Wednesday, 2017-04-26

jlkhahahahah00:00
jlkso this patch I've worked the last hour or so on00:00
jlkturns out, you've done the work in the fix for full project name which just merged, and all that's left of my patch is a new set of tests, no code change. Guess I'll abandon that one!00:01
jeblairjlk: yay?  :)  are the tests useful?00:02
jlkprobably not.00:02
jeblairokiedokie00:03
jlkI mean, it does test gerrt and github together in one tenant00:03
jeblairjlk: that sounds worthwhile00:03
jlkso... judgement call? I'll include the tests commit since they work, but feel free to nix it on review00:03
jlkjeblair: I've got another rebase about to happen. I'm not ignoring your review comments, I just needed to rebase on the bugfix from today, to land a few more of my patches. I'll get to your reviews soon00:19
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: support github pull request labels  https://review.openstack.org/44451100:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Allow github trigger to match on branches/refs  https://review.openstack.org/44562500:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Set filter according to PR/Change in URL  https://review.openstack.org/44678200:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Support for dependent pipelines with github  https://review.openstack.org/44529200:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Add basic Github Zuul Reporter.  https://review.openstack.org/44332300:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Configurable SSH access to GitHub  https://review.openstack.org/44403400:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Add 'push' and 'tag' github webhook events.  https://review.openstack.org/44394700:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Add 'pr-comment' github webhook event  https://review.openstack.org/44395900:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Support for github commit status  https://review.openstack.org/44406000:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Better merge message for GitHub pull reqeusts  https://review.openstack.org/44564400:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Test gerrit and github drivers in same tenant  https://review.openstack.org/44825700:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Encapsulate determining the event purpose  https://review.openstack.org/44524200:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Allow using webapp from connections  https://review.openstack.org/43983100:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Merge pull requests from github reporter  https://review.openstack.org/44446300:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Support GitHub PR webhooks  https://review.openstack.org/43983400:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: GitHub file matching support  https://review.openstack.org/44611300:22
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Log GitHub API rate limit  https://review.openstack.org/44615000:22
*** dmellado has quit IRC01:00
*** _ari_ has quit IRC01:00
*** _ari_ has joined #zuul01:00
*** dmellado has joined #zuul01:02
*** TaylorH has joined #zuul01:53
*** yolanda has quit IRC05:28
*** yolanda has joined #zuul06:49
*** isaacb has joined #zuul07:06
*** yolanda has quit IRC07:25
*** yolanda has joined #zuul07:41
*** yolanda has quit IRC08:24
*** yolanda has joined #zuul08:41
*** yolanda has quit IRC09:26
*** yolanda has joined #zuul09:43
lennybHi Team, does zuul support multiple gerrits ? Working with different gerrit servers and gerrit users?10:40
*** jkilpatr has quit IRC10:45
*** jkilpatr has joined #zuul11:05
*** yolanda has quit IRC11:19
*** yolanda has joined #zuul11:34
*** dkranz has quit IRC11:57
*** dkranz has joined #zuul12:56
*** yolanda has quit IRC13:06
*** yolanda has joined #zuul13:23
openstackgerritMerged openstack-infra/zuul feature/zuulv3: Allow using webapp from connections  https://review.openstack.org/43983113:44
mordredjeblair, jlk: left some responses to jeblair's comments on the older patchesets of a couple of those - there are some fun/execellent questions in there!13:51
jlklennyb: yes it does. There is even a test in the tree for multiple gerrits.14:48
*** isaacb has quit IRC14:59
*** isaacb has joined #zuul15:12
pabelangerToday zuul for rdoproject.org does this, it connects both to review.rdoproject.org and review.o.o15:15
