Friday, 2020-02-07

openstackgerritJames E. Blair proposed zuul/zuul master: Extract allow/disallow filter into util function  https://review.opendev.org/70614400:00
corvusclarkb: ^ did the regex one; i think i'll pass on the sorted nit (since it's just a test and already extant and reviewed)00:00
clarkbcorvus: sounds good00:01
clarkbcorvus: tobiash I left an idea on how to handle the addition of a master branch on https://review.opendev.org/#/c/705663/1 I think it sort of forces the change to be done a different way though :/00:01
corvusyeah, that might be better.00:03
openstackgerritJames E. Blair proposed zuul/zuul-jobs master: WIP: add an ensure-tox test job  https://review.opendev.org/70637100:04
clarkbcorvus: you may want to check the status change in https://review.opendev.org/#/c/632727/17/zuul/executor/client.py is good. THe change lgtm otherwise so I'll +200:07
clarkbmostly worried that that might break an assumption somewhere that I'm not aware of00:08
*** mattw4 has quit IRC00:08
corvusclarkb: should be okay; there's more discussion in the child change00:15
clarkbya I'm looking at the child change now. I think it may be ready?00:15
clarkbseems to haev addressed your concern by adding a final field to the db then filtering for it?00:16
SpamapScorvus: I'll peek00:17
clarkbon https://review.opendev.org/#/c/704060/ I'm half tempted to abandon that change. The sort order has been string for a long time and we even ensure we do 099 so that it sorts before 10000:27
clarkbI'd be curious to hear if anyone disagrees and I can pick that back up again and write ints to zk and read them back that way too00:27
openstackgerritMerged zuul/zuul master: Add disallowed-labels tenant option  https://review.opendev.org/70585600:53
*** wxy-xiyuan has joined #zuul01:09
*** zxiiro has quit IRC01:18
*** michael-beaver has quit IRC01:28
tristanCclarkb: encoding node id as string does seems odd, wouldn't it be much more efficient overall to use natural instead?01:51
clarkbtristanC: it is part of the node path which I think is a string02:16
clarkbso we'd need to convert anyway02:16
*** rfolco has quit IRC02:22
*** Goneri has quit IRC02:26
*** rfolco has joined #zuul02:36
*** jamesmcarthur has joined #zuul02:44
*** bhavikdbavishi has joined #zuul02:46
*** bhavikdbavishi1 has joined #zuul02:48
*** swest has quit IRC02:50
*** bhavikdbavishi has quit IRC02:50
*** bhavikdbavishi1 is now known as bhavikdbavishi02:50
*** rfolco has quit IRC03:02
*** swest has joined #zuul03:05
*** rlandy has quit IRC03:16
*** jamesmcarthur has quit IRC03:31
*** jamesmcarthur has joined #zuul03:32
*** sgw has quit IRC03:55
*** jamesmcarthur has quit IRC03:59
*** jamesmcarthur has joined #zuul04:00
*** jamesmcarthur has quit IRC04:04
*** raukadah is now known as chkumar|rover04:38
*** jamesmcarthur has joined #zuul05:01
*** jamesmcarthur has quit IRC05:06
*** swest has quit IRC05:23
*** evrardjp has quit IRC05:34
*** evrardjp has joined #zuul05:34
*** bolg has joined #zuul06:01
*** swest has joined #zuul06:11
tobiashclarkb: I'd agree as parsing it into int just adds more complexity for a probably mostly theoretical benefit06:22
*** sgw has joined #zuul06:23
*** jamesmcarthur has joined #zuul06:52
*** jamesmcarthur has quit IRC06:54
*** tosky has joined #zuul08:48
*** jpena|off is now known as jpena08:52
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Make revoke-sudo more general.  https://review.opendev.org/70626208:56
*** mhu has joined #zuul09:07
*** carli has joined #zuul09:23
ttxcorvus, fungi, mordred: news from the release-approval pipeline experiment -- it seems to work now. It's a bit noisy so I posted https://review.opendev.org/706453 .09:44
ttxThe only thing that seems to not work as intended is the custom Label. It does not appear to display yet (see test on https://review.opendev.org/#/c/705991/) -- not sure if something else needs to be done to enable it (it was added to the ACL alright)09:45
*** avass has joined #zuul10:01
*** wxy-xiyuan has quit IRC10:28
*** bhavikdbavishi has quit IRC10:33
openstackgerritJan Kubovy proposed zuul/zuul master: WIP: Store unparsed branch config in Zookeeper  https://review.opendev.org/70571610:40
*** bolg has quit IRC11:14
*** bolg has joined #zuul11:14
mhuhello, can I get some eyes on https://review.opendev.org/#/c/705193/ (support %TENANT% magic word in authz rules definitions)11:51
