20:00:29 #startmeeting heat 20:00:29 Meeting started Wed Sep 4 20:00:29 2013 UTC and is due to finish in 60 minutes. The chair is shardy. Information about MeetBot at http://wiki.debian.org/MeetBot. 20:00:30 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 20:00:32 The meeting name has been set to 'heat' 20:00:37 #topic rollcall 20:00:39 hi 20:00:40 o/ 20:00:40 hello! 20:00:46 o/ 20:00:58 howdy y'all 20:00:59 o/ 20:01:00 o/ 20:01:01 Hi 20:01:02 feeling ill today may not be all that responsive 20:01:06 o/ 20:01:11 hi 20:01:12 watching from bed 20:01:29 o/ 20:01:39 sdake: sorry to hear that. I hope you feel better soon. 20:01:46 thanks adrian 20:01:46 hi 20:01:48 o/ 20:01:52 school plague season 20:01:53 * sdake_ ughs 20:01:54 hello 20:02:20 Hi all, lets get started 20:02:32 hope you feel better soon sdake ;) 20:02:37 #topic Review last week's actions 20:02:46 fever broke so should be better tomorrow 20:02:48 There was only one, which I think randallburt has in progress 20:02:53 indeed. 20:03:03 #link https://wiki.openstack.org/wiki/Meetings/HeatAgenda 20:03:06 converted to bug so we can track it there from here on out. 20:03:12 #link http://eavesdrop.openstack.org/meetings/heat/2013/heat.2013-08-28-20.00.html 20:03:25 #info andrew_plunk to move Rackspace resources to /contrib directory 20:03:32 #action randallburt to move Rackspace resources to /contrib directory 20:03:42 I have a question about that 20:03:59 #link https://bugs.launchpad.net/heat/+bug/1220798 20:04:00 Launchpad bug 1220798 in heat "Move Rackspace Resources to contrib" [Medium,Triaged] 20:04:06 will the feature freeze apply to contrib? 20:04:13 haha 20:04:27 radix: ummm 20:04:41 radix wants get out of jail free card 20:04:49 I think it makes sense for it to apply to the whole tree, we should be moving to test/bugfix mode 20:04:52 radix: maybe you should explain what you're planning ;) 20:04:58 is contrib included in the tarball? 20:05:03 well, I'm gonna be working on some of those regardless 20:05:14 stevebaker: definitely IMO 20:05:17 the Rackspace resources I mean 20:05:48 sorry I'm on a phone :p 20:06:01 yes, contrib should be in the tarball, and the freeze rules should apply to the whole tree. 20:06:11 So, just to clarify, we only have a couple of weeks until RC1, at which point master will be open for Icehouse development 20:06:12 so, purely from a Rackspace point of view, I think there would be advantages to testing/bug fixing against a stable set of features 20:06:16 that's fine 20:06:16 given that they are self-contained and work with a service on a different release cycle, there could be a case for being more relaxed 20:06:33 So my preference is just to pause on the features until we get RC1 branched 20:06:42 shardy: oh! OK, good to know 20:06:42 any objections or other opinions? 20:06:52 that's great 20:06:52 shardy: +1 20:07:06 shardy: sounds good 20:07:36 Is there a target date for branching RC1? 20:07:37 thanks :) 20:07:41 ok, cool, which brings us to; 20:07:49 kebray: https://wiki.openstack.org/wiki/Havana_Release_Schedule 20:07:58 ah, duh. thx. 20:08:00 shardy: to clarify, since this is a bug, I can get it in before RC? or are you saying wait until RC. 20:08:11 #topic Feature Freeze, final status for h3 20:08:25 randallburt: yes, it's just features (blueprints) which are frozen 20:08:31 bugs are fine 20:08:43 cool, thought so, just wanted to be sure. 20:09:01 So the feature freeze is EOD today, ttx is going to cut the milestone-proposed branch early tomorrow 20:09:54 2 bp left open 20:10:06 There are still quite a few patches we need in to complete the last two bps 20:10:09 parallel-delete and vpnaas-support 20:10:14 ttx: yup 20:10:21 so from now on patches have to be cherry picked? 