Wednesday, 2017-08-09

dmsimardAsking the opinion of pros on openstack-dev about how the new ARA API should behave, I don't think there's an actual [ara] tag on the ML filters so just in case anyone here has advice: http://lists.openstack.org/pipermail/openstack-dev/2017-August/120855.html04:09
openstackgerritTobias Henkel proposed openstack-infra/zuul feature/zuulv3: Try to early terminate streaming on ansible errors  https://review.openstack.org/49102705:16
tobiashmordred, jeblair: tried ^^^ in my local deployment and the delay in case of task parse errors is gone: http://paste.openstack.org/show/617875/06:17
tobiash(note the missing streamer didn't terminate string)06:17
*** amoralej|off is now known as amoralej07:26
*** TheJulia has quit IRC08:47
*** robled has quit IRC08:47
*** Shrews has quit IRC08:47
*** jkilpatr has quit IRC08:47
*** smyers has quit IRC08:47
*** jamielennox has quit IRC08:47
*** amoralej has quit IRC08:47
*** mmedvede has quit IRC08:47
*** olaph has quit IRC08:47
*** dmsimard has quit IRC08:47
*** EmilienM has quit IRC08:47
*** zigo has quit IRC08:47
*** yolanda has quit IRC08:47
*** tristanC has quit IRC08:47
*** toabctl has quit IRC08:47
*** jeblair has quit IRC08:47
*** eventingmonkey has quit IRC08:47
*** jlk has quit IRC08:47
*** SotK has quit IRC08:47
*** fbouliane has quit IRC08:47
*** adam_g has quit IRC08:47
*** mattclay has quit IRC08:47
*** mnaser has quit IRC08:47
*** pbrobinson has quit IRC08:47
*** persia has quit IRC08:47
*** _ari_ has quit IRC08:47
*** robcresswell has quit IRC08:47
*** patrickeast has quit IRC08:47
*** zaro has quit IRC08:47
*** tflink has quit IRC08:47
*** mgagne has quit IRC08:47
*** fungi has quit IRC08:47
*** leifmadsen has quit IRC08:47
*** kklimonda has quit IRC08:47
*** bstinson has quit IRC08:47
*** clarkb has quit IRC08:47
*** jhesketh has quit IRC08:47
*** tobiash has quit IRC08:47
*** pleia2 has quit IRC08:47
*** timrc has quit IRC08:47
*** lennyb has quit IRC08:47
*** mordred has quit IRC08:47
*** morgan has quit IRC08:47
*** xinliang has quit IRC08:47
*** openstackgerrit has quit IRC08:47
*** cinerama has quit IRC08:47
*** jesusaur has quit IRC08:47
*** rcarrillocruz has quit IRC08:47
*** ajafo has quit IRC08:47
*** SpamapS has quit IRC08:47
*** ChanServ has quit IRC08:47
*** rfolco has quit IRC08:47
*** gothicmindfood has quit IRC08:47
*** openstack has joined #zuul13:56
jeblairtobiash, mordred: that all sounds good, but why put the password on the executor and not also pass it through nodepool?14:16
tobiashjeblair: the concern was about putting the pw into zookeeper14:17
tobiashjeblair: I would also be ok with putting that to zookeeper14:17
tobiash(where the connection can hopefully be encrypted)14:18
jeblairtobiash, mordred: oh, yeah, zookeeper has support for encryption and authentication; and if we're going to use it for everything in zuulv4, we'll have to get comfortable with privileged info in there, so now seems like a good time to make it secure and use it.14:19
tobiashjeblair: then that's the way to go (maybe also in future for the master node key?)14:20
jeblairtobiash: maybe so; the idea of passing everything through nodepool is growing on me :)14:20
tobiash:)14:21
mordredjeblair, tobiash: ok - I'm good with that14:21
*** amoralej|lunch is now known as amoralej14:27
*** jkilpatr has quit IRC14:33
*** jkilpatr has joined #zuul14:34
*** jkilpatr has quit IRC15:03
tobiashjeblair, mordred: I'll look into this after my vacation (whicj is the week before the ptg)15:20
jeblairtobiash: are you leaving for vacation now, or starting next week?15:21
tobiashjeblair: planned was next week but I have to reduce overtime starting with now15:27
jeblairtobiash: okay.  enjoy your hiking!15:33
tobiashjeblair: thanks :)15:33
openstackgerritMerged openstack-infra/zuul feature/zuulv3: Try to early terminate streaming on ansible errors  https://review.openstack.org/49102715:36
openstackgerritMerged openstack-infra/zuul-jobs master: Remove base job  https://review.openstack.org/49190715:56
jeblairpabelanger: when you have a minute, if you can take a look at https://review.openstack.org/491635  and see if the examples look okay, we can start to spiff up the job docs a bit i think.16:22
pabelangerjeblair: ya, sorry. I did start reviewing it yesterday. let me finish16:23
pabelanger+216:25
mordredjeblair: +A16:39
openstackgerritMerged openstack-infra/zuul-sphinx master: Import directives/roles from zuul  https://review.openstack.org/49163516:41
openstackgerritMonty Taylor proposed openstack-infra/zuul-sphinx master: Mark zuul-sphinx as supporting python3  https://review.openstack.org/49220316:57
