Wednesday, 2019-10-23

*** jamesmcarthur has joined #zuul00:20
*** saneax has quit IRC00:27
*** jamesmcarthur has quit IRC00:48
*** bhavikdbavishi has joined #zuul01:40
*** sgw has quit IRC01:46
*** jamesmcarthur has joined #zuul02:42
*** spsurya has joined #zuul02:52
*** bhavikdbavishi has quit IRC03:03
*** jamesmcarthur has quit IRC03:16
*** bhavikdbavishi has joined #zuul03:44
*** rfolco|rover has quit IRC04:04
*** bolg has joined #zuul04:09
*** bolg has quit IRC04:52
*** bolg has joined #zuul05:01
*** bstinson has quit IRC05:01
*** bstinson has joined #zuul05:15
*** igordc has joined #zuul05:58
*** igordc has quit IRC06:03
*** tosky has joined #zuul07:14
*** hashar has joined #zuul07:14
*** saneax has joined #zuul07:28
*** jangutter has quit IRC07:54
*** yolanda has joined #zuul07:58
*** jangutter has joined #zuul07:59
*** mhu has joined #zuul08:02
*** avass has joined #zuul08:05
*** mgoddard has joined #zuul08:05
*** pcaruana has joined #zuul09:02
*** yolanda__ has joined #zuul09:41
*** yolanda has quit IRC09:43
*** yolanda__ is now known as yolanda10:03
*** sshnaidm is now known as sshnaidm|afk10:11
*** fsvsbs has quit IRC10:13
*** hashar has quit IRC10:27
*** bolg has quit IRC10:31
*** pcaruana has quit IRC10:41
*** avass has quit IRC11:02
*** sshnaidm|afk is now known as sshnaidm|bbl11:36
openstackgerritMichal Pryc proposed zuul/nodepool master: WIP: Implement a Devnest nodepool driver  https://review.opendev.org/68947411:46
*** hashar has joined #zuul11:51
*** avass has joined #zuul12:03
*** themroc has joined #zuul12:10
*** rlandy has joined #zuul12:17
*** rlandy_ has joined #zuul12:17
*** rlandy has quit IRC12:17
*** rlandy_ is now known as rlandy12:17
*** avass has quit IRC12:20
*** rfolco|rover has joined #zuul12:21
*** jamesmcarthur has joined #zuul12:47
*** pcaruana has joined #zuul12:53
*** sgw has joined #zuul13:02
*** jamesmcarthur has quit IRC13:11
*** jamesmcarthur has joined #zuul13:29
*** jamesmcarthur has quit IRC13:31
*** tosky has quit IRC13:38
*** tosky has joined #zuul13:39
*** sshnaidm|bbl is now known as sshnaidm13:57
*** jamesmcarthur has joined #zuul14:04
*** yolanda has quit IRC14:07
*** bolg has joined #zuul14:08
*** yolanda has joined #zuul14:14
*** swest has quit IRC14:15
*** saneax has quit IRC14:49
*** mattw4 has joined #zuul14:53
*** pcaruana has quit IRC14:57
*** mattw4 has quit IRC14:59
ofososHey, if I want to use an Ansible lookup in the project config, to pass to a job as a variable, does this work in the natural way?15:04
*** hashar has quit IRC15:04
ofososI.e., using vars: tox_environment: FOO: lookup('bla', 'foo')15:04
corvusofosos: i think if you {{ }} quote it it will probably work15:05
corvusofosos: zuul passes it through to ansible unchanged, and you can use {{ }} expressions when defining ansible variables15:05
ofososcorvus: Thanks :)15:05
ShrewsSpamapS: i believe the issue that caused https://review.opendev.org/683205 to fail has been corrected if you want to re-apply your +A there to kick it off again15:11
openstackgerritJames E. Blair proposed zuul/zuul master: Add 'comment' option to Gerrit reporter  https://review.opendev.org/69060715:28
corvusShrews: any reason not to go ahead and do that?  (either by leaving "reverify" or another +W?)15:30
Shrewscorvus: nope15:31
openstackgerritJames E. Blair proposed zuul/zuul master: Remove deprecated "checks_api" syntax  https://review.opendev.org/69060915:32
corvusdone15:32
corvustobiash: can you re-review https://review.opendev.org/688645 with my comment?15:33
corvusbolg: ^ fyi15:33
corvustobiash, clarkb, Shrews: i think https://review.opendev.org/690607 is what we want to do next for gerrit checks support15:34
tobiashcorvus: thanks, that makes sense15:35
corvusyeah, i was scratching my head over that one :)15:35
corvusit's obviously right, but why? :)15:35
clarkbI see so the problem was it was leaving a vote and commenting together but we only want it leaving votes?15:36
clarkband I guess inline file comments if present15:36
corvusclarkb: actually, right now we don't even want it to leave a vote15:37
corvusbut historically there has been no reason to add a "success" reporter if you didn't want zuul to leave a message on gerrit (if you don't want that, just don't add the reporter)15:38
corvusbut with the checks api there is a reason15:38
