Thursday, 2020-07-02

*** armstrongs has quit IRC00:04
*** saneax has quit IRC00:27
*** wuchunyang has joined #zuul00:59
*** Goneri has quit IRC01:02
*** swest has quit IRC01:56
*** swest has joined #zuul02:11
*** saneax has joined #zuul02:15
*** rfolco has joined #zuul02:55
*** mugsie has quit IRC02:59
*** rfolco has quit IRC02:59
*** rfolco has joined #zuul03:00
*** mugsie has joined #zuul03:02
*** rfolco has quit IRC03:05
*** sgw has quit IRC03:07
*** Goneri has joined #zuul03:28
*** bhavikdbavishi has joined #zuul03:43
openstackgerritIan Wienand proposed zuul/zuul-jobs master: multi-node-hosts-file: add ipv6 address if defined  https://review.opendev.org/73895203:47
openstackgerritIan Wienand proposed zuul/zuul-jobs master: multi-node-hosts-file: add ipv6 address if defined  https://review.opendev.org/73895203:52
*** Goneri has quit IRC03:53
*** wuchunyang has quit IRC03:56
*** bhavikdbavishi1 has joined #zuul04:00
*** wuchunyang has joined #zuul04:01
*** bhavikdbavishi has quit IRC04:02
*** bhavikdbavishi1 is now known as bhavikdbavishi04:02
*** wuchunyang has quit IRC04:04
*** evrardjp has quit IRC04:33
*** evrardjp has joined #zuul04:33
*** bhavikdbavishi has quit IRC04:34
*** bhavikdbavishi has joined #zuul04:36
*** ysandeep|away is now known as ysandeep04:37
*** wuchunyang has joined #zuul04:45
*** vishalmanchanda has joined #zuul04:50
*** wuchunyang has quit IRC05:00
*** bhagyashris|afk is now known as bhagyashris05:11
*** saneax has quit IRC05:19
*** saneax has joined #zuul05:40
*** reiterative has quit IRC05:42
*** reiterative has joined #zuul05:43
openstackgerritIan Wienand proposed zuul/zuul-jobs master: multi-node-hosts-file: add ipv6 address if defined  https://review.opendev.org/73895205:43
*** marios has joined #zuul05:44
*** bhavikdbavishi has quit IRC06:00
openstackgerritIan Wienand proposed zuul/zuul-jobs master: emit-job-header: add inventory hostname  https://review.opendev.org/73896306:01
*** sshnaidm|afk is now known as sshnaidm|ruck06:03
openstackgerritIan Wienand proposed zuul/zuul-jobs master: multi-node-hosts-file: add ipv6 address if defined  https://review.opendev.org/73895206:26
openstackgerritIan Wienand proposed zuul/zuul-jobs master: multi-node-hosts-file: add ipv6 address if defined  https://review.opendev.org/73895206:37
*** hashar has joined #zuul06:39
openstackgerritIan Wienand proposed zuul/zuul-jobs master: multi-node-hosts-file: add ipv6 address if defined  https://review.opendev.org/73895206:54
*** newbie2020 has joined #zuul06:59
*** wuchunyang has joined #zuul06:59
*** jcapitao has joined #zuul07:13
openstackgerritIan Wienand proposed zuul/zuul-jobs master: multi-node-hosts-file: add ipv6 address if defined  https://review.opendev.org/73895207:16
*** harrymichal has joined #zuul07:21
*** bhagyashris is now known as bhagyashris|lunc07:28
openstackgerritIan Wienand proposed zuul/zuul-jobs master: multi-node-hosts-file: add ipv6 address if defined  https://review.opendev.org/73895207:29
*** tosky has joined #zuul07:46
*** jpena|off is now known as jpena07:56
*** ysandeep is now known as ysandeep|lunch08:02
*** nils has joined #zuul08:11
*** harrymichal has quit IRC08:19
*** wuchunyang has quit IRC08:39
*** wuchunyang has joined #zuul08:47
*** bhagyashris|lunc is now known as bhagyashris08:50
*** wuchunyang has quit IRC09:01
*** ysandeep|lunch is now known as ysandeep09:01
*** hashar has quit IRC09:16
*** wuchunyang has joined #zuul10:12
*** wuchunyang has quit IRC10:17
*** jcapitao is now known as jcapitao_lunch10:32
*** wuchunyang has joined #zuul10:46
*** wuchunyang has quit IRC10:59
*** newbie2020 has quit IRC11:20
*** hashar has joined #zuul11:34
*** jpena is now