openstackgerritMonty Taylor proposed openstack-infra/zuul-sphinx master: Add CONTRIBUTING file to repo and to docs  https://review.openstack.org/49220416:57
openstackgerritMonty Taylor proposed openstack-infra/zuul-sphinx master: Add dist dir to .gitignore  https://review.openstack.org/49220516:57
*** jkilpatr has joined #zuul16:59
mordredjeblair: ^^ those are tiny little things from reviewing the other thing17:02
pabelangermordred: did you want add https://review.openstack.org/491093 to your review pipeline. Our tarball publisher job17:28
*** jkilpatr has quit IRC17:38
*** jkilpatr has joined #zuul17:42
jeblairmordred: thanks!17:50
*** electrofelix has quit IRC17:57
pabelangermordred: how did we want to handle jenkins/scripts/pypi-extract-name.py is that something we still need or should we expect the job to setup the values18:04
pabelangermordred: left -1 on 491915 syntax error18:06
jeblairpabelanger: that's not a syntax error, that's a nitpicky pep8 whitespace style "error"  :)18:09
pabelangerah, yes18:14
openstackgerritDavid Shrewsbury proposed openstack-infra/nodepool feature/zuulv3: Allow launcher to stop quicker when asked  https://review.openstack.org/49221918:26
*** xinliang has quit IRC18:26
jeblairpabelanger: was there a particular reason .ansible/fact-cache was created in $jobdir rather than $jobdir/work ?18:40
pabelangerjeblair: I think we wanted to to be the same as local_tmp and remote_tmp, for directory structure. I also think we didn't want untrusted jobs to have access to it either, since it was possible to leak executor facts18:43
*** morgan is now known as kmalloc18:46
jeblairpabelanger: okay, that helps, thanks18:47
kklimondajeblair: looks like I'm already here - let me give you a quick introduction into what I'm trying to achieve.18:53
kklimondaerm, fungi ^18:53
kklimondasorry, nick colors have confused me18:54
fungino problem ;)18:55
jeblairi mix us up all the time too :)18:55
kklimondafungi: I'm working on OpenContrail CI which is currently based on OpenStack CI from the past, with zuul 2.0. We're planning on catching up with the current OpenStack CI stack, upgrading zuul to 2.5 (and then to 3.0 when you deem it stable and production-ready).18:55
kklimondahowever, at the same time we find ourselves on a deadline to integrate Windows builders into the live CI, to merge test and release windows-related features.18:56
fungioh, okay, so not actually trying to port zuul services to run under windows, just trying to get zuul to run jobs on windows servers18:57
fungithat's probably far easier18:57
jeblairkklimonda: zuul 2.5 still supports jenkins, so you can upgrade to the latest 2.x and still use jenkins to run jobs.  that might be the quickest way forward.18:57
kklimondajeblair: sigh, removal of Jenkins during 2.5 upgrade has been made a priority.18:58
jeblairkklimonda: which removal of jenkins?18:58
kklimondait doesn't scale for us from what I've heard18:58
jeblairkklimonda: oh, so you have an internal constraint not to use jenkins?18:58
kklimondayes, that's been a main driver for 2.5 release from what I understand - there's been issues with scaling it to 90+ slaves18:59
fungikklimonda: depending on how you need to scale, we ran zuul with 8 (i think it was?) jenkins masters launching jobs on over 100 slaves per master for a while18:59
fungizuul 2.x came about specifically because we needed to scale past a single jenkins master18:59
pabelangerah, weekly jenkins master reboots. How I don't miss that :)19:00
fungiwhich was the point where we added the gearman coordination between zuul's scheduler and multiple jenkins masters19:00
kklimondahmm, I think the powers-that-be will not reconsider jenkins at this point - we want to have a state of the art CI infrastructure based on what you guys are doing at the moment.19:01
jeblairthat makes sense.  i can see why you wouldn't want to invest more in setting up multiple jenkins masters if you aren't already doing that and want to converge on modern zuul19:02
kklimondayes, that's a good way to put it :)19:03
jeblairanyway, just wanted to make sure that we covered that option, because it's probably the least risky and the fastest path to working jobs19:03
jeblairkklimonda: if you want to move to ansible-based zuul soon, probably the best bet would be to start working with zuul v3.  it's not ready for widesrpead use yet (we still make breaking changes occasionally), but its use of ansible is more flexible that zuul v2.5, so whatever you would need to do to work with windows is going to be easier to do in v3 than v2.19:03
jeblairkklimonda: and we're so focused on developing v3 where we know we want to have support for windows, etc, that we don't really have time to review large changes like that for v2.519:04
