18:31:57 #startmeeting Networking FWaaS 18:31:57 Meeting started Wed Feb 25 18:31:57 2015 UTC and is due to finish in 60 minutes. The chair is SumitNaiksatam. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:31:58 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:32:01 The meeting name has been set to 'networking_fwaas' 18:32:06 #info metting agenda https://wiki.openstack.org/wiki/Meetings/FWaaS#Agenda_for_Next_Meeting 18:32:42 #info kilo-3 feature proposal freeze is March 5th, and milestone date is March 19th 18:33:16 any other info anyone want to share? 18:33:40 #topic Bugs 18:33:51 #link https://bugs.launchpad.net/neutron/+bug/1418196 18:33:52 Launchpad bug 1418196 in neutron "fwaas: driver base class is stale" [Undecided,In progress] - Assigned to yalei wang (yalei-wang) 18:34:04 is badveli here? 18:34:32 since #link https://review.openstack.org/#/c/153930/ affects their patch 18:34:56 sorry, not patch, affects the varmour driver, is what i meant 18:35:59 anyone else got a chance to review the patch? 18:36:17 SumitNaiksatam: i did look at this - more on the method args 18:36:27 SridarK: yeah 18:36:46 will try to look at it later today or early tomorrow 18:36:50 SumitNaiksatam: i was not so sure if this was mandatory 18:37:32 SumitNaiksatam: but as such the changes are fine - should not cause impact - not every one will have agent_mode as something significant 18:37:43 it is more to do with the ref implementations 18:38:17 logically i viewed this as the base class methods as stating some basic requirements 18:38:33 but this is more a python thing with this patch 18:39:00 SridarK: okay 18:39:19 SumitNaiksatam: i think this is fine 18:39:24 i am not able to find the commit id that this patch references 18:40:13 Also it did not get linked to the bug ? 18:41:00 “The change set of f69ed3b3, Change-Id: Iba78e534ccf347ea6270aabc939a489dd40a7b9e” 18:41:05 i could not find this 18:41:09 I see the bug id being referred in the commit message 18:41:25 SumitNaiksatam: yes but usually we also see a review url 18:42:32 my point is that the bug is referring to a commit ID (and hash) that supposedly made a change to the fwaas driver base 18:42:41 but i cant locate that bug id 18:42:45 sorry commit id 18:43:04 the linking from the review to the LP bug is a separate thing 18:43:12 ok 18:43:20 sometimes it happens that way that the link does not get established 18:43:57 Hello All, sorry a bit late 18:44:09 i dont undertand what consistency is the author referring to 18:44:26 i am guessing this is the root wrap changes 18:46:00 okay anyway, i will try to track this offline 18:46:17 badveli: can you comment on the review: #link https://review.openstack.org/#/c/153930/ 18:46:24 as this affects your driver 18:47:13 Yes sumit, will review it 18:47:16 or this might be the DVR agent mode 18:47:35 i am not sure why the driver base class has to be changed 18:47:39 anyway 18:48:00 vishwanathj: you are looking at #link https://bugs.launchpad.net/openstack-manuals/+bug/1419498 right? 18:48:01 Launchpad bug 1419498 in openstack-manuals "Networking services in OpenStack Security Guide - FWaaS Section Updates" [Low,In progress] - Assigned to vishwanath jayaraman (vishwanathj) 18:48:26 yes, I uploaded a patch set and have got one +1 and one +2 18:49:03 the review is at link https://review.openstack.org/#/c/158943/ 18:49:31 vishwanathj: oh wow, that was fast ;-) 18:49:56 SumitNaiksatam, thanks to your tips and guidance yesterday, that made it go faster 18:50:14 vishwanathj: happy to help, and thanks for acting on this quickly 18:50:24 it was a low hanging bug with less changes 18:50:34 vishwanathj: sure 18:51:29 i dont see an update on #link https://review.openstack.org/#/c/147396/ 18:52:11 SumitNaiksatam, sorry. this patch needs following patch. 18:52:21 yushiro: ah ok 18:52:30 yushiro: thanks for stopping by in the meeting 18:52:45 yushiro: one use case was that we actually wanted to share the firewall policies 18:52:59 yushiro: across tenants 18:53:12 yushiro: do you think this can be better handled by changes to policy.json? 18:53:36 yushiro: by this i meant the patch you have posted 18:54:22 yushiro: we have the shared attribute in the firewall policy 18:54:45 SumitNaiksatam, yes. firewall-policy has the attribute 'shared' 18:54:55 which is set to True by default 18:55:12 which means that the firewall_policy created will be shared by default across tenants 18:55:28 hence you are seeing the behavior 18:56:35 SumitNaiksatam, sorry to late response. I'm not good at writing english 18:56:44 yushiro: no worries at all 18:57:16 yushiro: we can take it offline if you prefer that (over ML and #openstack-fwaas) 18:57:36 SumitNaiksatam, Yes, I'd like to. thank you. 18:57:42 yushiro: sure 18:57:51 yushiro: and thanks for your work 18:58:01 +1 18:58:04 SridarK: badveli: anything else on the bugs to discuss today? 