16:00:00 #startmeeting airship 16:00:01 Meeting started Tue Apr 16 16:00:00 2019 UTC and is due to finish in 60 minutes. The chair is mattmceuen. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:02 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:00:05 The meeting name has been set to 'airship' 16:00:06 #topic Rollcall 16:00:09 o/ 16:00:14 o/ 16:00:16 o/ everyone, let's give it a couple minutes 16:00:33 Hi everyone! 16:00:34 agenda, please feel free to add anything you'd like to discuss today: https://etherpad.openstack.org/p/airship-meeting-2019-04-16 16:00:41 o/ 16:00:47 mardim: Yeah, I'm here. 16:00:54 o/ evgenyl great job on the Airship demo :) 16:01:01 hey how are you ? 16:01:13 hey mardim 16:01:19 I am wondering if you still need the airship-seaworthy 16:01:26 hello mattmceuen 16:01:28 :) 16:01:57 Hey Matt, great presentation on Brighttalk 16:02:05 Thanks AvinashBR! 16:02:25 ah! I missed it :( 16:02:26 o/ hey everyone 16:02:54 No worries kaspars__ was recorded, I'll share the link here when I get it 16:03:02 thank you thank you 16:03:09 Alright, let's get started: 16:03:14 #topic Would it make sense to break out the OSH HTK pins in Treasuremap similarly to what is done for Airship? 16:03:23 Drew Walters proposed openstack/airship-shipyard master: CI: Add Airskiff check https://review.openstack.org/653035 16:03:23 This was something jamesgu__ had brought up last week 16:04:04 And we were going to mull on it for a week. Basically, our Treasuremap reference manifests have one helm-toolkit reference defined per chart for Airship charts, but one dependency shared for the OpenStack charts 16:04:05 ah yes 16:04:34 And he had run into a situation where he wanted to pin different helm-toolkits for different openstack charts - was not possible without refactoring 16:04:35 o/ 16:04:39 o/ arunkant 16:05:03 so the thought was: should we just refactor the openstack HTK refs in Treasuremap to be split out, like Airship is? 16:05:15 I for one have not come up with any reason not to :) 16:05:32 This week there was a scenario where this would have been helpful. I am in favor of splitting :) 16:05:35 But interested if anyone else has other thoughts / opinions 16:05:51 Well there you go, it's officially a recurring situation 16:05:52 I also concur - seems good thing to do especially for site updates, etc when fixing bugs, etc. 16:07:05 #action mattmceuen will create a story in storyboard to split out HTK dependencies for Treasuremap reference openstack charts 16:07:47 thanks guys - it is time-boxed-unanimous (I am going to keep using that one). Anything else on this topic? 16:08:09 +1 for splitting. 16:08:35 awesome 16:08:40 next topic: 16:08:45 #topic Governance repo has been created 16:09:02 per discussion last week: https://opendev.org/openstack/airship-governance now exists 16:09:06 it is very very empty 16:09:44 I believe the first patchset against it needs to add a zuul job, and in our case that zuul job should probably lint / build docs, since that's the only thing we expect this repo to be used for! 16:10:42 Would anyone be interested in helping add a basic gate to the repo, so jezogwza_ can push an initial draft governance doc to it? 16:10:48 Sirajudeen proposed openstack/airship-in-a-bottle master: Multinode support for promenade encryption https://review.openstack.org/652735 16:11:54 I believe it's pretty straightforward to create a basic readthedocs-focused project -- for example: https://opendev.org/openstack/airship-treasuremap/src/branch/master/.zuul.yaml 16:13:02 We'll table that for now - if anyone wants to cut their teeth with some zuul'ing, it would be very valuable - the more zuul knoweldge we have in our team the easier it is to add additional testing/checks/gating 16:13:34 #topic Need spec update (line 80), review from cores and approval for multi-distro spec 16:13:53 This is either dwalt or arunkant, you guys both are shades of blue in the etherpad :D 16:14:09 The multi-distro spec: https://review.openstack.org/#/c/643106/ 16:14:14 I would like to get more familiar with Zuul - but can't commit for this week.. 16:14:42 I don't remember adding this :P 16:14:42 understand kaspars__, you've had your hands full dude 16:15:03 