Thursday, 2018-08-16

corvus(which is a thing i think we want anyway)00:00
* SpamapS securing gearman traffic now that we'll have > 1 executor00:00
SpamapScorvus: yeah, with the FF thing, I was thinking we'd have to have state.00:00
corvusSpamapS: excellent idea!00:00
mordredalso - I think skip-clean-check + zuul gating + github status flags is a potentially nice scenario for folks- the status flags make people learn to not force-merge something until it at LEAST has a green check - but gating lets them know that if they're impatient they can click approve and it'll get merged the instnat it DOES have a clean flag00:00
SpamapSyou'd have to remember the git state that passed + the jobs00:00
corvus(the secure gearman thing)00:00
SpamapScorvus: aye00:00
corvusSpamapS: yeah, and state for any required-projects00:01
mordredI obviously think removing force-merge from people is preferrable - but understand there are circumstances where it's unpossible - or maybe undesirable00:01
corvusmordred: it's easy: you wait until they're asleep00:01
mordredcorvus: :)00:01
SpamapSmordred: I also think there can be a fast-gate00:02
mordredyou're a fast gate00:02
SpamapSwhich is like.. do whatyou can... make sure zuul's config still works.. but... landthis change more or less nao00:02
SpamapSI've a fast gait, it's true.00:02
mordredI have a fat goiter00:02
mordredand some phat gout00:03
* SpamapS hands mordred some iodized salt00:03
SpamapSand some clean socks00:03
mordredmmm. smakelijk!00:03
openstackgerritJames E. Blair proposed openstack-infra/zuul master: Add 'build' method to API  https://review.openstack.org/59222500:23
SpamapShrm00:30
SpamapSI'm trying to do ssl for gearman00:30
SpamapSbut it never sends the cert00:31
* SpamapS decides to roll back and head to bar00:31
tristanCcorvus: recording the git sha's of the required project at check and doing the comparaison with the last git shas of the gate queue wouldn't be enough for that fast-forward-gate?01:25
corvustristanC: yeah, something like that.  we just need to store all that info in the build db -- and we need to require the build db.  so i'd probably put implementing that after we decide whether the build db should be in sql or zk.01:35
corvustristanC: but also, i think if we add it, we should have a nice long thing in the docs about how *external* dependencies may still have changed.  so it's not 100% guaranteed not to break or wedge the project's gate.01:37
*** jiapei has joined #zuul01:37
corvustristanC: it may require zuul to push merges (otherwise the shas may be different)01:38
tristanCthat sounds like relational data... are you suggesting zk to remove one required service?01:38
corvustristanC: i haven't thought about the schema.  but yes, i think we should look into storing the build db in zk to reduce the extra dependency.  i have no idea if it's a good idea -- only that we should consider it.  :)01:39
corvusokay this is really weird -- see my inline comments on https://review.openstack.org/59222501:41
openstackgerritJames E. Blair proposed openstack-infra/zuul master: Add 'build' method to API  https://review.openstack.org/59222501:43
corvusi guess there's a bug in flake8 that cause it to miss that.  weird.01:43
tristanCcorvus: that is weird, there doesn't seem any reason to happen01:44
tristanCcorvus: that zk or sql decision would be good to know, i'd like to add a nodeset and node table to record to record the build resources used by a job01:46
tristanCwhich also sounds like relational data, so i wonder how it will look through the zk module01:47
tristanCor build resouruces could be stored unstructured, but then how to do reverse lookup (e.g. query which job used that specific node)01:48
corvustristanC: good point, we should collect the kinds of queries we might want -- because it might be easy to query in one direction (buildset -> build -> node) in zk, but not the other direction (start with a node id)01:50
openstackgerritneilsun proposed openstack-infra/zuul master: Add type check for zuul conf  https://review.openstack.org/59191702:22
*** rlandy|afk is now known as rlandy02:44
*** rlandy has quit IRC02:44
*** jpena|off has quit IRC02:45
*** NeilSun has joined #zuul03:04
*** NeilSun has quit IRC03:04
*** NeilSun has joined #zuul03:16
*** pcaruana has quit IRC05:26
openstackgerritTristan Cacqueray proposed openstack-infra/zuul master: WIP web: rewrite interface in react  https://review.openstack.org/59160406:34
