Thursday, 2020-04-09

* mnaser will bring it up tomorrow00:11
fungihappy to discuss more tomorrow, for sure00:16
fungiit does seem like something we should find a way to make runnable from an executor00:16
fungiafter all, executors can already push git refs to job nodes over ssh00:16
fungifundamentally the same problem, i expect?00:17
openstackgerritTristan Cacqueray proposed zuul/nodepool master: config_validator: refactor the schema to a static method  https://review.opendev.org/71858200:26
clarkbfungi: ya it should be doable for that very reason00:28
clarkbI expect the process will be add ssh key into agent then push00:28
*** sanjayu_ has quit IRC00:42
*** cdearborn has quit IRC00:50
*** swest has quit IRC01:24
openstackgerritIan Wienand proposed zuul/zuul-jobs master: ensure-pip: Add role  https://review.opendev.org/71763901:32
openstackgerritIan Wienand proposed zuul/zuul-jobs master: ensure-pip: export ensure_pip_virtualenv_command  https://review.opendev.org/71822401:32
openstackgerritIan Wienand proposed zuul/zuul-jobs master: fetch-zuul-cloner: use ensure-pip  https://review.opendev.org/71788201:32
openstackgerritIan Wienand proposed zuul/zuul-jobs master: fetch-subunit-output test: use ensure-pip  https://review.opendev.org/71822501:32
openstackgerritIan Wienand proposed zuul/zuul-jobs master: ensure-tox: use ensure-pip role  https://review.opendev.org/71766301:32
openstackgerritIan Wienand proposed zuul/zuul-jobs master: Update Fedora to 31  https://review.opendev.org/71765701:32
*** swest has joined #zuul01:41
openstackgerritIan Wienand proposed zuul/zuul-jobs master: ensure-pip: export ensure_pip_virtualenv_command  https://review.opendev.org/71822401:45
openstackgerritIan Wienand proposed zuul/zuul-jobs master: fetch-zuul-cloner: use ensure-pip  https://review.opendev.org/71788201:45
openstackgerritIan Wienand proposed zuul/zuul-jobs master: fetch-subunit-output test: use ensure-pip  https://review.opendev.org/71822501:45
openstackgerritIan Wienand proposed zuul/zuul-jobs master: ensure-tox: use ensure-pip role  https://review.opendev.org/71766301:45
openstackgerritIan Wienand proposed zuul/zuul-jobs master: Update Fedora to 31  https://review.opendev.org/71765701:45
*** corvus has quit IRC01:48
*** corvus has joined #zuul01:49
*** ysandeep|away is now known as ysandeep|rover01:52
*** Goneri has quit IRC01:59
*** ysandeep|rover is now known as ysandeep|afk03:09
*** bhavikdbavishi has joined #zuul03:16
*** bhavikdbavishi has quit IRC03:24
*** bhavikdbavishi has joined #zuul03:32
*** bhavikdbavishi1 has joined #zuul03:37
*** bhavikdbavishi has quit IRC03:38
*** bhavikdbavishi1 is now known as bhavikdbavishi03:38
*** ysandeep|afk is now known as ysandeep04:00
*** evrardjp has quit IRC04:37
*** evrardjp has joined #zuul04:37
*** logan- has quit IRC04:45
*** logan_ has joined #zuul04:47
*** logan_ is now known as logan-04:48
*** ysandeep is now known as ysandeep|rover04:56
*** sgw has quit IRC05:01
tobiashmnaser: you can totally run nodeless jobs. However what you can do on an executor is very limited (inside an untrusted playbook). E.g. the git push is an arbitrary command and cannot be run locally in an untrusted context.05:38
openstackgerritMerged zuul/zuul-jobs master: tox: Don't inline python warnings  https://review.opendev.org/71855405:39
*** reiterative has quit IRC05:42
*** reiterative has joined #zuul05:43
*** sanjayu_ has joined #zuul06:06
*** dpawlik has joined #zuul06:07
*** sanjayu__ has joined #zuul06:09
*** sanjayu_ has quit IRC06:12
*** bhavikdbavishi has quit IRC06:19
*** bhavikdbavishi has joined #zuul06:33
*** avass is now known as Guest6772106:36
*** avass has joined #zuul06:37
*** dpawlik has quit IRC06:37
*** dpawlik has joined #zuul06:39
*** sshnaidm|afk is now known as sshnaidm06:55
*** jcapitao has joined #zuul06:57
*** gtema has joined #zuul06:57
*** zxiiro has quit IRC07:01
*** rfolco has quit IRC07:11
*** rpittau|afk is now known as rpittau07:18
*** tosky has joined #zuul07:42
openstackgerritTobias Henkel proposed zuul/zuul master: Add --validate-tenants option to zuul scheduler  https://review.opendev.org/54216007:45
*** zbr has quit IRC07:46
*** zbr has joined #zuul07:46
openstackgerritTobias Henkel proposed zuul/zuul master: Add --validate-tenants option to zuul scheduler  https://review.opendev.org/54216007:48
*** bhavikdbavishi has quit IRC07:52
*** threestrands has quit IRC08:00
*** ysandeep|rover is now known as ysandeep|lunch08:10
*** bhavikdbavishi has joined #zuul08:10
*** bhavikdbavishi has quit IRC08:24
*** bhavikdbavishi has joined #zuul08:25
*** newbie761 has joined #zuul08:38
newbie761Hi guys! I have a very newbie-sh question for you.08:39
newbie761Is there a way for to tell the executor to properly initialize/update a repo submodules when it is preparing the workspace for the build nodes?08:40
newbie761I can probably do that in the playbook, cloning the submodules from the remote repo, but it would make sense to use Zuul caches etc. like for any required project08:40
avassnewbie761: I think submodules is something zuul does not handle properly08:59
openstackgerritTobias Henkel proposed zuul/zuul master: Add --validate-tenants option to zuul scheduler  https://review.opendev.org/54216009:01
avassnewbie761: found the log of the discussion we had when we planned to do something with submodules: http://eavesdrop.openstack.org/irclogs/%23zuul/%23zuul.2020-02-27.log.html09:02
*** tobias-urdin has quit IRC09:02
*** dpawlik has quit IRC09:10
*** sanjayu__ is now known as saneax_lunch09:14
*** ysandeep|lunch is now known as ysandeep|rover09:18
*** hashar has joined #zuul09:20
jktnewbie761: I have a playbook for this09:20
jktnewbie761: (a role, actually): https://gerrit.cesnet.cz/plugins/gitiles/ci/zuul-jobs-cesnet/+/refs/heads/master/roles/git-submodules/tasks/main.yaml09:20
jktnewbie761: it needs https://gerrit.cesnet.cz/plugins/gitiles/ci/zuul-jobs-cesnet/+/refs/heads/master/roles/zuul-var-to-json/tasks/main.yaml as well09:21
newbie761thanks guys, I will look into the links you provided!09:26
jktcan I configure the gerrit reporter to link to zull-web's buildset results?09:27
jktI'm reading zuul/reporter/, and there doesn't seem to be a thingy for that09:28
openstackgerritAlbin Vass proposed zuul/zuul master: Enables whitelisting and configuring callbacks  https://review.opendev.org/71726009:30
openstackgerritAlbin Vass proposed zuul/zuul master: Enables whitelisting and configuring callbacks  https://review.opendev.org/71726009:32
avassjky: I think it's in the tenant config, let me check09:39
avassjkt: I guess this is what you want: https://zuul-ci.org/docs/zuul/reference/tenants.html#attr-tenant.report-build-page09:39
tobiashzuul-maint: am I right that nodepool requests checksums from dib when building images but actually never uses them? If they have no use we might want a way to disable them as this then just adds up to the image build time (especially for larger images)09:40
