Tuesday, 2024-03-05

opendevreviewAntony Messerli proposed openstack/kolla master: Moves fluentd_binary and fluentd_user labels  https://review.opendev.org/c/openstack/kolla/+/91101400:22
mnasiadkamnaser: not really, but I’ll add that topic to ptg06:48
mnasiadkaSvenKieske: and dependencies to those modules like rabbitmq and ovs libs06:49
fricklermnasiadka: I have the feeling that I keep forgetting this, but do we really have to have support for weird 3rd party drivers like purestorage in kolla?07:28
mnasiadkafrickler: pure is a driver in cinder support matrix, isn’t it?07:44
mnasiadkaI’m not sure if it’s in tree or not07:44
mnasiadka(On the tram now, can check later)07:45
fricklermnasiadka: cinder does support it via 3rd party testing, but IMHO that doesn't mean that kolla needs to support it07:56
mnasiadkafrickler: let's start from the beginning - what is the problem with it?07:58
kevkofrickler: well, I think kolla can support it ..but we don't need to test it as I suppose that folks who used to use it will handle the functionality 07:59
fricklermnasiadka: my problem is a) I don't like to have untested features in kolla and b) I don't want to review non-free things08:00
mnasiadkaI agree with a), but since we have a contributor that is interested in that - I don't see a problem08:01
mnasiadkafrickler: what do you mean non free? that you need to buy a storage array or is the driver closed source?08:02
fricklerif the only contributor is the company that is producing the hardware, I'm sceptical whether that is enough. cf. the vmware situation08:04
fricklerbut ok, if other reviewers are fine with this kind of support, I can just try to ignore those reviews and that's it08:06
mnasiadkathings like vmware will happen either way if you review it or not ;-)08:12
opendevreviewUwe Jäger proposed openstack/kolla-ansible master: Allow customizing of Skyline configuration  https://review.opendev.org/c/openstack/kolla-ansible/+/90586108:17
SvenKieskethe thing with the kolla_toolbox container is, it needs access to all kind of ovs things and this somehow fails in the ovn exporter CI, not sure yet what is the root cause. it feels like a reinvention of shared libraries in a docker context. weird.09:32
opendevreviewIvan Halomi proposed openstack/kolla-ansible master: Refactor of docker worker  https://review.opendev.org/c/openstack/kolla-ansible/+/90829509:49
kevkoFor one of our customers we are using CADF audit in openstack services ... CADF configuration (for most of services) need to be done in api-paste.ini (define audit filter and add to app pipeline) ...and then just to define messaging driver and url ....etc ..etc  09:56
kevkoI wrote a script which adding this to api-paste based on ENV variable ... but wondering if we can't add this by default to api-paste files and then just to set a driver noop/messagingv2 etc ..09:58
kevkoI've been pulling it for several releases in dowsntream repos ..and I will be glad if I will solve this in this cycle 09:58
kevkofrickler mnasiadka ^ ? 09:59
fricklerkevko: sounds like a pretty obscure downstream use case to me. but maybe seeing an actual example would help10:04
opendevreviewSven Kieske proposed openstack/kolla-ansible master: [doc] document --limit limitations  https://review.opendev.org/c/openstack/kolla-ansible/+/91108210:30
SvenKieskeI just noticed it would be helpful if we used the "action item" thingy in meetbot during meetings, our minutes are void of any action items and one has to check the full logs :D10:31
kevkofrickler: Okay, openstack services can generate CADF events sent to some system (rabbitmq, kafka , log ..etc) ...problem is that you need to change api-paste.ini file to include WSGI middleware filter (https://docs.openstack.org/keystonemiddleware/latest/audit.html) ...point is that api-paste.ini is not modified by user in 99% cases ...10:31
SvenKieskekevko: frickler: there was this old patch for CADF, was something wrong with it? it was abandoned. https://review.opendev.org/c/openstack/kolla-ansible/+/67457910:33
kevkofrickler: moreover ..it's not good idea to define api-paste.ini for services in kolla-ansible ... in current kolla-ansible code there are only few services which has also api-paste.ini in k-a ...and because nobody cares ..they are in old version ... for example for masakari 10:33
SvenKieskekevko: what would you recommend regarding api-paste.ini in general? I also noticed it seems to be brittle. should we use just upstreams defaults? but I guess we have at least some reasonable patches in some projects?10:34
