21:00:37 #startmeeting swift 21:00:38 Meeting started Wed Sep 26 21:00:37 2018 UTC and is due to finish in 60 minutes. The chair is notmyname. Information about MeetBot at http://wiki.debian.org/MeetBot. 21:00:39 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 21:00:41 The meeting name has been set to 'swift' 21:00:57 who's here for the swift team meeting? 21:01:01 o/ 21:01:12 hello 21:01:23 o/ 21:01:29 hi 21:01:33 hi o/ 21:01:42 o/ 21:01:58 welcome 21:02:08 tdasilva: thanks for running last week's meeting 21:02:35 yw 21:02:43 and it seems I never updated the agenda for this week's meeting, so we'll have to be spontaneous this week :-) 21:04:10 * notmyname feels like there was something to say, but then the train of thought got derailed 21:04:26 what do we need to bring up this week? 21:04:37 I've seen timburke and zaitcev working on py3 fixes 21:05:12 nice 21:05:12 one left over action item from last week was : https://review.openstack.org/#/c/447129/ 21:05:13 patch 447129 - swift - Configure diskfile per storage policy - 20 patch sets 21:05:34 tdasilva: IIRC we're waiting to hear from gluster people on that 21:05:41 Did the gluster people get back to us? 21:05:49 is that still the case? we've got 3 +2s on it. when do we just land it? :-) 21:05:58 yeah, we should be able to go ahead 21:06:04 and land it 21:06:23 :) 21:06:28 Quick someone hit the +A now :) 21:06:29 done! 21:06:36 \o/ 21:06:46 ¥o/ 21:06:55 kota_: money arms :-) 21:06:57 \o/ 21:07:13 i didn't had a chance to mention that: 21:07:13 one point about p 447129 is the naming. some people think that (replication|erasure_coding).fs is not a good naming for the default module. but maybe .xfs 21:07:14 https://review.openstack.org/#/c/447129/ - swift - Configure diskfile per storage policy - 20 patch sets 21:07:20 i guess now .fs is the good one ;) 21:07:48 oh, it was not changed as back slash... 21:07:57 well, as long as we change it before we tag a release, we can still rename it 21:08:00 Lol, I was more like .df but it's fs now :p 21:08:00 rledisez: ^ 21:08:02 if we want 21:08:12 rledisez: was i right about the losf variants planning on ending with .losf? 21:08:19 ok, so, let's vote ? .fs / .xfs / .df / other idea? 21:08:36 timburke: yes, it will probably be .losf (right now we use .kv in our deployement, but it's a bad naming) 21:09:01 notmyname: we could also rename it later anyway, and just keep the two entrypoints around pointing to the same thing 21:09:08 except if you find a cool name for losf :) 21:09:27 i think .fs is fine 21:09:28 mmm. yeha, i kinda understand .kv, too 21:10:09 #startvote should we keep .fs or change it? .fs .xfs .df other 21:10:09 naming things is hard :-( 21:10:10 Begin voting on: should we keep .fs or change it? Valid vote options are , fs, xfs, df, other. 21:10:11 Vote using '#vote OPTION'. Only your last vote counts. 21:10:13 Well df was for diskfile, they could be used on none xfs (in theory). 21:10:15 it worked! 21:10:25 yeah, I don't like .df for the reasons mentioned 21:10:27 +1 for .fs. even we assume users use xfs but it's a general purpose file system impl IIRC. 21:10:36 #vote fs 21:10:37 it's an abstraction, not the implementation 21:10:41 #vote fs 21:10:45 i.e. we could use .fs with ext4 21:10:51 $vote fs 21:10:54 #vote fs or xfs 21:10:54 timburke: fs or xfs is not a valid option. Valid options are , fs, xfs, df, other. 21:10:56 no 21:11:01 #vote fs 21:11:01 #vote fs 21:11:14 kota_: exactly, that was the purpose of .fs, to be generic enought on a POSIX filesystem. it should work *theoricaly* 21:11:18 #vote fs 21:11:23 i hit a lot of money today :/ 21:11:24 Good points, so fs meaning it's using a fs 21:11:48 #vote fs 21:11:48 I'm seeing a consensus here :-) 21:11:50 K, sold 21:12:06 #vote fs 21:12:07 #endvote 21:12:08 Voted on "should we keep .fs or change it?" Results are 21:12:09 fs (7): rledisez, tdasilva, kota_, mattoliverau, m_kazuhiro, clayg, timburke 21:12:23 good news! the current +A can stay :-) 21:12:29 (now for just a few dozen hours in the gate) 21:12:38 Lol 21:12:53 thx all for the great reviews on that patch, i'm glad it's landed, next step is (maybe) LOSF itself ;) 21:12:59 rledisez: nice! 21:13:05 tdasilva: were there any other follow-ups from last week? 21:13:28 idk that it should work on any POSIX filesystem -- do they necessarily support xattrs? what size? 21:13:49 tdasilva: "any filesystem you want, as long as it's xfs" 21:13:53 (neither here nor there, i suppose) 21:14:15 looking at logs 21:14:20 shhhh :P 21:14:37 timburke: it's theoritical. but with the requirement on unlimited xattr, i think only XFS, JFS and ZFS are candidate (and I can't recommend JFS…) 21:15:01 oh, and reiserfs also 21:15:46 rledisez: yeah, we've got the code paths to support .meta files. it would be interesting, perhaps, to use that if we can't use xattrs in the normal write path. would have some downsides, though (eg more inodes) 21:16:25 rledisez loves to hear 'more inodes' :P 21:17:03 tdasilva: did you find anything else? 21:17:29 nope, we had a long talk on PUT+POST, but don't think