Monday, 2017-07-10

*** mat128 has joined #openstack-swift00:37
*** mat128 has quit IRC00:45
*** tovin07_ has joined #openstack-swift00:52
*** cshastri has joined #openstack-swift01:26
kota_good morning02:03
*** two_tired has quit IRC02:20
kota_hmm... it looks like my exhausive test script went into bad loops??? the script for isa_l_cauchy, has been running  since the last Friday didn't finish yet???02:52
*** lan has joined #openstack-swift03:06
lanHi , is there a simple way to count all objects in swift ?03:08
notmynamelan: all objects across the entire cluster? the object counts are in each container, so you'd need to query all the accounts and sum their respective object counts03:09
lannotmyname,  this is the only way right?03:10
lannotmyname,  and how can I query all the accounts in swift way ?03:11
notmynamecorrect it's the only way03:11
notmynamethere are two ways to query all the accounts03:11
notmyname...depending on how much access you have to the cluster and what your needs are03:11
mahatic_good morning03:12
notmynamethe first way is to know what all the accounts are (ie possibly from your auth system) and then HEAD each as a reseller_admin and get the object counts03:12
notmynamethis way is simple, but it (1) requires knowledge of the accounts to be stored somewhere else and (2) does a bunch of client requests to the cluster03:12
notmynamethe second way is to walk the drives that have the account dbs on them, query the DBs as you find them, store that info, and aggregate it03:13
notmynamethis second way is more complex and requires more access to the cluster, but you'll find "dark data" that's not referenced in an external system and it works regardless of which or how many auth systems you have03:14
notmynamebut no there is no single api command like GET cluster/object_totals or anything like that03:14
lannotmyname,  hmm , yes I liked the first way but also be afraid of the performance.03:15
lannotmyname,  thanks for your detail reply : )03:16
notmynamelan: what's your situation? why are you needing this info, and what auth system are you using?03:16
lannotmyname,  we used keystone and we think admin may need to know some statistics like total object counts, total used size ....03:19
notmynamecool, yeah that can be really helpful info03:19
lannotmyname, yes  thanks!03:19
notmynameFWIW, if you want to do something like the second way I described, you could use slogging https://github.com/notmyname/slogging03:20
notmynamebut know that I don't really maintain slogging. (eg last commit was in 2015)03:20
notmynameit should probably still work03:20
lannotmyname, ok I will take a  look.03:20
notmynameand I know it's been used in some very large swift clusters before (and still, IIRC)03:20
notmynamefor the first way, ceilometer can do the individual account querying based on what's in keystone03:21
lanseems  cool !03:21
notmynameI think ceilometer is what people still use? I don't know03:21
notmynamebut there's also gnocchi and monasca that are related (but I don't know how, exactly)03:22
notmynamethe good news is that you aren't the first to ask, so there's some solutions out there03:22
notmynamethe bad news is that you'll still have to do some work03:22
lanYes, but sadly we didn't use ceilometer in our project yet.03:23
notmynameno need to be sad about that. if you don't have a need for it, then runnign other stuff will just bring complexity and problems03:25
lannotmyname, you are right,  I will learn slogging firstly and then choose which way I should use.  Hava a good day !03:28
notmynamegood luck03:28
notmynameplease feel free to ask questions in here, any time03:28
lannotmyname, ok will do  thanks!03:29
*** lan has quit IRC03:46
*** Dinesh_Bhor has joined #openstack-swift03:52
*** psachin has joined #openstack-swift03:56
*** sanchitmalhotra has joined #openstack-swift04:12
*** sanchitmalhotra has quit IRC04:13
*** sanchitmalhotra has joined #openstack-swift04:13
*** chsc has joined #openstack-swift04:45
*** chsc has quit IRC05:51
*** Venkata has joined #openstack-swift05:59
VenkataHello timburke, I am Venkata from Red Hat. I have question on swift3 plugin in openstack-swift06:00