kevkoSvenKieske: api-paste.ini file is not something that should be modified by user as it is configuration for wsgi ... from paste deploy doc - > Paste Deployment is a system for finding and configuring WSGI applications and servers. For WSGI application consumers it provides a single, simple function (loadapp) for loading a WSGI application from a10:36
kevkoconfiguration file or a Python Egg. 10:36
kevkoSvenKieske: simply said, developers who are developing the code also provides api-paste ..and we of course copying that api-paste.ini into images ...10:37
SvenKieskekevko: I have a modest understanding of api-paste.ini, my question was what you think we should do. I did not ask about an explanation what it does.10:38
fricklerkevko: so first you are saying we should change it and now you are saying we should not change it?10:38
kevkofrickler: No, I said that I have a script which is modifiing api-paste.ini file on start based on some variable (in my case ENABLE_CADF)  ...or another option is to modify api-paste.ini during the build process ...10:39
kevkofrickler: and I just asked what do you think guys ... I think the script approach is better ...as you can then configure for example ignored requests as per documentation ...10:40
kevkofor now I only know two cases when you need to modify api-paste.ini ... CADF audit and healthcheck (but this is really not needed as you can check if 200 is returned on /)10:41
kevkofrickler: SvenKieske: this is my testing version -> https://paste.openstack.org/show/boweQChOXHCTcIO1OBWo/10:42
fricklerah, adding deeper healthchecks is another nice topic. like verifying that DB connection and messaging are alive10:42
SvenKieskefrom an architectural pov and a security pov it seems prudent to do this at the container build layer until there is a strong reason not to, e.g. making this configurable by the end user at runtime. reason being is you can also fiddle with security sensitive stuff there like cors, authtoken etc and make things insecure by accident10:44
fricklerand I don't like the idea of modifying config within the container10:45
kevkofrickler: I meant this healthcheck for API ...as this is another filter configurable via api-paste.ini https://github.com/openstack/oslo.middleware/tree/master/oslo_middleware/healthcheck 10:45
SvenKieskeso currently we have two api-paste.ini.j2 in k-a one is cyborg: https://review.opendev.org/c/openstack/kolla-ansible/+/728688/2/ansible/roles/cyborg/templates/cyborg-api-paste.ini.j210:45
fricklerkevko: yes, I know10:45
SvenKieskebut this seems to be the same than latest upstream, so can probably be removed? https://github.com/openstack/cyborg/blob/master/etc/cyborg/api-paste.ini10:46
SvenKieskethe other is masakari10:46
kevkoSvenKieske: yeah ...and I really don't like that we have api-paste.ini in kolla-ansible ..because firstly it is same as upstream ..and secondly ..from time to time upstream developers just change it ...and we really don't track it ...10:47
kevkoSvenKieske: example is this https://github.com/openstack/kolla-ansible/blob/master/ansible/roles/masakari/templates/masakari-api-paste.ini.j2 10:47
kevkoSvenKieske: https://github.com/openstack/masakari/blob/master/etc/masakari/api-paste.ini << this is upstream default10:47
SvenKieskeso if there is no reason to configure this during runtime it should not be configured during runtime imho. just remove it in k-a with reference to upstream and if we need to change it, e.g. for your CADF thingy do that at build time instead? :)10:47
kevkoSvenKieske: User can configure CADF -> ignore_req_list  ---> what requests will not be audited 10:49
SvenKieskemaybe put it on the whiteboard agenda for tomorrow?10:49
SvenKieskeokay, so then it makes sense maybe to make this configurable during runtime, unless we mandate users always to build their own containers :D10:49
kevkofrickler: I am not saying that I reeeallly like the idea of modifiing the config ...but why not ? 10:49
SvenKieskewell in an ideal world containers are immutable ;)10:50
kevkofrickler: redis-sentinel is modifiing his startup configuration by default ! :D 10:50
kevkoSvenKieske: ^^10:50
kevkoSvenKieske: Well, fortunately, this is not the topic because we don't live in an ideal world :) 10:52
SvenKieskewell I said "ideal world", we don't seem to live over there just yet :D10:52
kevkoSvenKieske: "reason being is you can also fiddle with security sensitive stuff there like cors, authtoken etc and make things insecure by accident" -> How ? If your script is bulletproof ..you are safe 10:55
