Monday, 2018-07-02

*** elyezer_ has quit IRC00:35
*** elyezer_ has joined #zuul00:53
*** openstackgerrit has quit IRC01:49
*** Diabelko has quit IRC02:16
*** Diabelko has joined #zuul02:16
*** openstackgerrit has joined #zuul02:49
openstackgerritTristan Cacqueray proposed openstack-infra/zuul master: dashboard: fix multi-tenant navigation bar  https://review.openstack.org/57941802:49
openstackgerritTristan Cacqueray proposed openstack-infra/zuul master: angular: call enableProdMode  https://review.openstack.org/57349403:30
tristanCmordred: the angular routing fixes you merged are working well with our multi-tenant setup and '/zuul/' path prefix, though I still need 579418 and 57349403:32
ianwcorvus: re prior message on zuul-announce deprecation mail -- I've sent v2 of that mail now (cc'd to discuss list) http://lists.zuul-ci.org/pipermail/zuul-discuss/2018-July/000460.html04:20
ianwi think that covers the (what turned out to be rather complex, at least a lot of small, interconnected parts) situation now04:20
openstackgerritTristan Cacqueray proposed openstack-infra/zuul master: model: fix AttributeError exception in freezeJobGraph  https://review.openstack.org/57942804:23
tristanCcorvus: did zuul.openstack.org scheduler got restarted with the "Don't add implied branch matchers to project-pipeline variants" change?04:24
tristanCcorvus: it seems like it introduced a new exception for projects without a pipeline configuration, see 57942804:28
tristanCwell it doesn't seems like a behavior change since projects without configuration aren't running jobs anyway...04:39
*** Rohaan has joined #zuul04:39
openstackgerritTristan Cacqueray proposed openstack-infra/zuul master: executor: change execution log to INFO  https://review.openstack.org/57870404:56
openstackgerritIan Wienand proposed openstack-infra/zuul-jobs master: Use readthedocs webhook to trigger build  https://review.openstack.org/57943404:56
*** swest has joined #zuul04:59
*** nchakrab has joined #zuul05:17
*** nchakrab_ has joined #zuul05:18
*** nchakrab has quit IRC05:22
*** nchakrab_ has quit IRC05:28
*** Rohaan has quit IRC05:36
*** Rohaan has joined #zuul05:40
*** nchakrab has joined #zuul06:00
*** nchakrab has quit IRC06:01
*** nchakrab has joined #zuul06:01
*** dmellado has joined #zuul06:23
*** threestrands has joined #zuul06:33
*** threestrands has quit IRC06:33
*** threestrands has joined #zuul06:33
*** threestrands has quit IRC06:37
*** gtema has joined #zuul07:08
openstackgerritIan Wienand proposed openstack-infra/zuul-sphinx master: Open role readme files in utf-8 mode  https://review.openstack.org/57947407:30
openstackgerritIan Wienand proposed openstack-infra/zuul-jobs master: Use readthedocs webhook to trigger build  https://review.openstack.org/57943407:32
*** hashar has joined #zuul07:39
*** jpena|off is now known as jpena07:44
tobiashtristanC: do you use html rewriting for running zuul on /zuul/ or is that not necessary anymore?07:57
tobiashI just tried the current master in my test environment and it breaks my setup07:59
tristanCtobiash: not sure what you mean by html rewriting, but our httpd configuration is from https://softwarefactory-project.io/cgit/software-factory/sf-config/tree/ansible/roles/sf-gateway/templates/gateway.common.j2#n147 to L18308:05
tobiashtristanC: our proxy in front of zuul rewrites html and adds /zuul/ to the links. This was a workaround in the early days and I guess that's broken now.08:06
tristanCtobiash: oh no need to do that, the current code in master already handle sub-path08:07
tobiashtristanC: ah thanks, do I need to condigure that somewhere? I didn't find anything in the docs/08:08
tristanCtobiash: i don't think so, just serve the html files from any path, and the client will figure out the api/ location08:09
tobiashtristanC: ah thanks, will try08:10
openstackgerritIan Wienand proposed openstack-infra/zuul-jobs master: Use readthedocs webhook to trigger build  https://review.openstack.org/57943408:23
tobiashtristanC: does zuul_web_url contain /zuul/ in your case?08:40
tobiashhttps://softwarefactory-project.io/cgit/software-factory/sf-config/tree/ansible/roles/sf-gateway/templates/gateway.common.j2#n18108:40
tobiashtristanC: I've added 579418 and 573494 and proxy /zuul/ to / and cannot get it working08:40
tobiashit seems to default to the single tenant 'mode' in my case08:41
