Tuesday, 2020-06-23

*** rfolco has quit IRC00:32
*** hamalq has joined #zuul01:16
*** hamalq has quit IRC01:18
*** lseki has quit IRC01:31
*** hamalq has joined #zuul01:33
*** sgw1 has quit IRC01:35
*** hamalq has quit IRC01:39
*** sgw1 has joined #zuul01:50
*** swest has quit IRC01:54
*** swest has joined #zuul02:09
*** hamalq has joined #zuul02:32
*** hamalq has quit IRC02:36
*** sgw1 has quit IRC02:47
*** hamalq has joined #zuul02:48
*** bhavikdbavishi has joined #zuul02:50
*** hamalq has quit IRC02:52
*** bhavikdbavishi1 has joined #zuul02:53
*** bhavikdbavishi has quit IRC02:54
*** bhavikdbavishi1 is now known as bhavikdbavishi02:54
*** rlandy|ruck|bbl is now known as rlandy03:10
*** Goneri has quit IRC03:11
*** sanjayu_ has joined #zuul03:14
*** vishalmanchanda has joined #zuul03:15
*** hamalq has joined #zuul03:25
*** sgw1 has joined #zuul03:28
*** hamalq has quit IRC03:30
*** hamalq has joined #zuul03:54
*** hamalq has quit IRC03:58
*** dmellado has quit IRC03:59
*** wuchunyang has joined #zuul04:02
*** sgw1 has quit IRC04:06
*** wuchunyang has quit IRC04:07
*** hamalq has joined #zuul04:10
*** hamalq has quit IRC04:15
*** sgw1 has joined #zuul04:18
*** wuchunyang has joined #zuul04:18
*** wuchunyang has quit IRC04:23
*** evrardjp has quit IRC04:33
*** evrardjp has joined #zuul04:33
*** bhavikdbavishi has quit IRC04:51
*** y2kenny has quit IRC04:59
*** wuchunyang has joined #zuul05:11
*** wuchunyang has quit IRC05:15
*** ysandeep|PTO is now known as ysandeep05:18
*** bhavikdbavishi has joined #zuul05:19
*** wuchunyang has joined #zuul05:21
*** bhavikdbavishi1 has joined #zuul05:22
*** bhavikdbavishi has quit IRC05:24
*** bhavikdbavishi1 is now known as bhavikdbavishi05:24
*** wuchunyang has quit IRC05:26
*** wuchunyang has joined #zuul05:41
*** felixedel has joined #zuul05:44
*** wuchunyang has quit IRC05:48
*** sgw has quit IRC05:48
openstackgerritFelix Edel proposed zuul/zuul-jobs master: [DNM] Test upload return values  https://review.opendev.org/73744105:51
openstackgerritFelix Edel proposed zuul/zuul-jobs master: [DNM] Test upload return values  https://review.opendev.org/73744106:19
openstackgerritFelix Edel proposed zuul/zuul master: Introduce Patternfly 4  https://review.opendev.org/73622506:23
*** rpittau|afk is now known as rpittau06:34
*** felixedel19 has joined #zuul06:45
*** felixedel has quit IRC06:45
*** hamalq has joined #zuul06:46
*** felixedel19 is now known as felixedel06:46
*** hamalq has quit IRC06:47
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731506:58
openstackgerritFelix Edel proposed zuul/zuul-jobs master: Return upload_results in upload-logs-swift role  https://review.opendev.org/73356407:02
*** hamalq has joined #zuul07:03
*** jcapitao has joined #zuul07:04
*** bhavikdbavishi has quit IRC07:06
*** hamalq has quit IRC07:08
*** bhavikdbavishi has joined #zuul07:21
*** bhavikdbavishi has quit IRC07:25
*** hashar has joined #zuul07:26
openstackgerritFelix Edel proposed zuul/zuul master: Introduce Patternfly 4  https://review.opendev.org/73622507:32
*** tosky has joined #zuul07:35
openstackgerritFelix Edel proposed zuul/zuul master: Introduce Patternfly 4  https://review.opendev.org/73622507:36
*** jpena|off is now known as jpena07:54
*** bhavikdbavishi has joined #zuul08:06
*** hamalq has joined #zuul08:08
*** nils has joined #zuul08:08
*** harrymichal has joined #zuul08:12
*** hamalq has quit IRC08:12
*** hashar has quit IRC08:16
*** hashar_ has joined #zuul08:16
*** hamalq has joined #zuul08:24
*** hashar_ is now known as hashar08:25
*** hamalq has quit IRC08:29
*** hamalq has joined #zuul08:30
*** hamalq has quit IRC08:30
*** ysandeep is now known as ysandeep|lunch08:37
*** hamalq has joined #zuul08:46
*** ysandeep|lunch is now known as ysandeep08:50
*** hamalq has quit IRC08:51
*** SotK has quit IRC09:08
*** tobiash has quit IRC09:08
*** SotK has joined #zuul09:09
*** sshnaidm|afk is now known as sshnaidm|ruck09:11
*** tobiash has joined #zuul09:12
*** hamalq has joined #zuul09:21
*** hamalq has quit IRC09:26
*** hashar is now known as hasharAway09:31
*** felixedel has quit IRC09:33
mhuLooks like there's a problem on Zuul-upload-image: FileNotFoundError: [Errno 2] No such file or directory: '/usr/local/lib/zuul/ansible/2.8/bin/pip': '/usr/local/lib/zuul/ansible/2.8/bin/pip'10:07
*** rpittau is now known as rpittau|bbl10:12
*** hasharAway is now known as hasharLunch10:16
*** jcapitao is now known as jcapitao_lunch10:35
*** jhesketh has quit IRC10:36
*** jhesketh has joined #zuul10:37
*** holser_ has joined #zuul10:39
openstackgerritMatthieu Huin proposed zuul/zuul master: [WIP] Web UI: add i18n support, french translations  https://review.opendev.org/73729010:39
*** holser has quit IRC10:41
avassis there any way to configure the zuul log streaming port per node?10:48
avasslike, we want to run multiple containers on a static node instead of just using multiple users. but that causes problems with the log streaming since they would all compete for the same port10:49
avassbut being able to configure that port the same way you can configure the ssh port would solve that10:50
*** wuchunyang has joined #zuul10:56
*** wuchunyang has quit IRC10:59
*** jpena is now known as jpena|lunch11:31
*** bhavikdbavishi has quit IRC11:46
openstackgerritAlbin Vass proposed zuul/nodepool master: WIP: aws: add support for uploading diskimages  https://review.opendev.org/73521711:48
*** bhavikdbavishi has joined #zuul11:48
openstackgerritAlbin Vass proposed zuul/nodepool master: static driver: make log stream port configurable  https://review.opendev.org/73750111:49
openstackgerritAlbin Vass proposed zuul/nodepool master: static driver: make log stream port configurable  https://review.opendev.org/73750111:49
*** hasharLunch is now known as hashar11:51
openstackgerritAlbin Vass proposed zuul/zuul master: make log stream port configurable  https://review.opendev.org/73750211:54
*** ysandeep is now known as ysandeep|afk12:00
*** rlandy has joined #zuul12:00
*** rlandy is now known as rlandy|ruck12:01
*** rfolco has joined #zuul12:01
guillaumecavass, on top of the tutorials i'm working on, I have some pending changes about log stream and a more special one where I fix max-parallel-jobs on a static node allowing multiple jobs to run as the same user on a static node.12:07
guillaumecavass, i didn't see any issue,  only 1 zuul_console can be up,  but multiple zuul_stream are connecting to it and look at their own log file: /tmp/console-{log_uuid}.log12:08