arunkant: its me. Just continuing from last week discussion. Looking for updates on this spec as there is discussion about some clarification 16:15:21 https://review.openstack.org/#/q/status:open+branch:master+topic:airship_suse 16:16:41 Drew Walters proposed openstack/airship-treasuremap master: airskiff: Make airskiff gate non-voting https://review.openstack.org/653039 16:16:45 As per current spec, its not clear what tag should be used for image building (line 80) 16:17:15 Drew Walters proposed openstack/airship-treasuremap master: airskiff: Make airskiff gate non-voting https://review.openstack.org/653039 16:17:22 roman_g would you be able to specify the tag format in the current PS? 16:17:24 and there is clarification/update needed in spec around that 16:18:20 I believe roman_g was on vacation, we may not have him today 16:19:16 #action mattmceuen to follow up with roman_g on tag format in multi-os spec 16:19:19 Based on earlier conversation on this topic, I recall consensus on what Michael Beaver has mentioned in his comments 16:19:36 Where is the etherpad for this meeting? I looked on eavesdrop.openstack.org/#Airship_Team_Meeting, but the latest on there is 3/26. 16:19:38 Yeah, I think we have consensus, and it's just a matter of getting it in the PS 16:19:54 Hey ian-pittwood -- here you go: https://etherpad.openstack.org/p/airship-meeting-2019-04-16 16:20:08 Thanks mattmceuen 16:21:04 I'll try to see when roman_g will be back, if "soon" I'll ask if he can update the PS, and if not I'll push a change, since we're all aligned based on previous discussion 16:21:21 anything else on this one arunkant or anyone else? 16:21:52 just need that patch approved so that other related reviews can get attention 16:22:09 yeah. agreed 16:22:32 Alright, next topic: 16:22:36 #topic Python 3.7 - when should we start gating? 16:22:37 mattmceuen: If you are busy, I can also update the spec 16:23:07 That's me! 16:23:18 Thanks arunkant - will let you know :) 16:23:30 Felipe submitted a patch to gate Pegleg against python 3.7 16:23:49 are we ready to start doing that? If so, should we do the same for all components? 16:24:09 I personally have no objections but wanted to check here first 16:24:14 Couple thoughts: 16:24:27 1. I am for consistency across Airship projects when feasible / reasonable 16:25:02 2. iff any project fails gating against python 3.7, we should only introduce it as a non-voting gate for that project 16:25:19 Beyond that I don't have any opinions around what the right timing is 16:25:34 Merged openstack/airship-treasuremap master: Sloop type and Airsloop site https://review.openstack.org/649195 16:25:41 What do you guys think? What's OpenStack's roadmap for 3.7 gates? 16:25:41 ohhh ^ 16:26:29 Merged openstack/airship-spyglass master: Remove flask YAML web editor from Spyglass https://review.openstack.org/650993 16:27:03 That sounds like a good plan to me. I'm not sure of the official roadmap 16:27:23 +1. I think doing the nonvoting gate is a good start to see how far back we are from full support 16:27:29 python version-specific gating falls into that catogory of things I'd default to following the OpenStack projects on unless we find a reason not to -- they put a lot of thought into that stuff 16:27:44 cool 16:27:47 Dimitrios Markou proposed openstack/airship-treasuremap master: [WIP] Create pipeline for airsloop site https://review.openstack.org/649432 16:28:02 Same, no idea about the official roadmap, but I think at least getting a non-voting gate in would be good 16:28:10 dwalt can I give you an action item :D it's the tax for bringing it up 16:28:18 Dimitrios Markou proposed openstack/airship-treasuremap master: [WIP] Create documentation for airsloop site https://review.openstack.org/651652 16:28:27 Kaspars Skels proposed openstack/airship-treasuremap master: Enable nested virtualization by default https://review.openstack.org/652139 16:28:29 mattmceuen: action item me, please :) 16:28:34 #action dwalt to check on the OpenStack roadmap for python versions and gating 16:28:41 let us know what you find 16:28:45 will do! 16:29:10 I think, for any project that is already 3.7-friendly, we should go ahead and make it voting -- we