clarkbI see, we need a success reporter to report to the checks api, but don't want it to also comment15:38
openstackgerritJames E. Blair proposed zuul/zuul master: Add 'comment' option to Gerrit reporter  https://review.opendev.org/69060715:38
openstackgerritJames E. Blair proposed zuul/zuul master: Remove deprecated "checks_api" syntax  https://review.opendev.org/69060915:38
corvusclarkb: exactly15:38
corvus(teensy pep8 fix ^)15:38
*** themroc has quit IRC15:40
clarkbI know "meth" is short for "method" but it is early and I totally read it differently at first15:43
clarkbcorvus: one note inline that may help operators15:48
corvusclarkb: yeah, how about i make that a followup?15:49
clarkbsure15:49
*** igordc has joined #zuul15:51
openstackgerritJames E. Blair proposed zuul/zuul master: Log an error on gerrit checks misconfiguration  https://review.opendev.org/69061615:54
*** mattw4 has joined #zuul16:01
ofososHey, what can I do to make Zuul's Ansible find the SSM lookup plugin?16:07
fungiofosos: something like https://review.opendev.org/66287016:09
fungiat least up to this point, we've been auditing and then selectively whitelisting plugins, as an extra layer of safety. we've discussed dropping all that and just trusting bubblewrap to protect the executor from the ansible process16:11
*** sshnaidm is now known as sshnaidm|afk16:22
ofososfungi: is there a list somewhere with the enabled plugins?16:24
fungiofosos: i'm not finding it documented anywhere, but basically i think it's any .py files listed at https://opendev.org/zuul/zuul/src/branch/master/zuul/ansible/base/lookup which aren't symlinks, plus maybe any not shadowed there at all16:28
fungibut also note that, like with the https://review.opendev.org/662870 change, some functionality of the enabled plugins may be blocked if they were considered unsafe to perform on an executor16:28
ofososHmm, interesting there's an ssm and an aws_ssm module16:31
fungialso in some cases where it's just an interaction with some remote rest api, it may be simpler and safer to do that directly16:32
fungihighly dependent on the situation of course16:32
ofososAhh, ok, it's aws_ssm16:34
ofososNow Ansible is complaining that boto3 and botocore are not installed. Can I fix this in the playbook?16:34
*** tobiash has quit IRC16:35
clarkbyou can add those as extra depenedencies in the zuul ansible installs16:35
fungiif you're trying to use them directly on the executor, you need to add them to the list of python packages zuul should install into its ansible virtual envs (assuming you have zuul managing the ansible installations on executors)16:35
ofososI have these variables in my job description, but I would be happy if these ran on the build node... Is the job description executed on the executor?16:36
fungiif the playbook specifies "localhost" as the host then that's the executor16:37
*** tobiash has joined #zuul16:37
fungiat least for ansible playbooks being executed by the executor's ansible16:37
ofososfungi: it doesn't specify anything, it inherits from the zuul-jobs tox job16:38
ofososHmm, so it should run on the node? Then I can add these dependencies to the build node16:38
fungiif it is running on a remote node then yeah, add them as deps for the corresponding testenv in your tox.ini or whatever mechanism you like to get them available in the environments tox creates16:39
corvusofosos: lookup plugins always run on the node where ansible is running (in this case, the zuul executor)16:39
ofososcorvus: I really would like to run this lookup on the build node, because I can attach privileges to that node, that are non-shared with other nodes.16:41
ofososHow do I do that?16:41
fungiyou can run a "nested" ansible16:41
*** jamesmcarthur has quit IRC16:41
fungihave zuul's ansible invoke ansible installed on the build node16:41
corvusofosos: that's an ansible design decision, they always run locally.  so, yeah, a nested ansible (have zuul's ansible run another ansible) is the only way for that to happen16:41
fungithat also means not having to worry about whether specific lookup plugins are allowed/working on the executor's ansible16:43
fungisince the build node's ansible can safely be more full-featured16:43
