Tuesday, 2015-06-02

*** petertr7_away is now known as petertr700:03
*** petertr7 is now known as petertr7_away00:13
*** sigmavirus24_awa is now known as sigmavirus2400:52
*** Qiming has joined #openstack-sdks00:57
*** Qiming_ has joined #openstack-sdks00:57
*** Qiming has quit IRC01:01
openstackgerritJamie Lennox proposed openstack/python-openstackclient: Add EC2 support for identity v3 API  https://review.openstack.org/18712701:19
Qiming_what's the command to run a sdk funtional test?01:32
Qiming_never mind, found it01:34
*** hitalia has quit IRC01:35
*** LinuxHorn has quit IRC01:35
*** boris-42 has quit IRC01:35
*** briancurtin has quit IRC01:36
*** Yanyanhu has joined #openstack-sdks01:38
*** LinuxHorn has joined #openstack-sdks01:39
*** briancurtin has joined #openstack-sdks01:43
*** shakamunyi_ has joined #openstack-sdks01:46
*** shakamunyi_ has quit IRC01:46
*** sigmavirus24 is now known as sigmavirus24_awa01:53
*** boris-42 has joined #openstack-sdks01:55
*** tobe has joined #openstack-sdks02:03
openstackgerritMerged openstack/python-openstackclient: Set tenant options on parsed namespace  https://review.openstack.org/18703302:15
openstackgerritYanyan Hu proposed stackforge/python-openstacksdk: Add network/v2 vpn service resource  https://review.openstack.org/18214102:26
*** shakamunyi has joined #openstack-sdks02:26
*** shakamunyi has quit IRC02:33
*** Qiming_ is now known as Qiming02:37
*** chlong has quit IRC02:39
openstackgerritQiming Teng proposed stackforge/python-openstacksdk: Add docstring to heat stack resource  https://review.openstack.org/18744003:10
openstackgerritQiming Teng proposed stackforge/python-openstacksdk: Add Heat resource support  https://review.openstack.org/18106303:10
*** chlong has joined #openstack-sdks03:22
*** hitalia has joined #openstack-sdks04:00
*** britthou_ has joined #openstack-sdks04:03
*** britthouser has quit IRC04:05
openstackgerritYanyan Hu proposed stackforge/python-openstacksdk: Complete property definition in some lb resources  https://review.openstack.org/18745204:24
*** david-lyle has quit IRC04:24
*** pm90_ has joined #openstack-sdks04:50
*** pm90_ has quit IRC04:57
*** pm90_ has joined #openstack-sdks04:58
*** tobe has quit IRC05:08
*** stevemar has quit IRC05:31
*** terrylhowe has quit IRC05:37
*** tobe has joined #openstack-sdks05:37
*** pm90_ has quit IRC05:49
openstackgerritOpenStack Proposal Bot proposed openstack/python-openstackclient: Imported Translations from Transifex  https://review.openstack.org/18627306:01
*** tobe has quit IRC06:13
*** tobe has joined #openstack-sdks06:38
*** aufi has joined #openstack-sdks06:43
openstackgerritAmey Bhide proposed openstack/python-openstackclient: WIP: Add volume v2 commands  https://review.openstack.org/18748006:54
*** dguerri`away is now known as dguerri07:48
*** chlong has quit IRC07:56
*** karimb has joined #openstack-sdks08:11
*** hitalia has quit IRC08:23
*** akrivoka has joined #openstack-sdks09:22
aufiHi, I have a question related to openstack image create command (v1). It behaves like create-or-update (if image with *name* specified for create already existed, it is updated). Actually it looks, that it is in collision with glance, which allows create multiple images with same names. Is the create-or-update approach still wanted?09:32
aufiRelated code: https://github.com/openstack/python-openstackclient/blob/master/openstackclient/image/v1/image.py#L247-L26909:34
*** Qiming_ has joined #openstack-sdks09:51
*** Qiming has quit IRC09:51
*** Yanyanhu has quit IRC10:00
*** Qiming_ has quit IRC10:04
*** dguerri is now known as dguerri`away10:37
*** terrylhowe has joined #openstack-sdks10:53
*** Qiming has joined #openstack-sdks11:14
openstackgerritTerry Howe proposed openstack/python-openstackclient: Add image functional tests  https://review.openstack.org/18731411:26
*** akrivoka has quit IRC12:04
*** tobe has quit IRC12:07
*** breton is now known as chaosgoblin``12:25
*** b3nt_pin is now known as beagles12:31
*** chaosgoblin`` is now known as breton12:39
*** petertr7_away is now known as petertr713:13
*** bknudson has joined #openstack-sdks13:20
openstackgerritDean Troyer proposed openstack/python-openstackclient: Rework shell tests  https://review.openstack.org/17893213:24
*** dguerri`away is now known as dguerri13:31
briancurtinterrylhowe: that example bp - yeah we definitely need more examples, and that's another thing on my todo list here shortly. im fine just marking it done and doing the other ones as they come up13:48