*** rpittau|bbl is now known as rpittau12:14
avassguillaumec: yeah, but there would still be issues where you have multiple jobs locking dpkg at the same time, or installing conflicting versions of packages12:14
*** jcapitao_lunch is now known as jcapitao12:15
avassI guess you could bind mount /tmp and start the log streamer on the host. but since it's started by ansible it's easier to just forward a port and make the port configurable12:16
*** ysandeep|afk is now known as ysandeep12:28
*** hamalq has joined #zuul12:30
guillaumecavass, it did happened, but as ensure-* are executed in pre-run playbooks,   first retry is launched, and as the package is now installed, it passes.12:32
avassyeah but that's still slower jobs compared to running them in containers where that's possible12:33
guillaumecI'm just pointing that I had no problem with multiple jobs using the same zuul_console12:33
avassyeah12:33
avasswe already do that, but with multiple users. We just want to be able to contain the jobs12:33
*** hamalq has quit IRC12:35
*** jpena|lunch is now known as jpena12:35
*** hamalq has joined #zuul12:46
*** sgw has joined #zuul12:49
*** hamalq has quit IRC12:51
*** felixedel has joined #zuul12:56
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: ensure-pip debian: update package lists  https://review.opendev.org/73752912:57
felixedelzuul-maint: I'd like to kindly ask for a review of https://review.opendev.org/#/c/633501/ and https://review.opendev.org/#/c/703983/12:58
openstackgerritThierry Carrez proposed zuul/zuul-jobs master: upload-git-mirror: check after mirror operation  https://review.opendev.org/73753313:05
ttxfungi, clarkb, corvus: this should avoid false negatives on the upload-git-mirror runs. I could not find any occurrence where the mirror was out-of-sync recently, but that check should make it sure13:07
ttxI tested the commands locally but the env is probably different on the worker node, so... let me know when you merge it so that I can watch it run13:09
corvusavass: why does the streaming port need to be different?13:25
avasscorvus: if you run multiple containers as 'static hosts' you need to forward different ports for each container13:26
corvusavass: i don't see why; it's built to support multiple uses13:27
avassI mean multiple containers on the same host13:27
corvusavass: oh, are you saying you want to run the log streamer inside a container on a static host?13:28
avassI believe ansible starts zuul_console inside the container and the callback tries to connect to a specific port13:28
avassyep13:28
corvusavass: can you use k8s instead of running in containers on the static node?13:29
avasswe have fantastic software that wants to start virtual machines and has hard-coded paths :)13:29
corvusavass: are the containers pre-created?13:30
avassyeah13:30
avassor, yeah we create them ourselves13:30
avassI believe13:31
corvusbut not in the job -- a container == a static node in nodepool?13:31
avassexactly13:31
corvusavass: can you run a global log streamer on the host and bind-mount in the tmp dir?13:31
avassI had that idea earlier, and yes :)13:32
corvusavass: another solution could be this: https://review.opendev.org/54143413:32
*** sgw1 has quit IRC13:34
avassthat connects from the remote to the executor instead of the executor connecting to the remote if I understand that correctly13:35
*** sgw1 has joined #zuul13:35
avassand yep that could work13:36
corvusavass: no, it's still executor to remote (that's important for firewalls).  but it's just part of the ssh session13:36
corvusssh connections are complicated; they can carry more than one connection.13:37
corvusbut yes, then on the remote, it looks like it's making an outbound connection (though the next idea is to use unix domain sockets: https://review.opendev.org/542469 )13:38
avassuh, yeah I got that backwards13:38
avasssure, I can take a look at that later13:40
corvusit's apparently been a hard problem, but it'll make a lot of things better, and would solve this without adding extra ties between zuul/nodepool13:40
avasssounds good, I've been wondering how the relationship between nodepool and zuul should be treated. it's a 'companion application' but how exclusive to zuul is it really?13:42
avasswe might want to use it for other purposes to be able to share resources easier :)13:43
corvusi think we try to keep zuul as a 'consumer' of nodepool -- so a one-way dependency of zuul on nodepool.  if we have to add something specific for zuul, we will, but it should at least be optional.  the fewer things we add, the cleaner it is.13:44
corvusi'm not a hard -2 on the log port thing; if that's the only way to do it we can add it, but it's pretty zuul-specific, so it starts to add to the nodepool -> zuul linkage13:46
avassyeah I can see that13:47
*** bhavikdbavishi has quit IRC13:49
mordredtobiash: zuul-manage-ansible installs the virtualenvs into sys.exec_prefix by default. This means if you use a distro supplied python you'll wind up with them in /usr/lib/zuul rather than /usr/local/lib/zuul - even if zuul itself and its binaries are installed into /usr/local ... did we do that on purpose?13:50
mordredasking because my brain didn't have all of that paged in and I went looking for one of teh venv's to double-check what a version of a library was and then I was confused - it's not a big deal - just thought I'd check13:51
*** sshnaidm|ruck is now known as sshnaidm|afk13:51
tobiashmordred: that's intended to use the same prefix as zuul's python interpreter13:51
tobiashno idea how that could fit into /usr/local/...13:52
tobiashthe idea was that it lands within the venv if zuul is installed into a venv13:53
mordredah - that makes sense13:53
mordredit's just feels weird to me to have things install into /usr/lib that weren't written there by distro package managers. but, I think the explanation of tying it to the python for virtualenvs makes a lot of sense13:53
mordredand I think that's more important13:54
tobiashif it feels too odd we could try to catch that use case13:55
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: ensure-pip debian: update package lists  https://review.opendev.org/73752913:58
tristanCavass: beware sharing tmp dir between containers may result in conflict when test code doesn't use uniq path for tmp files13:58
