Planning 16:12:11 #link https://releases.openstack.org/zed/schedule.html 16:12:16 #info Zed-2 is in 6 weeks 16:12:20 the tick is clicking 16:12:36 I'll ask for a spec review day maybe in two weeks's meeting 16:13:31 nothing to tell here, I'm slowing reviewing a few specs 16:14:05 and oh, this reminds me to modify Launchpad for those accepted blueprints 16:14:18 * bauzas forgot to do it last week 16:14:45 anything to talk about specs, per say ? 16:15:57 - 16:16:04 #topic OpenInfra Summit 16:16:13 #info bauzas, gibi and stephenfin will attend the summit (at least for those I know) 16:16:36 so, then I have a question for those around 16:16:47 shall we cancel next week's meeting ? 16:16:50 I have a vote ! 16:16:57 #startvote Cancel Nova meeting next week ? (yes/no) 16:16:57 Begin voting on: Cancel Nova meeting next week ? Valid vote options are , yes, no, . 16:16:57 Vote using '#vote OPTION'. Only your last vote counts. 16:17:09 #vote yes 16:17:12 #vote yes 16:17:12 though I will travel but ok for me to cancel, 16:17:16 #vote yes 16:17:20 #vote yes 16:17:23 *I will not travel 16:17:32 gmann: you'll be missed 16:17:54 I'll close the vote 16:17:58 but, before this 16:18:09 if someone wants run the meeting, he can 16:18:25 this is just I'm not sure we'll have a quorum then 16:18:47 let's end the vote 16:18:48 #endvote 16:18:48 Voted on "Cancel Nova meeting next week ?" Results are 16:18:48 yes (4): Uggla, gmann, elodilles, bauzas 16:19:14 so, 16:19:25 I haven't seen interest by someone to run it, 16:19:47 #agreed June 7th nova meeting is CANCELLED. 16:19:59 I'll send an email accordingly 16:20:23 one last point, if some people read our minutes, 16:20:26 #info We'll provide a Nova meet-and-greet Operators feedback session on Wednesday, June 8, 2:50pm - 3:20pm. Operators are welcome. 16:20:45 I can proxy any opinions or thoughts at the forum, btw. 16:20:54 stick around on IRC, you could be pinged 16:21:53 bauzas: good idea. is there any etherpad i can add topic? 16:22:05 gmann: I surely can create one 16:22:06 I would like to get soem feedback on SRBAC especially on scope thing 16:22:29 thanks, that will be great I will not be there but I think you can discuss it and I will add details in etherpad 16:22:32 gmann: so you imagine some feedback etherpad, or rather some etherpad for adding notes before and remarks after ? 16:22:40 ah, I see 16:22:47 bauzas: latter one 16:22:59 gmann: this is an excellent idea, let's setup this 16:23:05 +1 16:23:28 gmann: I wish the Forum sessions would have their own etherpads tho 16:23:29 we are trying to get this topic for ope meetup also but getting per project feedback also will be great 16:23:53 bauzas: yeah, that also work, anywhere I can add this topic so that you remember it 16:24:05 gmann: oh, you meant about operators feedback at our meet-and-greet ? gotcha. 16:24:11 yeah 16:24:26 gmann: then, I'll start an etherpad and I'll discuss this with gibi as he co-hosts 16:24:34 thanks 16:24:47 this is a good point, we have a few things we'd like operators to play witgh 16:24:53 like the unified limits 16:24:58 indeed 16:25:16 remember tho, operators play old versions, so they couldn't be that helpful 16:25:23 but this is not a reason to ask 16:25:33 to not* ask 16:25:39 yeah, just if we can get initial feedback what they think on these new things 16:25:45 gotcha 16:25:50 and brilliant idea 16:26:01 gmann: you're doing my homework ! 16:26:12 :) 16:26:35 ok, next topic, I guess ? 16:27:09 looks so 16:27:20 #topic Review priorities 16:27:25 #link https://review.opendev.org/q/status:open+(project:openstack/nova+OR+project:openstack/placement+OR+project:openstack/os-traits+OR+project:openstack/os-resource-classes+OR+project:openstack/os-vif+OR+project:openstack/python-novaclient+OR+project:openstack/osc-placement)+label:Review-Priority%252B1 16:27:42 #link https://review.opendev.org/c/openstack/project-config/+/837595 Gerrit policy for Review-prio contributors flag. Naming bikeshed in there. 