kklimondawhat's the timeline for v3?19:04
jeblairkklimonda: we're planning on switching openstack-infra to it in the 2nd week of september.  we still have some more polishing after that before we do a real 3.0 release and start recommending openstack third-party ci systems use it, so that would come a little later.19:05
jeblairkklimonda: we're running it in a test mode for openstack now, so it does work.  and there's at least one other user running it experimentally.19:06
kklimondaha, we need to have a stop-gap measure (windows integration + all the existing reviews) by the end of august.19:06
jeblairkklimonda: if you're interested in that, you can expect occasional breaking changes, having to ask a lot of questions in here, and incomplete documentation (especially around setting up an environment).19:07
jeblairkklimonda: on the positive side, much of the documentation on how to actually use it is complete, and it does generally work reliably at this point.19:07
jeblairkklimonda: i just noticed that our irc logging bot was on the wrong side of a netsplit this morning, and missed our conversation about windows in this channel, so i've pasted it here: http://paste.openstack.org/show/617974/19:08
kklimondaI've been thinking now to hack windows support into zuul launcher for v2.5, and then after we get out of the fire fighting mode focus on v3 - hopefully by the end of the year we'd be able to deploy a new infrastructure based on it. I'm worried that if we now start the discussion on v2.5 vs v3 we'll not do anything (in hindsight I should have that conversation with you guys three weeks back, but if wishes were pigs..)19:09
jeblairkklimonda: that's probably worth reading to see what would need to be done to actually run windows jobs (and unfortunately, it looks like our volunteer for implementing that won't be able to do so until september)19:09
kklimondathanks, I'll read it in a moment19:09
kklimondawindows support is definitely something we need, and Juniper was fine with us contributing changes back to the upstream19:10
kklimondaso if you need help implementing that, either me or someone from my team will probably be happy to help/review/code some of it19:10
jeblairkklimonda: why don't you read through that conversation and let me know what you think -- it's possible you may be able to get going with v3 fairly quickly (it seems like most of the work would actually be in nodepool)19:12
jeblairkklimonda: i have to break for lunch; i'll be back in a bit19:12
pabelangerI know windows for ansible is pretty hot ATM. IIRC, ansible even started a windows SIG19:18
mordredpabelanger: yah- and I'm pretty sure it's important to tobiash too19:21
mordredkklimonda: from what I understand from the morning's conversation with tobiash that jeblair pasted above, I don't think it'll be super hard to add windows support to v3 - although it will be at least some work - I think it will be much harder to add to v2.5, and that combined with 2.5 being a develpment dead-end, I'd certainly recommend working with tobiash19:22
mordredkklimonda: there's a few things that need to be added to the core of zuul and nodepool - and then after that point it'll really just be about writing some additional ansible to make windows-aware versions of some of the functions handled by the base job19:24
kklimondajeblair: thanks for the log, it basically matches what I've read about today - plaintext is the simplest, and doesn't require any additional setup (AD, or Kerberos). Pure Kerberos is an interesting idea, but a) it depends on having correct time and b) at least partially depends on DNS (I think RevDNS can be skipped if you are careful, but I don't think A records can). It is probably the *correct* way to do that, but will require some19:28
kklimondacareful thoughts and additional operational knowledge.19:28
kklimondamordred: yes, I'll be recommending that we start working on v3 as soon as possible, but realistically speaking we need a stop-gap measure for v2.5 - at this point I'm just hoping to put as little work as possible into it, just to get it to work and avoid blocking a large merge of windows-specific features.19:32
* tobiash saw his name on his android irc client19:34
*** amoralej is now known as amoralej|off19:34
kklimondahi :)19:35
tobiashmordred: I'm trying to avoid windows as much as possible but some stuff still need windows here... ;)19:35
kklimondatell me about it :)19:35
kklimondawe have to support our existing Jenkins-based CI for windows folks, and every day is an adventure.19:36
tobiashkklimonda: currently I'm running a productive zuulv2 (single jenkins) setup with linux and windows slaves and an experimental v3 setup where I also need to support windows soon19:38
