►
From YouTube: Kubernetes SIG Storage - PVC/VolumeSnapshot Namespace Transfer Design Meeting 20210712
Description
Kubernetes Storage Special-Interest-Group (SIG) PVC/VolumeSnapshot Namespace Transfer Design Meeting - 12 July 2021
Meeting Notes/Agenda: -
Find out more about the Storage SIG here: https://github.com/kubernetes/community/tree/master/sig-storage
A
A
A
Okay,
so
just
I
put
the
bullet
points
here
to
summarize,
what
was
finding
you?
Can
you
have
access
to
the
document?
There
is
a
link
for
the
kit,
so
basically
everything
will
be
to
allow
the
bbc's
to
be
between
transfer
between
name
spaces,
so
the
pve
will
stay
the
same,
but
we
will
do
transfers
for
the
pvcs
they
would.
A
He
proposed
accept
an
approved
mechanism,
and
this
will
be
based
like
back
in
the
day,
like
I
think,
two
years
ago
it
will
be
annotation
in
the
pvcs,
and
this
annotation
will
speak
out
the
target
volume
that
will
be
used,
so
it
will
initially
was
targeting
the
volume
clone
and
volume
snapshot
and
the
original
pvc
will
be
deleted
before
transferring
so
before
you
start
the
transferring
you
will
delete
the
pvc
and
then
sorry
it
will
start
to
transfer
and
then,
before
the
the
target
pvc
can
use
the
original
pv
as
the
original
pvc
has
to
be
deleted,
also
the
reclaimed
policy
of
the
pv.
A
If
it
was
like
a
delete
contamination,
it
has
to
be
overwrite
already
to
keep
the
pvc
to
be
a
pv
yeah,
and
this
was
a
first
attempt
and
there
were
many
discussions
happening
and
then
this
was
closed
and
then
another
attempted
by
michael
hendrickson.
A
He
started
here
and
he
proposed
another
crd,
which
would
be
storage,
transfer,
request
and
storage
transfer
approval
and
and
then
there
will
be
a
controller
which
will
detect
like
if
there
is
a
match
and
once
there
is
a
match,
the
transfer
will
be
initiated
and
again
the
pv
as
the
pv
will
be
updated.
Accordingly,
the
source
pvc
will
be
deleted
and
the
target
one
will
be
created.
A
He
also
commented
that
this
instead
of
having
these
changes
in
the
api
itself,
we
can
have
crds,
which
has
a
storage
transfer,
request
and
storage
transfer
approval,
and
then
we
will
have
external
controller
instead
of
editing
the
pv
c
controller
entry.
You
have
external
controller
to
take
care
of
this
transfer
request
approval
and
it
will
maintain
the
conditions
and
open
the
condition
will
be
matched
it
will
initiate
a
transfer.
A
A
Okay,
so
this
is
a
crd
for
storage
transfer
request.
It
will
have
the
namespace
the
target
namespace
and
the
target
name,
and
also
the
source
namespace
that's
coming
from
the
pvc.
Sorry,
the
transfer
will
happen
and
there
will
be
approval.
That's
happening
from
that
from
the
other
side
from
the
namespace
that
will
be
receiving
the
pvc,
and
this
is
a
crd
for
the
storage
transfer
approval
and
it
will
have
also
a
similar
similar
to
the
crd
of
the
exploration
request.
But
of
course
we
will
have.
A
You
know
we'll
swap
the
approvals
the
target
name,
space
and
source
name
space,
the
condition
that
the
transfer
will
be
initiated
open
are
listed
here.
So
he
assumes
that
r
refers
to
request
and
a
refers
to
approval,
and
once
these
conditions
are
matched,
then
we
can
go
ahead
and
start
transferring.
A
Also,
he
emphasized
that
once
the
matching
is
complete
and
we
start
transcript
process
then
before
before
we
start
transfer
or
one
of
the
things
that
we
have
to
do
is
to
change
the
claim
policy
of
the
pv
to
retain.
So
we
make
sure
it
will
not
be
gone
by
when
the
original
or
the
source
name.
Pvc
will
be
deleted.
A
We
will
delete
the
pvc
as
a
source
one,
and
then
we
will
bind
the
pv
to
the
target.
Pvc,
sorry
yeah
to
the
name
space
and
then
we'll
create
the
pvc
which
will
have
the
same
respects
of
the
original
one
and
how
we
bind
to
the
pv
and
then,
after
that
we
can
change
back
the
claim
policy
to
the
original
one.