openstackgerritJan Kubovy proposed zuul/zuul master: Driver event ingestion  https://review.opendev.org/71729913:59
avassright, I hope that won't be a problem13:59
mordredtobiash, corvus: mind reviewing https://review.opendev.org/#/c/735739/ ? we need it in opendev before we can switch to docker containers for the executors14:01
openstackgerritMonty Taylor proposed zuul/zuul master: Add openafs-krb5 to bindep  https://review.opendev.org/73573914:02
tobiashmordred: we can add this but this is such a special dep so we might want to think if that would be better located in a downstream image that inherits from the official images. What do you think?14:04
mordredtobiash: I thought about that originally, but figured we had the afs jobs in zuul-jobs and it was a small package so maybe it was ok? I think we could also certainly do that if it feels like it's too much14:05
tobiashah ok, if there is already stuff in zuul-jobs then it's probably the right location14:06
corvustobiash, mordred: it's actually the sysctl support in zuul-bwrap that convinces me it's okay in the zuul image14:12
corvusi agree it's a really good question, and it's close to the line, and i don't want the images to get too big.  but there's enough support required in zuul and zuul-jobs for this to make sense i think.14:13
mordredyeah - I think the sysctl support is actually the better argument14:13
corvustobiash, mordred: there's also the idea that if these images get too big (because of stuff we add for things in zuul-jobs) we can make 2 versions of the zuul-executor image14:13
corvustobiash, mordred: a lightweight and a heavyweight version14:13
tobiashyeah that makes sense if size becomes a problem14:15
openstackgerritJan Kubovy proposed zuul/zuul master: Driver event ingestion  https://review.opendev.org/71729914:24
*** felixedel has quit IRC14:30
*** sshnaidm|afk is now known as sshnaidm|ruck14:39
*** ysandeep is now known as ysandeep|afk14:39
corvusfyi mnaser, mordred and i just had a conversation in #opendev about improving log upload robustness that's generally applicable here (basically, doing some kind of retry-to-other-log-region thing)14:45
*** ysandeep|afk is now known as ysandeep14:46
*** Goneri has joined #zuul14:50
*** bhavikdbavishi has joined #zuul14:50
clarkbguillaumec: re https://review.opendev.org/#/c/732066/22 it would be helpful to reviewers to not add changes until they are relevant to the change consuming them.14:53
clarkbguillaumec: adding duplicate files and unused variables is noise when attempting to review that particular change. Its ok to add the new file with delta and the new variable with use at the point they become useful14:54
clarkbguillaumec: all of the tutorials are added in series so we don't have to worry about merge conflicts either14:54
*** bhavikdbavishi has quit IRC15:05
clarkbmhu: tristanC: should we go ahead and land https://review.opendev.org/#/c/734134/7 ?15:08
mhuclarkb, yes please! unless you'd prefer me to remove the default list of verbs as you mentioned in your last comment15:09
clarkbmhu: no I think we can do that in a followon. I wanted to make sure it was seen before approving though in case it was more important to do that15:10
mhuclarkb, but there was a pb earlier with zuul-upload-image in the gate, is it fixed?15:10
clarkbpb?15:10
*** bhavikdbavishi has joined #zuul15:10
mhuLooks like there's a problem on Zuul-upload-image: FileNotFoundError: [Errno 2] No such file or directory: '/usr/local/lib/zuul/ansible/2.8/bin/pip': '/usr/local/lib/zuul/ansible/2.8/bin/pip'15:11
clarkbI'm just catching up on the reviews I did yseterday15:11
mhuclarkb, ^15:11
mhuok, I guess we can set workflow +1 but it might fail in the gate15:12
clarkbhttps://zuul.opendev.org/t/zuul/build/db967f3aaf0940c89d1b2c71e52261d2/log/job-output.txt#956615:12
mhuyes, similar one15:13
mhuthis time it's ansible 2.9 though15:14
clarkbthat is in the docker image's zuul ansible venvs15:15
clarkbI would expect that means this is not related to the pip and virtualenv changes on the VM images15:15
clarkb(since it is several layers deeper with docker and python3 venv15:15
clarkbah we use virtualenv not venv. Maybe a bug in new virtualenv /me checks if they have done a recent release15:22
clarkbhttps://pypi.org/project/virtualenv/20.0.24/ is from yesterday15:22
mhuyay for breaking releases! \o/ :)15:23
mordredthat is what was installed here15:23
clarkbfor now that is my hunch that it isn't seeding pip properly but I don't have confirmation of that yet15:23
clarkbthe changelog says they did change how seeding works15:23
clarkbhttps://virtualenv.pypa.io/en/latest/changelog.html15:23
mordred*AWESOME*15:23
*** harrymichal has quit IRC15:24
mordredclarkb: the behavior described seems fine15:26
* mordred is going to try to replicate15:26
*** hamalq has joined #zuul15:28
mordredclarkb, mhu: I cannot reproduce this behavior synthetically in a python-builder image pip installing virtualenv, creating a virtualenv and then calling the pip inside of it15:32
clarkbmordred: fwiw in that zuul job we do that like 4 times for all the ansibles and only one seems to fail15:32
clarkb(so it likely isn't a consistent failure whatever is causing it)15:33
mordredclarkb: I'm trying doing it multiple times15:34
*** harrymichal has joined #zuul15:35
*** ysandeep is now known as ysandeep|away15:36
mordredok. I think I know what it is15:38
mordredsigh15:38
mordredSO ... in the new world order, there is a shared "/root/.local" dir which caches the seed packages on a per-python basis15:38
clarkbmordred: which was the problem with the first 20.0.0 release15:39
mordredwe're installing our virtualenvs in a threadpool15:39
clarkbbecause that dir might go away or not be readable15:39
mordredso, while I haven't reproduced it - it would make perfect sense for a race condition between virtualenv commands to step on each other15:40
mordredwhat I think we shoudl do to be safer with how they're doing things ...15:40
mordredis to serially create the empty virtualenvs, then install the packages into those virtualenvs in parallel15:40
clarkbmordred: we can also set the seeder to pip15:40
clarkbwhcih doesn't use the shared contents15:40
clarkb(I don't know if that has different potential races though)15:41
clarkbmordred: https://review.opendev.org/#/c/706871/2/zuul/lib/ansible.py go back to doing that basically15:44
clarkbI think we cleaned that up when 20.0.3 fixed it for us15:44