known as jpena|lunch11:43
*** rfolco has joined #zuul11:48
*** ysandeep is now known as ysandeep|afk12:01
*** jcapitao_lunch is now known as jcapitao12:04
*** rlandy has joined #zuul12:07
*** wuchunyang has joined #zuul12:08
*** rlandy is now known as rlandy|ruck12:10
*** wuchunyang has quit IRC12:31
*** ysandeep|afk is now known as ysandeep12:33
*** jpena|lunch is now known as jpena12:42
*** LLIU82 has joined #zuul13:29
openstackgerritGuillaume Chauvel proposed zuul/zuul master: Fix branch name and project name for ref-updated event  https://review.opendev.org/73832013:44
openstackgerritGuillaume Chauvel proposed zuul/zuul master: scheduler: Fix event process abide hasUnparsedBranchCache argument  https://review.opendev.org/73904213:44
*** vishalmanchanda has quit IRC13:48
openstackgerritMonty Taylor proposed zuul/zuul-jobs master: Add a job for publishing a site to netlify  https://review.opendev.org/73904713:55
*** sgw has joined #zuul13:57
mordredcorvus, avass: ^^ I'm not sure if there is a good way to test that13:58
*** Goneri has joined #zuul14:01
avassmordred: what does the '--prod' flag do14:04
avassmordred: tried to check it but it seems 'netlify publish' isn't a command :)14:04
mordredavass: actually publishes it live. if you leave that off it with publish to a preview site - kind of similar to how our per-build previews work - but since we have that in zuul already it doesn't seem as exciting to support14:05
avassmordred: ah yeah, just thought that would be a way to test it14:06
mordredavass: you should be able to run "npx -p netlify-cli netlify publish --help" ... oh, wait - it's deploy not publish. nice catch14:07
avasswell, unless you want to fake their api :)14:07
openstackgerritMonty Taylor proposed zuul/zuul-jobs master: Add a job for publishing a site to netlify  https://review.opendev.org/73904714:07
mordredavass: so you should be able to run "npx -p netlify-cli netlify deploy --help"14:08
mordred:)14:08
avassmordred: yep, can't find anything that would help so I guess it looks good14:10
AJaegermordred: did you see my comment on https://review.opendev.org/#/c/739047/1/roles/netlify-publish/README.rst ?14:10
avassmordred: unless this helps: https://www.netlify.com/products/dev/14:13
mordredAJaeger: ah - missed that. thanks!14:13
mordredavass: I don't think so - I think that's more akin to "yarn develop" except running a netlfy - I don't think the netlify deploy command has support for pointing to an alternate api location14:15
*** bhagyashris is now known as bhagyashris|afk14:15
avassmordred: ah alright14:15
openstackgerritMonty Taylor proposed zuul/zuul-jobs master: Add a job for publishing a site to netlify  https://review.opendev.org/73904714:16
zbrcan we start publishing zuul-jobs as an ansible collection? i have a very good use-case for enabling local testing.14:27
*** LLIU82 has quit IRC14:34
*** ysandeep is now known as ysandeep|away14:43
openstackgerritAlex Schultz proposed zuul/zuul-jobs master: Make persist-iptables more robust  https://review.opendev.org/73906114:45
fungii thought we had made decisions which imply that zuul-jobs was not intended as a collection14:51
fungifor example, we have hyphens in role names, and have disabled the ansible-lint error for that condition on the grounds that we're not making a collection from zuul-jobs14:52
avassfungi: collections can't use hyphens? that seems arbitrary14:52
*** ysandeep|away is now known as ysandeep14:53
fungiavass: i think it's that they want them to mirror python module naming requirements14:53
fungi(you can't import a module with a hyphen in its name because that's a reserved character for an operator)14:54