A
He
also
yeah,
he
proposes
stories,
but
it's
the
same
as
the
original
kit,
but
this
is
our
very
things
are
important.
I
think
I
should
emphasize
on
that.
He
also
emphasized
that
these
things
can
be
crds
instead
of
entry
like
which
is
a
api's
entry
of
the
community
itself.
A
B
C
B
C
Yeah,
so
I
I
this
is
mike,
I
a
couple
years
ago
or
a
year
and
a
half
ago,
yeah,
I
I
I
guess
I
just
wasn't
and
I'm
still
not,
I'm
maybe
entirely
sure
what
requires
a
cap
and
what
doesn't
and
if
there
are
no
changes
to
like
kubernetes
kubernetes
it
does.
There
have
to
be
a
cup.
D
Yeah,
if
something
is
like
a
project,
that's
going
to
be
like
supported
and
sponsored
by
the
sig.
It's
still
good
to
have
a
cap
for
it.
A
Okay,
so
there
are
also
some
questions
about
what
how
to
deal
with
the
current
cases.
Yeah.
E
Just
asking
a
quick
question
on
this
one:
this
is
I
like
this
style
just
this
is
luis
and
my
question
is
on
the
crs
the
approval
one.
Is
it
a
a
namespaced
object?
Did
I
miss
that
part
yeah
they're,
both
namespaced
okay?
E
So
does
that
mean
that
the
let's
say
a
person's
q
config
only
allows
to
store
on
a
certain
name
space
as
the
target,
and
then
I
say,
okay,
I
approve
for
a
request
coming
in
from
someone
to
to
move
a
volume
to
my
namespace.
C
Yeah
so
so
I
started
working
on
something
around
these
way
of
red
hat
and
the
way
that
I
started
it
was.
I
had
a
cluster
scope
resource
where
you
could
just
define
everything
and
then
I
layered
name
space
scope
resources.
On
top
of
that
I
mean
that's
just
an
implementation
detail,
but
I
think
ultimately
you
want
the
name
space.
F
A
Okay,
so
this
is
just
test
plan
and
there
was
no
code
correct
me
for
if
I'm
wrong,
it's
good
that
you
are
here.
There
was
no
code
or
poc
for
this,
not.
C
At
the
time
no.
A
Yeah,
so
just
to
make
sure
that
we
are
on
the
same
page,
so
these
are
the
crds
and
then
christian
huffman
continued.
This
work
expanding
also
on
not
only
in
pvcs
but
also
to
one
snapshot,
and
he
also
follows
the
same
approach
as
having
crds.
As
you
can
see.
It's
almost
the
same
just
add
some
things
that
specific
to
the
secrets,
which
are
part
part
of
the
storage
class,
but
I
think
it's
the
same
approach
mainly
and
even
the
same
conditions.
A
He
just
added
some
things
like,
instead
of
instead
of
having
yeah,
we
can
have
a
finalizer
to
make
sure
that
the
bbc
source
will
be
deleted
instead
of
deleting
it
manually.
Also.
He
said
that
we
set
the
claim
policy,
as
michael
said,
yeah,
and
then
we
just
wait
for
the
pods
to
start
consuming
and
do
the
binding
and
again
reset
the
same
claim
policy
and
remove
the
finalizer.
So
we
have
a
normal
ppc
specifically
for
for
this
work,
evolving
snapshot.
A
We
would
create
the
snapshot
instead
of
the
pv
networking
space
and
do
the
binding
with
the
content.
Sorry
yeah,
one
snapshot
instead
of
pvc
and
the
volume
natural
content
instead
of
pv,
will
be
bind
to
this
on
snapshot,
and
then
we
will
delete
the
source.
One.
The
caveat
here
is
that
the
external
snap
shelter
will
be
need
to
update
the
immutability
of
some
fields.
These
are
immutable
right
now,
but
we
would
have
if
we
would
go
this
approach.
A
B
Excuse
me,
I
think
I
I
yeah.
I
think
I
added
comments
for
that.
I
think
this
one
we
it
should
not
be
should
not
be
mutable
it
should.
It
should
be
immutable.
B
B
A
Yeah
but
yeah,
of
course,
this
problem
and
that's
why
we
didn't
it's
not
implemented
yet
yeah,
and
this
is
rosetta's
plan
and
again
there
is
no
work
that
have
been
done
this
way
and
then
there
was
a
comment
on
this
christian
huffman
work,
some
masaki
kimaru,
I
don't
know
if
he
is
here,
he
talk
actually
kicked
off
the
first
approach
initiated
by.
