19:03:04 #startmeeting openstackclient 19:03:05 Meeting started Thu Jan 21 19:03:04 2016 UTC and is due to finish in 60 minutes. The chair is dtroyer. Information about MeetBot at http://wiki.debian.org/MeetBot. 19:03:06 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 19:03:08 The meeting name has been set to 'openstackclient' 19:03:10 hehe 19:04:22 dtroyer: i am swamped with keystoney mitaka-2 stuff 19:04:28 courtesy ping: dhellmann, terrylhowe, lhcheng, dstanek, MeganR 19:04:34 dtroyer: you reviewed a whole bunch of stuff last week 19:04:45 stevemar: sure. I really don't have much new anyway 19:04:47 * dhellmann sits in the back of the room to listen 19:05:48 I think getting to the next release point WRT network commands is still the priority 19:06:24 is terry out this week? I haven't seen him in IRC for a while 19:07:23 dtroyer: probably, haven't seen much of him either 19:07:37 this may be quick… I'll wait a few more minutes then call it if no one else shows 19:09:13 dtroyer: terry *just* reviewed a patch 19:09:28 :) 19:09:40 o/ 19:09:44 sorry, I'm late 19:09:46 o/ 19:10:01 welcome welcome 19:10:06 ooooh, youse guys were close… I almost called it a day ;) 19:10:07 sit in the front row 19:11:21 ok, well we've got a few here, this still may be short 19:11:34 * dstanek is lurking 19:11:59 aha! another keystone dev ;) this is good as the one thing I wanted to ask about is connected to KSC 19:12:20 #topic bugs 19:12:38 going through some older bugs i came across https://bugs.launchpad.net/python-openstackclient/+bug/1391116 19:12:40 Launchpad bug 1391116 in python-openstackclient "password prompts should check for empty string" [Medium,Confirmed] - Assigned to Tang Chen (tangchen) 19:12:43 dtroyer: we're everywhere 19:13:03 dtroyer: i asked tangchen to open that bug 19:13:23 I'm curious why thedata validation shouldn;t be in the KSC python lib rather than in OSC 19:13:30 the issue is worse when shown in OSC 19:13:57 so in OSC and KSC, on a user create and update call, you can set the password to be "" 19:14:10 right. is that valid? 19:14:29 dtroyer: we have no requirements about passwords 19:14:36 ok, so it is valid 19:14:42 but apparently it is unusable? 19:14:49 the issue crops up on authentication 19:14:59 right. should it work with an empty password? 19:15:18 fwiw, we made password mandatory field in horizon, it can't be empty. 19:15:30 good to know 19:15:31 so i *think* this works if you do a straight REST call to keystone and authenticate 19:15:42 and i think it works with KSC using auth plugins 19:15:57 but if you set OS_PASSWORD="" for OSC, it fails 19:16:06 is that the real bug then? 19:16:07 i might be mis-remembering ... 19:16:28 i'm not sure, i asked him to log the bug so we could chat about it here 19:16:30 I think I have always assumed that empty password was not valid 19:16:55 so whats the harm in preventing an empty password for create and update? 19:17:10 I don't know there is any other than really bad practice 19:17:26 or we could take the Horizon position and decide it is not allowd 19:17:52 could 19:17:53 it sounds as if KSC has stated it will not prevent empty passwords 19:18:02 is stating 19:19:08 ok, so I think I understand now 19:19:30 Horizon has decided to not accept empty passwords 19:19:47 Keystone and KSC allow them and are not going to prevent them 19:19:57 that sums it up 19:20:18 so it is up to OSC to decide what to do: fix OS_PASSWORD="" or disallow empty passwords 19:20:42 opinions anyone? 19:20:51 I can argue both sides 19:21:03 one of OSC's goal is to improve usability, sounds like making password required achieve that goal? 19:21:23 allowing empty password would just cause headache for users. 19:21:39 seems like that should be decided by the api 19:21:41 is there a use case for allowing empty paswords? 19:21:41 the danger there is say another app sets an empty password, we could be getting in the way of that being usable 19:21:47 if empty passwords are a problem fix it in the api 19:21:58 clarkb: that's my thinking 19:22:07 dtroyer: good point 19:23:08 so it sounds like we should fix OSC to accept empty passwords for auth? 19:23:27 cause right now, i can do `os user create bob` and it works for v3 https://github.com/openstack/python-openstackclient/blob/master/openstackclient/identity/v3/user.py 19:24:02 but bob will never be able to authenticate now :( 19:25:05 right. ok, I'll clarify the bug so I don't forget this conversation… 19:25:27 a use case I could think of where empty password would happen is during a enterprise user account creation workflow, the account could be created by an admin with empty password. then on user logging on first time (passing a nonce), they are prompted for the password. 