Wednesday, 2023-08-09

opendevreviewJan Gutter proposed openstack/kolla-ansible master: WIP debug kolla-ansible-ubuntu-upgrade-cephadm  https://review.opendev.org/c/openstack/kolla-ansible/+/89082202:19
opendevreviewMichal Nasiadka proposed openstack/kolla-ansible master: systemd: handle running container without systemd unit  https://review.opendev.org/c/openstack/kolla-ansible/+/89019805:57
opendevreviewMichal Nasiadka proposed openstack/kolla master: DNM: dumb-init verbose  https://review.opendev.org/c/openstack/kolla/+/89087606:08
opendevreviewMichal Nasiadka proposed openstack/kolla-ansible master: systemd: handle running container without systemd unit  https://review.opendev.org/c/openstack/kolla-ansible/+/89019807:06
opendevreviewMichal Nasiadka proposed openstack/kolla-ansible master: DNM: Test with docker_restart_policy default  https://review.opendev.org/c/openstack/kolla-ansible/+/89065807:06
opendevreviewhowardlee proposed openstack/kolla-ansible master: Dev mode support for cyborg  https://review.opendev.org/c/openstack/kolla-ansible/+/89088307:18
SvenKieskemnasiadka: you got comments - well one comment - I'm curious why the removal of docker containers should actually fail, maybe it's related to cadvisor.07:34
mnasiadkaSvenKieske: so, currently we delete it with force=True, which sends SIGKILL if the container is up - because we don't really wait for the container to be stopped, so in some extreme cases - the container gets killed on removal - it's seen extremely well with mariadb upgrade (because you can't upgrade a database that has crashed)07:36
mnasiadkaand yes, I think the case that removal with force=True fails is some old bug, but better to leave it there, than be sorry later07:36
SvenKieskeand we send sigkill, because sigterm does run too long, or..?07:37
mmalchukmorning o/07:37
SvenKieskemorning o/07:37
mmalchukmnasiadka what with https://review.opendev.org/c/openstack/kolla-ansible/+/888943 ?07:37
mnasiadkammalchuk: to have a baseline - mod_status is disabled by default on Rocky/CentOS?07:39
mmalchukcan't check, but imho yes07:39
mmalchukit enabled in Ubuntu/Debian in postinstall scripts of the package07:40
mmalchukRocky/Centos afaik dont enable anything by default07:40
mnasiadkawell, then let's make it in the same state for all distributions07:43
mmalchukyou mean disable mod_status? but there are many people use it for monitoring... me too!07:45
mmalchukor enable mod_status in rocky/centos ? and merge fix?07:46
mnasiadkaso enable that for RedHat clones as well07:46
mmalchukok. will do this as a followup07:47
mmalchuklets merge security fix07:47
mnasiadkaI commented on the patch07:49
SvenKieskeI also did comment07:53
SvenKieskethis is not only about security but about exposing user info, which is PII under gdpr, so it would be really nice to get this merged fast and finetune later.07:53
mnasiadkaI don't like running like headless chicken and merging something + backporting that everywhere, just to fix something, that has been there for x years07:57
mnasiadkaand then revisiting it ;)07:57
SvenKieskewell I agree and disagree: I don't see any headless chicken, so disagree. I also think this should've been catched when it was implemented, so agreed it should never have been there for x years, does nobody do port scans these days anymore?07:59
SvenKieskethat was how I found that rabbitmq by default listens on all interfaces in k-a; which is just bad, and the facility to actually configure this was broken for some releases. all I did was a portscan of haproxy.08:00
SvenKieskeso maybe we should be more cautious in general when accepting new features. :/08:01
mmalchukmnasiadka but we didn't know that it was there for x years! this is security flaw not seed for x years08:01
mnasiadkammalchuk: stay calm, breathe08:01
mmalchukand you are not headless chicken, I've and kevko spend a lot of time to invecstigate and fix the issue08:02
* mmalchuk calm08:02
mnasiadkammalchuk: we never fixed that, so I assume it was there for x years, I doubt Ubuntu and Debian decided just now to enable mod_status by default08:02
mmalchukno! this appears in 2.4 apache last years08:02
mnasiadka2.4 was released 11 years ago 08:03
mmalchukok x=1108:03
SvenKieskeI really get mad when people tell me "it's okay, this issue has been there for x years", like do you realize a security issue that's been sitting there for x years makes it actually worse, not better?08:04
* SvenKieske calm08:04
mnasiadkaso you want to tell me, that although we configure backend to an internal ip, the traffic goes to 127.0.0.1?08:04
mmalchukwe can check when he decide to enable by default, but this is not solve the issue. there many peoples already know about flaw an use it for enumerate attack08:05
mmalchuknot realy 127.0.0.108:05
SvenKieskeno, at least in older releases rabbitmq listened on 0.0.0.0 which is all interfaces.08:05
mmalchukthere in config 'Require local'08:05
SvenKieskedidn't check if that actually changed08:05
mmalchukwhich means 127.0.01, ::001, and local connect08:06
mnasiadkammalchuk: so I proposed we do Require ::1 127.0.0.1 - just like tripleo08:06