tristanCcorvus: mordred: last PS adds console stream and builds page filter. It seems like it's almost feature complete now, just missing filters settings from querystring or cookies06:35
tristanCnote that the console stream uses a smooth scrolling, and the builds filter now support more columns06:36
*** jiapei has quit IRC06:37
*** pcaruana has joined #zuul06:48
*** gtema has joined #zuul07:16
*** jpena has joined #zuul07:31
openstackgerritAndreas Jaeger proposed openstack-infra/zuul-jobs master: Build releasenotes when tox.ini changes  https://review.openstack.org/59229807:35
openstackgerritMarkus Hosch proposed openstack-infra/nodepool master: Move sphinx + deps to doc/requirements.txt  https://review.openstack.org/59156507:58
*** darkwisebear has joined #zuul07:59
tristanCcorvus: mordred: so using path routing is simple: just replace "HashRouter" with "BrowserRouter" in the index.js file.08:09
tristanCHowever this need complex server side rules to make the static files not load from the scoped path, and as monty said, it's going to be even more tricky for swift based hosting08:10
*** aspiers[m] has quit IRC08:11
tristanCso i'll keep the change api route discovery from href (with the trick to split at '/t/'), but i'll recommend we keep the hashrouter to make deployment simpler08:12
*** darkwisebear has quit IRC08:17
*** darkwisebear has joined #zuul08:18
*** electrofelix has joined #zuul08:20
openstackgerritTristan Cacqueray proposed openstack-infra/zuul master: WIP web: rewrite interface in react  https://review.openstack.org/59160408:38
openstackgerritTristan Cacqueray proposed openstack-infra/zuul master: WIP web: use BrowserRouter  https://review.openstack.org/59232108:38
*** darkwisebear has quit IRC08:39
*** ianychoi_ has quit IRC08:42
*** panda|off is now known as panda08:56
openstackgerritTristan Cacqueray proposed openstack-infra/zuul master: WIP web: rewrite interface in react  https://review.openstack.org/59160409:37
*** elyezer_ has quit IRC09:40
*** elyezer_ has joined #zuul09:42
*** elyezer_ has quit IRC09:48
*** elyezer_ has joined #zuul09:50
openstackgerritIan Wienand proposed openstack-infra/zuul-jobs master: Cleanup temporary directories  https://review.openstack.org/59234010:42
openstackgerritIan Wienand proposed openstack-infra/zuul-jobs master: Create a download script  https://review.openstack.org/59234110:42
openstackgerritIan Wienand proposed openstack-infra/zuul-jobs master: upload-logs-swift: Cleanup temporary directories  https://review.openstack.org/59234010:47
openstackgerritIan Wienand proposed openstack-infra/zuul-jobs master: upload-logs-swift: Create a download script  https://review.openstack.org/59234110:47
*** panda is now known as panda|lunch11:02
*** jpena is now known as jpena|lunch11:08
*** elyezer_ has quit IRC11:11
*** elyezer_ has joined #zuul11:12
*** jpena|lunch is now known as jpena12:14
*** samccann has joined #zuul12:35
*** rlandy has joined #zuul12:41
*** NeilSun has quit IRC12:54
*** elyezer_ has quit IRC12:56
*** elyezer_ has joined #zuul13:03
mordredtristanC: going through the patch now - the updated pages look pretty awesome! love the scrolling in the stream page13:08
openstackgerritMarkus Hosch proposed openstack-infra/nodepool master: Add list of metrics provided to statsd  https://review.openstack.org/59023313:09
tristanCmordred: nice! the console stream may need some refresh rate delay though, the scrolling may jitter because it's activated for each line.13:12
tristanCand for builds query filter, the api returns 500 when adding multiple filter for a single key13:13
corvusthe smooth scrolling looks nice, but i wonder if we can speed it up?  when it's moving, it's difficult to read, so less time spent moving means more time available to read13:13
mordredtristanC: the builds query filter is all server-side it seems, yeah?13:15
corvusi'm glad that BrowserRouter is looking promising -- it makes for much friendlier urls, and i'd like to get to the point where "zuul.openstack.org/jobs/devstack" is a url people are comfortable with13:15
mordredof course it is - that was a silly question13:15