ofososI'm trying to set tox_environment ahead of the tox job. Can I somehow do a set_fact and let the tox job read it? Would that work?16:44
ofososOr: is there some convenience wrapper around a sub-Ansible?16:45
*** jamesmcarthur has joined #zuul16:45
clarkbofosos: we set it as a job var in the job definition iirc16:45
*** hashar has joined #zuul16:45
corvusofosos: if you copy the zuul inventory file, you'll get the job vars too16:46
clarkboh sub ansible16:46
ofososclarkb: Yup, I would like to override it based on some value that the node obtains from the network. What's the best way to do this?16:46
clarkbso ya setting it like https://opendev.org/openstack/openstack-zuul-jobs/src/branch/master/zuul.d/jobs.yaml#L121 puts it in the inventroy which you can then grab it from16:47
ofososthe *build* node :)16:47
ofosos:( I'll have to experiment with that16:47
ofososAny sample code/best practices for running sub-Ansibles?16:48
ofososOn the other hand it might be easier to just rip off the tox job and roll my own :/16:49
*** igordc has quit IRC16:50
corvusofosos: this playbook runs a nested ansible, but it does so for a very different purpose (it's simulating a non-zuul environment), so much of what you would need would be different i think: https://opendev.org/opendev/system-config/src/branch/master/playbooks/zuul/run-base.yaml16:51
ofososIf we go the nested Ansible route, can the node in some way access all the parent Ansible code?16:52
ofososI mean, I can duplicate the tox job and put in a local call to `aws ssm get-parameter` and that'll work, without much ado.16:53
corvusofosos: no, that's all on the executor, you'd be starting from scratch (including installing ansible).  i would not recommend this solution.16:53
ofososcorvus: then I'll create a custom tox job.16:54
corvusofosos: what would the custom tox job do?16:54
ofososcorvus: it would populate the tox_environment variable based on SSM Parameter Store values.16:54
corvushow are you going to get the ssm values?16:55
ofososCall `aws ssm get-parameter` on the build node16:55
corvusthat makes sense16:56
openstackgerritTristan Cacqueray proposed zuul/nodepool master: Ensure both kubernetes and openshift token are b64decoded  https://review.opendev.org/68743517:08
*** hwangbo has quit IRC17:19
openstackgerritTristan Cacqueray proposed zuul/nodepool master: Ensure both kubernetes and openshift token are b64decoded  https://review.opendev.org/68743517:31
*** jamesmcarthur has quit IRC17:45
*** jamesmcarthur has joined #zuul17:46
corvuszuul-quick-start jobs are failing on unable to load the libre2 .so file: https://zuul.opendev.org/t/zuul/build/99081a3b32ac4df397e7fee9c24a86a2/log/container_logs/executor.log17:47
*** jamesmcarthur has quit IRC17:51
*** sshnaidm|afk is now known as sshnaidm17:51
corvusi think it's because the python base image updated from stretch to bester?17:52
clarkbdid it become a .so.2 or similar?17:52
corvusi think the package name just changed17:52
corvusi'm testing now17:53
*** hashar has quit IRC17:54
openstackgerritJames E. Blair proposed zuul/zuul master: Missing labels is a subset of allow_needs  https://review.opendev.org/68864517:55
openstackgerritJames E. Blair proposed zuul/zuul master: Add 'comment' option to Gerrit reporter  https://review.opendev.org/69060717:55
openstackgerritJames E. Blair proposed zuul/zuul master: Log an error on gerrit checks misconfiguration  https://review.opendev.org/69061617:55
openstackgerritJames E. Blair proposed zuul/zuul master: Remove deprecated "checks_api" syntax  https://review.opendev.org/69060917:55
openstackgerritJames E. Blair proposed zuul/zuul master: Update libre2 dep for buster  https://review.opendev.org/69070117:55
corvusi think that's what we need ^17:55
*** hashar has joined #zuul17:58
*** spsurya has quit IRC17:59
Shrewsi'm so glad the lib name changes with each debian release18:03
Shrewss/lib/package/18:03
*** hashar is now known as hasharAway18:05
*** noorul has joined #zuul18:10
*** bhavikdbavishi has quit IRC18:10
*** noorul has quit IRC18:16
*** themroc has joined #zuul18:16
*** themroc has quit IRC18:20
*** jamesmcarthur has joined #zuul18:21
*** themroc has joined #zuul18:24
*** igordc has joined #zuul18:24
*** hasharAway is now known as hashar18:26
*** jamesmcarthur has quit IRC18:31
*** jamesmcarthur has joined #zuul18:32
*** igordc has quit IRC18:32
*** pcaruana has joined #zuul18:38
*** jamesmcarthur has quit IRC18:39
*** jamesmcarthur has joined #zuul18:39
*** pcaruana has quit IRC18:44
Shrewscorvus: well, i don't see any libre2 error in the executor now, but there is now an invalid ssh key error in the scheduler: https://zuul.opendev.org/t/zuul/build/aaf2704067374644949d3196fd9c0001/log/container_logs/scheduler.log#12218:52