clarkbbut we could also use seeder = pip15:44
mordredclarkb: I've got a patch coming15:44
openstackgerritMonty Taylor proposed zuul/zuul master: Create virtualenvs in series to avoid cache race  https://review.opendev.org/73756515:46
mordredclarkb, mhu ^^15:46
mhumordred, thanks! and good catch15:46
mordredalso - I should update python-builder to do an rm of /root/.local/share/virtualenv when it's done15:47
mordredmnaser: ^^15:47
clarkbmordred: should yuo remove the ensure_venv call in ensure_ansible?15:48
clarkbwe're gonna get some logging noise at least otherwise15:48
clarkbalso do we think using the pip seeder would address that?15:48
clarkband can do everything in aprallel?15:48
mordredclarkb: we could remove the ensure_venv call, yeah.15:50
mordredI don't know about the pip seeder... not sure I have much opinion15:51
corvusif we remove that call, we should make sure it's not requierd (ie, by some other code path)15:51
openstackgerritMonty Taylor proposed zuul/zuul master: Create virtualenvs in series to avoid cache race  https://review.opendev.org/73756515:52
openstackgerritMonty Taylor proposed zuul/zuul master: Create virtualenvs in series to avoid cache race  https://review.opendev.org/73756515:53
corvusit looks like ensure_ansible only has the one invocation15:53
mordredcorvus: yeah15:53
corvus(but there are other invocations of ensure_venv, which lead me to check this)15:53
mordredclarkb: I think I lean more towards serial-virtualenv - largely because once we get into alternate seeder land I worry that we'll be using a less-used codepath and our friendly upstreams might be more likely to break us15:53
corvusmordred: mhu also had a commitmsg nit if you're redoing stuff15:55
*** hamalq has quit IRC15:55
openstackgerritMonty Taylor proposed zuul/zuul master: Create virtualenvs in series to avoid cache race  https://review.opendev.org/73756515:55
mordredcorvus, mhu: ^^15:55
*** hamalq has joined #zuul15:55
bolgyay15:55
clarkbmordred: not opposed just wondering if pip would be more resilient since it relies on the regular tool and not special cases15:56
mordredclarkb: yeah - it's a totally fair point. why don't I also push up a patch with that and we can recheck it a bunch and see how it does15:57
*** hamalq_ has joined #zuul15:57
openstackgerritMonty Taylor proposed zuul/zuul master: Use seeder=pip in virtualenv creation  https://review.opendev.org/73756715:59
mordredclarkb: ^^15:59
*** rpittau is now known as rpittau|afk16:00
*** hamalq has quit IRC16:00
clarkbmordred: oh I was suggesting that we do both things if we are extra worried. We can serialize virtualenvs but also seed with pip to avoid pesky cache dirs outside of normal expectations16:01
clarkbI guess we'll get infos either way16:01
corvusspeaking of -- i just ran 'tox -epy36' in a project and i'm now sitting at  /usr/bin/python -c from virtualenv.seed.wheels.periodic_update import do_update;do_update(u'setuptools', '3.6', '/usr/local/lib/python2.7/dist-packages/virtualenv/seed/wheels/embed/setuptools-47.3.1-py3-none-any.whl', '/home/corvus/.local/share/virtualenv', [], True)16:09
corvusso i guess time to get a coffee or something16:09
mhuIs there a list of a build's possible statuses somewhere? SUCCESS, FAILURE, SKIPPED, POST_FAILURE, anything else?16:13
*** sgw1 has quit IRC16:13
corvusmhu: i don't believe so16:13
corvusmhu: if you wanted to make a file of constants and replace all the string occurrences with that, that would be a fine idea i think :)16:14
corvus'SUCCESS' -> build_results.SUCCESS16:14
mhucorvus, yeah I think that'd be handy, there's already a list of such values for node states16:14
mhu(and helpful for translations)16:14
corvusmhu: i think they are mostly in model.py and executor/server.py16:15
*** mgoddard has quit IRC16:15
mhuso there aren't any other states for builds right?16:16
corvusnode_failure comes to mind16:16
corvusfelix is planning on adding retry16:16
mhuright, the dreaded node_failure16:17
AJaegerNODE_FAILURE16:17
AJaegerRETRY_LIMIT16:17
AJaegerTIMED_OUT16:18
AJaegerCANCELLED16:18
AJaegermhu: hope that's it ;)16:19
*** sgw1 has joined #zuul16:19
mhuAJaeger, thanks! that'll do it for now16:19
AJaegerSKIPPED as well, I think16:19
AJaegerABORTED - not sure when that happens16:20
mhuwhat's the difference between ABORTED, CANCELLED, SKIPPED?16:21
*** mgoddard has joined #zuul16:21
mhuor at least between CANCELLED and ABORTED16:21
corvusmhu: canceled (note the spelling) is by request of the scheduler, aborted is unexpected error on executor16:24
avassthere also 'ERROR' isn't there?16:24
avassbut maybe that isn't a build result16:25
corvusi think a buildset can have an error state, but not a build16:25
corvusconfig_error at least16:25
* mhu thinks it'd be indeed good to get all these in constants16:25
corvusoh, yep there is an ERROR for builds16:26
*** jcapitao has quit IRC16:26
clarkbmhu: I'll approve the OPTIONS change now as mordred's virtualenv change is in the gate16:26
mhuclarkb, sweet thanks16:26
avassyeah I've seen ERROR once or twice, it's rare :)16:26
corvusi think having a role with a plugin causes error16:26
corvusbasically, the executor can't run the job16:27
clarkbthat will send everything through https://review.opendev.org/#/c/728098/8 into the gate16:27
mhuI would also requeue the followup patches in +3 but my girlfriend is banging at the door to get us to take a walk :)16:27
corvusavass: what's the status on the buildx test fix?16:27
clarkbmhu: it should happen automatically for that whole stack that is already approved16:28
clarkbmhu: if not I'll prod them. You go enjoy your walk16:28
avasscorvus: it's failing on 'connection refused' but not sure why yet: https://review.opendev.org/#/c/737315/16:28
mhuawesome, my gf will be happy to hear that! :)16:28
avasscorvus: here: https://zuul.opendev.org/t/zuul/build/0f73b5c3f9ec4aa6b33e32f270f2e2b2/log/job-output.txt#84816:28
avassunless I missed something I believe that's the only thing that causes the tests to fail16:30
clarkbmordred: hrm your change failed in the gate https://storage.bhs.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_ba4/737565/4/gate/zuul-stream-functional-2.7/ba4ea67/job-output.txt16:34
clarkbmordred: that does look like an ensure-pip problem though.16:34
corvusavass: why did you start using zuul-jobs.buildset-registry in the cert?16:39