tristanCmordred: yes, as it was before13:15
mordredtristanC: I had an idea ...13:16
mordredtristanC: (I recommend running and hiding now)13:16
mordredtristanC: the manifest.json that's there for progressive web apps ... I wonder if we could also read values from it from the dashboard itself - and offer it as a way a deployer could set the api url location13:17
mordredtristanC: in addition to the build-time option13:17
tristanCmordred: probably, not sure how it's supposed to be loaded though13:17
mordredtristanC: so that a deployer _could_ just run from the tarball we build - but have config management splat down an updated manifest13:17
mordredmight be a thing a deployer wants to do anyway, to update title and description - since those make their way in to PWAs saved to mobile devies13:18
mordreddevices13:18
mordredso I could see, for instance, softwarefactory deploying one with a title "softwarefactory Zuul" and openstack doing "openstack zuul" - and then as a user me saving both as different icons to my android phone13:19
mordredjust a thought for the future - I don't think we need to do anythign with that today13:19
tristanCmordred: it will also adds an extra http call on load in addition to the /api/info13:20
tristanCcorvus: it does and we can probably make it work with the right rewrite rule, but i don't think it will be possible to just host the files on swift then13:21
*** darkwisebear has joined #zuul13:21
tristanCcorvus: is zuul.openstack.org/#/job/devstack really less friendlier?13:21
mordredbtw - the status page looks great on my phone13:22
*** elyezer_ has quit IRC13:22
tristanCmordred: oh yes, though the "kebab" collapse menu isn't working yet13:22
mordredzomg. I just navigated to the preview dashboard on my phone, clicked "save to home screen" - and I now have a zuul "app" on my phone13:24
mordredI agree - the collapse menu it totally not working :)13:24
corvustristanC: yes it is -- # or #! don't mean anything to humans (or if they do, they mean "an anchor in a page") so they make that part of the url unintuitive.  you'd have to expect people to remember where in the url to place the #, and whether it should be # or #! or what13:24
*** elyezer_ has joined #zuul13:25
corvusso what's the thing about the static external option (eg swift) that makes it tricky for browser router?13:27
mordredthey don't know how to serve the file paths13:27
mordredit's the same with the current dashboard for multi-tenant dashboard13:27
corvusoh, so this isn't an additional problem, it's just the same caveat?13:28
mordredyah13:28
mordredwell - we'll need to do some more work to make single-tenant work with this setup13:28
mordredbecause we're just letting react-scripts handle our webpack config for us13:28
tristanCcorvus: yes, /job/devstack isn't a file13:28
mordredI'm not sure we should do that work until someone actually wants to deploy the dashboard to swift, because I really like the lower complexity of just having the webpack config be whatever react-scrits think it should be13:29
mordredthe current actual deployment scenarios we have all involve either serving from zuul itself or serving from apache with rewrites, all of which work with the react-scripts approach - and should work fine with browserrouter13:30
tristanCalso, even when serving the index.html for non existing file path, then the static file are sill loaded incorrectly, e.g. from "/job/devstack/static/bundle.js"13:32
corvusyeah, i agree those are the things we should focus on; we don't need to trade in complexity for a hypothetical deployment on swift13:32
tristanCcorvus: well the complexity comes from using browserrouter (which doesn't work without server settings), the easier way is using hashrouter (which would also work fine on swift)13:33
tristanCfor the static file location, it's either relative to the request path (it's the "homepage": "./" setting in package.json)13:33
corvustristanC: we accept complexity in the code to make things friendlier for users.13:34
corvustristanC: users > deployers > developers -- that's the order of importance here13:34
tristanCeither it's an absolute path (default to /static) which break sub path deployment13:34
corvustristanC: regarding complexity, i was agreeing with mordred we don't have to solve all of the static-external deployment issues now since we don't have a use case for them13:34
