Wednesday, 2026-04-22

*** bauzas4 is now known as bauzas02:07
opendevreviewGoutham Pacha Ravi proposed openstack/security-doc master: Add OSSN-0095: OVN security group rules with address groups  https://review.opendev.org/c/openstack/security-doc/+/98573403:41
sean-k-mooneygouthamr: https://review.opendev.org/c/openstack/devstack/+/985735 so i have a hacky seriese that swap out pip for uv in devstack10:57
sean-k-mooneyits not terrirble but needs work10:57
sean-k-mooneybut last night i pushed that dnm to turn it on and use python 3.1410:58
sean-k-mooneyone of the benifits of using uv is i cna have it provide effectivly any python interpertor on any distop10:58
sean-k-mooneyhttps://zuul.opendev.org/t/openstack/buildset/da24501f7c384e448209691fa86eb5e010:59
sean-k-mooneyso there are failures and at least one issue witht he novnc proxy10:59
sean-k-mooneybut several of the jobs also passed10:59
sean-k-mooneyi.e. tempest-ipv6-only https://storage.gra.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_833/openstack/833846ede07649d28e8a498e53dfa9f0/testr_results.html11:00
sean-k-mooneyor swift-dsvm-functional https://ef81aef4c6916aa88fc4-0a0d2e256244e0f6c0db62d1482e6a6c.ssl.cf2.rackcdn.com/openstack/d04052cc032a4009b464c37bf5275a1f/testr_results.html11:03
sean-k-mooneybecause that serise is using uv to provide the python inteperator and all python packages it also works the same across distos11:04
sean-k-mooneyim going to push a dnm ot nova to tirger its jobs with 3.14 to get a better picture of where we stand but this at least shows openstack is fucntional enough to boot vms and stack with python 3.1411:07
sean-k-mooneyeven if we have some bugs to fix11:07
bauzasgouthamr: I'm afraid the TC session about AI on Friday @15.40pm UTC will be busy12:09
bauzaswe have lots of conversations around the new agentic-worflows project 12:09
bauzaswhile the contrib guidelines could take precedence (but those should IMHO be discussed at the board level)12:10
sean-k-mooneybauzas: the ortingally inte of the ptg topic was intende to be "should we have any ai related files in teh repo and shoudl we create a common repo for agentic tools"12:11
sean-k-mooneyso not really implemation detail sof the agentic-workflows repo itself12:11
bauzasthen we need to book another timeslot for the project itself discussions12:12
sean-k-mooneysure12:12
bauzasbut we don't have any placeholder for it12:12
sean-k-mooneybut that why i ask that we dont creat any content in the repo until after the ptg12:12
bauzasthat's a chicken-and-egg problem (again)12:13
sean-k-mooneyi want use to have the converation fo if it shoudl be doen and how before creatign the repo 12:13
sean-k-mooneyits not12:13
bauzashow can I book a room ? simple question that I even don't have the answer12:13
sean-k-mooneywe could just point to the project on github and the gerrit reviews in teh repo12:13
sean-k-mooney#<name> book <room name> in #openinfra-events12:14
sean-k-mooneywhere name is the track name12:14
bauzasthank you, I was knowing it :)12:14
bauzasbut which would be the track name given we don't have any official project already ?12:15
sean-k-mooneyim not sure if the bot cares so you can try #openstack-agentic-workflows12:18
bauzasthe bot will care12:20
bauzasthe tracks have to be approved12:21
bauzasI can surely talk to diablo_rojo or other #openinfra-events cores to ask them to create another track if that helps12:22
bauzasbut fwiw, that's not that simple12:22
sean-k-mooneylooks like thr tact sig does not have a track12:29
bauzasno they don't12:29
bauzasthe list of tracks are basically the ones in https://ptg.opendev.org/etherpads.html12:30
sean-k-mooneyim not really sure we will have time for a deep proejct specific topic by the way12:30
sean-k-mooneyor at least fienidn a slot will be hard thar works for every eone12:30
fungisean-k-mooney: bauzas: i can add a track if you need12:53
* gouthamr wakes up and reads scrollback13:10
bauzasfungi: if you can create a track, that would be nice so we could discuss about some internal chances after the TC topic13:11
bauzaschanges*13:11
gouthamrcould this wait beyond the week?13:12
gouthamrasking because i think people would like to participate, but could be signed up for all the fun elsewhere13:13
opendevreviewGoutham Pacha Ravi proposed openstack/security-doc master: Add OSSN-0095: OVN security group rules with address groups  https://review.opendev.org/c/openstack/security-doc/+/98573414:01
cardoeDo we have Golang as a permitted runtime in OpenStack? I'm looking at https://governance.openstack.org/tc/reference/runtimes/2026.1.html14:03
fungicardoe: https://governance.openstack.org/tc/reference/pti/golang.html and https://governance.openstack.org/tc/resolutions/20170329-golang-use-case.html may be relevant14:06
fungithere was an intent to permit go development, but the two go-based projects people were working on never came to fruition for various reasons so there currently are none in openstack14:07