avasscorvus: because I'm still not enitrely sure how certificates works and: 73731516:43
avassoops16:43
avasshttps://opendev.org/zuul/zuul-jobs/src/branch/master/roles/use-buildset-registry/tasks/main.yaml#L2516:43
corvusavass: right, but we're not using the buildset-registry in this job, right?16:44
avasscorvus: we have to since buildx requires it16:44
corvusoh interesting16:44
avassbut it's the same registry as the one we push the release to16:44
corvuser, aren't you setting up a new registry in the pre playbook?16:45
openstackgerritClark Boylan proposed zuul/zuul master: Run ensure-pip in the console stream functional job  https://review.opendev.org/73758216:45
corvus"Start registry with basic auth" is starting a new docker library/registry:2 image16:45
clarkbmordred: ^ I can't see anything else installing pip so I think we need that16:46
clarkboh we don't run the stream functional jobs most of the time16:46
clarkbthat explains it16:46
avasscorvus: I moved the registry to the pre playbook16:46
clarkbzuulians I think https://review.opendev.org/737582 is a bug fix necessary to land mordreds bug fix16:46
corvusavass: right, but you're starting a second registry, in addition to the buildset registry, right?16:46
avasscorvus: nope, it's the same registry16:47
corvusavass: i think i'm going to need you to use a lot more words16:47
avassw:)16:47
avasscorvus: the pre playbook sets up the registry and I configure buildx to use that with use-buildset-registry, but the same registry is used in upload-docker-image16:48
avassbut the buildx dance pushes the images with specific tags, pulls them, re-tags them for release and pushes them16:49
avassor that's what supposed to happen16:49
corvusavass: let's introduce a new term: the "publication registry".  in the plain docker version of this, that's the registry you set up to stand in for dockerhub16:50
corvusavass: i think we should keep the publication registry and the buildset registry separate16:50
avasssure16:50
corvussince the approach you're using to test this basically involves pushing an image to a different registry than dockerhub anyway, i think that may make sense16:51
corvusavass: oh, but i just realized something -- i'm not sure we should have a docker_registry variable on the upload role -- because if you want to publish to something other than dockerhub, you should just name your image tag appropriately16:51
avassyeah, but we could do that after we figured out why we're getting 'connection refused' since I believe it should look the same anyway, only with two registries running16:51
avasscorvus: I added it for docker login16:52
*** pabelanger has joined #zuul16:52
corvusavass: we can probably just docker login before running the role16:52
avassbut I guess that could be changed to parse the tag instead16:52
corvusavass: oh i see what you mean16:53
corvusso the docker login in the upload role knows which registry to log in to16:53
avassyeah16:53
corvusavass: okay, let's keep that as is for now16:53
corvusavass: i think it may be worth untangling the buildset/publication registry stuff now though; i think it will make things easier to debug16:53
corvusthe buildset registry is really complicated, but the publication registry can be pretty simple16:54
corvusavass: do you want to try revising the patch to do that, and i can put in an autohold so we can try to fix it if we still have problems?16:54
avasssure16:55
pabelangerI wanted to ask about https://zuul-ci.org/docs/zuul/reference/jobs.html#pausing-the-job we. We are about to start work on buildset galaxy servers for testing ansible collections, but in some cases we have child jobs that run more then 2 hours. What I was hoping to figure out, in our case we only need the galaxy server online until a collection has been downloaded from it. Keepig it only after that,16:56
pabelangerisn't efficent and consumes limited resources. Basically, trying to ask, if we added zuul_return unpause support, if it would help in this case.16:56
avassit shouldn't be too hard, but it should be enough to run a normal docker registry for that right?16:56
*** sgw1 has quit IRC16:56
pabelangerbasically, want to use zuul_return to unpause a paused job, not unpause when all child jobs finish16:56
corvusavass: yeah, just like you were doing before16:57
corvuspabelanger: hi!  let me think about that a bit16:57
pabelangerthanks, no rush16:58
corvuspabelanger: the biggest challenge is going to be in returning data to the executor without ending the child job's playbook.  currently the executor only reads that file when a job ends.16:59
clarkbmordred: if my role inclusion fails on the upload image thing we may need to sqash the changes. Any objection to doing that? (and ideas on alternatives?)16:59
corvuspabelanger: however, i think being able to return data to the executor during a job run is great and we should do it -- it lets us do things like indicate that a job is going to fail even before it finishes.  will speed things up.16:59
corvuspabelanger: but we still have to figure out how to do that :)17:00
corvuspabelanger: the second thing to consider is a paused job with multiple children.  does it unpause when all children tell it to unpause (or they all finish)?  i think that makes sense, but we'd want to be explicit.17:00
corvuspabelanger: for the first thing, we could probably just have the executor periodically read the return json file?17:01
corvusif we have it check every 30s or something, that's probably good enough and easy enough?17:02
clarkbhrm I think the stream functional jobs may be failing on the same thing that the upload image job fails on now that pip is there. So we may need to squash17:03
pabelangercorvus: so to answer the multi child job, yah I was thinking only unpause after _all_ child jobs complete / return unpause.  But realize that means needing to track child jobs too17:03
pabelangerperiodic read might work17:04
corvuspabelanger: i think the scheduler knows the child jobs at that point, so that should be okay.17:05
*** nils has quit IRC17:05
*** sgw1 has joined #zuul17:05
openstackgerritGuillaume Chauvel proposed zuul/zuul master: tutorial: Rework quick-start and prepare for other tutorials  https://review.opendev.org/73206617:05
pabelangercool17:05
corvuspabelanger: cause i think the child jobs will tell the executor to unpause their parent, the executor will pass that information to the scheduler, the scheduler would decide to do that and tell the executor to actually perform the unpause17:05