Shrewshow odd18:53
corvuswow this just keeps on giving18:53
corvus(we may need to rethink how we depend on opendevorg/python-base)18:53
corvuslike maybe, we need to tag much more often and intentionally bump tags18:53
clarkbor we can pin it back to 3.6 then roll up to 3.7 in a measured fashion?18:54
corvusthere's a possibility a change in upstream gerrit broke this...18:57
corvushttps://zuul.opendev.org/t/zuul/build/aaf2704067374644949d3196fd9c0001/log/container_logs/gerrit.log#13118:57
corvusit's always complained about not being able to send an email, but maybe that's now a fatal error18:57
corvusif that's the case, we probably just need to properly configure "no email server"18:58
corvus(though, ideally, upstream gerrit's containers would work with no configuration)18:59
corvus        git config -f /var/gerrit/etc/gerrit.config sendemail.enable false && \19:00
corvushuh, that's there19:00
corvusalso, gerrit:latest hasn't updated in 4 months19:02
Shrewsis it possible that exception has always been there?19:02
corvusShrews: yes, some form of it certainly always has19:02
Shrewshttps://zuul.opendev.org/t/zuul/build/1c04a113f7f14621b482a3136dd7ca0d/log/container_logs/gerrit.log#13119:02
corvusi was wondering if it became more fatal recently, but that's looking unlikely19:02
Shrewsthat's from the 18th19:02
corvuscool, that looks the same19:03
corvuslooking closer, it's an internal zuul/paramiko error19:05
corvusso gerrit isn't involved at all19:05
Shrewsnewer paramiko getting the key format wrong?19:05
corvusit may be more likely that this is indeed a python image change issue -- maybe we're missing some crypto lib19:05
corvusokay, i reproduced it manually19:11
corvusthe error is from the ed25519key.py file, but it should be an rsa key19:13
corvusthe private key file says -----BEGIN OPENSSH PRIVATE KEY-----19:16
corvusinstead of -----BEGIN RSA PRIVATE KEY-----19:16
corvusso it's probably a different version of ssh-keygen that's causing this19:16
*** jamesmcarthur has quit IRC19:17
*** jamesmcarthur has joined #zuul19:18
Shrewsooh, i guess right. i get a cookie19:20
Shrewsi could've swore we saw this in nodepool in the past19:21
*** jamesmcarthur has quit IRC19:22
Shrewsmaybe this? https://review.opendev.org/36738119:24
Shrewsbut certainly doesn't explain current breakage19:24
openstackgerritClark Boylan proposed zuul/zuul-jobs master: Configure the npm mirror  https://review.opendev.org/69071819:24
clarkbsomething like ^ maybe? The potential problem with that is we assume the pypi mirror exists if mirror_fqdn is set but do we also assume an npm mirror is there at that path?19:25
corvusi'm not coming up with a working test case on my python:slim test19:25
clarkbI know the richer mirror config role is intended to address those concerns so maybe we wait for that?19:25
corvusclarkb: yeah, i'd rather spend effort on the new mirror19:25
corvusclarkb: i don't think using the new mirror config for npm would be blocked on anything, so could just go straight to that19:26
clarkbwe'd need to add the ne wmirror config to jobs and switch over to it right?19:26
clarkbor maybe we can have it run alongside the old mirror config for a bit?19:27
corvusshould be side-by-side compatible19:27
corvusi need to get lunch19:27
corvusif anyone wants to keep working on the ssh thing, you can repro with this: http://paste.openstack.org/show/785532/19:28
clarkbthe manpage for ssh-keygen says that -m PEM is the legacy format19:30
clarkbis it possible that paramiko updated and dropped support for hat format and requires the RFC4716 format?19:30
clarkbrereading scrollback I don't see a link to how it is failing?19:35
clarkbno recent paramiko releaes though19:35
Shrewsgah, what package contains ssh-keygen?19:36
clarkbopenssh19:36
Shrewsapt-get doesn't like that on python:slim19:36
clarkbmight be -server or -client19:37
clarkbbut its the openssh suite19:37