terrylhowecool, the other docs bps I marked done too briancurtin13:49
terrylhoweI wonder if we should use bps at all or just track everything with bugs13:50
briancurtinterrylhowe: im fine with just making better use of the bug tracker for right now. we basically didnt use BPs at all throughout that. i think jesse just told me to make some one day and i scribbled a bunch of crap down13:50
*** petertr7 is now known as petertr7_away14:08
*** petertr7_away is now known as petertr714:09
*** sigmavirus24_awa is now known as sigmavirus2414:10
*** boris-42 has quit IRC14:18
etoewsterrylhowe: can you please give this a look when you have a minute? https://review.openstack.org/#/c/187020/14:22
*** stevemar has joined #openstack-sdks14:23
*** frickler has joined #openstack-sdks14:27
stevemardtroyer, yay someone is working on volume v2 commands for osc14:29
fricklerdtroyer: thinking about https://review.openstack.org/186385 a bit more, SC filtering will not help in our case, as it depends on my current client location in the network on whether I can access the admin endpoint14:29
fricklerso keystone cannot know whether to filter or not14:29
dtroyerhmmm… yeah, I didn't consider that14:31
terrylhoweshould I just add https://github.com/openstack/python-keystoneclient/blob/master/keystoneclient/openstack/common/apiclient/exceptions.py#L75 to the list of exceptions frickler at least for now?14:31
openstackgerritMerged openstack/python-openstackclient: Ignore cover directory from git  https://review.openstack.org/18712814:32
fricklerterrylhowe: I just tried that, yes, it will help, although I still see the warning from keystoneclient.auth.identity.base then, but at least the command succeeds14:34
fricklerterrylhowe: so I think that would be o.k. as an initial solution14:35
openstackgerritTerry Howe proposed openstack/python-openstackclient: Add flavor functional test  https://review.openstack.org/18761614:42
fricklerbtw., would it make sense to add a reference about this channel to python-openstackclient/doc/source/index.rst ?14:44
fricklerI looked there first and then resorted to checking the gerritbot config14:44
openstackgerritDean Troyer proposed openstack/python-openstackclient: Rework shell tests  https://review.openstack.org/17893214:49
openstackgerritMerged openstack/python-openstackclient: Add image functional tests  https://review.openstack.org/18731414:49
openstackgerritTerry Howe proposed openstack/python-openstackclient: Fix security group list command  https://review.openstack.org/18638515:00
*** notmars has joined #openstack-sdks15:12
openstackgerritTerry Howe proposed openstack/python-openstackclient: Get rid of oslo_i18n deprecation notice  https://review.openstack.org/18763115:21
*** pm90_ has joined #openstack-sdks15:25
*** pm90_ has quit IRC15:29
*** petertr7 is now known as petertr7_away15:31
*** barra204 has joined #openstack-sdks15:35
*** shakamunyi has joined #openstack-sdks15:35
*** petertr7_away is now known as petertr715:36
*** boris-42 has joined #openstack-sdks15:37
*** beagles is now known as beagles_brb15:37
*** Qiming has quit IRC15:41
*** openstackgerrit has quit IRC15:42
*** openstackgerrit has joined #openstack-sdks15:43
*** petertr7 is now known as petertr7_away15:45
*** notmars has quit IRC16:02
*** david-lyle has joined #openstack-sdks16:04
*** mattfarina has joined #openstack-sdks16:22
dhellmannfrickler: that makes sense16:30
* dhellmann checks the wiki, too16:30
openstackgerritMerged openstack/python-openstackclient: Add volume functional tests  https://review.openstack.org/18730216:30
*** karimb has quit IRC16:36
*** beagles_brb is now known as beagles16:44
*** notmars has joined #openstack-sdks16:47
openstackgerritMerged openstack/python-openstackclient: Rework shell tests  https://review.openstack.org/17893216:55
*** trown is now known as trown|lunch17:01
*** notmars has quit IRC17:04
*** dguerri is now known as dguerri`away17:04
*** petertr7_away is now known as petertr717:21
*** aufi has quit IRC17:30
*** pm90_ has joined #openstack-sdks17:30
stevemarfrickler, by all means, add the irc info17:38
*** pm90_ has quit IRC17:55
*** pm90_ has joined #openstack-sdks17:55
etoewsterrylhowe: if you have a chance to look at https://review.openstack.org/#/c/187020/ before the meeting, that would be great. if not, we can look at it during the meeting.18:01
