Tuesday, 2023-04-25

opendevreviewYian Zong proposed openstack/manila master: Adds a new Manila driver for Dell PowerFlex storage backend  https://review.opendev.org/c/openstack/manila/+/88052705:00
opendevreviewDan Smith proposed openstack/devstack-plugin-ceph master: Add qemu-block-extra  https://review.opendev.org/c/openstack/devstack-plugin-ceph/+/88147914:05
opendevreviewDan Smith proposed openstack/devstack-plugin-ceph master: Revert "Temporary pin the ceph jobs nodeset to Focal"  https://review.opendev.org/c/openstack/devstack-plugin-ceph/+/86531514:07
*** toabctl_ is now known as toabctl14:46
*** iurygregory_ is now known as iurygregory15:00
UgglaHello gouthamr, can we discuss about the manila api "lock" for nova ? It appears we have another need that was not seen during PTG.16:16
opendevreviewDan Smith proposed openstack/devstack-plugin-ceph master: Revert "Temporary pin the ceph jobs nodeset to Focal"  https://review.opendev.org/c/openstack/devstack-plugin-ceph/+/86531516:43
gouthamrhi Uggla 17:13
gouthamrsure we can17:13
Ugglagouthamr, do you want me to explain the new findings we have ?17:14
gouthamrUggla: i don't have the spec ready yet; but i think i caught some of the discussion on the nova channel last week; was this about the ability for all users in the project to view the ACLs?17:15
Ugglagouthamr, oh yes. We need to "mask" the IP of the compute that we will have in export_location as an example.17:16
Ugglathe idea is to not leak any internal ip to "regular" user.17:17
gouthamrack; im thinking of a way to do this17:20
Ugglathen is especially true for access-list 17:20
gouthamrnova, i presume would be using a service token to create the access-rule and list access? 17:21
Ugglahum today I'm using a regular user. But yes I think we could use a service token.17:22
gouthamrit'd be a suggestion for us to implement something where we could identify the user17:23
Ugglato be honest I'm unsure what is a service token.17:24
opendevreviewkiran pawar proposed openstack/manila master: [NetApp] Recreate security cert during vserver create.  https://review.opendev.org/c/openstack/manila/+/87761517:26
Ugglagouthamr, Can I help somewhere to speed up this ?17:27
gouthamrUggla: service token is my parlance for a token representing an internal openstack "service" user account.. the service user account for nova is called "nova" on devstack.... 17:27
gouthamrtoday this user has an "admin" role assigned17:27
gouthamrbut, the goal is to use a new "service" role by default17:28
gouthamrhttps://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#isolate-service-to-service-apis-to-the-service-role17:29
Ugglaok17:32
gouthamri don't think the role matters currently though 17:33
gouthamras long as the user you use is privileged in some way - i.e., either has "admin" or "service", we can make this work17:33
Ugglaok17:34
gouthamri can spec this up on the manila side and i am hoping it'll be transparent to nova17:34
gouthamri.e., no API request schema change to create, list, delete access rules... 17:35
Ugglagouthamr, also just to be sure the lock mecanism should prevent user to delete the share and the access-list associated.17:35
gouthamrack Uggla 17:37
Ugglagouthamr, also regarding the API, I think I will be able to adapt.17:37
Ugglagouthamr, may I help you in writting the spec or something else ?17:37
gouthamrUggla: yes; i could use the help in review and refining :) 17:38
Ugglagouthamr, sorry to push a little on that, but the fact that user can see internal stuff is a blocker for us. :( And I really would like to merge all that stuff in this cycle.17:40
gouthamrUggla++ agreed; this is a security concern - although i would hope that these IPs aren't reachable by design - it's best to keep them hidden 17:41
Ugglagouthamr, of course these IPs are restricted but nova cores really try to not leak information. I could not negociate on that point. :)17:45
gouthamrack Uggla 17:46
gouthamri think johnthetubaguy had once complained about cephx keys in the same way -- we expected a "permissive" project structure where everyone under a project was trusted17:47
gouthamrbut, if you as a user looks at the access list for a CEPHFS share today, you'd see the access keys of all other users that had access to the share17:48
Ugglagouthamr, oh yes sounds like a similar pb.17:48
Ugglaeven worse I guess.17:49
gouthamryes17:50
UgglaI also know that I need to check with CEPHFS, I will implement that right after the client part.17:50
gouthamrUggla++17:52
Ugglasomething great is that we have a user who wants to use all that stuff to provide public cloud services. He already did some tests.17:52
gouthamrUggla: oh that's awesome!! 17:55
Ugglagouthamr, yep that's cool. But he needs our feature and also some improvements on qemu/libvirt that should come at the end of the year.17:57
gouthamrUggla: i see; is the qemu/libvirt timeline for a specific distro? or upstream package changes as well?17:58
Ugglagouthamr, the improvements are for upstream, currently when a share is "mapped" to a vm using vitiofs, it prevents to do several features (live migration as an example).18:00
gouthamrnice; i think i'm subscribed to a downstream tracker for that Uggla 18:01
Ugglagouthamr, fyi here is the BZ I opened on that topic: https://bugzilla.redhat.com/show_bug.cgi?id=218503118:02
opendevreviewDan Smith proposed openstack/devstack-plugin-ceph master: Revert "Temporary pin the ceph jobs nodeset to Focal"  https://review.opendev.org/c/openstack/devstack-plugin-ceph/+/86531520:59
opendevreviewGoutham Pacha Ravi proposed openstack/devstack-plugin-ceph master: [WIP] Test the Native CephFS job with Ubuntu Jammy  https://review.opendev.org/c/openstack/devstack-plugin-ceph/+/88151921:44
opendevreviewDan Smith proposed openstack/devstack-plugin-ceph master: Revert "Temporary pin the ceph jobs nodeset to Focal"  https://review.opendev.org/c/openstack/devstack-plugin-ceph/+/86531523:07
opendevreviewGoutham Pacha Ravi proposed openstack/devstack-plugin-ceph master: [WIP] Test the Native CephFS job with Ubuntu Jammy  https://review.opendev.org/c/openstack/devstack-plugin-ceph/+/88151923:51

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!