Tuesday, 2019-01-22

*** rlandy has quit IRC00:47
openstackgerritPaul Belanger proposed openstack-infra/zuul master: Add data_files entry for zuul/web/static  https://review.openstack.org/63149401:25
openstackgerritPaul Belanger proposed openstack-infra/zuul master: Add data_files entry for zuul/web/static  https://review.openstack.org/63149401:47
pabelangermordred: I can't see to figure out why pbrx jobs are failing on ^, do you mind looking when you have free time01:48
SpamapSfungi: I tend to see equivs as "I give up packaging stuff". ;)01:50
SpamapSbut this case seems like the corner it was ment to handle01:50
fungiwell, yes. i mean it's a handy workaround of course01:57
*** irclogbot_3 has quit IRC03:16
*** irclogbot_3 has joined #zuul03:24
*** bhavikdbavishi has joined #zuul04:56
*** saneax has joined #zuul05:34
*** badboy has joined #zuul06:14
*** spsurya has joined #zuul06:21
*** quiquell|off is now known as quiquell07:12
quiquellAJaeger: o/07:19
quiquellhttps://review.openstack.org/#/c/62329407:20
*** saneax has quit IRC07:20
quiquellIs this all good now?07:20
quiquellmordred: ∆07:21
*** saneax has joined #zuul07:27
*** saneax has quit IRC07:30
*** pcaruana has joined #zuul07:41
*** hashar has joined #zuul08:21
*** avass has joined #zuul08:27
*** electrofelix has joined #zuul08:56
*** jpena|off is now known as jpena08:56
*** saneax has joined #zuul09:20
*** saneax has quit IRC09:31
*** saneax has joined #zuul09:31
*** sanjayu_ has joined #zuul09:34
*** saneax has quit IRC09:37
*** bhavikdbavishi has quit IRC09:51
*** sanjayu_ has quit IRC10:05
*** sanjayu_ has joined #zuul10:05
*** hashar has quit IRC10:52
tobias-urdincould somebody please review https://review.openstack.org/#/c/632163/ :)10:53
tobias-urdinso we can continue testing to get it working10:53
*** bhavikdbavishi has joined #zuul10:56
tobiashtobias-urdin: lgtm, is this role already in use somewhere?11:32
*** quiquell is now known as quiquell|lunch11:50
*** dkehn has quit IRC11:51
avasswhat does the zuul-daemon do?12:02
avassI mean the zuul_console daemon on the hosts12:03
*** bhavikdbavishi has quit IRC12:07
*** hjensas has quit IRC12:21
*** bhavikdbavishi has joined #zuul12:36
*** jpena is now known as jpena|lunch12:43
openstackgerritSimon Westphahl proposed openstack-infra/zuul master: List changed files for all commits between refs  https://review.openstack.org/63179712:45
*** quiquell|lunch is now known as quiquell12:54
*** hashar has joined #zuul12:55
tobias-urdintobiash: well yes and no, we are trying to get it working in openstack ci but not working just yet, hopefully after that patch :)13:07
*** bhavikdbavishi has quit IRC13:17
*** bhavikdbavishi has joined #zuul13:19
*** bhavikdbavishi has quit IRC13:28
openstackgerritMatthieu Huin proposed openstack-infra/zuul-jobs master: install-nodejs: add support for RPM-based OSes  https://review.openstack.org/63104913:32
*** rlandy has joined #zuul13:32
*** AJaeger has quit IRC13:33
mordredavass: that's what currently streams the console logs back to the executor so that they can be shown in the web dashboard and finger gateway13:41
mordredavass: there is half-finished work to rework how that is done and remove the need for the zuul_console daemon13:42
*** jpena|lunch is now known as jpena13:47
avassmordred: ah, just what i was looking for. I'm guessing there's no windows version of it, right?13:48
mordredavass: no, unfortunately not. I think the rework to replace zuul_console will work much better on windows13:49
avassmordred: alright13:49
mordredsorry bout that13:49
*** bhavikdbavishi has joined #zuul13:51
*** badboy has quit IRC13:51
*** gtema has joined #zuul13:55
*** AJaeger has joined #zuul14:05
*** gtema has quit IRC14:14
*** gtema has joined #zuul14:14
*** sanjayu_ has quit IRC14:19
*** sanjayu_ has joined #zuul14:20
*** sanjayu_ has quit IRC14:26
quiquellmordred: Do zuul have any limitation on the kind of keys you have to set at sshkey at gerrit connection14:32
quiquellmordred: also can you use anonymous user there ?14:32
*** saneax has joined #zuul14:46
*** avass has quit IRC15:02
*** hashar has quit IRC15:22
*** avass has joined #zuul15:24
*** quiquell is now known as quiquell|off15:25
openstackgerritMonty Taylor proposed openstack-infra/nodepool master: Build images with Dockerfile instead of pbrx  https://review.openstack.org/63218715:38