16:28:14 #link https://docs.openstack.org/nova/latest/contributor/process.html#what-the-review-priority-label-in-gerrit-are-use-for Documentation we already have 16:28:48 looks we found a consensus on my proposal for https://review.opendev.org/c/openstack/project-config/+/837595 16:29:04 sean-k-mooney: could you then please provide a new rev for it ? ^ 16:30:38 ah i tought you were going to update it but sure 16:31:33 sean-k-mooney: oh, I can do it 16:32:17 #action bauzas to update https://review.opendev.org/c/openstack/project-config/+/837595 16:33:10 sean-k-mooney: no worries, I'll take it 16:33:36 next topic then 16:33:38 #topic Stable Branches 16:33:55 elodilles: feel free to take the mic 16:34:00 #info ussuri is unblocked, thanks to gmann's tempest pinning patches 16:34:17 \o/ 16:34:21 yeah, and stable/victoria is also pinned with old tempest 16:34:27 #info stable branches are now unblocked, but intermittent failures need further investigations. melwitt's tracking etherpad: https://etherpad.opendev.org/p/nova-stable-branch-ci 16:34:32 gmann: thanks! \o/ 16:34:33 took almsot 1 week to get all these merged 16:34:42 :S 16:34:57 #info placement's stable/branches are unblocked back till victoria (see melwitt's etherpad ^^^) 16:35:12 \o/ agai, 16:35:17 cyborg-tempest plugin job which is non voting in nova gate also will be fixed by #link https://review.opendev.org/c/openstack/cyborg-tempest-plugin/+/843329 16:36:27 gmann: ack, thanks for that, too! 16:36:41 (that's all from my side) 16:36:42 :) 16:36:51 greatly appreciated, thanks gmann 16:37:03 np! 16:37:18 and thanks melwitt for the tracking 16:37:24 moving on 16:37:29 we have one last item 16:37:48 #topic Open discussion 16:38:00 (levy14) Discuss ability to call Barbican from inside VM without supplying credentials 16:38:03 levy14: around ? 16:38:06 yep 16:38:25 was not around last week to put it on the agenda 16:38:34 levy14: I'll be honest, I'm not sure we have quorum for discussing your point today, but we can try 16:39:36 but my org would greatly benefit if any code in a vm could call barbican to fetch secrets. now there are secrets in code, in config files, injected but not properly handled. I'd like to get rid of that. 16:39:59 without having to put the credentials in the code, I mean 16:40:31 I see this as a big security improvement for users of nova 16:40:50 i actuly see it as the opisite form a nova point of view 16:40:57 is potentally a large security whole 16:41:22 nova today almost excilulive does not handel any tenatn secrets 16:41:45 yup, that's what we said 16:41:48 nova or admins by default cannot retirve secrets form barbican 16:42:00 only the user can 16:42:05 I understand. but that forces users of nova to improvise. and it's not good what users do. the outcome is nasty. 16:42:32 yep thats also true 16:42:46 if there would be a feature to allow this specific use case, that would make life of nova users much better 16:42:48 realisticaly the simpelte way to achive this today id via an external vender data service 16:43:06 which could inject a bootstrap token via the metadta api 16:43:25 simialr to how nova-join works https://opendev.org/x/novajoin#design 16:43:35 the problem with that is that I cannot realitically get it implemented across the federation of sites we represent 16:43:38 https://docs.openstack.org/nova/latest/admin/vendordata.html 16:44:31 levy14: what you are trying to achive is somethign simialr to k8s ablity to inject secrets into the pods right 16:45:16 kubernets allows secreates to be injected via config maps or other mechanium such that the pod applciation can the interact with the k8s apis 16:45:40 levy14: what you want is a way for nova instance to be able to bootstrap talkign to keystone/barbican 16:45:53 so that they can programitacly get teh secretes that are stored there 16:45:57 not necessarily. I would like a transparent mechanism. that watches for outgoing https reguests to barbican and adds a header with the auth to access the secrets. based on some form of vm identity 16:46:14 levy14: nova does not controll the guest networking 16:46:25 so such a serice woudl be outside our scope 16:46:48 sean-k-mooney: they can do that today, if they inject a secret. but that needs them to properly tend and handle the secret with care. users don't care, they are sloppy. 