tobiashI don't see any call to info08:45
tristanCtobiash: zuul_web_url points directly at the zuul-web endpoint08:46
tobiashtristanC: so you also proxy /zuu/ to /08:46
tristanCtobiash: oh yes, we need to load "/zuul/t/$tenant_name/status.html"08:47
tobiashI get 'https://cc-dev1-ci.bmwgroup.net/zuul/api/status: Not Found' when loading /zuul/08:47
tristanCtobiash: here is the updated httpd configuration so that GET on /zuul/ directly load the status page: https://softwarefactory-project.io/r/#/c/12828/3/ansible/roles/sf-gateway/templates/gateway.common.j208:47
tristanCtobiash: what is the referer of that /zuul/api/status call?08:48
tobiashreferrer is https://cc-dev1-ci.bmwgroup.net/zuul/08:48
tristanCand can you try to load "/zuul/t/$tenant_name/status.html" ?08:49
tristanC(and replace $tenant_name witha  valid tenant...)08:49
tobiashat that point I don't have a tenant as this is a multi tenant deployment08:49
tristanCwith 579418, you could also try to load /zuul/t/tenants.html08:50
tobiashso https://cc-dev1-ci.bmwgroup.net/zuul/ should get me the tenant list08:50
tristanCyes, tenant list isn't working without 57941808:50
tristanCand i couldn't figure out how to make the routing load the tenants component when accessing "/zuul/" directly08:50
tobiashI already included 579418 in my deployment08:51
tobiashah so that's an unresolved problem08:51
tristanCthen redirect ^/zuul/$ to /zuul/t/tenants.html08:51
tobiashhttps://cc-dev1-ci.bmwgroup.net/zuul/t/tenants.html shows me the same error message08:52
tobiashand also the layout of that site tells me that this is not the tenant overview but a white labeled status08:52
tobiashok https://cc-dev1-ci.bmwgroup.net/zuul/tenants.html seems to work for the tenant overview08:54
tristanChum, weird, you sure you got https://review.openstack.org/#/c/579418/1/web/app-routing.module.ts ?08:55
tobiashdouble checking08:55
tobiashhm, weird, that's missing have to rebuild08:57
*** electrofelix has joined #zuul08:57
tobiashups, built the wrong branch08:57
tobiashah ok, I think I understand now so the routing seems to be static and at / we cannot judge if we need the StatusComponent or the TenantsComponent09:04
tristanChum, can someone confirm if it's the correct behavior that a parent git repo change update doesn't dequeue the child git repo change?09:12
tobiashtristanC: do they share the same queue?09:13
tristanCtobiash: yes, but no depends-on in commit message09:13
tobiashtristanC: gerrit or github?09:14
tobiashand check or gate?09:14
tristanCjust did a test in openstack-dev/sandbox, and 579497,1 depends on 579496,1, and 579496,2 didn't dequeue 49709:14
tristanCtobiash: check with gerrit09:14
tobiashin gate the update definitely needs to dequeue09:14
tobiashin check that's normal behavior afaik09:15
tristanCtobiash: arg, I just spent a few hours trying to understand why it didn't happen, for some reason i thought it should :-)09:16
tristanCwhat's suprising is that if the child change has an explicit depends-on in the commit message, then the independent manager does the dequeue09:16
tristanCand it seems like we rely on the "neededBy" gerrit schema field, but this doesn't get returned for non current patchset09:17
*** spsurya_ has joined #zuul09:40
*** sshnaidm|off is now known as sshnaidm09:40
*** nchakrab_ has joined #zuul10:08
*** nchakrab has quit IRC10:09
*** nchakrab has joined #zuul10:10
*** nchakrab_ has quit IRC10:13
tobiashtristanC: ok, after rebuild it seems to work with zuul/t/tenants.html10:19
tobiashtristanC: what's 573494 needed for?10:20
tristanCtobiash: i think it's rather cosmetic, as far as i can tell it removes console.log, but the enableProdMode may have other benefit?10:21
tristanCtobiash: it would be nice to merge 579418 and tag zuul-3.1.110:22
tobiashtristanC: we still need an upgrade notice as /zuul/ to get the tenant list is not working anymore10:24
tobiashor we need to fix that (no idea how) and then tag 3.1.110:24
tobiashbut at least right now a multi tenant setup on /zuul/ is *not* possible without a rewrite rule in a proxy to change /zuul/ to /zuul/t/tenants.html10:26
openstackgerritMerged openstack-infra/zuul-jobs master: Dynamically determine overlay network mtu  https://review.openstack.org/57815310:28
tobiashso tbh I would even treat this as a blocker for 3.1.1 (given that 3.1.0 doesn't contain the angular refactor)10:28