*** dfflanders has joined #openstack-swift06:09
*** skudlik has joined #openstack-swift06:11
*** skudlik has left #openstack-swift06:11
*** Venkata has quit IRC06:15
*** bkopilov has joined #openstack-swift06:25
*** Venkata has joined #openstack-swift06:29
*** dfflanders has quit IRC06:29
*** ChubYann has quit IRC06:40
*** abhitechie has joined #openstack-swift06:47
*** rcernin has joined #openstack-swift06:47
*** abhitechie has quit IRC07:06
*** abhitechie has joined #openstack-swift07:07
*** cschwede has joined #openstack-swift07:09
*** ChanServ sets mode: +v cschwede07:09
*** openstackgerrit has joined #openstack-swift07:13
openstackgerritMathias Bjoerkqvist proposed openstack/swift master: Retrieve encryption root secret from Barbican  https://review.openstack.org/36487807:13
*** kiennt has joined #openstack-swift07:32
kiennthi, i saw Swift already had assert:supports-rolling-upgrade tag.07:33
kienntHow you test rolling upgrade in gate job? I am woking on Heat rolling upgrade and have to setup the CI to test this. But now, i don't know how to do it.07:33
*** cbartz has joined #openstack-swift07:36
*** tesseract has joined #openstack-swift07:36
*** oshritf has joined #openstack-swift07:39
cbartzcschwede: Good morning cschwede. Could you pls take a look over the small p 481117 ?07:39
patchbothttps://review.openstack.org/#/c/481117/ - python-swiftclient - Option to ignore mtime metadata entry.07:39
*** oshritf has quit IRC07:45
cschwedecbartz: Hi! patch looks good, it's in the gate now and should be merged in an hour or so08:05
*** abhitechie has quit IRC08:06
cbartzcschwede: Thanks a ton.08:08
*** abhitechie has joined #openstack-swift08:08
*** silor has joined #openstack-swift08:23
*** jistr|off is now known as jistr08:25
*** afazekas|away is now known as afazekas08:34
*** oshritf has joined #openstack-swift08:38
*** kiennt has quit IRC08:39
*** hieulq has quit IRC08:39
*** tovin07_ has quit IRC08:40
*** Venkata has quit IRC09:08
*** kiennt has joined #openstack-swift09:15
*** hieulq has joined #openstack-swift09:15
*** acoles has joined #openstack-swift09:16
*** ChanServ sets mode: +v acoles09:16
*** mvk has joined #openstack-swift09:21
openstackgerritMerged openstack/python-swiftclient master: Option to ignore mtime metadata entry.  https://review.openstack.org/48111709:23
*** Venkata has joined #openstack-swift09:25
VenkataHello all, I am looking into swift3 plugin to support s3 interface. is there any development going on to support ACLs for s3 interface09:26
VenkataI am from Red hat and we integrated Gluster with openstack-swift to support s3 interface and looking for ACLs support in S309:27
*** kei_yama has quit IRC09:30
kota_Venkata: are you mening object ACL/09:52
kota_?09:52
Venkatakota_ , we are looking for both bucket and object ACLs .09:53
kota_Venkata: AFAIK, bucket ACL (except public read/write) can be used for all configuration in swift3, for object ACL, turning on s3_acl option to be True, it works to support object ACL09:55
kota_https://github.com/openstack/swift3/blob/master/etc/proxy-server.conf-sample#L7709:55
kota_note that swift3 has some overhead to keep the object ACL and owner information in the object metadata so keep your mind if the overhead can be accepted for your system.09:56
*** mat128 has joined #openstack-swift09:59
Venkatakota_ thanks for responding, are these features ready for production?. I see in wiki ACLs are in development10:01
*** kiennt has quit IRC10:03
Venkatakota_ github for swift3 says ACLs are under development.10:04
kota_Venkata: good question, idk. However, the compatibility seems not so bad for usage, e.g. (recent CI result with ceph-s3 tests) http://logs.openstack.org/39/473939/3/check/gate-swift3-tox-s3tests_keystone-ubuntu-xenial/2ba5fee/console.html.gz#_2017-06-13_21_35_45_62463610:08
kota_Venkata: the reason, we still hold the word "under development" is the perspective for performance/overhead10:09
kota_for large deployment10:09
Venkatakota_ ok, Got it. thanks for your help.10:09
kota_so it's nice if you are testing and calling 'ok, it's ready for our production'. Probably it will be great feedback to remove the "under development" mark10:10
*** cshastri has quit IRC10:13
Venkatakota_ sure. I will keep you posted after our testing is completed.10:18
kota_Venkkata: thanks a lot!10:18
cbartzkota_: Hello Kota. Do you have an opinion on p 475873 ?10:35