etoewsbtw, i'm going to be poking often on these reviews because i really want to use the sdk for a workshop i'm doing at qcon and i need certain calls in there. my deadline is june 5.18:02
*** openstackgerrit has quit IRC18:09
*** trown|lunch is now known as trown18:10
*** openstackgerrit has joined #openstack-sdks18:10
*** notmars has joined #openstack-sdks18:10
*** dguerri`away is now known as dguerri18:11
*** notmars has quit IRC18:17
*** hitalia has joined #openstack-sdks18:19
openstackgerritTerry Howe proposed stackforge/python-openstacksdk: Rename keystore key-manager  https://review.openstack.org/18771618:26
*** petertr7 is now known as petertr7_away18:33
*** notmars has joined #openstack-sdks18:35
*** petertr7_away is now known as petertr718:37
etoewsterrylhowe: thx for the comments. i replied. we can discuss more in the meeting too if you like.18:37
Caleb--when i list server details (using the /server/details REST API) i get a list of security groups for each server. does anyone know which veresion of openstack added support for this?18:46
Caleb--because looking at java SDKs such as jclouds and openstack4j -- none of them give an option to see the security groups of a server18:47
briancurtinfyi, SDK meeting in 13 min in #openstack-meeting-318:47
Caleb--(i tested the REST API on kilo)18:47
terrylhoweCaleb—: maybe jclouds isn’t using server-details get.  Maybe it is just doing a server get18:51
Caleb--terrylhowe, it is doing the server-details, it's just not exposing an API to get the security groups. it has a separate API to get security groups of a particular server though18:52
Caleb--could it be that openstack modifies (or adds?) fields to API responses without bumping the API version?18:53
Caleb--openstack project*18:53
Caleb--because that would seem rather unlikely :/18:53
Caleb--meh, it also appears that jclouds doesn't support token-based login yet18:54
terrylhowewell, what you get back could vary widely from one implementation to another based on what extensions are loaded18:55
terrylhoweand various configurations18:55
Caleb--i don't understand the concept of extensions... i see that security groups are called extensions18:55
Caleb--i simply used devstack to deploy a stack for development purposes18:56
*** openstackgerrit has quit IRC18:56
Caleb--are security groups something a user needs to install manually after setting up a nova service?18:56
Caleb--or at least configure18:56
*** openstackgerrit has joined #openstack-sdks18:56
stevelleCaleb--: yes, security groups are an important step18:57
stevellethat much I can answer :)18:57
briancurtini'll kick off the meeting in a minute, coming from an interview18:59
etoewsCaleb--: for jclouds you'd use the SecurityGroupApi in Nova19:01
etoewsSecurityGroupApi securityGroupApi = novaApi.getSecurityGroupApi(REGION).get();19:02
Caleb--etoews, that only lets me list the security groups. i need to create a map of security group -> IPs of member VMs19:02
etoewsare you using neutron?19:03
Caleb--the most efficient way would be to use that server-details call and build the map from that19:03
openstackgerritTerry Howe proposed stackforge/python-openstacksdk: Remove fingerprint as keypair name  https://review.openstack.org/18772819:03
Caleb--etoews, yeah, i could be19:03
*** notmars has quit IRC19:03
Caleb--etoews, i just don't see any helpful APIs for this in neutron19:04
etoewsya. the neutron stuff in jclouds is pretty new. lemme see if there's someone i can find to help.19:04
*** zacksh has joined #openstack-sdks19:07
etoewsCaleb--: zacksh might be able to help you.19:08
*** petertr7 is now known as petertr7_away19:10
*** petertr7_away is now known as petertr719:12
openstackgerritHardik Italia proposed stackforge/python-openstacksdk: Added functional tests for router  https://review.openstack.org/18773719:26
*** notmars has joined #openstack-sdks19:32
stevemardtroyer, ping19:35
dtroyerstevemar: you are yourself again!19:36
stevemardtroyer, sadly19:36
stevemardtroyer, http://www.mail-archive.com/openstack-dev@lists.openstack.org/msg54330.html19:37
stevemari'm tempted to say that glance is the odd man out in this case, and we should be consistent19:40
stevemari doubt other services are cool with allowing mulitple creates with the same name19:40
dtroyerYeah, I saw that…its partly due to the whole reservations thing which I basically copied from the glance cli.  Bad move in retrospect.19:54
dtroyeralthough I don't think it was intended to act as an 'update image'19:55