fungibut yeah, this was all hotly debated in the ansible user community after the developers informed them that's how it was going to be14:55
avassyeah I guess so, but it's not python so it doesn't need to act like python14:55
fungii don't recall the exact reason honestly, so it's entirely likely i've misremembered that explanation14:56
mordredcollections introduce the ability to include module_utils and other things like that14:56
mordredand to use those things you have to import them - so pretty much all of the aspects of the naming wind up being expose in python import statements14:56
*** sshnaidm|ruck is now known as sshnaidm|mtg14:57
mordredhttps://opendev.org/openstack/ansible-collections-openstack/src/branch/master/plugins/modules/server.py#L45414:57
mordredfor instance14:57
avassyeah, that seems like it would make it hard to turn zuul-jobs into a collection14:59
*** bolg has quit IRC15:01
*** harrymichal has joined #zuul15:06
*** rf0lc0 has joined #zuul15:09
*** dpawlik2 has joined #zuul15:12
*** yoctozepto2 has joined #zuul15:13
*** rfolco has quit IRC15:14
*** irclogbot_1 has quit IRC15:14
*** Goneri has quit IRC15:14
*** etp has quit IRC15:14
*** mnasiadka has quit IRC15:14
*** avass has quit IRC15:14
*** Goneri has joined #zuul15:14
*** mnasiadka_ has joined #zuul15:14
*** dpawlik4 has quit IRC15:14
*** sgw has quit IRC15:14
*** etp has joined #zuul15:14
*** yoctozepto has quit IRC15:15
*** yoctozepto2 is now known as yoctozepto15:15
*** sgw1 has joined #zuul15:16
corvusmordred: i'd love exception handling in ansible -- like a way to say "include this role, but we expect this task to fail".  because honestly, we can run everything but the last task of that role for testing.15:17
corvusi guess we could add a private "test only" variable... _netlify_publish_dry_run=true15:18
corvusand skip the task15:18
corvusthat would at least get all the templating and stuff tested.  might be worthwhile?15:18
*** irclogbot_2 has joined #zuul15:19
mwhahahacan someone point to me where the failure is on these jobs https://review.opendev.org/#/c/739061/ ? the logs point to they were all successful as far as i can see15:20
corvusmwhahaha: that's a good question.  i don't have an answer yet, but will continue to look15:25
mwhahahathanks, let me know if you figure it out :D15:26
*** ysandeep is now known as ysandeep|away15:26
*** avass has joined #zuul15:28
AJaegercorvus, mwhahaha I don't see the task "List current ipv4 rules" in the log files at all, did ansible got confused?15:32
mwhahahais there a check for that somewhere?15:33
mwhahahai didn't see persist-iptables invoked anywhere actually15:33
mwhahahai did see TASK [Persist iptables rules] tho15:34
mwhahahabut that comes from multi-node-firewall?15:34
*** harrymichal has quit IRC15:37
*** marios is now known as marios|out15:38
EmilienMmwhahaha: yes and it seems to be called in pre/multinode https://opendev.org/zuul/zuul-jobs/src/branch/master/playbooks/multinode/pre.yaml#L1815:38
mwhahahayea but the patch was to persist-firewall instead of that one15:39
mwhahahadoesn't look like it's even exercised in those jobs15:39
mwhahaharm nm the role is persistent-firewall15:40
mordredcorvus: yeah - that's not a terrible idea15:40
mordred(the private test only variable)15:40
corvusmwhahaha: from the executor log: 2020-07-02 15:03:37,973 DEBUG zuul.AnsibleJob: [e: 0501b323688044368f6af4a72ed83ec3] [build: ea61ed0736f74ae3ac618dbc8e5b5b26] Ansible complete, result RESULT_UNREACHABLE code None15:41
corvusmwhahaha: oh wait, that may just be the cleanup playbook; nevermind15:41
openstackgerritGuillaume Chauvel proposed zuul/zuul master: scheduler: Fix event process abide hasUnparsedBranchCache argument  https://review.opendev.org/73904215:41
