| stevebaker[m] | TheJulia: ok, I've got a series of 3 reviews which are hopefully uncontroversial. Starting here https://review.opendev.org/c/openstack/diskimage-builder/+/824647 | 01:26 |
|---|---|---|
| opendevreview | Steve Baker proposed openstack/ironic-python-agent-builder stable/wallaby: Preliminary work to support CentOS 9 Stream https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/823365 | 01:39 |
| opendevreview | Steve Baker proposed openstack/ironic-python-agent-builder stable/wallaby: [DNM] testing dib-centos9 experimental job https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/824136 | 01:40 |
| opendevreview | Steve Baker proposed openstack/ironic-python-agent-builder stable/wallaby: Preliminary work to support CentOS 9 Stream https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/823365 | 03:45 |
| opendevreview | Steve Baker proposed openstack/ironic-python-agent-builder stable/wallaby: Replace genisoimage with xorriso https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/823367 | 03:45 |
| opendevreview | Steve Baker proposed openstack/ironic-python-agent-builder stable/wallaby: [DNM] testing dib-centos9 experimental job https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/824136 | 03:45 |
| arne_wiebalck | Good morning, Ironic! | 07:39 |
| *** pmannidi is now known as pmannidi|brb | 07:39 | |
| janders | hey arne_wiebalck o/ | 09:32 |
| janders | Happy Friday | 09:32 |
| arne_wiebalck | hey janders o/; | 09:36 |
| dtantsur | morning ironic. finally Friday? :) | 10:09 |
| janders | dtantsur yes! | 10:11 |
| arne_wiebalck | dtantsur: mgoddard: I just tried https://review.opendev.org/c/openstack/ironic/+/823723 and it breaks cs8 on software RAID as suspected | 11:08 |
| arne_wiebalck | dtantsur: mgoddard: not sure if other cs8 WDIs would work, but ours does if Ironic ignores the bootloader installation error | 11:10 |
| arne_wiebalck | dtantsur: mgoddard: the actual error is that the cs8 grub2-install does not have secureboot support and then raises an error | 11:12 |
| mgoddard | arne_wiebalck: thanks for confirming. So what's the path forward? Revert then make the check more strict? | 11:15 |
| arne_wiebalck | dtantsur: mgoddard: options I see include: a) move to efibootmgr for s/w RAID, b) make the behavior configurable, e.g. whether or not to ignore errors or have a list of errors to ignore, c) revert :) | 11:16 |
| arne_wiebalck | ordered by preference, inversely ordered by complexity :-D | 11:17 |
| opendevreview | Aija Jauntēva proposed openstack/ironic master: Update idrac-redfish export configuration step https://review.opendev.org/c/openstack/ironic/+/816816 | 11:18 |
| mgoddard | arne_wiebalck: I have time available to revert :D | 11:18 |
| arne_wiebalck | mgoddard: :-D :-D | 11:19 |
| arne_wiebalck | IIRC, stevebaker[m] was looking at efibootmgr some months ago in a different context and also assessed that it should be possible to move to efibootmgr | 11:19 |
| arne_wiebalck | for s/w RAID | 11:19 |
| arne_wiebalck | and tbh, we do call grub2-install, which fails, but we do not need it anyway ... seems like sth we should fix | 11:20 |
| arne_wiebalck | now, what I do not know if "it works" is b/c of our image or if that would break also others | 11:21 |
| arne_wiebalck | I think mnaser was also using cs8 images on top of s/w RAID | 11:21 |
| dtantsur | I guess the question is how quickly we can fix it | 11:24 |
| dtantsur | we cannot leave master broken for too long | 11:24 |
| dtantsur | if it's going to take time, I'd rather have us ignore the error again for software RAID | 11:24 |
| iurygregory | good morning | 11:24 |
| dtantsur | hey iurygregory, happy Friday | 11:25 |