SvenKieskebut that's really a sidetrack, currently.08:06
mnasiadkainstead of local08:06
mmalchuklol)08:06
SvenKieskedidn't really investigate if it maybe even was a local deployment issue08:06
mmalchuk'require local' only in horizon.conf08:06
mmalchukother services not configured at all08:06
SvenKieskealways good to have a productive conversation with you guys :)08:07
mmalchukso your solution add to all services virtualhost configuration the location /server-status with require 127.0.0.1 ?08:08
mnasiadkawell, Debian/Ubuntu default is require local, that's true08:08
mnasiadkammalchuk: we're having a discussion, aren't we?08:08
mmalchuksure08:08
mmalchuklets find the way08:08
mnasiadkainstead of doing weird config on haproxy level, it would be better to allow users to configure /server-status properly08:09
mmalchukI propose the solution wich works08:09
mnasiadkaand default to something security sane08:09
SvenKieskeagreed to both of you08:09
mmalchukwhy it weird?08:09
mmalchukhaproxy is front, it should defend too!08:10
mnasiadkastop those exclamation marks please08:10
mnasiadkashouting is not polite08:10
mmalchukimho we need many more other deny on front of web services08:10
mnasiadkawhy I don't think it's a good idea? we're changing role defaults on multiple services, but not all - we're not checking in CI if /server-status is even accessible, we're only fixing security by obscurity  on haproxy level (and not everybody is using haproxy)08:12
mmalchukI'm polite, sorry if this bother someone08:12
* SvenKieske is currently in a meeting08:12
mnasiadkaI agree this might fix it for some people, but I'm not convinced it's THE fix08:13
SvenKieskejust one thought: we should do security in depth, imho, so disable/secure things at haproxy level, but also on another level, e.g. if haproxy is not used08:13
mmalchukabout haproxyless, this affects only horizon08:13
mnasiadkaand while we merge this - it will not automatically fix on all exposed environment, you still need to run deploy ;-)08:13
mmalchukit can be fixed too, I've planed later08:13
mmalchukwe do upgrades08:14
mmalchukeven on the same releases08:14
mmalchukin production08:14
mnasiadkaJust saying I don't see the urgency on merging this, and surely I'm not happy with having N followups, where each of them needs to be backported all the way back to  Yoga08:15
mmalchukunderstand of no urgency08:15
mnasiadkaLet's continue the discussion on the meeting in the afternoon08:15
mmalchukI'm only want to close the issue08:15
mmalchukthe way you choose08:15
mmalchukok, continue on the meeting08:16
SvenKieskeI'll also be in a meeting when the meeting takes place, will try to be somewhat available though.08:17
SvenKieskemeetingception08:17
mnasiadkaWell, it's not for me to choose - but I prefer to close it once in the way we don't need to attend it anymore and we backport one patch to all stable branches08:17
SvenKieskesure, that would be optimal08:19
fricklerSvenKieske: how again is /server-status showing PII?08:37
SvenKieskelast time I looked server-status show all visiting clients ip addresses which is PII under gdpr?08:38
SvenKieskeit has been some years since I last looked at server-status page, so my information might be outdated, but I doubt it.08:39
SvenKieskesee e.g. https://blog.sucuri.net/2012/10/popular-sites-with-apache-server-status-enabled.html08:40
mmalchukoutdated, all sites are fixes08:41
mmalchukoutdated, all sites are fixed08:41
SvenKieskethis is really not very new information, unless apache did rewrite that mod_status, which I doubt :)08:42
frickleroh, _visiting_ clients. well I think we're lucky that behind haproxy that's only haproxy itself and it doesn't show the forwarded_for info afaict08:42
SvenKieskeah okay, if it's only the haproxy IP that would be great :)08:42
SvenKieskebut yeah, didn't check that, aren't forwared for headers set these days by default?08:42
mmalchukx-forwared-for used08:43
mmalchukand the list would contain all clients IP08:43
fricklerbut x-forwarded-for isn't shown in the status page, at least in my installation08:45
fricklerbut still leaking a lot of internal information, so should be fixed anyway08:45
mmalchukthere show the real ip address in the list08:56
SvenKieskemmalchuk: are you saying you're not only seeing haproxy ip and the header is set?08:58
mmalchukI see my real IP from internet along as other clients08:59
SvenKieskemhm, interesting, wondering where your setup differs from ours.09:07
fricklerseems the bug is here: https://opendev.org/openstack/kolla-ansible/src/branch/master/ansible/roles/horizon/templates/horizon.conf.j2#L29-L3109:10
fricklerthis overrides the restriction for /server-status from status.conf09:10
fricklerso it has nothing to do with haproxy really09:12
SvenKieskeyou gotta love those > 500loc changes where no meaningful review can take place: https://opendev.org/openstack/kolla-ansible/commit/5137f6b35bf264967fc1d676aa18d5b5465c7d1309:14
fricklerwell big tasks require big patches, I don't see how you could split adding a 500loc config file into multiple steps09:18
SvenKieskeweird, was disconnected from all three IRC networks where I'm online.09:31
