Wednesday, 2017-11-15

pabelangerso, it seems like we cannot force delete nodes in nodepool that are locked and in-use01:53
pabelangerwhich, is something we could do in v201:53
pabelangerhttp://zuulv3.openstack.org/static/stream.html?uuid=6b1bef6cc9be4c96ba896df5d6ac8f26&logfile=console.log01:53
pabelangerI am guessing that is going to timeout for the post playbook in 3 hours01:53
pabelangerdue to networking issue in inap01:53
pabelangerand, have no idea / way of having zuul abort that just right now01:54
pabelangermaybe I could try killing the ansible process01:54
clarkbkill the ansible process01:54
clarkbya01:54
pabelangeryah01:54
pabelangerlet me try that01:54
pabelangerk, that did it01:56
*** threestrands has joined #zuul02:09
openstackgerritRui Chen proposed openstack-infra/nodepool feature/zuulv3: Fix nodepool cmd TypeError when no arguemnts  https://review.openstack.org/51958203:30
openstackgerritRui Chen proposed openstack-infra/nodepool feature/zuulv3: Apply floating ip for node according to configuration  https://review.openstack.org/51887503:31
*** bhavik has joined #zuul04:05
*** bhavik has quit IRC04:11
*** threestrands has quit IRC06:34
*** tobiash has quit IRC06:43
*** tobiash has joined #zuul06:44
openstackgerritMerged openstack-infra/nodepool feature/zuulv3: Be consistent with the ZK data model  https://review.openstack.org/51970606:52
*** mmedvede has quit IRC07:59
*** mmedvede has joined #zuul08:06
*** nguyentrihai has joined #zuul13:33
tobiashdmsimard: I've left comments on https://review.openstack.org/#/c/518374/113:39
dmsimardtobiash: yes, that's fair, it's copy/pasta from a thing I did in the past where I heavily standardized on quoting everything :P13:47
dmsimardthat's why I threw a WIP on there13:47
dmsimardalso need to write integration tests for it13:48
tobiashdmsimard: do you think the service needs to be enables?13:49
tobiashthe only use case I currently see in enabling (instead of just starting) is that you also support jobs that reboot the node13:49
dmsimardmordred, pabelanger: I forgot to mention yesterday, but another approach I was thinking about for testing base roles/playbooks is to somehow have them self-tested. I need to think about the "somehow" -- maybe like a "<role>/tests/main.yaml" that gets included when we know we're inside a testing environment that involves that role (i.e, not a nova patch but a <role> patch)13:50
dmsimardIt still doesn't help us testing things that can't be speculatively tested, but it makes it easier to "scale" because we don't have to bounce back and forth between z-j, o-z-j and project-config to define integration tests for the different roles13:51
dmsimardWow you people thought about everything https://docs.openstack.org/infra/zuul/feature/zuulv3/admin/tenants.html?highlight=shadow#attr-tenant.untrusted-projects.%3Cproject%3E:.include14:12
dmsimardeveryone++14:12
mordreddmsimard: :)14:32
mordreddmsimard: yah, I had a similar thought while talking to folks in sydney but forgot to mention when we were tlaking yesterday - thanks for having the thought AND saying something :)14:32
mordreddmsimard: basically - for a lot of the roles in base job we should be able to make synthetic test playbooks (kind of like how roles on galaxy will do 'unit' testing)14:33
mordreddmsimard: that should at least allow us to have tests that the role does the thing it says - and those can obviously be safely run as tests even speculatively14:33
dmsimardmordred: the tests would run, but not with the patch in progress14:35
mordreddmsimard: the tests would totally run with the patch in progress14:39
mordreddmsimard: the non-speculative is only for the job config14:39
mordredbut if the job is "run the test playbook from {{ zuul_work_dir }}/tests" - then that will run in the correctly checked out copy of the repo on the remote node14:39
mordreddmsimard: isn't it great how much this particular area makes the brain ache14:40
dmsimardmordred: ok so you can speculatively (typing any derivative of the speculative word hurts my brain) test changes to code in roles and playbooks but not jobs themselves14:44
SpamapSpabelanger: clarkb I noticed the "how can I abort this?" discussion yesterday. Seems like 'abort' would be a good thing for zuul client to implement.14:46
rcarrillocruzare we good to merge https://review.openstack.org/#/c/500800/714:47
dmsimardtobiash: yeah, I'll get a new patchset up once I have a chance. I wanted to get something up to show someone14:47