*** yolanda has quit IRC15:31
lennybjlk, thanks, I will look for it15:36
*** jlk has quit IRC16:01
*** jlk has joined #zuul16:02
*** jlk has quit IRC16:02
*** jlk has joined #zuul16:02
*** isaacb has quit IRC16:09
jeblairmordred: thinking about your comments on 443947 -- while i'm open to some amount of helpful standardization, i don't think we should do too much help with 'merge'.  there is a gerrit 'change-merged' event, and, all things being equal, that's the one we really want to use for post.  if we could get the merge commit in there, it would be.  we have our own reasons for not using it, but there are equally compelling reasons for using it despite that ...16:10
jeblair... -- mostly so that you can make a job that reports back on the change.16:10
clarkbSpamapS: jlk are you able to run the full test suite successfully now?16:10
jeblairmordred: i'm more open to saying ref-updated is equivalent to push, but i want to stay away from confusing change-merged with ref-updated.16:11
jeblairmordred: but it seems like you were mostly advocating (ref-updated[refs/heads] / push_event[refs/heads]) -> push; (change-merged / pull_request[closed]) -> merge; and (ref-updated[refs/tags] / push_event[refs/tags]) -> tag16:13
jeblairmordred: if we do perform a mapping, that seems ideal.  i confess i'm still very torn between straight passthrough vs mapping.16:17
jeblairmapping seems very user friendly (especially for those of us who will use both).  gerrit and github triggers can share documentation about one set of actions.  otoh, we will probably have some actions that only apply to one (github pull request review request removed, for one).  i worry that once we get past the basics, it will actually become harder to reconcile different systems actions, and harder to document that as well.16:22
jeblair(also, i hesitate to invoke the 'naming' boogeyman, but "opened" may not be sufficiently descriptive, but as you point out, we can't call the mapped version of the event 'change' or 'pull_request' for fear of confusing people)16:23
clarkbdrive by comment: chances are this is something you modify in config very rarely too. So extra overhead to be explicit per backend is low in the grand scheme of things16:24
clarkband makes it easier to allow users to get what they want out of $backend16:24
jeblairmordred: so i think i'm still leaning slightly toward passthrough naming, but just making that as sensible and consistent as we can.  in the earlier change, you suggested being even more mechanical with 'pull_request.closed'.  i'd be okay with that too.  i mean, we can even do "pull_request: {action: closed}".  our config language does allow for that.16:28
*** jamielennox is now known as jamielennox|away16:31
mordredjeblair: nod. and yes- you are correct on your description of what I was advocating for in the mapping case16:43
mordredmapping ref-updated -> push and change-merged -> merge (or maybe not, maybe that one would still be change-merged / pull_request.closed - since the event is an event describing an action on the change/pull-request16:44
mordredjeblair: I don't feel strongly on either side, so if you're leaning more towards passthrough that works for me too16:45
mordredjeblair: I think my main argument for mapping is to make the language in this case a zuul language, so people can think about "push" and "tag" - neither of which have code review actions associated - rather than thinking of the mechanics their code review system/git system might use to accomplish that16:46
mordredlike - outside of openstack, one could also maybe imagine people who want to do traditional post-merge CI with zuul (why???) - and for them they'd have a "push" to respond to with gh but a ref-updated for gerrit and that just seems weird16:48
mordredbut I don't think it's extreme or bad weird16:48
mordredor problematic in any way - I think that ^^ is the sum total of any argument I can make in favor of mapping :)16:49
jeblairmordred: oh, so maybe a sort of mapping-light, where 'push' and 'tag' are mapped, but pull-request.* and change.* are not....?16:49
SpamapSclarkb: sorry your thing has been 2 or 3 layers down on my stack.. haven't gotten to it yet.16:50
clarkbSpamapS: its all merged now. Just wondering if people can run the tests lcoally now16:51
clarkbthen I can raelly decide its solved16:51