SvenKieskeah my provider just decided to reconnect me in the middle of the day..nice09:32
opendevreviewMaksim Malchuk proposed openstack/kolla-ansible master: Deny access to public /server-status in http Openstack services  https://review.opendev.org/c/openstack/kolla-ansible/+/88894309:36
mmalchukfrickler I know about the bug you mentioned, updated fix09:37
mmalchukthis also will fix the issue with haproxyless installations where only horizon is affected09:37
mmalchukSvenKieske agree with your comment about exclamation mark. in my culture it used not for "shouting"09:39
mmalchukI'm really sorry, but it added automatically how learned in school09:40
SvenKieskethat's the trouble we get in an international environment I guess, but we all learn something new everyday :)09:48
mnasiadkano strong emotions needed :)09:49
mmalchukI will try not use exclamation mark at all, but sometimes I can forgot, so sorry again)09:51
mmalchukmnasiadka I've did a quick research - we cant use 'require ip 127.0.0.1' because we use api_interface_address to listen in apache, 127.0.0.1 not used at all, and this will completely disable access to server-status. so the haproxy only can block access. also added the fix for horizon in haproxyless configurations.09:54
mmalchukalso update the commit message and release note.09:54
mmalchukhttps://review.opendev.org/c/openstack/kolla-ansible/+/888943/7..809:55
opendevreviewJan Gutter proposed openstack/kolla-ansible master: WIP debug kolla-ansible-ubuntu-upgrade-cephadm  https://review.opendev.org/c/openstack/kolla-ansible/+/89082209:55
opendevreviewJan Gutter proposed openstack/kolla-ansible master: etcd: Add support for more scenarios  https://review.opendev.org/c/openstack/kolla-ansible/+/88801209:57
opendevreviewJan Gutter proposed openstack/kolla-ansible master: etcd: deduplicate environments for containers  https://review.opendev.org/c/openstack/kolla-ansible/+/89020809:57
opendevreviewJan Gutter proposed openstack/kolla-ansible master: WIP debug kolla-ansible-ubuntu-upgrade-cephadm  https://review.opendev.org/c/openstack/kolla-ansible/+/89082209:57
jangutterI found something interesting: looks like the `ara` logs have been broken for a while now. I know how to fix them, _but_ ara comes with a bit of an extra overhead.10:02
jangutterI find ara to be incredibly useful, but, it's definitely not a universal opinion.10:02
opendevreviewJan Gutter proposed openstack/kolla-ansible master: WIP debug kolla-ansible-ubuntu-upgrade-cephadm  https://review.opendev.org/c/openstack/kolla-ansible/+/89082210:57
yusufgungorHi, is there any kolla cinder docker image which already has the purestorage pip module? We are getting the error below:10:58
yusufgungor2023-08-09 13:38:59.407 55 ERROR cinder.volume.manager cinder.volume.drivers.pure.PureDriverException: Missing 'purestorage' python module, ensure the library is installed and available.10:58
mnasiadkajangutter: we disabled generating ara logs long time ago, because we were hitting out of space issues, you can try to enable them back, as long as we won't hit that problem anymore ;-)11:03
opendevreviewMichal Nasiadka proposed openstack/kolla-ansible master: systemd: handle running container without systemd unit  https://review.opendev.org/c/openstack/kolla-ansible/+/89019811:04
janguttermnasiadka: Oho, yeah, they can go big. Adding the sqlite output uses about 6M, but rendering to html uses 309M11:05
mnasiadkamaybe sqlite output and a script to render html on your own laptop11:06
jangutteryeah, I think that's probably the best.11:09
opendevreviewMichal Nasiadka proposed openstack/kolla-ansible master: DNM: Test with docker_restart_policy default  https://review.opendev.org/c/openstack/kolla-ansible/+/89065811:27
mmalchukyusufgungor no support yet11:35
mmalchukyusufgungor https://review.opendev.org/c/openstack/kolla-ansible/+/87984411:35
mmalchukyusufgungor the change is on review11:35
mmalchukyusufgungor but some review were merged11:37
mmalchukyusufgungor https://review.opendev.org/c/openstack/kolla-ansible/+/86329811:37
mmalchukyusufgungor https://review.opendev.org/c/openstack/kolla-ansible/+/84145311:37
mmalchukyusufgungor if you have an issue please create bug-report11:38
yusufgungorThanks for reply @mmalchuk I mean we have to install purestorage module into the cinder-volume container like "pip install purestorage" as kolla-ansible documentation states:11:44
yusufgungor"The use of this backend requires that the purestorage SDK package is installed in the cinder-volume container. To do this follow the steps outlined in the kolla image building guide particularly the Package Customisation and Custom Repos sections."11:44
yusufgungorIs it possible to have a docker image version with already installed this module?11:44
mmalchukyes, create the bug-report and someone will do this11:45
mnasiadkaor create a bug report and fix it in Kolla (contributions welcome)11:45
mmalchukyep11:46
SvenKieskeafaik this is a proprietary storage solution, I think that might be the reason why there is not that much support for it?11:55
mmalchukafaik good storage, thought to buy it12:04
