Monday, 2021-06-28

opendevreviewRabi Mishra proposed openstack/metalsmith master: Use project_id when creating instance ports  https://review.opendev.org/c/openstack/metalsmith/+/79824004:03
iurygregorygood morning janders and Ironic o/06:23
opendevreviewVerification of a change to openstack/ironic failed: Cache AgentClient on Task, not globally  https://review.opendev.org/c/openstack/ironic/+/79767406:34
arne_wiebalckGood morning janders iurygregory and Ironic!06:37
iurygregorymorning arne_wiebalck o/06:37
opendevreviewIury Gregory Melo Ferreira proposed openstack/ironic-specs master: Event Subscription Spec  https://review.opendev.org/c/openstack/ironic-specs/+/78574207:06
opendevreviewMerged openstack/ironic master: Fix ramdisk boot option handling  https://review.opendev.org/c/openstack/ironic/+/79751708:27
cenneGood morning ironic! 08:29
cenneHey janders, iurygregory,  arne_wiebalck 08:29
iurygregorymorning cenne o/08:32
arne_wiebalckGood morning, cenne o/08:35
opendevreviewVerification of a change to openstack/ironic failed: Refactor: untie IloVendor from validate_image_properties  https://review.opendev.org/c/openstack/ironic/+/79787208:40
opendevreviewVerification of a change to openstack/ironic failed: Refactor: untie IloVendor from validate_image_properties  https://review.opendev.org/c/openstack/ironic/+/79787209:05
dtantsurmorning ironic, happy Monday09:10
opendevreviewDmitry Tantsur proposed openstack/ironic stable/wallaby: Fix ramdisk boot option handling  https://review.opendev.org/c/openstack/ironic/+/79826809:14
opendevreviewDmitry Tantsur proposed openstack/ironic bugfix/18.0: Fix ramdisk boot option handling  https://review.opendev.org/c/openstack/ironic/+/79826909:15
cennegood morning dtantsur.09:17
iurygregorymorning dtantsur 09:29
opendevreviewMerged openstack/ironic bugfix/18.0: dhcp-less: mention how to provide network_data to instance  https://review.opendev.org/c/openstack/ironic/+/79665509:44
opendevreviewMerged openstack/ironic-python-agent stable/wallaby: Coalesce heartbeats  https://review.opendev.org/c/openstack/ironic-python-agent/+/79812911:04
opendevreviewMerged openstack/ironic-python-agent stable/wallaby: Only mount the ESP if not yet mounted  https://review.opendev.org/c/openstack/ironic-python-agent/+/79812411:08
jandershey iurygregory arne_wiebalck cenne dtantsur and Ironic o/11:24
iurygregoryjanders, o/11:24
arne_wiebalckhey janders o/11:28
opendevreviewMerged openstack/ironic master: Refactor: untie IloVendor from validate_image_properties  https://review.opendev.org/c/openstack/ironic/+/79787212:24
opendevreviewDmitry Tantsur proposed openstack/ironic master: Refactor deploy_utils.validate_image_properties  https://review.opendev.org/c/openstack/ironic/+/79787512:49
opendevreviewkamlesh chauvhan proposed openstack/ironic master: Upgrade oslo.db version  https://review.opendev.org/c/openstack/ironic/+/79681113:01
TheJuliagood morning13:11
dtantsurmorning TheJulia 13:17
TheJuliait feels... very... quiet13:18
dtantsurI think it's usually this way in your morning :)13:19
TheJuliasometimes, yes13:20
opendevreviewAija Jauntēva proposed openstack/ironic master: Upgrade oslo.db version  https://review.opendev.org/c/openstack/ironic/+/79681113:24
opendevreviewDhuldev Valekar proposed openstack/ironic master: Update the clear job id's constant  https://review.opendev.org/c/openstack/ironic/+/79643213:25
iurygregorygood morning TheJulia 13:27
TheJuliaAnyone seen greenlet cannot switch to different thread errors in ci? https://storage.gra.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_548/792275/15/check/ironic-tempest-ipa-partition-pxe_ipmitool/5483f40/controller/logs/screen-ir-cond.txt13:31
dtantsurOo13:34
iurygregorywoot13:37
TheJuliaajya|afk: will https://review.opendev.org/c/openstack/ironic/+/796432 need to be backported?13:42