mhuand also https://review.opendev.org/#/c/702275/ and https://review.opendev.org/#/c/701972/ (reintroducing capabilities in the info REST endpoint, so that the web gui can be configured properly)11:53
*** bolg has quit IRC11:57
*** rfolco has joined #zuul12:16
Shrewsclarkb: enjoy my self-imposed confusion on 704060   :)12:19
*** mhu has quit IRC12:23
*** bhavikdbavishi has joined #zuul12:27
mordredttx: I see PTL-Approved here: https://review.opendev.org/#/admin/projects/openstack/releases,access12:28
mordredso the label exists as far as gerrit is concerned12:28
*** jpena is now known as jpena|lunch12:29
mordredttx: I'm also confused as to why the vote isn't there12:30
*** bhavikdbavishi1 has joined #zuul12:36
*** bhavikdbavishi has quit IRC12:39
*** bhavikdbavishi1 is now known as bhavikdbavishi12:39
*** rlandy has joined #zuul13:05
*** mhu has joined #zuul13:16
openstackgerritMerged zuul/zuul-jobs master: Add event id to emit-job-header  https://review.opendev.org/70622513:17
*** jamesmcarthur has joined #zuul13:31
*** jpena|lunch is now known as jpena13:37
tristanCzuul-maint : install-docker role user, could you please review https://review.opendev.org/70275313:41
*** gmann has joined #zuul13:43
*** jamesmcarthur has quit IRC13:44
*** jamesmcarthur has joined #zuul13:45
tristanCalso it seems like ansible/ansible no longer accept new modules, so perhaps we should start looking into collections support in zuul?13:46
tristanCiiuc, we could create a zuul-lib role with modules such as jsonpatch along an empty tasks list, then if we make it a dependencies of all the zuul-jobs roles, then we could benefit from out of tree modules...13:48
fungitristanC: did you mean "a zuul-lib collection"?13:49
fungioh, i see what you meant now, sorry13:49
*** jamesmcarthur has quit IRC13:50
*** jamesmcarthur has joined #zuul13:52
*** plaurin has joined #zuul13:54
mordredtristanC: yes - I think there's several opportunities to leverage collections in zuul. last we chatted about it in person the thinking was to let the dust settle just a bit, since our ansible friends are still figuring out some of the details13:56
mordredbut I agree, I think there's some real potential value in the construct for us13:56
tristanCfungi: iiuc, a role without tasks, when used as a requirement can act as a collection in existing ansible version13:58
plaurinmorning irc people :)13:58
tristanCfor example, we could get that much needed jsonpatch module, and used it in multiple zuul-jobs roles13:59
fungitristanC: yep, makes sense14:01
fungiplaurin: good <whatever time of day it is for you>!14:02
openstackgerritTobias Henkel proposed zuul/zuul master: Offload setRefs to multiple processes  https://review.opendev.org/70651814:09
mordredtobiash: ^^ wow, you have all the fun problems!14:29
tobiashyes fun all the time ;)14:29
openstackgerritTobias Henkel proposed zuul/zuul master: WIP: Fix broken setRefs whith missing objects  https://review.opendev.org/62166714:30
*** shanemcd has quit IRC14:39
*** shanemcd has joined #zuul14:39
*** Goneri has joined #zuul14:57
*** zxiiro has joined #zuul15:00
openstackgerritJames E. Blair proposed zuul/zuul master: Don't run jobs if only their file matchers are updated  https://review.opendev.org/70639915:16
corvustobiash: is simon around?  i think https://77ae1e51b3f4a2799761-d0e460decd36ac4c0ab8bec57b27125e.ssl.cf1.rackcdn.com/706144/3/check/tox-py37/b538961/testr_results.html  hit a race in a new test he wrote15:20
corvus(or maybe his test shows a zuul bug)15:21
tobiashswest: ^15:21
tobiashhe might already be in weekend15:23
corvusswest: ohai :)15:23
corvusno prob, i'm looking into it15:23
tristanCplaurin: could you put a +1 on https://review.opendev.org/682044 ( fetch-output-openshift ) if that works for you?15:23
corvusi just didn't want to deprive swest of any fun15:23
tristanCzuul-maint : could you please review this zuul-jobs addition, we need this to improve zuul-jobs support running on k8s15:24
corvustristanC: where did we end up on the name for that?  it works against k8s too, right?  (it just happens to use the oc client to do so)15:27
mordredIf it does I'd prefer to name it k8s (the more generic) - leaving openshift naming to only be for things that are explicitly openshift and not k8s15:30
tristanCcorvus: in case someone wants to propose an implementation using kubectl15:30
