Thursday, 2020-11-26

*** sshnaidm has quit IRC00:04
*** sshnaidm has joined #zuul00:05
*** zenkuro has quit IRC00:40
*** Goneri has quit IRC01:32
*** sshnaidm has quit IRC02:19
*** sshnaidm has joined #zuul02:25
*** bhavikdbavishi has joined #zuul03:03
*** bhavikdbavishi1 has joined #zuul03:54
*** bhavikdbavishi has quit IRC03:55
*** bhavikdbavishi1 is now known as bhavikdbavishi03:55
*** vishalmanchanda has joined #zuul04:22
*** bhavikdbavishi has quit IRC04:26
*** bhavikdbavishi has joined #zuul04:26
*** wuchunyang has joined #zuul04:52
*** wuchunyang has quit IRC04:57
*** wuchunyang has joined #zuul04:58
*** evrardjp has quit IRC05:33
*** evrardjp has joined #zuul05:33
*** jfoufas1 has joined #zuul05:58
*** bhavikdbavishi1 has joined #zuul05:58
*** bhavikdbavishi has quit IRC06:00
*** bhavikdbavishi1 is now known as bhavikdbavishi06:00
*** jfoufas1 has quit IRC06:12
*** saneax has joined #zuul06:42
*** jfoufas1 has joined #zuul06:45
openstackgerritIan Wienand proposed zuul/nodepool master: rename imagesdir/elementdir with underscore  https://review.opendev.org/c/zuul/nodepool/+/76427906:52
openstackgerritIan Wienand proposed zuul/nodepool master: Add images-dir-required-free option  https://review.opendev.org/c/zuul/nodepool/+/76428006:52
*** bhavikdbavishi has quit IRC06:55
*** bhavikdbavishi has joined #zuul07:21
*** mach1na has joined #zuul07:22
*** rpittau|afk is now known as rpittau07:26
*** reiterative has quit IRC07:26
*** reiterative has joined #zuul07:27
openstackgerritTobias Henkel proposed zuul/nodepool master: Drop python 3.5 support  https://review.opendev.org/c/zuul/nodepool/+/76428207:43
tobiashzuul-maint: this should unbreak the nodepool gate ^07:43
*** hashar has joined #zuul07:47
*** jcapitao has joined #zuul08:05
tobiashianw: I've commented on https://review.opendev.org/c/zuul/nodepool/+/764280, what do you think?08:10
*** saneax has quit IRC08:14
*** Phoenikzz has joined #zuul08:16
*** saneax has joined #zuul08:19
*** jpena|off is now known as jpena08:24
*** tosky has joined #zuul08:37
*** bhavikdbavishi has quit IRC08:47
*** bhavikdbavishi has joined #zuul08:51
*** mach1na has quit IRC08:56
openstackgerritTobias Henkel proposed zuul/nodepool master: Drop python 3.5 support  https://review.opendev.org/c/zuul/nodepool/+/76428209:21
*** bhavikdbavishi has quit IRC09:21
*** bhavikdbavishi has joined #zuul09:23
zbrapparently tox-py36 tries to run on xenian and fails due to bindep... https://zuul.opendev.org/t/zuul/builds?job_name=tox-py36&project=zuul/nodepool09:24
zbrwhen we do not add jobs to periodic pipelines they can rot, last success was back in march09:25
*** bhavikdbavishi has quit IRC09:28
tobiashyeah, updated that (forgot to remove the nodeset override)10:00
*** mach1na has joined #zuul10:02
*** wuchunyang has quit IRC10:11
*** wuchunyang has joined #zuul10:12
*** wuchunyang has quit IRC10:16
zbrtobiash: maybe you can help with https://review.opendev.org/c/zuul/zuul/+/763333 ?10:22
tobiashzbr: are the existing comments addressed?10:24
zbryep. i home i did not miss any.10:25
zbrit went bit different than the one i proposed on zuul-discuss.10:25
tobiashk, I'll try to get to this today10:35
*** ashbullock has joined #zuul10:43
*** bhavikdbavishi has joined #zuul11:10
*** Eighth_Doctor has quit IRC11:34
*** mordred has quit IRC11:34
*** masterpe has quit IRC11:35
*** zenkuro has joined #zuul11:43
*** mordred has joined #zuul11:43
*** bhavikdbavishi has quit IRC11:54
*** bhavikdbavishi has joined #zuul11:55
*** jcapitao is now known as jcapitao_lunch11:58
*** masterpe has joined #zuul12:00
*** Eighth_Doctor has joined #zuul12:00
*** mach1na has quit IRC12:14
*** bhavikdbavishi1 has joined #zuul12:31
*** bhavikdbavishi has quit IRC12:33
*** bhavikdbavishi1 is now known as bhavikdbavishi12:33
*** ianychoi_ has joined #zuul12:35
*** ianychoi has quit IRC12:36
*** rfolco has joined #zuul12:37
*** zenkuro has quit IRC12:43
*** zenkuro has joined #zuul12:43
*** jcapitao_lunch is now known as jcapitao12:44
*** mach1na has joined #zuul12:57
openstackgerritFelix Edel proposed zuul/zuul master: Switch to using zookeeper instead of gearman for jobs  https://review.opendev.org/c/zuul/zuul/+/76250613:09
openstackgerritFelix Edel proposed zuul/zuul master: WIP Switch to ZooKeeper backed result event queues  https://review.opendev.org/c/zuul/zuul/+/76434413:09
*** rfolco is now known as rfolco|ruck13:09
*** ikhan has joined #zuul13:35
*** bhavikdbavishi has quit IRC13:37
*** Phoenikzz has quit IRC13:49
*** zenkuro has quit IRC14:09
*** zenkuro has joined #zuul14:09
*** Goneri has joined #zuul14:13
*** ikhan has quit IRC14:42
*** frickler is now known as frickler_pto15:02
*** ikhan has joined #zuul15:02
*** iurygregory has quit IRC15:02
*** ikhan has quit IRC15:07
avassit should be alright to add artifact information to the mqtt reporter right?15:13