*** dpawlik has joined #zuul09:49
jktavass: that's something else if I'm reading the code directly. It's used only for per-job results, and I do not want to change these. I would like to keep them (I'm happy with my success-url and failure-url tweaks, for example)09:54
jktavass: but I'd like my final build result, as reported to gerrit, to also include a link to the buildset landing page listing all jobs' results09:55
openstackgerritTobias Henkel proposed zuul/zuul master: Report retried builds in a build set via mqtt.  https://review.opendev.org/63272709:57
openstackgerritTobias Henkel proposed zuul/zuul master: Report retried builds via sql reporter.  https://review.opendev.org/63350109:57
avassjkt: ah, yeah not sure if that's possible at the moment then10:01
avassjkt: unless you do it from a job10:01
*** rpittau is now known as rpittau|bbl10:13
openstackgerritTobias Henkel proposed zuul/zuul master: Add optional support for circular dependencies  https://review.opendev.org/68535410:15
*** saneax_lunch is now known as saneax_10:34
*** gtema has quit IRC10:36
*** newbie761 has quit IRC10:42
jktavass: seems that I can only return stuff for reach job10:44
jktavass: I guess I could inject an extra node-less job which just points to the executor :), but meh10:44
jktI'll send a patch which adds formatting support for success-message and failure-message, that sounds better IMHO10:45
*** hashar has quit IRC10:50
*** jcapitao is now known as jcapitao_lunch10:59
*** mgoddard has quit IRC11:02
*** hashar has joined #zuul11:08
*** hashar is now known as hasharLunch11:09
openstackgerritTobias Henkel proposed zuul/zuul master: Remove unused function prune in merger  https://review.opendev.org/71867011:24
*** bhavikdbavishi has quit IRC11:27
*** rfolco has joined #zuul11:34
*** hasharLunch is now known as hashar11:39
*** ysandeep|rover is now known as ysandeep|coffee11:47
*** dpawlik has quit IRC11:56
*** rpittau|bbl is now known as rpittau11:57
*** ysandeep|coffee is now known as ysandeep|rover12:00
*** dpawlik has joined #zuul12:08
*** jcapitao_lunch is now known as jcapitao12:13
*** igordc has quit IRC12:18
*** bhavikdbavishi has joined #zuul12:43
*** cdearborn has joined #zuul12:59
openstackgerritTristan Cacqueray proposed zuul/zuul-jobs master: dhall-diff: add new job  https://review.opendev.org/71869413:01
openstackgerritTristan Cacqueray proposed zuul/zuul-jobs master: dhall-diff: add new job  https://review.opendev.org/71869413:11
openstackgerritTristan Cacqueray proposed zuul/zuul-jobs master: dhall-diff: add new job  https://review.opendev.org/71869413:22
*** gtema has joined #zuul13:23
*** vblando has joined #zuul13:24
openstackgerritTristan Cacqueray proposed zuul/zuul-jobs master: dhall-diff: add new job  https://review.opendev.org/71869413:29
openstackgerritTristan Cacqueray proposed zuul/zuul-jobs master: dhall-diff: add new job  https://review.opendev.org/71869413:34
mnaserhttps://review.opendev.org/#/c/717507/ -- can someone have a look at this?  ianw mentioned that we should test the role but i'm not sure how we'd go about it13:36
mnaseri'll gladly do it as i'd like this to land13:36
mnaserbut just need some help :X13:36
tristanCmnaser: i replied to ianw concerns. I'd also like to land this :)13:38
*** gtema has quit IRC13:41
tristanCtobiash: isn't dib checksum toggleable with the DIB_CHECKSUM env-vars?13:42
*** sgw has joined #zuul13:44
*** bhavikdbavishi has quit IRC13:50
*** avass is now known as Guest7822713:53
*** avass has joined #zuul13:53
openstackgerritTristan Cacqueray proposed zuul/zuul-jobs master: dhall-diff: add new job  https://review.opendev.org/71869414:00
openstackgerritJames E. Blair proposed zuul/zuul master: Move zuul-quick-start requires to pipeline and reparent  https://review.opendev.org/71354514:02
openstackgerritJames E. Blair proposed zuul/zuul master: Use ZK TLS in quickstart  https://review.opendev.org/71281714:02
openstackgerritJames E. Blair proposed zuul/nodepool master: Add requires to zuul-quick-start job  https://review.opendev.org/71870814:03
AJaegerhttps://review.opendev.org/#/c/718284/ is a zuul-jobs change to "ensure-tox: make idempotent and update testing14:04
AJaeger" - it looks good to me but since that is a central role, wanted to get an extra pair of eyes on it, please14:05
AJaeger(and on the complete stack)14:05
AJaegerzuul-maint, config-core ^14:05
tobiashtristanC: nodepool hard codes it via commandline14:10
*** gtema has joined #zuul14:12
tristanCtobiash: i can't find the hardcoded value, where is it defined?14:13
tobiashtristanC: https://opendev.org/zuul/nodepool/src/branch/master/nodepool/builder.py#L80114:14
*** Goneri has joined #zuul14:14
clarkbtobiash: they are supposed to be used by the upload process14:14
tobiashclarkb: it doesn't look that they are though14:15
clarkbhowever, I don't know that glance actually doesanything with thatinfo in the end so it may not be useful14:15
tristanCtobiash: oh i see, i got confused with the DIB_CHECKSUM reference in https://opendev.org/zuul/nodepool/src/branch/master/doc/source/configuration.rst14:16
clarkbtobiash: fwiw we also expose those checksums to our users so they can check the images when downlodaing them directly14:16
clarkbbut we could toggle that on optionally14:16
clarkbhttps://nb01.openstack.org/images/ for example14:16
tobiashclarkb: so you host them as well14:17
tobiashin this case it makes sense14:17
tristanCAJaeger: left a comment, what is the purpose of doing `set_fact: {tox_executable: "{{ tox_executable }}"}` ?14:17
Shrewstobiash: that option should produce the .md5/.sha256 files that are then used on upload. check the DibImageFile (or whatever the name is) class14:18
tobiashShrews: I found no uses though of that attributes of that class. Is that hidden in the openstacksdk?14:19
*** gtema has quit IRC14:19
openstackgerritJames E. Blair proposed zuul/zuul master: Remove David Shrewsbury from Zuul Maintainers  https://review.opendev.org/71871214:19
tristanCAJaeger: nevermind, it seems like using cacheable makes it relevant14:19
AJaegertristanC: thanks for reviewing14:20
tobiashI'm just wondering if something bad happens if I inhibit this in our dib wrapper (we have images where checksumming takes an hour)14:20
Shrewstobiash: it should be used here: https://opendev.org/zuul/nodepool/src/branch/master/nodepool/builder.py#L107914:20
Shrewsnot sure where that's set. you'll have to dig14:20
tobiashoh weird, no idea why I didn't find that... moar coffee...14:21
openstackgerritJames E. Blair proposed zuul/zuul master: Add Albin Vass to zuul-jobs maintainers  https://review.opendev.org/71871314:21
clarkbtobiash: Shrews I think you can disable it without any major issues though sdk might calculate a checksum as part of the upload if yo udo (so may not be faster)14:23
corvusi think that's the main motivation -- we do a lot of uploads, but only one image build14:24