mmalchukbut bought huawei dorado)12:05
opendevreviewMichal Arbet proposed openstack/kolla-ansible master: Add support for LetsEncrypt-managed certs  https://review.opendev.org/c/openstack/kolla-ansible/+/74134012:13
mnasiadkapatchset 22312:16
mnasiadkaI think it's going for an all time record12:16
janguttermnasiadka: looks like there's enough space to render it, but I think the sqlite solution is the best bang for the buck. https://3228bf3e0a1d8c81580e-c67b93b429db84769e417a4684ceffa6.ssl.cf1.rackcdn.com/890822/6/check/kolla-ansible-ubuntu-upgrade-cephadm/fce6f57/primary/ara-report/ara-html/12:30
mnasiadkajangutter: seems we have craploads of space looking at https://3228bf3e0a1d8c81580e-c67b93b429db84769e417a4684ceffa6.ssl.cf1.rackcdn.com/890822/6/check/kolla-ansible-ubuntu-upgrade-cephadm/fce6f57/primary/logs/system_logs/df.txt12:31
mnasiadkafrickler: ^^ - is it now standard to get 80GB disk?12:31
fricklerwe should not put support for any proprietary solution into our containers12:33
fricklermnasiadka: it may depend on the provider, let me check what guarantees we have12:34
mnasiadkafrickler: I know we get a second disk on some providers - looking at https://github.com/openstack/kolla/blob/7f12d216dc4de2c8d32291c3d6223185ecf2b510/tests/playbooks/pre.yml#L4412:35
jangutteryusufgungor: can you build your own kolla images? If so, you can add the extra plugin using a config file and the method described here: https://docs.openstack.org/kolla/latest/admin/image-building.html#plugin-functionality12:36
frickler"There is at least 80GB of disk available." but not necessarily on a single disk, yes. https://docs.opendev.org/opendev/infra-manual/latest/testing.html12:36
mnasiadkaso we might want to handle the additional disk in kolla-ansible CI as well for /var/lib/docker - that would make more space on / for things like ara HTML files12:38
fricklerwe might remount/bindmount the disk if there is one, yes12:38
jangutteryusufgungor: as far as I can tell from the docs, it looks like that the purestorage portion you need can't be bundled upstream and has to be added in by the user.12:39
fricklerbut also make sure not to generate too much log volume. like 300M html output for each job should certainly be avoided12:39
mnasiadkaright, true12:40
mnasiadkajangutter: let's go w sqlite then and some script/instructions how to generate ARA HTML12:40
jangutterack, I'll work up a patch and a readme.txt to put beside the sqlite file.12:41
mnasiadkafrickler: I think I finally managed to get to a working state with https://review.opendev.org/c/openstack/kolla-ansible/+/890198/46 (tested in https://review.opendev.org/c/openstack/kolla-ansible/+/890658/14) - would be grateful if you could take a look12:41
frickler46 revisions in 8 days is also not bad ;) added to my list but likely won't get to it today12:43
mnasiadkafrickler: well, first 20 revisions was to understand the problem, next 15 revisions was to get to current state, then I had a ,,better'' idea to use dc.wait, but it didn't work :)12:49
fricklermnasiadka: yes, I just wanted to put that into relation with the "223 iterations for LE in 3 years" above ;)12:52
mnasiadkafrickler: true :)12:55
opendevreviewMichal Arbet proposed openstack/kolla-ansible master: Add support for LetsEncrypt-managed certs  https://review.opendev.org/c/openstack/kolla-ansible/+/74134012:56
mnasiadkadamn, forgot13:00
mnasiadkamgoddard mnasiadka hrw  bbezak frickler kevko SvenKieske mmalchuk gkoper jangutter - meeting now13:00
mnasiadka#startmeeting kolla13:00
opendevmeetMeeting started Wed Aug  9 13:00:31 2023 UTC and is due to finish in 60 minutes.  The chair is mnasiadka. Information about MeetBot at http://wiki.debian.org/MeetBot.13:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.13:00
opendevmeetThe meeting name has been set to 'kolla'13:00
mnasiadka#topic rollcall13:00
mnasiadkao/13:00
mmalchuk\o13:00
janguttero/13:00
mattcreeso/13:00
ihalomi\o13:01
opendevreviewMichal Arbet proposed openstack/kolla-ansible master: Add support for LetsEncrypt-managed certs  https://review.opendev.org/c/openstack/kolla-ansible/+/74134013:01
SvenKieskeo/13:01
SvenKieskefantastic timing, meeting ended early, right into the next one13:01
opendevreviewMichal Nasiadka proposed openstack/kolla master: Move to Debian 12 'bookworm'  https://review.opendev.org/c/openstack/kolla/+/88608813:02
mnasiadka#topic agenda13:03
mnasiadka* CI status13:03
mnasiadka* Release tasks13:03
mnasiadka* Regular stable releases (first meeting in a month)13:03
mnasiadka* Current cycle planning13:03
mnasiadka* Additional agenda (from whiteboard)13:03
mnasiadka* Open discussion13:03
mnasiadka#topic CI status13:03
mnasiadkaSo, kolla and kolla-ansible sound green-ish, magnum jobs are failing due to some designate issue13:03
mnasiadkakayobe upgrade jobs still red - fixing in https://review.opendev.org/c/openstack/kolla-ansible/+/890198/4613:03
mnasiadka#topic Release tasks13:03
mnasiadkaIt's R-8 week13:04
mnasiadkawe have https://docs.openstack.org/kolla/latest/contributor/release-management.html#r-8-switch-images-to-current-release13:04