avasswe technically only want metadata from artifacts produced by jobs as well :)15:15
fungipresumably okay, i have a feeling the mqtt reporter is already leaking privileged information if it's not acl'd similarly to tenant restrictions on data availability anyway15:16
fungiit's hard for me to reason through since the zuul i help run is 100% public so i tend to have blind spots as to what sorts of access control other deployment models might require15:17
mhuIIRC ACL could be set broker-side for MQTT15:19
fungiyep, mosquitto can acl specific topics/prefixes/patterns15:20
fungiand i think we include tenant early in the topic string, so that wouldn't be hard to match on15:21
*** saneax has quit IRC15:41
*** ashbullock has quit IRC15:44
*** sduthil has quit IRC15:48
*** hashar has quit IRC15:48
*** sduthil has joined #zuul15:52
avassfungi: the mqtt already reports job_name, log_url, result etc so I don't think having an artifact link or the metadata provided to zuul should hurt16:02
avassand yeah the tenant is the first part of the topic16:03
avassoh no or at least it is for the examples16:04
avassthough maybe it would be good if it was possible to configure what should be reported by the mqtt driver16:07
*** jfoufas1 has quit IRC16:38
*** mach1na has quit IRC16:58
*** jcapitao has quit IRC17:00
avassdoes anyone have an idea why a github driver wouldn't work. I think I've set it up correctly and the api is receiving the webhook notifications but there doesn't seem to be anything happening in the scheduler17:15
avassit's also able to checkout repos and load pipelines/jobs etc17:15
fungii think it needs branch protection enabled or it skips reading configuration in those branches17:16
avasshmm maybe it's that17:16
fungii will readily admit to knowing little about the github driver aside from what's in our docs17:16
*** tosky has quit IRC17:17
avassexclude-unprotected-branches seem to default to false but it might be a good idea to enable it anyway17:19
*** mach1na has joined #zuul17:23
*** rfolco|ruck has quit IRC17:40
*** wuchunyang has joined #zuul17:45
*** wuchunyang has quit IRC17:50
avassalright I fixed that but now I'm getting a traceback in the graphql: http://paste.openstack.org/show/800472/17:55
tobiashI think it should be enabled by default17:55
avassnot sure if that's a config error on my part or something else17:55
tobiashavass: your github app might lack the checks api access17:56
avasslet me check17:56
avassit has read&write for checks17:56
avassthough, I don't have any checks so could that be None and the code just doesn't check for that?17:57
tobiashand for status?17:58
tobiashThe whole graphql call fails if a permission is wrong17:59
avasscommit status? read&write17:59
avassjust saw the logs is saying 401 so yeah17:59
tobiashRepo administration read? (Needed to query branch protection)18:00
avass>  Read access to administration and metadata18:01
avass>  Read and write access to checks, code, commit statuses, issues, and pull requests18:01
avassI got that18:01
avasspretty sure I double checked the permissions that were documented but I guess I could have missed something18:02
tobiashI also have read for org members, but that should not be needed for this call18:02
tobiashwhat about pull requests read/write?18:03
tobiashthere is issues and pull requests separately18:04
tobiashah you mentioned that18:04
tobiashdid you change the permissions of the github app? in that case you need to accept them in all installations18:04
avassdon't think so, guess I could re-installing it18:05
avassoh, uninstalling removes it when it's on a personal account18:06
tobiashand I guess we should add better error handling into the graphql calls and catch and log errors there18:06
avassand I can't see an option of accepting any new permissions18:07
tobiashevery installation owner gets an email when the permission change18:07
avassso reinstalling it didn't work and I don't think I've gotten and email18:08
tobiashdid you restart zuul after re-installing?18:09
tobiashif not it might have cached the old installation id18:09
avassthat didn't seem to help either :/18:11
tobiashstill 401?18:11
avassyep18:12
avassbut only on the graphql18:12
tobiashthat is weird18:12
tobiashbut you're using app auth right?18:12
avassyeah18:12
avassoh..18:13
avassThink I found ot18:13
avasshmm no18:15
avassfound it18:16
tobiashwhich administration did you enable?18:16