tobiashkklimonda: soon means starting on support for this at the beginning of september (I'll be back from vacation on 9/4)19:39
tobiashs/starting on support/starting on working to support/19:39
tobiashkklimonda: my vision is to build windows images in diskimage builder (probably using ansible and openstack as tools as locally building a windows image is not that great) such that nodepool can rebuild these too19:41
kklimondatobiash: didn't know diskimage builder supports windows19:43
tobiashkklimonda: well this would be a hack using a custom base element which triggers ansible to spawn a new vm, configure it, shut it down and downloading the image from openstack19:44
tobiashkklimonda: but important is that it *looks* like diskimage builder to nodepool ;)19:45
tobiashkklimonda: together with the changes mentioned in the conversation jeblair linked I think this could become a pretty smooth integration of windows support in zuulv319:45
kklimondaah, I like it already - a way to create a base image, potentially with all the dependencies to speed up builds even more is something I've been thinking about19:45
openstackgerritMerged openstack-infra/zuul-sphinx master: Mark zuul-sphinx as supporting python3  https://review.openstack.org/49220319:46
tobiashkklimonda: additionally on config side there would be a separate base-windows job which pushes the repos using the windows modules19:46
tobiashmordred, jeblair: what strikes me now as I write this is that console streaming might become a challenge with windows nodes19:48
kklimondamhm, not sure how well it will work for us - current pipeline uses android repo to pull all repositories into a correct project structure.19:48
kklimondaheh, console streaming is something I've been looking at today19:48
tobiashkklimonda: with windows?19:49
kklimondayes19:49
tobiashcool :)19:49
tobiashkklimonda: you're using the android repo tool?19:51
tobiashkklimonda: with v3 you also can tell zuul to clone several repos19:52
tobiashkklimonda: but currently it has no feature yet to define the structure of this like the clonemap in zuul-cloner19:53
kklimondaI've been thinking of writing a small powershell script/app that does the job of a daemon spawned by zuul_console  - I've looked into Start-Job (will probably not work given that ansible does new connection per task) and then creating a bare bones service in PowerShell - I've found an article about it, but  ran out of time to actually test and see if it works. That would probably (not a windows expert here) require us to run it as19:53
kklimondaadministrator, which is fine for our usecase, but may not work for everybody.19:53
kklimondatobiash: yes, our current CI/build pipeline is based around android repo tool - developers also use it to create local environments≄19:54
kklimondaif zuul can be extended with project structure, we would have to discuss if we want to go this way - we'd probably still need repo for developers, especially if my idea of splitting the project into even more repositories gets some ground.19:57
tobiashkklimonda: maybe it is sufficient to write a small wrapper (as part of the job, maybe even a reusable ansible role) which links/moves the zuul created repo-layout into the repo defined layout (and eventually clone missing repos after that)19:57
jeblairkklimonda: in v3, zuul creates the proposed future state of all the repos involved in a change.  the idea is then to push them onto the test nodes for the test.  but you can further manipulate the repos if needed before a job (like if you need them in a different structure) ... and i was about to suggest what tobiash just said :)19:58
tobiashkklimonda: this wouldn't need a change to zuul and devs and ci system still can use the repo tool19:58
kklimondahmm, that could work19:58
tobiashwe also use the repo tool heavily and until 2 minutes ago I didn't have a good solution to that with v3 :)19:58
tobiashnow I think that an ansible role which rearranges the zuul-prepared repos would be cool for that19:59
jeblairtobiash: ++20:01
kklimondathanks guys, I'll start slowly digging into v3 architecture, to see if I can wrap my head around all the moving parts. tobiash: if you have windows-related discussion, ping me on the channel - I'm in CET timezone, and would love to be part of it.20:02
tobiashjeblair: do you think such a role makes sense for zuul-jobs or is this too specialized?20:02
kklimondanow I need to get some sleep, it's been a long day - good night :)20:02
tobiashkklimonda: yay, almost same time zone :)20:02
tobiashahem exactly the same time zone...20:03
jeblairkklimonda: take a look at the docs and let me know what helps and what doesn't, please: https://docs.openstack.org/infra/zuul/feature/zuulv3/20:03