*** steveortiz has joined #openstack-sdks19:55
dtroyerjust 'here's an image for that reservation i had'19:55
steveortizhowdy! I'm trying to connect to my cloud account on Rackspace with the python-openstack module, but running into problems connecting. Any good getting started with Rackspace tips someone could offer would be most welcome.20:00
openstackgerritMerged stackforge/python-openstacksdk: Create messages on a queue  https://review.openstack.org/18702020:03
briancurtinsteveortiz: we don't really have vendor plugins 100% figured out, but https://pypi.python.org/pypi/rackspace-sdk-plugin works for most things20:06
stevemarbriancurtin, should steveortiz bother looking at o-c-c? the client config stuff mordred is working on?20:07
stevemarit has vendor specific bits20:07
*** nosleep77 has joined #openstack-sdks20:07
briancurtinor, go ahead, but i dont know what the tie would be20:07
briancurtinrackspace is going to have to offer a plugin to work with our own auth, and right now that package does it. it'll have to change slightly once we move to KSA20:08
briancurtinand then hopefully it just goes away when we actually run keystone20:09
briancurtinbut that package will also contain our vendor-specific bits (proprietary services, stuff like that)20:09
*** openstackgerrit has quit IRC20:10
*** openstackgerrit has joined #openstack-sdks20:10
steveortizbriancurtin: Yay! That did the trick for me. Thank you!20:11
stevemarbriancurtin, oh nice https://pypi.python.org/pypi/rackspace-sdk-plugin20:11
stevemari misread the question =\20:11
*** pm90_ has quit IRC20:21
openstackgerritTerry Howe proposed stackforge/python-openstacksdk: Fix proxy docs  https://review.openstack.org/18775720:25
*** internet has joined #openstack-sdks20:27
*** internet has quit IRC20:27
*** jose4183 has joined #openstack-sdks20:28
openstackgerritTerry Howe proposed stackforge/python-openstacksdk: Fix key-manager proxy docs  https://review.openstack.org/18776320:32
*** notmars has quit IRC20:50
openstackgerritMonty Taylor proposed openstack/os-client-config: Add more defaults to our defaults file  https://review.openstack.org/18777121:01
openstackgerritMonty Taylor proposed openstack/os-client-config: Provide a helper method to get requests ssl values  https://review.openstack.org/18777221:01
*** petertr7 is now known as petertr7_away21:02
*** shakamunyi_ has joined #openstack-sdks21:03
mordredbriancurtin, steveortiz: btw - it is not required to use any rackspace auth to talk to rackspace21:03
mordredall of the docs that say it's required are completely inaccurate21:03
*** trown is now known as trown|outttypeww21:03
*** jose4183 has quit IRC21:03
mordredI mean, you can use the api-key thing - and to do that you need the rackspace auth plugin - but it's totally not actually needed21:03
*** jose4183 has joined #openstack-sdks21:04
briancurtini would never tell anyone to use password auth21:04
briancurtinso our users will need it21:04
*** shakamunyi__ has joined #openstack-sdks21:04
*** shakamunyi__ is now known as tylerdurden21:05
dtroyerstevemar: refresh me on which review jamielennox wanted for the 1.3.1 release?21:07
mordredbriancurtin: literally every other openstack public cloud in the world uses password auth you know21:07
stevemardtroyer, umm21:07
*** tylerdurden has quit IRC21:08
*** shakamunyi_ has quit IRC21:08
mordredrax is the only openstack cloud that does not advertise it - and it's one of the only things that actually consistently works the same on every openstack dcloud21:08
dtroyerstevemar: was it https://review.openstack.org/187033?21:08
stevemardtroyer, yes, i merged it21:09
stevemardtroyer, he also needs https://review.openstack.org/#/c/187127/ and https://review.openstack.org/#/c/187103/21:09
stevemari'll fix 18710321:09
dtroyerI'm not sure what to do with 18712721:10
openstackgerritSteve Martinelli proposed openstack/python-openstackclient: Change Credentials header to Blob from data  https://review.openstack.org/18710321:10
mordredstevemar: looking through the openstacksdk docs/getting started - it seems liek there may be some overlap between sdk profiles and occ ... worth sorting out a story there?21:13
mordredstevemar: like, I'd love a simple way to create an SDK Connection object from an OpenStackConfig object if I had one - but right now it looks like I'd need a helper mapping object or something ...21:14