kevkofrickler: btw, have you ever encountered that during the RabbitMQ upgrade using Kolla-Ansible (where all nodes are first shut down except the first one, then the first one is shut down, and then all are gradually started)... the first node didn't start up? I've never been able to replicate it anywhere in testing... but on a highly loaded cloud, it11:03
kevkohappened to us during an upgrade last week... we had to call force_start via rabbitmqctl and then manually start the others... we had to act quickly... I suspect that the default pause_minority parameter for partition handling in Kolla-Ansible may have caused this11:03
kevkofrickler: I agree that pause_minority is good to avoid split-brain ...but I was wondering that there should be few restarts before upgrade with autoheal partition handling -> upgrade -> switch again to pause_minority11:04
kevkofrickler: OR provide playbook to recover from this situation ..as we have for mariadb_recovery 11:07
SvenKieskekevko: most scripts aren't bulletproof. I try to remove stuff that can be misused where I can. :)11:12
fricklerkevko: I haven't done upgrades myself in a long time11:13
opendevreviewMichal Arbet proposed openstack/kolla-ansible master: Remove api-paste config files for masakari, cyborg  https://review.opendev.org/c/openstack/kolla-ansible/+/91108711:13
kevkoSvenKieske: really dirty is kolla-venv in containers ...11:14
kevkoSvenKieske: it's really ok we have venv for python ...but then we changing PATH to PATH /var/lib/kolla/venv/bin:$PATH in openstack-base and moreover we are using "python3 -m venv --system-site-packages" 11:16
kevkoSvenKieske: then I am really wondering why we are using venv :D 11:17
SvenKieskethe first one I kind of understand, but why system-site-packages? I guess to reuse distro based packages? mhmm python packaging is still a mess..11:17
SvenKieskekevko: I guess it reduces maybe download time during build? what does the commit message say? :D11:18
SvenKieskehttps://review.opendev.org/c/openstack/kolla/+/87798611:20
SvenKieskeah it was --system-site-packages before as well11:20
SvenKieskehttps://review.opendev.org/c/openstack/kolla/+/36897311:22
kevkoSvenKieske: nope ..it wasn't https://review.opendev.org/c/openstack/kolla/+/24676211:23
mnasiadkawe use --system-site-packages for example because this: https://review.opendev.org/c/openstack/kolla/+/83084411:23
kevkomnasiadka: for example this is buggy ...i've fixed downstream in our repo 11:24
kevkomnasiadka: i wanted to point that also ..you were first 11:24
mnasiadkawhat is buggy, where is the bug report, and why is it not fixed yet?11:24
kevkomnasiadka: If I remember correctly, ovs was correcly installed in some container which really needed ovs in same version as openvswitch package ... but different version in another container 11:25
kevkomnasiadka: base vs openstack/base11:26
kevkomnasiadka: and childs ...11:26
mnasiadkaso why didn't you publish a patch upstream? ;-)11:26
kevkomnasiadka: if I am correct it was openvswitch vs neutron-openvswitch-agent ...or something like that ...11:26
kevkomnasiadka: Sometimes I really need to fix something quickly and wait for bugfix in kolla kolla/ansible with all those comments in review ... :D  ..i just can't wait ...but *everything* i am sending to upstream ..but it takes some time ...11:29
mnasiadkakevko: well, at least a bug would be helpful, because I see that now you're not really sure where the problem was :)11:29
kevkomnasiadka: https://paste.openstack.org/show/bDw1vFlC858JBdz8pKIa/11:30
kevkomnasiadka: I know ... two versions of OVS in two containers :D 11:31
SvenKieskewell it _seems_ the usage of system-site-packages in the above ovs example is really a workaround of conflicting requirements on which versions we should really install. another solution would just be to patch uc to the correct version (we do patch it anyway in that change)11:31
kevkoSvenKieske: if I am correct ..we are removing ovs from uc ... as a workaround to a workaround :D 11:32
SvenKieskeBut I'm also not sure system-site-packages is a problem per se. Currently reading: https://packaging.python.org/en/latest/specifications/externally-managed-environments/#externally-managed-environments11:32
SvenKieskefrom a maintainers persepective it would be nice to have a file _somewhere_ where we can find an aggregated list of all the dependencies we have. this should be conflict free and consistent of course.11:33
