16:05:46 #startmeeting Solum Team Meeting 16:05:47 Meeting started Tue Nov 18 16:05:46 2014 UTC and is due to finish in 60 minutes. The chair is devkulkarni. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:05:48 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:05:50 The meeting name has been set to 'solum_team_meeting' 16:06:10 Dimitry Ushakov 16:06:14 Adrian Otto 16:06:15 Ed Cranford 16:06:21 adrian_otto: I just started the meeting 16:06:26 sorry I am behind schedule today. 16:06:29 devdatta kulkarni 16:06:34 thanks devkulkarni 16:06:35 murali allada 16:06:46 we are in #topic roll call 16:07:00 Melissa Kam 16:07:35 I will edit the agenda real quick, stand by 16:07:46 thanks adrian_otto 16:09:15 #link https://wiki.openstack.org/wiki/Meetings/Solum#Agenda_for_2014-11-18_1600_UTC Our Agenda 16:09:34 devkulkarni: I'm happy to have you lead this meeting if you like 16:09:57 adrian_otto: no worries. you can take over now that you are here :) 16:10:05 #topic Announcements 16:10:19 1) Juno's final release will be tagged today or tomorrow 16:10:24 i think you need to convince the bot that you're the chair 16:10:43 datsun180b: aah 16:10:45 oh! adrian_otto should I endmeeting then? 16:11:09 no, let's just have you repeat the channel commands for the sake of the minutes 16:11:16 or I can just prompt you 16:11:18 ok, sounds good 16:11:22 let's enter Announcements 16:11:27 irc://chat.freenode.net:6667/#topic Announcements 16:11:43 you are using Adium with that goofy cut/paste quirk 16:11:54 #topic Announcements 16:11:58 perfect 16:12:11 so watch for the release coming today or Wed. 16:12:19 great. thanks adrian_otto 16:12:22 any other announements? 16:12:28 is that process documented somewhere? 16:12:49 if not it will be great to have it documented on our wiki somewhere 16:12:50 devkulkarni: yes, in fact it's. 16:12:56 oh cool. 16:13:00 I can dig that up and share it 16:13:09 that will be awesome 16:13:16 I do have one other announcement 16:13:19 one sec 16:13:54 2) An article featuring application ecosystem for OpenStack 16:14:07 #link http://blogs.cisco.com/datacenter/going-native-with-openstack-centric-applications-overview Going Native with OpenStack Centric Applications: Overview 16:14:36 cool. 16:14:40 If you have not already seen this, take a look. It's one of the most comprehensive works of its type 16:14:51 ok, devkulkarni let's proceed to action items 16:15:01 were cisco folks there at solum session at the summit? 16:15:07 unless we have other announcements from the team 16:15:23 yes, the author of this article Lee Calcote was present 16:15:42 I see 16:15:49 #topic Review action items 16:15:58 we also had representation from a few groups in Oracle 16:16:14 including an R&D team that works on Solaris 16:16:26 nice. is there a video recording of the session? 16:16:33 oh cool 16:16:55 I don't think there was a camera there 16:17:04 but I can't be certain 16:17:10 it was a long week in Paris 16:17:16 :) 16:17:29 ok, so action items, thanks devkulkarni 16:17:44 * adrian_otto dimtruck to follow up on bugs 1359516 and investigate for any specific issues in replacing simple_server with mod_wsgi 16:17:45 Launchpad bug 1359516 in solum "Needs to handle http header 'X-Forwarded-Proto'" [Undecided,Confirmed] https://launchpad.net/bugs/1359516 16:17:48 status on this? 16:18:07 yes - research has been completed 16:18:17 i spoke to a number of other teams who implemented the same feature 16:18:18 what did we learn from that pursuit? 16:18:27 i'll put in a patch request this week 16:18:40 basically, same thing as we though "simple_server should not be used in prod" 16:18:47 thought* 16:19:10 makes sense 16:19:14 makes sense. thanks for the research on this dimtruck 16:19:26 ok, and further input needed from the team or beyond in order to act? 16:19:32 if you want to, we can review where the patch is next tuesday...hopefully it'll be merged by then but in case the group has questions.. 16:19:44 i'll write up the findings in launchpad 16:20:04 dimtruck: if you have progress to share you can present it in the BP/Task Review section next Tues. 16:20:09 sounds great! 16:20:11 i'll do that 16:20:16 but I think we can drop the AI now, agreed? 16:20:28 yes sir 16:20:32 ok, super 16:20:33 * adrian_otto dimtruck to report back results of multi-node devstack with solum setup 16:20:33 yes 16:20:48 we've discussed this last week after we set this action item 16:21:05 i think the consensus here is that barbican will work for us, pending finalization of their api 16:21:18 ok, so no need to carry this AI forward? 16:21:22 and that's the only thing stopping us from multi-node devstack 16:21:28 adrian_otto: correct 16:21:30 I do have input on this subject 16:21:41 I engaged the Barbican team on the subject of the API 16:21:46 oh nice! 16:22:05 and they assured me that the current version of the API (to be known from this point as v1) will be a supported, stable API 16:22:15 and there shall be no contract breaking changes 16:22:31 if they adjust the API, it will be subsequent to a version bump 16:22:40 so this is the appropriate time to take dependencies on the API 16:22:44 * adrian_otto applause 16:22:46 awesome! 16:23:25 ok, and our last AI was about the release cut, which I covered in the Announcements section 16:23:42 cool 16:23:50 since that needs completion, please carry it for us 16:23:56 devkulkarni: #action adrian_otto to cut the final Juno release 16:24:11 #action adrian_otto to cut the final Juno release 16:24:19 #topic Blueprint/Task review 16:24:21 and once we record that, let's proceed to BP/Task Review 16:24:51 ok, any work items for the team to consider/discuss today? 