Saturday, 2022-06-18

opendevreviewMerged openstack/openstack-ansible-os_gnocchi master: Control amount of metricd workers  https://review.opendev.org/c/openstack/openstack-ansible-os_gnocchi/+/84634700:39
opendevreviewMerged openstack/openstack-ansible-os_gnocchi master: Support service tokens  https://review.opendev.org/c/openstack/openstack-ansible-os_gnocchi/+/84603000:39
opendevreviewMerged openstack/openstack-ansible-os_ironic master: Allow redhat vars file to cover different RHEL derivatives  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/84402107:25
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_magnum master: Fixed dest typo in config_template  https://review.opendev.org/c/openstack/openstack-ansible-os_magnum/+/84599307:42
noonedeadpunksooo. by far what needs reviews are: https://review.opendev.org/c/openstack/openstack-ansible-plugins/+/846440 https://review.opendev.org/c/openstack/openstack-ansible-os_masakari/+/846035 and https://review.opendev.org/c/openstack/openstack-ansible-os_octavia/+/84591307:43
noonedeadpunkAnd I guess that's kind of it? Except also some potential love that is needed for https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/84404107:44
noonedeadpunkjrosser_: btw we can't use config_template here ^ Templates are ini sysctl/weird format https://opendev.org/openstack/neutron-vpnaas/src/branch/master/neutron_vpnaas/services/vpn/device_drivers/template07:53
noonedeadpunkso this is potentially best thing we can do07:53
noonedeadpunkor well...07:54
jrosser_morning07:56
jrosser_right - also templating out a template which needs to be full of {{ }} in the output is going to be ugly07:58
jrosser_not sure theres anything i can vote on07:59
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_neutron master: Allow to provide custom configuration for VPNaaS  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/84404108:00
noonedeadpunknah, you did what you could and even more ;)08:00
jrosser_if you want to push stuff through to get an rc then i'm sure thats fine08:01
noonedeadpunkexcept 846440 I believe08:02
noonedeadpunkdamiandabrowski[m]: mgariepy spotz[m] if you have several spare minutes today would be great if you could do just few reviews (patches mentioned 10msgs above)08:03
noonedeadpunkI won't be able to push for RC until evening, anyway. Also I need to recall how I did things :D As I guess we do branching of roles first, and then RC only08:05
noonedeadpunkAs likely from rc1 even we can do final release. as anyway stable is made from some rc08:06
noonedeadpunkbut likely we need rc2 as after roles branching we need to update docs and merge gitreviews and stuff...08:08
noonedeadpunkbut seeing how relatively good staff passed, I think we're good time-wise 08:09
noonedeadpunkccccccvcvrvvvcbifvujceutgfttlvjbvlvtrbcljbfl08:13
noonedeadpunkuh08:13
noonedeadpunkhate this stuff..08:14
damiandabrowski[m]noonedeadpunk: done ;)09:28
noonedeadpunkregarding horizon and centos 9 it's interesting. I beleive it has smth to do with selinux as look at this https://paste.openstack.org/show/bH8zfbLDgdQ1ihbIff9V/10:39
noonedeadpunkif check also haproxy log it's even better https://paste.openstack.org/show/blHJA3NiFBI7ZVctjTQX/10:42
noonedeadpunkjust in case - selinux is "permissive"10:42
noonedeadpunkbut I see it "acting" at least in logs...10:45
noonedeadpunknot for this case though10:46
opendevreviewMerged openstack/openstack-ansible-plugins master: Let git choose the branch when cloning a repo  https://review.opendev.org/c/openstack/openstack-ansible-plugins/+/84644010:53
noonedeadpunksmth is super messed about apache in centos9 stream...10:54
noonedeadpunkOk, I spotted huge problem with https://opendev.org/openstack/ansible-role-systemd_service/src/commit/46185f389eb8dc14c70b82b820cfe288df4a20e8/tasks/main.yml#L3310:59
noonedeadpunkbasically after reboot of host services do not start as that directory under run does not exist10:59
jrosser_should we use RuntimeDirectory= in the unit for that instead?11:01
noonedeadpunkwell, we rely on systemd-tmpfiles to create that11:02
noonedeadpunkAnd basically there's no systemd-tmpfiles-setup.service 11:03
noonedeadpunkonly systemd-tmpfiles-setup-dev.service11:03
jrosser_right - i had to patch that out of the centos-9 lxc container creation stuff11:03
jrosser_as the services were missing11:03
noonedeadpunkor well...11:04
noonedeadpunkfor some reason it's dead11:04
noonedeadpunkhttps://paste.openstack.org/show/bQxbT1G6aZWLgbBLNNez/11:05