mordredjeblair: yah16:55
jeblairmordred: i think one thing that keeps having me come back to pass-through is other triggers (email, irc, etc) -- would we try to normalize email and irc triggers?.  probably not.  though, honestly, that doesn't make a very compelling argument against just mapping push and tag in github and gerrit.16:57
SpamapSclarkb: well that makes it easy.. running now16:58
SpamapSoh hey we need to fix something in RecordingExecutorServer ...16:59
SpamapShttp://paste.openstack.org/show/608107/17:00
SpamapSif you play with python3, that happens17:00
mordredjeblair: yah - I'd imagine if we get email triggers that do stewart's kernel mailing-list patch workflow, there would likely want to be some sort of hybrid plugin that also knows how to poll a git repository and look for changes that could potentially emit push and tag events?17:02
mordredjeblair: I mean, that's WILD speculation since we haven't designed that backend at all17:02
jeblairmordred: yeah, i wrote a git driver for v3, but it doesn't have a trigger yet.  it can only be used as a source.  but it could be extended as you describe fairly easily.17:03
mordredjeblair: ++17:03
clarkbSpamapS: the shutil in that paste is for python2.7. Perhaps related to why it breaks under python3?17:05
mordredI do think, no matter what we call them, it's clear to me that there are three different logical events that jobs may want to respond to: push (a new ref was added to the repo) change-merged/pr-closed (a proposed change was landed) and tag (a tag was created/deleted)17:05
jeblairmordred: push==a ref was created or its target was changed, right?17:06
jeblair(or deleted)17:06
SpamapSclarkb: !!   Ran 241 (+165) tests in 288.339s (+284.268s)17:14
SpamapSnice17:14
SpamapSclarkb: that's quite amazing. :-D17:14
SpamapSclarkb: regarding the paste.. that's me running tox -epy27 and getting that streaming over and over because my py3 runs left __pycache__ dirs lying around17:15
clarkbcool17:15
clarkbSpamapS: ah17:15
SpamapSI think I have a patch17:15
mordredjeblair: yah - I tihnk17:15
mordredjeblair: so17:15
jeblairSpamapS: is there more bwap documentation than the readme? https://github.com/projectatomic/bubblewrap17:23
jeblairjust wondering exactly what --dev does17:42
*** jkilpatr_ has joined #zuul17:44
openstackgerritClint 'SpamapS' Byrum proposed openstack-infra/zuul feature/zuulv3: Ignore directories when copying job dir components  https://review.openstack.org/46023417:45
SpamapSjeblair: I ported about 30% of bubblewrap to rust.. that's how I learned what it does. Was considering writing up more docs actually ;-)17:45
jeblairSpamapS: ++.  :)  in the mean time -- how are --proc and --dev special?17:45
openstackgerritDavid Shrewsbury proposed openstack-infra/zuul feature/zuulv3: Add a finger protocol log streamer  https://review.openstack.org/45672117:46
openstackgerritDavid Shrewsbury proposed openstack-infra/zuul feature/zuulv3: Allow for specifying root job directory  https://review.openstack.org/45669117:46
*** jkilpatr has quit IRC17:46
SpamapSjeblair: --proc just sticks a namespaced procfs in the chroot. The arg is the path under the chroot.17:46
SpamapSjeblair: I think --dev sets up a devpts.17:47
* SpamapS reads code17:47
SpamapSmore than devpts17:48
SpamapS          static const char *const devnodes[] = { "null", "zero", "full", "random", "urandom", "tty" };17:48
SpamapSit makes those17:48
SpamapSbind mounts them specifically17:48
jeblairSpamapS: sweet; so that makes a safe version of /dev17:48
jeblairSpamapS: does the namespacing of procfs prevent escape that way?17:49
SpamapSand /dev/shm, stdio symlinks in proc..17:49
SpamapSptmx17:49
SpamapSjeblair: it should17:49
jeblaircool17:49
SpamapSjeblair: but it's probably a good idea to crank that down a bit and restrict access to the proc nodes one needs.17:50
SpamapS(with a MAC)17:50
jeblairSpamapS: i wonder if we can cause ansible not to require proc17:50
SpamapSjeblair: probably. the setup module on localhost is what wants it.17:50
SpamapSssh needed /dev/null IIRC17:51
jeblairSpamapS: 'setup module on localhost' -- you aren't by chance referring to one of the modules we disabled, are you?17:51
SpamapSjeblair: IIRC that one is still enabled but perhaps not.17:52
mordredwe did not disable it17:52
jeblairwhich module specifically is this?17:52