16:25:13 I have one discussion point. 16:25:29 yes? 16:25:30 i've got one 16:25:41 ok, devkulkarni then datsun180b 16:25:41 there was an email today on the mailing list about what will be easy place to get started to contributing to solum. 16:26:04 I suggest that we mark our bugs as 'low hanging fruit' if they are relatively easy to fix 16:26:12 we probably have no bugs labeled as low-hanging-fruit? 16:26:19 that way folks who want to join and contribute can start there 16:26:21 excellent suggestion 16:26:27 how about that one about assemblies freezing in BUILD when deploy fails 16:26:32 does anyone have some bugs in mind we should mark accordingly? 16:26:38 I have added several bugs last week. I think some of them are low hanging fruits 16:26:39 detect it, scream ERROR, git review 16:26:42 I will mark them as such 16:27:02 devkulkarni: tx! 16:27:15 datsun180b: that's actually a Docker problem, I think 16:27:29 well we can listen 16:27:38 there are also some usability bugs that could be taken care of 16:27:40 worth investigating anyway 16:27:40 I will do that today 16:27:41 I have run into that myself, and what I find is that the network bridge that docker brings up is not passing network traffic from the host to the comtainer, or back 16:27:42 like improving error messages 16:27:50 mkam: +1 16:27:54 so any task that tries to use the network fails to resolve names 16:28:09 oh cool so there's some notes 16:28:24 once docker gets in that state, the container needs to be killed, removed, docker daemon restarted, and container run again 16:28:41 it's actually a bug in docker that is solved in about version 1.2 16:28:53 so upgrading Docker will cause that symptom to be avoided 16:28:56 guess this one was hanging too low then 16:30:11 datsun180b: was that the one you wanted to raise for discussion, or did you have another topic to touch on? 16:30:17 #link https://github.com/stackforge/solum/blob/master/contrib/devstack/lib/solum#L73 16:30:24 whyfor does demo get to have a service role 16:30:52 datsun180b: good point. we should remove it. 16:31:09 i'm currently working on filtering resources by project and am already working on this and some related troubles 16:31:26 +1 datsun180b 16:31:41 sounds like this should have a bug filed against it 16:31:53 removing that line on its own means that demo can't create the trust to let solum work on his behalf 16:32:12 filing it now then 16:32:17 datsun180b: tx! 16:32:50 datsun180b: so what change is required in addition to make the trust get created properly? 16:33:06 let me rephrase that — 16:33:09 #link https://bugs.launchpad.net/solum/+bug/1393853 16:33:12 Launchpad bug 1393853 in solum "Demo has the service user role for its own project" [Undecided,New] 16:33:15 devkulkarni: still working on that 16:33:23 okay 16:33:41 thanks datsun180b for catching this 16:33:43 looks like i'm missing a role either on solum's part or demo (substitute any other non-priv user)'s 16:34:07 datsun180b: a service role is required for creating a trust, right? 16:34:10 bottom line is demo is not a non-privileged user at present 16:34:22 james_li: seems that's the case 16:34:49 james_li: yes, that's my understanding 16:35:08 james_li: but who needs that trust? is it the service user or the trustor, which in this case will be demo user? 16:35:44 we might have to define additional roles then 16:36:13 the roles required to create trust should not be same as more powerful admin roles 16:36:22 on my env currently i've created a user role, three users, and their separate tenant/projects for testing resource exclusion 16:36:23 devkulkarni: I guess service user needs to load the context for the trustor from the trust created before 16:37:11 james_li: makes sense. but for creation of trust, we are saying that the trustor (user demo) needs to have the same service role as the service user. 16:37:44 can we add a new role which whose permission will be only to create trusts and no more? 16:38:37 I guess we will have to dig into this more.. datsun180b you are on it already I suppose? 16:38:40 sounds like we could use some guidance from the keystone team on this 16:38:48 like glue on stamps i am 16:38:57 devkulkarni: that makes sense to me 16:39:12 devkulkarni: about creating a new role for trusts 16:39:18 the idea of making a role to create trusts sounds insecure 16:39:40 especially if we hand it to every user 16:40:01 but giving every user the admin role is equally bad 16:40:06 right 16:40:08 I think the intent for trusts is to have a service account for each user account to delegate trusts accordingly 16:40:28 or per role, that's the part I am not clear about 16:40:42 or if that matters for us at all 16:41:28 i'm content to keep digging 16:41:40 datsun180b: +1 16:42:02 ok, thanks datsun180b Morgan Fainberg has been a good resource for these matters before 16:42:34 and Adam Young was also talking about this when I saw him in Paris 16:43:01 he has some really neat integrations with keystone and kerberos that he was showing 16:43:36 for effective SSO. The subject of trusts came up when the need for unattended access was mentioned. 16:44:29 so instead of using a bearer token to authorize and action in an unattended (no suer present) mode, the trust token and service account are used 16:44:39 anyway, sounds like datsun180b is set for now 16:44:50 shall we proceed to Open Discussion? 16:44:55 +1 16:45:02 #topic Open Discussion 16:45:58 crickets :-) 16:46:10 any objections to wrapping up for today? 16:46:21 none 16:46:32 ok, let's adjourn 16:46:38 #endmeeting