corvustristanC: but we should accept the complexity of browserrouter because it improves the user experience13:35
tristanCalright, so i think the main issue is static file location that can no longer be relative to requested path13:36
corvustristanC: in which case does that happen?13:38
tristanCcorvus: when you load "/job/devstack", even if the server serve "/index.html", the static files are loaded from "/job/static/" because the homepage is set to "./" in the packages.json13:39
tristanCif we don't set homepage to "./", then it loads static file from "/static" by default iirc13:40
*** darkwisebear has quit IRC13:41
tristanCwhich i think wouldn't work for the job preview file for example13:41
*** elyezer_ is now known as elyezer13:42
tristanCon the other hand we could json patch the homepage to "./" for job preview13:49
tristanCeventually, it will be an issue for sub path deployment, in which case deployer will have to put zuul static file in /static, or re-build the ui using the desired homepage path13:50
tristanCi mean, that's my current understanding of browserrouter deployment, there may be other solution13:52
*** elyezer has quit IRC13:52
*** elyezer has joined #zuul13:54
SpamapShm.. does the github endpoint live in zuul-web now?13:56
* SpamapS is trying to set up a new github app and going a little cross-eyed13:56
corvusSpamapS: yes, it's been there for a while :)14:01
corvusSpamapS: we're down to only one webapp14:02
SpamapSGood good14:02
SpamapSI thought so14:02
SpamapSjust couldn't read that ball while juggling it ;)14:02
pabelangercould I get a +3 on https://review.openstack.org/591457/ adds node info into emit-job-header role14:22
*** elyezer has quit IRC14:30
*** elyezer has joined #zuul14:32
*** darkwisebear has joined #zuul14:38
rcarrillocruzso folks, i'm' getting a host authenticity error https://ansible.softwarefactory-project.io/logs/7/7/bc3f0e852d069096ae27ff3c8b2d7bc3a83f6447/check/ansible-role-tests-vqfx-devel-py2/1ed6d14/job-output.json.gz14:46
rcarrillocruztrying to understand the logic14:46
rcarrillocruzi see zuul server.py expects a known_hosts prepopulated14:46
rcarrillocruzhow's the workflow till it reaches the point of doing the ansible -m setup14:47
mordredrcarrillocruz: the known hosts entry comes to zuul from nodepool - and zuul executor server writes whatever nodepool sends it into the known_hosts file14:49
mordredrcarrillocruz: line 1451 in zuul/executor/server.py is where it writes the file14:49
rcarrillocruzso that means, the ssh-keyscan from nodepool runs, but some garbage  is put on the record for that node, therefore zuul fails as it doesn't have it on that file ?14:50
pabelangermaybe something to do with ssh-ed25519 key?14:50
mordredrcarrillocruz: yah - if ssh-keyscan is not working I would expect things to go poorly14:50
rcarrillocruzwhat i'm guessing yeah, maybe it expects rsa14:50
rcarrillocruz?14:50
rcarrillocruzit's a net appliance, so snowflakes ahead14:50
mordredoh goodie :)14:51
* rcarrillocruz looks at nodeutils14:51
mordredyou can set host-key-checking to false on the pool14:51
mordredand it will skip the keyscan14:51
rcarrillocruzgah...thing is we share the pool with others in SF14:52
rcarrillocruzpabelanger , tristanC , nhicher ^14:52
rcarrillocruzwould you be ok with that14:53
mordredI just did an ssh-keyscan on mirror02.us-west-1.packethost.openstack.org which has an ecdsa key14:53
pabelangerrcarrillocruz: I think we can create a specific pool for it14:53
rcarrillocruzor maybe it's the right time to just use vexxhost pool pabelanger14:53
mordredandit got both the ecdsa-sha2-nistp256 and the ssh-rsa keys14:53
rcarrillocruzmordred: i can do a quick ssh-keyscan and paste, sec14:53
pabelangerrcarrillocruz: sure, we can test that14:53
mordredrcarrillocruz: yah - I would expect it to work - however, it's possible the net appliance is doing something weird with ssh hostkeys14:54
mordredby weird, I do of course mean broken - but it's a vendor appliance, so we should expect it to do basic networking things incorrectly :)14:54
rcarrillocruznm, i even had a keyscan from a couple hours ago14:55
rcarrillocruzhttp://paste.openstack.org/show/728202/14:55
rcarrillocruzit does return an rsa14:55
rcarrillocruz...14:55