tobiashtristanC, mordred, corvus: what do you think? ^10:28
*** Rohaan___ has joined #zuul10:34
*** Rohaan has quit IRC10:34
*** Rohaan___ is now known as Rohaan10:34
*** jpena is now known as jpena|lunch11:30
*** Rohaan has quit IRC11:52
*** Rohaan has joined #zuul12:02
*** rlandy has joined #zuul12:25
*** jpena|lunch is now known as jpena12:28
*** Rohaan has quit IRC12:45
*** jpena is now known as jpena|off12:52
*** nchakrab_ has joined #zuul13:02
*** nchakrab has quit IRC13:06
*** elyezer_ has quit IRC13:10
*** dkranz has quit IRC13:14
*** elyezer_ has joined #zuul13:29
*** gtema has quit IRC13:35
rcarrillocruzmrhillsman: heya, around? looking at how you handle secrets on https://github.com/theopenlab/openlab-zuul-jobs . I take openlab-zuul-jobs is a config repo in your zuul tenant installation ?13:47
rcarrillocruzmy understanding is that secrets cannot be used in untrusted projects unless they are run on post-review queues13:48
rcarrillocruzso here's the use case. I have a role that interacts with 3rd party clouds (be aws, or openstack, azure, etc) to create vpn tunnels. I'm thinking on putting the cloud provider creds as zuul secrets. Now, what I would like to avoid is to by mistake having someone a debug statement or something showing up the creds in the job logs. I'm thinking maybe it makes sense to create check/post with post-review just for13:53
rcarrillocruzthese kind of jobs,  instead of using the general check/gate wich are pre-review by default13:53
rcarrillocruzthat at least allows us to run the jobs POST review , so we can see if someone is putting an unadverted debug statement or the likes13:53
mrhillsmano/13:57
mrhillsmanopenlab-zuul-jobs is a trusted project/repo13:57
rcarrillocruzwhat i thought, so that repo in your case is a mix of project-config/openstack-zuul-jobs right?13:58
mrhillsmani am not sure we are using any project-config jobs but yes13:59
rcarrillocruzoki13:59
rcarrillocruzso you don't use any in-repo jobs that handle secrets, as that's a config repo that's the one containing jobs and secrets13:59
rcarrillocruzgotcha14:00
rcarrillocruzi'm wondering about pros-cons for my scenario: all jobs secrets put on project-config vs in-repo jobs containing secrets run on post-review queues14:00
mrhillsmanyes, we handle the secrets via roles in that repo14:00
mrhillsmannot 100% sure we are handling them the right way but we have not heard of any issues just yet with a few exceptions along the way14:01
pabelangerrcarrillocruz: i am not sure I would enable post-review on check pipelines, I think it would be too easy to leak credentials.  You are right, you can create a new parent job, keep it in project-config repo, then have jobs parent to it to setup vpn.  Secrets needs to be next to playbooks14:02
rcarrillocruzotoh... if i have a job in config project that is 'run role test.yaml' i'm always worried the test may contain something bad against localhost, that could harm executor14:03
rcarrillocruzdunno14:03
mrhillsmanbut you control the jobs there14:03
pabelangerwill be run in bwrap on executor, but yes.14:03
mrhillsmanso you should be reviewing the code14:03
mrhillsmans/code/jobs14:03
*** dkranz has joined #zuul14:04
mrhillsmannot sure if you know this, but unlike non-config projects, PRs to config projects are not run as part of jobs until they merge14:04
rcarrillocruzgah, call... will get back to you in a few folks, thx14:08
*** nchakrab_ has quit IRC14:13
Shrewsmordred: seems the changes to replace shade/occ in nodepool are ready? probably should pick a time/day to merge those then restart builders/launchers when we can be around to watch that.14:17
Shrewsthat's not something i want to just merge then give infra-root a surprise when they need to restart for some reason  :)14:18
Shrewsnot that i expect issues  :)14:18
openstackgerritMerged openstack-infra/nodepool master: Publish docs on release  https://review.openstack.org/57930014:19
openstackgerritMerged openstack-infra/nodepool master: Handle node no longer in pool error  https://review.openstack.org/57930914:19
*** jpena|off is now known as jpena14:31
*** dkranz has quit IRC15:02
clarkbShrews: the changes just change the import location to start right? we are still using the shade bits of the sdk repo?15:24