18:58:06 SumitNaiksatam, Thank you too :-) 18:58:15 SumitNaiksatam: nothing from me 18:58:19 nothing much from my side 18:58:26 ok moving on 18:58:32 i know vishwanathj has to leave early 18:58:40 lets try to get the firewall insertion in before that 18:58:52 #topic Firewall Insertion 18:59:00 #link https://review.openstack.org/152697 18:59:10 SridarK: over to you 18:59:19 #link https://review.openstack.org/#/c/152697/ 18:59:35 next rev of patch posted on Sun 18:59:50 folks pls take a look (thanks pc_m ) 19:00:06 basic structure in place 19:00:26 working on validation code to test if routers specified can be associated with fw 19:00:45 ie, same tenant and router is not already allocated to another fw 19:00:53 testing that 19:01:00 other thing that remains is UT 19:01:23 SridarK: okay great, thanks 19:01:26 i have fixed most of the existing UT, working thru agent 19:01:41 the other thing is to gauge vendor code impacts 19:01:47 freescale is fine 19:02:08 will need discussion with badveli & vishwanathj for their vendor code 19:02:19 vishwanathj: what about your plugin/driver? 19:02:53 SumitNaiksatam, SridarK and I will have an offline conversation later today 19:03:06 vishwanathj: okay sure 19:03:17 badveli: you are fine with the changes so far? 19:03:48 sridar and myself will need a talk 19:03:59 we planned to discuss today 19:04:10 badveli: have you reviewed the patch? 19:04:17 so far 19:04:39 just went through the code changes, 19:05:12 badveli: okay, might be good to have a good understanding of the proposed changes, so that you can have a more meaningful interaction 19:05:27 all please note that we are getting very close to cut-off on the features 19:05:40 so we need to wrap up on the pending items at the earliest 19:05:40 yes, Sumit, 19:06:18 so i would very much request cooperation and deligent/speedy feedback from the entire team on this 19:06:33 Folks thanks in advance 19:06:41 there was a suggestion that i made to SridarK in the morning 19:06:57 SumitNaiksatam, SridarK, sure, we will review and provide feedback and impact if any 19:07:10 regarding the default behavior to keep it consistent with the prevailing semantics 19:07:32 the suggestion was to check if no routers are specified during create 19:07:55 and if they arent, then apply the firewall on all routers 19:08:03 which is what is done today 19:08:38 ok 19:08:46 if you need more granular application, you can provide the list of routers 19:09:10 if you provide an empty list, then the firewall is not applied to any routers 19:10:17 SumitNaiksatam: that will the case when the FW will remain in PENDING_CREATE 19:10:36 SridarK: correct 19:10:38 SumitNaiksatam: and in the case where the attribute is not specified and there are no routers in the tenant 19:10:51 SumitNaiksatam: yes agreed 19:11:23 anyone else has thoughts on this? 19:11:25 SumitNaiksatam: also one thing that i also just realized is that the help string associated with the --router-ids can also convey this 19:11:34 SridarK: perfect! 19:11:39 SumitNaiksatam: so users are more aware 19:11:59 seems reasonable to me 19:12:21 my main motivation in suggesting this is that it makes this entire patch a non-disruptive change 19:12:23 So i will query if there is no attribute, i will query for routers on the tenant and apply that 19:12:43 so that we dont have transient gate breaking issues 19:13:02 also existing clients dont have to be changed immediately, and will continue to work 19:13:11 SridarK: yeah 19:13:32 Sounds good - i will add that 19:13:53 SridarK: AFAIK, that should work, but i dont know if things have changed since i last used the “ATTRIBUTE_NOT_SPECIFIED" 19:14:18 SumitNaiksatam: i will test this out first too 19:14:19 vishwanathj: badveli pc_m: any thoughts on this default behavior semantics? 