*** gtema has quit IRC15:42
pabelangermordred: tobiash: do you have any thoughts on what is going on with https://review.openstack.org/631494/ and pbrx jobs? I am modifying the web/static folder location15:48
*** openstackgerrit has quit IRC15:51
mordredpabelanger: no - I haven't dug in to it too much. I'm not 100% sure that's going to work though - I thought with wheel-based installs python stopped supporting installing things into arbitrary locations15:59
mordredpabelanger: however, it's also possible there is an issue because zuul/web/static/* is generated15:59
mordredpabelanger: I'm not 100% sure though - the logs are a bit weird - I'll need to dig in a bit more, but I've got a phone call I need to jump on rightnow16:00
pabelangermordred: okay thanks, I'll keep digging too16:01
dmsimardvars in zuul jobs declaration are inventory vars, right ? not extra-vars ?16:09
*** openstackgerrit has joined #zuul16:10
openstackgerritGabriele Cerami proposed openstack-infra/zuul master: Scheduler: make autohold hold_list configurable  https://review.openstack.org/63249816:10
openstackgerritSagi Shnaidman proposed openstack-infra/nodepool master: Support userdata for instances in openstack  https://review.openstack.org/63064916:24
*** ianychoi has joined #zuul16:26
Shrewsmordred: where is the change to publish opendevorg/python-builder?16:33
Shrewserr, promote rather16:34
Shrewsah, found it16:35
Shrewsbut it haz sads16:35
*** avass has quit IRC16:46
*** hashar has joined #zuul16:59
*** panda is now known as panda|off17:02
*** pcaruana has quit IRC17:02
openstackgerritJames E. Blair proposed openstack-infra/zuul-jobs master: Add docker image build jobs  https://review.openstack.org/63217217:02
openstackgerritSagi Shnaidman proposed openstack-infra/nodepool master: Support userdata for instances in openstack  https://review.openstack.org/63064917:15
tobiashdmsimard: yes, should be inventory vars17:36
openstackgerritTobias Henkel proposed openstack-infra/zuul master: Add spec for multi ansible version support  https://review.openstack.org/62392717:43
*** bhavikdbavishi has quit IRC17:55
*** pcaruana has joined #zuul18:01
*** ssbarnea|rover has joined #zuul18:02
*** ssbarnea|bkp2 has quit IRC18:04
*** hashar is now known as hasharDinner18:05
*** jpena is now known as jpena|off18:22
*** pcaruana has quit IRC18:23
SpamapSis there any progress on a buildset page?18:25
SpamapSThe default role that makes zuul log paths is chopping all but the last 2 chars off of PR#'s, so my GitHub status URLs are all wrong once a repo gets past PR#99.18:26
SpamapSand I can't do any transforms in the pipeline config.. so... status URL is officially busted. :-/18:26
SpamapSOh hm18:27
SpamapSI guess I can do /builds?change=xxx18:27
*** saneax has quit IRC18:38
pabelangerdmsimard: depends, https://zuul-ci.org/docs/zuul/user/jobs.html#variables18:44
*** hasharDinner has quit IRC18:56
*** jesusaur has quit IRC18:59
*** hasharDinner has joined #zuul18:59
openstackgerritMonty Taylor proposed openstack-infra/zuul-jobs master: Pull target from item in build image  https://review.openstack.org/63252819:00
mordredShrews: ^^ that19:00
Shrewslol19:01
mordredtobiash: ^^19:01
*** ianw_pto is now known as ianw19:02
Shrewsmordred: hrm, no easy way to fix the opendevorg/python-builder upload without a change i guess?19:02
mordredyeah- I was just looking for something to change19:02
tobiashmordred: lgtm19:03
mordredtobiash: thanks! opendevorg/python-builder currently has the contents of opendevorg/python-base - which does not work very well as a builder image19:04
tobiashah, so we need to land that and trigger a rebuild of it19:06
Shrewstobiash: https://review.openstack.org/632529 is the trigger, fwiw19:07
Shrewsthough perhaps it should use depends-on to prevent it from going in before the fix19:07
tobiashlol19:08
pabelangerHmm, so I think swift container names have to be unique in cloud19:09
pabelangerconfirming now19:10
mordredpabelanger: I think they only have to be unique within a project19:11
pabelangermordred: not sure, i get Conflict (HTTP 409) (Request-ID: tx0000000000000000e4df3-005c476a63-3c95143d-default) if I try to create 'logs' container, but my project is empty19:13