corvusmordred: that would be my inclination.  but if we think there's a reason they might diverge, we could go ahead and do this but maybe also land a k8s role that just does an include_role for this one...15:31
tristanCcorvus: and because it's consistent with the prepare-workspace-openshift15:31
corvusi agree consistency for both is good.  so whatever we decide here, let's do for that as well.15:32
mordredI'm fine with the include_role thing - but I do want to say I don't think "impl using kubectl" should be a motivating factor (since oc works against k8s and is really just a better kubectl anyway)15:33
corvusyeah.  i guess it comes down to how distasteful k8s people think it is to have to install 'oc'.  of course, we can install oc on our zuul-executor image for them anyway (which is probably what they're running because they are k8s people) and they'll never know.15:35
mordredyeah15:35
mordredfor the image build jobs, where podman is better at building images than docker is - I'd have no problem just making the jobs use podman and not telling people ... *EXCEPT* in that case testing that an image is built properly with the docker command might be important to the end user. In this case, this is a zuul deployment impl detail and should not have a meaningful intersection with end users15:37
mordred(that's mostly my brain stream of why I think it's ok for us to just say "zuul uses oc to talk to k8s")15:37
corvus++15:37
*** igordc has joined #zuul15:37
mordredBUT - I don't feel strongly about it and would also happily support a fetch-output-k8s that include_role this15:38
*** jamesmcarthur has quit IRC15:38
*** jamesmcarthur has joined #zuul15:38
tristanCmordred: corvus: replied to your comment15:38
corvusi think we at least need fetch-output-kubernetes, because we've already seen confusion where people think we only support os.  whether we should have both or just -kubernetes and assume that openshift people know that -k8s means openshift too is also an interesting question, one which i'm less sure of the answer of.15:38
tristanCmordred: i had issue pushing podman built image to dockerhub, it seems like docker was silently discarding oci format. the solution was to use quay.io instead15:39
corvusthat is indeed the solution to multiple problems :)15:39
mordred++15:39
corvustristanC, mordred: sounds like maybe include_role is the consensus answer?15:39
mordredkk. I'm happy with that15:40
corvustristanC: do you mind writing that change, and also can you double check that we install oc in the zuul-executor image?15:40
mordredsame change could probably make a prepare-workspace-k8s at the same time15:41
corvus++15:41
corvusswest, tobiash: that's a really simple test, and i doubt there is a race.  it may be showing a bug, possibly the one pabelanger pointed out the other day with the stuck paused job15:43
tobiashhrm more fun15:43
*** Goneri has quit IRC15:46
tobiashprobably unrelated, but https://review.opendev.org/704328 also fixes a race15:46
tobiashapart from that we don't have a fix on top in our deployment that could cause hanging builds15:47
tobiashand I'm pretty sure that somewhere with paused jobs and unusual use cases and timings there is a bug lurking around15:48
tobiashaw also occasionally see such issues :/15:49
tobiashs/aw/we/15:49
openstackgerritTristan Cacqueray proposed zuul/zuul-jobs master: test-registry-buildset-registry-k8s-crio: increase wait timeout  https://review.opendev.org/70655115:51
mnasertristanC: would it be possible to share how you have 3pci for zuul/zuul-jobs at the moment? just trying to figure out the best way to go about this15:51
tristanCmnaser: here is our opendev tenant configuration: https://softwarefactory-project.io/cgit/config/tree/resources/third-party-ci-opendev.yaml#n12  and you can find the third-party-ci-config|jobs project in https://softwarefactory-project.io/cgit/15:53
mnasertyvm :D15:54
openstackgerritMerged zuul/zuul-jobs master: fetch-output-openshift: initial role  https://review.opendev.org/68204416:01
tristanCcorvus: mordred: thank you for the review, i'll have a look to propose the -k8s equivalent. not sure i'll have time for that today though16:07
*** jamesmcarthur has quit IRC16:10
*** jamesmcarthur has joined #zuul16:12
*** chkumar|rover is now known as raukadah16:14
tristanCcorvus: could you please have a look at https://review.opendev.org/706551 , it seems like the cri-o test could use a longer wait timeout, i commented a build log that took 90sec to start the pod (wait is only 60sec)16:14
