Monday, 2020-11-02

*** rcernin has quit IRC02:41
*** rcernin has joined #openstack-swift02:42
*** camelCaser has quit IRC03:10
*** camelCaser has joined #openstack-swift03:15
*** psachin has joined #openstack-swift03:39
*** rcernin has quit IRC04:21
*** rcernin has joined #openstack-swift04:45
*** rcernin has quit IRC04:53
*** benj_ has quit IRC05:04
*** benj_ has joined #openstack-swift05:07
*** evrardjp has quit IRC05:33
*** evrardjp has joined #openstack-swift05:33
*** rcernin has joined #openstack-swift05:48
*** rcernin has quit IRC05:57
*** m75abrams has joined #openstack-swift06:09
*** psachin has quit IRC08:12
*** rpittau|afk is now known as rpittau09:22
*** rcernin has joined #openstack-swift09:24
*** rcernin has quit IRC09:45
*** m75abrams has quit IRC10:31
*** rcernin has joined #openstack-swift10:41
*** rcernin has quit IRC10:55
*** m75abrams has joined #openstack-swift11:39
*** ianychoi has joined #openstack-swift12:24
*** dosaboy has quit IRC16:29
*** jv has quit IRC16:31
zaitcevtimburke: Are you back up yet? I don't understand why exactly the ALO namespace must be hidden.16:33
*** jv has joined #openstack-swift16:39
*** m75abrams has quit IRC16:54
*** rpittau is now known as rpittau|afk17:08
timburkezaitcev, the idea is that by keeping the namespace hidden, we can ensure we're the only ones making requests in it (both reads and writes)18:06
claygzaitcev: maybe "only able to be modified by the system" is the more correct requirement - it's possibly listing or downloading individual segments could be supported and potentially useful...18:06
claygusing the null namespace means we could expose APIs for listing and fetching segments (partId query param?) after the fact with no problems18:07
zaitcevtimburke: It is as I thought. However, aren't we giving up some value in the ease of diagnostics this way? A bigger danger to keep those segments in a user-visible container that I see is some users coming to depend on its contents.18:07
timburkeyeah, that's a way better explanation of my reasoning and thought process than i was able to manage rn :-)18:07
clayghow is https://bugs.launchpad.net/swift/+bug/1833287 not biting more people?  Just does like no one use staticweb?  I know we don't enable it...18:07
openstackLaunchpad bug 1833287 in OpenStack Object Storage (swift) "staticweb redirects cause 500s in s3api" [Undecided,In progress]18:07
zaitcevI'm more interested in this: do you ever want to list, or possibly clean up, segments administratively while you're debugging the ALO itself?18:09
claygzaitcev: well, we're probably not going to get rid of SLOs  because of old clients - so maybe we can have our cake and eat it to.  Lots of users with experience with aws don't want to think about segments after the fire the "complete MPU" command18:09
timburkezaitcev, you can still have an internal proxy that lets ops do requests in the reserved namespace (ie, has allow_reserved_names_header=true in the gatekeeper)18:09
zaitcevWe can set it up so the user itself does not have the right credentials, but his account reseller does.18:10
zaitcevAh, okay18:10
claygand THATS what we're really trying to solve - how to make overwrite or delete of MPU never result in "orphaned segments" - by making segments the clusters responsibility18:10
timburke(fwiw, my workaround for my dev env is to have an anti-gatekeeper: https://github.com/tipabu/no_op_gatekeeper/blob/master/no_op_gatekeeper.py#L28-L33)18:11
zaitcevI don't see how this is relevant at all. As long as the separate container is not accessed by AWS applications, they do not work differently in any way. The system is allowed to delete contents, user knows that.18:12
timburkei want ALO as a first-class swift api18:12
zaitcevAgain, making its technical container visible does not make ALO a 2nd class API.18:13
zaitcevThe only question is, do you want implementation to _rely_ on the integrity of the contents of the container (against ESR deleting lib_comerr2).18:14
zaitcevSo, I was thinking about it this night and thought: but this is Swift, you cannot rely on 100% integrity of this stuff. So, you must program it defensively.18:15
zaitcevTherefore, if users tampers with the special container, the system ought to survive it anyway.18:15
zaitcevIf you agree with this postulate, you don't need a special character or syntax.18:18
timburkewhat does "recovery" look like if the user goes and overwrites a segment with new content? i feel like the closest thing to a reasonable behavior would be to quarantine everything related to the original18:18
zaitcevGETs may return 500 in this case, I think. The checksum in the manifest will be wrong.18:19
zaitcevAgain, do you remember what happened when ESR deleted lib_comerr?18:20
zaitcevHis desktop no longer worked and the whole Internet laughed at him18:20
zaitcevYou can overwrite random files in ~/.config, see how well that works.18:21
zaitcevMany amusing effects!18:21
zaitcevThat said, as long as the middleware does not leak something interesting or does not crash or worse, loops, then it's fine, isn't it?18:22
zaitcevhttps://geekz.co.uk/lovesraymond/page/518:23
zaitcev(yes, now mjg59's sense of humor is guiding important architectural decisions in Swift, and I'm comfortable with it)18:24
timburkemy point was more that if we allow clients the means to tamper with things, at some point they likely *will*, and when they start getting back 500s they'll just assume swift is broken18:40
timburkethe safe, defensive thing (to me) seems to be not allowing the tampering to begin with -- we've got escape hatches we can use if we *really* get ourselves into trouble18:40
zaitcevAnd allow_reserved_names_header=true is one such hatch, then.18:45
*** persia has quit IRC20:08
*** persia has joined #openstack-swift20:09
*** hoonetorg has quit IRC20:10
openstackgerritTim Burke proposed openstack/swift master: Be willing to send hashes as JSON  https://review.opendev.org/75863820:13
*** hoonetorg has joined #openstack-swift20:23
*** rcernin has joined #openstack-swift20:41
*** dosaboy has joined #openstack-swift20:42
*** rcernin has quit IRC20:43
*** rcernin has joined #openstack-swift20:43
openstackgerritMerged openstack/liberasurecode master: Release 1.6.2  https://review.opendev.org/75692420:48
zaitcevtimburke: liberasurecode is not on tarballs.opendev.org anywhere, right? Just a tag and that's all?21:02
timburkenot even a tag yet -- i still need to do that (or someone else could push a signed tag up)21:03
zaitcevok21:03
openstackgerritMerged openstack/swift master: ec: Add an option to write fragments with legacy crc  https://review.opendev.org/73916423:03
openstackgerritTim Burke proposed openstack/swift master: memcache: Make error-limiting values configurable  https://review.opendev.org/76102923:32

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!