SpamapSfact gathering17:53
SpamapSmost of the ansible_ vars are set in there17:53
mordredyah - fact gathering is perfomed by the setup module17:53
mordredwhich you can run on your local machine to see with "ansible localhost -m setup"17:53
SpamapSWonder if you can disable it.17:53
mordredI mean, you'd have to set gather_facts to explicit in the config17:54
mordredwhich would then change the characteristics of running playbooks for most people in unexpected ways17:54
mordredthat said - we could likely do a "if localhost: return {}"17:54
mordredso that it still functions but doesn't do as muchlocal introspection - since we're not expecting people to do a bunch of localhost operations17:55
SpamapSworth looking through them to see if we need any fo them.17:55
mordredand the ones we do expect them to do shouldn't be relying on a rich set of gathered facts17:55
mordredyah17:55
SpamapSin fact a lot of them would be useful in escaping ansible ;)17:56
mordredI'm not seeing any that seem particularly useful17:56
* SpamapS tries it inside bwrap17:58
SpamapSWow you get _a lot_ less with bwrap17:58
SpamapSwhich makes me happy17:58
SpamapShttp://paste.openstack.org/show/608114/17:58
SpamapSwith bwrap17:58
SpamapSoh interesting18:00
jeblairis that without proc?18:00
SpamapSjeblair: that's with proc18:00
* SpamapS finds it interesting that lsb_release assumes Debian if it doesn't have a /etc/lsb-release18:01
SpamapSoh wait no18:01
SpamapSjeblair: no /proc18:01
SpamapSI removed it at one point but forgot to remove the comment saying we need it ;)18:02
SpamapSso yeah that's likely why it shows so much less18:02
SpamapSand \o/18:02
jeblairneato18:02
SpamapS        "ansible_python_version": "3.5.2",18:04
SpamapSthat surprises me18:04
SpamapSI didn't think it could use python318:04
clarkblatest ansible has experimental python3 support iirc18:10
mordredyah.18:15
mordredand it's not ansible itself that's the problem at the moment - the big issue is the modules18:15
mordredso I believe the ansible code is all py3 compat now - but a non-zero number of the modules are not18:16
jeblairclarkb: how do you feel about generally doing pass-through events, except splitting ref-updated into 'push' (refs/heads updated) and 'tag' (refs/tag updated)?  on the one hand, it's us making synthetic events; on the other, it means that post and release pipelines can drop their negative lookahead regexes.18:26
clarkbI think if we do that it might be worth while implemetning that on top of continued support for ref-updated *18:29
*** jkilpatr_ has quit IRC18:37
*** jkilpatr has joined #zuul18:39
SpamapSjeblair: thanks for your comments on the bwrap thing. I wonder if I can just move the script into python as a driver.19:06
SpamapSjeblair: The script doesn't really do any scripty things19:06
SpamapSand this would allow me to just pass the real FD's in, rather than arbitrarily grabbing 11/1219:07
jeblairSpamapS: that would work if we're willing to omit the option for local customization for now (i am)19:21
mordredjeblair, SpamapS: ++19:22
jeblairclarkb: that suggestion is reasonable.  also, i don't want to make it harder for folks to match ref-updated events on, say, /refs/notes or other random ref paths...19:24
jeblairi think i'm leaning toward thinking we should do as close to mechanical pass-through as possible for now, and not split the push event into push/tag and let's look at adding synthetic helper events to both drivers as a separate change later.  that separates this potential enhancement from the critical path of landing github.19:25
jeblairi won't consider this finalized until we release anyway :)19:26
mordredjeblair: I think that's a great plan19:26
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Add support for github enterprise  https://review.openstack.org/44925819:40
mordredjlk: ^^ do we need to support self-signed certs in any way for ghe deployments? or leave that out of bounds and just expect people to install CAs as appropriate at the system level?19:45
jlkout of bounds I think.19:46
jlkI'd really rather not drag ssl into the mix.19:46
mordredjlk: me either19:47
clarkbits really easy to trust a self signed cert19:47
clarkbyou just add the cert itself to your recognized authorities19:47
clarkb(so ya don't bother)19:47
mordredwell - it is if you aren't using python requests with the built-in CA bundles19:47