mordredah!14:57
mordredrcarrillocruz: ssh-keyscan does not read ed25519 keys by default14:58
mordredit can be specified14:58
mordredssh-keyscan -t rsa,ecdsa,ed2551914:58
mordredso maybe this wants to either be a thing we just add to the keyscan command we do - or perhaps make it a config option if we think automatically scanning for ed25519 keys is something we shouldn't do14:59
rcarrillocruzsohmm, wait... but nodeutils doesn't seem to use ssh-keyscan, it does use paramiko for doing the scan?14:59
mordredyah. Im guessing same thing - looking15:00
Shrewscomment there says only rsa is returned by paramiko15:01
rcarrillocruzyah...15:01
mordredhttps://github.com/paramiko/paramiko/issues/62615:01
Shrewshttp://git.openstack.org/cgit/openstack-infra/nodepool/tree/nodepool/nodeutils.py#n11015:01
rcarrillocruzline 11015:01
mordredhttps://github.com/paramiko/paramiko/issues/626#issuecomment-29727238415:02
rcarrillocruzwill spin up an instance on my cloud account and try to run that snippet of paramiko, to see how it blows up15:03
mordredShrews: do you remember why we did it with paramiko and not with keyscan? it was just to avoid needing openssh client installed on launchers?15:04
*** darkwisebear has quit IRC15:05
mordredI'm also curious as to why paramiko is finding an rsa key but ssh in ansible is finding the ed2551915:06
rcarrillocruzi would have sworn we had ssh-keyscan at some point ?15:06
pabelangermaybe add debug line for nodepool for list host keys found15:07
rcarrillocruzgah15:09
rcarrillocruzso yeah15:09
rcarrillocruz>>> sock.connect(('38.145.33.81', 22))15:09
rcarrillocruz>>> t = paramiko.transport.Transport(sock)15:09
rcarrillocruz>>> t.start_client()15:09
rcarrillocruz>>> t.get_remote_server_key()15:09
rcarrillocruz<paramiko.ed25519key.Ed25519Key object at 0x7f8237637b50>15:09
rcarrillocruzit doesn't return rsa15:09
Shrewsmordred: i do not remember. either that was original code, or i seem to (maybe incorrectly) recall pabelanger adding something to that bit15:10
Shrewspabelanger: do you recall anything about that?15:10
mordredrcarrillocruz: weird - is the opposite thign happening then? is openssh preferring rsa?15:11
rcarrillocruzlulz, so... http://paste.openstack.org/show/728205/15:11
mordredso keyscan is finding the ed25519 key but ansible is trying to do rsa15:12
mordredrcarrillocruz: is it 'rsa' instead of 'ssh-rsa' maybe?15:12
pabelangerrcarrillocruz: try again15:12
pabelangerthat might be ssh trying to boot up15:12
pabelangerShrews: let me look15:12
rcarrillocruzniet, " Incompatible ssh peer (no acceptable host key)"15:13
rcarrillocruzwhen calling start_client15:14
rcarrillocruzi think the banner is a net appliance shenanigan15:14
rcarrillocruzthat's a common random failure when dealing with this kind of stuff15:14
Shrewspabelanger: hrm, looks like i added that bit of code. not sure if that was in v2 or not15:15
pabelangerShrews: https://review.openstack.org/445055/15:15
pabelangerit original was keyscan15:15
rcarrillocruzok15:15
pabelangerbut corvus asked for paramiko15:15
rcarrillocruzso i close socket15:15
rcarrillocruzstart from scratch15:15
rcarrillocruzit worked now15:15
pabelangerand me too15:15
Shrewslol15:15
rcarrillocruzhttp://paste.openstack.org/show/728208/15:16
rcarrillocruzmordred: ^15:16
pabelangerShrews: mordred: so, maybe we do use ssh keyscan :)15:16
rcarrillocruzso folks, are you ok adding that preferred_keys line15:16
rcarrillocruzi.e. forcing to give rsa15:16
rcarrillocruzsince well, we expected it to be rsa per comment anyways (even if it wasn't returning rsa)15:16
pabelangerrcarrillocruz: so, why don't we get rsa without it?15:17
pabelangeror do we, but it is malformed15:17
corvusrcarrillocruz: i'm confused -- we believe that nodepool is returning the ed key, and ansible is trying to use the ed key -- where does rsa come into this?15:18
rcarrillocruzno, that was me doing a snippet of code to force paramiko to return rsa15:18
rcarrillocruzthe failure shows ed15:18
corvusrcarrillocruz: right, i'm saying forget about rsa -- why doesn't ed work?15:19
rcarrillocruzso i'm not sure if it's because of it and it should be rsa15:19
corvusnodepool is using ed.  ansible is using ed.  why isn't it working?15:19
rcarrillocruzi don't know , but if you are saying that ed is ok to go, then pabelanger we could look locally for the known hosts and see what's going on on nodepool?15:19