| iurygregory | happy friday dtantsur o/ | 11:27 |
| * iurygregory hopes he won't need to spend half day in a meeting :D | 11:27 | |
| dtantsur | ouch | 11:27 |
| arne_wiebalck | dtantsur: it'd be great if we had someone else confirm it is a breaking change | 11:27 |
| dtantsur | arne_wiebalck: we don't have a wide choice of people who use software RAID and are ready to test master changes | 11:28 |
| dtantsur | I think we can take your word on it | 11:28 |
| arne_wiebalck | dtantsur: ok | 11:28 |
| arne_wiebalck | dtantsur: I guess we have time until the release before we need to take a revert decision | 11:29 |
| arne_wiebalck | (and do no backports for now) | 11:29 |
| dtantsur | arne_wiebalck: well, we should keep master working | 11:29 |
| dtantsur | people may be consuming a random commit (e.g. if they use bifrost) | 11:30 |
| arne_wiebalck | hmm, ok | 11:30 |
| arne_wiebalck | mgoddard: I guess master before your patch caused issues for you (and triggered the patch) ? | 11:32 |
| mgoddard | it was broken in that a deployment failure was silently ignored | 11:39 |
| mgoddard | so the machine failed to boot | 11:39 |
| dtantsur | I suspect our software RAID code actually relies on that command to fail | 11:40 |
| mgoddard | in my case I was using a non-UEFI image with UEFI enabled | 11:40 |
| dtantsur | aka "command failed successfully" :) | 11:40 |
| arne_wiebalck | or "Errror: SUCCESS" | 11:43 |
| arne_wiebalck | *Error | 11:43 |
| arne_wiebalck | mgoddard: your failed deployment was not with s/w RAID, I assume? | 11:43 |
| opendevreview | Dmitry Tantsur proposed openstack/bifrost master: Do not make password files world-readable https://review.opendev.org/c/openstack/bifrost/+/824700 | 11:51 |
| opendevreview | Dmitry Tantsur proposed openstack/bifrost master: Tighten permissions for PXE directories https://review.opendev.org/c/openstack/bifrost/+/824144 | 11:56 |
| opendevreview | Dmitry Tantsur proposed openstack/bifrost master: Change the TFTP directory to /var/lib/tftpboot https://review.opendev.org/c/openstack/bifrost/+/823552 | 11:58 |
| opendevreview | Dmitry Tantsur proposed openstack/bifrost master: Tighten permissions on keystone directories https://review.opendev.org/c/openstack/bifrost/+/824702 | 12:03 |
| mgoddard | arne_wiebalck: correct | 12:42 |
| *** rcastillo|rover is now known as rcastillo | 13:23 | |
| arne_wiebalck | yet another option then would be to error out only when not s/w RAID | 13:26 |
| arne_wiebalck | but we're making the code more and more convoluted | 13:26 |
| opendevreview | Dmitry Tantsur proposed openstack/bifrost master: Start Bifrost Architecture documentation https://review.opendev.org/c/openstack/bifrost/+/824719 | 14:17 |
| dtantsur | TheJulia: I hope you'll like this ^^^ | 14:17 |
| dtantsur | this publishes a lot of tribal knowledge | 14:22 |
| TheJulia | I’ll try to look today | 14:30 |
| TheJulia | Woke. Up with migraine | 14:30 |
| dtantsur | ouch. get back to bed, it's Friday :) | 14:32 |
| TheJulia | Still in. Light hurts | 14:32 |
| bkranendonk | hi all, does inspector has some kind of policy engine built in? it keeps denying me from retrieving inspector rules: Failed retrieving Inspector rule 35535433-15bd-5a74-907c-96ecb3113276: ClientError('Access denied by policy') | 14:35 |
| bkranendonk | or is this keystone policy based? | 14:35 |
| bkranendonk | cant find any info on this, and dont have keystone policy.json enabled | 14:36 |
| TheJulia | bkranendonk: policy is embedded into the code | 14:37 |
| TheJulia | bkranendonk what user/rights are you attempting to use ? | 14:37 |
| bkranendonk | user admin, project admin (default admin user created by kolla-ansible) | 14:38 |