patchbothttps://review.openstack.org/#/c/475873/ - swift3 - Introduce auth middleware using account metadata.10:35
kota_hello cbartz10:36
cbartzhello10:37
kota_it looks like timburke has both love and fear on that (looking at review logs)10:38
kota_so...10:38
kota_i didn't look at the detail but I'm wondering what is the benefit rather than tempauth architecture10:40
kota_cbartz: that sounds super light-weight, yes exactly10:40
kota_but at the same time, account meta data can be readable for the tenant admin user so that it seems weak for the security10:41
kota_cbartz: is it vulnerable when saving secret key in the account metadata?10:42
cbartzkota_: I think the benefit is that it can be used by the auth middleware which is currently deployed. This auth middleware usally manages the account mapping (tenant -> swift storage account). If tempauth must be used, then it is also required to use the test_tenant storage account name.10:43
cbartzkota_: I think it is not more vulnerable than e.g. tempurl secret keys, which can also be used/modified by the tenant admin.10:44
kota_hmm... good answer10:46
kota_for vulnerable10:46
kota_I didn't get the benefit for the account name mapping10:47
*** abhinavtechie has joined #openstack-swift10:48
cbartzkota_ : If I use a custom auth middleware, e.g. one which uses ldap authentication, thus it would map  ldap account names to storage account names, how could I use s3 with these ldap account names? tempauth does not know anything about this mapping.10:49
kota_yes, your custom auth middleware needs to map the swift accounts to your ldap accounts10:51
*** abhinavtechie has quit IRC10:51
cbartzBut currently, I could not use s3 with the custom auth middleware, because it has not implemented the s3 auth verification. The middleware would have the benefit, that it has one generic implementation which works for all  custom auth middlewares, and not only tempauth (and swauth) and  keystone10:52
*** abhitechie has quit IRC10:52
kota_so the primary benefit is making reference architecture for custom auth (strictly, show https://review.openstack.org/#/c/475873/1/swift3/s3_auth_middleware.py@47)?10:56
patchbotpatch 475873 - swift3 - Introduce auth middleware using account metadata.10:56
*** hieulq has quit IRC10:57
cbartzyes, you could say it so10:57
kota_agh, why not we have not merged https://review.openstack.org/#/c/441520/ yet!?!?10:58
patchbotpatch 441520 - swift - Use swift3's check_signature function10:58
kota_hmm...11:02
kota_cbartz: current my feeling: it could be nice to have reference how to check your secret for swift3. On the other hand, I'm not strongly willing to have secret key management in the swift3 repo.11:04
kota_that is because basically swift3 depends on the auth for Swift deployment so separation from swift auth management could confuse users.11:06
kota_just current status/opinion though11:07
cbartzkota_: Ok, I understand. I mean, there is no problem for me to implement this inside my auth middleware. I am just thinking, that other people with custom auth middlewares will run into the same issue.11:08
kota_cbartz: perhaps, it would be nice to have the docs how to create your own custom auth middlware11:09
cbartzkota_: The problem with s3 is that it relies on the fact that the auth middleware can access the secret key in plaintext (because it is used to generate the signature). But good/secure auth architectures should not store/access secret keys in plaintext.... Do you have any access to stats how people use the s3 middleware?11:10
kota_cbartz: exactly, it's problem on tempauth11:11
kota_cbartz: if you could refer s3_token_middleare/keystone impl11:12
*** hieulq has joined #openstack-swift11:12
kota_it could help you11:12
kota_with the keystone,11:13
kota_it sends credential and signature from header info, and then11:14
kota_keystone can verify the credential against to signatature and the secret inside.11:14
kota_as well as actuall S3 doing11:15
kota_around https://github.com/openstack/keystone/blob/master/keystone/contrib/s3/core.py#L85-L10011:17
kota_for v4 signature, https://github.com/openstack/keystone/blob/master/keystone/contrib/s3/core.py#L102-L12611:17
cbartzkota_: Ok, but what happens here if the secret key is stored not in plaintext but hashed inside keystone?11:18
