Thursday, 2023-04-06

opendevreviewMerged openstack/openstack-ansible-os_glance master: Disable uWSGI if ceph is used as a store  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/87937000:13
opendevreviewMerged openstack/openstack-ansible stable/zed: Disable CentOS LXC jobs due to the bug in systemd packaging  https://review.opendev.org/c/openstack/openstack-ansible/+/87939900:18
noonedeadpunkNeilHanlon: yeah, and there's no direct flight between these...08:07
noonedeadpunkwe'd need to land this to unblock Y https://review.opendev.org/c/openstack/openstack-ansible/+/87940008:11
noonedeadpunkalso for haproxy stuff next one seems to be this https://review.opendev.org/c/openstack/openstack-ansible/+/876851/908:14
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_glance stable/zed: Disable uWSGI if ceph is used as a store  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/87969708:57
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_glance stable/yoga: Disable uWSGI if ceph is used as a store  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/87969808:57
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_glance stable/xena: Disable uWSGI if ceph is used as a store  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/87969908:57
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-rabbitmq_server master: Switch rabbitmq repo back to packagecloud  https://review.opendev.org/c/openstack/openstack-ansible-rabbitmq_server/+/87973209:46
noonedeadpunkok, gates broken again with centos :)09:54
damiandabrowski[*]10:10
noonedeadpunkI probably should focus on fixing upgrade for mariadb for rhel though...10:11
noonedeadpunkwhich is also broken due to gpg keys mess10:11
noonedeadpunkso during upgrade new key somehow is not imported10:12
noonedeadpunkNeilHanlon: don't you accidentally have some meetings with Storage SIG as well ? :D10:19
opendevreviewDamian DÄ…browski proposed openstack/openstack-ansible-os_neutron master: Add TLS support to neutron_server backends  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/87365413:43
damiandabrowskihey folks, I have 2 questions.13:52
damiandabrowski1. Currently we define something like `haproxy_backend_ssl: "{{ placement_backend_https | default(False) }}"`13:52
damiandabrowskiDmitriy suggested to rename `<service>_backend_https` to `<service>_backend_ssl` to be more consistent. Do you see any arguments against that?13:52
damiandabrowski2. `playbooks/common-playbooks/haproxy-service-config.yml` is not aware of role defaults. So if we have this in service defs:13:52
damiandabrowski`haproxy_backend_ssl: "{{ glance_backend_https | default(False) }}"`13:52
damiandabrowskiand this in role defaults:13:52
damiandabrowski`glance_backend_https: "{{ glance_use_uwsgi | ternary(openstack_backend_service_https | default(False), False) }}"`13:52
damiandabrowskiExplicitly defining openstack_backend_service_https does not work.13:52
damiandabrowskiThe only way I see to fix it is to "duplicate" the logic twice(in role defaults and haproxy service definition), so:13:52
damiandabrowski`haproxy_backend_ssl: "{{ (glance_use_uwsgi | default(True)) | ternary(openstack_backend_service_https | default(False), False) }}"`13:52
damiandabrowskiDo you see any more optimal way to get it working?13:52
noonedeadpunkfor 1 I have really vague memories about some discussion that took place, so maybe we agreed to use _https, but I just forgot13:53
noonedeadpunkjrosser: can you recall anything regarding that?13:54
jrosseri cant remember anything specific13:55
jrosserbut also on this generally i really do not like using role default values outside the scope of the role13:56
jrossereven though it might work when vars and stuff are "flattened" at runtime it is very confusing from a hierachy point of view13:56
noonedeadpunkwell, the only way to avoid that is to call haproxy role from scope of service roles13:57
noonedeadpunkie, include_role: haproxy_server \n tasks_from:  haproxy_service_config_external.yml13:58
noonedeadpunkthat would solve second question as well 13:59
jrosseror we have a per service `openstack_glance_backend_service_https`defined in group_vars/all which drives down into both the glance role default and the haproxy_backend_ssl setting14:04
jrosserthat would probably b my preference, to have extra vars with more obviousness/structure14:04
jrosserwith what we proposed for using add_host i expect that 'global' setting might also work in group_vars/glance_all.yml14:08
noonedeadpunkI thought we're trying to reduce overall amount of variables as they slow down runtime14:08
damiandabrowskijrosser: how do you see role defaults then?14:08
damiandabrowski`glance_backend_https: "{{ glance_use_uwsgi | ternary(openstack_glance_backend_service_https | default(False), False) }}"`14:09
damiandabrowski?14:09
