Wednesday, 2024-06-19

opendevreviewMiguel Lavalle proposed openstack/neutron master: [DNM] Fix support of IPv6 only networks in OVN metadata agent  https://review.opendev.org/c/openstack/neutron/+/92226400:39
opendevreviewMiguel Lavalle proposed openstack/neutron master: [DNM] Fix support of IPv6 only networks in OVN metadata agent  https://review.opendev.org/c/openstack/neutron/+/92226400:41
opendevreviewyatin proposed openstack/neutron stable/2024.1: [FT] Run test_periodic_sync_routers_task tests serially  https://review.opendev.org/c/openstack/neutron/+/92228004:30
opendevreviewyatin proposed openstack/neutron stable/2023.2: [FT] Run test_periodic_sync_routers_task tests serially  https://review.opendev.org/c/openstack/neutron/+/92228104:30
opendevreviewyatin proposed openstack/neutron stable/2023.1: [FT] Run test_periodic_sync_routers_task tests serially  https://review.opendev.org/c/openstack/neutron/+/92228204:34
ralonsohslaweq, quick question: do we allow remote policy enforcers in openstack?07:25
ralonsoh--> https://bugs.launchpad.net/neutron/+bug/206907107:25
ralonsohthis is the first time I see that and I don't see anything in the documentation07:25
ralonsohbut maybe I'm wrong07:25
ralonsohe.g.:  "create_port:allowed_address_pairs": "http://127.0.0.1:8181/enforce"07:26
zigo# openstack subnet pool unset --pool-prefix 2001:x:y:z::/56 <ID>07:42
zigousage: openstack subnet pool unset [-h] [--tag <tag> | --all-tag] <subnet-pool>07:42
zigoopenstack subnet pool unset: error: unrecognized arguments: --pool-prefix <id>07:42
zigoWTF ?!? Is openstackclient broken with subnet pool unset ?07:42
zigoI had to do with Curl, that's not nice ... :/07:48
zigoIs it known, or should I open a bug?07:48
ralonsohzigo, https://review.opendev.org/c/openstack/python-openstackclient/+/59963307:51
ralonsohthe documentation is incorrect in https://docs.openstack.org/python-openstackclient/pike/cli/command-objects/subnet-pool.html07:51
ralonsohfrom the revert commit message: "We do not support removing a prefix from a subnet pool, only updating07:52
ralonsohwith a larger prefix (which is handled by the set command)"07:52
ralonsohit is a documentation bug, for sure07:52
zigoralonsoh: Well, with Curl, I successfully was able to remove my ipv6 range...07:52
ralonsohright, you can create and update a subnet pool07:54
ralonsohand the update command will delete the current pool prefixes and create the provided ones07:55
ralonsohbut this is why the OSC do not allow to remove a pool prefix07:55
ralonsohthat could be also a bug for Neutron: if we don't allow to remove an existing pool prefix (only increase it), we should prevent that from the API07:56
ralonsohbut the OSC behaviour is correct07:56
zigoWhy can't we remove pool-prefix? Is some part of the implementation missing?08:00
ralonsohbecause the IP could be used08:00
zigoIn my case, my network guy just did a mistake with the ranges...08:00
ralonsohone IP of this pool prefix08:00
zigoOk, so the *check* is missing from neutron, right?08:01
zigoIMO, we should still impelement it in openstackclient, and add a big warning in the doc, until the check is implemented.08:01
ralonsohyes, we currently don't do it. This is why we don't support the removal. But even with that, the current update API method is incorrect if that allows a manual created call removing an existing prefix08:02
zigoWell, it worked out for me, and I'm happy it did. If it didn't, I would have edited the db by hand ...08:02
zigoIn any case, thanks for your input. I'll see if I can at least contribute some doc about this.08:05
zigoralonsoh: Since when do we have https://launchpad.net/bugs/2069581 ? Like forever ?09:26
zigoOh, saw it.09:27
zigoSince https://review.opendev.org/c/openstack/neutron/+/82552109:27
zigoSo Victoria isn't affected, righ?09:27
ralonsohno no, there are other plugin workers09:28
ralonsohcreated when the ML2 plugin is initialized09:28