tristanCoops, nevermind, that's not right16:15
*** mattw4 has joined #zuul16:16
*** jamesmcarthur has quit IRC16:17
*** jamesmcarthur has joined #zuul16:22
*** jamesmcarthur has quit IRC16:27
SpamapScorvus: FYI, I +2'd 705755.16:29
corvusSpamapS: thx!16:30
corvusi think it's gtg so i +3d it16:30
*** carli has quit IRC16:43
openstackgerritMerged zuul/zuul master: Offload setRefs to multiple processes  https://review.opendev.org/70651816:47
openstackgerritJames E. Blair proposed zuul/zuul master: Fix test race with paused build  https://review.opendev.org/70656616:49
openstackgerritJames E. Blair proposed zuul/zuul master: WIP: see if we can remove .paused from test fake build  https://review.opendev.org/70656716:49
corvustobiash, swest: ^ good news or bad news depending on your perspective -- i think it is a test-only race16:49
mordredcorvus: oh "good"16:50
openstackgerritJames E. Blair proposed zuul/zuul-jobs master: WIP: add an ensure-tox test job  https://review.opendev.org/70637116:52
ttxhrm. Is it normal that Zuul status shows things in the release-approval pipeline that are not coming from openstack/releases ? They disappear fast, but still16:53
ttxis it that things are briefly considered and then Zuul realizes there is no job defined in that pipeline for that repo?16:54
mordredttx: yup16:56
ttxok, hopefully that's not too costly :)16:56
mordredttx: it's just python :)16:58
*** mhu has quit IRC16:58
SpamapSI feel like the status page should display branch more prominently on queue items.17:01
corvusSpamapS: not a bad idea.  also, the subject would be great.  neither of those are currently in the status json, so we'll need to plumb them through.17:04
SpamapSI've had a few instances where folks were confused as things moved through the queue because of the lack of branch.17:04
SpamapSmostly me :)17:05
SpamapSWe use branches kind of backwards from openstack, master is where everything goes, and then we promote releases through staging->prod17:05
corvusthe subject of course will eat up a lot more data... i see that we have "owner" in there now, but i don't think the status page uses it.  i wonder if we could drop that and save some bytes.17:05
SpamapSowner like, the person who owns the change?17:05
corvusyeah. i wonder if someone put owner in there in the past because they wanted to scrape their own changes out of the status.json...17:06
SpamapShah probably17:06
SpamapSis status.json getting fat and eating up lots of BW?17:06
SpamapSI could see that17:06
clarkbI haven't looked at status.json but do we pretty format it? I discovered that eats up a lot of bytes with e-r17:07
*** jamesmcarthur has joined #zuul17:07
corvusopenstack's is 1.5MB17:07
corvusclarkb: no, it's ugly-printed17:07
SpamapSAnd has lots of watchers I"m sure17:08
SpamapSDoes it cache at least?17:08
SpamapSI guess that wouldn't work17:08
corvusSpamapS: it does cache, but only for a few seconds17:09
SpamapSdurn https invalidating all those lovely transparent caches that ISPs used to get away with.17:09
corvusbut that's still really important, as it turns out17:09
SpamapSYeah a few seconds is helpful I'm sure17:09
corvusthat keeps the load off of zuul17:09
SpamapSI bet there's a way to stream diffs.17:09
SpamapSBut seems like a boutique problem.17:09
corvusSpamapS: yeah, i think it would be possible, and a fun problem.17:10
corvusso yeah, apache on opendev's zuul is pumping out a pretty constant 1.6Mbps, probably mostly the status json17:10
SpamapSOur zuul has 3 items in queue right now, so, status.json is ~3KB17:10
SpamapSactually, 17K, 3KB is compressed.17:11
SpamapSso, this is definitely only a large scale problem. :)17:11
corvusya17:12
corvusdims added the owner; he wasn't specific as to why :)17:12
SpamapSAnother weird thing.. we have a gate with a single queue, and I have 2 items in it.. 1 is for branch A, and one for branch B.. they show as dependent on one another.17:14
SpamapSbug in the UI, or is there an actual dependency there?17:14
openstackgerritMerged zuul/nodepool master: add ebs-optimized support for aws provider  https://review.opendev.org/70575517:15
mnaserSpamapS: what manager is the queue using?17:15
