Friday, 2022-01-14

stevebaker[m]TheJulia: ok, I've got a series of 3 reviews which are hopefully uncontroversial. Starting here https://review.opendev.org/c/openstack/diskimage-builder/+/82464701:26
opendevreviewSteve Baker proposed openstack/ironic-python-agent-builder stable/wallaby: Preliminary work to support CentOS 9 Stream  https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/82336501:39
opendevreviewSteve Baker proposed openstack/ironic-python-agent-builder stable/wallaby: [DNM] testing dib-centos9 experimental job  https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/82413601:40
opendevreviewSteve Baker proposed openstack/ironic-python-agent-builder stable/wallaby: Preliminary work to support CentOS 9 Stream  https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/82336503:45
opendevreviewSteve Baker proposed openstack/ironic-python-agent-builder stable/wallaby: Replace genisoimage with xorriso  https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/82336703:45
opendevreviewSteve Baker proposed openstack/ironic-python-agent-builder stable/wallaby: [DNM] testing dib-centos9 experimental job  https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/82413603:45
arne_wiebalckGood morning, Ironic!07:39
*** pmannidi is now known as pmannidi|brb07:39
jandershey arne_wiebalck o/09:32
jandersHappy Friday09:32
arne_wiebalckhey janders o/;09:36
dtantsurmorning ironic. finally Friday? :)10:09
jandersdtantsur yes!10:11
arne_wiebalckdtantsur: mgoddard: I just tried https://review.opendev.org/c/openstack/ironic/+/823723 and it breaks cs8 on software RAID as suspected11:08
arne_wiebalckdtantsur: mgoddard: not sure if other cs8 WDIs would work, but ours does if Ironic ignores the bootloader installation error11:10
arne_wiebalckdtantsur: mgoddard: the actual error is that the cs8 grub2-install does not have secureboot support and then raises an error11:12
mgoddardarne_wiebalck: thanks for confirming. So what's the path forward? Revert then make the check more strict?11:15
arne_wiebalckdtantsur: mgoddard: options I see include: a) move to efibootmgr for s/w RAID, b) make the behavior configurable, e.g. whether or not to ignore errors or have a list of errors to ignore, c) revert :)11:16
arne_wiebalckordered by preference, inversely ordered by complexity :-D11:17
opendevreviewAija Jauntēva proposed openstack/ironic master: Update idrac-redfish export configuration step  https://review.opendev.org/c/openstack/ironic/+/81681611:18
mgoddardarne_wiebalck: I have time available to revert :D11:18
arne_wiebalckmgoddard: :-D :-D11:19
arne_wiebalckIIRC, stevebaker[m] was looking at efibootmgr some months ago in a different context and also assessed that it should be possible to move to efibootmgr11:19
arne_wiebalckfor s/w RAID11:19
arne_wiebalckand tbh, we do call grub2-install, which fails, but we do not need it anyway  ... seems like sth we should fix11:20
arne_wiebalcknow, what I do not know if "it works" is b/c of our image or if that would break also others11:21
arne_wiebalckI think mnaser was also using cs8 images on top of s/w RAID11:21
dtantsurI guess the question is how quickly we can fix it11:24
dtantsurwe cannot leave master broken for too long11:24
dtantsurif it's going to take time, I'd rather have us ignore the error again for software RAID11:24
iurygregorygood morning 11:24
dtantsurhey iurygregory, happy Friday11:25
iurygregoryhappy friday dtantsur o/11:27
* iurygregory hopes he won't need to spend half day in a meeting :D11:27
dtantsurouch11:27
arne_wiebalckdtantsur: it'd be great if we had someone else confirm it is a breaking change11:27
dtantsurarne_wiebalck: we don't have a wide choice of people who use software RAID and are ready to test master changes11:28
dtantsurI think we can take your word on it11:28
arne_wiebalckdtantsur: ok11:28
arne_wiebalckdtantsur: I guess we have time until the release before we need to take a revert decision11:29
arne_wiebalck(and do no backports for now)11:29
dtantsurarne_wiebalck: well, we should keep master working11:29
dtantsurpeople may be consuming a random commit (e.g. if they use bifrost)11:30
arne_wiebalckhmm, ok11:30