zigoDoes this then spawn workers within the neutron-rpc-server service?09:28
ralonsohno, the rpc-server only creates the RPC worker(s)09:29
ralonsohthere are PeriodicWorker added during the initialization09:29
ralonsohone sec09:29
zigoSo how are the works spawn, since I'm using uwsgi?!?09:29
zigo*workers09:30
ralonsohI guess you are using ml2/ovs, right?09:30
zigoYes.09:30
ralonsohand what tool to deploy it?09:30
ralonsohbecause devstack had a bug09:30
zigoMy own: https://salsa.debian.org/openstack-team/debian/openstack-cluster-installer09:30
zigothat's puppet-openstack based.09:30
ralonsohso when using the eventlet based server09:32
ralonsohhttps://github.com/openstack/neutron/blob/master/neutron/server/wsgi_eventlet.py#L24-L2509:32
ralonsohwe create the (1) API workers and the (2) RPC workers09:32
ralonsohbut the second is not totally correct09:32
ralonsohbecause we call neutron.service:start_all_workers09:33
ralonsohthat will spawn the RPC workers and what is called plugin workers (the periodic ones)09:33
ralonsohwe currently have 309:33
ralonsohhttps://github.com/openstack/neutron/blob/466f5e6f1afc12f61d073a0c4e3e4774feb4a7cb/neutron/db/l3_db.py#L17009:33
ralonsohhttps://github.com/openstack/neutron/blob/466f5e6f1afc12f61d073a0c4e3e4774feb4a7cb/neutron/db/agentschedulers_db.py#L10409:33
ralonsohhttps://github.com/openstack/neutron/blob/466f5e6f1afc12f61d073a0c4e3e4774feb4a7cb/neutron/db/quota/driver_nolock.py#L10309:33
zigoI'm using separated neutron-rpc-server and neutron-api (running over uwsgi, without any web server in front, just haproxy). So I'm not affected then?09:34
ralonsohthe plugin workers are wrapped inside ``AllServicesNeutronWorker``, that takes all these workers. This class is spawned as a single process and the periodic workers as threads09:34
ralonsohzigo, yes you are09:34
zigo:/09:35
ralonsohbecause this ``AllServicesNeutronWorker`` is not spawned09:35
ralonsohthis is what I added in (one sec)09:35
zigoralonsoh: Will you backport https://review.opendev.org/c/openstack/neutron/+/825521 to stable releases then?09:35
ralonsohno, this is not needed09:35
ralonsohthis is related to the quota driver09:35
ralonsohwhat is needed is this:09:36
zigoAh ok, so only Caracal? Or not even?09:36
ralonsoh1) https://review.opendev.org/c/openstack/neutron/+/92209009:36
ralonsoh2) https://review.opendev.org/c/openstack/neutron/+/922110/09:36
ralonsoh3) (devstack) https://review.opendev.org/c/openstack/devstack/+/92212509:36
ralonsoh^^ or the tool deploying the env09:36
zigoOh, so we need to run a new service called neutron-services-server ?09:37
zigoLike, 1 per controller ?09:37
ralonsohyes, this is the one that spawns the ``AllServicesNeutronWorker`` class09:37
ralonsohyes, 1 per controller09:37
zigoOk, but then, how far in releases? Just Caracal, or earlier ?09:37
ralonsohI'll backport the Neutron patches up to Antelope, that is the oldest branch under maintenance09:38
zigoAllright, so I'll probably need backporting it myself up to Victoria (as Debian Bullseye is still under maintenance on Debian side).09:39
zigoThanks.09:40
zigoralonsoh: There's no "neutron-services-server" console script in setup.cfg ... :/09:40
ralonsohit is now09:41
ralonsohhttps://review.opendev.org/c/openstack/neutron/+/922110/1/setup.cfg09:41
ralonsohor it will be after this patch is merged09:41
zigoThanks. I'll prepare a patch for puppet-neutron then.09:43
zigoWell, will do the necessary things in the Neutron Debian package first though! :)09:43
zigoralonsoh: IMO, using "services-server" as a name is very annoying. I would have prefer "worker" or "engine" something like that.11:24
ralonsohzigo, you can comment in the patch11:24
zigoIn puppet, I have unreadable code like:11:24
zigoService['neutron-server'] -> Service['neutron-services-server']11:24
ralonsohthis is following the current naming convention11:24