A
Yeah
exactly,
but
instead
of
having
annotations,
he
just
added
sync
like
some
specs
to
the
pvc
specifically
to
be
on
the
same
page.
He
added
the
async,
expect
transfer
destination,
namespace
and
destination
name
and
the
source
name,
space
and
source
name.
Also,
he
added
the
status
condition
type
because
we
would
need
this
while
doing
the
binding
and
transferring
he
actually
already
implemented
poc
for
the
ideal
case,
not
any
corner
case,
and
he
had
some
tests
correct.
A
I
will
just
quickly
follow
you
over
what
he
proposed
here,
so
he
said
instead
of
doing
the
new
crds
or
api
objects,
we
can
just
add
this
field
to
the
bbc
that
I
mentioned
earlier
earlier
and
also
yeah
exactly
so
transfer
source
transfer
destination
and
the
status
condition
type.
A
This
is
an
example
for
the
things
that
will
be
added
to
the
pvc
and
then,
but
also
this
is
relying
on
user
interaction.
So
the
user
will
modify
the
pvc
as
a
source,
one.
A
You
will
specify
the
destination
in
space
and
destination
name
for
the
for
the
created
pv
and
user
b.
You
have
to
create
another
bb
c
with
the
source
destination,
namespace
and
source
name
of
the
ones
that
you
would
consume
from,
and
this
is
the
control
behavior
in
which
we
will
do
the
transfer.
A
So
he
has
to
check
the
status
first
and
then
he
has
to
change
the
condition.
I
think
there
is
actually
better
approach.
I
think
it's
more
clear
here.
If
you
can
see
he
clarified
this
with
comments
here
and
the
interaction
diagram
shows
this
very
clearly.
So
the
user
a
will
have
a
pvc.
A
and
user
b
will
have
bbc
b.
A
So
initially
bbc
a
will
be
created
and
will
be
bound
to
a
pv,
as
you
can
see
here
and
then
the
user
user,
a
will
change
the
specs
of
the
pvc
to
target
this
previous
destination
name
of
the
of
the
to
be
the
bbc
b,
which
is
this
one
and
then
the
controller
will
check
the
condition
and
we'll
start
binding
pvcb
to
the
volume
and
once
it's
bind,
we
will
do
the
unbinding
of
the
source,
pvc
and
then
we
will
change
we'll
do
the
binding
here
for
for
the
bbcb
and
then
we'll
change
the
conditions.
A
As
you
can
see
here,
the
condition
like
there's
a
phase
and
condition
both
we
check
for
both.
So
here
he's
here's
a
condition
is
bound,
but
sorry
the
phase
is
bound,
but
the
condition
is
transferring,
and
here
the
phase
is
bending
waiting
for
it
to
be
transferred,
but
the
condition
is
receiving
here
after
it's
already
bound.
So
we
have
to
unbind
this
from
the
pvc
a
so
we
just
set
it
to
lost
and
already
transferred,
and
then
we
can
go
ahead
and
declare
this
as
bound
to
the
bbcb.
A
He
also
actually
added
here
that
he
had
twisted
this
normal
cases.
Only.
He
created
pve
c
number
one
here
and
then
he
after
his
bound
and
then
he
modified
this
added
the
spec.
A
Yeah
and
from
these
comments
he
just
like
here
he's
following
up
on
this:
he
he
said
that,
from
his
point
of
view,
this
is
better
than
crv
or
the
api
changes,
and
also
we
can,
after
that
wrap
this
into
another
implementation
to
target
volume,
snapshot.
A
However,
the
last
thing
was
that
he
like
just
wanted
to
show
you
that
he
had
already
poc,
so
he
actually,
this
one
was
the
main
thing,
the
biggest
changes
and
he
just
checked
for
conditions
in
the
attached
touch,
controller
and
the
pve
controller
and
open
these
conditions.
He
implements
the
changes
and
also
he
did
not
actually
make
a
lot
of
changes
inside
because
he
used
the
util
functions
which
take
a
bbc
or
pv
and
do
the
most
of
the
logic.
A
From
his
point
of
view,
this
is
actually
a
working
implementation,
but
it's
in
my
opinion.
We
have
to
make
changes
for
the
entry
and
I
think
the
crb
approach
is
better.
Maybe
it's
quite
harder
to
implement,
but
it's
much
more
bitter
and
I
just
want
to
go
yeah
to
here
where
he
proposed
exchange
yeah.