20:10:26 #link https://review.openstack.org/#/q/status:open+project:openstack/heat+branch:master+topic:bp/parallel-delete,n,z 20:10:32 asalkeld: no 20:10:35 just approved the parallel-delete patch approx 8s ago 20:10:47 #link https://review.openstack.org/#/q/status:open+project:openstack/heat+branch:master+topic:bp/vpnaas-support,n,z 20:10:51 zaneb: thanks 20:10:53 cool thanks ttx 20:10:58 asalkeld: the mp branch that will be cut tomorrow is just for h3 20:11:13 makes sense 20:11:24 master is still used for havana feature freeze exceptions and bugfixes until we do RC1 20:11:44 then master unfreezes 20:11:57 makes sure everyone stays focused on the RC buglist 20:11:57 sorry i had some technical problems 20:12:06 what about the vpnaas patch? 20:12:38 So, we need some reviews for vpnaas, and for those up over the next few hours to keep an eye incase stuff needs rebasing 20:12:51 but overall we're looking in pretty good shape 20:13:12 So the patch with requirements changes is merged already? 20:13:14 shardy: do you think those las two will make it in hte nex thours ? 20:13:16 are we considering extensions for any features that miss the boat? 20:13:22 If so I will rebase my patches 20:13:23 #link https://launchpad.net/heat/+milestone/havana-3 20:13:32 shardy: or do you plan to require exceptions for them ? 20:13:53 ttx: I hope so, but it depends on the gate (and reviews for the vpnaas, although I've +2'd them all) 20:14:32 bgorski: Your patches need rebasing over the trusts patch which bumps keystoneclient 20:14:35 shardy: if all it needs is a couple more hours it's fine for FFE. It's just slightly inconvenient that they miss the H3 boat 20:15:26 ttx: Ok, well if necessary we may need a FFE for parallel-delete and vpnaas 20:15:45 ok noted 20:16:04 ttx: I bumped as-update-policy as it was just getting too late 20:16:16 shardy: ack 20:16:58 Anyone have anything to add, or any questions? 20:17:27 vpnaas is a no brainer since it's well contained 20:17:44 bgorski, there seems to be a requiresments change needed? 20:17:44 ttx: agree, patches all lgtm too 20:17:44 parallel-delete is slightly more invasive but I guess it's worth it 20:17:48 nice work bgorski 20:18:12 as long as they merge in the next days we should be fine for FFE 20:18:13 https://review.openstack.org/#/c/44892/ 20:18:13 in case they need one 20:18:25 Nice work everyone on h3, we've got through a huge pile of bps and bugs, really great work :) 20:18:58 \o/ 20:19:13 asalkeld: no it needs rebasing on my bumped keystoneclient version 20:19:27 ok, cool 20:19:45 we should probably do those requirements version changes in separate commits 20:20:06 stevebaker: rather than in the commit which requires them? 20:20:30 stevebaker: I think that happened anyway for neutronclient, but I bumped keystoneclient in the trusts patch 20:20:42 well, I'm talking about the automatic requirements changes that happen just by running devstack 20:20:43 https://review.openstack.org/#/c/44957/ 20:20:58 if it is coupled to the code, then ignore me 20:21:55 asalkeld: thx, I a little bit distructed but I'm trying to keep up with you guys 20:22:08 asalkeld: Yeah, the same bump happens in the first vpnaas patch, but shouldn't conflict 20:22:22 oh that needs a rebase anyway 20:22:33 * SpamapS o/ 20:23:09 asalkeld, stevebaker: are you in a position to pull some of these and re-propose if needed, if there are simple rebases that need to happen over the next few hours? 20:23:17 sure 20:23:25 or should we just let things slip and use the FFEs to get them in later? 20:23:31 yep, we can nurse them in 20:23:44 stevebaker: Ok, cool, probably easier if possible 20:23:46 thanks 20:24:26 Ok, on to open discussion, or anything remaining re h3? 20:25:00 #topic Open Discussion 20:25:08 Anyone have anything to raise? 20:25:19 shall we talk docs next week? 20:25:20 shardy, we really need deployment guide 20:25:30 snap 20:25:42 stevebaker: yup, need a docs sprint soon 20:26:06 deployment guide should really be integrated with the docs.openstack.org one 20:26:08 although the template orientated docs are already looking really good, so kudos to all who made that happen :) 20:26:10 btw I am off for 3 weeks from the end of this week 20:26:33 asalkeld: nice! :) 20:26:37 I am curious about HOT templates. 