arne_wiebalckmgoddard: I guess master before your patch caused issues for you (and triggered the patch) ?11:32
mgoddardit was broken in that a deployment failure was silently ignored11:39
mgoddardso the machine failed to boot11:39
dtantsurI suspect our software RAID code actually relies on that command to fail11:40
mgoddardin my case I was using a non-UEFI image with UEFI enabled11:40
dtantsuraka "command failed successfully" :)11:40
arne_wiebalckor "Errror: SUCCESS"11:43
arne_wiebalck*Error11:43
arne_wiebalckmgoddard: your failed deployment was not with s/w RAID, I assume?11:43
opendevreviewDmitry Tantsur proposed openstack/bifrost master: Do not make password files world-readable  https://review.opendev.org/c/openstack/bifrost/+/82470011:51
opendevreviewDmitry Tantsur proposed openstack/bifrost master: Tighten permissions for PXE directories  https://review.opendev.org/c/openstack/bifrost/+/82414411:56
opendevreviewDmitry Tantsur proposed openstack/bifrost master: Change the TFTP directory to /var/lib/tftpboot  https://review.opendev.org/c/openstack/bifrost/+/82355211:58
opendevreviewDmitry Tantsur proposed openstack/bifrost master: Tighten permissions on keystone directories  https://review.opendev.org/c/openstack/bifrost/+/82470212:03
mgoddardarne_wiebalck: correct12:42
*** rcastillo|rover is now known as rcastillo13:23
arne_wiebalckyet another option then would be to error out only when not s/w RAID13:26
arne_wiebalckbut we're making the code more and more convoluted13:26
opendevreviewDmitry Tantsur proposed openstack/bifrost master: Start Bifrost Architecture documentation  https://review.opendev.org/c/openstack/bifrost/+/82471914:17
dtantsurTheJulia: I hope you'll like this ^^^14:17
dtantsurthis publishes a lot of tribal knowledge14:22
TheJuliaI’ll try to look today14:30
TheJuliaWoke. Up with migraine14:30
dtantsurouch. get back to bed, it's Friday :)14:32
TheJuliaStill in. Light hurts14:32
bkranendonkhi all, does inspector has some kind of policy engine built in? it keeps denying me from retrieving inspector rules: Failed retrieving Inspector rule 35535433-15bd-5a74-907c-96ecb3113276: ClientError('Access denied by policy')14:35
bkranendonkor is this keystone policy based?14:35
bkranendonkcant find any info on this, and dont have keystone policy.json enabled14:36
TheJuliabkranendonk: policy is embedded into the code14:37
TheJulia bkranendonk what user/rights are you attempting to use ?14:37
bkranendonkuser admin, project admin (default admin user created by kolla-ansible)14:38
TheJuliabkranendonk: system admin or member of the bare metal project and an admin in it if memory serves14:40
TheJuliaAt least, I think14:40
TheJuliaThe policy is strict since it is an admin only service14:41
TheJuliaGive me 5, making coffee14:41
bkranendonkok, does the policy check on source IPs/cors stuff aswell?14:41
bkranendonkI can however update Node objects properties 14:42
TheJuliaCoffee https://usercontent.irccloud-cdn.com/file/yfR7Yggi/IMG_0256.JPG14:44
TheJuliayeouch, monitors are bright14:46
TheJuliabkranendonk: no, it does not use cors or ips14:46
TheJuliaironic's policy is a little loser if memory serves due to backwards compatability14:46
TheJuliabut lets see, what just inspector has14:46
bkranendonkalright. strange thing is that inspector debug shows me that the received os_auth data is all null :P14:48
bkranendonkenforce: rule="introspection" creds= (...)project_domain_id": null, "project_id": null,(...)14:48
bkranendonkmight be doing something wrong at the client/kolla/ansible side, will check 14:49
TheJuliayeah14:50
TheJuliaI wonder if it is failing to lookup the ID14:50
TheJuliaso, by default for the new RBAC model it is https://github.com/openstack/ironic-inspector/blob/master/ironic_inspector/policy.py#L38 and until it is enforced by default https://github.com/openstack/ironic-inspector/blob/master/ironic_inspector/policy.py#L61 is the rule14:51
TheJuliait falls back to14:51
TheJuliawow, migraine is so bad complete sentences are not a thing at the moment14:51
TheJuliaI would check the config for inspector to make sure it is valid for talking to keystone to validate tokens14:52