openstackgerritGuillaume Chauvel proposed zuul/zuul master: Fix branch name and project name for ref-updated event  https://review.opendev.org/73832015:41
openstackgerritGuillaume Chauvel proposed zuul/zuul master: WIP: Improve reconfigure for gerrit ref-updated & various enhancements  https://review.opendev.org/73907815:41
corvusmwhahaha: here we go:15:41
corvus2020-07-02 15:00:37,954 DEBUG zuul.AnsibleJob.output: [e: 0501b323688044368f6af4a72ed83ec3] [build: ea61ed0736f74ae3ac618dbc8e5b5b26] Ansible output: b'ERROR! conflicting action statements: shell, retry'15:42
mwhahahaah15:42
corvus2020-07-02 15:00:37,955 DEBUG zuul.AnsibleJob.output: [e: 0501b323688044368f6af4a72ed83ec3] [build: ea61ed0736f74ae3ac618dbc8e5b5b26] Ansible output: b"The error appears to be in '/var/lib/zuul/builds/ea61ed0736f74ae3ac618dbc8e5b5b26/untrusted/project_0/opendev.org/zuul/zuul-jobs/roles/persistent-firewall/tasks/main.yaml': line 1, column 3, but may"15:42
mwhahahait's retries15:42
mwhahahanot retry15:42
corvusi thought we had those errors showing up in the job output, but i guess not15:42
* mwhahaha = not so smart15:42
openstackgerritAlex Schultz proposed zuul/zuul-jobs master: Make persist-iptables more robust  https://review.opendev.org/73906115:43
mwhahahathat would be helpful to have in output tho :D15:43
corvusyeah, and this is an easily reproducible test case, so we should be able to do that15:43
*** saneax has quit IRC15:43
*** marios|out has quit IRC15:47
*** hamalq has joined #zuul15:57
*** hamalq_ has joined #zuul15:58
*** dmellado has joined #zuul16:00
*** hamalq has quit IRC16:02
openstackgerritGuillaume Chauvel proposed zuul/zuul master: WIP: Improve reconfigure for gerrit ref-updated & various enhancements  https://review.opendev.org/73907816:04
*** dmellado has quit IRC16:20
*** dmellado has joined #zuul16:22
mwhahahacorvus: can you look for the MODULE FAILURE in https://storage.bhs.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_a7f/739061/2/check/zuul-jobs-test-multinode-roles-debian-stretch/a7f2f40/job-output.txt that's actually the bug we're hitting so it would be helpful to know what the actual error is16:23
mwhahahabut there's no useful output other than 'MODULE FAILURE' in the job-output.txt so maybe there's a trace in the executor logs?16:23
corvusmwhahaha: do you have a link to the zuul build page?16:29
mwhahahahttps://zuul.opendev.org/t/zuul/build/a7f2f40f7ebb4db6b275168013e4f1ec16:29
corvusmwhahaha: ah that.  yeah, i checked that yesterday.  there is no more information on the executor; this is absolutely all the information we have: https://zuul.opendev.org/t/zuul/build/a7f2f40f7ebb4db6b275168013e4f1ec/console#1/3/33/primary16:30
corvusmwhahaha: exit code -1316:30
mwhahahastupid modules16:30
corvusmwhahaha: 1 sec let me get you 1 more link16:31
mwhahahaok let me see if i can find the -13 in ansible16:31
corvusmwhahaha: https://opendev.org/zuul/zuul-jobs/src/branch/master/roles/persistent-firewall/tasks/main.yaml#L316:31
corvusmwhahaha: so clearly this has been happening for a while and someone wanted to debug it16:32
mwhahahaha, it fails later as currently written anyway16:32
mwhahahaso let me go see if i can figure out what's happening to give the -1316:32
corvusmwhahaha: exactly, but this is the underlying error.16:32
mwhahahathanks16:32
corvus(the later error is just an undefined var from this one)16:32
corvusmwhahaha: looks like clarkb wrote that comment 9 months ago: https://opendev.org/zuul/zuul-jobs/commit/3c60b35a1933c9a2a95b4439a4a6f276cc49970b16:33
mwhahahayea i saw that. the failed_when false isn't helping16:33