mnasiadkaAnybody wants to handle switching RDO and UCA to current in-development release?13:05
opendevreviewMichal Nasiadka proposed openstack/kolla-ansible stable/yoga: Add documentation for migrating from CS8 to RL9  https://review.opendev.org/c/openstack/kolla-ansible/+/88485813:05
fricklerI wonder whether we still need to do that at all13:05
mnasiadkawe use some packages from RDO for sure13:06
mnasiadkaI can handle RDO13:06
frickler2023.2 should work fine with ceph+libvirt from 2023.113:06
mnasiadkathat true, but OVN users would be happy to get newer OVN version13:07
opendevreviewMichal Arbet proposed openstack/kolla-ansible master: Add support for LetsEncrypt-managed certs  https://review.opendev.org/c/openstack/kolla-ansible/+/74134013:08
frickleris OVN in UCA? I don't know about RDO13:08
SvenKieskeI guess I could maybe take a stab at the UCA part, never did it, but the linked change looks easy enough13:08
mnasiadkafrickler: yes it is13:08
mnasiadkaok13:08
SvenKieskedon't know anything about RDO "delorean"13:08
mnasiadka#action mnasiadka handle RDO switch to bobcat13:08
mnasiadka#action SvenKieske handle UCA switch to bobcat13:08
mnasiadka#topic Regular stable releases (first meeting in a month)13:09
mnasiadkaWe agreed last time to do it after the systemd fix gets backported to 2023.113:09
mnasiadkait's still not merged in master, so let's try again next week13:09
mnasiadka#topic Current cycle planning13:10
mnasiadkaI see good progress on Let's Encrypt13:10
mnasiadkaihalomi: sorry, I didn't have time to have a look in Rocky failures on podman13:10
mnasiadkaihalomi: any other issues on podman patches? Is there something we could review?13:10
mnasiadka(as in merge before we fix the rocky problem)13:10
ihalomimnasiadka: no other issues, this is basically this is the last obstacle to getting +113:11
SvenKieskelast time I looked patches looked pretty good, afaik I did a full review, will have another look13:11
opendevreviewMichal Nasiadka proposed openstack/kolla stable/yoga: ovsdpdk: add libdpdk-dev  https://review.opendev.org/c/openstack/kolla/+/88031713:12
mnasiadkaok, I'll have a look too13:12
mnasiadka#topic Additional agenda (from whiteboard)13:12
mnasiadkaoctavia jobboard patch seems to get better, I'll have a look at it later13:13
mnasiadkadebian bookworm support - I'll fix the conflicts in the kolla patch and it seems it's good to merge13:13
fricklerI added the precheck verification as discussed13:13
mnasiadkaand then we could have a crack at the kolla-ansible side13:13
fricklerwe need to wait for the haproxy option fixes for bookworm13:13
mnasiadkaok, there's a series of patches13:14
mnasiadkaI've seen a proposal to squash them together13:14
fricklerI reviewed one patch but didn't track responses13:14
frickleryes, that was me13:14
mnasiadkabut maybe it's just easier to merge them as is when they pass properly?13:14
mnasiadkabut yes, we need to have a look at pushing those forward, I think the author is not going to work on them promptly enough ;-)13:15
fricklerI can have a look again, but it seemed too complicated to me13:15
mnasiadkamattcrees - rabbitmq enable ha queues by default is ready for review: https://review.opendev.org/c/openstack/kolla-ansible/+/88282513:15
mattcreesBasically I've added support in the CI upgrade jobs to migrate the queue types, and have proposed a KA command to reset rabbit state as this is a key part of the process13:16
mnasiadkaok then, another thing to review queue ;)13:17
fricklerack13:17
mnasiadkaok then13:18
mnasiadka#topic Open discussion13:18
SvenKieskecould people with +2 powers take a look at the backports of: https://review.opendev.org/c/openstack/kolla-ansible/+/889189 ? thank you13:18
mnasiadkaDo we need to discuss the server-status thing again?13:18
SvenKieskeshould be straight forward13:18
SvenKieskeI _guess_ the current server-status patch now looks fine? :)13:18
mmalchukmnasiadka I can give an update13:19
mmalchukthis can't be fixed by 'require ip 127.0.0.1' because of https://opendev.org/openstack/kolla-ansible/src/branch/master/ansible/roles/horizon/templates/horizon.conf.j2#L1613:20
mmalchukthere is already 'require local' - https://httpd.apache.org/docs/2.4/mod/mod_authz_host.html13:20
mmalchukso accept - the client address matches 127.0.0.0/8, the client address is ::1, both the client and the server address of the connection are the same 13:20
mmalchuklast case - is haproxy13:20
mmalchukI've updated change: https://review.opendev.org/c/openstack/kolla-ansible/+/888943/7..813:21
mmalchukadd more info and update release note13:21
mnasiadkaWell, I'm still not convinced - Rocky/CentOS have mod_status enabled, but not configured - and it does not show up there.13:21
mmalchukI'm ready to add mod_status to Rocky/Centos13:22
fricklerwith no config, the handler isn't used13:22
mnasiadkaSo if we would remove the default configuration for mod_status in Debian/Ubuntu - we would get to the same state?13:22
mmalchukwill propose Kolla fix13:22
mnasiadkaAnd then on top of this, we could add a feature to configure that properly in kolla-ansible?13:22
mnasiadkaOr is my thinking wrong?13:23