kevkoOh, where are those times when I didn't have to deal with this and packages were installed from the APT repository :D :D At least I have a clear conscience that I protested back then :D11:34
SvenKieskethis is also complicated by the fact that some of our upstream fellow openstack projects are really not fast when it comes to updating their requirements files or their constraints files.11:34
mnasiadkaSvenKieske: correct python3-openvswitch version will never show up in UC, because depending on distro - we have a different version of OVS11:34
mnasiadkaand a different version is used for testing in CI11:35
mnasiadkaNeutron team recommended to install the correct version of ovs lib, and that's it - we can't rely on u-c for everything11:35
kevkomnasiadka: +1 11:35
SvenKieskemnasiadka: I can't find this recommendation at least in these docs? https://docs.openstack.org/neutron/latest/install/ovn/manual_install.html#controller-nodes it just tells me to install ovs somehow :D11:37
kevkomnasiadka: SvenKieske: my idea was install all from git ...from latest version tag included in stable/branch OR head of stable/branch (if user requested) ...and other stuff from packages ... ovs ..rbd ..11:37
kevkoSvenKieske: yeah, but it's little problem if you have openvswitch in version X.Y.Z and python3-openvswitch is X+3.Y.Z ...11:38
SvenKieskesure sure, afaik we still do build our ovs downstream ourselves11:39
kevkoSvenKieske: we are also building everything downstream ..because kolla don't have a patching system ..we have it in downstream kolla11:40
kevkoSvenKieske: wallaby (or xena ...) ...had really ugly bug that services didn't reconnect to rabbitmq after lost connection ... it was bug in oslo.messaging ..it was one line fix ...but upstream just placed into stable branch and that's it :D 11:41
kevkoSvenKieske: as kolla is installing dependencies from pip ...I've implemented patching system for kolla ..so I have patches folder where I have folders for containers and there I have classic patches ...11:42
kevkoI was packaging openstack in debian :D ..I know how many patches I need to add to packages to be working :D ... that was the reason why I protested against removal binary support ...now we need to maintain ourselves 11:43
kevko*maintain the code11:43
kevkoI'm glad when there's no silence in this channel. :D 11:44
mnasiadkaSvenKieske: https://bugs.launchpad.net/neutron/+bug/1961874/comments/311:48
SvenKieskegood to know it's written down somewhere.. do you happen to know the book "the hitchhikers guide to the galaxy"?11:52
mnasiadkayes, 4211:52
SvenKieskeI was more referring to: “Yes,” said Arthur, “yes I did. It was on display in the bottom of a locked filing cabinet stuck in a disused lavatory with a sign on the door saying ‘Beware of the Leopard.” 11:54
SvenKieskehttps://www.goodreads.com/quotes/40705-but-the-plans-were-on-display-on-display-i-eventually11:54
SvenKieskebut good to know it's "documented" :D11:54
SvenKieskein a closed bug report in a comment where the bug report is not about supported versions of ovs but about ovn nb db timeouts. but it's written down..somewhere :D11:55
* SvenKieske is going for a walk. o/11:55
opendevreviewMichal Nasiadka proposed openstack/kolla master: Bump rabbitmq to 3.13  https://review.opendev.org/c/openstack/kolla/+/91109311:59
opendevreviewMichal Nasiadka proposed openstack/kolla-ansible master: rabbitmq: Add 3.12 feature flags (for upgrade to 3.13)  https://review.opendev.org/c/openstack/kolla-ansible/+/91109412:02
opendevreviewMichal Nasiadka proposed openstack/kolla-ansible master: rabbitmq: Add 3.12 feature flags (for upgrade to 3.13)  https://review.opendev.org/c/openstack/kolla-ansible/+/91109412:05
SvenKieskemnasiadka: do you use any service or subscribe to some rabbitmq announcements or how do you get notified of new releases? or are you checking manually? just curious!13:02
mnasiadkaSvenKieske: checking manually twice a cycle ;-)13:16
mnasiadka(and the latest RMQ mirror issue was related to some mirror script bumps because of 3.13)13:16
kevkohave u ever used pipgrip ? btw ? 13:24
SvenKieskedo you mean ripgrep? I use it very often. I don't know pipgrep, if that is not a typo :)13:28
SvenKieskeseems you are talking about https://pypi.org/project/pipgrip/ ? never heard of it before13:29
kevkohttps://github.com/ddelange/pipgrip13:30
SvenKieskeah, it's basically poetry without the pip incompatibilities?13:30
SvenKieskeseems interesting13:30