19:25:44 even though this is different than Horizon, it is more permissive 19:25:52 lhcheng_: good example 19:26:10 but that's too custom of a use case.. something we did for the public cloud. 19:26:37 @lhcheng: thank you 19:27:53 bug updated 19:28:04 any other bugs anyone wants to talk about? 19:28:41 dtroyer: there was one about trusts... 19:29:09 dtroyer: i filed it last week: https://bugs.launchpad.net/python-openstackclient/+bug/1535190 19:29:10 Launchpad bug 1535190 in python-openstackclient "cannot use trust based authentication with osc" [Undecided,New] 19:29:22 yes 19:29:31 i think it's partly related to https://bugs.launchpad.net/python-openstackclient/+bug/1533369 19:29:32 Launchpad bug 1533369 in python-openstackclient "moving authentication from keystoneclient to keystoneauth" [High,Confirmed] - Assigned to Navid Pustchi (npustchi) 19:29:32 do you have an idea of what needs to be done there? 19:30:00 dtroyer: i think it comes down to untangling the osc-ksa-occ mess 19:30:29 I'm regretting occ now, fwiw 19:31:24 dtroyer: there is at least one little bit we can fix, that's to allow TRUST_ID as a scope, in addition to PROJECT and DOMAIN 19:31:54 after that, i'm not sure whats going on, it seems like the scope isn't being set, so i get an empty catalog 19:32:53 does that come from the env/CLI/clouds.yaml? 19:33:07 dtroyer: the trust id? 19:33:10 yes 19:33:21 dtroyer: think of it as an alternate to project_id 19:33:25 so it'll come from CLI/env 19:33:52 ok 19:35:26 dtroyer: just wanted to bring it to the groups attention, i don't know when i can work on it 19:36:05 np, it helps me understand how we handle trusts 19:36:12 any other bugs? 19:37:13 #topic reviews 19:37:17 how about reviews? 19:37:41 i've been neglecting reviews 19:37:45 did the logging one land? 19:38:12 I think I said something and Akihiro abandoned them 19:38:42 Akihiro have a new patch up, I haven't got the chance to browse through it 19:38:47 well, the three bulk update ones 19:39:40 abandoned? 19:39:42 hmm 19:39:51 https://review.openstack.org/#/c/269613/ this is the new one 19:40:06 yeah, I haven't looked at it yet either 19:41:02 I may jump on https://review.openstack.org/84782 to get it in 19:41:33 wow thats an early number 19:41:53 I think it was from is original set of commands 19:42:07 dtroyer: do it up 19:43:25 it looks like https://review.openstack.org/258519 got stuck last week, although I'm not sure we need to hold up the release for it fi it isn't ready 19:44:14 yeah, that is behind https://review.openstack.org/#/c/257543/ 19:44:39 ah, ok 19:44:40 for the refactor of existing network commands over to neutron 19:45:21 * dtroyer re-reads the last comment in 257543 19:46:07 FWIW we have historically erred on the side of simplicity and duplicated code 19:46:46 thanks, good to know 19:47:05 I'd like to do a release next week if possible, do we need to wait for this? 19:47:33 I don't think we do 19:47:42 ok 19:48:17 any other reviews? 19:50:13 I have a couple on moving availability zones to common: https://review.openstack.org/#/c/267598/ and https://review.openstack.org/#/c/267061/ 19:50:50 one more: https://review.openstack.org/#/c/259595/ stevemar, you had previously +2 it but a couple of changes were made that I don't want to just push it in... 19:52:00 hmm? 19:52:15 oh, i wanted to test it out 19:52:16 rtheis: right. I'll give them a look this afternoon, I don't see anything worrisome at a quick glance 19:52:23 one reviewer had a good point 19:52:33 dtroyer: thank you 19:52:35 dtroyer: you fix that thing gongysh mentioned? 19:52:45 where he got the error even after using --project 19:53:18 yes, I believe I did 19:53:31 awesome 19:53:33 i see it now 19:53:58 I duplicated it and fixed it for me, but my setup isn't the most representative 19:54:25 dtroyer: too late now, i +W'ed! 19:54:38 :) 19:54:56 any others? 19:56:00 #topic open discussion 19:56:10 5 minutes, what is on your mind? 19:57:04 we got a new customer, searchlight is developing an osc plugin 19:57:58 cool 19:57:59 dtroyer: do we have a doc/ guideline for resource namespacing? 19:58:20 I recall writing a bit on that, I think it's in the docs 19:58:51 they had dash on their resource name, I asked them to fix that. I can't find a reference where we don't recommend that. 19:59:48 now I am curious where I put that stuff 19:59:55 I don't see it in the repo docs 20:00:15 dtroyer: in the ether 20:00:31 dtroyer: -> #endmeeting 20:00:39 #endmeeting