mmalchukfrickler wrong13:23
SvenKieskeimho your thinking is only "wrong" that it breaks existing users13:23
mmalchukit can't be configured because of haproxy13:23
mmalchukadd 'require 127.0.0.1' will completely disable status13:23
mmalchukbecause we use internal vip for apache listen13:24
fricklermmalchuk: I was talking about why the issue isn't seen in rocky13:24
mnasiadkaSvenKieske: it's not a feature, it's a bug for now :)13:24
SvenKieskei.e. removing the default config and adding a role to properly configuring this would require us to backport a completely new role, no? and it must match the old behaviour at least for internal usage13:24
mnasiadkaan unplanned feature is a bug from my perspective13:24
mmalchukfrickler did you see last change? https://review.opendev.org/c/openstack/kolla-ansible/+/888943/7..813:24
mmalchukand Rocky is not affeced13:24
mmalchukthis is in release note13:25
frickleryes, I was replying to mnasiadka 13:25
SvenKieskemnasiadka: that's really not helpful humor here: it's a security bug because it's reachable from potential untrusted networks on deb/ubuntu; it's a feature there because you can monitor apache stuff from internal networks, I don't want to break those users, do you?13:25
mnasiadkaSvenKieske: it's a feature only on Debian/Ubuntu, and it's a Debian/Ubuntu package and default config feature, not a kolla-ansible feature :)13:26
SvenKieskeor we backport completely new roles to old releases to fix this, could also work, but imho backports should be minimal, which mmalchuks change really is, there's not much to argue there from the maintenance perspective imho.13:26
mmalchukmnasiadka I will add the 'feature' to the Rocky/Centos but this is not related to bug13:26
mnasiadkaIt's not a feature.13:27
mmalchukwe will got the same behavior13:27
mmalchukon all installations13:27
SvenKieskemnasiadka: do you really want to argue that we only promise to not break users if we built a feature in k-a ourselves? because than I'm out of this discussion, this is ridiculous13:28
mnasiadkaIt's like with this ansible-core breakage, because we used handlers with import_tasks - bug was rejected because nobody ever planned this usage.13:28
mmalchukCentos/Redhat users can use monitoring localay, but will not be affected by bug we close now13:28
SvenKieskeserver-status is a clear apache feature, it's not a bug per se, you just need to care how you enable that13:28
mnasiadkaWe don't enable tht.13:29
mnasiadka*that13:29
mnasiadkaIt's enabled by default13:29
mnasiadkaonly on 50% of the distributions we support13:29
mmalchukwe enable that in horizon)13:29
SvenKieskeyeah sure, but don't break the default then13:29
mnasiadkaFrom my perspective it's a Debian/Ubuntu packaging bug13:29
mmalchukhttps://opendev.org/openstack/kolla-ansible/src/branch/master/ansible/roles/horizon/templates/horizon.conf.j2#L3013:29
frickleryes, and it is safe by default, adding haproxy in front is what breaks things13:29
SvenKieske"only on 50%"..I'm out13:29
fricklerand adding haproxy is what kolla does13:29
SvenKieskeyour not having a honests helpful discussion imho13:30
mmalchukwithout this server status not available even without haproxy13:30
mnasiadkado we really need to override Location / in horizon.conf?13:30
fricklermnasiadka: that's actually a second issue13:30
mnasiadkafrickler: which could fix the first issue13:30
mmalchukmnasiadka Ubuntu/Debian enable more modules than Centos/Rocky not only mod_status13:31
fricklermnasiadka: no13:31
mnasiadkasecond thing - I'm all in deny'ing /server-status in haproxy on ALL frontends13:31
mnasiadkabut the patch denies it only on some of the services13:31
mnasiadkaand doesn't include a CI task that will check if we don't encounter the same bug in future13:31
mnasiadkaare we going to iterate on this bug every time it shows up?13:31
SvenKieskeI honestly don't care _how_ we do this. I care about two things: a) fix the security bug (I don't care whoever introduced it, upstream, we, little green men from mars) b) preserve legitimate use cases like internal monitoring without breaking them13:32
mmalchukon some - because of apache2 only services need this13:32
fricklerok, but then we agree on doing the filtering as proposed in haproxy?13:32
SvenKieskeI'm baffled that needs to be argued, like, at all.13:32
mmalchukwe didnt use external vip on CI - this is another issue13:33
mnasiadkaSeems we have no other option, that to do the filtering as proposed in haproxy - question what about users that use external load balancers, should we update the docs for them?13:33
SvenKieske"question what about users that use external load balancers" <- can you elaborate what you mean by that? I don't understand13:33
fricklerif the loadbalancer isn't on the same host as apache, only the fix in the horizon location statement is needed13:33
mmalchukimho there are no such users13:34
mnasiadkammalchuk: of course there are13:34
fricklerthere are, but not affected13:34
mnasiadkathanks for clarification instead of denying the problem ;-)13:34
fricklerthose won't match "Require local"13:34
mnasiadkaright13:34
mmalchukserver-status on cinder api ? for example? kidding13:34