*** y2kenny has joined #zuul14:30
fungiand so we only have to checksum the image once instead of for each provider where we upload it (though also i wonder what glance does if you provide an invalid checksum, i hate to say it but the checksum handling inside glance is not thoroughly baked because of needing to support use cases like images hosted at alternative urls not uploaded through its api)14:31
fungioh actually if memory serves, what happens in that case is glance may not care, but then nova consults the checksum when pulling into its cache. though in boot from volume scenarios i have no idea what goes on with the checksums14:32
fungihowever, also glance may be set up to autoconvert your images to a different format, in which case the checksum is bunk anyway14:33
tobiashin our case checksumming is disk bound (700gb), we'll try out how it performs if we omit the checksum parameter14:33
clarkbfungi: ya the value nova checks is calculated by glance14:33
clarkbI don't know that glance rejects images with a mismatched checksum14:33
clarkbiirc I discovered it didn't becaus ewe had na image fail due ot partial upload but glance used it anyway14:34
*** gtema has joined #zuul14:34
clarkbthen I tried to work with sdk to get that addressed on the client side but we realized we can't trust the checksum glance gives to us becaues it oculd be for a differently formatted image :/14:34
clarkball that to say the hecksums are probably functionally useless14:35
corvushecksums.  hacksums.  indeed.14:35
clarkb(except for when you serve the content somewhere elseand that may want to verify the sums like we do serving our images directly to users)14:35
tobiashbtw, we're currently exporing a different way of building images. In this case the image is built within a ci job and pushed into swift. And we created a dib wrapper that pulls the latest image from swift when nodepoo 'builds' it14:37
tobiashwith some images we have this is more efficient as we can re-use already existing caches from the earlier image in the build process and don't have to push/pull hundreds of gb to/from artifactory14:38
clarkbtobiash: fwiw dib enables you to cache artifacts like that on the dib builder14:38
clarkbthe source-repository element (maybe poorly named) will cache any thing it manages14:39
tobiashclarkb: those caches are regenerated every night and need to be refetched completely in our current case14:39
tobiashwhile reusing the target image it can build and directly put the cache into the image without some hosting service in the middle14:40
tobiashbut we're still in tryout phase of that14:40
clarkbya you're using the entire image as an artifact there14:40
fungiinterestingly, it sounds like a return to what we did with the old devstack-gate disk image jenkins jobs many years ago, which we eventually replaced with nodepool14:44
tobiashwe're not throwing the old way away, just exploring several options14:45
clarkbalso probabl worth mentioning that dib can build from existing images too14:45
tobiashand via a dib wrapper it fits pretty close and without changes to nodepool into the current system14:45
tobiashclarkb: however I don't want to run a software build in our builders ;)14:46
clarkbtobiash: thats fair :) a lot of people don't realize this can be done so I try to point it out. By default the base elements build from pstream images and that isn't really expressed so people odn't realize its how it works14:47
clarkbthis came up a lot several years back when a group was arguing dib was bad because you had to rebuild from scratch every time :/14:47
clarkb(which sin't true, dib has many problems but I don't think that is one)14:47
tobiashcool, I'll keep that in mind for when I have a usecase for this :)14:48
clarkbalso probably doesn't help that we choose to use the -minimal elements which do build from scratch14:48
*** bhavikdbavishi has joined #zuul14:50
*** ysandeep|rover is now known as ysandeep|afk14:51
y2kennyAre there any documentation on the security restrictions for job playbook?  I think I've read somewhere that zuul uses a custom ansible command module but I am wondering if there is something that document the limits more comprehensively.  So far I have ran into two problems that, I think, may be security related but I am not 100%.14:54
y2kennyThe first one is running remote command.  I tried to run pwd or ls to try to figure out what is going on but the run didn't return anything.  Then I try doing ls with a different path and looks like I can only do some of the command under project.src_root?  Is there other path that I can have activity on the remote?  I am wondering because I am14:55
y2kennytrying to organize the artifact output.  The ensure-output-path role seems to default to <ansible-user>/zuul-output/ which doesn't work in my case because I am remoting into a container (as root user) and the default working dir for the container image is / (so the src_root is /src.)14:55
openstackgerritPaul Albertella proposed zuul/zuul-jobs master: Add Bazel build and install roles  https://review.opendev.org/69351314:57
clarkby2kenny: that is a good question. https://zuul-ci.org/docs/zuul/reference/glossary.html#term-untrusted-project mentions there are restrictions but not what they are14:57
clarkbcorvus: ^ do you know if we document that more thoroughly somewhere else?14:58
corvustobiash: we're also exploring using container building in dib -- https://review.opendev.org/700083  (basically use docker/podman for most of the building with dib handling making it a bootable image)15:04
*** bhavikdbavishi has quit IRC15:04
*** gtema has quit IRC15:04
tobiashcorvus: cool15:05
corvusclarkb, y2kenny: there's some discussion here: https://zuul-ci.org/docs/zuul/reference/config.html15:05
*** zxiiro has joined #zuul15:05
corvusbut that may still not be comprehensive enough15:06
y2kennyI see.15:06
y2kennycan you guys confirm that I am confined to within the src_root on the remote?15:06
corvusy2kenny: the only restrictions are for things that run on the executor; you should have completely unrestricted access to run anything on a remote node15:07
y2kennycorvus: then what I am seeing is very odd because when I run command: pwd, ansible return 'OK' but nothing else.15:08
y2kennyI thought that was because I was doing pwd on /15:09
corvusy2kenny: this is on a pod that you created and then added to the inventory?  the zuul console daemon may not be running there15:09
y2kennyOH15:10
y2kennyok.  that may explains it.15:10
corvusy2kenny: so it'll be like before we added support to k8s for that.  you can probably invoke that role on your new container after adding it to the inventory15:10
y2kennybut how come ls -la for src_root works?15:10
corvusy2kenny: you should still be able to see the output in the "console" tab on the build page (ie, it ends up in the json file, just not the txt file)15:10
y2kennycorvus: ok... let me check15:11
y2kennyok yes15:12
y2kennyI see it15:12
y2kennyunder stdout_lines15:12
jktheh, I just spent half an hour figuring out how to reset my swift containers with Access-Control-Allow-Origin: *, just to find out that since c5e7174c2f1c359877bd917dc557c8e52df66bc5, Zuul does this by default when it creates these containers15:12