kevko(pipdeptree) michalarbet@pixla:~/ultimum/git/ultimum/kolla-ansible$ pipgrip --json python-keystoneclient13:30
kevko{"python-keystoneclient": "5.4.0", "debtcollector": "3.0.0", "wrapt": "1.16.0", "keystoneauth1": "5.6.0", "iso8601": "2.1.0", "os-service-types": "1.7.0", "pbr": "6.0.0", "requests": "2.31.0", "certifi": "2024.2.2", "charset-normalizer": "3.3.2", "idna": "3.6", "urllib3": "2.2.1", "stevedore": "5.2.0", "oslo-config": "9.4.0", "netaddr": "1.2.1",13:30
kevko"oslo-i18n": "6.3.0", "pyyaml": "6.0.1", "rfc3986": "2.0.0", "oslo-serialization": "5.4.0", "msgpack": "1.0.8", "oslo-utils": "7.1.0", "netifaces": "0.11.0", "packaging": "23.2", "pyparsing": "3.1.1", "tzdata": "2024.1"}13:30
kevkoSvenKieske: I am doing some research to finally install openstack python packages in correct way ...13:31
SvenKieskeI was recently more looking into https://github.com/astral-sh/uv because it claims to be a drop in replacement for pip but faster (10-100 times) so that seems interesting from openstack pov13:31
SvenKieskeso far most stuff seems to work, but it still has not every pip function under the sun, I don't know if we need them all though13:32
SvenKieskeso maybe add that to your research list, I was also looking into this stuff as a side project, maybe we can share notes somewhere? I feel the current pip ecosystem still somewhat lacking. It certainly got better than 10 years ago but it could still get better imho13:33
SvenKieskeI personally think pyproject.toml is a good step in the right direction. I just don't know about all the backwards incompatibilities that python introduces along the way (setuptools deprecation, etc)13:34
kevkoSvenKieske: well, i am not expert ..but what I've found is pipgrip and poetry ...but openstack projects don't have pyproject.toml 13:35
SvenKieskekevko: there are some mailinglist postings and some patches floating around to introduce pyproject.toml, because pip upstream is forced to introduce it..wait a second13:36
kevkoSvenKieske: yep, please share 13:37
SvenKieskekevko: this is the thread that started this all: https://lists.openstack.org/archives/list/openstack-discuss@lists.openstack.org/message/HVFN5RBSHRTM3B2UUKPAWKH6H6AT6CYR/13:37
SvenKieskeah sorry, this is the complete thread, the above is only the first message: https://lists.openstack.org/archives/list/openstack-discuss@lists.openstack.org/thread/HVFN5RBSHRTM3B2UUKPAWKH6H6AT6CYR/#HVFN5RBSHRTM3B2UUKPAWKH6H6AT6CYR13:38
kevkoSvenKieske: from my perspective I would like to :13:38
kevko1. Ability to install from stable head  git 13:38
kevko2. From tag from git 13:38
kevko3. From released version13:38
kevko4. Configurable13:38
kevko5. Ideally reproducible13:38
SvenKieskethat works in "uv" ;)13:39
SvenKieskefor the pyproject.toml stuff there's at least a patch in nova, but not yet merged: https://review.opendev.org/c/openstack/nova/+/89975313:39
SvenKieskethere are some problems related to wsgi I guess13:40
SvenKieskebut the really gory details are all in the above thread, I have to reread some of it myself to remember13:41
SvenKieskebut I guess that thread is highly relevant to us, because some paths for wsgi might change and how to configure stuff..13:41
SvenKiesketo be honest as this ML discussion was tagged with "all, packaging, release, qa" I expected at least some people in here to know about it, I hope that's still the case? :) I can understand though if it got missed, too many communication channels these days..13:44
kevkoSvenKieske: yep ... i've also seen some test patches from mnasiadka13:44
opendevreviewMartin Hiner proposed openstack/kolla-ansible master: Add container engine migration scenario  https://review.opendev.org/c/openstack/kolla-ansible/+/83694113:59
kevkoSvenKieske: this gonna be a fun :D :D 14:12
kevkoSvenKieske: looking deeper and deeper14:12
opendevreviewJakub Darmach proposed openstack/kayobe master: Use new collections in Kayobe  https://review.opendev.org/c/openstack/kayobe/+/91074214:18
opendevreviewRafal Lewandowski proposed openstack/kayobe master: Add Redfish rules to Ironic and Bifrost introspection  https://review.opendev.org/c/openstack/kayobe/+/90277214:23
opendevreviewSven Kieske proposed openstack/kolla-ansible master: [doc] document --limit limitations  https://review.opendev.org/c/openstack/kolla-ansible/+/91108214:25
opendevreviewKevin Tindall proposed openstack/kolla-ansible master: Add TLS proxy for novncproxy  https://review.opendev.org/c/openstack/kolla-ansible/+/91114115:25