zigoWell, I'd also prefer if it wasn't changing over time, as I already uploaded the fixed debian package ! :)11:24
ralonsohit could be just neutron-services11:25
zigoThe point is: do not use "service" in the name it's very annoyingly clashing with systemd ".service" concept.11:25
zigoengine, worker, central, etc. do work out better, IMO.11:26
opendevreviewMerged openstack/neutron unmaintained/xena: [unmaintained] Drop rally jobs  https://review.opendev.org/c/openstack/neutron/+/92223112:32
opendevreviewMerged openstack/neutron master: [OVN] Sanitize the classless-static-route DHCP option  https://review.opendev.org/c/openstack/neutron/+/92211913:34
opendevreviewLucas Alvares Gomes proposed openstack/neutron stable/2024.1: [OVN] Sanitize the classless-static-route DHCP option  https://review.opendev.org/c/openstack/neutron/+/92232313:40
opendevreviewLucas Alvares Gomes proposed openstack/neutron stable/2023.2: [OVN] Sanitize the classless-static-route DHCP option  https://review.opendev.org/c/openstack/neutron/+/92232413:40
opendevreviewLucas Alvares Gomes proposed openstack/neutron stable/2023.1: [OVN] Sanitize the classless-static-route DHCP option  https://review.opendev.org/c/openstack/neutron/+/92232513:40
zigoTrying to perform live-migration on Caracal, I'm getting issues about the default policy set. I tried fixing the default policy, and now I have:14:36
zigo"create_port_binding": "(rule:admin_api) or (rule:service_api)"14:36
zigo"delete_port_binding": "(rule:admin_api) of (rule:service_api)"14:36
zigo"activate": "(rule:admin_api) or (rule:service_api)"14:36
zigoAfter doing this, then now I can do a live-migration in one direction, but I'm still getting a stack dump with:14:36
zigooslo_messaging.rpc.server   File "/usr/lib/python3/dist-packages/nova/network/neutron.py", line 214, in wrapper14:36
zigooslo_messaging.rpc.server     raise exception.Forbidden(str(e))14:36
zigooslo_messaging.rpc.server nova.exception.Forbidden: rule:delete_port_binding is disallowed by policy14:36
zigooslo_messaging.rpc.server Neutron server returns request_ids: ['req-da68ad41-de4d-41cd-b52d-2a7d9c5fb052']14:36
zigooslo_messaging.rpc.server 14:36
zigoand then, it's impossible to live-migrate the VM the other way around.14:36
zigoSo 2 questions: - is there some issues with the default policy? How come I had to do the above?14:36
zigo- how come I'm getting this stack dump when I have allowed rule:delete_port_binding? How to fix?14:36
ralonsohzigo, https://review.opendev.org/c/openstack/neutron/+/88672414:39
ralonsohin Caracal, these commands can be performed by a service only (Nova)14:39
ralonsohbut I don't know how is called from Nova (if this call is using the service user)14:40
zigoralonsoh: Oh, so I need to add the role service_api to my nova and neutron users, then, probably ...14:42
zigoWill try thanks.14:42
opendevreviewRodolfo Alonso proposed openstack/neutron master: [eventlet] Remove eventlet from the OVN metadata agent  https://review.opendev.org/c/openstack/neutron/+/92232914:44
mnaserhttps://review.opendev.org/c/openstack/neutron/+/921035 -- appreciate if someone can get this merged please :)14:45
zigoAh no, role should be "service" ...14:46
opendevreviewRodolfo Alonso proposed openstack/neutron master: [eventlet] Remove eventlet from the Neutron metadata agent  https://review.opendev.org/c/openstack/neutron/+/92233014:57
opendevreviewMerged openstack/neutron stable/2024.1: [FT] Run test_periodic_sync_routers_task tests serially  https://review.opendev.org/c/openstack/neutron/+/92228015:30
opendevreviewMerged openstack/neutron stable/2023.2: [FT] Run test_periodic_sync_routers_task tests serially  https://review.opendev.org/c/openstack/neutron/+/92228115:30
stephenfinralonsoh: I don't think this will work https://review.opendev.org/c/openstack/neutron/+/922185 ?15:46
stephenfinWe added a neutron.wsgi module in https://review.opendev.org/c/openstack/neutron/+/916407/15:46