avassthe key file was misspelled18:16
tobiashrepo or org?18:16
avassthat could probably be handled better since I couldn't see any error related to that18:16
tobiashoh :D18:16
tobiashhow did the other requests work?18:17
avassI guess they don't need any authentication18:17
avassthat was teh only graphql one18:17
tobiashcould be18:17
avassnow I'm getting this instead:  "Failed to create check run vassast/check: 422 Validation Failed"18:17
avassheh :)18:18
tobiashare you using file comments?18:18
avassI'm still trying to get this set up so no :)18:19
tobiashk, if you will, more than 50 will fail without https://review.opendev.org/c/zuul/zuul/+/76286918:19
avassoh18:21
avassthe executor seem to fail since I haven't set up any ssh keys18:22
avassI guess I'll set up a dummy one since I'm only using k8s :)18:22
openstackgerritTobias Henkel proposed zuul/zuul master: Add debugging information to 422  https://review.opendev.org/c/zuul/zuul/+/76437818:23
tobiashyou can use that to further analyze the 422 ^18:23
tobiashI added this to our deployment lately to debug occasional 422 we see when reporting check runs18:24
avassmaybe the executor shouldn't fail if the ssh-agent can't load an ssh-key since the connection isn't guaranteed to be ssh18:27
avassbut in practice most zuuls are probably using that the most18:27
*** jpena is now known as jpena|off18:28
*** saneax has joined #zuul18:29
avasstobiash: thanks!18:29
avassdoes the kubernetes driver handle private registries?19:17
*** sassyn has joined #zuul19:21
sassynhi all19:21
sassynGood evening19:21
avasshello :)19:23
sassynQuick question: Consider the following: I have 10 nodes in my node pool. There is 10 REPO configured as untrusted Repo + 1 Repo which  hold all the zuul/ansible jobs/roles.19:23
sassynPUSH EVENTS comes to Gerrit for repo X, Y, Z, M, O, Z, X, X , M, X, X, Y, X, X, X , X, X ,X, L, O, P etc..19:24
sassynI want zuul to trigger a gate job for all, but limit the repo X to take up to 3 nodepool19:25
sassynin parallel19:25
avassso you want to limit the number of nodes for a repo?19:26
sassynyes19:26
avassI don't think there's a direct way of doing that19:27
sassynhmmmm19:29
avassyou could however use different pipelines for that repo with a lower priority19:31
sassynbut I have a general pipeline in my zuul-config trusted one19:38
sassynif I had a local pipeline in the project19:38
sassynwill this overwrite the global one?19:38
avassyou can only define pipelines in a config repo, so no19:38
sassynhmm OK19:40
*** saneax has quit IRC19:44
fungiif the projects use different queues, the zuul's queuing strategy should prevent x from monopolizing the available resources by trying to enqueue equal numbers of items for the other projects first19:50
fungiimplemented by https://review.openstack.org/620954 which merged two years ago19:52
fungisassyn: ^19:53
*** mach1na has quit IRC19:56
sassynping fungi20:03
sassynShalom20:03
sassynHow are you?20:03
sassynhope everything is good on your side20:03
*** mach1na has joined #zuul20:03
sassynavass: I think I can use the Semaphore option20:04
sassynbut maybe there is a better way20:04
*** mach1na has quit IRC20:08
*** rfolco has joined #zuul20:10
sassynI guess other option is to set in the nodeset for the job and then assign lets say 3 nodes with this label. then the gate will work up to the limit of the nodepool with this limit20:20
sassynbut this is a waste of resources cause it might that this node will be free as there is no commit to repo X20:21
sassynlet's see what fungi will say20:21
fungiyes, restricting a project to its own nodeset and limiting the number of nodes available for that, or setting a semaphore for the jobs run by that pronect, are probably also viable options. zuul tries to provide fair queuing between projects but also allows projects to use all the available resources if they're the only ones requesting them, so that they don't get forced to wait for their builds to start if20:31
fungithere are available resources not requested by any other project20:31
*** sshnaidm has quit IRC20:41
*** rpittau is now known as rpittau|afk20:45
*** tosky has joined #zuul21:09
*** wuchunyang has joined #zuul21:47
*** wuchunyang has quit IRC21:52
*** vishalmanchanda has quit IRC22:21
*** sassyn has quit IRC22:33
*** sshnaidm has joined #zuul23:00
*** sshnaidm is now known as sshnaidm|off23:01
*** holser_ has joined #zuul23:18
*** holser has quit IRC23:19
*** rfolco has quit IRC23:32
*** rfolco has joined #zuul23:32
*** sean-k-mooney has quit IRC23:34
*** sean-k-mooney has joined #zuul23:36

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!