rcarrillocruzShrews , mordred ^14:47
rcarrillocruzi'm trying to move that stack a bit14:47
rcarrillocruzupper changes will be need a rebase, will do as things move along14:47
dmsimardmordred: btw in the objective of making zuul-jobs re-usable outside of openstack, we already have a couple "bugs". I'd like to document those somewhere.. do you have a preference ?14:51
dmsimardBugs range from assumptions because things are there in the default openstack nodepool images, to assuming we're running certain jobs on ubuntu and stuff like that.14:52
tristanCdmsimard: mordred: https://etherpad.openstack.org/p/downstream-zuul-jobs-issues14:59
dmsimardbah I created https://etherpad.openstack.org/p/zuul-jobs-issues but let's use yours sure :p14:59
mordredtristanC, dmsimard: I think that's a great idea ... and also those are likely great things to make synthetic role tests too (no reason we can put a tests dir in zuul-jobs with playbooks to test the roles - and even define a job in zuul-jobs that can be used run those playbooks15:08
dmsimardmordred: yeah, I'll send a WIP to self-test a role, I have an idea15:08
mordredtristanC, dmsimard: I also think it would be pretty cool to get third-party ci going for zuul-jobs15:09
dmsimardmordred: yeah I was discussing that on our end.. how do you see that happening ? Do you care if, for example, our zuul would report a syntax failure on our zuul because of a change in zuul-jobs for example ?15:09
dmsimardfwiw we're planning on including as little as possible to avoid exactly that kind of issue where a commit in z-j would break our zuul15:10
dmsimardwith shadow and include https://docs.openstack.org/infra/zuul/feature/zuulv3/admin/tenants.html?highlight=shadow#attr-tenant.untrusted-projects.%3Cproject%3E:.include15:10
mordreddmsimard: yah - I think that would be important to show - since zuul-jobs really shouldn't be introducing syntax-errors like that (unless you just happened to have a pre-existing job with a conflicting name, but even then it would be good for us to be aware of so that we can learn how to communicate abot stuff)15:11
mordreddmsimard: it should be safe foryou to consume zuul-jobs without needing to do a filtered include (although shadow is important) - we avoid defining pipelines there already15:12
mordreddmsimard: so if it's not safe to do that we should probably talk about how we can make changes to  make consuming zuul-jobs as easy as possible (obviously do what you need to - just saying I think the upstream intent for that repo should be that you should not NEED to)15:13
dmsimardright15:16
rcarrillocruzspeaking of which, anyone aware of other groups using zuulv3 where they keep their jobs / configs15:19
rcarrillocruzi'd like to get more ideas on how they reuse openstack zuul jobs15:19
rcarrillocruzand the likes15:19
rcarrillocruztobiash: you folks have a github or repo somewhere for this?15:19
tristanCrcarrillocruz: this is how we configure upstream zuul-jobs: https://softwarefactory-project.io/r/#/c/10231/1/ansible/roles/sf-repos/templates/config/zuulV3/_main.yaml.j215:21
rcarrillocruzoh neat15:21
rcarrillocruzthx15:21
tobiashrcarrillocruz: I don't have anything on github currently, but I have it similar like you15:22
tobiashjust using exclude instead of include15:22
dmsimardrcarrillocruz: openstack-zuul-jobs is not meant to be used outside of OpenStack, zuul-jobs is15:22
tobiashhrm, similar like tristanC ;)15:22
rcarrillocruzyeah, ino15:22
rcarrillocruzthx15:23
tristanCrcarrillocruz: though we are looking forward a better git driver so that we don't need a gerrit connection to openstack15:23
rcarrillocruzyou can't use github?15:23
rcarrillocruzhaven't tried, but was thinking about it15:23
tobiashbut I'm just I'm in process of starting to make real usage of zuul-jobs15:23
tobiashbut currently fighting with deploying openshift in a productive environment as a platform to host zuul etc15:24
tristanCrcarrillocruz: probably, but it sounds better to get it dirrectly from openstack.org15:24
tobiashso that's currently a bit suspended until I have that running again15:24
mordredrcarrillocruz: well - to use github you'd need to get us to add your github app to the openstack zuul-jobs repo on github15:24
mordredrcarrillocruz: but that's why we want to get the git driver updated so thatyou can just point at the git url for it and have that work15:25
rcarrillocruzic15:25