corvusi think that, and seeing what known_hosts zuul wrote out, might be worthwhile.  because i'm not sure we fully understand the problem yet, and an incomplete fix could make things worse15:20
*** pbrobinson has quit IRC15:21
corvusif we wanted to change nodepool's behavior, i'd suggest that we'd probably want to try to scan *all* the key types and add all of them to known hosts.  that's probably the only safe thing to do.15:21
corvus(and that, aiui from mordred's bug report, would mean looping over all the types we know of and attempting a connection on each)15:21
*** pbrobinson has joined #zuul15:21
mordredcorvus: yah - and to do that, we'd need to either switch to ssh-keyscan or we'd have to do that ina loop in python - but we have to use a private variable to accomplish it15:21
rcarrillocruzyeah, that's what it looks like, putting preferred_keys over a loop15:21
mordredcorvus: yah15:22
mordredthat said - I would like to understand a bit more where it's falling down15:22
rcarrillocruzbut anyways, if you say ed is fine, then the issue must come from known_hosts15:22
corvusmordred: i think preferred_keys in a loop as rcarrillocruz says should do it without a private var?15:22
mordredcorvus: no, t._preferred_keys = ['ssh-rsa']15:22
corvusmordred: oooh.  "neat"15:23
mordredit's not a public variable15:23
mordredyeah15:23
mordred"yay"15:23
corvusrcarrillocruz: yeah, i don't think nodepool/zuul want to care about which keys are used, so if your device wants to use an ed key, we shouldn't get in the way.15:23
mordred++15:23
pabelangerso, if you have an RSA ssh key, you also need the RSA hostkey on the remote side right?15:29
pabelangerbecause, if so. nodepool is only returning a ssh-ed25519 hostkey from the server15:30
pabelangerand, my guess is the ssh key rcarrillocruz is using might be ssh-rsa15:30
pabelangerso, when ansible connection, it fails due to ssh-rsa host key missing in known_hosts15:30
pabelangerrcarrillocruz: if you generate a ssh-ed25519 ssh key, I think it might work as expected15:31
pabelangerhttps://github.com/paramiko/paramiko/issues/62615:32
pabelangerdoesn't look like we can get all hostkeys with paramiko right now15:32
openstackgerritDavid Shrewsbury proposed openstack-infra/nodepool master: IGNORE testing pbrx  https://review.openstack.org/59255015:33
Shrewsmordred: ^^ is the pbrx depends on15:34
mordredcorvus, Shrews, pabelanger: what do y'all think about announcing pbrx patches in here15:34
mordredat least for the period of time while "publish zuul images" is dependent on pbrx work15:35
Shrewsmordred: i'd definitely like them "somewhere"15:35
rcarrillocruzpabelanger: 'if you have an ssh rsa key', i guess you mean the zuul executor, that's what is doing the gather facts that fails in the job15:36
pabelangerrcarrillocruz: oh, yes right15:36
rcarrillocruzand yes, sf zuul executor has an rsa key iiuc15:37
mordredShrews, pabelanger, corvus: remote:   https://review.openstack.org/592554 Add pbrx patch announcements to #zuul15:37
pabelangerrcarrillocruz: so, let me see if we can make nodescan return multiple hostkeys15:37
corvuspabelanger: keys used for authentication and encryption are different.  the user can have an rsa key and connect to a host with an ed key15:39
corvuspabelanger: the first questions to answer are: it looks like nodepool found an ed key -- did it?  dit it pass it to zuul and did zuul write it to known_hosts correctly?  if so, why did ansible fail?15:43
Shrewsso, i thought paramiko ONLY returned rsa, which is what we pass to zuul. but ansible seems to be expecting ed25519... so i'm confused15:45
Shrewsbut i'm also split-brain right now on two things15:45
corvusShrews: it may be that paramiko returns the first key, which just happened to be rsa when we were testing it and wrote that comment?  rcarrillocruz did a paramiko test by hand and got an ed key by default.  but anyway, yes, that is the first question to answer :)15:47
Shrewsah15:47
Shrewsso maybe a paramiko update "fixed" things15:47
corvusShrews: apparently it only added ed support a year or two ago?  so that's quite possible15:48
rcarrillocruzi really think the issue is on the known_hosts15:48
rcarrillocruzlike15:48
rcarrillocruzthis is what i tried15:48