Shrewsah19:37
clarkblooking at the scheduler logs I don't see an error?19:38
Shrewsclarkb: https://zuul.opendev.org/t/zuul/build/aaf2704067374644949d3196fd9c0001/log/container_logs/scheduler.log#12219:38
clarkboh the other url must've been just to show this happened before in the gerrit log? doesn't show up in ca0d's scheduler.log19:39
Shrewshrm, not getting that error with that example from corvus19:41
Shrewsclarkb: the ca0d log was showing we still had the gerrit exception before today19:42
Shrewsbut the problem is in zuul19:42
clarkbya19:42
Shrewsbut i cannot recreate it19:43
clarkbI think https://github.com/paramiko/paramiko/issues/1226 is rleated19:43
clarkbpreviously the key type (RSA) was in the header but now it isn't19:43
*** gouthamr has quit IRC19:43
clarkbfrom that it seems the issue is specific to non rsa keys19:45
clarkb and adding -t rsa to the keygen would fix19:45
clarkbShrews: can you check what type of key keygen generated for you?19:45
Shrewsrsa19:45
*** gouthamr has joined #zuul19:45
clarkbya so rsa would work according to that bug19:47
*** igordc has joined #zuul19:47
clarkbcan you try ed25519?19:47
clarkbbut ya I think the fix here is to use rasa19:48
clarkb*rsa19:48
*** jamesmcarthur has joined #zuul19:48
Shrewsactually, it's possible my container is having issues connecting to my chosen ssh server19:53
Shrewsso i may not be getting far enough to validate the test19:54
*** gouthamr_ has joined #zuul19:54
Shrewsok, with ed25519, i get "Authentication failed" (as expected). with RSA, i get "not a valid OPENSSH private key file"19:59
Shrewshave to step a way for a few moments19:59
*** hashar has quit IRC20:01
mordredcorvus: there is a python:3.7-slim-stretch image - we could pin opendevorg/python-base to stretch as well as 3.720:07
corvusclarkb, Shrews, mordred: i agree with Shrews's result -- should we change to ed25519 keys in quickstart?20:17
corvus(it's still really weird and disturbing that rsa doesn't work)20:18
clarkbcorvus: ya especially since the bugs I found for paramiko imply that rsa should be the one that works20:20
clarkbI think the problem here is the s/rsa/openssh/ in the header though20:20
clarkbwhat does an ed25519 key look like with its headers?20:20
*** jamesmcarthur has quit IRC20:20
corvusclarkb: well the "-m PEM" should take care of that, right?20:20
corvus-----BEGIN OPENSSH PRIVATE KEY-----20:21
corvusthat's ed25520:21
clarkbmaybe paramiko only expects the newer keytypes to have that type of header?20:21
clarkband when combined with rsa it fails?20:21
*** jamesmcarthur has joined #zuul20:21
corvusclarkb: but "-t rsa -m PEM" fails too20:21
clarkband that has the RSA PRIVATE KEY header?20:22
corvusthat produces: -----BEGIN RSA PRIVATE KEY-----20:22
Shrewsi'm still unclear on what is at fault: paramiko or ssh-keygen?20:22
clarkbweird20:22
corvusand paramiko.ssh_exception.SSHException: not a valid OPENSSH private key file20:22
corvusShrews: so am i20:22
mordreddidn't clarkb find something that said -m PEM was considered legacy?20:22
clarkbya the PEM format is legacy20:22
corvusmordred: yeah, but it's the format we're currently using20:23
clarkbbut paramiko bugs I found implied it wants that BEGIN RSA PRIVATE KEY header20:23
mordredmy mind is just blown by PEM being legacy at all20:23
*** gouthamr has quit IRC20:23
*** jamesmcarthur has quit IRC20:24
Shrewswithout -m PEM, I still get: -----BEGIN OPENSSH PRIVATE KEY-----20:25
Shrewsfyi20:25
*** jamesmcarthur has joined #zuul20:26
corvusyep, an "OPENSSH" key can be either rsa or ed25520:26
clarkband the bugs I found implied paramiko does not accept rsa in ^ that format20:26
clarkbI'm surprised it also fails with the other format20:26
clarkbperhaps someting to do with the encoding itself?20:27
Shrewsso we can either restrict paramiko version, or just switch (and document) to ed255. I would think we would need to explicitly document it because someone else is definitely going to run into this20:28
corvusokay, i've tried on 3.7-slim and 3.7-slim-buster, and "-t rsa" fails on both20:28
corvusdifferent errors, because one makes a "RSA PRIVATE" and the other makes "OPENSSH PRIVATE" key, but failures both ways20:29
Shrewswell that's fun. what a wonderful rube goldberg machine you've discovered, corvus20:30
Shrewsso many moving parts  :)20:30