jrosseri'm not sure i understand what you're asking, but i see a role default as a var that is used inside that role14:09
jrosserand set by the default value, or something outside the role14:09
jrosserbut is really not referred to outside that role14:10
noonedeadpunkWe did quite some work to clean-up group_vars and move stuff just to defaults, as these group_vars are not really obvious at all14:10
noonedeadpunknot saying they're not really documented14:10
damiandabrowskii'm asking how do we want to link glance_backend_https and openstack_glance_backend_service_https in this case, because they will be used differently but always need to have the same value14:11
damiandabrowskiglance_backend_https will be responsible for configuring glance to handle TLS(configure uwsgi, create certs etc)14:12
noonedeadpunkand we'd need some top level var to rule them all as well then14:12
damiandabrowskiwhile openstack_glance_backend_service_https will be used to tell haproxy to communicate with glance backends over TLS14:12
jrosserarent we all saying the same thing? :)14:13
noonedeadpunkI think I'm leaning towards just calling haproxy role from inside service roles.... 14:13
noonedeadpunkNah, I don't know, maybe we are :)14:13
jrosserme neither tbh14:13
noonedeadpunkgive me a sec then14:14
jrosseri ws trying to say that openstack_glance_backend_service_https was a more widely scoped var that would be able to be used for both setting the glance role default and also to set the haproxy backend mode14:14
damiandabrowskiso do you agree that in this case we should define this in glance defaults?14:15
damiandabrowski`glance_backend_https: "{{ glance_use_uwsgi | ternary(openstack_glance_backend_service_https | default(False), False) }}"`14:15
damiandabrowski(i just want to confirm we have the same idea)14:15
jrosserwe could do that yes14:15
noonedeadpunkI think you mean smth like that? https://paste.openstack.org/show/bt3ecdvA6otEyi6RbCSJ/14:16
damiandabrowskiyes, except that glance_backend_https logic can't be that simple because TLS backend will not work without uwsgi :D 14:17
jrosseryes - i admit it is an extra var14:17
damiandabrowskibut that's an exception probably only for glance14:17
noonedeadpunkthe problem here indeed is that we need to know about uwsgi from upper scope14:17
noonedeadpunkwhich is another level of mess, that can be solved only from role level to be frank. but yes, that's more of exception14:18
damiandabrowskior not and just write a appropriate comment in group_vars/glance_all14:18
jrosserand ultimately that is driven from something not to do with glance at all14:18
jrosserright at the start of this variable scope work i did think that we would just swap one kind of mess for another14:21
jrosserneed to be mindful that ansible is not a programming language14:22
jrosserand it totally prefers flat structures rather than hierarchy for pretty much everything14:22
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-galera_server master: Define GPG key for repo  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/87968014:29
noonedeadpunksooo... what should we do with all that then ?:)14:45
jrosserit probably comes down to just accepting that for some things we can't tightly scope the vars and they need to be more global than is ideal14:48
noonedeadpunkdamiandabrowski: maybe we should move glance uwsgi logic to group_vars/all or smth? or duplicate it indeed....14:51
noonedeadpunkbut yeah, we kinda moving mess from 1 place into multiple places14:52
noonedeadpunkand maybe it's worth re-evaluating how valuable it is to have group_vars applied for services rather then for haproxy14:53
noonedeadpunkwhile still configuring haproxy backends inside service playbooks rather then globally one time14:56
noonedeadpunkthat would leave mess in 1 place and kind simplify couple of things14:56
noonedeadpunkto be frank I still don't quite get it, why to configure backend on haproxy hosts I should use glance group_vars...14:59
noonedeadpunkok, I've re-read blueprint and it makes more sense now :D15:11
NeilHanlonnoonedeadpunk: uh oh what is broken in storage 😅15:11
noonedeadpunkNeilHanlon: same - gpg signature...15:12
NeilHanloni'll go poke15:12
noonedeadpunkSo what's in  centos-release-gluster9 and https://www.centos.org/keys/RPM-GPG-KEY-CentOS-SIG-Storage are different things15:12
noonedeadpunkand centos-release-gluster9 is sha-1 which's ignored15:13
noonedeadpunk*what is in15:13
damiandabrowskinoonedeadpunk: haha great you were able to find an answer on your own :D I think we kind of agreed what to try now, I'll push some patches later today15:14
damiandabrowskibut I need to leave now :D 15:15
jrossertbh i never really saw having tons of vars for groups/haproxy_all as actually a bad thing15:39
jrosserbecause they only exist when running plays against haproxy group, which is when you need them15:39
