22:00:03 #startmeeting neutron_drivers 22:00:05 Meeting started Thu Nov 30 22:00:03 2017 UTC and is due to finish in 60 minutes. The chair is mlavalle. Information about MeetBot at http://wiki.debian.org/MeetBot. 22:00:06 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 22:00:08 The meeting name has been set to 'neutron_drivers' 22:00:55 hi there! 22:01:04 hi 22:01:05 howdy 22:01:08 Hi 22:01:41 armax: ping 22:02:34 amotoki: ping 22:02:36 hi 22:04:02 let's wait one or two minutes for ihrachys and / or amotoki 22:04:32 o/ 22:04:45 sorry folks :) 22:04:51 was too excited reading some code 22:05:37 ihrachys: that's good :-) welcome 22:06:03 list of RFEs to discuss today are here: https://bugs.launchpad.net/neutron/+bugs?field.status%3Alist=Triaged&field.tag=rfe 22:06:36 last time we discussed https://bugs.launchpad.net/neutron/+bug/1705755 22:06:36 Launchpad bug 1705755 in neutron "[RFE] Plugin support for API resource attribute extensions" [Wishlist,Triaged] 22:07:01 and boden asked to join the meeting, so let's start there 22:07:50 boden: you want to start 22:08:17 I read through the logs from last weeks driver’s meeting, and I wasn’t really sure the problem was understood.. so earlier this week I tried to simplify the description in the bug report 22:08:49 anyone have a chance to pre-parse? 22:09:55 I have briefly 22:10:00 I did 22:10:17 just did 22:10:27 from last weeks driver’s meeting, I didn’t really understand how neutron-lib came into the picture TBH 22:10:28 boden: this is a problem that prevents something like https://review.openstack.org/#/c/516701/ from landing at the moment, no? 22:11:21 boden, neutron-lib is related in as much as it is a source of 'official' neutron apis that we can vouch/ask SDK/OSC folks to support. 22:11:23 armax: appears that way 22:11:53 hi sorry for late 22:11:55 to me the clear example of bypassing this hurdle is to elevate extension attributes to 1st level resources 22:12:27 and make extension attributes just read-only for resources that they are related to 22:12:38 unfortunately this is not an approach that would work on existing APIs 22:12:51 but new APIs should be designed with that principle in mind 22:13:41 if I bring the trunk API as an example, integrating it with OSC didn’t require any extra support from OSC or the OSC SDK 22:14:25 if I understand boden’s problem the issue stems solely from extension attributes to core resources whose OSC support is directly in the OSC repos 22:14:25 ok. let's say you add data_plane_status to a port. you won't have a separate resource will you? 22:14:52 armax: I beleive you understand correctly 22:15:27 ihrachys: you could, it just looks clunky 22:15:35 boden: ack, thanks 22:16:24 armax, but afaiu you can't specify an attribute value for an unknown attribute in OSC 22:16:29 you can in neutronclient though 22:16:47 yeah 22:17:02 but that’s because the client just pass that along to the server 22:17:09 right. but it works. 22:17:11 while OSC drops unknown attributes right? 22:17:14 yea 22:17:15 sure, sure. 22:17:28 OSC only processes known options 22:18:15 so what OSC folks tell us is they are not flexible in terms of how we implement our api when they need to then support it. Mike specifically mentions micro-versions in the gerrit link posted above 22:18:21 here: https://review.openstack.org/#/c/516701/ 22:18:51 well, he makes an argument that dns should be in core. 22:19:02 so I think for that one, where my review is due, we should unblock it to grant it some sort of exception to the rule 22:19:30 as for other extension attributes, like vendor ones that may be unknown to us to, we clearly need to come up with a solution 22:20:28 if there was a way to enable OSC to be able to parse something like --extension-attr key=value —extension-attr key=value 22:20:36 that might solve the jam 22:20:40 not sure if it was discussed 22:20:54 no haven't discussed that here 22:20:54 for vendor attributes, I think we should gather answers to Akihiro's question: "What will vendor API extensions want to do then [when support for unofficial extensions is killed]?" 22:21:44 it’s never gonna get killed, let’s be realistic, IMO 22:21:46 armax, it would unblock but not ideal. you have no indication of support in help text, or docs... 22:22:02 armax, I dunno, I never saw a list of actual things external to stadium 22:22:16 could be it's not big / can be upstreamed 22:23:09 armax: I’m not sure just the ability to pass extera kwargs is enough.. perhaps it’s part of the solution, but there’s still no way to extend existing OSC commands (like sec group create) 22:23:40 boden: to do what? 22:24:02 to quote your example 22:24:08 neutron security-group-create --logging=blah 22:24:25 armax: see #b2 and #b3 from the rfe 22:24:29 one could do osc security group create —extension-attr logging=blah 22:25:00 you still need the sec group command to do its thing, you just want to add some logic atop it 22:25:31 it's similar to what we have with neutron client 22:25:34 in this case, we need an extra hook point to convert --extension-attr key=value to a propose data type and populate it into a req body 22:25:40 that logic would just involve to passthrough the extra argument, but the more talk about this the more I don’t like it 22:26:07 and I am sure the OSC team wouldn’t like it either 22:26:28 openstacksdk team either 22:26:49 no, they won't like it 22:28:07 maybe if they have even worse (in their mind) alternatives, they can bend 22:28:16 lol 22:28:46 I think there’s no alternative on the table 22:30:17 the problem affects the core resources alone, right? 22:30:32 we should probably spell it out in capital cases on the bug description 22:30:55 no? 22:31:17 what do you mean by 'core resources'? (network, subnet, port only?) 22:31:24 btw do OSC folks realize that they already support non-core APIs? I read maybe no from what Mike wrote: " In the OSC experience, I just want the feature set to be supported. I would like to first see neutron supporting this in their core api first." 