16:47:13 one posiablity but its a hack 16:47:28 woudl be to take teh token we are invoked with and include it in the metadata 16:47:35 that token would expire 16:48:01 but it woudl be suffient for the app to bootsrap potenally by issueing an application credetial 16:48:25 sean-k-mooney: it was just a suggestion. or a way to describe what I expect to happen, don't know which project implements it. I thought I bring it up in nova, as it seems some sort of vm identity is needed for it to work 16:48:46 if you want the http request to be intercepted transparently you would need service function chaning or similar to implement that 16:49:08 levy14: that the thing vms dont have an identiy 16:49:14 they are owned by porjects 16:49:24 secrets are owned by users 16:49:28 sean-k-mooney: maybe they should start having one 16:49:46 perhaps 16:49:56 or secrets in barbican can be set up so that an entire project has access to them? 16:50:14 im not sure but that would still not allow nova to access them 16:50:33 services and cloud admins cannot acces barbican secrets 16:50:44 so the possibilities are: 16:50:48 that is doen intentiolly for improved security 16:51:01 1. metadata service 16:51:19 2. interception of network calls outgoing from a vm 16:52:30 those are two possiblities yes 16:52:42 any other? 16:52:49 for 1 you would have to define what the metadata service will provide the vm 16:53:03 and anyone sees this as a valuable feature for nova? 16:53:05 2 is not in scope of nova 16:53:36 levy14: if it was done securly maybe. 16:53:52 but i also see it as a non trivial feature 16:54:11 i did some more looking at this after it was discussed ~ 1 week ago 16:54:22 sean-k-mooney: I am sure is non-trivial 16:54:53 and came to the same conclusion that there was no user associated with a VM so it was not possible to generate a usable token, even though it was possible to assert the identity of the vm 16:55:00 sean-k-mooney: but I see it very valuable to have 16:55:27 timebox : we only have 5 mins left 16:55:55 levy14: do you feel comfortable wrting a spec propsoal even an incomplete one with your usecases 16:56:09 levy14: and or would you be able to implement this with our guidance 16:56:11 yes, we should rather discuss this by a spec 16:56:31 sean-k-mooney: I can try writing an (incomplete) spec, I am not up to implement it myself 16:56:41 jrosser_: i could see us adding a --application-credetial or something to the api 16:57:00 jrosser_: i.e. you precreate one and tell nova to pass it to the guest via the metadtaa service 16:57:03 i think that spcifying a service user for a VM might be enough 16:57:40 anyway this is a rabbit hole and i don't want to disrupt your meeting 16:57:58 jrosser_: no worries, we don't have other discussions 16:58:47 at least, looks to me we have a consensus : levy14 will provide an incomplet spec or a backlog one 16:58:54 levy14: do you know about https://specs.openstack.org/openstack/nova-specs/specs/backlog/index.html ? 16:59:09 tldr was that other $clouds let you associate a service user (thats already in your project) with that VM, and that combined with a JWT from the metadata to auth against keystone would give you a token for that service user 16:59:36 anyway, we're at the last minute for our meeting 16:59:48 I saw the page, seemed convoluted. next week I'm at openinfra, but for the week after that I'll try to create a spec. 16:59:50 jrosser_: i think the closest thing to a service user we have in openstack in an application credential 17:00:46 levy14: ok, then, we're done today 17:00:54 thanks folks 17:00:56 #endmeeting