mordredpabelanger: yay! I wonder if that's related to radosgw somehow19:13
mordredpabelanger: (I'm assuming this is on vexxhost)19:13
pabelangermordred: yah, think we need help from mnaser here19:13
timburkemordred: that was my first thought, too :-)19:13
pabelangeryup19:13
tobiashpabelanger, mordred: they must be unique on the whole swift service19:14
tobiashit's the same on aws s3 btw19:14
timburkesure sounds like a ceph limitation to me ;-)19:14
pabelangertobiash: yup, confirmed: https://object-storage-ca-ymq-1.vexxhost.net/v1/e0cc062046f0440db462b035c5df0910/vexxhost-poc-logs/2/2/d1a1139de90e4248fc42f1709da95685fc01287f/check/tox-linters/f193fa2/19:14
mordredtimburke: so you're saying that there is a bug in radosgw from a swift POV then?19:14
pabelangerso, i think our upload-logs-swift need to be updated to trap 409 resp, took me a while to figure this one out19:15
mordredtobiash: amazon s3 requires a container name to be unique across all of amazon?19:15
pabelangeras zuul would success but logs in swift be empty19:15
tobiashmordred: at least across the region19:15
mordredpabelanger: yah - seems like an important error to handle19:15
mordredtobiash: wow. that legitimately boggles my mind19:15
timburkemordred: yeah, the 409 description of "The container already exists under a different user’s ownership." from http://docs.ceph.com/docs/master/radosgw/swift/containerops/#http-response is *definitely* a divergence from swift behavior19:16
tobiashyes ;)19:16
Shrewswow, how wonderfully limiting19:16
mordredwell - I'll give swift credit for doing the right thing here when s3 is clearly INSANE19:16
* mordred hands timburke a cookie19:16
timburkemordred: bonus fun: that sort of behavior has been implicated in some security holes, like https://www.safetydetective.com/blog/microsoft-outlook/19:18
mordredtimburke: uh - yeah. I'd imagine it would be - it's a **TERRIBLE** design19:19
mordredtimburke: taht was literally the first attack that came to mind within the first few seconds of learning that container names have to be unique globally19:19
pabelangerbest part, if you try to create 'logs' container in horizon, you actually get kicked out of horizon when you enter container name into web. something, something, security?19:20
timburkeso protip: audit your CNAME records! make sure if any of them point to somewhere on AWS/Azure/wherever, they still actually exist and are under your control!19:21
timburke'cause if you don't do it, someone else may ;-)19:21
mordredtimburke: I'd say that if any of your CNAME records point to anything on AWS/Azure your'e already screwed19:21
mordredtimburke: :)19:21
pabelangerso yay, I now have a functional zuul in vexxhost for 3pci testing, swift was the last step19:24
mordredpabelanger: woot!19:24
pabelangerand if people are intersted, it is even 1 zuul deploying another zuul via post pipeline: https://ansible-network.softwarefactory-project.io/zuul/builds?job_name=windmill-config-deploy19:25
pabelangerzuul all the way down19:25
*** jesusaur has joined #zuul19:25
jktI'm getting a weird error, https://gerrit.cesnet.cz/c/ci/project-config/+/1277#message-ca7c4a1281c54ce48e4119844d6df0a9673f4d6819:30
jktI wonder why it says that it cannot find the "dummy" project19:30
jktit is defined in https://gerrit.cesnet.cz/plugins/gitiles/ci/project-config/+/master/zuul/tenants.yaml#2419:31
pabelangerjkt: have you reloaded zuul scheduler with latest main.yaml?19:32
jktis it actually OK to use multiple tenants like this, with a shared config-projects repo?19:32
tobiashcorvus: what do you expect if there are two pipelines with the same name in different config projects?19:32
jktpabelanger: yes (it's via the script option, and I restarted the zuul-scheduler)19:32
pabelangerjkt: you should be able to look at debug log to see, possible scheduler didn't load the project for some reason. Eg: existing zuul.d folder19:33
tobiashI think I found a project that tried to 'redefine' a pipeline which is already defined in a central config repo19:33
tobiashand zuul doesn't seem to raise a config error19:33
jktpabelanger: is it OK to reference the same project-config repo from multiple tenants like I am doing?19:33
pabelangerjkt: yes, but you won't be able to share things like secrets19:34