don't want regression away from a working configuration 16:29:32 But for any projects (if any) that aren't 3.7-friendly a non-voting gate gives us time to fix 16:29:37 ++ 16:29:37 +1 16:29:39 +1 16:29:41 ok, I think we beat that into the ground enough 16:29:47 thanks for bringing that up dwalt 16:30:12 sure thing 16:30:42 dwalt per the comment in the etherpad -- if you find the "justification" behind the python version roadmap (e.g. corresponding python version lifecycle stuff, etc) please let us know what you find 16:30:46 ty 16:31:06 Next topic: 16:31:21 #topic Pegleg support for custom character pool during passphrase/salt generation 16:31:42 alexanderhughes that's yours, right? My monitor is bad at differentiating shades of purple ;-) 16:31:50 yes 16:31:51 https://storyboard.openstack.org/#!/story/2005372 16:31:55 awesome, go for it 16:32:25 in patch https://review.openstack.org/#/c/648701/ we changed pegleg's generate cryptostring function to only use a small set of special characters in order to reduce the likelihood of a generated salt/passphrase breaking an application or database 16:32:44 during discussions in that patch @lamt felt it would be a good idea to let the user override the default pool of characters by passing their own - and I agree 16:33:27 there are outstanding questions on how to accomplish this - such as minimum complexity requirements in a passed custom pool (do we require all 4 sets of characters - upper/lower/number/symbol) or change the minimum length? 16:34:06 I guess everyone's security rules are different! 16:34:22 So, thinking out loud: 16:34:23 I'm wondering if there is some standard on password complexity that we can follow. 16:35:14 agreed, and for that reason I am of a mind that the default behavior is good enough for most use cases... if there is a case where a user needs to override that behavior they should be responsible for that pool. my suggestion is if they require a password with only upper and lowercase letters for example the only requirement we have on them is the existing length requirement, and at least one character from each uppercase 16:35:16 passphrase 16:35:47 Since Pegleg is actually generating the passphrase, it makes sense to ensure somehow that it can follow reasonable operator needs 16:36:05 But we shouldn't go too far overboard IMO 16:36:20 I.e., password rules are notoriously hard and different 16:37:02 As long as Pegleg supports passphrase generation that is 16:37:02 1) stronger than the operator rules 16:37:02 2) doesn't violoate any operator assumptions 16:37:02 I think we should be good right? 16:37:24 #2 is the character set thing - we don't want to break a database 16:37:57 I mean, an operator could always base64 the passphrase from pegleg if they needed to, too 16:38:24 Which is what Kubernetes does vis a vis secrets 16:38:27 correct, and in patch 648701 we limited the punctuation characters to just the following @#&-+=? but I am concerned there may be a case now we aren't aware of - or will be in the future where this set of characters runs afoul of what the user wants/needs 16:38:59 Dimitrios Markou proposed openstack/airship-treasuremap master: [WIP] Create documentation for airsloop site https://review.openstack.org/651652 16:40:24 so ultimately the question is - 1. do we need to support custom pools, and 2. if we do what limitations do we place on that pool, if any 16:41:25 It doesn't sound like this is a high priority item, as this was changed for compatibility with OpenStack services, right? 16:41:39 My opinion is 1. "no", as long as we address the common problems with the default / hardcoded pool. We can add support in the future if needed, and an operator and b64 the passphrase if needed too 16:42:03 ++ 16:42:17 What are your thoughts AlexanderHughes? Agree/disagree? 16:43:03 Agree we can update the hardcoded pool as needed - if it gets to a point where there's not much left in the default pool revisit the idea of supporting custom pools 16:44:31 Awesome - sounds like a plan to me. For the PS as-is, do we need to dial back the hardcoded pool now? Or is it already a good choice as far as we know? 16:44:53 to our knowledge the patchset represents the broadest set of characters that works without issue 16:45:11 great! 