pabelangercorvus: yah, we only get back ssh-ed25519 from server, and pass that into zk15:48
rcarrillocruzi ran a ssh-keyscan against my appliance node15:48
pabelangerworking to see if known_host file is written properly15:48
rcarrillocruzput the ed entry on ssh/known_hosts15:48
rcarrillocruzansible -m setup works, it doesn't fail or asks for yay/nay to accept host15:48
rcarrillocruzwellll15:50
rcarrillocruzwait15:50
rcarrillocruzthe connection-type of the node is network_cli, i.e. it should be blacklisted for gathering facts purposes15:51
rcarrillocruzgit blame 6eda4397015:52
*** pbrobinson has quit IRC15:52
rcarrillocruzi added that specifically, as network nodes are not OS nodes, therefore no python, therefore ansible -m setup failed15:52
rcarrillocruzbut for some reason here the gathre facts is still being run15:53
rcarrillocruzdo we collect the setup inventory file as part of the job results?15:55
corvusrcarrillocruz: the error you linked wasn't in the setup call15:55
corvusrcarrillocruz: that was a normal pre playbook15:56
pabelanger2018-08-16 14:11:13,751 DEBUG zuul.AnsibleJob: [build: 1ed6d14c6c0e4eaf9d47d4954f201c81] Ansible command: ANSIBLE_CONFIG=/tmp/tmp2yxuinem/1ed6d14c6c0e4eaf9d47d4954f201c81/ansible/setup_playbook/ansible.cfg ansible '*' -v -m setup -i /tmp/tmp2yxuinem/1ed6d14c6c0e4eaf9d47d4954f201c81/ansible/setup-inventory.yaml -a 'gather_subset=!all'15:56
pabelangerthat actually works15:56
rcarrillocruzcorvus: so it got passed the setup call ?15:56
pabelangerso, I think the ssh key is working as expected15:56
pabelangerrcarrillocruz: yes, I think so15:56
*** pbrobinson has joined #zuul15:57
pabelangeris it possible this is a gather_facts issue?15:58
pabelangerin the pre.yaml file, we don't have any gather_facts filters15:58
rcarrillocruzyah16:00
rcarrillocruzso, we don't have the pre pre job setup issue16:00
rcarrillocruzsince we bypass it with network_cli blacklisting16:00
rcarrillocruzbut within playbooks context we do a gather facts later on16:00
pabelangeryah, that seems right. And the failure we are getting from ansible, is wrong error message16:03
*** gtema has quit IRC16:06
pabelangercorvus: mordred: Shrews: to recap, nodepool / zuul is doing the right thing with ssh keys. But the ansible error makes it look like we had bad SSH keys16:07
pabelangergoing to refactor some base jobs later today for the network device to and filter gathering of facts16:08
*** jpena is now known as jpena|off16:19
mordredpabelanger, rcarrillocruz: wow - what a fun issue!16:24
*** panda|lunch is now known as panda|off16:28
*** myoung is now known as myoung|lunch16:28
*** rlandy is now known as rlandy|brb16:33
*** pcaruana has quit IRC16:34
*** sshnaidm is now known as sshnaidm|bbl16:35
*** openstackgerrit has quit IRC16:49
*** openstackgerrit has joined #zuul16:58
openstackgerritJames E. Blair proposed openstack-infra/zuul-jobs master: DNM: test swift logs  https://review.openstack.org/59258116:58
openstackgerritJames E. Blair proposed openstack-infra/zuul-jobs master: DNM: test swift logs  https://review.openstack.org/59258117:01
openstackgerritMerged openstack/pbrx master: Clear up "tag" vs "image"  https://review.openstack.org/59253617:08
*** rlandy|brb is now known as rlandy17:11
*** electrofelix has quit IRC17:15
*** myoung|lunch is now known as myoung17:44
pabelangerI find it difficult a PR in github, cannot depend on another PR. It ends up pullling in the commits from the parent for the child17:51
mordredpabelanger: yup, this is correct17:58
mordredpabelanger: you can use depends-on: in zuul though17:58
pabelangeryah17:59
*** mmedvede has quit IRC18:13
*** mmedvede has joined #zuul18:17
*** elyezer has quit IRC18:29
*** rlandy has quit IRC18:32
*** myoung is now known as myoung|brb18:34
*** rlandy_ has joined #zuul18:35
*** elyezer has joined #zuul18:36
SpamapScorvus: hey, regarding ssl and gearman... does the ssl in geard do any authorization with the client cert? Like, how can make sure only my executors can talk to gearman, and not some rando things that just happen to have client certs signed by my CA?18:40
SpamapSreading the code, it's not clear18:41
corvusSpamapS: er, i believe anything signed by the ca is accepted... i'm not 100% on that18:41