corvusSpamapS: actual dependency -- it's designed for the 'stable branch' case where an upgrade may involve both branches.  based on your description earlier i can see that may not apply.  there isn't an option to separate branches though, that would be a substantial code change.17:16
SpamapScorvus: ah.. so even though they don't merge together, there's some thought that one may still need to precede the other. I can dig it.17:17
SpamapSmnaser: dependent17:17
corvuszactly17:17
mnaseri think that'll do it17:17
mnaserdependent will always chain (and test them together) but independent will do them seperately .. i think.. as far as i get it :)17:18
clarkbSpamapS: corvus in SpamapS' case it could be used to test prerelease branch before going to release branch17:18
clarkbdependecny in another way, but may still apply (and be useful)17:18
SpamapSI could see opening a PR to both staging and prod at the same time, with the prod one Depends-On: the staging one.17:18
corvusyeah, good point17:19
*** jamesmcarthur has quit IRC17:20
*** jamesmcarthur has joined #zuul17:21
*** jamesmcarthur has quit IRC17:27
*** Goneri has joined #zuul17:28
*** jamesmcarthur has joined #zuul17:29
*** rlandy is now known as rlandy|brb17:32
corvustristanC, mordred: speaking of the executor image ... do we even have kubectl installed there?17:32
tobiashcorvus: oh good bacause just test race, bad because there is still a bug lurking ;)17:33
*** jamesmcarthur has quit IRC17:33
corvustristanC, mordred: oh, i guess we don't need it because ansible is using the python openshift modules17:33
*** jamesmcarthur has joined #zuul17:33
corvusthough we'll want it (and oc) for the things we talked about earlier17:33
*** evrardjp has quit IRC17:34
*** evrardjp has joined #zuul17:34
mordredcorvus: do we need both kubectl and oc?17:34
tobiashcorvus: re offloading, it improved our situation already in production, but I've spotted a second place that's limiting in the same way in resetrepo. I' think I'll offload that as well.17:35
tobiashI think that should be quite easy using the same process pool17:36
corvustobiash: i'm wondering if we should think about refactoring the merger to do everything in a process?17:38
*** jamesmcarthur has quit IRC17:38
tobiashI thought about that, but at least the clones and fetches need more thought because auth tokens that are supplied by the drivers which are not initialized in the process pool17:39
*** tosky has quit IRC17:40
tobiashBut I'll look into that if it's possible to do this outside already and maybe provide the remote url as input17:40
tristanCcorvus: yes the executor image is missing the cli for the prepare-workspace and fetch-output role17:41
corvusyeah, might make for a cleaner separation in the code, but i haven't looked deeply17:41
tobiashDownside is logging, which needa to be done by passing messages back17:41
*** jamesmcarthur has joined #zuul17:41
corvustobiash: good point, the longer the process runs, the more logging is delayed... :/17:41
corvus(i wonder if there's an ipc construct we could use for passing messages back more quickly)17:42
tobiashI'll see what can be done. I fully agree that it would be beneficial to offload as much as possible17:42
tobiashMaybe if we use multiprocessing directly17:43
*** jamesmcarthur has quit IRC17:43
tobiashBut the executor has such a neat and simple interface :)17:43
corvustobiash: we had a really bad experience with multiprocessing before.  i would not recommend using anything that requires its special manager daemon.17:43
corvus(which it uses for some kinds of ipc)17:44
tristanCcorvus: mordred: and i'm not sure how would you like to address this. would you like to add a `curl, sha256sum, tar, chmod, rm` run expression?17:44
*** jamesmcarthur has joined #zuul17:44
tristanC(in software-factory, we are using the origin-clients provided by PaaS sig of CentOS)17:45
corvusi don't suppose there's debian repo somewhere?17:45
tristanCis the zuul image based of debian now?17:46
corvustristanC: i believe so17:46
corvusDebian GNU/Linux 10 \n \l17:46
corvus(i think it's based on the upstream python images)17:46
*** jamesmcarthur has quit IRC17:48
tristanCit doesn't seems to be available as .deb file, thus we'd have to use https://github.com/openshift/origin/releases/download/v3.11.0/openshift-origin-client-tools-v3.11.0-0cbc58b-linux-64bit.tar.gz17:49