jktlooks like I've been using Zuul v3 for "too long" :)15:12
corvusjkt: hopefully soon you'll be able to put an end to that by upgrading to zuul v4 :)15:14
jktcorvus: but seriously, it would have helped me if there were release notes (or something!) for zuul-jobs15:14
jkthow does http://paste.openstack.org/show/791888/ look?15:15
*** bhavikdbavishi has joined #zuul15:16
corvusjkt: yes, that's a good point re release notes15:16
corvusjkt: i'd put the swift-specific info in the swift role, and then also indicate that it's set by default but manually created containers may need a command like that. (there's an entirely parallel GCE role now too (it also sets the cors header on creation))15:17
y2kennycorvus: this is the observation I see: http://paste.openstack.org/show/791889/  Is that the result of the console daemon not running or the console daemon selectively filter out some stuff?15:18
jkt(half of my time was spent on "hey, what's the relation between 'properties' in `openstack container show` and these X-Container-Meta- prefixes)15:18
corvusjkt: (so maybe ~ the first sentence in the manifest role, then the specifics in the upload role)15:18
y2kennyor may be I am mixing up with all the moving parts :)15:18
corvusmordred: ^ do you know the answer to y2kenny's question?15:19
jktcorvus: I would not have seen that because I've been using my swift roles for more than a year, therefore it was there and public, just the CORS bit was missing15:19
corvusjkt: yeah, that's why i'm suggesting cross-referencing them15:19
mordredcorvus: looking15:20
jktokay, I'll write something and upload15:20
corvusjkt: we don't want the manifest role to accumulate a lot of information about individual object storage systems (we're going to have many of them).  so introducing the cors concept in the manifest role, and referencing the swift/gce/(in the future aws, etc) docs for the specifics should help people find stuff and also keep it maintainable15:21
corvusjkt: thanks! :)  and thanks for helping find the problems :)15:21
jktwell, happy to help, thanks for an awesome CI system :)15:22
mordredcorvus, y2kenny: no - that's really weird15:22
y2kennymordred: ok... so I wasn't going insane... it was driving me insane last night :)15:23
y2kennyI was trying to pump some output artifact from the buildpod but it keeps not showing up15:23
y2kennyI can't create directory with the default output path, etc.  I ended up just putting it under /src and that was ok15:24
jkty2kenny: just sharing my experience from an year ago -- I'm afraid you'll be struggling with this; a lot of roles were not so flexible when it came to directory naming15:25
corvusy2kenny: i'm curious why ensure-output-dirs doesn't work, do you know the specific error?15:25
jkty2kenny: my use case was a runc-managed container with some (now long-obsolete) nodepool patch and a r/o rootfs15:25
y2kennyjkt: I see.  I want to make sure I know where the walls are so that when I tell my developers to make their own jobs, they don't get frustrated15:27
y2kennycorvus: ensure-output-dirs seems to fail silently... it didn't have any error just that the path was not created.  I have another example... let me paste it.15:28
y2kennycorvus: http://paste.openstack.org/show/791890/15:29
corvusy2kenny: well, it's not failing, right?15:32
y2kennynot failing15:32
corvusy2kenny: if we assume there is a fault with the console output, then we can't trust the null output there15:32
corvusy2kenny: maybe check the console tab for that last command and see if there's a real directory listing there?15:32
y2kennylooking at the output.json, looks like the artifacts directory is not there15:33
y2kennyeven though ensure-output-dirs supposed to create it (as far as I understand.)15:34
y2kennyoh wait15:35
y2kennyI misread what I did15:35
y2kennyartifacts directory is there15:35
y2kennyor at least the ls returned . and .. (empty dir)15:36
tobiashtristanC, corvus: In our deployment I'm preparing an improvement to the executor lifecycle on k8s. The plan is to call 'zuul-executor graceful' in a preStop hook. This will make it easy to do rolling upgrades on executors by just deleting the pods as pod deletions will be graceful then.15:36
tristanCtobiash: corvus: that's on my todo list for the operator, and i'm waiting for the current changes to be reviewed and/or merged before adding more changes...15:39
corvustobiash: that sounds good -- does k8s handle that taking several hours?15:40
tobiashcorvus: there is a grace period that can be configured on the container15:40
tristanCtobiash: i am also hoping we could add the prometheus server in zuul services and use it to indicate readyness15:41
tobiashtristanC: do you want a full featured prometheus as a stats driver or for limited use?15:45
openstackgerritJan Kundrát proposed zuul/zuul-jobs master: docs: Document CORS requirements of Zuul's web dashboard  https://review.opendev.org/71874015:46
corvusi think something to indicate readiness is a good idea (whether that's prometheus, or just a simple http endpoint)15:46
tobiashtristanC: cause the latest information I remember was that it has a performance impact on the scheduler15:46
tobiashnodepool already has a readiness endpoint btw15:46
tristanCtobiash: right, we realized that prometheus data model is not efficient to replace the existing statsd metric, however i think we can still use prometheus to indicate readyness of zuul service15:47
corvusyeah, i think that would be fine and easy15:47
corvuser15:47
tobiash++15:48
corvusi think the nodepool-style ready endpoint would be fine and easy :)15:48
tristanCtobiash: in particular, for the scheduler, it would be useful to be able to query if the tenant configuration has been loaded15:48
tristanCwell i haven't looked at the nodepool readiness endpoint, but it sounds similar to what does the prometheus server (i mean the python module)15:50
openstackgerritTobias Henkel proposed zuul/zuul master: WIP: Implement graceful termination for the executor  https://review.opendev.org/71815715:50
tristanCand if it's similar, i don't mind copying the nodepool code, or re-using the prometheus implementation, as you prefer15:51
tobiashin nodepool it was just an additional endpoint cause it already had a web server15:51
corvusit's very simple and adds no extra dependencies, i like it.15:52
tobiashhttps://review.opendev.org/69500115:52
tobiashftr, this was the implementation ^15:52
corvusmordred: can you look at https://review.opendev.org/716298 ?15:54
corvustristanC: didn't you have a change to make fetch-output work on kubectl?15:56
corvustristanC: oh, it's fetch-output-openshift15:57
corvustristanC: what do you think about merging that into 'fetch-output', and similarly merging 'prepare-workspace-openshift' into prepare-workspace (or is it prepare-workspace-git?).  that way we can put all the conditional logic in the roles themselves instead of in the playbooks?15:57