| TheJulia | bkranendonk: system admin or member of the bare metal project and an admin in it if memory serves | 14:40 |
| TheJulia | At least, I think | 14:40 |
| TheJulia | The policy is strict since it is an admin only service | 14:41 |
| TheJulia | Give me 5, making coffee | 14:41 |
| bkranendonk | ok, does the policy check on source IPs/cors stuff aswell? | 14:41 |
| bkranendonk | I can however update Node objects properties | 14:42 |
| TheJulia | Coffee https://usercontent.irccloud-cdn.com/file/yfR7Yggi/IMG_0256.JPG | 14:44 |
| TheJulia | yeouch, monitors are bright | 14:46 |
| TheJulia | bkranendonk: no, it does not use cors or ips | 14:46 |
| TheJulia | ironic's policy is a little loser if memory serves due to backwards compatability | 14:46 |
| TheJulia | but lets see, what just inspector has | 14:46 |
| bkranendonk | alright. strange thing is that inspector debug shows me that the received os_auth data is all null :P | 14:48 |
| bkranendonk | enforce: rule="introspection" creds= (...)project_domain_id": null, "project_id": null,(...) | 14:48 |
| bkranendonk | might be doing something wrong at the client/kolla/ansible side, will check | 14:49 |
| TheJulia | yeah | 14:50 |
| TheJulia | I wonder if it is failing to lookup the ID | 14:50 |
| TheJulia | so, by default for the new RBAC model it is https://github.com/openstack/ironic-inspector/blob/master/ironic_inspector/policy.py#L38 and until it is enforced by default https://github.com/openstack/ironic-inspector/blob/master/ironic_inspector/policy.py#L61 is the rule | 14:51 |
| TheJulia | it falls back to | 14:51 |
| TheJulia | wow, migraine is so bad complete sentences are not a thing at the moment | 14:51 |
| TheJulia | I would check the config for inspector to make sure it is valid for talking to keystone to validate tokens | 14:52 |
| bkranendonk | thanks! i however found the issue to be an ansible module that is not ingesting the os_auth | 14:53 |
| bkranendonk | so it just tries to auth with all null types, well yeah; thats not gonna work :) | 14:53 |
| bkranendonk | TheJulia: thanks for your help again, much appreciated | 14:54 |
| TheJulia | bkranendonk: no problem, hopefully there is a patch someplace now :) | 15:00 |
| TheJulia | or will be soon! | 15:00 |
| arne_wiebalck | TheJulia: do you remember with which release the new default policy was introduced? | 15:01 |
| TheJulia | Wallaby, however the enforcement of the new default has not been turned on yet | 15:14 |
| TheJulia | and likely won't be for a while | 15:14 |
| TheJulia | since TC wants everyone to move at the same time | 15:15 |
| TheJulia | Which makes sense, since it is such a massive change | 15:15 |
| arne_wiebalck | since I just moved to Wallaby, the Puppet module created a policy file but I don't think it contains the default you pointed to above | 15:16 |
| TheJulia | I greatly dislike the puppet module | 15:17 |
| arne_wiebalck | heh | 15:19 |
| arne_wiebalck | there is also json vs yaml, but I guess the format change is independent from the content change? | 15:21 |
| TheJulia | it should all be yaml at this point | 15:22 |
| TheJulia | but the puppet maintainers have hard resistance to *any* change | 15:23 |
| TheJulia | without it being opt-in | 15:23 |
| arne_wiebalck | the wallaby module created a json file in /etc/ironic-inspector/policy.json ... (need to check if our config demands this somewhere) | 15:24 |
| arne_wiebalck | yep, it does | 15:25 |
| opendevreview | Dmitry Tantsur proposed openstack/bifrost master: Tighten permissions on keystone directories https://review.opendev.org/c/openstack/bifrost/+/824702 | 15:29 |