pabelangergreat, so sounds like something we could support, if I find the time to dig into it17:05
corvuspabelanger: ++ :)17:06
corvusavass: autohold in place17:07
openstackgerritClark Boylan proposed zuul/zuul master: Create virtualenvs in series to avoid cache race  https://review.opendev.org/73756517:09
clarkbcorvus: mordred ^ squashed them as they won't merge without some intervention like that17:09
*** jpena is now known as jpena|off17:11
corvusclarkb: +w i think that's appropriate, urgent, and non-controversial17:11
clarkbthanks17:11
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731517:14
avasscorvus: I believe doing something like that ^ should be enough17:14
avassactually no, both registries use the same port now17:15
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731517:15
corvusavass: yeah, and you should be able to drop the zuul-jobs.buildset-registry name from the cert; basically, i'm hoping we can get it just like the non-buildx case17:15
avassah yep, I'll do that17:16
*** pabelanger has left #zuul17:16
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731517:17
avassthat should do it17:17
avasscorvus: uh, is the buildset registry normally using a password?17:18
avasscorvus: because this looks suspicious: https://opendev.org/zuul/zuul-jobs/src/branch/master/roles/use-buildset-registry/tasks/main.yaml#L2517:19
avasslooks like run-buildset-registry never configures any authentication17:20
corvusavass: it does here: https://opendev.org/zuul/zuul-jobs/src/branch/master/roles/run-buildset-registry/templates/registry.yaml.j2#L1017:21
avassoh yep17:21
corvusgenerated here: https://opendev.org/zuul/zuul-jobs/src/branch/master/roles/run-buildset-registry/tasks/main.yaml#L3017:21
corvusavass: here's the consuming side: https://opendev.org/zuul/zuul-jobs/src/branch/master/roles/use-buildset-registry/tasks/user-config.yaml#L2517:22
avassoh sorry got the wrong link, that's what I was supposed to link :)17:22
corvusi have to run; back in ~30m17:23
*** sshnaidm|ruck is now known as sshnaidm|afk17:24
*** hashar has quit IRC17:25
*** hashar has joined #zuul17:25
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731517:33
*** sgw1 has quit IRC17:34
*** harrymichal has quit IRC17:40
*** harrymichal has joined #zuul17:40
*** sgw1 has joined #zuul17:50
corvusavass: do you have an ssh published somewhere i can copy?  github launchpad etc?  or if you just want to pastebin it, i can add your key to the held node.18:12
avasscorvus: http://paste.openstack.org/show/795115/18:15
avasscorvus: it got one step further now though. it fails at being able to pull from the buildset registry instead :)18:15
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731518:17
openstackgerritMerged zuul/zuul master: Create virtualenvs in series to avoid cache race  https://review.opendev.org/73756518:21
openstackgerritMerged zuul/zuul master: Report retried builds in a build set via mqtt.  https://review.opendev.org/63272718:21
corvusavass: hrm, it grabbed a different build than that failed one; i wonder if the new patchsets caused that18:21
corvusavass: i'll clear it out and reset the hold18:22
openstackgerritMerged zuul/zuul master: Report retried builds via sql reporter.  https://review.opendev.org/63350118:22
clarkbtobiash: did you see my note about respinning https://review.opendev.org/#/c/730624/ ?18:23
*** hashar is now known as hasharAway18:23
clarkbI think that would be a good improvement to land to the windowing if you've got time for it. Otherwise I can give ti a go if you'd prefer18:23
tobiashclarkb: yes I saw it. I'm out of office this week so feel free to respin this week if you like. Otherwise I'll respin it on monday18:24
*** harrymichal has quit IRC18:26
*** bhavikdbavishi has quit IRC18:33
avasscorvus: I'm gonna guess that the buildset registry is not set up correctly and that docker tries to pull from dockerhub18:33
openstackgerritMerged zuul/zuul master: zuul-web: support OPTIONS for protected endpoints  https://review.opendev.org/73413418:33
*** harrymichal has joined #zuul18:35
corvusavass: huh?18:35
openstackgerritMerged zuul/zuul master: zuul-web: refactor auth token handling code  https://review.opendev.org/73413918:35
openstackgerritMerged zuul/zuul master: CLI: Fix errors with the REST client  https://review.opendev.org/72806118:35
corvusavass: what are you looking at?18:36
avasscorvus: https://storage.bhs.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_fc5/737315/23/check/zuul-jobs-test-build-docker-image-release-multiarch/fc5c501/job-output.txt18:38
openstackgerritMerged zuul/zuul master: REST API: fix discrepancies between RPC and REST outputs for autohold  https://review.opendev.org/72807318:38
avasscorvus: "Error response from daemon: pull access denied for testrepo, repository does not exist or may require 'docker login': denied: requested access to the resource is denied"18:38
avassat least that's my best guess at the moment18:39
*** harrymichal has quit IRC18:42
*** harrymichal has joined #zuul18:43
corvusavass: i still see you're doing stuff with 'buildest_registry' in your change18:44
corvusavass: you should not invoke the buildset-registry roles in this change; you need a completely new registry for the publication registry.  and you definitely don't want to set it up with use-buildset-registry.18:45
*** y2kenny has joined #zuul18:46
clarkbtobiash: ah enjoy your time off. I'll see if I can get a respin at some point18:46
tobiashthanks!18:47
*** armstrongs has joined #zuul18:47
corvusavass: i think what you already had is pretty close: just start a registry, log in to it, and tell buildx to push to it18:47
avasscorvus: build-docker-image requires a buildset registry for buildx18:48
corvusavass: yes, but you should be able to ignore that18:48
avassI'm not sure I follow. how?18:48
openstackgerritMerged zuul/zuul master: Add simple testing for Zuul CLI & REST API  https://review.opendev.org/72809818:49
corvusavass: the theory behind your test is that we can't push to dockerhub because it's a production service, but we can push to a private registry.  so your test creates a new private registry and pushes to it.  it should have no relationship with either the intermediate or buildset registries (otherwise, it's not a valid test)18:50
avasscorvus: yeah18:50