bkranendonkthanks! i however found the issue to be an ansible module that is not ingesting the os_auth14:53
bkranendonkso it just tries to auth with all null types, well yeah; thats not gonna work :)14:53
bkranendonkTheJulia: thanks for your help again, much appreciated14:54
TheJuliabkranendonk: no problem, hopefully there is a patch someplace now :)15:00
TheJuliaor will be soon!15:00
arne_wiebalckTheJulia: do you remember with which release the new default policy was introduced?15:01
TheJuliaWallaby, however the enforcement of the new default has not been turned on yet15:14
TheJuliaand likely won't be for a while15:14
TheJuliasince TC wants everyone to move at the same time15:15
TheJuliaWhich makes sense, since it is such a massive change15:15
arne_wiebalcksince I just moved to Wallaby, the Puppet module created a policy file but I don't think it contains the default you pointed to above15:16
TheJuliaI greatly dislike the puppet module15:17
arne_wiebalckheh15:19
arne_wiebalckthere is also json vs yaml, but I guess the format change is independent from the content change?15:21
TheJuliait should all be yaml at this point15:22
TheJuliabut the puppet maintainers have hard resistance to *any* change15:23
TheJuliawithout it being opt-in15:23
arne_wiebalckthe wallaby module created a json file in /etc/ironic-inspector/policy.json ... (need to check if our config demands this somewhere)15:24
arne_wiebalckyep, it does15:25
opendevreviewDmitry Tantsur proposed openstack/bifrost master: Tighten permissions on keystone directories  https://review.opendev.org/c/openstack/bifrost/+/82470215:29
TheJuliayeah, they should be creating json and actually they shouldn't *need* to create a policy file at all.15:37
dtantsurdear uwsgi, y u h8 me15:52
TheJuliadtantsur: what now?15:53
TheJuliaand is it eventlet?15:54
dtantsurtrying to make it run from the right user in bifrost15:54
dtantsurcurrently keystone runs from the nginx user, not from keystone15:54
TheJuliacommon group perhaps?15:54
dtantsuryeah, but I'm trying to avoid nginx being able to read keystone configuration15:56
TheJuliaahh15:57
dtantsurit's quite a bloody mess15:57
TheJuliathe only way then is to actually proxy to a separate process. I think15:57
dtantsurto be able to drop privileged, uwsgi needs to be started as root15:57
dtantsurbut then /run/uwsgi is created as root 070015:57
dtantsurand uwsgi cannot create sockets in it15:58
dtantsurmeh15:58
dtantsurI'll figure it out15:58
TheJuliayou could pre-create the socket16:00
dtantsuror even just the directory16:00
TheJuliaits just a fifo or lifo buffer right?16:00
TheJuliawell, really just fifo16:00
dtantsuractually, I can simplify the heck out of everything now that we don't have keystone-admin16:01
dtantsurbut then it won't be backportable16:01
TheJuliaI think the last time I was creating a buffer for a process it was for mongodb's local connections or something whacky like that16:02
opendevreviewDmitry Tantsur proposed openstack/bifrost master: Tighten permissions on keystone directories  https://review.opendev.org/c/openstack/bifrost/+/82470216:07
dtantsurokay, trying this16:07
* TheJulia would like the migraine to finish going away16:08
TheJuliaany ironic-cores around, other than dtantsur ?16:43
JayFYou caught me16:45
JayFwhat's up?16:45
TheJuliaI would <3 to get another review on https://review.opendev.org/c/openstack/ironic-inspector/+/82464316:47
JayFI'll look depending on how simple; but I rarely voted on inspector stuff when this was my day job16:47
TheJuliasince I need to backport it as well to fix issues we're seeing with haproxy being slightly more evil than apache but not as evil as eventlet16:48
* TheJulia noticed the eventlet fix failed CI :(16:48
TheJulia(eventlet fix as in fix against eventlet itself)16:48
JayFyeah, I read the chatter about this earlier16:49
JayFwant me to land it?16:49
TheJuliasure16:49
TheJuliamuch appreciated16:49
JayFalright, code review fairy visit done16:49
JayFlol16:49
TheJuliamuch appreciated, thanks16:49
* TheJulia goes back to reviewing dib patches16:50
iurygregoryTheJulia, I'm16:50