corvusi think that means we've identified the behavior change in the ssh-keygen encoding, but still more bisecting we can do to find out what caused paramiko to be unable to read either one20:30
corvusShrews: ya20:30
fungiable to confirm on a debian/sid machine (my workstation) with source-built python 3.7.5, paramiko 2.6.0 and debian-packaged openssh-client 1:8.1p1-120:32
clarkbhttps://github.com/paramiko/paramiko/issues/1015#issuecomment-315130862 is apparently the way to fix this in paramiko20:33
corvusclarkb: i don't understand20:34
*** jamesmcarthur has quit IRC20:35
fungiand yeah, repeating the test with python 3.6.9 yields the same results20:35
clarkbcorvus: aiui paramiko has its own pem file handling. The bug (and that specific comment there) says that paramiko should replace its home grown tooling for this with cryptography's tooling for this20:36
clarkbbut this hasn't been done if I am reading the bug correctly20:36
*** jamesmcarthur has joined #zuul20:36
corvusclarkb: okay, but that doesn't really help me understand what has changed to cause something which did work to stop20:37
clarkbcorrect20:37
clarkbI'm just pointing out that is what paramiko has said will fix the problem. Unfortuantely there isn't a ton of data in there on what the problem is in the first place20:37
clarkbhttps://github.com/ansible/distro-test-containers/commit/59e2800df8cd7e32e68c67418e67af7ce8165b8c may be a clue20:38
clarkbdoes debian have openssh 8?20:38
corvusall the 3.7 images i'm using have 7.x (7.4 or 7.9)20:40
clarkbI wonder if they backported the pkcs8 pem switch or made it default if it waas already an option?20:40
clarkbis there an easy way to check what pem format it is?20:40
fungi1:7.9p1-10+deb10u1 is the openssh-client package version in debian/stable (buster)20:41
clarkbmy ssh keygen manpage says I have to set pm to PKCS8 to get that format20:41
clarkbbut the ansible change implies some distros may not be doing that20:41
corvusi stuck an old rsa key into each of my test containers and they all work20:43
fungithat seems like a reasonable workaround, as long as the key is not valuable (obviously)20:44
fungibut only for testing20:44
corvusokay, i think i had a testing error earlier and one of my tests was invalid20:44
corvusa newly generated rsa key on debian 9 (which one is that?) does work20:45
fungidebian 9 is oldstable (stretch)20:45
mordred9 is stretch20:45
fungidebian 10 is stable (buster)20:45
corvusokay, so if we add "-t rsa", i think it should work (because opendev/python-base is stretch)20:45
corvusoh wait no it's not20:46
corvusit's buster, but py3.720:46
mordredopendevorg/python-base is buster20:46
mordredyeah20:46
mordredwe could pin it back to stretch though20:46
corvusso yeah, if we pin python-base to 3.7-slim-stretch and add "-t rsa" that will work20:46
mordredI've got a pin patch ready to go - I'll push it up20:46
corvusand that's basically what we had before last week, so that at least seems internally consistent.20:46
mordredyah20:47
corvuslet me retry some -m PEM tests and see if there are other working configs20:47
mordredremote:   https://review.opendev.org/690742 Pin base-python back to stretch20:47
corvushttps://etherpad.openstack.org/p/vd3IZi1Vlq20:48
fungiand yeah, -t RSA (with any of a variety of -m values or the default) doesn't seem to solve this with keys generated by newer openssh20:48
corvusthe testing error is that you must make sure the public key is actually present on the remote machine20:50
corvusbecause there's some really weird interaction with failed logins showing up as bad keys20:50
clarkbhuh20:52
*** jamesmcarthur has quit IRC20:52
*** jamesmcarthur has joined #zuul20:53
fungialso making sure the pubkey, if present, actually corresponds to the privkey because for some reason we've seen paramiko get really weird when they don't correspond (even though the pubkey shouldn't even be needed for this purpose)20:53
corvushey i got a success on buster20:53
mordredcorvus: \o/20:53
fungijust out of curiosity i repeated a variety of the failing scenarios with the pubkey deleted, but that didn't solve it20:53
corvushttps://etherpad.openstack.org/p/vd3IZi1Vlq is current with the revised test method20:54
corvushow about instead of pinning, we go ahead and add "-t rsa -m PEM" since that should work universally?20:54