stephenfinI'm pretty sure Python ignores 'foo/bar.py' if 'foo/bar/__init__.py' is present15:47
stephenfinso wsgi.py will be ignored because wsgi/__init__.py exists15:47
stephenfinA quick tests and this SO post suggests that is the case https://stackoverflow.com/questions/6393861/how-python-deals-with-module-and-package-having-the-same-name15:48
stephenfinihrachys_: ykarel__: ^15:50
stephenfinoh, gtema too ^ (we probably want to pull that out of the merge queue)15:51
bcafarelmnaser: done!15:51
opendevreviewArtem Goncharov proposed openstack/neutron master: Restore neutron.wsgi for backwards compatibility  https://review.opendev.org/c/openstack/neutron/+/92218515:51
gtemauhm, that means my fix need to be redone, and it is in the queue since 1 day already15:52
fricklerjust move it to neutron/wsgi/__init__.py instead?15:56
stephenfinfrickler: yes, but you can't stick the warning in there as-is because you'll get warnings if you try to import the wsgi module for e.g. uWSGI purposes15:58
stephenfinso we probably want to do the warning bit separately if this is house-on-fire stuff rn15:58
fricklerah, right15:58
gtemaI'l just drop the warning as such. It is anyway a very temporary step15:59
fricklerunrelated, the failure on the n-d-r fix seems unrelated https://zuul.opendev.org/t/openstack/build/439b0bf301224efc83c87b9ef4bd06ed looks like some option might have gotten dropped from sqla? will need to look deeper tomorrow15:59
gtemafrickler: not really. This is what surprised me a lot - look at the failed py312 job16:00
gtemahttps://zuul.opendev.org/t/openstack/build/77ef4b730e6d42d58f4125f157a9c7a516:00
gtemait is exactly due to the moved module. And surprising is the fact that none other job failed same way. This is precisely what I get running tests/pep locally16:01
opendevreviewArtem Goncharov proposed openstack/neutron master: Restore neutron.wsgi for backwards compatibility  https://review.opendev.org/c/openstack/neutron/+/92218516:02
fricklergtema: I'm not talking about the unit test, but the integration test. the py312 job is n-v so I ignored it so far16:02
gtemacorrect, but it is failing as expected and I am wondering that other py jobs didn't fail16:03
mnasiadkaHello16:04
mnasiadkaIs there an option to set custom dhcp options per network/subnet? E.g. ntp server?16:04
fricklerImportError: cannot import name 'wsgi' from 'neutron.api' (/home/zuul/src/opendev.org/openstack/neutron-dynamic-routing/.tox/py312/lib/python3.12/site-packages/neutron/api/__init__.py)16:05
frickleris this the same error that stephenfin mentioned? is there a difference between "from neutron.api import wsgi" and "import neutron.api.wsgi as wsgi"?16:05
gtemait's not about that itself. It is about the fact that neutron.api does not have wsgi (released) yet - and this is expected, since change is not released yet16:06
gtemaother jobs apparently use the tips of neutron16:07
fricklermnasiadka: afaict this is only per port16:09
fricklergtema: ah, ok, now I understand the "missing release" issue. so why not do "try: import neutron.api.wsgi except ... import neutron.wsgi" to cover both variants?16:12
gtemafeels ugly and will require another change removing this after release16:13
gtemafrickler: since this is the only job and it is non-voting there is no problem landing the change even before the neutron release. Still I would like to have neutron fixed till next release since not every job is installing extensions from tips16:14
mnasiadkafrickler: ugh16:26
*** dasm is now known as Guest1017717:13
*** iurygregory_ is now known as iurygregory21:28
opendevreviewMerged openstack/neutron unmaintained/yoga: [unmaintained] Drop rally jobs  https://review.opendev.org/c/openstack/neutron/+/92223022:05
opendevreviewMerged openstack/neutron unmaintained/zed: [ML2/OVN] Add gateway_port support for FIP  https://review.opendev.org/c/openstack/neutron/+/92103523:52

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!