20:26:41 stevebaker: I've been thinking about the multi-region stuff 20:26:48 the heat-templates repo currently has only 2 20:26:54 zaneb: yes? 20:26:55 oh no! we'll miss you asalkeld :) 20:27:01 SpamapS: more would be good 20:27:07 stevebaker: I think configuring the region always makes sense, so we should go ahead with that change... 20:27:28 well we could auto convert a bunch couldn't we? 20:27:28 I think as part of the test/fix/document effort we should put special emphasis on writing HOT templates. 20:27:32 and using HOT in examples. 20:27:40 stevebaker: but, I also think the multi-region thing makes sense *provided* it's only used for stand-alone Heat installations 20:27:42 SpamapS: +1 20:27:44 But.. is it.. stable enough for that? 20:27:46 we've been working on several HOT templates. There are a couple of repos out on github we can pull from and consolodate 20:27:55 SpamapS: I think the example templates can follow the docs (which look nearly there atm) 20:28:01 I was thinking I'd start by converting tripleo-heat-templates to HOT. 20:28:07 SpamapS: but go for it if you want to contribute some :) 20:28:09 They seem to be working fine so far 20:28:12 SpamapS: cool, sounds good 20:28:27 stevebaker: so I'd support adding that as well, as long as it's something configured in the config file. preferably using a different middleware. 20:28:53 zaneb: hmm, that sounds fine. it could either go into the auth_password middleware or something else in the standalone pipeline 20:29:16 randallburt: Ok if you have stuff you can contribute to heat-templates that would be great 20:29:32 and better yet, its *obviously* a bug ;) 20:29:57 stevebaker: my thoughts exactly ;) 20:30:35 shardy: will do 20:31:08 more provider template examples would be really good too 20:31:24 shardy: how will heatclient know not to send credentials on create when trusts are enabled? 20:31:32 randallburt: cool. Are those new HOT templates? or converting existing ones? 20:32:18 stevebaker: It still sends credentials 20:32:30 stevebaker: we just create a trust internally instead of storing them 20:32:45 shardy: those might be a little broken atm wrt HOT. we're investigating now 20:32:55 but it doesn't strictly need to does it? because the trust is created from the token? 20:33:02 randallburt: Ok, pls raise bugs with details 20:33:27 stevebaker: well you need to pass either user/pass, or token 20:33:41 then that's used to create the trust, which we store the ID of 20:33:42 will do when I figure out what's going on. its in the refactored attribute/property schema conversion code somewhere I think. 20:33:48 seems like a follow up to heatclient would be to try w/o creds first 20:33:49 we should consider adding a feature to suppress sending of credentials when trusts are used, and probably a hot expression to enable that so the template itself can indicate that heatclient should act that way. 20:34:24 trusts does *not* mean heatclient works without credentials! 20:34:31 where are people getting that from? 20:34:39 no, it does not need to send them after it's using a trust 20:34:40 seems logical to me 20:34:51 so sending them when a trust is in play is redundant 20:35:01 right? 20:35:02 adrian_otto: that's wrong, all it means is that we no longer store the username and password 20:35:13 shardy: why do we keep sending it to Heat though? 20:35:17 shardy: currently on create, credentials are sent to keystone, then token *and* credentials are sent to heat 20:35:27 and that deferred operations now work with token auth, not just user/password 20:35:34 shardy: surely you can just send a token, not the username/pass 20:35:36 shardy: shouldn't we just .. trust .. that stacks we created have a trust, and talk to heat using our heat token? 20:35:41 ideally it should be credentials to keystone, then only a token to heat 20:35:59 stevebaker: yeah, we only need the token when trusts are enabled 20:36:13 thats the other big enhancement, over not storing creds 20:36:29 is there a way to check if the cloud you are talking to supports trusts? 