clarkb(fwiw I think that is probably the right "level" of api consumption for nodepool considering that shade grew out of nodepool)15:25
Shrewsclarkb: yeah, that's right. same shade-style calls15:27
corvustobiash: test cases which just check that an exception handler did or didn't log something are difficult to write and fragile -- i'd prefer to focus on testing behavior.  would you revisit your -1 on 579428 in that light?15:37
*** nchakrab has joined #zuul15:40
*** dkranz has joined #zuul15:45
*** nchakrab has quit IRC15:47
tobiashcorvus: it looked to me like fixing an error (aka behavior change)15:48
tobiashIf it's just silencing logging I agree that there is no need for a test15:49
tobiashcorvus: Revisited my vote after a second look15:50
corvustobiash: yeah, it's at least not a testable behavior change (either way, nothing gets enqueued)15:51
corvusit just skips a bunch of noop actions by going to the exception handler15:52
*** weshay is now known as weshay|ruck15:56
*** gtema has joined #zuul16:03
*** bhavik1 has joined #zuul16:22
*** bhavik1 has quit IRC16:46
*** jpena is now known as jpena|off16:58
*** electrofelix has quit IRC17:08
tobiashpabelanger, corvus: looks like the hdd sensor has a race17:17
tobiashhttp://logs.openstack.org/28/579428/1/gate/tox-py36/fb8808e/testr_results.html.gz17:17
tobiashtest_status_page17:17
corvusi have to run to an appointment; will be back in a few hours17:25
*** elyezer_ is now known as elyezer17:39
pabelangertobiash: corvus: I'll look here shortly18:09
*** gtema has quit IRC18:22
openstackgerritDavid Shrewsbury proposed openstack-infra/nodepool master: Fix for referencing cloud image by ID  https://review.openstack.org/57966418:48
Shrewstobiash: you may want to take a peek at 579664 ^^^. Not sure what the whole dict(id=...) part was trying to do.18:49
tobiashShrews: looking18:54
tobiashthat dict(id=...) part looks kinda weird18:54
gundalowAs part of AnsibleFest we will be having a *TWO DAY* Contributor Summit. Please feel free to add items to the agenda https://etherpad.openstack.org/p/ansible-summit-october-2018 Signup and discount codes will be made available shortly (~week) via the ansible-devel email list.19:01
clarkbgundalow: that bookends ansiblefest proper?19:02
gundalowclarkb: haha19:04
gundalowI like the bookends19:04
Shrewstobiash: gah, release note for the fix... always forget those19:11
clarkbgundalow: mostly making sure that I keep things like that in mind when booking travel19:12
openstackgerritDavid Shrewsbury proposed openstack-infra/nodepool master: Fix for referencing cloud image by ID  https://review.openstack.org/57966419:13
gundalowclarkb: Yup19:15
gundalowFeel free to ping the agenda around anywhere else it might make sense19:15
openstackgerritMerged openstack-infra/zuul master: model: fix AttributeError exception in freezeJobGraph  https://review.openstack.org/57942819:16
rcarrillocruzmrhillsman: i know, i mean ...19:23
rcarrillocruzlet me put an example19:24
rcarrillocruzthe tox job19:24
rcarrillocruzis a config project19:24
rcarrillocruzbut that runs tox, which exercises the repo being tested19:24
rcarrillocruzso imagine i have like a job that is 'run test.yaml'19:24
rcarrillocruzif i push a change to the repo being tested19:24
rcarrillocruzwhjich does19:24
rcarrillocruzdebug: var=myzuulsecret19:25
rcarrillocruzi guess that would be exposed in the job log, unless the job is previously reviewed in a queue with post-review true19:25
rcarrillocruz?19:25
clarkbrcarrillocruz: zuul sould fail if you use a secret in a pre review situation19:29
rcarrillocruzdoes it ?19:29
rcarrillocruzTHEN that's good19:29
rcarrillocruzi'll try to repro tomorrow19:30
rcarrillocruzby fail you mean zuul detects debug tasks or the likes19:31
rcarrillocruzi.e. how does it know zuul when accessing a secret var is legit or bogus19:31
clarkbrcarrillocruz: zuul does not let you use secrets in that situation and would be a bug19:32
clarkbthat situation being pre review testing with config changes that are not merged19:32
rcarrillocruzyeah, but in this case it would not be a config change...the job is in config, like tox/ansible-playbook test.yaml on the tested repo19:33
clarkbrcarrillocruz: you must explicitly allow the job to use the secret though19:33
clarkbrcarrillocruz: if you write it to disk such that tox can read it then yes you have probably done something bad19:33