pabelangerso you need to be careful19:34
jktmy first tenant, the CzechLight-internal, indeed doesn't list the "dummy" repo19:34
pabelangerjkt: I think tobiash shares config-projects between tenants, currently I don't (plan to test)19:35
jkttobiash: got a sample config I could look at?19:35
tobiashjkt: you can just add it normally to the tenant that should gate on the config repo, the other tenants can just list it by excluding 'project': http://paste.openstack.org/show/743115/19:37
jkttobiash: right, thanks, so this looks like trying to share two project definitions between two tenants is a no-go19:38
tobiashand yes, you can share secrets as the private keys are not dependent of the tenant19:38
tobiashjkt: not necessarily19:39
tobiashjkt: sharing check could be ok, but sharing gates is a no-go19:39
jktI wonder if I actually *need* multi tenants in the first place19:39
tobiashjkt: depends on your role19:39
jktI think that one benefit are separate dashboards *if* I can somehow block access to the top-level dashboard site19:40
tobiashif you're ci service provider for multiple distinct project it can make much sense19:40
jkttobiash: my use case is that we have both public open source SW and some internal-still-proprietary SW within one Gerrit server19:40
jktI would prefer not to share the CI logs etc with the rest of the world19:41
tobiashjkt: you can always put an authenticating proxy in front of zuul and even authenticate path based behind the tenant paths19:41
*** hasharDinner is now known as hashar19:41
tobiashjkt: ok, this use case needs much thoughts. If you can separate auth clearly by putting a proxy in front multi tenant would be an option19:42
tobiashbut you have to also take log storage etc into account19:42
jktack19:42
tobiashso if you don't want to risk disclosure you also can think about two zuul deployments19:43
tobiashthese still can share common projects if needed19:43
openstackgerritMerged openstack-infra/zuul-jobs master: Pull target from item in build image  https://review.openstack.org/63252819:47
corvustobiash: oh, hrm.  i don't think you should be able to redefine a pipeline; i think that should be an error, and the first one should win.19:50
*** pcaruana has joined #zuul19:50
tobiashcorvus: I just prototyped a quick test case and it seems that it doesn't throw an error and the last one wins19:51
corvustobiash: i think we should fix that19:51
tobiash++19:51
openstackgerritMerged openstack-infra/zuul-jobs master: Use become for packages in upload-puppetforge  https://review.openstack.org/63216320:08
*** pcaruana has quit IRC20:11
*** pcaruana has joined #zuul20:24
mordredShrews: the python-builder updated image has been rebuilt and published - so if you docker pull it you should now be able to successfully build the nodepool images20:25
Shrewsmordred: yeah, already doing so. looks good so far20:27
pabelangercorvus: did say you are looking to do a release of zuul this week?20:28
pabelangerI wouldn't mind one to pick up known_hosts / add_host fixes20:29
jkttobiash, pabelanger: thanks, it was indeed due to my misunderstanding and reusing the same config in two tenants20:35
jktwith all the associated funny effects like duplicate job results, etc :)20:35
openstackgerritTobias Henkel proposed openstack-infra/zuul master: Raise an error if pipeline is defined twice  https://review.openstack.org/63255020:35
corvusyeah, sharing configuration is a spectrum -- there's no hard rule about whether you should share none, a little, or a lot between tenants.  it depends on needs.20:39
corvuspabelanger: i think/hope we will have a release this week.20:39
tobiashthere is also a node leak fix that should go into one of the next releases: https://review.openstack.org/613261 :)20:40
corvustobiash: agreed; i will try to review it asap20:41
tobiashthanks :)20:41
jktI wonder why a new job is not picked by Zuul here: https://gerrit.cesnet.cz/c/dummy/+/1286#message-8a7b11541f4dcfe1303705997a98f9bee5d5dcd920:58
jktis that because I already have a noop job listed in my ci/project-config-public?20:59
jktI do not have any base job defined (the docs said that there's an implicit one), and I have not defined any nodeset either21:01
jkt...but defining a node set does not change stuff as far as I can tell21:03