corvusSpamapS: yeah, that's my understanding from reading https://docs.python.org/2/library/ssl.html#ca-certificates18:42
SpamapSSame18:42
SpamapSso I guess the simple answer is I should just make a bastion-CA that is just for gearman.18:43
corvusSpamapS: now there *is* some code in there about ACLs, but that's some geard-private stuff that i never got around to using for real, and therefore, never proposed as a gear protocol extension.18:43
corvusSpamapS: i think that's probably the thing to do.18:43
SpamapSyeah, pretty straight forward and I can automate it.18:43
*** sshnaidm|bbl is now known as sshnaidm18:43
SpamapSfinally got my executor to scp its logs18:44
SpamapSnow need to scale out executors18:44
corvusSpamapS: (however, *if* you wanted to nerd-snipe yourself into extending the gear protocol with acls, there's a bunch of code already written :)18:44
SpamapSnneewwwp18:44
corvusgood call18:44
SpamapSbring on the zookeeper18:44
corvusya, that's likely the long term thing anyway18:45
openstackgerritDavid Shrewsbury proposed openstack/pbrx master: Implement basic image push  https://review.openstack.org/59264818:46
Shrewsmordred: ^^^ seems to work: https://hub.docker.com/r/shrews/18:47
mordredShrews: WOAH18:47
Shrewswe might want to add the ability to specify a non-dockerhub repo in the future18:48
Shrewsmordred: the issue we have with jobs now is the whole job artifact thing. for now, if we want to push, we have to build first18:48
Shrewsin the same job18:48
Shrewsoh, i need to push the -base image too18:49
Shrewsdoh18:49
mordredShrews: yes- I think that's just gonna be where we're at for a bit - but is probably ok for now18:50
Shrewspabelanger: fyi ^^18:51
*** harlowja has joined #zuul18:51
pabelangerwoah, Yay!18:52
openstackgerritDavid Shrewsbury proposed openstack/pbrx master: Implement basic image push  https://review.openstack.org/59264818:59
*** myoung|brb is now known as myoung19:19
pabelangerI just stumbled across: https://mergify.io/19:22
clarkbpabelanger: thats sileht and jd's thing born out of gnocchi's move to github and not having zuul anymore19:22
pabelangeryah19:23
*** rlandy_ is now known as rlandy19:40
*** pcaruana has joined #zuul20:13
*** ssbarnea has quit IRC20:45
*** pcaruana has quit IRC20:53
*** samccann has quit IRC20:56
openstackgerritJeremy Stanley proposed openstack-infra/zuul-website master: Add a promotional message banner and events list  https://review.openstack.org/59187021:05
mordredShrews: that patch is entirely too small and simple21:08
mordredShrews: when you get a sec, could you add a release note?21:09
Shrewsmordred: is it wrong? did i miss something?21:15
Shrewsoh, i missed the snark21:16
Shrews:)21:16
openstackgerritDavid Shrewsbury proposed openstack/pbrx master: Implement basic image push  https://review.openstack.org/59264821:19
mordredpabelanger, corvus, SpamapS: ^^ if you have any interest in reviewing that21:21
Shrewswe need to add use of a prefix to the zuul job21:32
Shrewsoh, nm. it already has it21:33
Shrewsour pbrx-build-zuul-containers just isn't using it21:34
openstackgerritJeremy Stanley proposed openstack-infra/zuul-website master: Add a promotional message banner and events list  https://review.openstack.org/59187021:55
*** harlowja has quit IRC22:14
openstackgerritJeremy Stanley proposed openstack-infra/zuul-website master: Add a promotional message banner and events list  https://review.openstack.org/59187022:24
openstackgerritJeremy Stanley proposed openstack-infra/zuul-website master: Add a promotional message banner and events list  https://review.openstack.org/59187022:26
*** sshnaidm is now known as sshnaidm|off22:45
openstackgerritMerged openstack/pbrx master: Implement basic image push  https://review.openstack.org/59264823:17
ianwcan we/do we write ansible modules/libraries in zuul-jobs as python3 only?23:30
*** elyezer has quit IRC23:34
*** elyezer has joined #zuul23:36
mordredianw: not yet - we're still running things in python2 on the remote nodes23:38
mordredianw: and for nodes like centos7 that still only have python2 by default we should be careful to make sure stuff will still work on python223:38
ianwyeah, what i thought.  we should probably run unit tests...23:43
mordredyah23:47
*** rlandy is now known as rlandy|bbl23:53

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!