mnasiadkabut now, with the current shape of the patch - we enable mod_status on CentOS and Rocky for Horizon, right?13:35
SvenKieskeyou mean people who don't use haproxy but use a different LB? well they need to do the filtering themselves I guess? a doc patch would be nice, but not strictly necessary imho13:35
mmalchukright13:35
mmalchuki will propose patch13:35
SvenKieskethey need to provide all balancing config themselves either way, so I hope they know what they are doing I guess.13:36
mmalchukwe just add handler to config in kolla13:36
mmalchukshould we backport this 'feature' ?13:36
SvenKieskeit's really funny that we are back to the original solution again  (are we? I have lost track..)13:36
mnasiadkammalchuk: I'm asking, because https://review.opendev.org/c/openstack/kolla-ansible/+/888943/8/ansible/roles/horizon/templates/horizon.conf.j2#34 will change behaviour on CentOS/Rocky13:37
SvenKieskewell if it breaks existing users without the backport I'd argue we need a backport13:37
mnasiadkaif it's planned - then include that in the reno, but for backporting - we shouldn't probably doing that13:37
mmalchukfrickler as said 'not affected'13:37
mmalchukthere is 'require local' already in apache config from package13:37
mnasiadkanot in CentOS/Rocky13:38
mnasiadkaand here you add it for ALL distributions13:38
fricklermnasiadka: this will not enable server-status13:38
mnasiadkaare you sure?13:38
mmalchuknot. but there is no handler there!13:38
frickleryes13:38
mmalchuksorry)13:38
fricklerexactly, no handler13:38
mnasiadkaah ok, SetHandler is missing13:38
mmalchukso centos/redhat not affected at all13:38
mmalchukeven with fix13:38
SvenKieskeyeah this only requires a local ip to get to the route, but if apache has no route to that path everything is fine, I didn't check rocky myself13:39
mmalchukbut wen I propose change to Kolla container - there will be work, so we need merge first fix13:39
mmalchukwhen13:39
SvenKieskeI wish the "enable this on rocky" would be a separate discussion, I have no eggs in the basket regarding rocky :)13:39
fricklerI would skip that part unless rocky users ask for it13:40
mmalchukI will propose, lets people decide13:41
mmalchukwe will have same behaviour in all installations13:41
mnasiadkathat's another discussion13:42
mmalchukyep13:42
SvenKieskeyeah from a strict technical standpoint we should try to provide similar functionality for all distros13:42
mmalchukindeed13:42
SvenKieskeafaik that's why we use upstream packages, maybe we should package apache httpd ourselves? /troll13:42
mmalchukit can be described in the docs. about 'curl... server-status' to check13:42
mmalchukhuge overhead13:43
jangutterdo we have 2 minutes for a quick report about our favourite etcd version? (timeboxed)13:43
mnasiadkaSvenKieske: better tell me why Debian/Ubuntu exposes all users to that ,,issue''13:43
mmalchukthe answer 'because')) 13:44
SvenKieskejust debian things I guess, not a fan of the tech side - I was always a fedora guy personally - I stumbled upon this error in a different context some years ago.13:44
mmalchukbecause they want13:44
fricklerjangutter: imo later is better, but we can ony bump minor version by one per cycle?13:44
jangutterTL;DR etcd 3.4 drops deprecated API interfaces. Nearly every kolla-ansible service uses the old interface.13:45
frickleralso please stop these distro wars13:45
mmalchukthey enable huge list of modules and expose more info13:45
SvenKieskedebian has the philosophy of enabling everything to nanny the user (autostarting services), except where it's useful (providing auditd with remote support)..13:45
mnasiadkafrickler: not a distro war, but it should be semi-secure by default ;)13:45
fricklerjangutter: oh, so 3.4 is too new for us?13:45
mnasiadkajangutter: so all services need a change in their config13:46
mnasiadkajangutter: ?13:46
SvenKieskeI can work with every distro, and there are objectively bad and good things in all of them13:46
jangutterand Zun is particularly badly affected - they depend on a particularly painful combination of docker and old etcd. I only see WIP things for it, but it requires some hard rework for them.13:46
fricklerjangutter: afaict devstack is also hardcoded to 3.3, guess we need to bump there first13:46
jangutterCinder (and hopefully all tooz affected things) are configurable and "works" on 3.4.13:46
mnasiadkajangutter: we can drop zun support, it's been painful already ;)13:46
SvenKieskeuh that's a bummer, should there be a blueprint or ML post to coordinate upgrades for etcd then?13:47
jangutterYah, noting that 3.3 is no longer maintained, and 3.4 is likely to be soon, sooner migration is better.13:48
fricklerI'll propose a bump in devstack and see what happens there13:48
fricklerand then we can check in kolla again13:49
jangutterThere's a lot of "v3alpha" hardcoded everywhere in clients, especially python ones.13:49
mnasiadkaok, so that seems like a longer topic - maybe worth a thread on ML?13:49
jangutter(I got it to work in k-a, trying to fix the unrelated noise in the job)13:49
jangutterI'll send out a post!13:49