So
this
is
a
most
recent
changes
for
this
kit
and
I
would
like
to
hear
from
you
your
opinions
and
how
we
can
proceed
with
that.
From
your
point
of
view,.
E
I'm
fairly
new,
but
but
thank
you
so
much
mustafa
for
the
summary
you
have
given
the
from
my
point
of
view
again
very
new.
I
feel
that
transferring
ownership
over
storage
volume
we
have
to
be
very
careful
on
that
because
of
the
security
implement
situations
that
we
could
cause
by
transferring
the
ownership
of
some
data
volume
to
from
one
namespace
to
another.
So
I
I
really
like
the
acceptance
model
because
it
is
trackable,
it's
audible
and
it
it
kind
of
maintains
a
level
of
security.
E
Saying
I
allow
this
volume
to
be
transferred.
I
understand
that
we
can
transfer.
You
know
with
the
other
models,
but
from
a
multi-tenant
point
of
view,
I
I
feel
that
is
very
necessary
to
be
very
careful
on
how
we
do
that.
So
I
I
like-
and
I'm
not
talking
about
implementation,
I'm
talking
about
mainly
the
usability
of
it.
I
I
feel
that
you
know
it
feels
better
to
have
that
type
of
model.
It's
almost
like
a
cert
request,
an
acceptance
model
there
it's
already
in
kubernetes.
G
Yeah,
I
know
I
know
when
we
when
we
initially
started
looking
at
this
one
of
the
one
of
the
reasons
for
the
the
cr
and
the
transfer
requests
and
stuff
like
that
was,
was
exactly
that.
That
was
actually
a
big
part
of
it.
A
big
part
of
it
was
one
being
very
explicit
in
in
actually
making
one
of
these
transfers
take
place,
but
the
other
was
also
in
terms
of
it
gave
an
audit
trail
in
terms
of
the
objects
that
were
created
in
the
events
and
everything
else.
G
Now
I
I
don't
know
I
mean
you
may
be
able
to
achieve
that
same
thing
with
with
the
alternate
proposal
of
just
modifying
the
pvc.
That's
certainly
neat,
for
some
reason.
It
just
seems
to
me.
We
talked
about
that
and
I
thought
it
was
something
we
decided
wasn't
doable
or
a
good
idea,
but
things
change.
C
The
other
thing
about
the
api
is
just.
It
applies
to
many
types.
Obviously,
the
p,
the
pvc
one
is
specific
to
pvc
editing.
You
know
the
people
so
having
a
generic
kind
of
transfer
api
could
be
useful
for
more
resources,
different
resource
types,
so
you
know
the
pvc
and
snapshot
api
would
basically
be
the
same.
C
I
think
that
that
was
another
argument
for
the
request,
the
crd
approach
and
yeah.
I
I
don't
know
that
semantically
like
if
someone
has
edit
permission
to
a
pvc,
does
that
really
give
them
the
right
to
you
know,
give
it
to
their
friend
in
another
namespace.
I
don't
know
that's
right.
G
A
B
A
I
actually
myself
also
like
the
crd
approach.
The
question
is,
would
we
make
changes
in
the
pvec
or
sorry
make
controller
and
three
changes,
or
we
should
have
external
controller
to
take
care
of
that.
B
Okay,
so
the
implementation-
I
think
this
can
be.
This
can
be
an
external
controller
right.
It
does
not
have
to
be
added
if
okay,
so
if
we
are
doing
this
indentation
using
the
approach
that
modify
the
pvc
itself,
then
it
has
to
be
intriguing.
Modifying
the
entry
controller
mustafa
does
the
okay.
I
actually
did
not
look
at
the
the
poc,
the
third
with
the
which
time
is
it
the
fourth
attempt
actually
brought
up
by
osaka?
A
G
G
B
G
Yeah
right
and
what
I
was,
what
I
was
actually
wondering
is
to
the
question
of
whether
you
could
modify
the
existing
pv
and
pvc
controllers
right
even
with
the
cr.
D
The
the
question
is:
is
either
way:
are
there
potential
changes
to
certain
states
or
conditions
that
would
require
changes
to
the
entry
controller
like
even
if
even.
G
D
C
So
yeah
I've
got
something
similar
to
the
crd
approach
that
I've
implemented
and
I
think
that
there
would
be
some
nice
synchronization
if,
if
we
could
do
things
in
the
pv
controller,
like
you
know,
I
I
think
everything
work
you
can
make
everything
work
in
with
an
external
controller,
but
it
it
is
a
little
can
be
a
little
racy
like.