| TheJulia | yeah, they should be creating json and actually they shouldn't *need* to create a policy file at all. | 15:37 |
| dtantsur | dear uwsgi, y u h8 me | 15:52 |
| TheJulia | dtantsur: what now? | 15:53 |
| TheJulia | and is it eventlet? | 15:54 |
| dtantsur | trying to make it run from the right user in bifrost | 15:54 |
| dtantsur | currently keystone runs from the nginx user, not from keystone | 15:54 |
| TheJulia | common group perhaps? | 15:54 |
| dtantsur | yeah, but I'm trying to avoid nginx being able to read keystone configuration | 15:56 |
| TheJulia | ahh | 15:57 |
| dtantsur | it's quite a bloody mess | 15:57 |
| TheJulia | the only way then is to actually proxy to a separate process. I think | 15:57 |
| dtantsur | to be able to drop privileged, uwsgi needs to be started as root | 15:57 |
| dtantsur | but then /run/uwsgi is created as root 0700 | 15:57 |
| dtantsur | and uwsgi cannot create sockets in it | 15:58 |
| dtantsur | meh | 15:58 |
| dtantsur | I'll figure it out | 15:58 |
| TheJulia | you could pre-create the socket | 16:00 |
| dtantsur | or even just the directory | 16:00 |
| TheJulia | its just a fifo or lifo buffer right? | 16:00 |
| TheJulia | well, really just fifo | 16:00 |
| dtantsur | actually, I can simplify the heck out of everything now that we don't have keystone-admin | 16:01 |
| dtantsur | but then it won't be backportable | 16:01 |
| TheJulia | I think the last time I was creating a buffer for a process it was for mongodb's local connections or something whacky like that | 16:02 |
| opendevreview | Dmitry Tantsur proposed openstack/bifrost master: Tighten permissions on keystone directories https://review.opendev.org/c/openstack/bifrost/+/824702 | 16:07 |
| dtantsur | okay, trying this | 16:07 |
| * TheJulia would like the migraine to finish going away | 16:08 | |
| TheJulia | any ironic-cores around, other than dtantsur ? | 16:43 |
| JayF | You caught me | 16:45 |
| JayF | what's up? | 16:45 |
| TheJulia | I would <3 to get another review on https://review.opendev.org/c/openstack/ironic-inspector/+/824643 | 16:47 |
| JayF | I'll look depending on how simple; but I rarely voted on inspector stuff when this was my day job | 16:47 |
| TheJulia | since I need to backport it as well to fix issues we're seeing with haproxy being slightly more evil than apache but not as evil as eventlet | 16:48 |
| * TheJulia noticed the eventlet fix failed CI :( | 16:48 | |
| TheJulia | (eventlet fix as in fix against eventlet itself) | 16:48 |
| JayF | yeah, I read the chatter about this earlier | 16:49 |
| JayF | want me to land it? | 16:49 |
| TheJulia | sure | 16:49 |
| TheJulia | much appreciated | 16:49 |
| JayF | alright, code review fairy visit done | 16:49 |
| JayF | lol | 16:49 |
| TheJulia | much appreciated, thanks | 16:49 |
| * TheJulia goes back to reviewing dib patches | 16:50 | |
| iurygregory | TheJulia, I'm | 16:50 |
| opendevreview | Dmitry Tantsur proposed openstack/bifrost master: Do not run ironic-prometheus-exporter as root https://review.opendev.org/c/openstack/bifrost/+/824735 | 16:50 |
| dtantsur | iurygregory: FYI ^^^ | 16:50 |
| iurygregory | Thanks JayF =) | 16:50 |
| iurygregory | dtantsur, ack | 16:51 |
| dtantsur | iurygregory: and I could use your opinion on https://github.com/metal3-io/ironic-image/pull/344 because httpd is such a pita... | 16:52 |
| iurygregory | dtantsur, sure! | 16:53 |
| dtantsur | I *think* I tested it well. I think. | 16:53 |
| iurygregory | do we have something that explain the scenario for reverse proxy? so I can get a better understanding =) | 16:55 |
| dtantsur | iurygregory: I would like to the TLS termination on httpd (because eventlet is pain) | 16:55 |