jeblairkklimonda: thanks, and good night!  :)20:03
jeblairtobiash: probably depends on how it rearranges it?  repo has a config file that specifies the arrangement, right?  that probably does make sense in zuul-jobs, in that case (as it's potentially usable by anyone using repo)20:04
tobiashjeblair: yes, repo has a file named manifest.xml (urg, xml...) which defines the arrangement20:05
tobiashjeblair: so that could be generic (with variables like src, dest roots and copy/move/link)20:05
jeblairtobiash: sounds like a good fit i think20:06
tobiash:)20:06
tobiashthat also will be something for september20:06
tobiashjeblair: I'm also heading to bed now. Maybe I'll read the scrollback from time to time during vacation...20:08
tobiashcya20:09
jeblairtobiash: goodnight!20:10
*** dkranz_ has quit IRC20:28
mordredpabelanger: I think pypi_extract_name can be a nice little python module in that role - I don't really think there's much need to make people put that info into the job when it's already in the git content, yeah?20:29
pabelangermordred: ya, I guess it all depends on if we want to push git repos to the upload-to-pypi job20:30
pabelangerI mean, we do by default today20:30
pabelangerokay, I'll do that first, see how it works20:31
mordredsweet! lemme know if I can help - but it seems like you've got it well in hand20:37
*** jkilpatr has quit IRC21:01
jeblairpabelanger: question for you on 49109321:35
mordredpabelanger, jeblair: +2 from me - but I agree with jeblair's question - and I also left a comment that we may want to consider21:37
jeblairpabelanger: what was the reason we couldn't use secrets for the tarball job?21:37
jeblairmordred: ^ maybe you recall?21:38
pabelangerjeblair: we only have secrets enabled on release pipeline ATM, so needed to tag to use it21:38
pabelangerto just created a dummy account for now to confirm it worked21:38
pabelangerbut that is the next step, secrets21:39
jeblairpabelanger: oh, so there wasn't another blocker for that?  (we can enable secrets on the post pipeline for branch tarballs)21:41
jeblairpabelanger: we wouldn't be able to use the inheritance structure you have now -- we'd have to disallow inheritance of the secret and explicitly use it in both the tarball and branch-tarball jobs.21:42
jeblairpabelanger: and any other jobs which uploaded to tarballs21:42
jeblairpabelanger: maybe that was the reason?  because we want to let any project upload content to tarballs.o.o without us having to make a new job for it?21:42
pabelangerjeblair: oh, you mean the SSH key?21:42
jeblairpabelanger: that's the only secret the tarball job would use, right?21:42
pabelangerYa, I thought you were talking about pypi.  Right, we could add it to a secret and create post pipeline, I would be good with that.21:43
jeblairpabelanger: well, i mean, see the stuff i just wrote about why that wouldn't work.  :)21:44
jeblairi thought we chose not to use secrets for tarballs for a reason and i need to understand that reason21:44
pabelangerright, cross pipelines was the main reason I didn't add it as a secret for now. Since I didn't think we wanted to allow the secret in check21:44
jeblairpabelanger: did you put tarballs in check?21:45
pabelangerYa, trusted job in check for testing ATM21:45
pabelangeron sandbox project21:45
jeblairokay i find this confusing21:45
jeblairi'm not sure what we're testing in that case21:45
jeblairpabelanger: if that's what you need, why don't you make an experimental pipeline that requires a code review +2 before running jobs?21:46
jeblairpabelanger: then you can test the job you're writing in the way you want to write it21:46
pabelangerNo reason why I didn't do that. I just deciced to use existing pipeline we had21:48
pabelangerand right now, only openstack-dev/sandbox is testing job in WIP review21:48
pabelangerso, happy to change it if you'd like21:48
jeblairpabelanger: i'm convinced we talked about it and decided it wouldn't work, so no, i don't think you should do that.  i suggested one reason it wouldn't work above.  what do you think of that?21:50
pabelangerjeblair: thinking21:51
jeblair(to be clear, the pipeline idea will work, but it will require that you completely change how you've written the job -- that's what i'm trying to work through now without having to go through all the trouble of doing it)21:51
pabelangerlet me pull up the etherpad we did last week21:53
pabelangerhttps://etherpad.openstack.org/p/0BO00tBBUi21:53
pabelangerI think you are saying, new job is what you were expecting right?21:54
pabelangerjeblair: ^21:54
jeblairpabelanger: yes.  if you want to use secrets, you will have to use the hierarchy in "new job" because it's not safe for those secrets to be inherited.21:56