C
So,
if
you
know
at
one
moment
the
you
know,
no
pods
are
using
the
pvc
and
then
you
start
this
transfer
process
and
then
a
pod
starts
using
the
pvc
you're
going
to
have
to
you
may
be.
You
know
in
the
middle
of
a
transfer,
then
you're
going
to
have
to
wait
for
that
pvc
to
become
unbound
again,
where
you
wouldn't
get
in
such
states.
If
it
was
in
the
pv
controller,
probably.
C
I
I
think
that
it
would,
in
some
cases,
give
us
extra
nice
synchronization
if
we
did
have
and.
B
C
The
problem
is
it's
just
you
know
what
what
could
happen
is
you
know
we
do
all
the
matching
that
we
talked
about
earlier
and
then
we
start
the
actual
transfer
process
and
you
know
we
have
to
wait
until
no
pods
are
using
the
pvc
and
that's
fine,
but
then
you
can
start
moving
things
over
and
then,
if
someone
starts
using
the
new
pvc
before
it's
deleted,
you're
gonna
be
in
this
weird
waiting
pattern
where
you
started
to
transfer,
but
it
was
interrupted.
C
Maybe
you
know
the
controller
was
written,
so
it'll
eventually
converge,
but
if
you
know
the
same
controller
that
was
doing
the
transfer
was
you
know
the
pv
controller,
I
guess
maybe
for
it
wouldn't
make
that
pv
or
pvc
available
to
the
to
another
pod.
C
So
I've
done
everything
out
of
tree
and
it
was
didn't
need
anything,
but
I
think
it
may
be.
It
may
be
cleaner
to
do
it
entry.
I
don't
know
if
we
want
to
right.
B
I'm
just
saying,
but
if
we
are
doing
entry
we
does
it
require
us
to
add
some
like
new
states
to.
I
don't
think
it's
required.
C
Like
to
have
some
way
to
like
to
say.
B
C
C
Yeah,
so
I
there's
definitely
yeah,
so
we
basically
have
to
wait
until
no
pods
are
using
the
pvc
and
then
delete
the
source.
Pvc
and
then
once
that
thing
is
really
gone,
is
when
you
know
that
no
no
one
else
is
using
it,
and
then
you
can
create
the
new
pvc
and
up
you
know,
update
the
pv
reference
and
all
that.
B
But
do
you
even
allow
so
who
is
going
to
delete,
so
you
just
wait
for
somebody
else
to
delete
those
right.
I
mean
the
pods
that
are
using
the
pvc.
Do
you
yeah
so
when.
B
G
You
still
have
to
wait,
but
the
the
thing
that
mic
that
I
think
mike
is
pointing
out
and
the
way
I
was
gonna.
I
was
gonna
cheat
for
this,
but
but
the
issue
is
what
can
happen
is,
as
the
pod
can
release
the
volume
all
right
and
then
what
happens
is
this?
G
This
transfer
process
kicks
off
or
or
at
least
it
starts,
but
at
the
same
time-
or
you
know,
milliseconds
or
seconds
after
or
whatever
another
pod
is,
is
launched
that
attaches
that
pvc,
so
you've
got
a
scenario
there
where,
where
bad
things
can
happen
right,
what
I
was
going
to
do
is
actually
just
cheat
and
reuse
the
in-use
status
and
and
say
that
it
was
in
use
by
the
by
the
transfer
process.
I
don't
that's
not
very
it's
not
very
cool,
but.
D
It's
good
to
think
you
know
think
through
the
scenarios
and
and
see
if
the
race
is
already
covered
by
our
existing
finalizers.
B
C
Yeah,
he
didn't
think
that
the
existing
finalizer
would
work
but
yeah
something
new.
That
would
just
mark
the
pvc
to
not
be
you
know,
assigned
to
any
more
pods.
B
D
So
is
someone
taking
notes
on
sort
of
next
steps?
I
think
that
might
be
good.
B
D
B
D
So
I
guess
it
sounds
like
you
know.
Most
of
the
folks
here
prefer
the
crd
approach.
D
A
You
know
I
just
want
to
say,
like
usually,
we
should
start
from
somewhere
and
then
under
testing.
We
will
figure
out
these
corner
cases.
We
cannot
get
everything
right
from
the
first
shot.
I
guess.
B
Yeah,
I
think
we
probably
at
least
need
to
write
down
the
you
know
the
problems.