kota_cbartz: idk, keystone may keep plaintext?11:20
kota_cbartz: i think your question is how to avoid the plaintext handling in *middleware* in swift proxy pipeline?11:21
cbartzkota_: My auth middleware does not have access to secret keys in plaintext. So, I am not able to verify the signatures the s3 users provide.11:23
kota_er11:24
kota_you cannot touch the key but users signed with the plain secret key...11:25
kota_w/o secret key... how to role play the signature calculation described in AWS docs? http://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html11:25
kota_i have no answer for that11:26
kota_right now11:26
cbartzkota_: Yes, I think its a principal "problem" (not for amazon, because it seems they store the keys in plaintext) of the s3 protocol.11:27
kota_understood11:27
cbartzkota_: This is why I am curious how other deployers use the swift3 middleware.11:28
kota_so, i'm wondering how you verify the account for your auth system?11:28
kota_even if you deploys non-plaintext to account meta11:29
kota_the signature calculation won't match because users sign with their plaintext secret?11:29
kota_am... i missing something?11:30
cbartzMy auth middleware uses a LDAP server, and this stores the key in a hashed format. So, the LDAP server will hash the plaintext key and compare the result with the hashed password (same way as unix systems do it).11:31
cbartzThe auth middleware proposed for s3 would store it in plaintext, not hashed, because the s3 protocol requires it in plaintext.11:31
kota_yes, s3 requires plaintext11:32
kota_thinking of that we need plaintext for the verification, if we could have auth server in the out of swift cluster as well as keystone implementation seems safer than account metadata implementation?11:37
*** abhitechie has joined #openstack-swift11:37
cbartzkota_: Why do you think its safer?11:40
kota_it can be managed by the key management system11:41
kota_probably, at least, encrypted in the disk or it will have security deffensive.11:42
kota_for key management system11:42
kota_basically, the acount metadata will store in the swift account sqlite db as raw data11:43
kota_though depending on the your swift cluster architecture, if you don't do anything on sort of disk encryption, it can be readable11:44
cbartzkota_: Ok, I see.11:45
kota_cbartz: note that, I'm not strong opinion to oppose to you, just want to clarify what is lack and what we need to improve11:47
kota_and would love to think good solution11:47
kota_exactly, it may be painful, we cannot use hashed password for s3 protocol11:48
cbartzkota_:  Ok, thank you.11:49
kota_cbartz: thanks for bringing that, perhaps timburke could have a hint for such a case. I think they have various integration experiments for various auth systems.11:50
kota_rather than me.11:51
kota_it's time to get back home. it's around 9:00 pm for me11:52
kota_see you guys11:52
kota_clayg: ah, I'm on https://review.openstack.org/#/c/428408/, currently the code looks good to me. just I've not yet finished to look at the test change and will do tommorow morning11:54
patchbotpatch 428408 - swift - Don't rehash primaries in reconstructor handoffs_o...11:54
cbartzSee you kota_12:03
*** philipw has joined #openstack-swift12:03
*** hieulq has quit IRC12:04
*** philipw has quit IRC12:04
*** d0ugal has joined #openstack-swift12:04
*** d0ugal has joined #openstack-swift12:04
*** Venkata has left #openstack-swift12:05
*** d0ugal has quit IRC12:12
*** hieulq has joined #openstack-swift12:19
*** remix_tj has joined #openstack-swift12:53
*** d0ugal has joined #openstack-swift12:54
*** d0ugal has quit IRC12:54
*** d0ugal has joined #openstack-swift12:54
*** d0ugal has quit IRC12:59
*** catintheroof has joined #openstack-swift13:04
*** hieulq has quit IRC13:16
*** abhitechie has quit IRC13:17
tdasilvagood morning13:26
*** xrb has joined #openstack-swift13:35
*** hieulq has joined #openstack-swift13:36
xrbhi all,13:37
xrbI have got a setup with Open Stack swift which uses Keystone for authentication. I have got a bucket, all users defined in Keystone within this tenant have read-write access, cannot manage to restrict the access by using ACLs on the bucket..13:40
xrbIs it something that is supposed to work?13:40