clarkbya I think the idea was maybe running under a shell would emit more infomration16:34
corvusagree; i'm not sure what that shouldn't be considered an error; seems like it should be an error, or we need a comment :)16:34
clarkbbecause maybe python subprocess in ansible for command was masking something16:34
mwhahahathe ansible modules usually end up eating the logs unfortunately16:34
mwhahahaunless it properly catches exceptions16:34
*** nils has quit IRC16:35
corvusin this case, could we really just be getting iptables-save returning -13 with no output?  that's what it seems like to me16:35
corvusso maybe we need to look at iptables-save16:35
mwhahahayea i was going to look to see if it returns -13 or does ansible via python return -1316:35
openstackgerritLuigi Toscano proposed zuul/zuul-jobs master: WIP fetch-coverage-output: direct link to coverage data  https://review.opendev.org/73909916:36
mwhahahagiven that it's a MODULE FAILURE, it's likely something in the ansible execution and not the iptables-save command itself16:38
corvushrm that's a good point16:38
corvusso maybe -13 is from python function in the module16:39
mwhahahait's a good thing i've spent the last few weeks in the ansible internals16:41
* mwhahaha dies a bit more inside16:41
corvus(ftr, i did double check on ze04 to confirm that like the ones we looked up yesterday, there is no additional info in the logs for a7f2f40f7ebb4db6b275168013e4f1ec)16:45
mwhahahaso the -13 is likely comming from the command execution in ansible's ActionModule16:45
mwhahahai found where that error message comes from and it's spitting out the rc from that function16:45
corvusmwhahaha: if we assume (this is a bit of a leap, but not uncommon with negative rc's) that it's errno, that would be eacces: permission denied16:50
mwhahahayea i was wondering about that16:51
mwhahahaof course eacces can be spit out from a bunch of things16:51
mwhahahaspecifically something in here https://github.com/ansible/ansible/blob/devel/lib/ansible/module_utils/basic.py#L2603-L267016:53
corvusmwhahaha, clarkb, fungi: this happens right after "bring subnode bridge interface up" -- is it at all possible that if you run iptables-save right after that, an eacces could happen due to some bringup-related process still happening?16:54
avasscorvus: there is exception handling, block, always, rescue :)16:54
mwhahahait feels like it's a connectivity or internal communication problem. if iptables-save had the eaccess, it wouldn't  be a module failure but rather a task failure16:55
avassoh, well except that you can't catch a specific error16:55
corvusavass, mordred: genius!  there is an ansible_failed_task variable16:55
corvusavass: you can! :)16:55
avassoh well, you're welcome )16:55
corvusavass: so we can verify that the failed task is exactly the task we expect to fail16:56
fungii'd have to dig into what operations iptables-save calls, but it's entirely possible that reading the ruleset may be blocked temporarily while interfaces are added16:56
avasscorvus: yeah just saw it. must have missed that part earlier16:56
fungiand yeah, narrowing it down further that way, if we can, would help16:56
corvusavass: it takes a village :)16:57
mwhahahamaybe it's getting eacess from the fcntl? https://github.com/ansible/ansible/blob/devel/lib/ansible/module_utils/basic.py#L2618-L262017:00
mwhahahait'll return eaces as an error according to https://pubs.opengroup.org/onlinepubs/009695399/functions/fcntl.html17:00
mwhahahait's also not consistent and isn't specific to a target os (we see it on centos, that was a debian failure)17:01
*** jcapitao has quit IRC17:05
corvusmwhahaha: does the latest error mean the retry idea didn't work?17:06
mwhahahayea17:07
