Tuesday, 2025-12-02

*** ykarel_ is now known as ykarel07:35
opendevreviewMerged opendev/system-config master: Update zuul_reboot package upgrade error conditions  https://review.opendev.org/c/opendev/system-config/+/96827015:06
fungilooking at the latest task timeouts in post-run for https://review.opendev.org/966200 i think we should be increasing the wait for image checksums to be returned by the api. does that make sense?15:19
clarkbfungi: I think that checksum is calculated locally not the cloud api. But maybe I misunderstand what you mean?15:49
clarkblooking at https://zuul.opendev.org/t/opendev/build/839501858a3647a885bc0d9ec02cab9e/console we appear to start the hashing then about 31.5 minutes later check if they are done find that they are not and discover we are past our timeout15:52
clarkbI thought we were setting that timeout to a much longer value I seem to recall a change for that. Maybe that didn't have the effect we anticipated?15:53
fungioh, got it. i was trying to figure out why the task only ran for 1 second and then timed out15:56
fungii wonder why we called it "Wait for sha256" if we're generating it locally rather than polling the api15:57
clarkbfungi: it is an asynchronous ansible task that is waiting for the previuosly started hash summing task to complete15:59
clarkbfungi: the idea is we can do the swift upload which is network io concurrently with the hashing which is local io and cpu computation and not suffer performance impacts I think. But maybe that assumption is wrong and they are impacting one another15:59
clarkbhttps://codesearch.opendev.org/?q=upload_image_swift_hash_timeout&i=nope&literal=nope&files=&excludeFiles=&repos= maybe the chnage didn't merge yet? that seems to still be set to 10 minutes16:01
fungioh, huh or it was a different one i changed to 20 minutes16:06
clarkbfungi: oh was it only 20 minutes? that is still shorter than the time it took there so maybe my query is insufficient to find it and it is 20 minutes but that is still too short16:07
fungior maybe i'm thinking of https://review.opendev.org/968259 that increased the boot-timeout for osuosl16:07
fungiyeah, that was changed from 2 minutes to 1016:08
fungithe other timeout change was that we upped the job to 3 hours16:08
clarkback so we probably just need a change to bump this additional timeout value to 60 minutes or even higher so that we can determine how much time is necessary16:09
opendevreviewClark Boylan proposed opendev/zuul-providers master: Increase upload_image_swift_hash_timeout  https://review.opendev.org/c/opendev/zuul-providers/+/96927116:47
clarkbfungi: ^ something like that maybe16:47
corvusi seem to recall suggesting that maybe we should just set the timeout in the role to a very big number or maybe disable it completely if possible?17:06
clarkbcorvus: oh that works too. I think if we drop the retries value entirely then we'll wait for the until: clause to evaluate to true17:08
clarkband then we can let the job timeout handle things17:08
clarkbI'll write that change momentarily17:08
corvusyeah i was just looking up the docs to try to confirm that17:08
clarkboh wait async takes a timeout value too17:09
corvusi think using a big number may be the only way.  so maybe we should just change the default for that variable in the role17:11
corvus24h or something :)17:11
clarkbya I can't find any indication that async: takes a "no timeout" value17:11
opendevreviewClark Boylan proposed zuul/zuul-jobs master: Set image upload hash timeout to 24 hours  https://review.opendev.org/c/zuul/zuul-jobs/+/96927517:15
clarkbcorvus: ^ I think that should do it17:15
corvusclarkb: yep except readme doc update17:17
opendevreviewClark Boylan proposed zuul/zuul-jobs master: Set image upload hash timeout to 24 hours  https://review.opendev.org/c/zuul/zuul-jobs/+/96927517:19
clarkbreadmes now updated too17:19
corvus+317:36
clarkbI abandoned the other change17:41
opendevreviewMerged zuul/zuul-jobs master: Set image upload hash timeout to 24 hours  https://review.opendev.org/c/zuul/zuul-jobs/+/96927517:48
fungipithon adds another digit: https://www.python.org/downloads/release/python-3141/18:18
fungithough 3.14.15 won't come until early 202818:20
corvus#status log statusbot functional check19:25
opendevstatuscorvus: finished logging19:25
clarkbdoes anyone remember if creating users for the oepndev.org matrix server happens through the ems management console? I think it must?19:50
clarkblooks like the gerrit bot is gerrit:opendev.org so status:opendev.org is probably what we want for that account19:54
corvusyes and sgtm20:24
fungiseems right, yep21:07
clarkbhrm adding a new user says an email address is required. Looking at the eavesdrop and gerritbot accounts neither appear to have an email address assoicated with them. I guess this is a new requirement?21:56
clarkbfungi: do you know if you can do infra-root+matrixstatus type email addresses with the email host for that address? Thinking that might be the simplest solution here21:57
clarkbI guess I can just send email to that address and see if it works21:58
clarkbhrm in the hosts configuration infra-root is the only email address listed as a valid address to register from. I feel like the way we've been trying to use this server is a bit of a corner case for them and in the past it didn't matter until they updated web forms? Anyway this implies to me that maybe I should just use infra-root but I worry that without unique addresses other22:03