opendevreviewMaksim Malchuk proposed openstack/kolla-ansible master: Deny access to public /server-status in http Openstack services  https://review.opendev.org/c/openstack/kolla-ansible/+/88894313:50
fricklerI have two more small patches: https://review.opendev.org/c/openstack/kolla-ansible/+/871054 and https://review.opendev.org/c/openstack/kolla-ansible/+/87665013:50
jangutterZun might be a casualty unfortunately, they hit a deprecated "feature" in docker _and_ etcd.13:50
mnasiadkaI don't think it's overly active, so no hard feelings13:51
mnasiadkadon't know if there's a lot of users13:51
jangutterThanks! end of timebox, feel free to ping me if you're interested or have Zun contacts13:51
mnasiadkaok13:52
mnasiadkaanybody anything else?13:52
mmalchukkayobe reviews?13:53
mnasiadkaonce kayobe CI is fixed we can handle that13:53
mnasiadkacurrently it's broken due to systemd issue13:54
mmalchukhttps://review.opendev.org/c/openstack/kayobe/+/87955413:54
mmalchukhttps://review.opendev.org/c/openstack/kayobe/+/86139713:54
mmalchukplease these two13:54
mnasiadkathey won't pass the CI, nor the gate, upgrade jobs are broken13:54
mnasiadkaok, I think we've had the longest meeting this year13:55
mmalchukalready passed13:55
mnasiadkathanks for coming13:55
mmalchukthank you13:55
mnasiadkammalchuk: but they won't pass now.13:55
mnasiadka#endmeeting13:55
opendevmeetMeeting ended Wed Aug  9 13:55:20 2023 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)13:55
opendevmeetMinutes:        https://meetings.opendev.org/meetings/kolla/2023/kolla.2023-08-09-13.00.html13:55
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/kolla/2023/kolla.2023-08-09-13.00.txt13:55
opendevmeetLog:            https://meetings.opendev.org/meetings/kolla/2023/kolla.2023-08-09-13.00.log.html13:55
SvenKieskethank you for chairing :)13:55
frickler\o13:55
* SvenKieske going to the next meeting..13:55
opendevreviewMichal Nasiadka proposed openstack/kolla stable/2023.1: rabbitmq: Fix repo for ubuntu aarch64  https://review.opendev.org/c/openstack/kolla/+/88717715:58
opendevreviewMichal Nasiadka proposed openstack/kolla stable/yoga: Use erlang-25 from copr on aarch64  https://review.opendev.org/c/openstack/kolla/+/88696615:58
mmalchukfolks, please review and merge https://review.opendev.org/c/openstack/kolla-ansible/+/88894316:15
opendevreviewMerged openstack/kolla-ansible master: rabbitmq: add rabbitmq_datadir_volume parameter  https://review.opendev.org/c/openstack/kolla-ansible/+/87665016:22
opendevreviewMerged openstack/kolla-ansible master: ironic: add ironic_agent_files_directory parameter  https://review.opendev.org/c/openstack/kolla-ansible/+/87105416:34
opendevreviewMichal Arbet proposed openstack/kolla master: Rework letsencrypt  https://review.opendev.org/c/openstack/kolla/+/88734717:12
opendevreviewMichal Arbet proposed openstack/kolla-ansible master: Add support for LetsEncrypt-managed certs  https://review.opendev.org/c/openstack/kolla-ansible/+/74134018:22
opendevreviewMaksim Malchuk proposed openstack/kolla-ansible master: Deny access to public /server-status in http Openstack services  https://review.opendev.org/c/openstack/kolla-ansible/+/88894319:57
opendevreviewMaksim Malchuk proposed openstack/kolla-ansible master: [DNM] test haproxy external vip  https://review.opendev.org/c/openstack/kolla-ansible/+/89075819:57
opendevreviewMaksim Malchuk proposed openstack/kolla-ansible master: Deny access to public /server-status in http Openstack services  https://review.opendev.org/c/openstack/kolla-ansible/+/88894319:58
opendevreviewMaksim Malchuk proposed openstack/kolla-ansible master: [DNM] test haproxy external vip  https://review.opendev.org/c/openstack/kolla-ansible/+/89075819:58
opendevreviewGaël THEROND proposed openstack/kolla-ansible master: Improve designate role support.  https://review.opendev.org/c/openstack/kolla-ansible/+/87827020:03
opendevreviewMichal Arbet proposed openstack/kolla master: Rework letsencrypt  https://review.opendev.org/c/openstack/kolla/+/88734720:18
opendevreviewMichal Arbet proposed openstack/kolla master: Rework letsencrypt  https://review.opendev.org/c/openstack/kolla/+/88734720:24
opendevreviewMaksim Malchuk proposed openstack/kolla-ansible master: Deny access to public /server-status in http Openstack services  https://review.opendev.org/c/openstack/kolla-ansible/+/88894320:52
opendevreviewMaksim Malchuk proposed openstack/kolla-ansible master: [DNM] test haproxy external vip  https://review.opendev.org/c/openstack/kolla-ansible/+/89075820:55
opendevreviewMaksim Malchuk proposed openstack/kolla-ansible master: Deny access to public /server-status in http Openstack services  https://review.opendev.org/c/openstack/kolla-ansible/+/88894321:18
opendevreviewMaksim Malchuk proposed openstack/kolla-ansible master: [DNM] test haproxy external vip  https://review.opendev.org/c/openstack/kolla-ansible/+/89075821:19
opendevreviewGaël THEROND proposed openstack/kolla-ansible master: Improve designate role support.  https://review.opendev.org/c/openstack/kolla-ansible/+/87827023:01

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!