Thursday, 2023-06-08

fungii am often least convinced by the things i write00:00
opendevreviewTony Breeds proposed opendev/system-config master: [dnm] checking testing for the existing registry  https://review.opendev.org/c/opendev/system-config/+/88552400:02
opendevreviewTony Breeds proposed opendev/system-config master: [DNM] Test insecure-ci-registry.opendev.org on jammy  https://review.opendev.org/c/opendev/system-config/+/88542100:17
ianwit is quite suspicious that arm64 builds https://zuul.opendev.org/t/openstack/build/249b0f5ce2384516933eb1e91c8af52e/log/dkms-make-logs/var/lib/dkms/openafs/1.8.9-1.el9/5.14.0-319.el9.aarch64/aarch64/log/make.log00:29
fricklerianw: I would support option 3), which kind of matches the current plan for devstack05:33
*** amoralej|off is now known as amoralej06:02
*** amoralej is now known as amoralej|lunch12:27
*** amoralej|lunch is now known as amoralej13:03
opendevreviewTony Breeds proposed opendev/system-config master: [DNM] Test insecure-ci-registry.opendev.org on jammy  https://review.opendev.org/c/opendev/system-config/+/88542115:07
*** amoralej is now known as amoralej|off15:19
opendevreviewTony Breeds proposed opendev/system-config master: [DNM] Test insecure-ci-registry.opendev.org on jammy  https://review.opendev.org/c/opendev/system-config/+/88542115:49
opendevreviewTony Breeds proposed opendev/system-config master: [DNM] Test insecure-ci-registry.opendev.org on jammy  https://review.opendev.org/c/opendev/system-config/+/88542116:16
opendevreviewTony Breeds proposed opendev/system-config master: [DNM] Test insecure-ci-registry.opendev.org on jammy  https://review.opendev.org/c/opendev/system-config/+/88542116:40
clarkbtonyb: did comparing to the existing setup help at all?16:41
tonybNot really, it "just works" on the current version.16:41
tonybif this build doesn't make progress I'll put all the debugging stuff into a patch do the jammy update on top of that.16:42
clarkbtonyb: did it have the swift auth exception too?16:42
tonybYeah same error in the registry log but the registry started.16:43
clarkbweird16:43
tonybbut current *guess* is that the docker verions in bionic and jammy differ in how host networking exposes ports16:43
tonybon jammy the conatiner *is* running (well not in my last couple of patches becuse I broke it) but the port (:5000) isn't visible/bound to the hosts networking stack16:44
clarkbtonyb: even with host networking set?16:45
tonybYup16:45
clarkbweird16:45
clarkbwe can hold a node to inspect that16:45
clarkb(though I need to load my ssh keys to do that first)16:46
fungii can set an autohold if you have the details16:47
fungichange/job16:47
tonyb885241/system-config-run-docker-registry16:48
fungisudo zuul-client autohold --tenant=openstack --project=opendev.org/opendev/system-config --job=system-config-run-docker-registry --ref='refs/changes/41/885241/.*' --reason='tonyb investigating docker issues on jammy'16:51
fungithe trap is set16:51
fungion the next failure, let me know what ssh key you want added16:51
tonybSo it's tha same docker version: https://paste.opendev.org/show/bMPMlV5o0rBTrYjdwq8t/16:52
tonybfungi: Thanks16:55
opendevreviewTony Breeds proposed opendev/system-config master: [DNM] Test insecure-ci-registry.opendev.org on jammy  https://review.opendev.org/c/opendev/system-config/+/88542117:07
fungitonyb: ssh root158.69.69.18217:53
fungier, root@158.69.69.18217:53
tonybroot@158.69.69.182: Permission denied (publickey).18:00
fungier, checking18:01
tonybThanks18:01
tonybI tried zuul@ also 18:01
fungitonyb: try root again? i think the way i appended the authorized_keys file caused it to not end with a newline, so opensshd may not have liked t hat18:02
tonybSame result18:02
fungithis may be due to special configuration in our deployment orchestration limiting root user access, i'll pivot18:03
tonybokay18:03
fungitonyb: try zuul@18:04
tonybbingo18:04
fungicool, hopefully the zuul user can sudo whatever but let me know if you need someone with root perms to make it possible18:06
tonybNope sudo is working18:06
fungicool18:07
clarkbya we restrict the source of root logins iirc18:07
clarkbwhich is fine for the rest of us because it splats our users down18:07
fungiright, i just didn't realize that would impact appending a key to ~root/.ssh/authorized_keys on a test deploy18:08
tonybIt looks like the zuul-registry process spawned by dumbinit is crashing sometime after it lots the authexception18:20
clarkbfirstthought was a python version difference but that is fixed by the container. That is really odd considering that the appljication itself should be basically the same between the two systems due to the container18:22
clarkbtonyb: did it provision a self signed cert using the fake LE stuff (when I read the logs it looked like it was doing so but maybe that is failing somewhere preventing it from listening on the socket?)18:23
tonybIt looks like it has /etc/letsencrypt-certs/insecure-ci-registry99.opendev.org/ has a bunch of files18:24
clarkbcool it probably worked then. There should be a .cert iirc18:24
clarkbif there is a .cert then the fake negotiation worked18:24
clarkbmaybe it is .crt18:24
tonyb.cer, .csr, .key18:24
clarkbprobably not the cert then. Maybe need to strace the container process (probably no strace in the container though) or add extra debugging somehow18:26
tonybYeah, I'm puzzling how to do some of that.18:27
tonybI have a meeting I need to go to18:28
tonybOkay so my current theory is that a) the underlying problem *is* the keystone auth issue killing the container and docker[1] restarting it ; and b) somehow the 'bionic' node keeps the service "alive" long enough for the registry to appear to be up.19:39
tonyb[1] despite what I said earlier about the dumbinit restarting things I think it's docker19:40
tonybI'm just not sure how to really test it19:40
tonybfungi: I think you can remove the autohold while I ponder19:40
tonybOkay /me has a some ideas20:00
fungiwill do, thanks20:25
fungicleaned up20:27
tonybThanks20:28
opendevreviewTony Breeds proposed opendev/system-config master: [DNM] Test insecure-ci-registry.opendev.org on jammy  https://review.opendev.org/c/opendev/system-config/+/88542120:42
opendevreviewTony Breeds proposed opendev/system-config master: [DNM] Add debbugging to docker config  https://review.opendev.org/c/opendev/system-config/+/88565920:42
clarkbtonyb: we may just want to check that docker is starting the container rather than check for the port being open21:09
tonybWell that'd work too, but feels kinda scary without confirmation that my hunch is in the right ballpark21:10
tonybI can confirm that both bionic and jammy *DO NOT* show port 5000 being open and in listen right after docker-compose up completes and that the conatiner is restarted by dockerd at least once while the job is running21:12
opendevreviewTony Breeds proposed opendev/system-config master: [DNM] Add debbugging to docker config  https://review.opendev.org/c/opendev/system-config/+/88565921:19
opendevreviewTony Breeds proposed opendev/system-config master: [DNM] Test insecure-ci-registry.opendev.org on jammy  https://review.opendev.org/c/opendev/system-config/+/88542121:19

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!