corvustristanC: (but maybe, for the moment at least, just add fetch-output-openshift to zuul-base-jobs as a conditional like the others?)15:58
*** rpittau is now known as rpittau|afk15:59
tristanCcorvus: that would be another solution16:00
tristanCcorvus: not sure how it would behave for user already doing the logic in the pre/post playbooks16:01
tristanCit seems like zuul-jobs roles are using more and more include_role. i don't mind moving the logic into the roles, but that makes the playbook less useful...16:02
mordredtristanC: fetch-output should be idemopotent16:02
mordredso if someone runs it elsewhere it should be at worst a re-copy16:02
mordredtristanC: yeah - but playbooks are hard to share - so the more logic we put in playbooks,the harder that logic is to reconsume16:03
tristanCcorvus: actually if we make prepare-workspace and fetch-output works with kubectl, then they are no longer usable in untrusted playbook16:03
tristanCmordred: isn't fetch0output already idempotent?16:04
corvustristanC: i think a simple base playbook would be good; ideally, most people should be able to use the same base playbooks with just a list of a few roles.  so yeah, maybe include_role in roles is the way to go, for maximum ease of use, and maximum flexibility.  make "prepare-workspace" include_role "prepare-workspace-git" or "prepare-workspace-openshift" depending on the connection.  then have playbooks use16:04
corvusthe "prepare-workspace" role.16:04
tristanCcorvus: what about user performing prepare-workspace in untrusted job?16:05
corvustristanC: re untrusted?  why -- because of the "oc rsync" command?  well, they aren't really intended to be used in an untrusted job, right?16:05
tristanCcorvus: that's how paul has been doing the base/base-minimal job split in rdo and ansible16:06
*** dpawlik has quit IRC16:06
tobiashfwiw, mirror-workspace-git-repos (which should be used by prepare-workspace-git) should already work with k8s: https://review.opendev.org/71192016:07
corvusi'm really confused by all the workspace setup roles and could use a good overview :)16:07
tobiashcorvus: I guess mirror-workspace-git-repos should be merged into prepare-workspace-git16:08
corvusi just want people to be able to say "role: make-my-git-repos-be-on-the-nodes" and have that happen :)16:08
tobiashafaik mirror-workspace-git-repos was the initial role used by opendev?16:08
tristanCcorvus: right now, one can use prepare-workspace and fetch-output in a untrusted base job, if we make them include the oc equivalent that will no longer be the case16:08
corvustristanC: okay, what do we need to do to fix that?16:08
tristanCcorvus: create a `make-my-git-repos-be-on-the-nodes` to rule them all? :-)16:09
corvustristanC: because we need to be able to put repos on remote nodes, and it sounds like it's useful to have that happen in an untrusted job (that may be useful for cases where people add_host as well)16:09
corvustristanC: sorry, i mean, how do we make the oc equivalent work on untrusted jobs?16:09
tristanCmore seriously, i don't know what is the best strategy moving forward. I don't mind having that ansible_connection logic in the playbook, but i'm also happy with pushing the logic into the role to keep the playbook simpler16:10
tobiashcorvus: I guess currently it's a localhost shell task. We might be able to wrap that into a zuul-provided module and allow that on localhost16:10
y2kennycorvus: so that one problem that I ran into using prepare-workspace-openshift is that it relies on zuul.resources entry16:11
corvustristanC: yes, honestly, i think a top-level role that just includes the right role is the way to solve that.16:11
tristanCcorvus: oc requires a command running on the executor. while we could whitelist the use-case, i don't think we should support that for untrusted jobs16:11
y2kennydoing add_host doesn't update it even though the pod is added to the inventory16:11
corvustobiash: yeah, that could be an option, or maybe we can whitelist that specific command in the command module?16:12
corvustristanC: why not?16:12
corvustobiash, tristanC: maybe whitelist "oc rsync /workdir ..."  ?16:12
y2kennyI try to use set_fact but set_fact doesn't update across play16:12
corvusy2kenny: ah good point, so as written, it won't work with new resources anyway16:13
tobiashcorvus: having that as a module makes it more flexible (e.g. in fetch-output) and easier to validate paths16:13
y2kennycorvus: I pretty much copy and pasted the playbook into my own playbook for output.  Or I just manually set_fact before I call the include_role16:13
corvustobiash: yes, but i'm wary of zuul-specific modules/plugins for things that should be basic ansible tasks... tristanC has an outstanding patch to ansible to get rsync upstream16:14
corvustobiash: if we make a zuul-specific module for this, we'll grow a small fork of ansible, and it will be hard to undo16:14
corvus(so far, our zuul-specific ansible plugins are not for things that ansible does itself)16:15
tobiashcorvus: k, then the whitelist will work too, but we need more care to validate the commandline16:15
tristanCcorvus: as tobiash said, if we care to validate the oc command line, then whitelist should work16:16
corvusi think there are helper functions available to us in our ansible modules to split a command line16:17
corvusand i think we could be really specific about this16:17
corvus(like, we don't have to support every possible set of options)16:17
corvustristanC: how's the progress upstreaming the rsync command?16:18
tristanCcorvus: the PR is https://github.com/ansible/ansible/pull/62107 , and i've been told it's not going to happen :(16:18
mordredcorvus: I like the whitelist option - and I agree, we can be pretty specific about it16:20
corvustristanC: oh?  is there a record of that decision somewhere?16:20
mordredcorvus: sivel's comment from sept 1716:20
corvusmordred: i read that.  i guess i don't understand subtext16:21
tristanCcorvus: i think we can proceed with updating `prepare-workspace` to use oc for kubectl connection now, it won't break unstrusted prepare-workspace user because it is already broken for kubectl connection16:21
fungidid it ever get discussed in the core meeting?16:22
corvusmordred: i thought that said "bring it up at a meeting because this is hairy", but i guess it really means "we're not going to do this, but i don't want to say no"?16:22
fungiand yeah, i read those comments as "not now" not "never"16:22
corvusbecause, if i were at such a meeting, or part of such a conversation, i would say "making it easy to synchronize contents between the controller and the remote host while abstracting away platform differences is a big part of ansible's value proposition and would be hugely beneficial to users"16:23
corvusso i just want to understand why the ansible core team disagrees with that.  so that, at the very least, i can understand how they see the project.16:24
mordredyeah - I read it more as the "we're not going to do it but if you want to come argue your case, you're welcome to"16:25