22:31:29 core resources == resources whose OSC support is in the OSC repos 22:32:12 As far as I can tell, OSC team considers API defined in neutorn-lib as official networking API 22:32:23 ihrachys: I think the confusion stems from the fact that non-core APIs OSC plugin contributions never get seen by the OSC teams 22:32:44 ok. but then dns is there too, so why the patch abandoned? 22:32:56 like bgpvpn, trunk, dynamicrouting, etc 22:33:11 ihrachys: at the PTG we talked about it 22:33:20 and said that DNS is likely gonna get an exception 22:33:24 to the rule 22:35:56 if we kept the neutronclient for these usecases, how would the user experience look like? 22:36:14 meaning forever? 22:36:26 how could that change to keep a good demarcation from the experience of using the OSC? 22:38:08 but is the longer term, isn't this also related, as amotoki points out in the RFE, to the future of extensions in openstack in general? 22:39:26 if we are going to move away from extensions at some point in time, maybe the plan for this issue is to maintain neutron client up to that point 22:39:30 no? 22:39:57 wouldn’t a “unified” networking API take into considerations of extensions as well? or we’re just saying too bad for them and all the users they bring 22:40:22 I can’t see us ever moving away from extensions, but that’s my opinion 22:40:24 I know I am not saying that 22:41:47 boden: in the short term you are happy if we maintain neutron client, right? 22:41:55 mlavalle: yes 22:42:02 but also need those extra kwargs it supports 22:42:11 so we can’t drop support for those 22:42:26 understood 22:42:27 I think there was never a threat to pull the rug from neutronclient without a completed transition strategy to OSC 22:42:28 "unified" and "free to extend" are different in my opinion. If we allow to extend API freely, it is not a "unified" API. it is just an "unified" API endpoint 22:43:40 amotoki: yes.. unified I was thinking is a single API, but I was saying the construction of building that API, its resources, what it supports, etc. would consider extensions 22:43:46 sso why don't we decide today that we are not going to remove neutron client until we find a plan / solution to the extensions / unified api coonundrum 22:43:58 ? 22:44:08 right. you can bring even more users if you expose (I assume) useful api to everyone, and with guarantees of cross-compatibility 22:44:28 mlavalle: we never have decided to remove and we are not going to remove the client 22:44:45 boden: does that help? 22:44:48 if we can’t reply on the OSC CLI to address extension attributes 22:44:59 rely^^^ 22:45:07 mlavalle: thanks 22:45:10 mlavalle: yes, sounds like a fun longer term topic 22:45:25 then the path forward is to envision how the neutronclient experience can change 22:45:43 to embrace the use case of addressing the need of passing attribute extensions 22:45:52 or extension attributes, I shall say 22:46:52 so I think we have a short term decision, keeping support for neutronclient with the extra kwargs 22:47:19 and then we have a longer term decision that involves the future of extensions and a unified API 22:47:30 but the decision was already made when we kept the deprecation of the client open ended 22:47:41 the short term decision that is 22:48:14 mhhhh, but I think that part of boden's concern is the deprecation message that users get 22:48:17 right? 22:48:21 the longer term decision is also sorta made IMO 22:48:31 mlavalle, I think we are OK with it for now 22:48:34 mlavalle: correct, and my suggestion at the time was not to drop the message but rephrase it 22:49:19 whatever works :) as long as the client’s supported 22:49:22 if we think about this RFE as ‘how the neutronclient can change to address the extension use case' 22:49:29 then I could ensivision a use case where 22:50:26 the neutronclient is stripped down bare bone and only capable of accepting requests that involve extension attributes 22:50:53 and we could even rename it to be openstack-net-ext 22:51:30 to signal that the neutron client itself is gone 22:51:39 crazy thought, I know 22:51:45 just tossing it out there 22:52:03 ok, we would need to flesh this out 22:52:16 in the meantime, we have a path forward 22:52:24 at least with this demarcation is clear which tool is for what 22:52:37 do we all agree? 22:52:47 in that case, it might be better to have more structure extra argument support though 22:52:47 and if a user attempts to use openstack-net-ext to create a resource without extension, the client would barf at the user 22:53:03 mlavalle: +1 22:53:17 the drawback to this is that we’ll have to maintain parts of the neutronclient indefinitely when we had hoped we were going to get rid of it 22:53:39 but the maintainance cost has been pretty minimal in a while 22:53:45 ameade: totally 22:53:49 amotoki: totally 22:53:53 ameade: sorry 22:54:53 ok, let's move on then 22:55:01 note that one big problem on attribute extension by vender extension is we cannot avoid name conflicts. if someone adds an extension in the neutron official API which has the same name as an attribute by vendor ext, there is no way to address it. 22:55:39 this is just a note. 22:55:47 amotoki: yup 22:55:47 noted, thanks 22:56:02 namespacing is an issue with OSC too 22:56:42 yes. at now OSC is testing namespaces by loading all osc plugins... it is a bit hacky 22:57:34 ok, we are left with only 3 minutes. so probable we won't be able to go through the next RFE 22:57:50 let's return a whopping 3 minutes to our agendas 22:57:57 thanks for attending 22:58:08 o/ 22:58:18 remember that next time our meeting is on Friday at 1400utc 22:58:35 #endmeeting