| dtantsur | so I'm doing the same thing that we've been doing with inspector already: | 16:55 |
| dtantsur | user -> https://httpd:6385 -> http://ironic:6388 | 16:56 |
| dtantsur | metal3 also delegates basic auth to httpd, which I'm personally not 100% fond of, but anyway | 16:56 |
| iurygregory | got it | 16:56 |
| iurygregory | let me just grab a quick lunch and I will review =D | 16:56 |
| dtantsur | btw https://review.opendev.org/c/openstack/bifrost/+/819640 does a similar thing with nginx | 16:57 |
| arne_wiebalck | bye everyone, have a good weekend o/ | 17:23 |
| opendevreview | Merged openstack/ironic master: Use driver_internal_info methods for other drivers https://review.opendev.org/c/openstack/ironic/+/818509 | 17:35 |
| opendevreview | Verification of a change to openstack/ironic bugfix/18.1 failed: Trivial: log current state when continuing cleaning https://review.opendev.org/c/openstack/ironic/+/820614 | 17:35 |
| dtantsur | have a great weekend folks! | 17:45 |
| TheJulia | o/ | 17:55 |
| opendevreview | Julia Kreger proposed openstack/ironic stable/wallaby: Trivial: log current state when continuing cleaning https://review.opendev.org/c/openstack/ironic/+/824753 | 18:42 |
| opendevreview | Verification of a change to openstack/ironic bugfix/19.0 failed: Fix Redfish RAID deploy steps https://review.opendev.org/c/openstack/ironic/+/824425 | 18:45 |
| * TheJulia goes and takes more migraine meds | 19:10 | |
| opendevreview | Merged openstack/ironic-inspector master: Return a content-length on HTTP204 to prevent client failures https://review.opendev.org/c/openstack/ironic-inspector/+/824643 | 19:47 |
| opendevreview | Julia Kreger proposed openstack/ironic-inspector stable/xena: Return a content-length on HTTP204 to prevent client failures https://review.opendev.org/c/openstack/ironic-inspector/+/824754 | 20:00 |
| opendevreview | Julia Kreger proposed openstack/ironic-inspector stable/wallaby: Return a content-length on HTTP204 to prevent client failures https://review.opendev.org/c/openstack/ironic-inspector/+/824755 | 20:00 |
| opendevreview | Julia Kreger proposed openstack/ironic-inspector bugfix/10.9: Return a content-length on HTTP204 to prevent client failures https://review.opendev.org/c/openstack/ironic-inspector/+/824756 | 20:01 |
| opendevreview | Merged openstack/ironic bugfix/18.1: Use stable/xena upper-constraints https://review.opendev.org/c/openstack/ironic/+/824451 | 20:04 |
| opendevreview | Julia Kreger proposed openstack/ironic-inspector master: Remove rootwrap rule for dnsmasq systemctl https://review.opendev.org/c/openstack/ironic-inspector/+/822373 | 20:23 |
| opendevreview | Verification of a change to openstack/ironic master failed: Do not fail inspection on invalid MAC https://review.opendev.org/c/openstack/ironic/+/824523 | 21:55 |
| opendevreview | Merged openstack/ironic master: Fix validating input for redfish update_firmware https://review.opendev.org/c/openstack/ironic/+/823701 | 23:05 |
| opendevreview | Merged openstack/ironic master: Automatically configure enabled_***_interfaces https://review.opendev.org/c/openstack/ironic/+/820909 | 23:05 |
| opendevreview | Verification of a change to openstack/ironic master failed: Do not fail inspection on invalid MAC https://review.opendev.org/c/openstack/ironic/+/824523 | 23:09 |
| opendevreview | Merged openstack/ironic-inspector master: Remove rootwrap rule for dnsmasq systemctl https://review.opendev.org/c/openstack/ironic-inspector/+/822373 | 23:50 |
| opendevreview | Julia Kreger proposed openstack/ironic master: Migrates docs from wiki https://review.opendev.org/c/openstack/ironic/+/824808 | 23:55 |
Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!