rcarrillocruzbtw tristanC , saw your providerconfig refactor15:26
rcarrillocruzi was thinking about poking at an ansible driver15:26
rcarrillocruzbut then i figured is a bit in flux the the driver interface15:26
rcarrillocruzis that going to merge?15:26
rcarrillocruzi 've seen a few +215:26
rcarrillocruzi could +A, but not sure if that's on hold for a reason15:26
tristanCrcarrillocruz: i'd love to have the providerconfig refactor merged yes15:27
* mordred wants to merge many of tristanC's patches soon15:27
tristanCrcarrillocruz: and fwiw, the opencontainer driver is using ansible to create and delete slave15:28
mordredtristanC, rcarrillocruz: think Shrews and I were waiting on jeblair to take a look at the refactor patch since it's introducing a fundamental api15:28
rcarrillocruzmordred: gotcha15:28
rcarrillocruztristanC: ah cool15:28
rcarrillocruzthinking of creating a very generic one15:29
tristanCmordred: happy to fix what's needed15:29
rcarrillocruzwhere we could hook up playbook for create/delete15:29
tristanCrcarrillocruz: yes sure, that would be useful15:29
rcarrillocruzwhat i do at ansible is network modules15:29
rcarrillocruzand vendors are like 'omg, CI is cool'15:29
rcarrillocruzlike they're totally discovering this thing like it's a brand new thing15:29
rcarrillocruzand we use nodepool internally for ourselves15:29
rcarrillocruzand we use network appliacnces as VMs15:29
rcarrillocruzbut the idea is to get vendors as 3rd party CI to use Nodepool to test stuff on gear we can't possibly test15:30
tristanCrcarrillocruz: right now i used a json dump in the playbook so that it can communicate some information back to nodepool15:30
rcarrillocruzso i see a great use case here to write an ansible driver that will jsut leverage our modules do pre-test and post-test stuff15:30
tristanC(last task of https://review.openstack.org/#/c/468753/25/nodepool/driver/oci/playbooks/init.yml )15:31
rcarrillocruzheh, so you pass out data via a file15:31
tristanCrcarrillocruz: there is surely a better way, but that works ok15:32
rcarrillocruzno wonder, output of ansible-playbook is horrible (unless a custom callback is written)15:32
rcarrillocruzi see totally why you do it, ansible is terrible to give text output in an easy way to consume15:32
tristanCrcarrillocruz: don't tell me about it, i just wrote some awfull code to remove the std(out|err)_lines lists, in particular when ansible-playbook calls are nested15:34
rcarrillocruzlulz15:34
rcarrillocruzi could share similar stories on our DCI hooks, some bash awk tthing :D15:34
tristanCfor what it worth, my gory remove_ansible_std_lines_lists http://paste.openstack.org/show/626409/15:35
mordredrcarrillocruz, tristanC: yah - this is why we wrote zuul_return and had playbooks that need to communicate with zuul just write out a json file :)15:37
tristanCmordred: rcarrillocruz: yes, hence having a generic nodepool ansible driver to facilate that would be neat to herit from15:38
mordredyah - a generic ansible driver also strikes me as a nice easy button for people who have 'weird' setups but where just writing a little ansible would be an easy thing for them to do15:39
rcarrillocruzlike15:39
rcarrillocruzwe have internally also an ESX15:39
rcarrillocruzi don't feel like writing a driver for it, but is cooler to just use ansible to use vmware modules to do it15:40
mordredyah15:40
rcarrillocruzi looked at linchpin, but dunno... the layout syntax is a bit odd to me15:40
mordredand then maybe you reach a point where you're like "I could really use a native nodepool driver"15:40
rcarrillocruzand anyways, for our use case of physical network gear, we need plain ansible15:40
mordredrcarrillocruz: ++15:41
pabelangerSpamapS: ++16:01
*** hashar has joined #zuul17:01
SpamapSA generic ansible driver would solve a lot actually.17:05
SpamapSNot that it's hard to write python.17:05
SpamapSalso, I'd really like to have a "generic thing pool" not just nodes. I have an instance where I have a pool of accounts on a cloud, and I want to only hand out one at a time. Strikes me that it's similar to the use case for static nodes.17:06
SpamapSs/only hand out one at a time/hand out each one to one job at a time/17:07
SpamapSSo if we boiled down nodepool to thingpool, and then nodepool is just "things that turn into inventories" .. and you can have a job also request thingset's and just get back values that are useful in whatever context your job needs them in, that would be sweet.17:08