mwhahahabecause the module itself failed (probably in the fnctl)17:07
corvusi guess module failures are exempt from retrying?17:07
corvusya17:07
mwhahahaand not the iptables-save command17:07
mwhahahayea module retires are hard fails17:07
mwhahahaer modules failures are hard failures17:07
mwhahahame no word well today17:07
corvusmwhahaha: we can try to turn on verbose mode; but we have to do it on all the executors and then turn it off real quick, otherwise disks fill up with logs17:08
corvusthat might get us a traceback17:08
mwhahahathat being said, isn't that an IOError or an OSError? because that should end up with an 'Error Executing'... log line17:08
mwhahahahttps://github.com/ansible/ansible/blob/devel/lib/ansible/module_utils/basic.py#L2665-L266717:08
mwhahahathat might not be spit out unless you turn verbose on17:09
avasscorvus, mwhahaha: module failures are exceptions rather than task failures. ignore_errors would work but not using failed_when17:09
corvusavass: actually failed_when can be used to ignore this error; it's retries that didn't do what we hoped17:10
avassokay that's strange17:10
corvusyeah, everything about this is strange :)17:10
corvusmwhahaha: want me to verbosify?17:10
mwhahahawe can try it17:10
corvusswitching to #opendev17:10
mwhahahaand then recheck my patch to see if it triggers17:10
*** jpena is now known as jpena|off17:14
*** bhavikdbavishi has joined #zuul17:24
*** bolg has joined #zuul17:27
*** LLIU82 has joined #zuul17:27
*** olaph has joined #zuul17:28
LLIU82hi, guys. I met an error on revoke sudo role. 2020-07-02 16:42:13.242101 | TASK [revoke-sudo : Check if zuul is sudoer]17:29
LLIU822020-07-02 16:42:14.267118 |17:29
LLIU8216:42:14.561017",17:29
LLIU82does it mean I set the sudo access right for the nodeset in a wrong way?17:31
clarkbLLIU82: are the job logs something that you can link to so that we can see more context?17:32
clarkbif not maybe you can use a paste service toshare a bit more of the log content?17:32
avassLLIU82: wrote to you on teams :)17:33
LLIU82PRE-RUN END RESULT_NORMAL: [untrusted : opendev.org/zuul/zuul-jobs/playbooks/tox/pre.yaml@master]17:34
LLIU82[revoke-sudo : Check if zuul is sudoer]17:34
*** LLIU82 has quit IRC17:34
*** LLIU82 has joined #zuul17:38
LLIU82sorry. Since I paste too much. I was moved out of the chat17:39
avassLLIU82: yeah you might want to use something like: http://paste.openstack.org/ and link that instead17:39
LLIU82PRE-RUN END RESULT_NORMAL: [untrusted : opendev.org/zuul/zuul-jobs/playbooks/tox/pre.yaml@master]17:40
LLIU82[revoke-sudo : Check if zuul is sudoer]17:40
LLIU82that general sudo access is actually revoked.]17:40
LLIU822020-07-02 16:42:14.800262 | doc-web |   "rc": 1,17:40
LLIU82ignored: 017:40
fungiLLIU82: that looks like the revoke-sudo role is being executed on a system where zuul's user did not start with permission to call `sudo -n true` though the stdout/stderr fields from the task result would help confirm what happened with it17:46
avassfungi: yeah that's exactly it17:46
fungii thought we had written it so that the "Check if zuul is sudoer" task was allowed to fail, and that was simply used to skip the removal tasks17:47
avassfungi: the user had sudo access but not from the /etc/sudoers.d/zuul file. in a dev environment17:47
fungiahh17:47
fungiwas it the "Prove that general sudo access is actually revoked." task which was failing then?17:48
LLIU82Thanks for helping =D17:48
avassI believe so yep17:48
LLIU82yes, exactly17:48
fungiit was hard to tell from those bits of logs without the full context in paste.openstack.org or somewhere17:48