acolesxrb: ACLs do not restrict role based access rights, they only extend them13:43
xrbIs it possible to defined users in Keystone (within a tenant) that will get only read access to a bucket?13:44
openstackgerritBéla Vancsics proposed openstack/swift master: Reduce code duplication  https://review.openstack.org/47602513:45
*** klamath has joined #openstack-swift13:46
*** klamath has quit IRC13:46
*** klamath has joined #openstack-swift13:46
acolesxrb: AFAIK that is not possible using keystone roles - any user with a operator_role (e.g. admin) has read/write access to project (tenant) containers. You could have a user that does not have an operator_role and then grant read access via an ACL, or have container be in a different project and use ACLs to grant read access to users of another project.13:49
xrbI tried to grant a user from another tenant a read or full_control access using an ACL. But that did not work either. For him, the container from the other tenant was not visible at all...13:52
xrb (maybe I had an issue with the ACL, I tried defining the ACL as 'READ:<user id>' or 'READ:<username>:<username>' using s3cmd)13:54
*** vint_bra has joined #openstack-swift13:54
xrb(was using Swift version 2.13.0-0ubuntu1~cloud0 on Ubuntu 16.04)13:55
acolesxrb: I'm not familiar with how s3 interacts with the swift ACLs. For keystone I'd expect soemthing like <project-id>:<user-id> (see https://docs.openstack.org/swift/latest/overview_acl.html)14:06
*** vint_bra has quit IRC14:07
*** gyee has joined #openstack-swift14:07
acolesxrb: try #swift3 or ask again here in a couple of hours when CA is awake14:11
xrbthx! will do!14:11
*** chlong_ has joined #openstack-swift14:23
*** bombart has joined #openstack-swift14:24
bombartHello. I'm using python-swiftclient to try and stat a "pseudo-folder" but can't figure out the right syntax. I can stat the container, I can stat objects in that container, but not a "pseudo-folder" in that container. Would you be able to point me in the right direction?14:27
*** psachin has quit IRC14:28
*** zhurong has joined #openstack-swift14:29
*** bombart has quit IRC14:31
*** bombart has joined #openstack-swift14:33
bombartThis only seems to be happening when I have spaces in my container name and I need to use quotations around it.14:34
cbartzbombart: A pseudofolder is a 0-byte object, so if you are able to stat objects you should also be able to stat pseudofolders. Try "swift list" to see if the pseudofolder object really exist. Perhaps you have to add a trailing "/" at the end.14:40
bombartIt works when my container doesn't have spaces in it's name, but doesn't when it has spaces.14:42
bombart swift --os-tenant-name admin stat "ABCD" this/14:44
bombartThis works.14:44
bombart       Account: AUTH_9287349872iou3i2i389      Container: ABCD         Object: this/   Content Type: application/directory Content Length: 0  Last Modified: Wed, 29 Mar 2017 17:48:10 GMT           ETag: d41d8cd98f00b204e9800998ecf8427e  Accept-Ranges: bytes    X-Timestamp: 1490809689.45526     X-Trans-Id: tx099995d68270400f84882-00596392d114:45
bombartswift --os-tenant-name admin stat "A B C D" this/14:48
bombartObject HEAD failed: https://swift.url.com:8080/v1/AUTH_98734jkjkkj823h4j2/A%20B%20C%20D/this/ 404 Not Found Failed Transaction ID: tx196e3ase68440ya4sd23d8a170-005963935314:48
tdasilvarledisez: hi, still around?14:50
*** hieulq has quit IRC14:51
openstackgerritOpenStack Proposal Bot proposed openstack/python-swiftclient master: Updated from global requirements  https://review.openstack.org/8925014:54
*** zhurong has quit IRC14:56
*** rcernin has quit IRC14:57
rledisezhi tdasilva :)15:03
cbartzbombart: Look in your proxy server logs for trouble shooting.15:05
*** chsc has joined #openstack-swift15:05
*** chsc has joined #openstack-swift15:05
tdasilvarledisez: hi! last Friday we were talking about an issue I ran into with probe tests and I was wondering if you had seen something similar?15:06
tdasilvait seems it might have something to do with this change: https://github.com/openstack/swift/commit/5d7b0d1edb279cb5713365690fce856a94d3b28915:06
tdasilvabut I'm not really certain.15:06
bombartcbartz: I just see a 404 in the proxy server log. but it's there!15:07
bombartI can list it!15:07