clarkboh right19:47
mordredwhich is amongst the reasons all the openstack services and clients have all of those ssl params everywhere19:48
mordredBUT19:48
mordredI agree - let's opt for more sanity19:48
*** jamielennox|away is now known as jamielennox19:52
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Add trigger capability on github pr review  https://review.openstack.org/44936520:25
openstackgerritJames E. Blair proposed openstack-infra/zuul feature/zuulv3: [WIP] Fix nodepool integration job  https://review.openstack.org/46029920:29
*** dkranz has quit IRC21:06
openstackgerritMerged openstack-infra/zuul feature/zuulv3: Catch and log url pattern formatting errors  https://review.openstack.org/45046821:14
*** yolanda has joined #zuul21:25
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Add support for requiring github pr head status  https://review.openstack.org/44939021:27
openstackgerritJames E. Blair proposed openstack-infra/nodepool feature/zuulv3: Fix zuul-nodepool integration test  https://review.openstack.org/46032521:40
SpamapSNo handlers could be found for logger "paste.httpserver.ThreadPool"21:41
SpamapSI assume these are just from the recent log changes that helped us get better runs?21:41
jeblairSpamapS: where do you see that?21:43
SpamapSjeblair: running tests with tox -epy2721:43
clarkbSpamapS: ya I think it may be because other things can still try and touch logging directly21:44
clarkbthe fixtures fixture that we replaced actually unloads all logging, saves that state, loads its own logging in, then remove its logging and replaces saved state when done21:45
clarkbits quite a bit more involved21:45
jeblairwe can add a logger if needed, if we identify which test is missing it.  or maybe we add a default logger.21:45
clarkbjeblair: in this case I think its trying to remove a handler that isn't managed by it21:45
clarkband has already been delat with?21:46
clarkbit also appears to be harmless other than the noise21:46
clarkbwe might just squelch it21:46
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Adds github triggering from status updates  https://review.openstack.org/45384421:49
Shrewsjeblair: what do you think about adding a 'user=XYZ' option to the executor section of zuul.conf to control who the daemons run as? or should we just continue assuming 'zuul' user?21:49
*** jkilpatr has quit IRC21:51
SpamapSShrews: is this for the "listen on finger then drop privs" ?22:02
ShrewsSpamapS: yes22:02
SpamapSShrews: if so, definitely annoying not to be able to set the username to use.22:02
Shrewsright, but wondering if the executor section is the correct place, or something more generic ([zuul] ?) in case it's a pattern we want to repeat22:07
SpamapSexecutor makes sense to me22:11
SpamapScould also want a different user per component22:11
openstackgerritClint 'SpamapS' Byrum proposed openstack-infra/zuul feature/zuulv3: Add support for bwrap  https://review.openstack.org/45385122:12
SpamapSjeblair: ^^ redone as a pure python driver, complete with entrypoint (for testing)22:12
openstackgerritClint 'SpamapS' Byrum proposed openstack-infra/zuul feature/zuulv3: Add support for bwrap  https://review.openstack.org/45385122:13
openstackgerritClint 'SpamapS' Byrum proposed openstack-infra/zuul feature/zuulv3: Add support for bwrap  https://review.openstack.org/45385122:17
* SpamapS finishes sanding off the edges22:17
*** jkilpatr has joined #zuul22:31
openstackgerritJesse Keating proposed openstack-infra/zuul feature/zuulv3: Implement pipeline requirement on github reviews  https://review.openstack.org/45384522:52
jlkthat one hurt me. I think I need a break.22:56
jeblairSpamapS, Shrews: yeah, executor section sounds good22:56
jeblairSpamapS: oh neat, a new driver!22:58
jlkinteresting use of the driver interface23:01
mordredSpamapS: neat!23:03
clarkbconnections is really beginning to feel overloaded :)23:05
jeblairclarkb: well, it's a driver that does not implement the connection interface23:06
clarkbya but the connections object ends up being the caretaker of all the drivers23:06
jeblairtrue23:06
clarkb(its responsible for setting them up and cleaning them up when done)23:07
jeblairi sort of expected this to just end up as a function in the executor itself; i don't think it *needs* to be more complicated than that.  but the WrapperInterface is an interesting idea, and i guess if we expect to maybe have other implementations, worth considering?23:08