ajya|afkTheJulia: yes13:43
*** ajya|afk is now known as ajya13:43
TheJuliaajya: also, do you know if oslo is going to somehow backport a fix for the duplicate key issues?13:44
ajyaajya: yes, we talked about it with oslo team, it needs to be backported wherever can run mysql 8.0.19. Have to check how far that would be, for now looks like till Ussuri13:45
ajyaeh, TheJulia ^13:46
TheJuliathat would be problematic for train operators13:46
ajyacan you elaborate?13:46
TheJuliawell, say someone is running train with the newest mysql13:47
ajyathen backport it to train?13:47
TheJuliait might not be feasible though13:47
ajyathen could apply a workaround in Ironic by checking port existence first13:49
opendevreviewJulia Kreger proposed openstack/ironic master: Deprecate [pxe]ip_version parameter  https://review.opendev.org/c/openstack/ironic/+/79798413:59
opendevreviewJulia Kreger proposed openstack/ironic stable/wallaby: Remove redundant/legacy is_admin logic  https://review.opendev.org/c/openstack/ironic/+/79831614:07
TheJuliawho is running the meeting today, is it me?14:15
iurygregoryme14:16
iurygregory\o/14:16
iurygregoryat least from what i remember from last meeting :D14:16
iurygregoryTheJulia, if you want to run let me know (I have no problems =) )14:18
TheJuliaiurygregory: ack, okay, go right ahead :)14:24
iurygregoryok =) next week we need someone to run the meeting (seems like is holiday Mon/Tue in CZ.. - finally holidays during the week :D )14:24
TheJuliaUmm,, maybe we cancel?14:26
TheJuliaIt is a holiday in the states next week14:26
TheJuliaWell, Monday is14:26
iurygregorymakes sense to me =)14:26
TheJuliaironic-cores anyone object or agree ^^^14:27
dtantsurno objection14:27
iurygregorydtantsur, the discussion about privsep do you want to chat during the meeting or should we do tomorrow in the Review Jam?14:28
dtantsurI cannot promise to be at the review jam14:28
iurygregoryso let's try during Discussion, does it work for you? =)14:29
dtantsuryep14:30
TheJuliaiurygregory: I now have meetings scheduled which co-incide, seems the review jams are like... ideal slots for humans14:31
TheJuliaso, discussion today is preferred14:31
iurygregoryTheJulia, good to know =) I just want to check because we had the idea to talk during the review jam 14:31
opendevreviewAija Jauntēva proposed openstack/ironic master: Redfish: Skip non-RAID controllers for RAID  https://review.opendev.org/c/openstack/ironic/+/79659214:42
opendevreviewDmitry Tantsur proposed openstack/ironic master: Refactor deploy_utils.validate_image_properties  https://review.opendev.org/c/openstack/ironic/+/79787514:47
iurygregoryTheJulia, just to confirm you want a discussion about Secure RBAC Tempest Testing ? I remember we talked about it last week  14:51
opendevreviewVerification of a change to openstack/ironic failed: Cache AgentClient on Task, not globally  https://review.opendev.org/c/openstack/ironic/+/79767414:53
TheJuliaiurygregory: I thought I removed that14:59
iurygregoryhumm to me still shows in the Agenda14:59
iurygregoryI will skip during the meeting =)14:59
TheJuliamsut have missed the line14:59
TheJuliaremoved14:59
iurygregorynp14:59
iurygregoryty!15:00
iurygregory#startmeeting ironic15:00
opendevmeetMeeting started Mon Jun 28 15:00:04 2021 UTC and is due to finish in 60 minutes.  The chair is iurygregory. Information about MeetBot at http://wiki.debian.org/MeetBot.15:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:00
opendevmeetThe meeting name has been set to 'ironic'15:00
dtantsuro/15:00
TheJuliao/15:00
rpiosoo/15:00
iurygregoryHello ironicers, welcome to our weekly meeting!15:00
iurygregoryo/15:00
vmud213o/15:00
rlooo/15:00
iurygregoryOur agenda can be found in the wiki =)15:00
iurygregory#link https://wiki.openstack.org/wiki/Meetings/Ironic#Agenda_for_next_meeting15:00
TheJuliahmm, do we have enough quorum?15:01