opendevreviewDmitry Tantsur proposed openstack/bifrost master: Do not run ironic-prometheus-exporter as root  https://review.opendev.org/c/openstack/bifrost/+/82473516:50
dtantsuriurygregory: FYI ^^^16:50
iurygregoryThanks JayF =)16:50
iurygregorydtantsur, ack16:51
dtantsuriurygregory: and I could use your opinion on https://github.com/metal3-io/ironic-image/pull/344 because httpd is such a pita...16:52
iurygregorydtantsur, sure!16:53
dtantsurI *think* I tested it well. I think.16:53
iurygregorydo we have something that explain the scenario for reverse proxy? so I can get a better understanding =)16:55
dtantsuriurygregory: I would like to the TLS termination on httpd (because eventlet is pain)16:55
dtantsurso I'm doing the same thing that we've been doing with inspector already:16:55
dtantsuruser -> https://httpd:6385 -> http://ironic:638816:56
dtantsurmetal3 also delegates basic auth to httpd, which I'm personally not 100% fond of, but anyway16:56
iurygregorygot it16:56
iurygregorylet me just grab a quick lunch and I will review =D16:56
dtantsurbtw https://review.opendev.org/c/openstack/bifrost/+/819640 does a similar thing with nginx16:57
arne_wiebalckbye everyone, have a good weekend o/17:23
opendevreviewMerged openstack/ironic master: Use driver_internal_info methods for other drivers  https://review.opendev.org/c/openstack/ironic/+/81850917:35
opendevreviewVerification of a change to openstack/ironic bugfix/18.1 failed: Trivial: log current state when continuing cleaning  https://review.opendev.org/c/openstack/ironic/+/82061417:35
dtantsurhave a great weekend folks!17:45
TheJuliao/17:55
opendevreviewJulia Kreger proposed openstack/ironic stable/wallaby: Trivial: log current state when continuing cleaning  https://review.opendev.org/c/openstack/ironic/+/82475318:42
opendevreviewVerification of a change to openstack/ironic bugfix/19.0 failed: Fix Redfish RAID deploy steps  https://review.opendev.org/c/openstack/ironic/+/82442518:45
* TheJulia goes and takes more migraine meds19:10
opendevreviewMerged openstack/ironic-inspector master: Return a content-length on HTTP204 to prevent client failures  https://review.opendev.org/c/openstack/ironic-inspector/+/82464319:47
opendevreviewJulia Kreger proposed openstack/ironic-inspector stable/xena: Return a content-length on HTTP204 to prevent client failures  https://review.opendev.org/c/openstack/ironic-inspector/+/82475420:00
opendevreviewJulia Kreger proposed openstack/ironic-inspector stable/wallaby: Return a content-length on HTTP204 to prevent client failures  https://review.opendev.org/c/openstack/ironic-inspector/+/82475520:00
opendevreviewJulia Kreger proposed openstack/ironic-inspector bugfix/10.9: Return a content-length on HTTP204 to prevent client failures  https://review.opendev.org/c/openstack/ironic-inspector/+/82475620:01
opendevreviewMerged openstack/ironic bugfix/18.1: Use stable/xena upper-constraints  https://review.opendev.org/c/openstack/ironic/+/82445120:04
opendevreviewJulia Kreger proposed openstack/ironic-inspector master: Remove rootwrap rule for dnsmasq systemctl  https://review.opendev.org/c/openstack/ironic-inspector/+/82237320:23
opendevreviewVerification of a change to openstack/ironic master failed: Do not fail inspection on invalid MAC  https://review.opendev.org/c/openstack/ironic/+/82452321:55
opendevreviewMerged openstack/ironic master: Fix validating input for redfish update_firmware  https://review.opendev.org/c/openstack/ironic/+/82370123:05
opendevreviewMerged openstack/ironic master: Automatically configure enabled_***_interfaces  https://review.opendev.org/c/openstack/ironic/+/82090923:05
opendevreviewVerification of a change to openstack/ironic master failed: Do not fail inspection on invalid MAC  https://review.opendev.org/c/openstack/ironic/+/82452323:09
opendevreviewMerged openstack/ironic-inspector master: Remove rootwrap rule for dnsmasq systemctl  https://review.opendev.org/c/openstack/ironic-inspector/+/82237323:50
opendevreviewJulia Kreger proposed openstack/ironic master: Migrates docs from wiki  https://review.opendev.org/c/openstack/ironic/+/82480823:55

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!