y2kennySorry to bud in again... so another weird thing I have been seeing is playbook showing up with no task even though there are definitely tasks in them (and previous pre playbook are successful as far as I can tell.)16:25
mordredmy understanding of the core team's pov generally is that they actually are very conservative about abstracting away differences. the package: module was controversial - and you'll note there is not a vcsrepo: module16:26
y2kennyWhat I was able to do is launch a k8s pod from the executor, and the pod to the inventory with add_host and then run another play.16:26
mordredthat said - the composition of the core team changes over time so it's possible that points of view can too16:26
mordredI mean - we have a new friend on that team now :)16:26
y2kennyThis all worked in an untrusted project.  So I figure I should refactor that into a base job in a trusted project.16:27
mordredcorvus: (I obviously agree with your point of view on this - this is just me explaining why I read that comment that way)16:27
corvusmordred: thanks.16:29
y2kennyBut when I did that  I get many of the subsequent playbook returning with empty task16:29
y2kennylike this: http://paste.openstack.org/show/791893/16:30
jktin a scenario where I have just one repo under my control in a Zuul setup, the leaf project, can I put my roles somewhere else than into <root>/roles/? Perhaps something like .zuul.d/roles/ ?16:31
corvustristanC, mordred, tobiash: okay, so i guess we either whitelist, or, honestly, at this point, any of you could probably convince me at this point to just make a new zuul-specific plugin for this.  because if this is a "no" from ansible core, i feel less bad about diverging.16:31
corvusplugin/module/whichever one is best16:32
tristanCcorvus: mordred: turns out synchronize is no longer hosted in ansible/ansible and it moved there: https://github.com/ansible-collections/ansible.posix/blob/master/plugins/modules/synchronize.py16:32
mordredcorvus: pretty sure it's both16:33
tobiashcorvus: i'd be fine with either, but see less risk in security issues with a module so if we need to maintain this for longer I'd be slightly in favor of a module16:33
mordredsync is a mix of action plugin and module16:33
corvushey...16:33
jktlooking at https://zuul-ci.org/docs/zuul/reference/job_def.html#attr-job.roles , it seems that I cannot really do much there16:33
corvusthis is something we could make standalone and publish to galaxy, right?16:33
mordredbecause it has to do some dark-magic to make things like "pull" work16:33
mordredcorvus: yes16:33
mordredcorvus: well....16:34
corvuscollections whatever16:34
mordredcorvus: we need to add collections support to zuul first16:34
mordredbut then yes16:34
corvusso we could actually have a module which was "synchronize++" which did either 'rsync' or 'oc rsync'16:34
mordred++16:34
corvusand any ansible user could use that16:34
mordredyup16:34
mordredwe could start just with a simple addition to manage-ansible-venv to add a known list of collections to the ansible install16:35
corvusyep16:35
mordredwhich wouldn't be as far as "allow jobs to specify this collection" - which is a whole other can of worms16:35
mordredcorvus: we could actually publish our other ansible stuff that way too, just for completeness16:36
corvusy2kenny: that doesn't sound right.  the only thing i can think of is to remember that trusted projects aren't speculative, so you have to land changes to them before they will take effect.16:36
tristanCaren't collection only supported by ansible-2.9?16:36
mordredyes16:36
*** evrardjp has quit IRC16:37
mordredcorvus: I mean - it might be weird -but zuul_console + our callback plugin _could_ be something somebody else would want to use16:37
*** evrardjp has joined #zuul16:37
*** jcapitao has quit IRC16:37
openstackgerritMerged zuul/zuul-operator master: Add job_volumes CR spec attribute  https://review.opendev.org/70664216:38
corvustristanC, mordred: but maybe we can define our plugin/module now in such a way that it's forward compatible with collections; so we have it in zuul for now, but move it to collections once we're ready.  keep the same name so playbooks still work?16:38
corvusjkt: correct; zuul expects that to be either a collection of roles under roles/ or else the whole repo is a role.  you can symlink roles/ to somewhere else though.16:39
mordredcorvus: it'll be slightly hard to do that - we'll need a transition period (it's not fully possible to do the thing you're talking about)16:39
mordredcorvus: but - I think the basics "just do a normal plugin/module now, publish as collection later"16:39
mordredshould cover it16:39
corvusmordred: what's involved in the transition?16:39
mordrednamespacing16:39
corvusack16:39
y2kennycorvus: I did that.  so I refactored the pod launching tasks into a base job in the trusted project.  Submitted it, and then 're-inherited' the job in the untrusted project to that newly created base job.  When I test the job in the untrusted project, seems like all other playbooks were 'zeroed-out'.16:40
mordredthere is a mechanism in ansible itself to route from old non-namepsaced names to new namespaced16:40
mordredcorvus: but I'm not sure it's accessible to arbitrary external things16:40
mordredI'll go ask16:40
* jkt goes to create that extra repo, then16:40
tristanCfwiw i'm happy with all the above suggestion to make the prepare-workspace and fetch-output feature works on kubectl. please let me know the one you prefer and i can have a look at updating or writting the needed/missing bit to make it happen16:43
mordredcorvus: I started asking - and then realzied - we can take care of that ourselves in manage-ansible-venv for a transition period16:44
mordredcorvus: once we're installing it as a collection, we can make a symlink to the old non-namespaced name16:44
corvustristanC, mordred, tobiash: how does this plan look? https://etherpad.openstack.org/p/vXl0TZu3I416:45
tristanCmordred: so is it possible to provide fake namespace module (e.g. a role named 'zuul.synchronize' (dot part of the filename)) in ansible<2.9 ?16:45
*** ysandeep|afk is now known as ysandeep|out16:46
mordredtristanC: that's a good question - I think we might be able to do that too16:47
mordredI'll investigate16:47
y2kennycorvus: this is what I mean by zero-ed out: http://paste.openstack.org/show/791895/  even  the playbook before one of my pre play has no task in it.16:47
y2kennycorvus: is there a requirement on the pre playbook to have hosts: all (or other restrictions?)16:49
openstackgerritTristan Cacqueray proposed zuul/zuul-operator master: Add a zuul-ensure-passwords role  https://review.opendev.org/71788016:50
corvusy2kenny: are there any hosts in your inventory?16:50
corvusy2kenny: iirc, there aren't at the start of the job16:50
corvusy2kenny: your paste showed empty tasks in the pre-k8s playbook, but you didn't paste the pre-k8s playbook16:51
y2kennycorvus: the job has a nodeset definition that includes a namespace label type from k8s provider16:51