stendulkero/15:01
TheJuliahmm, maybe15:01
iurygregoryI was about to ask that TheJulia =)15:01
TheJuliamaybe just roll forward and if we have any consensuses or decisions to make we might need to be mindful15:02
* rpioso wonders what comprises a quorum.15:02
iurygregoryyeah, privsep discussion would probably need some consensus =)15:02
TheJuliarpioso: generally >8 contributors to me15:02
iurygregorywe can try to summon arne_wiebalck and JayF :D15:02
TheJuliausing the magical ironic dust of summoning15:03
arne_wiebalcko/15:03
TheJulialol15:03
iurygregoryit works :D15:03
rpiosoTheJulia: When did that become a thing :-)15:03
rlooJayF is OOO today (AC issues)15:03
* arne_wiebalck does not know how he ended up in this meeting all of a sudden15:03
TheJuliarloo: not good :(15:03
rpiosoarne_wiebalck: lol15:03
iurygregoryrloo, oh I saw on twitter about the AC =(15:03
rlooyeah, i think it is sweltering there...15:03
ajyao/15:03
iurygregoryseems like we have enough people :D15:04
TheJuliarpioso: quorum or magical dust?15:04
iurygregory#topic Announcements / Reminders15:04
rpiosoTheJulia: lol quorum?15:04
TheJuliarpioso: been a thing for a long time15:04
iurygregoryAnyone has anything to announce today?15:04
TheJuliaiurygregory: are we cancelling next week's meeting?15:05
iurygregorygood question, +1 from me since is holiday in CZ15:05
* iurygregory is not sure about other EU countries15:06
arne_wiebalckI don't think it is a holiday in FR or CH.15:06
iurygregoryis also holiday in the US according to TheJulia 15:07
arne_wiebalckOr DE.15:07
iurygregoryso I don't think we will have enough quorum 15:07
arne_wiebalckI am totally fine with cancelling the meeting ofc :)15:07
TheJuliaI think we should just cancel next week's meeting15:08
TheJuliaunless someone wants to run it next week15:08
iurygregoryyeah15:08
rpiosoIndependence from Meeting Day?15:09
TheJuliarpioso: +115:09
iurygregorylol :D15:09
iurygregoryI don't see any objections so ...15:09
iurygregory#agreed no upstream meeting on July 5th15:10
iurygregory#info no upstream meeting on July 5th15:10
iurygregoryI will send an email to the openstack-discuss 15:10
iurygregory#topic Review action items from previous meeting15:11
iurygregoryWe don't have any action items from last meeting, skipping15:11
iurygregory#topic Review subteam status reports15:11
iurygregory#link https://etherpad.opendev.org/p/IronicWhiteBoard15:11
iurygregorystarting on L65 =)15:11
iurygregoryzer0c00l, you around? =)15:13
iurygregoryjust wondering if there are any plans to test anaconda deployment in CI upstream15:14
TheJuliaiurygregory: he typically is not up for another hour I think15:15
TheJuliaI know, he wants to though15:16
iurygregoryack =)15:16
rlooif there are no plans, then we need to add plans. if i remember, i'll ask him15:16
iurygregoryrloo, tks!15:16
arne_wiebalckTheJulia: for the nova ironic driver item, I will check with our nova experts if they would like to follow up upstream15:16
iurygregorywe have updates on every item, should we move to the next topic?15:17
iurygregorymoving on15:18
iurygregory#topic Deciding on priorities for the coming week15:18
TheJuliaarne_wiebalck: ack, there really is no reason for it to hit ironic for that query at all given the cache should have it and be able to properly fulfill it15:18
iurygregory#link https://tinyurl.com/ironic-weekly-prio-dash15:19
arne_wiebalckTheJulia: yes ... Belmiro plans to follow up15:19
TheJuliaarne_wiebalck: ack15:19
arne_wiebalckTheJulia: with nova upstream15:19
arne_wiebalckTheJulia: no timelines yet15:19
TheJuliaI'd like to add https://review.opendev.org/c/openstack/ironic-tempest-plugin/+/797521 to the list for the week15:20
TheJuliaThere is a dependency on a tempest fix, but the tempest fix already has a +215:20
dtantsurI'd appreciate adding https://review.opendev.org/c/openstack/ironic/+/797508 and https://review.opendev.org/c/openstack/ironic/+/79787515:20