16:45:45 Alright, moving on unless there's anything else on this topic: 16:46:04 #topic Spyglass plugin management 16:46:10 This one's me 16:46:35 ian-pittwood -- can we use this as an opportunity to give anyone who doesn't know an elevator pitch of what Spyglass is? 16:47:44 I just started working on it so I'm not sure if I'd have the best explanation yet 16:48:09 haha then let me try 16:48:19 StaceyF is typing something right now too I think 16:48:20 Spyglass is a tool that will be used to take data from a source (could be multiple sources) that define what a site is and it will take data and format it specifically for Pegleg to consume (lint, collect, render) and then Pegleg will upload these documents to shipyard 16:48:48 The part that this issue covers is the aggregation of data 16:49:04 There will be different plugins that can be used by Spyglass depending on where that source data will come from 16:49:24 Currently we have a couple hardcoded plugins that aggregate data for Spyglass to process. One is included in Spyglass, the other appears to reference closed source data 16:49:37 Thanks StaceyF. The way I think of it is that Spyglass is intended to generate most/all of the site-specific YAMLs based on an external system of record, right? 16:49:47 correct 16:49:59 I want to take these plugins and separate them from Spyglass and I was curious what the crowd opinion is on how to do plugin management for openstack projects 16:50:18 Yeah, OpenStack is full of projects that have pluggable backends 16:50:49 Barbican might be a good example, since it's recent enough to have learned from mistakes of the past 16:50:58 And also because it's something we use in Airship 16:51:08 Ok, I'll take a look at that 16:51:23 I haven't dug into it though, so that's just a thought -- anyone else have more solid advice? 16:52:39 There's several different options to do it so I just wanted to make sure that Spyglass stays uniform with other projects 16:53:26 Yes, good call. I'd also say look at Drydock of course, since that has a pluggable mechanism too (albeit with one prod-grade plugin at the moment) 16:54:10 alright, 5 mins remaining: 16:54:12 Would the plan be to take the current plugins and place them into separate repos? 16:54:23 aha! now that is a good question :) 16:54:50 I feel like that's an area where the openstack community has gone back and forth a bit (thinking tempest in particular) 16:54:59 I believe the best practice is separate repos 16:55:50 Anything else on this one, guys? 16:56:13 Nothing from me. Sounds like a good path forward 16:56:17 #topic Review Requests 16:56:22 Continuous-integration enhancements 16:56:22 https://review.openstack.org/#/q/status:open+branch:master+topic:ci/latest-htk 16:56:22 https://review.openstack.org/599020 16:56:22 https://review.openstack.org/653039 16:56:23 https://review.openstack.org/623549 16:56:23 https://review.openstack.org/651628 16:56:47 dwalt want to give a little overview on this collection? 16:57:22 Gladly. The first topic is an effort to add CI jobs to each repo (with charts) that packages against the latest Helm-tookit 16:57:51 Currently, Airship pins and gates against a stable version of helm-toolkit that is manually uplifted in a tools script 16:58:31 Secondly, there are a lot of patches out there for Airskiff, as it is ready to be added as a check job to Shipyard, Armada, and Deckhand 16:58:49 sweeeeet 16:59:14 That's great - looking forward to the Shipyard / Armada / Deckhand checks for sure 16:59:16 Since Airskiff has been unreliable as a gate in treasuremap due to the lack of cross-gating, I propose that we make it non-voting until the corresponding check jobs become voting 16:59:27 and the last two are necessary improvements 16:59:33 ++ 16:59:47 that's all 16:59:52 I see we're short on time 16:59:54 For the latest-htk jobs, will those be voting or non-voting? 16:59:59 non-voting 17:00:08 moreso an indicator of being safe to upgrade 17:00:08 gotcha. makes sense to me. 17:00:24 or - urgent fix is required 17:00:24 Thanks all for a great meeting, we are out of time but feel free to stay and chat :D 17:00:33 thanks! 17:00:40 #endmeeting