fungiwhether it's permitted is somewhat academic at this point, as any likely support that was put in place 9 years ago is almost certainly bitrotten at the moment so it would be a good idea to discuss specifics among the tc14:08
fungithere was basically no incentive to keep up the details from a pti perspective without any actual projects to exercise and inform them14:09
gouthamrfungi: clarkb: some helpful launchpad folks fixed up all the team ownership concerns we had:  https://answers.launchpad.net/launchpad/+question/82411317:21
gouthamreverything seems to be owned by openstack-admins now.. i'll use this as my source and run another check: https://opendev.org/openstack/project-config/src/branch/master/gerrit/projects.yaml 17:22
clarkbgreat. that seems like the best possibile outcome?17:23
gouthamrwe sought ownership transfer for retired teams as well (so we can own their cleanup if any) 17:24
gouthamryes! a couple of todos:17:28
gouthamr- write up the launchpad tracker configuration tribal knowledge in the project team guide, useful for new projects17:28
gouthamr- think through cleanup for retired/deprecated stuff 17:28
fungigouthamr: sounds great! i guess if somebody can put together a list of changes we need openstack-admins members to make to any of those (like adding current ptls and setting them as administrators), i'm happy to work through them17:28
gouthamroh, yes that too17:29
fungithough one thing that would really help is knowing the ptls' lp usernames, it's not always obvious and sometimes vague as to which account is the actual person17:30
gouthamrfungi: i'll ask for that on openstack-discuss.. mnasiadka (https://launchpad.net/~mnasiadka) wanted access to the magnum teams (https://launchpad.net/~magnum-drivers, https://launchpad.net/~magnum-ui-drivers) 17:30
fungimost of the time i can get by on educated guesses or tracking down a bug they interacted with on the correct project, but if people have non-unique names the risk increases that i'll pick the wrong lp account17:31
* gouthamr chuckles at non unique names17:31
fungii can take care of the magnum ones now17:31
mnasiadkaYay17:31
fungimnasiadka's lp account is easy to find, compared to many17:32
fungimnasiadka was already a member and administrator on magnum-drivers, but i've added him to magnum-ui-drivers now similarly17:34
gouthamrty!17:34
mnasiadkaThanks!17:43
fungibut of course!17:46
fricklerI stumbled across https://launchpad.net/~openstack-ossg earlier today, that also looks like it could do with some refreshing18:47
fungiyes, it's hopefully no longer relevant18:48
fungii did finally make a long-overdue change to the https://launchpad.net/ossn project to stop sharing private security bugs with ~openstack-ossg18:49
fungirecently18:49
fungiback in the ossg days when that was set up, we didn't anticipate writing ossns in secret, the idea was that anything that was getting an ossn drafted should already be public18:51
fungibut tha was somewhat tribal knowledge, and in more recent years people have added ossn bugtasks to embargoed reports of suspected vulnerabilities18:52
fungii guess it's still the driver for https://launchpad.net/ossp-security-documentation which is the tracker for openstack/security-doc18:57
opendevreviewGoutham Pacha Ravi proposed openstack/security-doc master: Add OSSN-0095: OVN security group rules with address groups  https://review.opendev.org/c/openstack/security-doc/+/98573420:51
* gouthamr was finally taking the maintainers' survey.. 21:34
* gouthamr there's a question: "How many times did you refer to your project’s Contributor Guide over the most recent release cycle?*" and it has only one choice: 021:34
gouthamrfungi: don't suppose that's a clever joke :D 21:34
fungiit's a nagging bug in the survey platform that ildikov has been unable to find a solution to21:34
fungievery time we think it's fixed, it comes back21:35
gouthamroh :( i don't remember if the last one had this question 21:35
fungiit seems like surveymonkey doesn't like multiple-choice answers that start with digits for some reason, though it's still unclear since some of the possible workarounds didn't... workaround21:36
gouthamroh, workaround is to switch the choices to "Never", "Sometimes (<10 times)", "A lot (>10 times)"? 21:37
fungiyeah, i think we tried something like that, i can't recall what happened though21:38
gouthamrack, will ignore this question and move on.. 21:40
opendevreviewGoutham Pacha Ravi proposed openstack/security-doc master: Use upper-constraints for tox environments  https://review.opendev.org/c/openstack/security-doc/+/98589721:45
opendevreviewMerged openstack/security-doc master: Add OSSN-0095: OVN security group rules with address groups  https://review.opendev.org/c/openstack/security-doc/+/98573421:58

Generated by irclog2html.py 4.1.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!