22:01:46 #startmeeting horizon 22:01:47 Meeting started Tue Mar 12 22:01:46 2013 UTC. The chair is gabrielhurley. Information about MeetBot at http://wiki.debian.org/MeetBot. 22:01:48 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 22:01:50 The meeting name has been set to 'horizon' 22:01:54 #topic General 22:02:00 hello folks! 22:02:05 hey 22:02:05 o/ 22:02:06 another week has come around oh so quickly 22:02:10 hey o/ 22:02:21 hello 22:02:26 hi 22:02:41 things are progressing well. lots of reviews up for quantum stuff. that's good. nothing critical or unmanageable. 22:03:11 don't have much off the top of my head, so let's just go to bug discussion 22:03:15 #topic bugs and blueprints 22:03:48 I'd like to get some feedback on this: https://bugs.launchpad.net/horizon/+bug/1144820 22:03:49 Launchpad bug 1144820 in horizon "Fade out success message automatically" [Undecided,In progress] 22:04:23 Curious about people's thought on auto-fading alert messages.. 22:04:52 lcheng, I have seen people arguing in both directions: yes, we want, nooo, no way 22:04:58 Though the fully configurable option is the most complex, it seems the most flexible 22:05:11 I wouldn't add this for Grizzly, but it'd be great for Havana 22:05:23 I'd favor the configurable option as well 22:05:30 personally i *am* in favor of auto-fading them after some amount of time 22:05:35 gives you some time to fix the issues 22:05:39 * mrunge too 22:06:03 I targeted the bug to H1 22:06:10 but one of our qa guys say: I want to read each error/warning... 22:06:12 and I'll add a comment in favor of the cofigurable version 22:06:27 I guess we can go with this type of configuration: 22:06:28 HORIZON_CONFIG = { 22:06:28 .. 22:06:28 'auto_fade_message': { 22:06:28 'delay': 3000, 22:06:28 'fade_duration': 1500, 22:06:29 'alerts' : ['success', 'info'] 22:06:29 gabrielhurley, I think jpich did that already 22:06:31 }, 22:06:33 .. 22:06:35 } 22:06:45 mrunge: it wasn't set just now... ::shrug:: 22:07:05 ah no, I meant comment on the config option 22:07:08 oh 22:07:11 yeah 22:07:45 cool. the one bug I wanna ask about is https://bugs.launchpad.net/bugs/1153477 22:07:46 cool, I'll implement it that way. 22:07:47 Launchpad bug 1153477 in horizon "editing security group rules ends up with ValueError when Quantum secgroup is enabled" [High,Confirmed] 22:07:58 is amotoki or anyone else from quantum able to provide an update on that? 22:08:05 cheers, lcheng 22:08:12 I'm hoping it's as simple as just checking the ID type as we do in some other places... 22:08:22 but I'd like confirmation of that 22:09:00 I must admit, I haven't seen that error yet 22:09:03 I'm trying to reproduce it 22:09:16 but it's worth to fix it anyways 22:09:22 not sure if it's dependent on quantumclient version or something of the like 22:09:44 just got quantumclient updated to the latest 2.2.0 today so that might help some things 22:10:11 all in all the bug list is looking pretty reasonable 22:10:22 what about https://bugs.launchpad.net/horizon/+bug/1011171 ? can we just close that? 22:10:25 Launchpad bug 1011171 in horizon "Instances & Volumes tab is being opened inside itself recursively " [High,Incomplete] 22:10:31 and the other incomplete ones? 22:10:44 ... just to reduce the list 22:10:58 mrunge: incomplete bugs are garbage-collected after some amount of time in launchpad 22:11:00 Normally incomplete bugs expire after 60 days, not sure what's up with that one 22:11:06 yeah, there are some very old ones still around 22:11:11 why is that still open 22:11:13 weird 22:11:24 okay, yeah, any that old should be closed 22:11:26 i closed at least one last week that had been around for > 6 months 22:11:29 they escaped launchpad's janitor somehow 22:11:48 I could live with manual closing 22:11:49 yes, please close them if they're that old for sure 22:11:56 also remove the importance if it has been set previous 22:11:58 if we decide to close them after 6 months 22:12:11 #action close out incomplete bugs that have escaped launchpad's janitor 22:12:39 for those of you that didn't hear it in the Project Status meeting right before this, we'll be cutting RC1 a week from today, so bug fixes should go in this week. 22:13:02 I'll make sure to get my couple in by Saturday at the latest (I'm traveling this week so my time is questionable) 22:13:34 (if anybody's in seattle and wants to grab a beer with the Nebula folks, shoot me an email) 22:14:24 Thanks for the reminder :) I wasn't sure about RC1 deadline 22:14:26 any other Grizzly bugs people want to talk about? otherwise I'm gonna open it up for general bug/blueprint/whatever discussion. 22:14:37 Hey guys, I would like your suggestions about this if you have a second. Listing the resources associated to a tenant is needed to perform the clean up when deleting it. 22:14:42 Most APIs don't have that feature and, after discussing this with devs involved in each service, the only way to do that is making a cURL call. I updated the whiteboard with some notes about this. How should I proceed in this case? 22:15:01 what do you mean not supported? 22:15:12 Whiteboard here https://blueprints.launchpad.net/horizon/+spec/tenant-deletion 22:15:34 I mean that is not possible to filter resources by tenant id 22:15:54 oh, got it. not all the APIs have that type of filter. some do, but many still don't. 22:16:05 we'd have to list everything and filter on our end 22:16:22 Admin users can list, e.g. instances, from their own tenant... but cannot do the same to other tenants 22:16:29 yeah 22:16:51 I'm curious if we could use/abuse some keystone feature to make that work 22:17:03 either the token create method or the new "trusts" stuff 22:17:03 We would need a super-admin heh 22:17:26 basically to use the admin API to get a token that would allow us to request things as if we were that user. 22:17:31 that's trusts-like 22:17:59 Hm.. it sound a bit insecure 22:18:23 If you're up for it, I'd talk to the keystone folks (ayoung, dolphm, heckj) and see if there's a way this would work in the v3 API. 22:18:32 I suspect there might be 22:18:37 which would be really cool 22:18:59 I'm totally on it, so please add me to CC if you contact them 22:19:03 The trust api supports delegation and impersonation.. I suppose we can use impersonation for that. 22:19:12 that's what I was thinking 22:19:17 worth finding out 22:19:44 it'd be a cool "hey look! we're doing something new and shiny with the v3 API in Havana" feature. 22:19:58 chmouel mentioned something about the 'reseller admin' role... if that is possible in Cinder, maybe it's possible in other services 22:20:12 Yeah sounds great :) 22:20:15 cool 22:20:23 other topics? 22:21:12 We might want/have to go through the dance of adjusting the meeting time in a couple of weeks after DST hits Europe 22:21:45 ...just throwing it out there :-) 22:21:58 It's not as bad for me as it'll be for the continental folks 22:22:08 yeah, it's screwy and tough 22:23:15 gabrielhurley: lcheng: ++ 22:23:25 cool 22:24:22 okay 22:24:26 let's call it a wrap 22:24:28 good stuff everyone! 22:24:32 next week is the RC 22:24:36 have a good week! 22:24:38 #endmeeting