TheJuliadtantsur: seems reasonable15:20
iurygregory++ a quick look to all patches they are ok to have the hashtag15:21
TheJuliadone15:22
iurygregorymore patches? :D15:23
iurygregorylast call XD15:23
iurygregorysounds like we can move to Discussion15:24
iurygregory#topic Discussion15:25
iurygregorywe have one topic today from dtantsur and I about oslo-privsep15:25
iurygregory#link https://review.opendev.org/c/openstack/ironic-lib/+/74553615:26
iurygregorydtantsur, if you want to give context about your concerns re privsep it would be good =)15:26
dtantsurIPA has half-monkey-patched stdlib15:26
dtantsurI don't feel easy about launching a new process with a clone of IPA and using it for execing other processes as root, although IPA is always as root15:27
dtantsurso I wonder if we could have a global switch to turn privsep into regular calls without forking15:27
TheJuliahmmmm15:28
rlooso replace rootwrap with privsep and add an option to turn off privsep15:28
TheJuliaThis *does* make a lot of sense15:28
dtantsurrloo: pretty much15:28
iurygregoryI know nova has a few commands that they run as non-privilege15:29
iurygregoryI don't think they have a config option15:29
dtantsuras a bonus, make dependency on privsep conditional for the sake of smaller IPA images15:29
dtantsurnote that I don't mean a config option in a sense of oslo.config, but rather something like a global variable that can be set early15:30
dtantsur(it could go through oslo.config as well in case someone wants to run IPA as non-root (LOL)?)15:30
TheJuliadtantsur: ++15:30
iurygregoryI'm trying to understand the part of global variable that can be set early...15:31
TheJulialikely just something in the ipa code very early on which declares the global15:32
rlooi'm good with that. as long as we default to privsep on.15:32
dtantsurimport ironic_lib; ironic_lib.USE_PRIVSEP = False15:32
TheJulia++15:32
rlooAny security issues with turning it off? security is not my forte...15:33
iurygregoryif it's off it will use rootwrap by default no? 15:34
dtantsurlet's drop rootwrap maybe?15:34
dtantsurI don't see why we would keep both15:34
iurygregoryonly after we have all the support in privsep I would say =)15:34
dtantsurif privsep is off, a command is executed as it is. if the service is not root - touch luck15:34
arne_wiebalckoff is only for IPA which is running as root anyway, no?15:35
dtantsurright15:35
TheJuliaarne_wiebalck: I think that is what we're all thinking15:35
TheJuliaat least, that is my momentary perception of consensus15:35
rloobased on this, i think the idea is to remove rootwrap support: https://review.opendev.org/c/openstack/governance/+/71817715:36
iurygregoryyeah correct, we can drop rootwrap after we swtich all things to privsep15:37
arne_wiebalckmy point was to answer rloo's question: since off is only for IPA, and IPA is root anyway, there *should* be no security concerns ... but then security is not my forte either :)15:37
rloowe can either 1. replace rootwarp with privsep, then add some global thingy to turn off privsep; or 2. do both at the same time.15:38
TheJuliaSo we need to consider use/purpose, the driving purpose was to secure and delineate access for services which live for a long time serving/supporting user workloads. IPA... kind of not that at all.15:38
rloo(wondering if someone has some weird usecase with ipa)15:38
TheJuliarloo: yes... kind of 15:39
TheJuliaBut that would be a *highly* restrictedmode which doesn't yet exist15:40
rlooI think we've agreed then? replace rootwrap with privsep, add a way to turn off privsep15:40
TheJuliaso I think we're safe to proceed and move forward15:40
rloo++15:40
dtantsuryep15:41
iurygregorysounds like a plan15:41
iurygregoryI will update the status with the info of the discussion =)15:41