noonedeadpunkI have metal aio fwiw11:05
jrosser_ah ok11:05
jrosser_btw here is what happened for the lxc stuff https://opendev.org/openstack/openstack-ansible-lxc_hosts/commit/fd23eeedfc2a28556278abc03f722ae17dd7799011:05
noonedeadpunkyeah, you can't just enable it as it has no installation target?11:07
noonedeadpunkwell, as I started it manually it jsut worked...11:07
noonedeadpunkI believe it also misses some dependency and that's why it failed...11:07
noonedeadpunkUh, CentOS11:07
noonedeadpunkok, so I fully disabled selinux, but this is still the case https://paste.openstack.org/show/blHJA3NiFBI7ZVctjTQX/11:09
opendevreviewMerged openstack/openstack-ansible-os_masakari master: Support service tokens  https://review.opendev.org/c/openstack/openstack-ansible-os_masakari/+/84603511:11
noonedeadpunkwtf....11:12
noonedeadpunkI wonder if that's actualy CSP that interferres11:15
noonedeadpunkit's not. But direct connection to apache works11:17
noonedeadpunkah, yes11:17
noonedeadpunkit's content security11:17
opendevreviewMerged openstack/openstack-ansible-os_ironic master: Support service tokens  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/84603311:21
noonedeadpunkIt can lead to haproxy version, as centos 9 stream has 2.4.7 haproxy11:23
opendevreviewMerged openstack/openstack-ansible-os_octavia master: Support service tokens  https://review.opendev.org/c/openstack/openstack-ansible-os_octavia/+/84591311:27
noonedeadpunkI wnder if same will happen in Jammy11:30
noonedeadpunkand report only doesn't help to avoid 500...11:37
noonedeadpunkI have no idea why this fails with current CSP....11:44
noonedeadpunkAnd why report only still results in 50011:44
noonedeadpunkI believe it's smth specific to haproxy changes rahter then rules11:44
jrosser_isnt CSP all decided in the browser though, it's just headers at the server side12:01
jrosser_all the fixing of that i needed to do was with chrome/firefox debug console12:02
noonedeadpunkwell yes... But likely smth is now done on haproxy  part. As soon as I comment `http-response set-header Permissions-Policy` OR `http-response set-header Content-Security-Policy-Report-Only` I recieve content instead of 50012:04
noonedeadpunkat the same time it's even more wierd12:04
noonedeadpunkhttps://paste.openstack.org/show/b5hJjAjcIn0mhak5qmSK/12:04
noonedeadpunkSo I really no idea wtf12:05
noonedeadpunkNeed to test on Ubuntu 22.04... My guess would be it has same thing12:06
noonedeadpunkBut now need to go, so later today...12:07
noonedeadpunkso maybe these are some buffers or dunno what... As 500 occurs when it's content, but absolutely fine if you ask jsut for headers12:08
opendevreviewMerged openstack/openstack-ansible-os_magnum master: Fixed dest typo in config_template  https://review.opendev.org/c/openstack/openstack-ansible-os_magnum/+/84599312:22
jrosser_this looks relevant https://github.com/haproxy/haproxy/issues/159715:48
jrosser_there is some quite good explanation in the comments15:49
noonedeadpunkit's interesting18:07
noonedeadpunkbut wrew counter is empty fwiw18:07
noonedeadpunkbut! that really did work18:12
noonedeadpunkthanks jrosser_, I kind of checked counter and moved on...18:13
noonedeadpunkbut likely I checked wrong one.... 18:13
jrosser_oh that haproxy bug already references OSA as triggering it18:27
noonedeadpunkwell... not sure is it good or bad...18:57
noonedeadpunkhm, it also hits ubuntu 20.0418:59
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-haproxy_server master: Don't restrict haproxy tunable options  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/84647319:05
noonedeadpunkI hope that would cover it ^19:05
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_horizon master: Fix ALLOWED_HOSTS  https://review.opendev.org/c/openstack/openstack-ansible-os_horizon/+/84481519:06
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-haproxy_server master: Don't restrict haproxy tunable options  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/84647319:10
noonedeadpunkrealized that ubuntu 20.04 was still runnign haproxy 2.519:11
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-haproxy_server master: Don't restrict haproxy tunable options  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/84647319:12
opendevreviewMerged openstack/openstack-ansible-os_aodh master: Support service tokens  https://review.opendev.org/c/openstack/openstack-ansible-os_aodh/+/84601023:39

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!