20:36:39 (via api) 20:36:42 Right so it seems to me that we should be able to try to operate with token.. and if that fails.. fall back to u/p 20:36:47 SpamapS: you can talk to heat with whatever credentials or token you like as long as keystone will validate it 20:37:08 what you authenticate against the heat API with has nothing to do with trusts (which we just use internally) 20:37:48 so I think SpamapS is right, heatclient can attempt without creds first, then with on failure 20:37:57 asalkeld: You could try to read the OS-TRUST path of the v3 keystone API 20:38:11 but atm we expect deployers to enable it via a config file option 20:38:21 could heat grow an api that allows users to pass in a trust and no u/p? 20:38:37 just thinking of the multicloud option 20:38:38 shardy: other services only allow token auth though, right? 20:38:41 radix: I was hoping that was how it would work actually. 20:38:45 stevebaker: when you say creds, you mean user/password right? 20:38:50 shardy: yes 20:39:06 radix: we may need something like that if we add oauth 20:39:11 as a bearer token is a credential in my mind, which is why I'm confused 20:39:12 AFAIK, trusts are behind the scene right now. 20:39:34 but they certainly could be something that heatclient fetches itself from keystone, and gives to heat, right? 20:39:47 Ok, so *yes* trusts should allow Heat to work properly, including deferred operations like AutoScaling with token-only auth 20:39:54 shardy: ah, sorry. 20:39:54 phew 20:40:45 SpamapS: no, the user passes either a token or user/pass to heat, then *heat* creates the trust internally 20:41:09 hm. OK 20:41:11 then we store the ID of that trust, and use it to impersonate the stack creator, e.g when we create an instance for AutoScaling 20:41:16 shardy: I know that is how it works now. I am hoping that we can let the client do the trust creating and heat will never be made aware of the user/pass.. eventually. :) 20:41:42 SpamapS: you mean pass a trust ID to heat via the API? 20:41:46 Yes. 20:41:51 +1 20:41:57 SpamapS: yes, that should be pretty easy to add now 20:42:22 shardy: seems like it would require a bunch of work in heatclient and inside heat, and would be a good candidate for early icehouse :) 20:42:46 +1 20:42:57 SpamapS: yeah, I was thinking pretty easy when it hits the engine.. 20:42:59 yo 20:43:09 shardy: the only real benefit though is improved security for usernames and passwords... I think. 20:43:17 SpamapS: Ok, I'll raise a BP and we can discuss this at summit 20:43:34 SpamapS: why can you just pass a token? 20:43:41 which works now? 20:43:55 trusts are revokable too, right? 20:44:02 radix: yes 20:44:15 shardy: pass a keystone-access token which enables you to create the trust? If that works, cool.. didn't think it would. 20:44:36 SpamapS: that works now, with what was merged today 20:44:41 (hopefully ;) 20:44:51 "in theory" 20:45:03 hey, I need to go now 20:45:04 well then that would mean only temporary secrets being passed around.. which is a win, IMO. 20:45:04 etc ;D 20:45:18 stevebaker: o/ 20:45:23 SpamapS: yeah, it's a step in the right direction 20:45:26 stevebaker: o/ 20:45:37 shardy: well hopefully we have all gained clarity on the situation. Thanks. 20:45:45 so is it possible to get full functionality out of heat and autoscale without giving heat a u/p? 20:45:55 radix: sounds like "yes in theory" 20:46:05 great 20:46:09 but that heatclient still passes u/p "because" 20:46:17 SpamapS: cool, everyone keep firing questions at me over the next few weeks as you try this stuff out, hopefully we can gain collective knowledge and test exposure :) 20:47:27 radix: Yes, but it's not very well tested yet as it was only merged today :) 20:47:45 sure :) 20:48:40 SpamapS: we should add a token-only option to heatclient if one doesn't already exist 20:48:58 anyone have anything else to raise for the last 10mins? 20:49:32 I would like to raise that you are all ninjas. 20:49:37 nup 20:49:47 SpamapS: rofl 20:49:57 Ok, well we can wrap up early then 20:50:02 great work everyone :) 20:50:15 woohoo! 20:50:17 #endmeeting