Monday, 2024-09-16

opendevreviewTakashi Kajinami proposed openstack/octavia master: Drop SQLALCHEMY_WARN_20  https://review.opendev.org/c/openstack/octavia/+/92939406:17
opendevreviewTakashi Kajinami proposed openstack/octavia master: Drop SQLALCHEMY_WARN_20  https://review.opendev.org/c/openstack/octavia/+/92939406:25
opendevreviewGregory Thiemonge proposed openstack/octavia master: Support for Jobboard etcd backend  https://review.opendev.org/c/openstack/octavia/+/91583407:51
zigohi there! What's the reason for Octavia requiring cryptography >= 42? I'm having a hard time to backport cryptography to Debian 12, and would prefer to avoid that work.07:51
zigoAny comment?07:51
zigoI have octavia.tests.unit.common.tls_utils.test_cert_parser.TestTLSParseUtils.test_get_cert_expiration failing in bookworm, is this related to the version of cryptography?07:52
gthiemongezigo: we had to bump it after this patch https://review.opendev.org/c/openstack/octavia/+/92135607:53
gthiemongehttps://review.opendev.org/c/openstack/octavia/+/92175207:55
gthiemongesee https://cryptography.io/en/latest/x509/reference/#cryptography.x509.Certificate.not_valid_after07:55
zigoAh, indeed, that's what I'm seeing failing over here.07:59
zigoMaybe I'd better just revert the change then?07:59
gthiemongezigo: yeah you can revert it in your downstream branch ;-)08:03
gthiemongezigo: we'll discuss it with the team, I don't know if we can revert requirements, on master and on stable branches08:04
zigoOk, thanks.08:04
zigoIMO, what would have been best, would have been to do a conditionnal, depending on the cryptography version.08:04
zigoAs in: if >= 42, use the _utc version of the function.08:04
zigoI'm probably going to end up doing that in the package, so I can backport from Unstable to Bookworm easily.08:05
gthiemongezigo: what's the version of cryptography in bookworm?08:07
zigo3808:07
zigoIt's very much ok if I keep this downstream.08:15
zigoIn Epoxy, I'll remove my patch, as Epoxy will be on Debian 13 only (while Dalmatian, I'm packaging for both Debian 12 and 13).08:16
gthiemongeah ok, I see Debian 12 in the Tested Runtimes for Epoxy08:18
gthiemongeI'm asking on #openstack-release how we can deal with it08:19
opendevreviewGregory Thiemonge proposed openstack/octavia master: Support for Jobboard etcd backend  https://review.opendev.org/c/openstack/octavia/+/91583408:48
tobias-urdingthiemonge: small fix to tests to fix upcoming legacyenginefacade being removed https://review.opendev.org/c/openstack/octavia/+/92662511:31
gthiemongetobias-urdin: thanks, I'll look at it11:56
wncsllnmorning, octavia o/ I'm facing a problem with connection between controllers and amphoraes. the following error was thrown12:21
wncsllnFailure: octavia.amphorae.driver_exceptions.exceptions.AmpConnectionRetry: Could not connect to amphora, exception caught: HTTPSConnectionPool(host='10.x.x.x', port=9443): Max retries exceeded with url: // (Caused by SSLError(SSLError(1, '[SSL: SSLV3_ALERT_CERTIFICATE_EXPIRED] sslv3 alert certificate expired (_ssl.c:1007)')))]12:21
wncsllnsomeone can give me a help?12:21
wncsllnI already have tried to regenerate certificates with kolla-ansible automation and failover the LB, but still cant connect to amphora12:22
tweininghm, according to https://docs.openstack.org/octavia/latest/admin/guides/certificates.html the server certificates get rotated automatically. not sure what's wrong.12:24
tweiningdid you read https://docs.openstack.org/octavia/latest/admin/guides/operator-maintenance.html#rotating-cryptographic-certificates ?12:25
wncsllnyeah. the server certificates get rotated, but the client certs the operator must generate it12:46
wncsllni noticed that the certificates within containers are not matching in controllers, so i ran a reconfigure and the certs are copied to containers. this works 12:47
johnsomzigo So UC is already updated for cryptography 42 (and has been for I bit I think). It seems like it might be best to have a downstream workaround for Debian 12.15:45
johnsomzigo I also wonder, if Debian 12 is going to be on the PTI, shouldn't there be gate jobs that would have caught this packaging issue? I mean, we move forward on package versions all of the time to fix bugs and deprecations.15:46
opendevreviewMerged openstack/octavia master: Support for Jobboard etcd backend  https://review.opendev.org/c/openstack/octavia/+/91583417:11
opendevreviewMichael Johnson proposed openstack/octavia master: Make keystone default roles the default RBAC  https://review.opendev.org/c/openstack/octavia/+/92958023:00

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!