*** bhavikdbavishi has quit IRC17:51
corvusi guess if curl/sha/tar/chmod/rm is the way that the the vendor recommends installing it then i guess that's what we'll do.17:52
*** bhavikdbavishi has joined #zuul17:52
corvus(sort of a shame the python lib doesn't provide a cli -- we could just pip install it)17:52
*** jamesmcarthur has joined #zuul17:53
fungicorvus: in the process of adding an afs volume for a new site i've noticed that /afs/.openstack.org/project/zuul-ci.org is at 91% used for its quota of 100000kb. would you like me to increase it while i'm in there?17:54
corvusfungi: yes please17:55
corvuswe're probably growing as we add additional docs for tagged releases17:55
fungilooks like /afs/.openstack.org/project/starlingx.io is set to 1000000 so i'll up zuul's to match17:55
fungiand it's now at 9% used17:56
openstackgerritJames E. Blair proposed zuul/nodepool master: WIP: Add ability to specify pod service accounts  https://review.opendev.org/70659617:57
corvustristanC: ^ can you take a quick look at that17:57
corvustristanC: i'm looking into having nodepool be able to supply a special pod to zuul so that zuul can use it to deploy itself on its own k8s cluster17:58
corvustristanC: i'm thinking if i add the ability in nodepool to specify a serviceaccount, then i can have nodepool launch that pod with that serviceaccount, so that the job can then "kubectl apply" on the k8s cluster running zuul+nodepool17:59
corvustristanC: obviously that change needs a lot of stuff plumbed through, but that patch is the crux, i think.  does that sound like it should work?17:59
corvus(and obviously, this is a dangerous pod, so it would be a special label and disallowed-labels would prevent it from being used except in a special tenant)18:01
tristanCcorvus: that may not be enough, iirc sa are ns scoped, and the kubernetes driver create a new ns per build18:02
*** jamesmcarthur has quit IRC18:02
tristanCcorvus: why not storing the kube.config in a project secret instead?18:02
*** jpena is now known as jpena|off18:02
corvushrm, so i may not be able to specify an SA from a different namespace...18:03
tristanCcorvus: that's my understanding, but i can be wrong18:03
tristanCi find the rbac system of k8s quite confusing18:04
*** jamesmcarthur has joined #zuul18:04
*** rlandy|brb is now known as rlandy18:05
*** bhavikdbavishi has quit IRC18:06
corvustristanC: yep, i think you're right about that.  both things, in fact.  you can't launch a pod with a service account outside of the pod's namespace, and that k8s rbac is confusing.  :)18:15
corvustristanC: so yeah, it sounds like 'make a deployment service account, save its token, encrypt it as a zuul secret, then use that to self-deploy' is the way to go.18:16
corvus(i think if we wanted to pursue the other way, we could add more options to nodepool to create pods without creating dedicated namespaces, but that's a lot of work for a niche use-case)18:16
pabelangermordred: for zuul meet up at ansiblefest, you shared slides about different types of testing (and how zuul handles them). Is that online any place?18:17
*** igordc has quit IRC18:18
*** armstrongs has joined #zuul18:19
*** armstrongs has quit IRC18:19
*** jamesmcarthur has quit IRC18:27
*** jamesmcarthur has joined #zuul18:33
mordredyes ...18:37
*** tjgresha has joined #zuul18:38
mordredpabelanger: it's either https://opendev.org/inaugust/inaugust.com/src/branch/master/src/zuulv3/gus2019.rst or https://opendev.org/inaugust/inaugust.com/src/branch/master/src/zuulv3/tutorial.rst (those are the two most recent decks)18:38
pabelangerthanks!18:39
*** jamesmcarthur has quit IRC18:44
*** plaurin has quit IRC18:44
*** igordc has joined #zuul18:49
*** igordc has quit IRC19:19
*** rfolco has quit IRC21:12
*** sshnaidm|afk has quit IRC21:18
*** sshnaidm|afk has joined #zuul21:23
*** rlandy has quit IRC22:05
*** smyers has quit IRC22:30
*** tosky has joined #zuul22:31
*** avass has quit IRC22:54
*** sshnaidm|afk has quit IRC23:16
corvusmordred, tristanC, paladox|UKInEU: https://gerrit-review.googlesource.com/c/zuul/ops/+/252316/5/playbooks/deploy.yaml23:17
corvusthat's a playbook for deploying/configuring/updating gerrit's zuul.  i've just manually run it to verify it works.  just a little more work to set up a post pipeline, and it should be something we can run in post job to make gerrit's zuul self-deploying23:18
paladox|UKInEU\o/23:18

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!