jrosserand i think this is why i was not in favour of conflating two things in the spec15:40
jrosserbut anyway15:40
noonedeadpunkI think it's not ton of vars, but it's just confusing to define neutron_plugin_type in haproxy_all, so you instictively place such vars under proper group_vars and then see haproxy misbehaving15:51
noonedeadpunkbut indeed15:57
noonedeadpunkIf we implement out of role scope vars, like  https://paste.openstack.org/show/bt3ecdvA6otEyi6RbCSJ/ - we may leave haproxy service definition in haproxy_all15:57
noonedeadpunkor not...15:57
noonedeadpunkugh15:57
jrosserwe can always split the patches up further16:02
jrossermerge the parts to do with configuring haproxy in each playbook if we’re happy with how that is16:02
jrosserand if the vars structure is not right we fix that as it’s own piece of work16:03
noonedeadpunkit's a bit more tricky to be frank16:05
noonedeadpunkas then we won't need this https://review.opendev.org/c/openstack/openstack-ansible/+/871189/27/playbooks/common-playbooks/haproxy-service-config.yml and you will need to patch all playbooks again to re-add it in another patch16:07
noonedeadpunkand that task will be quite different overall16:07
noonedeadpunkas you can simply pass `service_variable` directly to the role import with vars16:08
noonedeadpunknothing too hard, but not sure why this extra work is really required16:08
noonedeadpunkI don't see any real flaws in https://review.opendev.org/c/openstack/openstack-ansible/+/871189 except some nits16:09
noonedeadpunkso, https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/879680 looks quite good. I wonder though, if we should simplify galera_gpg_keys format, as absent keys won't be respected there anyway, for example16:56
noonedeadpunkI tried to avoid changing behaviour, but rpm_key is just weird, as I can't really remove key with it16:57
noonedeadpunkand https://review.opendev.org/c/openstack/openstack-ansible/+/879671 is happy now as well)17:51
jrosserwith 879671 we should probably demote centos to experimental in the compatibility matrix19:52
jrosserand add a note to the documentation19:52
jrosserfollow on patch ^19:52
-opendevstatus- NOTICE: The Gerrit service on review.opendev.org will be offline for extended periods between 22:00 and 00:00 UTC for software upgrades and project renames: https://lists.opendev.org/archives/list/service-announce@lists.opendev.org/thread/VW2O56AXI4OX34CWDNRNZDCWJDZR3QJP/21:04
opendevreviewDamian DÄ…browski proposed openstack/openstack-ansible master: Enable TLS frontend for repo_server by default  https://review.opendev.org/c/openstack/openstack-ansible/+/87642621:24
-opendevstatus- NOTICE: The Gerrit service on review.opendev.org will be offline for extended periods over the next two hours for software upgrades and project renames: https://lists.opendev.org/archives/list/service-announce@lists.opendev.org/thread/VW2O56AXI4OX34CWDNRNZDCWJDZR3QJP/21:58
opendevreviewMerged openstack/openstack-ansible-galera_server master: Define GPG key for repo  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/87968022:51
opendevreviewDamian DÄ…browski proposed openstack/openstack-ansible master: Implement separated haproxy service config  https://review.opendev.org/c/openstack/openstack-ansible/+/87118923:02
opendevreviewDamian DÄ…browski proposed openstack/openstack-ansible master: Add support for TLS backends  https://review.opendev.org/c/openstack/openstack-ansible/+/87908523:02
opendevreviewDamian DÄ…browski proposed openstack/openstack-ansible master: [DNM] Enable openstack_backend_service_https  https://review.opendev.org/c/openstack/openstack-ansible/+/87950123:02
opendevreviewDamian DÄ…browski proposed openstack/openstack-ansible master: Rename openstack_haproxy_horizon_stick_table variable  https://review.opendev.org/c/openstack/openstack-ansible/+/87979123:02
opendevreviewDamian DÄ…browski proposed openstack/openstack-ansible-os_placement master: Add TLS support to placement backends  https://review.opendev.org/c/openstack/openstack-ansible-os_placement/+/87938023:16
opendevreviewDamian DÄ…browski proposed openstack/openstack-ansible master: Implement separated haproxy service config  https://review.opendev.org/c/openstack/openstack-ansible/+/87118923:22
opendevreviewDamian DÄ…browski proposed openstack/openstack-ansible master: Rename openstack_haproxy_horizon_stick_table variable  https://review.opendev.org/c/openstack/openstack-ansible/+/87979123:22
opendevreviewDamian DÄ…browski proposed openstack/openstack-ansible master: Add support for TLS backends  https://review.opendev.org/c/openstack/openstack-ansible/+/87908523:22
opendevreviewDamian DÄ…browski proposed openstack/openstack-ansible master: [DNM] Enable openstack_service_backend_ssl  https://review.opendev.org/c/openstack/openstack-ansible/+/87950123:22

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!