SpamapSLike if one wanted to run jobs on kubernetes, just handing out namespaces with their own creds on the k8s, would be super useful.17:09
pabelangeryah, I'd love to see a ansible nodepool driver, I know linchpin was tossed around a few times, but think that might be a little over the top in this context. Then you could do oci / docker / containers via ansible.17:11
rcarrillocruzdummy question, i believe there's a noop job that runs from executor, so there's no need for a nodepool node17:12
rcarrillocruzwhere is that defined17:12
rcarrillocruzas a base job in project-config ?17:12
rcarrillocruzmy grep is failing if so17:12
pabelangerrcarrillocruz: not noop, but you can just define a job without nodesets, IIRC. Look for rtfd post hook job17:14
pabelangerthat just runs curl from executor17:14
*** hashar is now known as hasharAway17:28
rcarrillocruzThx, will take a look17:34
Shrewsshould just be...   nodes: []17:38
tobiashrcarrillocruz: noop is a special job defined in zuul itself17:39
rcarrillocruzso i can totally use 'noop' for test, despite not being a job defined as a playbook anywhere17:40
rcarrillocruz?17:40
tobiashYes17:41
rcarrillocruzi'm looking at projec-config base jobs, but there's quite a bit of openstackisms, and i'd like to start small17:41
rcarrillocruzoh neat17:41
rcarrillocruzlet me try then17:41
tobiashnoop is just an empty job that does nothing17:41
tobiashalso it's totally valid to have a real job without nodes17:42
tobiashif a job does only things it is allowed to do on the executor17:43
rcarrillocruzwootz!17:46
rcarrillocruzhttps://github.com/rcarrillocruz-org/zuul-tested-repo/pull/717:46
rcarrillocruzmaking progress17:46
tobiashSuccess in 0s :)17:47
tobiashEvery job should be that fast17:47
rcarrillocruzspecially integration tests , lulz17:47
rcarrillocruzhmm, try putting nodeset withj empty nodes18:07
rcarrillocruznot getting anything spit18:07
rcarrillocruzlooks like that's equivalent to not dfefining a nodeset in a job18:08
rcarrillocruzwhatever is18:08
rcarrillocruznot getting anything reported back on the PR for this18:08
rcarrillocruzhttps://github.com/rcarrillocruz-org/zuul-tested-repo/pull/8/files18:08
rcarrillocruzwhat should I need to get a basic hello-world18:08
pabelangerrcarrillocruz: try: http://git.openstack.org/cgit/openstack-infra/project-config/tree/zuul.d/jobs.yaml#n84818:15
Shrewsrcarrillocruz: did you define a base job in your config repo? not sure what happens if you don't do that18:16
rcarrillocruzI didn't18:23
rcarrillocruzProbably that18:24
rcarrillocruzWill create one18:24
dmsimardShrews: does the "rate" config handle things other than "provider" specific requests ?19:02
dmsimardShrews: like, zookeeper operations19:02
clarkbdmsimard: it shouldn't19:03
Shrewsdmsimard: nope, just provider19:03
dmsimardI know that rate is basically the amount of time to wait between requests (say, to create an instance you need to list machines, list ports, images, networks, create instance, floating ip, etc.)19:03
clarkbdmsimard: its purely to provide you with a mechanism to work around api rate limits in providers19:03
dmsimardok19:03
dmsimardjust making sure19:03
clarkbbecause many clouds rate limit their apis19:03
dmsimardFWIW I'm working on the zuul_json issue (yes, it's still not fixed) out of Software Factory's zuul v319:04
dmsimardreproduced it \o/ http://paste.openstack.org/raw/626431/19:16
*** tobiash has quit IRC19:27
*** tobiash has joined #zuul19:27
dmsimardbroadening the scope of the issue a bit...19:51
dmsimardWhen there is a log url returned in a zuul job comment (comes from here http://git.openstack.org/cgit/openstack-infra/zuul/tree/zuul/executor/server.py?h=feature/zuulv3#n731 ), it looks like this for a "successful" job19:53
dmsimard2017-11-15 19:50:28,735 DEBUG zuul.AnsibleJob: [build: 32f9b42db83b4ac29b5d04fa9cbf3de0] Sending result: {"data": {"zuul": {"log_url": "https://some-server/logs/7/7/4/check/break-things/32f9b42/"}}, "result": "SUCCESS"}19:53
dmsimardWhen we look at a result from a job which returned a finger:// URL, we see this instead:19:53
dmsimard2017-11-15 19:48:19,795 DEBUG zuul.AnsibleJob: [build: 723f63806cda4e38bba50b1142122cc6] Sending result: {"data": {}, "result": "POST_FAILURE"}19:54
dmsimardWe should probably not return a finger URL (ever?), it has no purpose. Should we make sure that the log url is at the very least properly sent back, even if that log location ends up being empty because the log upload failed ?19:54