corvusavass: so just start a new registry, run it on port, i dunno, 5050, then build and push to localhost:5050/imagename and that should be it18:51
avasscorvus: but we need to build an image with buildx using build-docker-image and that requires a buildset-registry because of the way that role works18:51
corvusavass: yes, but that's already taken care of, you should be able to ignore it18:51
avassit is?18:51
*** armstrongs has quit IRC18:55
corvusavass: are you saying the buildset-registry roles are not used in zuul-jobs-test-build-docker-image-release jobs?  then it may be worth looking at how zuul-jobs-test-registry-docker-multiarch sets them up18:56
openstackgerritGuillaume Chauvel proposed zuul/zuul master: tutorial: Rework quick-start and prepare for other tutorials  https://review.opendev.org/73206618:56
corvusavass: regardless, i think the important point is that your publication registry should not be the buildset registry18:57
avasscorvus: it's not anymore, run-buildset-registry sets it up doesn't it?18:57
avassso there's a buildset registry started from that role, and another one started like it was without buildx18:58
corvusavass: in the latest version of your change i see tasks like like "Set up up buildset registry"18:58
corvusit still looks like you're setting up your publication registry and passing its info to use-buildset-registry18:58
corvusthat's going to mix the two up18:58
corvusif you need a buildset registry, then run run-buildset-registry, then use-buildset-registry, then don't do anything else with the buildset registry.  :)  then start your publication registry on a different port, and pass it to the build role for login and push19:00
corvusgotta run again19:00
avassI'm confused, that's what I'm doing19:00
openstackgerritMerged zuul/zuul-jobs master: Simplify twine invocation for PyPI uploads  https://review.opendev.org/73593219:01
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731519:02
corvusavass: look at your change, and the release-pre.yaml playbook.  line 65 you start the publication registry.  line 80 you load the cert from the publication registry as the buildset_registry19:05
*** lseki has joined #zuul19:07
avasscorvus: you the slurp task? that was just left by mistake and shouldn't have affected anything19:07
avassthe 'set_fact' is there to cache the output from run-buildset-registry since the role itself doesn't do that19:08
corvusyes, the slurp is what caught my eye, if that's really a noop, then that may not be the issue.  would probably be a good idea to remove it.  :)19:10
avassalready done :)19:11
avassmaybe run-buildset-registry should cache the fact? it seems so when I look at the docs: https://zuul-ci.org/docs/zuul-jobs/docker-image.html#yoursite-build-docker-image19:15
avassis this why we load information from results.json? https://opendev.org/zuul/zuul-jobs/src/branch/master/roles/build-docker-image/tasks/main.yaml#L1019:15
y2kennyWhat is the expected behaviour with executor-zone for executor only jobs? (i.e. no nodeset)19:19
avassy2kenny: i guess the job would land on an executor in that zone19:19
corvusavass: yeah maybe it should; i don't think we had any fact caching going on at the time.19:20
y2kennyavass: but there's no zone definition since there is no nodeset.  What I am see is that it won't schedule to any executor that has zone define.  That's probably expected?19:20
avassy2kenny: oh, I guess it would land on any executor then. let me check19:21
*** sgw1 has quit IRC19:21
*** sgw1 has joined #zuul19:22
avassy2kenny: reading the docs make me believe it would land on any unzoned executor: https://zuul-ci.org/docs/zuul/discussion/components.html#attr-executor.zone19:23
fungii think the expectation is that unless you need executor zoning, you should not set zones on your executors19:25
y2kennyfungi, avass: I see.  Thanks for confirming.19:25
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731519:31
tobiashy2kenny, avass: without https://review.opendev.org/#/c/673840 you need at least one unzoned executor for this use case19:35
fungiwe run without any executor zones, so all executors can use nodes from any provider, but if you have multiple providers and specific executors can only reach nodes in particular providers (perhaps the executors are in those providers and have dedicated private networks through which they communicate with nodes) then you'd set up zones for something like that19:36
y2kennytobiash: yes, that's exactly what I am seeing.19:37
fungii hadn't seen 673840 yet, neat19:38
fungii agree that looks useful19:38
openstackgerritGuillaume Chauvel proposed zuul/zuul master: tutorial: Add "gate your first patch"  https://review.opendev.org/73206719:42
openstackgerritGuillaume Chauvel proposed zuul/zuul master: tutorial: Add "gate your first patch"  https://review.opendev.org/73206719:47
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731519:53
openstackgerritMerged zuul/zuul master: CLI: add documentation on promote  https://review.opendev.org/73702720:14
*** harrymichal has quit IRC20:23
*** harrymichal has joined #zuul20:24
*** sgw1 has quit IRC20:31
*** harrymichal has quit IRC20:33
*** harrymichal has joined #zuul20:34
mnasercorvus: super unrelated but i've seen you do a lot with ruamel.yaml -- is there a way to create/ensure one single empty line between blocks?  i'm dynamically generating jobs and it seems to put them directly with one after the other20:46
*** sgw1 has joined #zuul20:47
fungii would use it to parse a yaml file like what you want, and then look at the data structure to see how it indicates the location of empty lines20:47
openstackgerritClark Boylan proposed zuul/zuul master: Don't decrease window size on merge failure  https://review.opendev.org/73062420:53
clarkbfungi: corvus ^ you previously reviewed that change if you want to look at it again20:54
*** vishalmanchanda has quit IRC20:54
mordredmnaser: I believe you can control that with formatting - or it's possible you have to write a custom formatter class20:55
mordredmnaser: you don't really nee ruamel.yaml to do it - I have nerdsniped myself to do that before, but have forgotten so I'd have to go learn again20:55
openstackgerritGuillaume Chauvel proposed zuul/zuul master: tutorial: Add "Use zuul jobs"  https://review.opendev.org/73206820:58
fungii've overwritten pyyaml's IBSEmitter/IBSDumper to force indentation of block sequences20:58