tobiashjkt: the problem is that you don't have a job named base21:08
tobiashjkt: if you don't set a parent, the parent is by default 'base'21:08
tobiashjkt: and if that doesn't exist, it will be ignored21:08
tobiashjkt: but you can set 'parent: null' to make it a job without parent...21:09
jkttobiash: thanks21:09
corvustobiash, mordred, SpamapS, pabelanger: can you take a look at https://storyboard.openstack.org/#!/story/200483721:10
jkttobiash: seems that https://softwarefactory-project.io/docs/zuul/glossary.html#term-base-job should be updated, though21:10
tobiashcorvus: reading21:10
corvusjkt: there's some narrative documentation about base jobs in the quick start -- https://zuul-ci.org/docs/zuul/admin/quick-start.html#configure-zuul-pipelines  then scroll down to "Every real job"  (sorry, i guess we need better anchors in there)21:12
corvusjkt: https://zuul-ci.org/docs/zuul/admin/quick-start.html#configure-a-base-job  is the real meat21:12
jktcorvus: I can do that, it's just that the docs speak about that "implicit base job" which is said to exist for each tenant21:13
corvusjkt: you may also be interested in the recommended base jobs https://git.zuul-ci.org/cgit/zuul-base-jobs/tree/21:13
jktif it exist, how come that I have to define it?21:13
corvusjkt: ah, i understand the ambiguity you are describing and agree we can/should update the docs to clarify it :)21:13
openstackgerritMerged openstack-infra/nodepool master: Add dogpile.cache master to the -src tests  https://review.openstack.org/62545721:15
jktcorvus: I'll be happy to review it once it's done :), at this time I don't think I'm qualified to propose a better wording :)21:15
corvusthe thing we need to convey: the site operator is expected to have defined at least one base job for the use of tenants and, if there is more than one, select one as the default for each tenant; once that's done, end-users can rely on that default being the implicit parent of any jobs which do not explicitly set a parent attribute.21:17
jktjust fyi, there's also no warning when there's no base job21:18
corvusthat would be a very reasonable config error to report in the logs and web dashboard :)21:19
*** pcaruana has quit IRC21:19
SpamapScorvus: seems legit. There's a typo "emoved the allowed-projects acces restriction"21:25
openstackgerritTobias Henkel proposed openstack-infra/zuul master: Raise an error if pipeline is defined twice  https://review.openstack.org/63255021:37
openstackgerritMerged openstack-infra/zuul master: Fix node leak when skipping child jobs  https://review.openstack.org/61326121:44
corvusokay, i'll push that change up now and make the story public21:58
openstackgerritJames E. Blair proposed openstack-infra/zuul master: Set allowed-projects on untrusted jobs with secrets  https://review.openstack.org/63256621:59
openstackgerritJames E. Blair proposed openstack-infra/zuul master: Set allowed-projects on untrusted jobs with secrets  https://review.openstack.org/63256622:01
mordredcorvus: do you know if it's possible to consume 2 yaml anchors in the same place?22:07
corvusmordred: i don't know22:07
SpamapScorvus: aand I just remembered I can fix typos myself. ;)22:08
mordredcorvus: I find that I want to do "vars: *zuul_image_vars + *nodepool_image_vars" - and I'm pretty sure that's not a thing22:08
SpamapSmordred: that's not a thing22:08
corvuswhen the allowed-projects change lands, i'll restart openstack with it, and if it checks out, i'll tag that as 3.5.022:08
SpamapSwanted that as well22:08
SpamapSand came up with spruce22:08
mordredcorvus: ++22:08
SpamapSas in, "oh you can't do that in YAML, you need something like spruce"22:09
corvusmordred: maybe i can get you on board the multiple inheritance train :)22:09
mordredcorvus: I'm on the multiple inheritance train! I just don't understand it yet :)22:09
SpamapSmordred: you might be able to bend this one: https://yaml.org/type/merge.html22:09
corvusparent: [zuul-image-vars-job, nodepool-image-vars-job]22:10
mordredcooooh22:10
mordredcorvus: (I realized that we need to build the zuul and the nodepool images using the dockerfile in the quick-start job)22:10
corvusmordred: yeah, i think i'll propose the change to do ^ that so that it's understandable :)22:10