dmsimardOh damn now I understand19:55
dmsimardThe executor actually uses the json file, and it uses that to work out details from the job19:56
dmsimardIn this particular case the json file is broken so everything explodes.. but why does it rely on the json file ? It doesn't know where the logs will be uploaded until the role to upload the logs is actually ran perhaps ?19:57
openstackgerritMonty Taylor proposed openstack-infra/zuul-jobs master: Make build-python-release job  https://review.openstack.org/51392520:25
openstackgerritMonty Taylor proposed openstack-infra/zuul-jobs master: Remove old python-sdist job  https://review.openstack.org/51392620:30
mordredjust got a fascinating test job fail ..20:33
mordredtobiash, Shrews, clarkb, pabelanger: have we seen anything like http://logs.openstack.org/25/513925/2/check/tox-py35-on-zuul/83b3855/job-output.txt.gz#_2017-11-15_20_27_57_76223220:34
mordredI'm inclined to think it was some really weird hiccup ...20:34
dmsimardmordred: haven't seen that before20:35
mordreddmsimard: yes - the role to upload the logs is the thing that tells zuul where the logs are20:35
dmsimardmordred: is there anything in that job that modifies the git config ?20:35
mordreddmsimard: I mean, there's TONS of things in the zuul test that do all sorts of things with git config - but that's a patch to zuul-jobs, so really shouldn't have been able to break anything20:36
mordredI'm going to recheck and see if it persists20:36
Shrewsmordred: facinating20:36
mordredright?20:36
Shrewsnope, never seen that20:36
pabelangeralso new to me20:37
dmsimardmaybe it's racey and different git config steps on each other ?20:39
mordredShrews, pabelanger, dmsimard: happened again20:40
mordredhttp://logs.openstack.org/26/513926/2/check/tox-py35-on-zuul/26cb2ad/job-output.txt.gz#_2017-11-15_20_38_00_85173920:40
mordredI'm going to make a dummy patch to zuul to see if it's just unhappy for some reason20:41
openstackgerritMonty Taylor proposed openstack-infra/zuul feature/zuulv3: DNM no-op patch to test the current gate job  https://review.openstack.org/52019420:42
Shrewsmordred: only thing "odd" (which isn't really odd) about that change is that the job name and role are identically named20:43
Shrewsmordred: i have no idea if that would affect anything or not20:44
Shrewsi mean, obviously it shouldn't20:44
tobiashmordred: in the first link two test cases use the same tmp dir20:54
tobiashso there might be something broken in tmp dir setup and tear down20:55
tobiashhttp://logs.openstack.org/25/513925/2/check/tox-py35-on-zuul/83b3855/job-output.txt.gz#_2017-11-15_20_27_57_76417720:57
tobiashAnd 2017-11-15 20:27:57.76482220:58
mordredtobiash: spectacular20:58
tobiashhttp://logs.openstack.org/25/513925/2/check/tox-py35-on-zuul/83b3855/job-output.txt.gz#_2017-11-15_20_27_57_76482220:58
tobiashTwo different test cases, same tmp dir20:58
tobiashThat looks weird20:58
tobiashBut I'm currently on mobile phone and cannot really assist in tracing this20:59
mordredtobiash: well- what's even better is that the no-op test to zuul WORKED21:00
mordredso somehow that patch to zuul-jobs and the tox-py27-on-zuul is doing $something21:00
* mordred is about to jump on the phone - will debug more when off21:00
dmsimardcompletely unrelated but I was wondering... what we do right now (although it is a workaround to a current problem) in RDO is that in some circumstances we *pull* logs from the Nodepool VM to the logserver (i.e, the logserver has a key that allows connection to the nodepool VMs). Is that something we could consider to skip pulling the logs back to the executors and then the executor pushes to the logserver ?21:06
dmsimardThis means the executor delegates a task to the logserver which has the logserver pull the logs21:07
dmsimardI guess there's some files that are bound to be local on the executor (job-output, ara reports, etc.) but maybe it'd avoid some of the disk space issues we've seen21:08
dmsimardI suppose it'd save on bandwidth (pull once instead of pull/push) and save time but maybe there are considerations I'm not seeing.21:08
pabelangerdmsimard: yah, in our case, logs.o.o can't login to nodepool nodes. We could change that, but so after haven't.21:10
pabelangerbut agree it would save some bandwidth21:10
dmsimardpabelanger: we could create a new keypair and add it to infra-root-keys in the nodepool config or something.21:11