bombartjust can't stat it.15:07
*** hieulq has joined #openstack-swift15:09
rlediseztdasilva: what is the issue? (for info, we've been running this patch in production for at least 2 years)15:09
bombartswift --os-tenant-name gale stat "The T D A" TDA_GDA_1785-2007/ Object HEAD failed: https://swift.storage.info:8080/v1/AUTH_5665268s0c3e4c88asg445afbd80336d7/The%20T%20D%20A/TDA_GDA_1785-2007/ 404 Not Found15:11
bombartswift --os-tenant-name gale list "The T D A" -p TDA_GDA_1785-2007/15:11
bombartworks and lists all objects15:12
tdasilvarledisez: i've started seeing different probe tests fail sort of randomly. Basically when tests restart a server and try to send a request right away, that request might fail: https://github.com/openstack/swift/blob/master/test/probe/test_object_partpower_increase.py#L113,L11615:12
tdasilvabombart: IIRC, pseudo-folders are not real objects, right? not sure you can HEAD them? i might be missing something here15:13
*** chlong_ has quit IRC15:16
rlediseztdasilva: we don't use the "manager' to manage processes, so i don't have feedback on that. but i can't see anything obvious by looking at the code15:18
*** d0ugal has joined #openstack-swift15:20
*** d0ugal has quit IRC15:20
*** d0ugal has joined #openstack-swift15:20
tdasilvarledisez: yeah, i think it's really a timing issue. for example, if I put a sleep(1) right after like 113 in that code snippet above, then tests pass...15:22
rlediseztdasilva: as it is binding later, the head_object can be sent before process binded port? the manager is probably not waiting for the port to be opened15:23
*** hieulq has quit IRC15:28
*** chlong_ has joined #openstack-swift15:30
*** hieulq has joined #openstack-swift15:43
*** noxdafox_ has joined #openstack-swift15:55
*** d0ugal has quit IRC15:56
*** noxdafox has quit IRC15:57
*** oshritf has quit IRC15:59
*** chsc has quit IRC16:00
*** xrb has quit IRC16:00
*** xrb has joined #openstack-swift16:01
*** chlong_ has quit IRC16:06
openstackgerritMerged openstack/swift master: Don't rehash primaries in reconstructor handoffs_only mode  https://review.openstack.org/42840816:16
*** chlong_ has joined #openstack-swift16:20
*** oshritf has joined #openstack-swift16:21
cbartzbombart: Look at the %20 quotes. How are they displayed in the logs?16:22
*** JimCheung has joined #openstack-swift16:29
*** hieulq has quit IRC16:36
bombart@tdasilva: If I understand it correctly, pseudo-folders are objects with the Content Type: application/directory and Content Length: 016:37
*** chlong_ has quit IRC16:38
bombart@cbartz: Spaces show up as "%2520"16:38
cbartzbombart: What happens if you list the container with space: swift list "A B C D" . Does this/ appear in the list?16:40
*** oshritf has quit IRC16:40
*** xrb has quit IRC16:40
timburkegood morning16:49
notmynamehello, world16:50
*** hieulq has joined #openstack-swift16:51
timburkecbartz: fwiw, on the swift3 secret storage, i've played around with two options: first, using a hash-of-the-hash for the secret (which is sometimes tolerable but certainly not great -- if the stored hash is discovered, it's comparable to knowing the plaintext password), and second, having the user auth as normal then using the auth token that's returned as a temporary secret16:55
*** hieulq has quit IRC16:59
cbartztimburke: Interesting, but what happens if the auth mw does not persist tokens and  allows multiple tokens to exist at the same time?17:00
*** tesseract has quit IRC17:01
*** bombart has quit IRC17:01
timburkeidk. i shove one token per user in memcache17:03
timburkeas far as multiple tokens, you might be able to do something more like sts and issue both a temp secret and temp identifier, using the temp id to look up the secret17:04
timburkebut if you're really striving to not persist anything, it's gonna get hard, real fast17:04
cbartztimburke: Ok. Thx for sharing your ideas.17:06
timburkesure. sorry i don't have something more concrete to point you toward17:07
openstackgerritMerged openstack/swift master: Fix sporadic failures in test_reconstructor.py  https://review.openstack.org/46035917:18
claygis this done?  https://review.openstack.org/#/c/472659/17:31
patchbotpatch 472659 - swift - Allow to rebuild a fragment of an expired object17:31