Let's
say
if
we
sounds
like
more
people
likes
the
crd
approach.
Let's
say:
if
we
use
this
approach,
I
think
we
should
at
least
write
down
what
are
the
risk
conditions?
B
Maybe
you
can
also
sync
up
with
a
mic
of
languages
that
you
get
because
it
looks
like
he
had
to
have
down
the
work
implements
external,
so
like
the
external
controller.
So
what
are
the
problems
that
he
run
into
and
maybe
at
least
we
should
write
down
those
problems
and
then
see
if
we
can
do
better.
C
B
A
Would
it
be
possible
that
we
continue
in
this
document?
Everyone
can
share
what
his
souls
anything
comes
to
him
and
his
mind,
and
then
I
mean
like
regarding
the
corner
cases
or
things,
and
then
we
can.
I
can
take
it
from
here.
C
Yeah
yeah,
I
I
closed
out
my
cap
because
I
thought
christian
huffman
was
continuing
it,
but
if
someone
else
wants
to
create
a
new
one
or
or
I
reopen
mine
and
or
I
don't
know,
we
can
say
bernie's
offline
or
something,
but
I
stepped
away
from
this
for
a
while,
but
I'm
willing
to
come
in
and
and
help
a
little
bit
now.
If
you
know,
if
that's
good
to
whoever
is
wants
to
be
in
charge
of
things
now,.
A
Sure
thing
I
mean
like
it's,
not
I'm
not
in
charge,
just
I'm
trying
to
revive
it
a
bit
and,
of
course,
everyone
who
wants
to
help
is
more
than.
A
A
All
right
just
for
everyone,
who's
in
the
call
who
has
any
saying
or
current
cases
came
in
mind.
Would
you
please
just
share
it
in
the
document
would
be
highly
appreciated
and
yeah.
So
I
think
also
the
the
crd
approach.
I
I
believe
so
it's
better
as
well.
F
C
The
main
thing
that
I
encountered
in
implementing
this
was
there
were
certain
time
in
times
when
you
would
could
make
some
metadata
updates
and,
like
the
pb
controller,
would
generate
an
event
that
you
probably
don't
want.
So
I
had
to
make
sure
to
get
the
order
of
things
correct
so
that
they
weren't
ever
like
two
pvcs
pointing
to
the
same
pb.
That
would
signal
an
event
I
think,
but
yeah.
So
I
can
kind
of
write
down
my
learnings
in
this
document
or
some
other
document.
A
All
right,
so
I
think
from
my
side
I
don't
have
anything
more
to
say,
but
I'm
always
hoping
for
comments,
discussions
and
yeah,
although
we
can
pick
it
from
here.
B
Yeah
sounds
good,
so
yeah,
so
basically
the
next
two
steps
is
just
to
write
down
your
comments,
your
suggestions
in
in
the
stock.
So
I
think
this
is
already.
B
D
No,
I
think
when,
when
we're
getting
closer
to
actually
getting
a
design
ready
for
review,
I
think
it
would
also
be
good
to
just
have
a
section
talking
about
the
previous
and
alternate
designs,
and
you
know
pros
and
cons
and
sort
of
why
we
decided
to
go
with
this
approach.
I
think
that
would
be
helpful
for
the
reviewers.
B
Yeah
definitely
yeah,
so
at
least
this
way
we.
If
there
are
other
comments,
then
we
say:
okay,
this
is
already
covered
yeah,
so
at
least
we
we
have
a
record
of
all
of
those.
B
All
right,
then,
okay,
if
there's
a
nothing
else,.
C
B
Yeah,
so
basically
so
christian
says
he's
he
does
not
have
psycho
to
work
on
it
anymore.
So
mustafa
has
agreed
to
pick
it
up.
So
that's
why
you
know
he
is.
You
know
driving
this.
B
So
I
think,
maybe
after
we
consolidated
the
of
ideas
in
the
stock
and
mostafa
you
can
you
can
maybe
submit
another
cuff
or
you
can.
I
don't
know
if
you
want
to
continue
on
questions.
I
don't
know
which
one
is
easier.
I
think
it's
up
to
you.
A
Yeah
sure
so
I
think
christian
one
has
the
most
recent
thing,
so
I
can
take
it
from
here.
Yes,
I
create
a
new
kit
with
a
new
changes
that
we
will
make
and
the
final
approach
we
will
take
over
and
yeah.
I
can
lose
okay.
C
Great
I'll
I'll
I'll
write
down
as
much
as
I
can
in
this
document.