iurygregorymoving to our meeting topic15:42
iurygregory#topic Baremetal SIG15:42
iurygregory#link https://etherpad.opendev.org/p/bare-metal-sig15:42
iurygregoryarne_wiebalck, do you have anything for the SIG?15:42
arne_wiebalckNext meeting is Tuesday July 13, 2021 at 2 PM UTC15:43
arne_wiebalckwith TheJulia on Bifrost15:43
TheJulia\o/15:43
arne_wiebalck(announcing now as we do not have a meeting next week)15:43
* TheJulia puts calendar items on her calendar to remind herself15:43
iurygregory#info Next Baremetal SIG meeting is Tuesday July 13, 2021 at 2 PM UTC - TheJulia talking about Bifrost15:43
iurygregorytks arne_wiebalck and TheJulia !15:43
iurygregory#topic RFE review15:44
iurygregoryWe have one RFE from vmud213 - Add a clean/deploy step to add 3rd party CA certificates to iLO 15:44
iurygregory#link https://storyboard.openstack.org/#!/story/200878415:44
vmud213Hi15:44
TheJuliahi vmud213 15:45
dtantsurvmud213: the idea is great (modulo s/ilo_ca_certs_dir/ca_certs_dir), ideally the RFE should spell out the clean/deploy steps names15:45
vmud213does anyone has any questions or any clarification needed on this. Please let me know15:45
vmud213dtantsur: Ok.Sure. i will update.15:46
vmud213one question.15:46
TheJuliavmud213: quick question, by add is it just replacing or appending ca certificates?15:46
vmud213there are 2 steps for adding and removing. Should i pursure both as part of the same patch?15:46
TheJuliavmud213: That answers my question then15:46
TheJuliaor my next question. Yes, ideally both at the same time15:47
vmud213ThJulia: It's appending the certificate15:47
iurygregory++ to both at same time15:47
vmud213perhaps there is lot of confusion on the naming15:47
TheJuliaAlso, it looks like you've got a wired-in do on deploy anyway step, which I'm not sure we want by default15:47
vmud213actually we need these CA certificates to be added to iLO.15:47
TheJuliaSo, you may, but maybe just run the steps anyway as part of the step framework instead of always invoke?15:48
stendulker@TheJulia: without matching certificates ilo-https boot inetrface will not work. 15:48
TheJuliamaybe that means a third, hybrid step15:49
dtantsuryou seem to have a chicked-and-egg problem then?15:49
TheJulia"check-set-certificates" or something which could be enabled by default with a deploy_step value15:49
stendulkerdtantsur: kind of, yes.15:49
dtantsuryou need IPA to use cleaning but the UEFI boot cannot work without the right certificates15:49
TheJuliaI guess the thing we want to avoid as much as possible, is things requiring custom boot interface code15:49
stendulkerbut these certificate addition is kind one-time thing15:50
stendulkerunless one wants to remove/replace them after teardown15:50
dtantsuryou probably need to rework it to become a step that doesn't need the ramdisk15:50
dtantsurotherwise its usability is questionable15:51
stendulkerI think, it does not need ramdisk, bit needs a reboot to become effective.15:51
TheJuliahmm, it was being done before too,  I guess if we can use the step code it becomes more clear for operators, and it can be ensured to be in a working state15:51
dtantsurset_async_step_flags relies on IPA15:52
dtantsuradditionally, the only way to avoid IPA right now is to explicitly mark your step as not requiring ramdisk AND explicitly request cleaning without IPA15:52
TheJuliaugh, yeah15:52
vmud213dtantsur: the steps can be executed as part of different boot interface15:52
dtantsurso, start with iPXE, then switch to UEFI?15:53
iurygregoryO.o15:53
TheJuliavmud213: we *really* don't want different boot interfaces, it complicates support matrixes and hurts adoption of driver specific interfaces15:53
dtantsurgoing to be confusing. and if you have iPXE working, why bother with UEFI?15:53
vmud213dtantsur: that is the capability of the hardware that we are leveraging15:53
TheJulialets take a step back15:54