SpamapSbut merge YAML is like.. zomg wtf is this whenever I encounter it22:10
mordredcorvus: and the best way to do that ... is with the build-docker-image role using the vars already defined22:10
jktwhat can I use to SCP logs to some log server? The docs say that https://zuul-ci.org/docs/zuul-jobs/roles.html#role-upload-logs should do that, but doing something like zuul_logserver_root: "user@server:/path" results in an error22:11
corvusjkt, mordred: i think the upload-logs has an undocumented expectation that add_host will be used to add the remote server?22:12
mordredcorvus: I think you might be right22:12
jktcorvus: I'm still embarasingly new to ansible; do you have an example?22:13
corvusjkt: so i think you need this role as well https://zuul-ci.org/docs/zuul-jobs/roles.html#role-add-fileserver22:13
corvusjkt: yes, here's openstack's use of that.  lines 1-11  http://git.openstack.org/cgit/openstack-infra/project-config/tree/playbooks/base/post-logs.yaml22:14
corvusjkt: you can ignore the last task (lines 13+)22:14
corvusjkt: you may also want to omit line 5 for simplicity22:14
mordredSpamapS: ooh - I _could_ use that ... except I then need a list merge of a subkey :(22:15
jktcorvus: thanks, that makes sesne22:16
openstackgerritJames E. Blair proposed openstack-infra/zuul-jobs master: Document upload-logs reliance on add-fileserver  https://review.openstack.org/63257222:18
corvusjkt, mordred: ^22:18
corvuser, hang on :)22:19
openstackgerritJames E. Blair proposed openstack-infra/zuul-jobs master: Document upload-logs reliance on add-fileserver  https://review.openstack.org/63257222:19
corvusmordred: that removes the {{site_logs}} stuff from the example.  though i believe the intent was eventually to figure out how to get that to work with zuul-base-jobs.22:20
openstackgerritMonty Taylor proposed openstack-infra/zuul master: Build zuul containers with dockerfile not pbrx  https://review.openstack.org/63184022:20
openstackgerritMonty Taylor proposed openstack-infra/zuul master: Remove zuul-migrate and zuul-bwrap images  https://review.openstack.org/63216722:20
openstackgerritMonty Taylor proposed openstack-infra/zuul master: Switch to zuul-jobs docker jobs  https://review.openstack.org/63217322:20
openstackgerritMonty Taylor proposed openstack-infra/zuul master: Replace build-essential with gcc/g++  https://review.openstack.org/63257622:20
openstackgerritMonty Taylor proposed openstack-infra/zuul master: Update quick-start job to build images with dockerfile  https://review.openstack.org/63257722:20
corvusi'm not sure whether we should put that in the example now, or omit it to keep things simple.22:20
mordredwell that was almost certainly not what I wanted to do22:20
mordredcorvus: reading22:20
jktcorvus: I'll post my CR once I get this working (it's also about SSH keys and therefore I should first understand zuul's secrets, etc)22:22
mordredcorvus: hrm. I'm also not sure ...22:24
mordredcorvus: without the site_logs secret (or a secret with those things), the add_host command in the example is incomplete22:25
mordredcorvus: since fileserver takes a dict22:25
mordredBUT - that's starting to get long ... but maybe that's a good place to put a more comprehensive chunk?22:25
corvusmordred: oh, then we should definitely -1 that and go with the full site_logs secret.  :)22:27
corvusmordred: this is obvious now that you mention it.  thanks, and sorry for the derp.22:27
corvusmordred: i'll rewrite that including site_logs22:27
mordredcorvus: woot22:28
SpamapSmordred: I'd suggest wrapping your playbook in a zuul-friendly playbook and just passing the two lists in as separate vars.22:30
SpamapSI have a number of playbooks that work without zuul, and then a foo-zuul.yaml that just does an import_playbook: with the vars rearranged.22:30
SpamapSIt's not a bad pattern really, keeps the zuul stuff out of the ansible.22:31
mordredSpamapS: yeah - I think I'm going to have to wind up doing something similarish22:34
*** hashar has quit IRC22:35
corvusyep, we could have an ansible playbook that "builds the zuul images" and then several jobs which invoke that, but it's also runnable locally22:38
* mordred wishes he could do "docker build . --all-targets --tag-prefix=opendevorg" and have docker keep all of the intermediate images and tag them with {tag_prefix}/{intermediate-image-name}22:40