clarkbthings might get angry22:03
clarkbbut also my test email hasn't arrived yet so thinking +matrixstatus won't work either22:04
clarkbhttps://element.io/en/help says `It's ultimately up to the administrator of the server to decide whether or not you need to use an email address when creating a Matrix account.` but I can't find a toggle to make it optional in the user creation for our server via the service22:08
clarkbhttps://docs.element.io/latest/element-cloud-documentation/element-matrix-services/add-users/ seems to show that it did indeed work without an email address at one time22:09
clarkbBeginning to wonder if this is worth a support ticket22:10
clarkbI'll pause here so that others can sanity check me (pebkac wouldn't surprise me) and switch over to figuring out the necessary configuration management updates for when we do have an account22:12
clarkbbut if we think a support ticket makes sense I can submit one later22:12
fungiyeah, sounds like a new setting/default we'll need to override?22:12
fungimaybe it's hidden in the server options?22:13
clarkbI did look at the server config which is where I found the limit on which email addresses and domains we would accept registrations from22:13
clarkbbut I couldn't find anything that indicated "allow registration without email"22:13
fungiyeah, i guess a support ticket is in order then22:18
opendevreviewClark Boylan proposed opendev/system-config master: Add matrix config support to statusbot deployment  https://review.opendev.org/c/opendev/system-config/+/96932822:51
clarkbI based ^ on the existing irc configuration. Will be interesting to see if things just explode due to not having valid auth in testing22:52
clarkbI think IRC servers will just accept the connection even if auth fails so things mostly work on the irc side? anyway we shall soon know22:52
clarkboh I need to edit the hashtag22:52
clarkbjust to followup on the +emailsubcategory thing I still don't see my email so either it got eaten by a spam filter, it got sorted into an unxpected folder or it doesn't work23:04
clarkbfor some reason I thought we had tested this in the past and it did work but seems not to23:04
corvusclarkb: note on 32823:05
clarkbcorvus: yes, I think that value is in system-config so that testing works. Maybe the best thing to do here is move the username and password combo for both irc and matrix into the zuul template for the eavesdrop group to cover testing and then also expect it to be on bridge in a similar private group var setup23:07
clarkbcorvus: but I agree getting it out of the role as a default when the default doesnt' work is a good idea23:07
fungiSubject: Testing from clarkb23:07
corvusyeah, that matches my mental model for how we do most things23:08
fungiit got delivered to INBOX.matrixstatus23:08
clarkbfungi: oh does it automatically sort into subfolders?23:08
fungithe delivery rules make new subfolders for any +extension yes23:08
clarkbfungi: ok and I'm guessing thunderbird doesn't automatically add new folders so I may need to ask imap to look again or something23:09
clarkbbut good to know that is a potential solution to this problem23:09
clarkbonce I get ci results back I'll work on a new patchset (just want to make sure I don't need to fix anything else ci may catch)23:10
opendevreviewMerged opendev/zuul-providers master: Add trixie-arm64  https://review.opendev.org/c/opendev/zuul-providers/+/96620023:21
corvusit ran the gauntlet!23:24
opendevreviewClark Boylan proposed opendev/system-config master: Add matrix config support to statusbot deployment  https://review.opendev.org/c/opendev/system-config/+/96932823:25
opendevreviewClark Boylan proposed opendev/system-config master: Move test IRC statusbot config into test specific vars file  https://review.opendev.org/c/opendev/system-config/+/96933023:25
clarkbcorvus: ^ and that is the promised update. I decided to split the irc refactor into a parent change as I think that will make historical undersatnding better23:25
clarkbin theory that irc var location refactor is safe to alnd any time. But we don't have secret vars for the matrix config update yet so that one should hold off until I sort ou the account there23:31
corvusclarkb: you moved the server var; was that intentional?  (i think it could stay in defaults or public hostvars)... 23:35
corvusi feel like anything in playbooks/zuul/templates is something we're saying comes from bridge, and i don't think we want to make that private?23:37
clarkbcorvus: oh yes good point. I moved it beacuse I put the homeserver value in there as part of the user for matrix but that isn't an equivalent setup for irc23:37
clarkbcorvus: do you think the homeserver value should be a default value too? or do you think we should define that on bridge alongside the user id?23:39
clarkb(just to amke sure I understand the matrix side expectation)23:39
opendevreviewClark Boylan proposed opendev/system-config master: Move test IRC statusbot config into test specific vars file  https://review.opendev.org/c/opendev/system-config/+/96933023:42
opendevreviewClark Boylan proposed opendev/system-config master: Add matrix config support to statusbot deployment  https://review.opendev.org/c/opendev/system-config/+/96932823:42
clarkbthat is irc fixed with my interpretation above. Happy to update the matrix change if we think the homeserver should go in defaults23:42

Generated by irclog2html.py 4.0.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!