TheJuliaI think *we* generally agree the idea is good, it needs a little more verbosity to explain the problem and what is going to be done to solve it. The patch itself, is going to take a little more back and forth and context to understand, because ultimately multiple things are attempting to be done here15:54
iurygregoryagree ^15:55
dtantsur++15:55
TheJuliaand if one of those things is distinctly or drastically different or the problem cascades, then we need to cover that in the RFE, or maybe a separate discussion15:55
* TheJulia hopes I'm making sense15:55
dtantsuryeah, and we need to keep in mind the dependency between cleaning and IPA15:55
vmud213TheJulia: I think i understood what you are saying15:56
vmud213But the point is15:56
vmud213in any case this is all about adding the certificates 15:56
vmud213which is needed in any case15:56
TheJuliaApparently it is needed, but there are different ways to approach that, and ideally if it is required, it shouldn't be a deploy or cleaning step set to 015:57
TheJuliawell, priority set to 015:57
vmud213the iLO or any other BMC can not accept the certifciates unless it is properly configured with root CA who issued them15:57
vmud213so i wonder in the case of iPXE how this solves the problem15:57
TheJuliaThe step framework should be used wherever possible to facilitate these sorts of things15:57
dtantsuriPXE doesn't use HTTPS15:57
TheJuliaI'm really confused where ipxe came into this discussion15:58
TheJuliathis is basically like virtual media booting right?15:58
dtantsuractually, a lot of virtual media implementations don't verify certificates, but that's another story15:58
TheJuliaBMC needs to validate the certificate of the webserver? yes?15:58
dtantsurthe UEFI boot interface already calls add_certificates. I wonder why it's not enough.15:58
TheJuliadtantsur: well, apparently a reboot is required based on what stendulker said15:59
* dtantsur is interested in this topic because we probably need to do the same for Redfish eventually15:59
TheJuliaI guess, all the confusion is just more evidence we need a more verbose RFE15:59
dtantsurTheJulia: booting IPA is a rebootr15:59
iurygregorywe have less than 1min, I think we can just end the meeting and keep the discussion right? =)15:59
dtantsuryep15:59
TheJuliadtantsur: true15:59
TheJuliadtantsur: which makes me wonder...why the clean steps?!15:59
vmud213dtantsur: the boot interface calls the certificate only to booot the deploy_iso configured ehind the https15:59
iurygregorytks everyone!15:59
iurygregory#endmeeting16:00
opendevmeetMeeting ended Mon Jun 28 16:00:00 2021 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)16:00
opendevmeetMinutes:        https://meetings.opendev.org/meetings/ironic/2021/ironic.2021-06-28-15.00.html16:00
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/ironic/2021/ironic.2021-06-28-15.00.txt16:00
opendevmeetLog:            https://meetings.opendev.org/meetings/ironic/2021/ironic.2021-06-28-15.00.log.html16:00
dtantsurvmud213: I see add_certificates called in prepare_ramdisk already: https://review.opendev.org/c/openstack/ironic/+/783133/9/ironic/drivers/modules/ilo/boot.py16:00
dtantsurwhy doesn't this pattern work?16:00
vmud213but what if the webserver hosting the instance images changes or is configued with difrernt certificates later point of time.16:00
dtantsurit's called every time you do an action, no?16:00
dtantsurI mean, cleaning, inspection, deploy - they all go through prepare_ramdisk16:01
* dtantsur is even more confused after checking the code16:01
TheJuliadtantsur: should we start a #confused club?16:01
dtantsurwe should have long ago16:01
dtantsurand your corgi should chair it?16:01
TheJuliadtantsur: we'll need a bar tender, in addition to the corgi to chair the club16:02
dtantsurbear tender, you say?16:02
TheJulia++16:02