pabelangerran into this issue with RDO zuulv3 migration last week, for the purpose of finishing migration, we just added that specific to be trusted in config project repo. But ya, was a tox job20:36
corvusrcarrillocruz, clarkb, pabelanger: there are a lot of ways to construct a job so that part of the job happens in a trusted environment with secrets and part happens in an untrusted environment (clarkb and pabelanger suggested some of those ways; there may be others).  however, if you find it's not possible to construct the job you need like that, and you still want it to run pre-merge on untrusted code, then20:54
corvusyou might consider the option of a restricted check pipeline.  a pipeline that has a requirement that a core reviewer leave a vote (or label) saying "it's okay to run sensitive check jobs on this change".20:54
pabelanger+1 we'll likely do that in rdoproject in the next few days, once we unfreeze the config project. Just need to have a discussion first about it with everybody20:56
rcarrillocruzit's not more a question as to how to structure a job. What it's not clear to me is by having a trusted job in a config repo that merely does 'run this entrypoint from checked out PR' can be protected from a malicious user to put a debug/print statement on the secret var20:56
rcarrillocruzthat's why i can only think of a pipeline with post-review true20:57
rcarrillocruzcorvus ^ ?20:57
rcarrillocruzi may be overcautious, but trying to protect myself from getting a secret leaked out and a bot farm on an AWS account billed to our corp account :S20:58
corvusrcarrillocruz: it's a little more nuanced than that.  for instance, in openstack, we have jobs with access to secrets which run arbitrary code ("tox -e py35") but there's no way to access the secrets from the code that runs tox.  that's because secrets attach to *playbooks* not jobs.20:58
corvusrcarrillocruz: so, if the playbook which runs tests from the entrypoint is defined in a job with a secret, then that playbook (and therefore whatever code the 'run tests' entrypoint runs) has access to those secrets20:59
corvusrcarrillocruz: it sounds like you might be writing a job like "use some aws credentials to test a proposed change to this ansible module".  that sounds like the kind of job where the proposed change is the thing that needs access to the secrets.  that probably can't be written safely to run pre-review.  that kind of job probably needs a restricted check (post-review) pipeline.21:01
corvusrcarrillocruz: however, a job like "i'm going to set up something in aws, then hand it to an ansible module with a proposed change" -- that could be written in two stages where only the first stage has access to the secrets.21:01
pabelangerjust remember to delete secrets from disk after vpn is created, so next jobs can't just echo that configuration21:03
rcarrillocruzwell, the idea would be to run ansible from an ephermeral node, so when is finished node is gone21:03
rcarrillocruzcorvus: yah, it's the primer. It's a role that 'create aws things with these creds'. It's not like i can prepare something in aws and act on it afterwards from proposed change21:04
corvusi think that's probably the deciding question:  does code in the proposed change need access to the secrets?  if so, you probably need the job to be in a post-review pipeline.  if not, you can probably (carefuly) construct it with multiple playbooks and run it pre-review.21:04
corvusrcarrillocruz: yeah, then my guess is this one needs to be post-review.21:05
rcarrillocruzso, check and gate 'restricted'21:05
rcarrillocruzin the new multitenant world, i can have whatever pipelines right?21:05
rcarrillocruzin my tenant i mean21:05
pabelangeryes21:06
corvusrcarrillocruz: yep.  you need to make sure that folks know that they're reviewing the code for attempts to subvert the ci system :).  so basically, don't +2/merge-label/whatever the change if it has "echo $PASSWORD" in the ci script.  :)21:06
rcarrillocruzheh21:06
rcarrillocruznow21:06
rcarrillocruzpost-review in GH world21:06
rcarrillocruzin my mind, post-review in gerrit means 'oh, you put +1 on the change, now we go run jobs'21:06
rcarrillocruzhow that translates in GH?21:07
corvusrcarrillocruz: i'd do it with a label21:07
rcarrillocruzapprove is +121:07