clarkbya I think its mostly a terminology problem and less functionality23:10
jeblairmordred: can you look at http://logs.openstack.org/25/460325/1/check/gate-nodepool-python27-ubuntu-xenial/655ee56/testr_results.html.gz ?23:11
jeblairkeystoneauth1.exceptions.auth_plugins.MissingRequiredOptions: Auth plugin requires parameters which were not given: auth_url23:12
jeblair(the second test; the first is the kazoo delete race)23:13
mordredthat seem non-optimal23:13
* mordred is looking further23:14
SpamapSjeblair: when I started, I used the drivers because I thought I might have leftover 'getent' subprocesses to cleanup.. but then I found pwd/grp23:17
mordredjeblair: hrm. I thought we'd dropped support in nodepool for ... oh, we did that in v323:17
mordredjeblair: hang on - crap. I'm really bad at debugging - don't listen to me23:19
jeblairmordred: sorry, the topic is 'master' because i'm really bad at git.  but i think that's really on the v3 branch.  :)23:19
jeblair(pretty much every git command i type now is 'git reset --hard')23:20
SpamapSOh hm, I may actually have pipes to clean up23:21
SpamapSclarkb: agreed on terminology. I think it's really a driver registry.23:22
mordredjeblair: it's the only git command you need23:22
mordredjeblair: ok. I have reproduced it locally23:23
SpamapSah yep.. I'm leaking read pipes on the parent. Have to close them after fork.. which is complicated. :-P23:24
jeblairyeah, we should rename it.23:27
jeblairafter landing the github series ;)23:28
SpamapSok, read pipe leak handled23:32
openstackgerritClint 'SpamapS' Byrum proposed openstack-infra/zuul feature/zuulv3: Add support for bwrap  https://review.openstack.org/45385123:32
SpamapSjeblair: this would totally work as a simple function in the executor. I like the layer of indirection though, as I am just a wee bit skeptical that bubblewrap will be the forever best choice. ;)23:33
SpamapSalso having the driver allows me to make the entry point really easily.23:34
mordredjeblair: ok - I would like to learn WAY more about what's going on here - but I can give you the short version, and then explain the things I want to understand further23:40
mordredjeblair: the tl;dr is that that test is testing something we don't actually support anymore, so it's not actually a valid test23:41
mordredjeblair: I'm not 100% sure why it worked before today23:41
mordredBUT - we made an os-client-config release today which removed a broken fallback from keystoneauth to keystoneclient which had been there for ages. so my theory is that the bug we fixed in occ was causing this test to fail open, which is why we didn't notice it was a bogus test23:42
mordredjeblair: that's the theory - I would like to prove that that's actually the case and not just that we actually introduced a behavior change in occ that this nodepool change has correctly found23:43
mordredjeblair: but the test_nodepool_provider_config is there to test configuring clouds without using clouds.yaml - so it doesn't set up a clouds.yaml file, which means it can't find the config values (I'm more than a little bit unhappy that the error is what the error is)23:45
jeblairmordred: that sounds reasonable.  this probably isn't urgent; we can double check all that with clarkb, pabelanger, and Shrews tomorrow.23:46
mordredjeblair: well - I've got a patch  coming to set "cloud" to be a required parameter :)23:47
mordredsince, well, it very much is a required parameter23:47
jeblaircool23:47
SpamapScloud config requires cloud23:49
mordredjeblair: given the lack of cloud parameter, I don't think I _can_ give a better error message from occ - the call in nodepool asked for "the cloud config" - with no clouds.yaml file and no input parameters, which _basically_ equates down to "gimme the one from the environment" - but there were none of those either, so it got all the way to "wow, I cannot build an auth plugin from Null parameters" :)23:49
mordredI'd trap that earlier - but asking for the unnamed cloud config is actually a fairly frequent real thing23:49
openstackgerritMonty Taylor proposed openstack-infra/nodepool feature/zuulv3: Enforce cloud as a required config value  https://review.openstack.org/46035423:56
mordredjeblair: ^^23:56

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!