claygrledisez: didn't you have a change for getting rid of that stupid do_listdir arg on the primary suffix hashing?17:34
*** hieulq has joined #openstack-swift17:40
*** cbartz has quit IRC17:43
*** hieulq has quit IRC17:43
*** MVenesio has joined #openstack-swift17:47
notmynamewho's on for chairing the 0700 meeting this week?17:52
*** chsc has joined #openstack-swift17:55
*** cschwede has quit IRC17:57
*** hieulq has joined #openstack-swift17:58
acolesclayg: IMHO patch 472659 is ready for review.18:00
patchbothttps://review.openstack.org/#/c/472659/ - swift - Allow to rebuild a fragment of an expired object18:00
*** dmellado has quit IRC18:02
*** dmellado has joined #openstack-swift18:02
claygacoles: sweet - I added it to priority reviews and starred it for myself!18:04
*** tonanhngo has joined #openstack-swift18:15
*** Sukhdev has joined #openstack-swift18:24
*** zaitcev has joined #openstack-swift18:26
*** ChanServ sets mode: +v zaitcev18:26
*** ChubYann has joined #openstack-swift18:34
*** nizam037 has joined #openstack-swift18:36
*** nizam037 has quit IRC18:47
*** mat128 has quit IRC19:06
mathiasbzaitcev: thanks for the reviews!19:13
zaitcevmathiasb: sure19:14
zaitcevI generally stay away from encryption, but the Barbician review was easy to understand.19:24
*** hieulq has quit IRC19:38
*** silor has quit IRC19:47
*** JimCheung has quit IRC19:57
*** d0ugal has joined #openstack-swift19:57
*** JimCheung has joined #openstack-swift20:12
*** JimCheung has quit IRC20:17
openstackgerritThiago da Silva proposed openstack/swift master: Fix swiftdir option and usage of storage policy aliases  https://review.openstack.org/34469320:18
tdasilvazaitcev: I noticed that in your PUT+POST patch you were fixing much of what's in this patch above ^^^, so I thought we could just continue on that, which should make your patch a little smaller and more focused??? wdyt?20:19
*** tonanhngo has quit IRC20:27
*** JimCheung has joined #openstack-swift20:29
*** tonanhngo has joined #openstack-swift20:31
*** JimCheung has quit IRC20:33
*** tonanhngo has quit IRC20:35
*** tonanhngo has joined #openstack-swift20:35
*** JimCheung has joined #openstack-swift20:39
*** tonanhngo has quit IRC20:40
*** tonanhngo has joined #openstack-swift20:42
*** tonanhngo has quit IRC20:46
*** d0ugal has quit IRC20:52
*** catintheroof has quit IRC20:53
*** MVenesio has quit IRC20:53
*** tonanhngo has joined #openstack-swift20:54
*** tonanhngo has quit IRC20:58
*** tonanhngo has joined #openstack-swift21:00
*** klrmn has joined #openstack-swift21:02
*** tonanhngo has quit IRC21:04
*** tonanhngo has joined #openstack-swift21:24
*** tonanhngo has quit IRC21:28
*** tonanhngo has joined #openstack-swift21:32
*** tonanhngo has quit IRC21:38
*** tonanhngo has joined #openstack-swift21:39
*** tonanhngo has quit IRC21:43
*** hieulq has joined #openstack-swift21:54
*** tonanhngo has joined #openstack-swift21:57
*** vint_bra has joined #openstack-swift21:58
*** tonanhngo has quit IRC22:01
*** tonanhngo has joined #openstack-swift22:02
*** tonanhngo has quit IRC22:07
*** hieulq has quit IRC22:12
*** deep-book-gk_ has joined #openstack-swift22:20
*** tonanhngo has joined #openstack-swift22:20
*** deep-book-gk_ has left #openstack-swift22:23
*** tonanhngo has quit IRC22:25
*** hieulq has joined #openstack-swift22:27
zaitcevtdasilva: I'll have a look at it.22:28
openstackgerritClay Gerrard proposed openstack/swift master: Clean up some assertions in test_reconstructor  https://review.openstack.org/46771022:32
openstackgerritJohn Dickinson proposed openstack/swift master: moved install guide and removed tox env definition  https://review.openstack.org/48171422:32
*** tonanhngo has joined #openstack-swift22:32
*** tonanhngo has quit IRC22:37
*** catintheroof has joined #openstack-swift22:43
*** JimCheung has quit IRC22:58
*** JimCheung has joined #openstack-swift22:58
*** JimCheung has quit IRC23:24
*** JimCheung has joined #openstack-swift23:24
*** vint_bra has quit IRC23:25
*** JimCheung has quit IRC23:29
*** kei_yama has joined #openstack-swift23:31
*** JimCheung has joined #openstack-swift23:41
*** chsc has quit IRC23:45
*** JimCheung has quit IRC23:45
*** bkopilov has quit IRC23:57
*** catintheroof has quit IRC23:59

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!