pabelangerjeblair: right, so I did the hybrid approch to make testing much easier. Because with new job, I would need to have that as a trusted playbook in project-config, if I understand correctly21:56
jeblairpabelanger: what you wrote though is the "hybrid" hierarchy which won't work with secrets because it requires inheritance.21:56
pabelangerSo, hybrid was much easier to iterate on and test, because I didn't need to land code. But if we want new-job format, I'm happy to move to that. Just a little rewrite21:57
jeblairpabelanger: how will, say, kolla publish images to tarballs.o.o?21:58
pabelangerjeblair: right now, inheirt publish-openstack-tarball. But the 'new job' approach, we'd have to create a new project-config job?22:01
jeblairpabelanger: that's my understanding.  does that make the hybrid approach more desirable?22:02
pabelangermaybe, I mean it was much easier to test the hybrid approch in this case22:02
jeblairpabelanger: well, i guess what i'm asking is -- do we want any project to be able to publish stuff to their corner of tarballs.o.o without us having to make a new job for it.22:04
mordredI think that would be nice22:04
jeblairif so, then the hybrid version is something we should desire to support, i think, as it would allow anyone to inherit from the upload job and get that behavior22:05
mordredespecially if the job has a project-name prefix baked in to it or something - so that kolla could just add "publish-stuff-to-tarballs.o.o" and it would publish whatever they'd put in their publish dir (or something)22:05
jeblairmordred: yeah, that is in fact the way pabelanger wrote it22:06
pabelangerYa, good question. I think if a job put something into the artifacts folder, we might want to auto publish it22:06
pabelangerhowever, I see the opposite of this, making a policy where the project needs to write the job and have project-config approve it22:06
jeblairokay.  well, the reason i asked this is so that i could make sure i understood the current defects with secrets22:07
jeblairi think this is one of them22:08
jeblairare there any other reasons we didn't use secrets for tarballs?22:08
pabelangerno22:08
mordredI don't think so22:08
jeblair(i know why we didn't use secrets for logs -- it's because it needs to run in check)22:08
pabelangerI think we should write the job still22:08
openstackgerritJames E. Blair proposed openstack-infra/zuul feature/zuulv3: Bind secrets to their playbooks  https://review.openstack.org/49230722:09
pabelangerand see how it operates22:09
mordredjeblair: and binding to playbook allows us to maybe use secrets for logs, yeah?22:09
jeblairokay, that changes secrets *significantly* and should address both of those cases22:09
jeblairya22:09
jeblair(i haven't run that through a full pep/tox pass yet, but it does pass spot tests)22:10
mordredwoot22:10
*** smyers has quit IRC22:13
openstackgerritJames E. Blair proposed openstack-infra/zuul feature/zuulv3: Remove 'auth' dict from jobs  https://review.openstack.org/49230922:14
pabelangerjeblair: so, if a job inherited a secret, in a pipeline with secrets disabled, we should be protected right?22:15
jeblairpabelanger: currently, or in my proposed change?22:16
pabelangercurrently22:16
pabelangerjust reading 492307 now22:17
jeblairpabelanger: that's still pretty dangerous.  it wouldn't run in check, but a rogue project could add their own gate job to expose the inherited secret.22:17
jeblairpabelanger: basically, inheriting secrets in the current system is pretty much always bad.22:17
pabelangerk22:17
jeblairpabelanger: (inheritable auth stuff was envisioned for things like swift tokens which would change with every job, but we're thinking of doing that in a completely different way now)22:18
pabelangerYa, binding secrets to a playbook seems better in this instance22:20
*** jkilpatr has joined #zuul22:22
*** smyers has joined #zuul22:24
*** maxamillion has quit IRC22:24
pabelangerjeblair: do you mind if I review that in the morning?22:25
mordredjeblair: those lgtm on first read22:26
*** maxamillion has joined #zuul22:26
jeblairpabelanger: not at all22:27
jeblairtobiash: do you mind if i un-abandon your expose final change?22:27
*** jkilpatr has quit IRC22:29
openstackgerritJames E. Blair proposed openstack-infra/zuul feature/zuulv3: Expose final job attribute  https://review.openstack.org/47938222:32
openstackgerritJames E. Blair proposed openstack-infra/zuul feature/zuulv3: Prohibit inheritance with final  https://review.openstack.org/49231422:32
jeblairokay, there's the whole story, i think.22:32
*** jkilpatr has joined #zuul22:42

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!