avassfungi: but I guess I should get working on making that configurable through nodepool, since we really don't want to revoke sudo on static nodes :)17:49
LLIU82sudo right is set in /etc/sudoers instead of /etc/sudoers.d/zuul17:50
LLIU82so revoke failed17:50
LLIU82avass suggested to stop the sudo right17:50
LLIU82I am going to do further test17:51
fungigot it, i agree the revoke-sudo role makes some basic assumptions, but at least it failed safely and did not allow the job to proceed since it detected that it was unable to actually revoke sudo access17:51
fungiso i consider that a good test of the current design for the role, at least ;)17:52
*** bolg has quit IRC17:53
avasswe don't use the /etc/sudoers.d/zuul file on static nodes just to make sure it fails instead of revoking sudo, and we keep a copy of zuul-jobs with some quickfixes but I'm trying to sync everything up so we can use zuul-jobs directly :)17:55
avassI think being able to configure a revoke_sudo variable in nodepool is the last thing that needs to be done17:55
*** zenkuro has quit IRC18:00
*** bhavikdbavishi has quit IRC18:36
mnaseravass: i tihnk revoke-sudo makes a lot of assumptions unfortunately right now18:42
clarkbwell in this case it seems that the setup was intentionally done to prevent revoke sudo from working?18:44
clarkbreading scrollback I think the best option is to not run revoke-sudo on those static nodes18:44
clarkbone way to do that is remove the role from the node, another would be to have zuul static nodes without sudo in the first place18:44
avassyeah but it's more complicated than that18:45
*** armstrongs has joined #zuul19:02
openstackgerritGuillaume Chauvel proposed zuul/zuul master: WIP: Improve reconfigure for gerrit ref-updated & various enhancements  https://review.opendev.org/73907819:05
*** armstrongs has quit IRC19:09
*** harrymichal has joined #zuul19:14
fungimnaser: also the role actually did what it was supposed to: when it identified that it had not revoked sudo permission it raised a failure so the (potentially dangerous) job payload could not proceed19:15
AJaegerthere's https://review.opendev.org/703065 to "improve remove-sudo", not sure whether that would have helped19:17
avassAJaeger: there's also: https://review.opendev.org/#/c/706248/ ;)19:18
AJaeger;)19:18
avassbut it's mostly that we need sudo access on static nodes for reasons and we're lazy so we want to re-use jobs from zuul-jobs without revoking sudo19:19
*** wuchunyang has joined #zuul19:28
fungiyeah, sounds more like there should be a nice switch you can flip to skip revoke-sudo19:32
*** LLIU82 has quit IRC19:35
*** wuchunyang has quit IRC19:40
*** harrymichal has quit IRC19:41
*** harrymichal has joined #zuul19:55
*** hashar has quit IRC19:58
*** harrymichal has quit IRC20:06
*** wuchunyang has joined #zuul20:11
*** sshnaidm|mtg is now known as sshnaidm|afk20:27
*** wuchunyang has quit IRC20:38
*** wuchunyang has joined #zuul20:39
*** wuchunyang has quit IRC20:43
*** wuchunyang has joined #zuul20:45
*** y2kenny has joined #zuul21:12
openstackgerritLuigi Toscano proposed zuul/zuul-jobs master: fetch-coverage-output: direct link to coverage data  https://review.opendev.org/73909921:13
openstackgerritGuillaume Chauvel proposed zuul/zuul master: WIP: Improve reconfigure for gerrit ref-updated & various enhancements  https://review.opendev.org/73907821:18
openstackgerritIan Wienand proposed zuul/zuul-jobs master: multi-node-hosts-file: add ipv6 address if defined  https://review.opendev.org/73895221:26
ianwclarkb: ^ interesting on your thoughts on this one -- it came up in the graphite testing where i'm querying "graphite02.opendev.org" and relying on /etc/hosts to sort it out21:32