19:14:54 like I said earlier, the defaulth behavior seems reasonable to me 19:15:18 SumitNaiksatam, I got to leave, I will review the meeting minutes later and catch up, bye all 19:15:23 SumitNaiksatam: sorry, don't know enough about it... :( 19:15:27 vishwanathj: bye 19:16:06 currently PENDING_CREATE 19:16:22 state is changed when the firewall becomes active 19:17:22 badveli: ACTIVE is also a state 19:17:24 we are saying that if there is empty list the fw will remain in PENDING STATE 19:17:33 and will never change, correct? 19:17:46 badveli: an UPDATE will change it 19:17:51 badveli: empyt list implies that that fw should not be applied on any router 19:17:59 badveli: yes 19:18:41 badveli: however, if you dont specifiy the router_id list (which is different from specifying an empty list), it will be applied to all routers, as is the case today 19:19:52 fine with me 19:19:58 badveli: ok 19:20:03 pc_m: no worries :-) 19:20:43 btw, i posted the CLI patch for this insertion change: #link https://review.openstack.org/#/c/158118/ 19:20:50 SridarK: thanks for the update 19:21:09 SumitNaiksatam: no worries, thanks for the input on this 19:21:12 #topic FWaaS L3 agent refactoring/restructuring 19:21:21 SridarK: thanks for the update on this earlier 19:21:37 SridarK: pc_m: so i believe no immediate changes required at this point? 19:21:50 SumitNaiksatam: correct 19:22:10 pc_m: okay, thanks for the discussion with SridarK on this 19:22:12 seemed like not many changes may be needed anyway, so can defer 19:23:14 pc_m: okay great 19:23:22 #topic Service Objects 19:23:26 badveli: over to you 19:23:44 any updates you want to provide? 19:23:47 still working on the neutron patch 19:23:54 badveli: okay 19:24:02 able to retrieve my code changes 19:24:15 some how my previous review is not there any more 19:25:34 badveli: its probably abandoned 19:25:46 yes might be 19:25:58 need to get from some where locally 19:26:22 which was very old one and need to modify 19:26:52 badveli: okay 19:27:09 thanks for the update 19:27:15 #topic Open Discussion 19:27:22 anything else we need to discuss? 19:27:27 have a stupid question that will probably waste couple of minutes of your time but if that’s ok, I will ask :) 19:28:04 banix: we have exactly a couple of mins 19:28:08 banix: so shoot :-) 19:28:10 any plans to include a group of ip addresses in service object or in firewall rules at some point? 19:28:33 i see references to grouping of addresses as a possible extension in the original design doc 19:28:34 banix: we have address objects on the road map 19:28:40 banix: yes 19:28:53 banix: we prioritized service objects over that 19:29:00 SumitNaiksatam: i see. great. thanks for the info. 19:29:04 I mentioned to SridarK this morning, but I was looking at the API reference doc, and VPN doc is gone. Don't know when that happened. I'm not sure if FWaaS have API reference documentation too, but there is nothing there on the web page. http://docs.openstack.org/developer/devstack/ 19:29:16 banix: but service objects has been in review for over a year now! 19:29:24 Just a heads up... 19:29:44 pc_m: ah good to know 19:29:45 Wrong link... http://developer.openstack.org/api-ref-networking-v2.html 19:29:46 SumitNaiksatam yeah noticed that 19:30:08 pc_m: is there a WADL for VPNaaS in the openstack/api-site repo? 19:30:13 SumitNaiksatam: It has LBaaS 19:30:28 annegent_: thanks for chiming in 19:30:32 annegent_: we will check 19:30:37 annegent_: Not sure. What is a WADL? 19:30:52 The bug has been here since last fall: https://bugs.launchpad.net/openstack-api-site/+bug/1358179 19:30:53 Launchpad bug 1358179 in openstack-api-site "Neutron Virtual Private Network as a Service (VPNaaS) API requires "v2.0" in URI" [Undecided,Triaged] 19:30:54 annegent_: which exact location should we be looking at? 19:30:59 annegent_: In 2013 I added documentation as part of a commit. 19:31:01 Web Application Description Language 19:31:30 I'll triage that bug further 19:31:48 pc_m: it needs to go into https://github.com/openstack/api-site 19:31:50 annegent_: I committed, and it was on the web site, back in 2013 19:32:04 pc_m: the API reference? If so I can find it in history. 19:32:07 to the best of my knowledge we had fwaas here as well, since i had added that patch (sometime in 2013 as well) 19:32:14 Used to be on the API reference pages. 19:32:16 annegent_: okay thanks 19:32:25 SumitNaiksatam: will also look in history there 19:32:36 annegent_: thanks, will try to follow up as well 19:32:39 thanks 19:32:56 alrighty, thanks everyone, we are a couple of mins over time 19:33:03 bye 19:33:08 bye all 19:33:12 #endmeeting