there's anything new to discuss there yet 21:17:57 cool 21:18:04 😒 21:18:22 today I was looking at all the patches that have landed in order to see if we should to at least a minor version release 21:18:36 new swifts are the best swifts 21:18:45 speaking of, i'd like to thank clayg and mattoliverau for landing https://review.openstack.org/#/c/604937/ 21:18:46 patch 604937 - swift - Allow kmip_keymaster to be configured in proxy-ser... (MERGED) - 1 patch set 21:18:58 there's been a lot of patches that have landed (git shortlog -ne 2.19.0.. | wc -l -> 116), but I don't think there's anything *critical* 21:19:35 the one timburke just mentioned is good, as is the KEEPIDLE patch. and maybe the '-' in etags one. but those are the only 3 that would make any material difference to users 21:19:49 all the others were py3 and tests and some other misc cleanups 21:20:18 so I do not think we should tag a release upstream right now. 21:21:07 #topic open discussion 21:21:17 anything else to bring up or questions to ask? 21:21:45 just one question about encryption 21:21:47 notmyname: would it make sense to create a list of patches we would like to see in the next release? 21:22:05 tdasilva: yeah, that's normally what we do on the priority reviews page. 21:22:09 #link https://wiki.openstack.org/wiki/Swift/PriorityReviews 21:22:22 is there anything in roadmap about getting the encryption key from the user (eg: in a header during the request). then forget about the key 21:22:28 I need to clean that up. there are a few that have landed and a few (like PUT+POST) that have changed 21:23:00 rledisez: no, not from the swiftstack side of things. do you have a requirement from users on that? 21:23:43 I like that notmyname he's a straight shooter 21:24:06 notmyname: no strong requests, i was just discussing about encryption with an internal user this afternoon 21:24:12 i always find that weird -- why trust the server with your key? encrypt/decrypt client-side 21:24:24 rledisez: cool. let us know if it's something that we need to think about usptream 21:24:29 tdasilva: I know, right?! 21:24:30 I had to explain than a security issue in swift/keystone middleware might expose the data, even if they are encrypted 21:24:38 like, i get that AWS lets you do it, but that doesn't seem ipso facto a good thing 21:24:53 rledisez: I remember it coming up, but in that case things like container sync would have trouble, so kept it out of scope. Unless we have a real need 21:25:40 mattoliverau: i think what would have to happen is that you'd sync the encrypted data 21:26:08 mattoliverau: it depends, if the data can be transferred encrypted (eg: if it only depends on the user key, not the object name &co), it could be doable 21:26:57 Yeah, but as a put? Yeah, it would mean a change to how container sync works. So out off until or if we ever need it 21:27:49 Having the key was easier ;) 21:28:08 *maybe* this becomes interesting if the client doesn't actually know the key? if the client provides a barbican or kmip key identifier instead, and the proxy needs to go retrieve the real key? 21:28:15 or change the put path to say "treat it like encrypted, but we're not giving you the key this time". IDK. lots to think about if we need to implement it 21:29:02 anyway, I'm going to specifically not think about it any more until rledisez tells me it's a critical user problem :-) 21:29:35 Lol 21:29:51 notmyname: you won't be disturbed by me in the next few month about that ;) 21:29:59 wonderful! 21:30:06 rledisez: do you have any other prereq patches for LOSF? all the ones I knew about have been merged (or marked as merged) 21:31:11 notmyname: there is still one, but it's a WIP: https://review.openstack.org/#/c/561631/ 21:31:12 patch 561631 - swift - WIP - abstract FS operations in replicator/reconst... - 2 patch sets 21:31:18 so, for now everything is merged 21:31:34 cool 21:31:43 anything else from anyone? kota_ m_kazuhiro are you good? 21:32:15 oh yeah... what do people think about the approach in https://review.openstack.org/#/c/603209/ ? should i clean it up enough that tests are actually passing? or should we leave things as they are? 21:32:16 patch 603209 - swift - WIP: Refactor load_libc_function and _LibcWrapper - 1 patch set 21:32:17 it's ok to me. no items to bring today from me. 21:32:41 I have one small patch for general task queue. And it is ready for review. 21:32:58 timburke: oh nice. I'm interested in that one. 21:33:26 m_kazuhiro: can you please link it? 21:33:46 It is patch 601950 . 21:33:46 https://review.openstack.org/#/c/601950/ - swift - Enable to configure object-expirer in object-serve... - 4 patch sets 21:35:02 m_kazuhiro: thank you. I will add it to the priority reviews page when I clean it up today 21:35:08 This patch contains upgrade impact of object expirer. 21:35:13 notmyname: thank you! 21:35:56 anything else from anyone? or shall we close the meeting? 21:36:56 I'll take silence as a vote to end the meeting :-) 21:37:04 thanks for coming today, and thank you for your work on swift 21:37:07 #endmeeting