Thursday, 2023-06-22

noonedeadpunkI kinda wonder, if binding haproxy to an interface might solve the issue? As then you kinda don't care about IPs anymore, just domain00:17
noonedeadpunkjrosser: you might be interested in this: https://github.com/rabbitmq/erlang-debian-package/discussions/33 - thanks and kudos to our kolla friends :)00:28
anskiyhttps://github.com/gnocchixyz/gnocchi/issues/1304 :(07:45
noonedeadpunkwe used to maintain setuptools version in global-requirement-pins.txt08:57
noonedeadpunkbut we've dropped it once it was added to u-c back in yoga08:58
noonedeadpunkSounds like we should return it there08:58
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Pin version of setuptools  https://review.opendev.org/c/openstack/openstack-ansible/+/88673109:04
noonedeadpunkanskiy1: ^09:04
jrosseris it still in u-c?09:05
noonedeadpunknope09:06
noonedeadpunkwas dropped after Yoga09:06
jrosseraha09:07
anskiy1noonedeadpunk: I wonder if pinning it for every venv could break something09:26
noonedeadpunkI would be really surprised if it will09:27
jrossermore likley to stabilise things rather than break09:27
noonedeadpunkbut major breaking upgrades for sure can break things retrospectively09:27
noonedeadpunk(upgrades of setuptools)09:28
noonedeadpunkas chances of 2y software to be compatible with brand new setuptools are quite vague09:28
noonedeadpunkas it could be released before they've marked some feature for deprecation09:28
anskiy1well, it looks like the actual problem is within gnocchi, as it uses pyproject.toml, which, if I understood correctly, uses his `build-system.requires` and installs latest setuptools :(11:12
opendevreviewMerged openstack/openstack-ansible-os_cinder master: Use v3 service type in keystone_authtoken config  https://review.opendev.org/c/openstack/openstack-ansible-os_cinder/+/88649711:16
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_gnocchi master: DNM  https://review.opendev.org/c/openstack/openstack-ansible-os_gnocchi/+/88674011:29
opendevreviewMerged openstack/openstack-ansible-os_manila master: Switch jobs to Jammy  https://review.opendev.org/c/openstack/openstack-ansible-os_manila/+/88436311:30
noonedeadpunkI'm also pretty much o_O about https://github.com/rabbitmq/erlang-debian-package/discussions/33 today... 12:24
noonedeadpunkGreat news that rmq folks published their aarch64 packages somewhere12:25
noonedeadpunkbut what happened next made me super confused12:25
jrosseri wonder if the rabbitmq people are fed up with supporting erlang packaging, which kind of isn't their problem?12:45
noonedeadpunkyeah, might be12:49
noonedeadpunkLast time I checked erlang repos they were still broken12:49
noonedeadpunkthey don't even have 26.0 being built12:51
jrosserthat is all another big mess tbh https://github.com/esl/packages/issues/1512:52
noonedeadpunkwell, at least they seem to have x86_64, not arm64 though :(12:57
NeilHanlon:\13:01
amaraoIs it possible to add one more ssh CA? I'm running around ssh_keypairs role and playbooks/certificate-ssh-authority.yml, but I can't find a way to add a CA without generating it.13:20
NeilHanloniirc that is setup to do only one ssh CA. What's the use case around multiple CAs? 13:23
noonedeadpunkamarao: I think you should be able to do different CAs for different groups?13:31
amaraoNo, I want to keep original osa machinery intact and I want to add our own CA public key (which we have no private key for at deployment time) for authorizing operators on the servers.13:42
amaraoI found clash with TrustedUserCAKeys directive in sshd config (between our code and openstack-ansible), and I'm trying to find middle ground.13:43
noonedeadpunkso /etc/ssh/trusted_ca is assembled from files in /etc/ssh/trusted_ca.d/ ?13:45
noonedeadpunkMeaning, if you add more content there - it will be respected for TrustedUserCAKeys?13:45
noonedeadpunkbut I'm not sure13:46
jrosseramarao: we have a setup exactly like what you describe13:49
jrosserif you ensure that a copy of your CA public key is in `/etc/ssh/trusted_ca.d/` then it will be included with the one generated by OSA when the playbooks run13:50
jrosseramarao: is there something i've missed that causes a conflict?13:57
amaraoOh, wait, I misread code. I thought install_ssh_ca.yml wipes out everything which is not in ssh_keypairs_install_ca. It looks like it wipes only entities with state='absent'. Thank you for forcing me to reread it.14:00
jrosserthis was designed to be flexible enough to integrate with hosts provisioned by PXEboot with ssh CA config in place after provisioning14:01
jrosseri think we do have a missing feature in the ssh_kepairs role where you may want to supply an existing public key and have that installed but never generated14:17
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-plugins master: Remove special case for Centos 8  https://review.opendev.org/c/openstack/openstack-ansible-plugins/+/88676114:20

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!