* TheJulia notes we've hit peak silliness twice today16:02
TheJuliadid everyone not sleep last night?!?16:02
dtantsurI woke up quite early16:03
vmud213dtantsur: my point is when the user wants to configure third party root CAs which can be used to boot instances images from different sources the only way would be to add a clean step16:04
dtantsurwhy would they do it?16:05
TheJuliaits theoretically possible with ramdisk boot_iso16:05
TheJulia*theoretically*16:05
dtantsurI think boot interfaces that rely on HTTPS should just call add_certificates before rebooting (i.e. in prepare_ramdisk OR prepare_instance in case of the ramdisk deploy)16:05
TheJuliaI can see the point in being able to manage certificates in the bmc, I think we are all onboard for that, but there are intertwined interactions we need to tease apart16:06
dtantsuryep16:06
dtantsuras long as we don't say things like "to make cleaning possible with custom certificates ....."16:06
TheJulialike, I'd also be okay if the add certificates step just had a priority16:06
dtantsurbecause updating certificates has to be done *before* cleaning16:06
TheJuliabut the async action there is problematic as dtantsur pointed out16:07
TheJuliasince it requires ipa up16:07
dtantsurhaving priority!=0 won't work with the current implementation of requires_ramdisk (mechanism to suppress booting IPA)16:07
vmud213dtantsur: so you think, the certificates should be added only part of the deployment 16:07
dtantsurvmud213: I think there are two problems that can be solved:16:07
TheJuliadtantsur: *sigh*16:08
dtantsur1) How to make virtual media or UEFI boot work with custom HTTPS certificates16:08
dtantsur2) How to update certificates just because the operator wants it16:08
TheJulia++16:08
dtantsurThe problem #1 is already (partially?) solved by the existing code16:08
dtantsurYour patch is solving only problem #2, but I'm not sure if you actually intend that16:08
TheJuliaand these are distinctly different things which sould likely be handled in separate patches16:09
dtantsurif you do - fine16:09
dtantsurbut the problem #1 is critical for ironic operation, while #2 is nice-to-have16:09
TheJulias/sould/should/16:09
vmud213dtantsur: but i agree. But we also want to remove the configured certificates16:09
dtantsurso if you end up solving problem #2 while thinking you're solving problem #1, it's a problem :)16:09
vmud213:)16:10
vmud213ok..we add certificates only on demand16:10
dtantsurI'm not saying that problem #2 is not worth solving btw, I'm just trying to figure out which one you want to solve16:10
vmud213but removing the certificates which are configured and revoked16:11
dtantsurmakes sense. it even makes sense to remove revoked certificates as part of automated cleaning indeed16:11
dtantsur(as Julia suggested)16:11
TheJulia(well, to be honest, I'm all for automatic things)16:12
vmud213i think the #1 is solved in as part of the boot interface already where we are adding the required CAs to iLO which are used by iLO oto boot the deploy ISO and instance images16:12
dtantsurvmud213: if I'm readying the code right, problem #1 is only solved for iLO HTTP boot, not for virtual media16:13
dtantsur* reading16:13
vmud213dtantsur,TheJulia: what is your suggestion.16:13
vmud213should i remove the add cleanstep and may be include the cleanstep to remove the revoked certs?16:13
dtantsurFrom your RFE: "When deploy and user images are served from a webserver configured with a certificate issued by 3rd party, the iLO while booting these images needs a way to validate the certificates presented by the webserver. This requires the 3rd party CA certificates to be loaded into iLO."16:14
dtantsurthis sounds like problem #1 to me. If you're solving the problem #2, could you rephrase the RFE and the documentation you're adding?16:14
dtantsurvmud213: ^^^16:14
