Wednesday, 2023-05-10

jakeyipI'm here if someone needs me08:55
mnasiadkaAre there any important changes to review?09:00
jakeyiphi mnasiadka good to see you. Hope to drop bay / baymodel  https://review.opendev.org/c/openstack/magnum/+/803780 09:02
jakeyipwhat about you?09:03
mnasiadkaseems tests are passing, let's merge it - I did double check and it seems all of bay stuff is gone after this change09:04
jakeyipyeah might rebase rico's change to simplify it09:04
mnasiadkasurely09:05
mnasiadkaI don't have anything, need to tie some loose ends on kolla side so we can do Antelope release, once that's done I intend to spend more time on Magnum09:05
jakeyipcool. I think magnum will probably release a working antelope version after these patches09:06
mnasiadkanow it doesn't work? ;-)09:08
jakeyipnope, we missed getting the barbicanclient patch in :D09:09
mnasiadkahaha09:10
jakeyipI'm still working on a few things09:11
jakeyip1) deprecate k8s ironic - I don't even know how to test for this09:12
jakeyip2) remove podsecuritypolicy - I think if removing doesn't break current clustertemplates, it should be fine, but I have to test it. there seems to be a lot of interest in this because it is preventing us moving forward09:13
jakeyip3) secure rbac09:15
jakeyip4) tidy up docs09:15
jakeyiphow goes testing mnasiadka ?09:16
mnasiadkak8s ironic? hmm, wonder how that is different than the normal one09:19
mnasiadkatesting - will continue after I fix last issue in Kolla09:23
jakeyipcool09:23
jakeyipre: ironic, it uses a fedora OS https://github.com/openstack/magnum/blob/master/magnum/drivers/k8s_fedora_ironic_v1/driver.py#L24-L26 https://opendev.org/openstack/magnum/src/branch/master/magnum/drivers/k8s_fedora_ironic_v1/image/kubernetes 09:24
jakeyipI don't have the ability to test for this; basically unmaintained AFAICT09:24
jakeyipthe docs says "Currently Ironic is not fully supported yet, therefore more details will be provided when this driver has been fully tested.09:25
jakeyipoh I realised this hasn't been reviewed https://review.opendev.org/c/openstack/magnum/+/878817 . this is a bug we encounter in our cloud as we are using flannel.09:53
jakeyipI think the other providers are using calico09:53
opendevreviewMerged openstack/magnum master: Drop bay and baymodel from magnum  https://review.opendev.org/c/openstack/magnum/+/80378009:54
mnasiadkalooks ok and touches only flannel, so fine by me ;)09:56
opendevreviewJake Yip proposed openstack/magnum master: Deprecate k8s fedora ironic driver  https://review.opendev.org/c/openstack/magnum/+/88281209:58
jakeyipthanks :)09:58
jakeyipre-testing it one last time before I merge; been a while09:59
jakeyipah a calico review for you mnasiadka https://review.opendev.org/c/openstack/magnum/+/87047510:02
jakeyipmnasiadka dalees what do you do with the Zanata reviews? https://review.opendev.org/c/openstack/magnum/+/88262910:03
mnasiadkaseems pretty straightforward10:04
jakeyipshould I just +2 +1 workflow for Zanata (as long as nothing is obviously corrupted, etc?)10:05
jakeyipI dont' know how it keeps picking up those things, it seems to be super old10:06
jakeyipgoing to head off now, thanks for the reviews mnasiadka, we did well today :)10:11
mnasiadkalet's merge Zanata, if there are more of these - probably we should have a look10:12
jakeyip+110:12
opendevreviewMerged openstack/magnum master: Support k8s 1.25 in Calico Manifest  https://review.opendev.org/c/openstack/magnum/+/87047510:52
opendevreviewMerged openstack/magnum master: Fix pods unable to send traffic to ClusterIP  https://review.opendev.org/c/openstack/magnum/+/87881710:52
opendevreviewMerged openstack/magnum master: Imported Translations from Zanata  https://review.opendev.org/c/openstack/magnum/+/88262910:52
jakeyipmnasiadka: let me know how you feel about https://review.opendev.org/c/openstack/magnum/+/87409211:36
jakeyiptested it with current clusters, work11:36
mnasiadkajakeyip: hmm, maybe we could have a script to remove podsecuritypolicy on existing clusters? Just in case we fix upgrades somewhere in future? ;-)11:59
jakeyipmnasiadka: I feel like upgrades will be handled by th CAPI driver, and I don't think think we can move from k8s_fcos -> capi12:27
mnasiadkawe still in theory expose the option to do the upgrade, it just doesn't work12:31
jakeyipo yeah we restrict that call in our cloud with policy12:47
jakeyipmnasiadka: just to clarify, do you mean a script to remove PodSecurityPolicy from admission_control_list, or more, like ClusterRole, etc?13:11
mnasiadkajakeyip: just a script to have it handy - can be a followup (I think we already have one script to change something on existing clusters just in case we fix upgrades in the future, but we don't call it anywhere) ;-)13:12
jakeyipmnasiadka: an existing clusters may have installed more podsecuritypolicies from other helm charts, etc, the script won't be able to handl those 13:13
mnasiadkaoh boy, fantastic13:14
mnasiadkaso maybe let's leave it as is13:14
jakeyip:D13:14
jakeyipok I'll workflow +1  so we can unblock the other things that needs v1.2513:15
jakeyipwe will think about how to handle exisitng clusters later13:16
opendevreviewMerged openstack/magnum master: Remove PodSecurityPolicy  https://review.opendev.org/c/openstack/magnum/+/87409213:56

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!