| *** frenzy_friday is now known as frenzyfriday|rover | 04:26 | |
| mnaser | noonedeadpunk: i hope you are staying safe :( | 06:00 |
|---|---|---|
| noonedeadpunk | mnaser: I was lucky to get out 6 days ago to Poland... | 06:54 |
| noonedeadpunk | not sure about futher steps, but at least safe | 06:54 |
| noonedeadpunk | thanks for asking, much appreciated | 06:55 |
| mnaser | noonedeadpunk: damn :( good luck⦠hope family and all is safe there | 07:18 |
| noonedeadpunk | me too... | 07:19 |
| opendevreview | Andrew Bonney proposed openstack/openstack-ansible-plugins master: Add reference_group support to provider_networks module https://review.opendev.org/c/openstack/openstack-ansible-plugins/+/829741 | 08:27 |
| jrosser | morning | 08:58 |
| damiandabrowski[m] | hey! | 08:59 |
| noonedeadpunk | o/ | 09:03 |
| opendevreview | Jonathan Rosser proposed openstack/ansible-role-pki master: Fix variable names for certificate CSR fields https://review.opendev.org/c/openstack/ansible-role-pki/+/830793 | 09:32 |
| opendevreview | Jonathan Rosser proposed openstack/ansible-role-pki master: Refactor conditional generation of CA and certificates https://review.opendev.org/c/openstack/ansible-role-pki/+/830794 | 09:36 |
| jrosser | trying to use pki role for keystone has surfaced a few bugs | 09:46 |
| jrosser | thats a bit WIP atm but i think cleaner | 09:47 |
| damiandabrowski[m] | weird, looks like my credential keys suddenly stopped being able to decrypt credentials | 11:16 |
| damiandabrowski[m] | i mean, they can decrypt newly created credentials but can't handle the old ones | 11:17 |
| damiandabrowski[m] | that's also why rotation fails(for security reasons, keystone needs to be able to decrypt all credentials in order to rotate keys) | 11:17 |
| damiandabrowski[m] | do You have any idea how could it happen? I wonder if it has something to do with the fact that index of primary key is 99(but I think it's just a coincidence) | 11:18 |
| damiandabrowski[m] | i can't find anything indicating that keystone was ran with `--limit`, but even if so, it shouldn't break my keys right? (at least that's how i understand the code) | 11:19 |
| jrosser | i think we broke the infra jobs | 11:25 |
| jrosser | keystone is always needed https://github.com/openstack/openstack-ansible/blob/2d47f9d129465b03849c15d58090d161b750271e/tests/roles/bootstrap-host/vars/main.yml#L22 | 11:27 |
| *** dviroel_ is now known as dviroel | 11:28 | |
| opendevreview | Jonathan Rosser proposed openstack/openstack-ansible master: All of the deployment scenarios require keystone https://review.opendev.org/c/openstack/openstack-ansible/+/830806 | 11:30 |
| opendevreview | Jonathan Rosser proposed openstack/ansible-role-pki master: Refactor conditional generation of CA and certificates https://review.opendev.org/c/openstack/ansible-role-pki/+/830794 | 11:34 |
| opendevreview | Jonathan Rosser proposed openstack/ansible-role-pki master: Fix variable names for certificate CSR fields https://review.opendev.org/c/openstack/ansible-role-pki/+/830793 | 11:34 |
| opendevreview | Jonathan Rosser proposed openstack/ansible-role-pki master: Refactor conditional generation of CA and certificates https://review.opendev.org/c/openstack/ansible-role-pki/+/830794 | 12:12 |
| *** sshnaidm is now known as sshnaidm|off | 12:23 | |
| *** dviroel is now known as dviroel|brb | 14:01 | |
| *** dviroel|brb is now known as dviroel | 14:23 | |
| *** dviroel is now known as dviroel|lunvh | 16:03 | |
| *** dviroel|lunvh is now known as dviroel|lunch | 16:03 | |
| *** dviroel|lunch is now known as dviroel | 16:58 | |
| spatel | any idea how to share snapshot with other project? | 19:01 |
| spatel | I have created snapshot in project1 and now i want project2 members can access that snapshot to create vm | 19:02 |
| *** dviroel is now known as dviroel|afk | 20:54 | |
| *** dviroel|afk is now known as dviroel | 23:37 | |
Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!