rcarrillocruzand mergeit is +A21:07
rcarrillocruzwe have mergeit label as +A on our tenant pipelines, 'approves' are like +2..21:07
corvusrcarrillocruz: either use whatever existing label means "i have reviewed this and think it's okay to merge", or add a new one that means "it's okay to run the real-cloud tests on this pr"21:08
rcarrillocruzi wonder if i could make approves the o-k for post-review21:08
rcarrillocruzso it has to be a label ?21:08
corvusrcarrillocruz: 'approve' sounds reasonable, or if folks don't like it, add a new one21:08
rcarrillocruzok, thx folks21:08
rcarrillocruzmuch appreciated21:08
corvusrcarrillocruz: there are probably options other than label, but i think that's the best21:08
corvus(you might be able to do "comment left by project contributor" or something)21:09
corvusbut i think labels were made for this21:09
corvusShrews, tobiash: i wrote the code updated by 579664 in I8411c627f9136339d1b0eb35632d6b2a27ab7a8121:13
corvuslet's see if we can reconcile that before we merge 66421:14
Shrewscorvus: oh? my 'git log' foo must have failed. i thought tobiash wrote it21:14
corvusoh, hrm, it goes back further than that :)21:15
corvus(that's definitely a relevant commit)21:16
Shrewscorvus: it seemed to be an untested path21:16
corvusi wrote the previous incarnation too: I83f2902be4b9b73a949461b7f14da548066b956221:17
corvusso the way i understand it (through the mists of time) is that if we don't pass in a dict, shade would treat it as a name.  using the "dict(id="  lets us specify it's really an id.21:20
Shrewscorvus: except sending id=BLAH to get_image would never work there21:22
Shrewsthe param is name_or_id21:22
Shrewsand there is a get_image_by_id for the other thing21:23
Shrewsso i don't think this ever really worked?21:23
Shrewsoh, yes it did21:24
Shrewsif the thing we pass has an 'id' attr, it dtrt21:25
Shrewssneaky use of the shade api there21:25
corvusat the time it was written, it would have passed "image=dict(id=UUID)"21:25
Shrewsyeah. we probably should have documented what was happening there21:26
Shrewsok, so my fix isn't what we really want. will have to look more closely at why it could be failing21:27
Shrewscorvus: thx21:27
corvusShrews: np; thank you :)21:28
Shrewsthe shade authors were either way too clever, or way to drunk21:29
corvusi'm looking at the bug report, and i assume the first example is a type (it should say "image-id" instead of image-name there?)21:29
Shrewscorvus: yeah, that's what i assumed. my included test produced the same error message before the fix21:30
corvusShrews: apparently the api is "call the method with these args and a comment"  :)21:30
Shrewsit was one of those things were we discovered after the fact that if we had the id, it would be a lot less expensive to query using it21:31
Shrewsso we were clever (but i also think we were drunk when we wrote the cleverness)21:31
corvusthe current call chain looks the same to me -- i think it should still be passing "image=dict(id=UUID)"21:33
Shrewscorvus: i think it's a different path (checking label readiness)21:34
Shrewscorvus: OpenstackProvider.getImage() call21:35
corvusoh21:35
corvusi was just about to ask where WARNING nodepool.driver.openstack.OpenStackProvider: Provider default is configured to use 0e2e2e05-99e5-422b-b9e3-7e4a28d9088e as the cloud-image for label my_label and that cloud-image could not be found in the cloud. comes from?21:35
corvusso i guess that's failing before the createserver call21:35
Shrewslooks to me like it should still work, but i must be missing something21:36
corvusah found it21:36
corvussorry, i mean i found that error message21:36
corvusprovider labelReady21:36
Shrewsyup21:37
Shrewsmy test failed because the fake provider doesn't handle the dict. i'm not sure why it fails in production (which uses shade which should handle it ok)21:37
corvussorry, i should have updated the fake provider to support that and added a test21:38
corvusbut it sounds like first we should double check this for real21:38
Shrewscorvus: yes, need a real openstack test to find this i think21:38
Shrewswill try to track that down tomorrow.21:39
corvusShrews: thank you for helping fix my stuff21:40
corvusShrews: i'll go ahead and make a patch to update the fake and add a test, but put it on hold until we verify it for realz21:40