dmsimardAnyway, just a random thought :)21:11
dmsimardpabelanger: I thought about it when I saw the DISK_FULL code bits :p21:12
pabelangerdmsimard: yah, so far this is still much like jenkins, where we pull all logs back to executor and publish21:12
pabelangerthe other issue, would mean we need to run ansible on logs.o.o, from zuul21:13
pabelangerwhich, might not be something we want to do21:13
pabelangercurrently, we just need ssh running on logs.o.o and push to it21:13
dmsimardpabelanger: we're not really running ansible on logs.o.o21:14
dmsimardpabelanger: ansible still runs from the executor, but the logs.o.o server is in the inventory for the purpose of being able to delegate tasks to it21:15
dmsimardpabelanger: but thinking about it now, it would be hard to lock down tasks/roles from just using logs.o.o inappropriately21:16
dmsimardi.e, "rm -rf /" on logs.o.o21:16
pabelangerright21:16
dmsimardhmmm21:17
dmsimardit's probably possible to do already..21:17
pabelangeri don't think we want to delegate_to: control plane servers, might open ourself to an attack21:17
* dmsimard tries something (that doesn't involve rm -rf"21:17
pabelangerdmsimard: well, we do add_host: logs.o.o today. let me think21:18
pabelangeryah, so we do pull from logs.o.o to executor today. I thought we pushed21:19
pabelangerwhich, makesense, because we disabled facts21:20
SpamapShmmmm21:27
SpamapShttp://paste.openstack.org/show/626445/21:27
SpamapSLooping a command showed no output, but that command definitely prints stuff when it fails.21:27
dmsimardSpamapS: probably a bug in the zuul stream callback21:28
pabelangerSpamapS: check job-output.json, it likey is there21:31
*** threestrands has joined #zuul21:32
*** threestrands has quit IRC21:32
*** threestrands has joined #zuul21:32
*** hasharAway has quit IRC21:34
pabelangerI know we have work to do on stream.html, but would be nice not to start streaming until all merge operations are done. As not to get the could not find build message21:39
mordreddmsimard: one of the reasons for the proposal to switch how log collection works is to allow people to make such a decision at their deployment in their base job22:23
mordreddmsimard: like - we're not super comfortable putting keys onto build nodes after code has been run from the internet - but other people may be in a position where they're ok with that ... or also one might want to upload logs to swift and can provide the credentials in such a way that it doesn't involve writing secrets to disk on a remote potentially rooted host22:24
mordreddmsimard: which is all to say, I doubt we'll choose to skip copying back to the executor for openstack, but once we get the log collection changes pushed through (I'm gonna try to get back to working on that tomorrow) - it should empower zuul admins to choose how they want to deal with that22:25
dmsimardmordred: sure, leaving the door open to other options is great.22:31
*** rcarrillocruz has quit IRC22:34
*** rcarrillocruz has joined #zuul22:41
mnasermordred: I know this isn't the place for me to ask but a "best practice" doc for zuul role writing would be nice22:49
mnaserfor example i created this - https://review.openstack.org/#/c/519489/ - based off the python one22:49
mnaserand i see you have the change in the python one to a best practice, so i dont know, probably be a very useful asset for those trying to write up roles22:50
mnaseri.e. when to use zuul_work_dir, role specific var, zuul.project.src_dir vs src/{{ zuul.project.canonical_name }}22:50
openstackgerritMonty Taylor proposed openstack-infra/zuul-jobs master: Make build-python-release job  https://review.openstack.org/51392522:54
openstackgerritMonty Taylor proposed openstack-infra/zuul-jobs master: Remove old python-sdist job  https://review.openstack.org/51392622:54
mordredmnaser: agree - I think that's definitely a thing we want22:54
mordredtobiash, Shrews, dmsimard: https://review.openstack.org/520236 Change override-branch to override-checkout ... I believe the issue that was happening earlier is that zuul was checking out the master branch for zuul rather than feature/zuulv322:55
mordredwe'll see how the job goes now22:56
SpamapSmnaser: I've taken to not using zuul. in roles at all. Makes it easier for me to know what variables to fake when I'm running local tests.23:35

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!