fungii'm good with that20:55
clarkb++ to that since it works universally and that lines up with what my paramiko bugs said works20:55
fungiand then we can drop the workaround when paramiko eventually grows support for other key formats20:55
mordred++20:56
openstackgerritJames E. Blair proposed zuul/zuul master: Update install for buster  https://review.opendev.org/69070121:03
openstackgerritJames E. Blair proposed zuul/zuul master: Missing labels is a subset of allow_needs  https://review.opendev.org/68864521:03
openstackgerritJames E. Blair proposed zuul/zuul master: Add 'comment' option to Gerrit reporter  https://review.opendev.org/69060721:03
openstackgerritJames E. Blair proposed zuul/zuul master: Log an error on gerrit checks misconfiguration  https://review.opendev.org/69061621:03
openstackgerritJames E. Blair proposed zuul/zuul master: Remove deprecated "checks_api" syntax  https://review.opendev.org/69060921:03
corvusclarkb, mordred, fungi, Shrews: whew!  i think 690701 should cover it21:03
* corvus cleans up test server21:03
*** jamesmcarthur has quit IRC21:05
*** jamesmcarthur has joined #zuul21:08
*** themroc has quit IRC21:10
*** rfolco|rover has quit IRC21:31
openstackgerritJames E. Blair proposed zuul/zuul-jobs master: Test buildset registry with k8s and docker  https://review.opendev.org/68928021:45
openstackgerritMerged zuul/zuul master: Update install for buster  https://review.opendev.org/69070121:57
at_workOne comment -- the quickstart guide is partially broken with Gerrit 3.0.x on Centos 7.7, a newer git is required.22:11
at_workNow my question, is there anyway to use zuul without using webhooks?22:12
clarkbat_work: if using zuul with gerrit the ssh event stream works great for triggering jobs22:12
at_workThe github application looks like it requires a webhook as well.22:12
clarkbif you want to use zuul with say github I believe the only way to get the necessary event data from github to zuul is via the webhooks22:13
clarkbre git and centos 7 what requires newer git? (there is a lot of git used and understanding the specific need may help us address that properly22:13
at_workWe are actually a bitbucket shop, but I was going to use github for learning.  Corporate will never open an incoming webhook, we can't even get that with our bitbucket server instance.22:14
openstackgerritMerged zuul/zuul master: Missing labels is a subset of allow_needs  https://review.opendev.org/68864522:14
clarkbcorvus: mordred fungi ^ I guess I wasn't crazy about my concern that gerrit seems to be pushing that direction impacting corporate firewall rules22:15
clarkbat_work: unfortunately I don't think there is another way to get that event data. Zuul could potentially poll I guess but the driver doesn't do that currently22:16
mordredyeah. corporate firewalls are indeed a thing22:16
at_workThe githook in gerrit 3.0 uses new git features.  I'll find the offending git command22:16
clarkbif you use gerrit it does use the ssh event stream by default22:17
at_workeverything is about corporate security theater.22:17
clarkband the bitbucket driver may actually poll too (does it poll? I seem to recall someone saying it does), but github does not22:17
at_workNo gerrit here either, I was just following the demo.22:17
mordredyeah - I think the bitbucket driver is actually polling - adding webhook support is a TDL item22:18
mordrediirc22:18
mordredso - you know - maybe while adding webhook support to bitbucket - we should keep in mind that it might be a good idea to keep the polling version - and it might be good to add a polling version to the github driver22:19
clarkbre the git on centos issue we run gerrit in the quickstart in a container which is based on debian22:19
clarkboh you mean the commit hook maybe?22:19
clarkb(I thought the server side hooks initially, but ya commit hook on the client side would do it)22:19
at_workcommit-msg - hook22:19
clarkbgot it22:19
at_workuses interpret-trailers22:19
at_worknot available in centos git 1.8.xwhat_ever_old_version_it_is22:20
mordredyay old versions of things!22:21
clarkbI wonder if wecan convince gerrit to use the older commit hok22:22
at_workI was one of those bitbucket pests at ansiblefests.  Is there a place to find some information about the bitbucket connector?22:23