corvuser, well, i'll use the test you wrote.  i'll just update the fak.21:41
Shrewscorvus: sure21:41
Shrewsmaybe updating the fake provider will reveal the failure in a different path21:41
corvusooh.  fingers crossed.  :)21:41
openstackgerritPaul Belanger proposed openstack-infra/zuul master: Fix race condition with executor hdd sensor  https://review.openstack.org/57970021:52
*** hashar has quit IRC22:01
openstackgerritPaul Belanger proposed openstack-infra/zuul master: Fix race condition with executor hdd sensor  https://review.openstack.org/57970022:05
clarkbpabelanger: on ^ is zuul expected to create thta dir? I expect not but returning false may prevent it from doing so if it is expected to create it22:07
pabelangerclarkb: yah, zuul should create the state_dir if missing, but don't believe returning false will affect that22:09
openstackgerritJames E. Blair proposed openstack-infra/nodepool master: Add test for referencing cloud image by ID  https://review.openstack.org/57970222:09
clarkbpabelanger: returning false means that th executor shouldnt execute doesn't it?22:09
pabelangerclarkb: the job shouldn't run ya22:10
pabelangerbut executor will continue to run22:10
clarkbmy grepping doesn't show it creating that dir though22:10
pabelangermaybe we should only start sensors once zuul-executor is fully started22:10
pabelanger1 sec22:10
corvusmaybe it's just created in the test?22:11
corvusthough i would expect that to be created before the executor starts22:12
pabelangerclarkb: I think https://git.zuul-ci.org/cgit/zuul/tree/zuul/executor/server.py#n1858 creates it22:12
pabelangerbecause of makedirs22:12
pabelangerplugin_dir is build up from state_dir22:13
pabelangercorvus: I was thinking of doing that, but looks like zuul creates it.  I could fix it that way too22:14
clarkbpabelanger: the HDDSensor is created after that makedirs22:14
corvuspabelanger: the governor doesn't start until after that line22:14
pabelangerHmm, maybe I am fixing it wrong22:15
pabelangerhttp://logs.openstack.org/28/579428/1/gate/tox-py36/fb8808e/testr_results.html.gz was the failure22:15
pabelangertests.unit.test_web_urls.TestSuburl22:16
corvusthe exception in test_disk_accountant_kills_job references the tmpdir from test_template_removal_from_branch22:18
corvusmost of the test failures are due to the unclean kazoo shutdown in test_template_removal_from_branch22:20
pabelangerokay, so consider it a test failure rather then race?22:21
corvusyeah, i don't think there's a problem with the hdd sensor22:21
pabelangerokay, thanks for looking22:22
Shrewscorvus: oh, i thought you were going to put a new PS on top of my review. Should I abandon mine?22:22
corvusShrews: let's just keep them both in WIP until we know what's going on?  mine is really just yours but without the code change and reno (you're still the git author)22:23
Shrews*nod*22:24
corvusShrews: mine passes the test, so we do need to poke at a real openstack22:24
clarkbper ianw's email it would be helpful if we could get https://review.openstack.org/#/c/563789/ and https://review.openstack.org/#/c/563790/ moving (the second is subject ot hte deprecation notice but the first should be good to go in now I think)22:24
pabelangercorvus: clarkb: are we at a point to consider restarting zuul in openstack-infra tomorrow and maybe tagging a new release? Now that JS has been landed22:25
corvuspabelanger: i want to get more info from tobiash, tristanC, and mordred about the /zuul issue mentioned earlier.  hopefully mordred will be out from under paperwork tomorrow22:25
clarkbpabelanger: my only concern with it is I will become progressively more afks middle of hte week22:25
clarkbbut if others are around to work thorugh problems should be fine22:26
*** dtruong_ has quit IRC22:27
pabelangerwfm, hdd sensor is about the last thing RDO project needs to finish zuul migration, then we start deleting jenkins things22:27
*** dtruong has joined #zuul22:28
pabelangerskipping of zuul.child_jobs via zuul_return is another, but less important: https://review.openstack.org/578230/22:28
openstackgerritJames E. Blair proposed openstack-infra/zuul-jobs master: DNM: Exercise log-inventory in base-test  https://review.openstack.org/57970822:40
*** rlandy has quit IRC23:35
*** threestrands has joined #zuul23:43

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!