corvusy2kenny: right, so "hosts: all" won't run anything since there are no hosts16:51
y2kennycorvus: pre-k8s.yaml is just hosts:all with the prepare-workspace-openshift role in it16:52
corvusy2kenny: but you should be able to add_host and then delegate tasks to that host after adding it, or start a new play in the same playbook and set "hosts:" to whatever you added16:52
mordredcorvus: fwiw - I've got collection work already for the openstack colllection we can copy/borrow16:52
corvusy2kenny: add_host doesn't persist across playbooks, but it does persist across plays.  so if you add_host in pre-k8s.yaml, you can use "hosts: all" after doing that.  but the add_host in pre-launch.yaml won't affect pre-k8s.yaml16:53
y2kennyOOOOOOOOH16:53
corvusy2kenny: my guess is the difference is maybe you are doing things in multiple playbooks that you were doing in the same playbook before16:53
y2kennyI think that's it16:53
y2kennyso I can't really refactor the pod launching from the actual run?16:54
corvusy2kenny: i don't think so; but i think you've got a good use case for maybe being able to update the inventory from a trusted playbook...16:56
corvusy2kenny, tristanC: this is relevant: https://review.opendev.org/59009216:57
corvustobiash: ^ maybe we should revisit that?16:58
y2kennycorvus: oh I think I like that.  Me directly calling add_host felt hacky to me.16:59
corvusmordred: what would the future standalone synchronize++ collection module be called?17:00
corvusmordred: zuul.synchronize or something like that?17:00
tobiashcorvus: wow, that is old, need to wrap my head around that17:00
y2kennycorvus: in addition to updating the inventory, I wonder if zuul.resources can be updated as well?  (I will leave a comment in the review)17:00
corvusmordred: would you say "tasks: [zuul.synchronize: {src:..., dst:...}]" ?17:00
corvusy2kenny: yeah, that would be good to think about -- but also, maybe the future prepare-workspace situation won't actually need to use zuul.resources anymore17:02
tobiashcorvus: I'm not sure if my comment there is still valid. At least this solves a new use case17:02
y2kennycorvus: ok understood.17:02
openstackgerritTristan Cacqueray proposed zuul/zuul-operator master: Document the missing feature  https://review.opendev.org/71875517:02
mordredcorvus: zuul.$something.synchronize17:03
corvuswhat sort of thing goes in $something?17:04
mordredsome other word that we make up - there's just a 2-tiered thing17:04
corvuslike 'ansible.posix.synchronize' i guess?17:04
mordredso top level namespace can have more than one collection17:04
mordredyeah17:04
corvusso 'zuul.posix.synchronize' or 'zuul.ansible.synchronize' ?17:04
*** gtema has joined #zuul17:05
corvusmordred: then is that what you put as the task?  eg:  "tasks: [zuul.posix.synchronize: {src:..., dst:...}]"  ?17:05
mordredyes17:05
corvusmordred, tristanC, tobiash: i updated the etherpad https://etherpad.openstack.org/p/vXl0TZu3I4  can you take a look at that and sign off on the plan?17:08
*** gtema has quit IRC17:09
tristanCwhat would be the new project name, zuul/zuul-collections ?17:11
*** sshnaidm is now known as sshnaidm|afk17:12
y2kennycorvus: something I just noticed (base on what you say about playbook for hosts: all not running if group all is empty.)  This would mean any role that has task delegate_to: localhost will also not run, is that right?17:13
corvusy2kenny: that should work fine -- localhost is always implicitly in the inventory, but it's not included in "all"17:14
corvustristanC: good q -- mordred?  (or maybe zuul/zuul.ansible) ?17:15
tristanCy2kenny: when a playbook is not running because the group all is empty, then i think any role, even the one using delegate_to: localhost attribute are also not running17:15
y2kennytristanC: that aligns with what I have observed17:16
mordredI think zuul-collections - or there's a pattern elsewhere that would be ansible-collections-zuul17:16
mordrednevermind - ignore that last thing17:17
corvusy2kenny: oh i misunderstood, yes tristanC is right; all the tasks/roles still need to at least apply to something in the inventory, even if they are then delegated to something else.17:18
mordredthe amazon.aws collection is: https://github.com/ansible-collections/amazon.aws17:18
y2kennytristanC, corvus: semantically I think it make sense (all is empty so there's no one doing the delegating) but the intent within the context of zuul is not quite right I think (delegate_to localhost just mean I want something running on the executor.)17:18
mordredcorvus: so maybe we should do zuul/zuul.posix17:18
mordredor maybe we don't follow that pattern and just do zuul-collection-$something17:19
mordredcorvus: maybe instaed of zuul.ansible or zuul.posix we should go more generic and do like zuul.util17:19
y2kennycorvus: so perhaps I should just make some pre playbook with hosts: localhost actually... just to be explicit17:19
corvusmordred: i'm open to that, but i was thinking if we're shadowing a 'core' module, then just s/zuul/ansible/ might be nice?17:20
corvuslike "this is the zuul fork of the ansible.posix.synchronize module"17:20
corvusy2kenny: that's probably the way to go17:20
mordredcorvus: ah - so I was thinking we could also adopt collections for our other stuff too - so we've got one mechanism  - but that's a good point, so maybe zuul.posix for synchronize, and zuul.util for things liek zuul_return and friends17:22
*** bhavikdbavishi has quit IRC17:22
corvusmordred: re the repo name, zuul.posix is nice because it's more "standard", but 'ansible-collection-posix' might better indicate to someone browsing the repo what it is17:22
corvusmordred: yeah, i'd be on board with zuul.util for the other stuff17:22
*** bhavikdbavishi has joined #zuul17:22
mordred++17:22
mordredI think I like ansible-collection-posix and ansible-collection-util17:22
mordredas repo names17:22
corvusyeah, it's growing on me17:22
corvusi updated the etherpad for that17:22
corvusthis has been a great imromptu design session!  i will summarize this in an email to the list soon17:23
corvusright after i get out of this chair because i'm getting cramps. :)17:23
*** bhavikdbavishi has quit IRC17:26
*** panda is now known as panda|off17:27
*** sshnaidm|afk is now known as sshnaidm|off18:02
corvustristanC, mordred, tobiash: istr we had an idea about using git over a kubectl connection to set up workspaces too -- does anyone recall the result of that?18:17
mordredcorvus: I don't know that anyone ever got it working18:18
tobiashcorvus: yeah, that works and was the change I mentioned above18:18
corvustobiash: oh i missed that; can you link again?18:18
corvus(there was *a lot* of text going by today :)18:18
tobiashso much backscroll18:18
tobiashsearchung18:18
corvus(fwiw, even if we decide that's the best way to push the git repos to workers, a synchronize that works globally would still be really helpful for artifacts and other tasks)18:19
fungiand we still haven't gotten back around to mnaser's topic from yesterday, finding a way to do arbitrary git remote replication from the executor18:19