mordredinstead of needing call docker build 8 times - but what can you do22:41
openstackgerritJames E. Blair proposed openstack-infra/zuul-jobs master: Document upload-logs reliance on add-fileserver  https://review.openstack.org/63257222:41
corvusjkt, mordred: with more docs ^22:41
jktcorvus: that looks good, thanks, I'll add my vote tomorrow22:44
openstackgerritMonty Taylor proposed openstack-infra/zuul master: Update quick-start job to build images with dockerfile  https://review.openstack.org/63257722:55
mordredcorvus: ^^ that is a much smaller version22:57
*** ParsectiX has joined #zuul23:06
ParsectiXHi guys,23:11
ParsectiXI would like to introduce Zuul to my company. Although I don’t know from where to start. I have followed the quick start guide and played with the system. Documentation it’s really great but I’m not understanding all the moving parts yet.23:11
ParsectiXFrom where can I start ? Can you provide some guidance?23:11
dmsimardParsectiX: ask away :D23:12
dmsimardthere's plenty of zuul operators around23:12
ParsectiXCan I run/develop those jobs on my local machine?23:22
pabelangercorvus: just reading https://storyboard.openstack.org/#!/story/2004837 now, thanks23:24
corvusParsectiX: one easy way would be to continue using the quick-start -- it's set up to run jobs on your local machine (in a container)23:25
pabelangerinteresting issue, we aren't using 'restricted check' today, but have considered.23:26
pabelangernice find23:26
corvuspabelanger: yeah, it's one of the original zuulv3 use cases, so if it doesn't work, it's a bug :|23:27
pabelangeryah23:27
ParsectiXCan I use Zuul without gerrit?23:29
pabelangerParsectiX: yes, github is the other driver it supports23:31
ParsectiXNice23:31
corvusParsectiX: yes, you can use it with github.  we hope to have other drivers in the future as folks volunteer to write them.23:31
mordred++23:31
corvus(you can also load configuration from plain git repos, but you can't use those for reviewing/gating changes)23:32
openstackgerritMerged openstack-infra/zuul master: Set allowed-projects on untrusted jobs with secrets  https://review.openstack.org/63256623:36
openstackgerritJames E. Blair proposed openstack-infra/zuul master: Fix secondary exception in fingergw  https://review.openstack.org/63258223:37
corvuspabelanger: ^23:37
corvuspabelanger: http://logs.openstack.org/66/632566/2/gate/tox-py36/c927e1e/job-output.txt.gz#_2019-01-22_23_29_15_81773923:37
pabelangereep23:38
pabelanger+223:39
ParsectiXCan I use the same Ansible role to build a project locally and on the CI server?23:42
corvusParsectiX: usually, yes.  that's the idea behind zuul.  there are some things that zuul doesn't allow untrusted projects to do (because they could compromise the zuul system itself).  those usually only show up in fairly advanced playbooks.  if you run into that, you can always have zuul run the 'ansible-playbook' command.23:44
corvusParsectiX: but generally, the best approach is to write ansible playbooks that work on their own, and have zuul run them.  basically, zuul supplies the inventory file.  if you want to run them locally, you supply the inventory file.23:45
ParsectiXcorvus: Thanks. I'm wondering  how can I have the same output when running locally and on Zuul. Is there a way to integrate the callbacks and libraries to a local role?23:48
SpamapSYou can run with the zuul plugins loaded, but there's no trivial way to do that... you have to set al the ansible variables just right to make it work.23:50
SpamapSI find myself wanting command output streaming all the time when running ansible locally.23:51
corvusParsectiX: the streaming log output in particular won't work outside of zuul.  we have plans to rework that and make it possible to integrate into upstream ansible, but that hasn't been fully implemented yet.23:51
corvusParsectiX: but things like setting up log streaming and copying logs should be handled in base jobs, so they shouldn't require any zuul-specific tasks be added to the playbooks of normal jobs23:53
ParsectiXcorvus: Yeah make sense. I just wanted to see if I can give to my developers the same user experience on both cases23:55

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!