*** notmars has joined #openstack-sdks21:15
stevemarmordred, well i just found out there is a rax specific plugin https://pypi.python.org/pypi/rackspace-sdk-plugin for the sdk21:16
stevemari wonder if there are others...21:16
stevemarit seems like this is early enough that we can force using OCC instead of vendor specific bits21:17
stevemarbut like you said, you'd need some sort of translator/mapping piece21:17
mordredat least for profile things ... I mean, we already ahve those vendor info covered in occ21:17
mordredyah. I'm going to try to hack up a rudimentary one as a POC21:18
stevemardtroyer, 187127 should be the last piece of the puzzle to make devstack fully v3 realized21:18
mordredmight make it easier to talk about if/when/how the things shoudl work together21:18
stevemardtroyer, according to jamielennox who got it working last night :)21:19
dtroyerstevemar: ok, good.  do the domain options you mentioned need to be there now or added later?21:21
stevemardtroyer, they can be added later, realistically21:22
stevemari will write it down and add it very soon after (if you're thinking about merging)21:22
dtroyerbasically that's is, should I wait?21:23
openstackgerritMonty Taylor proposed openstack/os-client-config: Provide a helper method to get requests ssl values  https://review.openstack.org/18777221:24
jamielennoxstevemar, dtroyer: so with those patches i got v3 only devstack to at least complete21:26
jamielennoxi haven't done a tempest run or anything like that21:26
jamielennoxactually with the caveat you need to make glance work with the user tenant mode with swift (rather than store images in the glance project) - because that's going to be a big effort over there21:26
steveortizmordred: Thanks! I was pretty used to using my API key to do auth, so that's what I was looking for... briancurtin must have read my mind. :)21:27
steveortizI will check out the username / password method too, for comparison.21:27
jamielennoxthe ksc ec2 patch is gating now, i want to get morganfainberg to do a release with that soon so i can bump g-r and get the OSC fix in21:27
*** mattfarina has quit IRC21:28
stevemarjamielennox, dtroyer, right, it also depends on a g-r bump21:28
mordredsteveortiz: cool - I mean - one of the nice things about the auth plugin system is that if you prefer the api key thing, you can TOTALLY use it, which is great21:28
morganfainbergjamielennox: let's check w/ dhellmann and do that this week (if there are no issues)21:29
morganfainbergjamielennox: I'm at a conference ATM. So I'll check post x-project meeting and see where we stand.21:29
jamielennoxmorganfainberg: what are we checking with dhellmann?21:29
morganfainbergjamielennox: just make sure we don't have a reason to hold off. Keeping relmanagment in the loop.21:31
jamielennoxmorganfainberg: this would only be a ksc 1.6 with no compat issues - do they care about that now?21:32
morganfainbergjamielennox: I'm juggling 5 convos on IRC. Can we discuss this in a few minutes?21:34
jamielennoxmorganfainberg: yep21:34
*** dtroyer has quit IRC21:44
*** pm90_ has joined #openstack-sdks21:50
*** pm90_ has quit IRC21:50
*** pm90_ has joined #openstack-sdks21:51
*** dguerri is now known as dguerri`away21:51
*** bknudson has quit IRC21:56
*** notmars has quit IRC21:57
openstackgerritMerged stackforge/python-openstacksdk: Added functional tests for router  https://review.openstack.org/18773722:01
openstackgerritMerged stackforge/python-openstacksdk: Move compute limits to new _get API  https://review.openstack.org/18332222:01
openstackgerritMerged stackforge/python-openstacksdk: Add docstring to heat stack resource  https://review.openstack.org/18744022:02
*** LinuxHorn has quit IRC22:07
*** sigmavirus24 is now known as sigmavirus24_awa22:09
*** dtroyer has joined #openstack-sdks22:19
*** steveortiz is now known as zz_steveortiz22:38
*** LinuxHorn has joined #openstack-sdks22:43
openstackgerritMerged openstack/python-openstackclient: Change Credentials header to Blob from data  https://review.openstack.org/18710322:51
*** stevemar has quit IRC23:12
*** stevemar has joined #openstack-sdks23:12
etoewsbriancurtin: terrylhowe: what does it mean for a field on an resource in the sdk to *not* be a resource.prop?23:19
etoewse.g. normally you have23:19
etoewsttl = resource.prop("ttl")23:19
etoewsbut what if it's just23:19
etoewsfoobar = None23:19
*** chlong has joined #openstack-sdks23:22
*** barra204 has quit IRC23:57
*** shakamunyi has quit IRC23:57

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!