fungier, overridden20:58
fungiwith subclass shadowing you can override a lot of the dumper behaviors fairly easily20:59
fungier, i guess technically i subclassed yaml.emitter.Emitter and yaml.SafeDumper21:00
fungibut yaml.dump() allows you to pass a custom Dumper class, as well as having a number of options to influence flow style21:01
corvusmnaser: this does it for the auto-generated jobs in zuul-jobs: https://opendev.org/zuul/zuul-jobs/src/branch/master/tools/ruamellib.py#L4421:02
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731521:04
corvusavass: i'm back around now; would the held node from build 'fc5c501d18944340a22b8b3b7b37122a' be useful?21:04
avasscorvus: yes, but it's getting late and I'm planning on quitting for the night very soon21:05
corvuslooks like that one is patchset 23: https://zuul.opendev.org/t/zuul/build/fc5c501d18944340a22b8b3b7b37122a21:05
corvusavass: okay, "ssh root@174.143.130.176" should work for you -- it'll be there whenever you want it :)21:06
*** harrymichal has quit IRC21:08
avasscorvus: interesting, the registry lists the tags 3, 3.19, 3.19.0 but no manifests21:16
mnasercorvus: oh neat!21:18
mordredavass: that seems less than idea :)21:18
mordredideal21:19
avassmordred: yeah and it looks like they should be there: https://zuul.opendev.org/t/zuul/build/fc5c501d18944340a22b8b3b7b37122a/log/job-output.txt#101021:19
avassbut, it's getting way too late. I'll see if I can figure this out tomorrow21:19
avassmordred: oh whoops, one line above that :)21:20
corvusmhu: i'm looking at https://review.opendev.org/734082 and wondering about the callback setup -- you say you need to add an auth callback to google for every tenant, but that's not the case for keycloak.  1) why the difference?  2) should we think about making the auth_callback be a global-or-tenant endpoint like info?21:21
avasscorvus, mordred: actually the manifests are there, but only reachable with the digest and not the tag21:22
avassI wonder if that could be a problem21:23
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731521:30
openstackgerritGuillaume Chauvel proposed zuul/zuul master: tutorial: Add "gate pipeline"  https://review.opendev.org/73206921:31
avassthat last patch-set should work, but I don't understand why the mirror in registries.conf doesn't work21:31
openstackgerritGuillaume Chauvel proposed zuul/zuul master: tutorial: Add "job secrets"  https://review.opendev.org/73207021:39
clarkbmhu: can you see my comment on https://review.opendev.org/#/c/728118/ I'm trying to understand the change and some of the intent there may help21:40
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Test multiarch release builds  https://review.opendev.org/73731521:45
*** Goneri has quit IRC21:46
*** hasharAway has quit IRC22:11
openstackgerritMerged zuul/zuul master: Add openafs-krb5 to bindep  https://review.opendev.org/73573922:15
*** armstrongs has joined #zuul22:30
openstackgerritMerged zuul/zuul master: pagure: ensure files is list and not a dict_keys  https://review.opendev.org/73217122:32
*** rlandy|ruck is now known as rlandy|ruck|bbl22:32
*** armstrongs has quit IRC22:37
*** tosky has quit IRC22:42
*** clarkb has quit IRC22:44
mnaserhttps://zuul.opendev.org/t/vexxhost/build/eeab2f7e09c745fea5ddfd4697fd2a56 -- hmm, we're using a network module _on the target system_ and getting "Use of network modules is prohibited" -- is that a bug or expected? (i would understand if we disallow it on 'localhost' aka executor but running it on the remote hosts seems.. reasonable?)22:57
mnaserit's not any different than running a curl or something22:57
*** clarkb has joined #zuul22:58
mnaserlooks like this is implemented as an action plugin, so it might be hard to workaround :X22:58
*** jamesmcarthur has joined #zuul23:04
*** jamesmcarthur has quit IRC23:07
openstackgerritGuillaume Chauvel proposed zuul/zuul master: tutorial: Add "job dependencies"  https://review.opendev.org/73207123:07
openstackgerritGuillaume Chauvel proposed zuul/zuul master: Rename quick-start to zuul-tutorial-quick-start  https://review.opendev.org/73765623:07
*** y2kenny has quit IRC23:20
fungimnaser: you'd need nested ansible on the remote node calling that module instead23:27
mnaserdarn, i was hoping to just natively have zuul run ansible and get my testing that way :(23:28
fungior we'd have to whitelist that plugin (after auditing it to make sure it can't be asked to make unsafe changes to the workspace on the executor)23:28
*** kgz has quit IRC23:29
*** kgz has joined #zuul23:34
mordredmnaser: we've had conversations before about not blocking plugins any more and relying on bubblewrap - I believe there are still a few unresolved issues to overcome, although tls zookeeper is an important one23:36
mnaserfungi: i guess my issue is why i can't run it even on the remote host23:36
mnaseri understand blocking it on localhost, but on the remote host seem a bit like just blocking a thing you can easily workaround23:37
mordredmnaser: yeah - it's because it's implemented as an action plugin, so the action plugin code runs on the executor even if the target of the action is a remote host23:37
fungimnaser: ansible isn't running on the remote host, ansible is running on the executor, and that's python code basically being imported on the executor23:37
fungieven if it's acting on the remote node23:38
mnaserright, sorry, i mean the ansible module executes remotely23:38
mnaserif target_host == 'localhost' then stop else go23:38
mordredyeah - we just need code in its action plugin to do that23:39
fungithat's not always sufficient across the board, it's something which is going to be unique to each plugin23:39
mordredyeah - and I think so far nobody has asked for any of the network plugins, so nobody has looked to see if they need anything special or whatnot23:39
fungiit's certainly possible for a plugin which is targeting a remote node to still have local side effects, depending on how it's written23:39
mordredI'd happily +2 a patch to allow modules we're blocking if they're safe23:40
mordredmnaser: what's the module?23:41
mnasermordred: net_ping23:41
mnaseror something along those lines23:41
* mnaser finds change23:41
mnasermordred: https://review.opendev.org/#/c/737611/3/tests/test.yml23:42
mordredmnaser: jeez. I have almost no idea what ./lib/ansible/plugins/action/net_base.py does23:44

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!