opendevreviewMichal Nasiadka proposed openstack/kolla master: Bump rabbitmq to 3.13  https://review.opendev.org/c/openstack/kolla/+/91109315:42
kevkomnasiadka: https://paste.openstack.org/show/b9xT2T1F9938PCpTlK4h/ << my local pipeline ..but probably upstream bug also 15:43
mnasiadkakevko: sorry, what is a bug in this output? ;-)15:46
kevkomnasiadka: 2024-03-05T12:43:56.7620059Z ERROR: Could not open requirements file: [Errno 2] No such file or directory: '-c{env:TOX_CONSTRAINTS_FILE:https://releases.openstack.org/constraints/upper/master}'15:47
SvenKieskekevko: I can't see that error in the above paste? am I missing something (probably)?15:49
opendevreviewMichal Nasiadka proposed openstack/kolla-ansible master: CI: Replace etcd with redis in GATE_IMAGES for cephadm scenario  https://review.opendev.org/c/openstack/kolla-ansible/+/91114315:49
kevkoSvenKieske: probably bad paste ... the line above15:49
kevkoSvenKieske: probably bad paste ... the line above16:10
SvenKieskeok :)16:34
opendevreviewPierre Riteau proposed openstack/kolla-ansible stable/2023.2: Configure missing nova services to expose vendordata over configdrive  https://review.opendev.org/c/openstack/kolla-ansible/+/91106716:46
mnasiadkafrickler: willing to have a look in ^^? I know it's feature-ish - but there's no other way to supply that today (config overrides won't work)16:52
opendevreviewPierre Riteau proposed openstack/kolla-ansible stable/2023.1: Configure missing nova services to expose vendordata over configdrive  https://review.opendev.org/c/openstack/kolla-ansible/+/91106816:52
opendevreviewPierre Riteau proposed openstack/kolla-ansible stable/zed: Configure missing nova services to expose vendordata over configdrive  https://review.opendev.org/c/openstack/kolla-ansible/+/91106916:52
SvenKieskemnasiadka: why does config override in combination with providing the file not work?17:11
mnasiadkaSvenKieske: the only way to provide the file is to copy that manually on the hosts (or write some separate playbook) and add an extra bind mount or something like that? 17:12
mnasiadkasounds like a drama ;)17:13
opendevreviewPierre Riteau proposed openstack/kayobe master: Remove default value from sample configuration  https://review.opendev.org/c/openstack/kayobe/+/91115517:13
SvenKieskeyeah, so why doesn't this work? it's surely not nice, but it works? I'm not against merging this, but stated facts should be correct, I'm a big fan of that :)17:13
SvenKieskeI haven't used config drives for cloudinit in a long time, old memories. :) thanks for the clarification.17:15
SvenKieskelooking at it from a feature vs bug angle you could still argue that it's more of a bug fix. ¯\_(ツ)_/¯17:18
SvenKieskereading the code, vendordata was never exposed before, so from this angle it's a "feature". depending on how we view the vendordata feature (mandatory vs optional) I would judge this as a bugfix (if providing vendordata is considered a "must") or a feature (if it's optional).17:21
SvenKieskecommented on the change17:23
mnasiadkait's optional - https://docs.openstack.org/nova/latest/user/metadata.html#vendordata17:24
mnasiadkabut useful :)17:24
SvenKieskesure, I know a lot about configdrive and vendordata - more than I like to admit - so I'm not against it.17:26
SvenKiesketbh I find the openstack backporting rules to be "difficult" to say the least, because, like most rules, they miss many nuances of actual proposed backports. an invasive "bugfix" can bear much higher risk like e.g. this little feature backport17:27
SvenKieskethis is just one of many things that's missing from the backports rules, they have a very heavy good/bad approach which is often just wrong "bugfix? good" "feature: regressions! high risk! bad!" this is just not what the real world is like.17:28
mnasiadkaThat's why we usually agreed to backport small features if they don't break anything, do not require new inventory groups, etc17:31
SvenKieskeif we follow generic rules to the letter they should be very very well thought out and be backed by some actual numbers showing that they are right. everything else is just cargo culting. but I guess I should stop the heresy here now ;)17:31
mnasiadkaI’ll add that as PTG topic so we can have a documented policy19:26
kevkomnasiadka: SvenKieske: i am open to merge it :D ... I'm merging huge stuff downstream and everything is good :D 20:56
opendevreviewMerged openstack/kayobe master: Remove default value from sample configuration  https://review.opendev.org/c/openstack/kayobe/+/91115522:58

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!