mordredcorvus: ++18:19
tobiashcorvus: https://review.opendev.org/71192018:19
corvusfungi: that's not ringing a bell; is there a summary of that?18:20
tobiashthat's merged and tested in our deployment18:20
mordredand in ours too it seems18:20
corvustobiash, tristanC: so.... "mirror-workspace-git-repos" works everywhere?18:20
fungicorvus: starting at 22:55 in scrollback, but basically upload-git-mirror needs a job node to be able to set up ssh keys, and there's probably a way around that limitation since we already push git refs to some places (job nodes) from the executor anyway18:21
tobiashso afaik prepare-workspace-git should just work as it doesn't require sychronize compared to plain old prepare-workspace18:21
mordredcorvus: yes - but i think it won't work non-privileged18:21
mordreds/think//18:22
tobiashcorvus: yes, and thus also prepare-workspace-git should work as it uses mirror-workspace-git-repos: https://opendev.org/zuul/zuul-jobs/src/branch/master/roles/prepare-workspace-git/tasks/main.yaml#L5618:22
tobiashcorvus: btw, I think we should ditch mirror-workspace-git-repos and move it into prepare-workspace-git18:22
*** rfolco is now known as rfolco|bbl18:22
tobiashI think mirror-workspace-git-repos was the very first version of a git based prepare-workspace and might still be in use by opendev directly?18:23
corvusmordred: hrm; maybe we need to rethink the non-privileged thing then18:24
corvusmordred: because, iirc, the git version of this is much more efficient than rsync18:24
mordredis it? why did I think rsync was more efficient18:24
mordredbut also - while I totally appreciate teh base/base-minimal split - I think prepare-workspace is now pretty solid and one of those things that doesn't change very often, so having it in the base-minimal privileged base job shouldn't be too onerous18:25
tobiashmordred: rsync was the first simple thing but opendev (as we) did an early switch to the git based sync because it's much more efficient and needed to cache repos in the images18:25
mordredand it's really a role that _everyone_ should just have at the bsae of their stack18:25
mordredtobiash: ah yes - nod18:25
corvusmordred: yeah, and we also have really solid testing of those roles now18:26
tristanCcorvus: there is also the issue of fetch-output18:26
tobiasheven without caching the git based version saves roughly 50% bandwith18:26
mordredyeah - we need zuul.posix.synchronize for fetch-output18:26
corvusyes, i agree, i don't think this changes the need for zuul.posix.synchronize -- i just think it might mean we may not end up using it for git repo prep18:26
mordred++18:28
tobiashcorvus: do we want to support rsync and git based workspace preparation in the long term?18:29
tobiashor does it make sense to default to the git based sync at some point in time?18:29
corvustobiash: i would be comfortable calling the rsync repo setup roles deprecated and converging on a single git-based role that works everywhere.  i think we should do that slowly and carefully though.  we should probably start a new ml thread about it, to make sure we get the folks with the split base playbooks involved.18:30
tobiashour reference zuul-base-jobs still use the rsync based one: https://opendev.org/zuul/zuul-base-jobs/src/branch/master/playbooks/base/pre.yaml#L418:30
corvustobiash: yeah, it was a change to that which sent us down this rabbit hole :)18:31
corvustobiash: https://review.opendev.org/71629818:31
tobiashwow, that is a complicated change :)18:31
corvusyeah, but in reality, it's necessary now.  i'm okay landing something like that as an interim, and then our goal should be to get that back to more or less where it was, but have it work in containers and vms.18:32
corvus(if the base playbook is scary, it will turn people away from zuul)18:33
corvus(it should be a model of simplicity and community collaboration and reuse :)18:33
*** mgoddard has joined #zuul18:46
corvusi sent an email about the synchronize thing; i'll send another one about prepare-workspace after lunch18:48
*** spsurya_ has quit IRC19:08
*** olaph has joined #zuul19:53
* olaph waves19:53
openstackgerritTobias Henkel proposed zuul/zuul master: WIP: Implement graceful termination for the executor  https://review.opendev.org/71815719:57
tobiashtristanC: I have a working graceful pod delete using this and a preStop hook in a testenv ^19:58
tobiashI'll finalize this next week probably19:58
fungiolaph!!!19:58
*** hashar is now known as idoine19:58
fungiwe've missed you!19:59
*** idoine is now known as quibble19:59
olaphI heard that's what the cow said...  :)19:59
*** quibble is now known as hashar19:59
fungiyour animals talk to you now? that's awesome ;)19:59
corvusolaph: hay!19:59
*** rfolco|bbl is now known as rfolco20:15
corvusokay, i sent the other email too20:20
*** hashar has quit IRC20:48
*** tjgresha has joined #zuul20:48
*** armstrongs has joined #zuul21:13
*** armstrongs has quit IRC21:22
y2kennyCan the console tab on the web UI show more than one post playbook?21:35
clarkby2kenny: all the playbooks should be expandable.21:35
fungiy2kenny: it should show all the playbooks which ran21:35
y2kennyum...21:35
y2kennyfor some reason it's only showing 1 (I have 3 post playbooks)21:36
y2kennyeven though job-output.txt has the log for 2 (which is odd in itself)21:36
y2kennythe stream showed all 321:37
clarkby2kenny: the source of that is the json job output file21:37
clarkbmaybe double check the contents of that file21:38
mordredremember that nothing that runs after log collection is going to show up in the logs21:38
mordredeven though it will show up in the stream21:38
y2kennymordred: oh yea... of course21:38
y2kennysorry, my bad21:39
mordred(good reason to mkae log collection run as last as possible :) )21:39
* y2kenny thinking he should start the long weekend early...21:40
fungijust realized i had originally planned to be on vacation all this week, before an epidemic broke out21:41
clarkbfungi: taking that friday off when I was supposed to be driving ended up being really good21:42
clarkbno road trip, but got to relax and do things without computers21:42
openstackgerritTristan Cacqueray proposed zuul/zuul-operator master: Add zuul-registry deployment  https://review.opendev.org/71065021:42
openstackgerritTristan Cacqueray proposed zuul/zuul-operator master: Add zuul-preview service  https://review.opendev.org/71841921:42
openstackgerritTristan Cacqueray proposed zuul/zuul-operator master: Document the missing feature  https://review.opendev.org/71875521:42
openstackgerritTristan Cacqueray proposed zuul/zuul-operator master: Document the missing feature  https://review.opendev.org/71875521:43
openstackgerritTristan Cacqueray proposed zuul/zuul-operator master: Add zuul-preview service  https://review.opendev.org/71841921:45
*** tosky has quit IRC23:08
*** rfolco has quit IRC23:37
*** lseki has quit IRC23:53

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!