ianwyou did something similar in the mirror scripts, poking at the host addresses21:32
ianwmirror test scripts i mean21:32
*** bolg has joined #zuul21:36
clarkbianw: I'm not sure I recall the mirror context, but I can review that21:38
clarkbianw: ok, there is a potential problem there/here. I think that may break on clouds like ovh where the cloud saiys "you've got an ipv6 address" but the hots has no way of configuring it bceaues its not in config drive or metadata service21:40
clarkband they don't RA etc21:40
clarkbI think the idea is good, but I'm not sure how safe it is due to clouds21:41
clarkbthings should still fallback to ipv4 eventually but that will be slow21:41
*** bolg has quit IRC21:45
fungiyeah, there are definitely clouds which report addresses in the api but don't provide any way for the instance to know about them (expecting an out of band service with access to query the api to add the configuration in the instance)21:58
*** bolg has joined #zuul22:15
ianwclarkb/fungi: will they appear in the nodepool vars though?22:21
ianwclarkb: also it looks like https://zuul.opendev.org/t/zuul/build/0aadd709bf7a4e22b23c1a832d8c1016/console caught the iptables problem on suse?22:23
clarkbI think they do appearin nodepool vars. Maybe the solution is to change that first22:25
ianwhrm i had a vague sense we filtered that out in the clouds.yaml22:27
*** pabelanger has joined #zuul22:28
ianw    # OVH has a weird new ipv6 setup that we can't handle properly22:28
ianw    # for now ignore ipv622:28
ianw    force_ipv4: true22:28
ianwtype stuff22:28
clarkbya that forces the useof ipv4  but the ipv6 info is still there22:29
pabelangerhello, we are in the process of renaming all master branches to main for ansible-collections.  I've automated most of the renaming process on github side, but dealing with some stuggles on the zuul side. I was wondering what people thought of the idea of a new zuul-merger command to expire repo state?  Otherwise, if not, I can write an ansible-playbook to stop all zuul mergers, and delete the content22:30
pabelangeron disk22:30
pabelangermost of the issue is around github repos that are in zuul, but humans don't understand how the mergers work. So every so often tags or default branches get delete, and merged fall into a bad state22:31
clarkbpabelanger: I want to say branch renames should be picked up. The default branch doesnt matter much to mergers22:34
clarkbthe scheduler tells the mergers what to merge and where iirc independent of any in repo state22:35
clarkbyou may have a stale master branch on the mergersuntil you clear them out next though22:35
pabelangerhttp://paste.openstack.org/show/795512/22:36
pabelangeris what I see, unless I delete the repo from disk22:36
pabelangerand zuul doesnt' seem to be able to recover from it22:36
clarkbaha22:37
clarkbits specifically HEAD changing22:37
clarkbfor that we may want to check head and update it on repo reset22:38
clarkbpabelanger: I think we can do ^ safely always without human input22:39
pabelangerk, I'm not sure how to do that :)22:40
clarkbwe'd need to query the remote HEAD value then update our local HEADs to match22:42
clarkbI am not sure of hiw to do that in gitpython but should be possible22:42
pabelangerk, maybe I'll check back next week for more help22:43
pabelangerI know people are off for july 4th22:43
pabelangerhave to run now, thanks for info22:43
*** tosky has quit IRC22:54
*** rlandy|ruck has quit IRC22:57
clarkbpabelanger: git remote set-head -a origin is how to do it with cli tools22:59
*** saneax has joined #zuul23:01
*** Goneri has quit IRC23:08
*** bolg has quit IRC23:32
*** hamalq_ has quit IRC23:52

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!