clarkbat_work: https://review.opendev.org/#/c/657837/23 is the current base change for implementing it. ofosos and noorul have been doing much of the work and testing22:24
*** jamesmcarthur has quit IRC22:24
at_workI might also be able to convince someone to give me a playground on a bitbucket server instance.22:25
clarkbI think ofosos is using it in production (not sure which commit though) but noorul has been fiding rough edges that need fixing as it is tested22:25
at_workThank you clarkb, I'll take a look.22:25
fungiat_work: i think i remember you coming to the zuul community booth at ansiblefest. welcome!22:26
fungiguessing you were the fellow i spoke with at length who was interested in possibly helping polish the bitbucket driver22:27
at_workhmmm, I usually limit my harassment to the breakout sessions.22:27
fungiahh, then there may be several of you ;)22:27
fungithat bodes well22:27
corvusyeah, that'll come in handy22:27
corvusi think the bitbucket driver needs a rebase, and a few changes as suggested in review comments22:28
corvusonce that happens, it's probably pretty close to mergable22:29
corvusand i agree -- supporting polling + webhooks might be desirable for most drivers22:30
corvus(or, of course, ssh stream in gerrit's case)22:30
mordredyeah22:30
fungigranted, in opendev we saw plenty of folks who couldn't connect to our gerrit ssh api because of draconian corporate firewalls blocking egress to "unknown" tcp ports22:31
mordredcorvus: checks plugin + polling for gerrit might be a valuable combo for some cases22:31
mordredfungi: the egress blocking is so bonkers22:31
clarkbfungi: ya but at least you can often make a case that opening it for that is safe22:31
clarkbfungi: wheras opening "http into $internal network" is often not22:31
mordredlike - I understand (although disagree with) the ingress blocking - but egress blocking is just insane22:31
fungiof you don't recognize the port number, it's probably hax0rz22:32
at_workUnfortunately, my time on this will have to move to dark work (undocumented), I doubt I can get real time allocated to work on this zuul for until I can demonstrate "value".22:32
mordredat_work: the ever fun "demonstrate value" ... I feel you22:32
fungieven just having more folks around to test and review the proposed driver helps22:32
at_workWe are in a hackathon week, after that is it back to the over estimating agile cards to get some (hopefully) free time to do dark work.22:33
openstackgerritMerged zuul/zuul master: Add 'comment' option to Gerrit reporter  https://review.opendev.org/69060722:34
clarkbcorvus: we'll need to restart zuul for ^ then reenable the gerrit checks api pipeline?22:36
at_workI know there is tremendous value locked up in zuul and ansible, exposing it and putting it work is my dream.22:36
at_workclarkb, Might I message you and ask a question not suitable for public consumption?22:37
clarkbsure22:37
corvusclarkb: yep; i'm fading today and can do that tomorrow22:37
at_workthanks22:38
corvus(but if someone else wants to, great)22:38
*** jamesmcarthur has joined #zuul22:38
corvusat_work: if any of the material on zuul-ci.org helps with making the case for zuul, let us know -- also, if you can think of something we don't have there but can add to help you make the case, let us know too :)22:38
fungiyeah, we're always on the lookout for things we should be saying there but aren't yet22:40
*** bolg has quit IRC22:45
*** bolg_ has joined #zuul22:45
*** armstrongs has joined #zuul22:56
openstackgerritMerged zuul/zuul master: Log an error on gerrit checks misconfiguration  https://review.opendev.org/69061622:58
*** tosky has quit IRC22:59
*** armstrongs has quit IRC23:06
*** jamesmcarthur has quit IRC23:08
*** jamesmcarthur has joined #zuul23:10
*** jamesmcarthur has quit IRC23:14
openstackgerritMerged zuul/zuul master: Remove deprecated "checks_api" syntax  https://review.opendev.org/69060923:18
*** igordc has quit IRC23:23
*** sgw has quit IRC23:32
at_workclarkb, et al, another thing to consider when considering the enterprise of firewalls and other security theater, are tokens and https auth based cloning.23:35
at_works/cloning/clone, poll, push, etc. operations.23:36
*** mattw4 has quit IRC23:38

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!