vmud213dtantsur: virtual media behavior is not necessarily the same. It may not care about the certificates by default. I still need to explore that path.16:14
dtantsurvmud213: janders investigated a few hardware models (I don't remember if iLO was among them) and came to conclusion that virtual media tends to ignore certificates.16:15
dtantsurbut okay, my suggestion: 1) change wording on RFE, 2) consider if pruning revoked certificates should be done automatically16:16
dtantsur(both the RFE and the patch are titled "add certificates", there is nothing about revoked certificates, at least nothing obvious from a quick read)16:16
vmud213dtantsur: the removing of certificates is a separate patch.16:17
dtantsurokay. you can cover them with one RFE and two tasks16:17
vmud213i will add the removing part to the RFE and refine it as per your suggestions16:17
vmud213dtantsur: Sure. 16:18
dtantsurgreat, thank you! TheJulia has this discussion addressed your concerns?16:18
TheJuliadtantsur: very much so16:18
TheJuliaThanks vmud213 and dtantsur !16:19
vmud213Thanks TheJulia, dtantsur16:19
vmud213Have a great day16:19
TheJuliayou too vmud213 16:19
TheJuliaI need a very big thing of coffee16:22
dtantsurhave a good evening, everyone16:36
opendevreviewMerged openstack/ironic-python-agent stable/victoria: Fix getting memory size in some lshw output  https://review.opendev.org/c/openstack/ironic-python-agent/+/79816816:39
opendevreviewMerged openstack/ironic-python-agent stable/ussuri: Add function to calculate memory  https://review.opendev.org/c/openstack/ironic-python-agent/+/79817016:40
opendevreviewMerged openstack/ironic-python-agent stable/ussuri: Fix getting memory size in some lshw output  https://review.opendev.org/c/openstack/ironic-python-agent/+/79817116:40
opendevreviewMerged openstack/ironic-python-agent stable/train: Add function to calculate memory  https://review.opendev.org/c/openstack/ironic-python-agent/+/79817216:40
opendevreviewMerged openstack/ironic-python-agent stable/train: Fix getting memory size in some lshw output  https://review.opendev.org/c/openstack/ironic-python-agent/+/79817316:40
arne_wiebalckbye everyone o/16:48
opendevreviewJulia Kreger proposed openstack/ironic-inspector master: Add rbac scope enforcement handling to devstack plugin  https://review.opendev.org/c/openstack/ironic-inspector/+/79835917:09
opendevreviewJulia Kreger proposed openstack/ironic master: WIP Scoped RBAC Devstack Plugin support  https://review.opendev.org/c/openstack/ironic/+/77895717:11
* TheJulia crosses her fingers that all ironic stuff just magically works17:13
opendevreviewArun S A G proposed openstack/ironic master: Add support for configdrive in anaconda interface  https://review.opendev.org/c/openstack/ironic/+/78039818:04
opendevreviewJulia Kreger proposed openstack/ironic master: WIP Scoped RBAC Devstack Plugin support  https://review.opendev.org/c/openstack/ironic/+/77895718:50
*** stevebaker_ is now known as stevebaker20:08
opendevreviewJulia Kreger proposed openstack/ironic-python-agent master: WIP: Another grub headache  https://review.opendev.org/c/openstack/ironic-python-agent/+/79839422:36
TheJuliastevebaker: ^^^ os.path.ismount workaround I mentioned downstream22:36
* TheJulia thinks we need a giant "The rules are different in a ramdisk" sign22:37
stevebakerthats unsettling22:45
opendevreviewJulia Kreger proposed openstack/ironic master: WIP Scoped RBAC Devstack Plugin support  https://review.opendev.org/c/openstack/ironic/+/77895722:47
TheJuliastevebaker: i know right!22:48
TheJuliastevebaker: in other goodish news, ^^^ mostly works except ironic<->inspector22:48
stevebakercool22:48
TheJuliainspector devstack generated config looks right, so I'm wondering if we've got a client library bug22:48
TheJuliaI can dig at it tomorrow22:48

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!