Wednesday, 2023-01-18

opendevreviewMerged openstack/swift stable/zed: Fix docs build  https://review.opendev.org/c/openstack/swift/+/87078001:13
opendevreviewMerged openstack/swift stable/yoga: Fix docs build  https://review.opendev.org/c/openstack/swift/+/87078101:18
opendevreviewTim Burke proposed openstack/swift stable/victoria: Fix docs build  https://review.opendev.org/c/openstack/swift/+/87078401:50
opendevreviewMerged openstack/swift master: Skip coverage reports when running pytest directly  https://review.opendev.org/c/openstack/swift/+/87086502:23
opendevreviewMerged openstack/swift stable/xena: Fix docs build  https://review.opendev.org/c/openstack/swift/+/87078203:22
opendevreviewMerged openstack/swift master: Clean up project URLs for PyPI  https://review.opendev.org/c/openstack/swift/+/87086203:42
opendevreviewMerged openstack/swift master: Don't run reno as part of building an sdist  https://review.opendev.org/c/openstack/swift/+/87086304:17
opendevreviewMerged openstack/swift stable/wallaby: Fix docs build  https://review.opendev.org/c/openstack/swift/+/87078307:00
opendevreviewMerged openstack/swift master: s3api: Prevent XXE injections  https://review.opendev.org/c/openstack/swift/+/87082307:01
opendevreviewJianjian Huo proposed openstack/swift master: Proxy: restructure cached updating shard ranges  https://review.opendev.org/c/openstack/swift/+/87088607:32
mcapestill struggling with our rocky->yoga upgrade, since our nodes are on centos7... and there are no packages for yoga.10:26
mcapecurrently i'm testing upgrade using code repository :10:27
mcapeinstall modules from requirements.txt via pip10:27
mcapeand do "python setup.py install" after that10:27
mcapefunctional tests are coming through, all daemons are running fine10:27
mcape the main downside to this approach -- is that it is difficult to do a downgrade (since part of the modules are from pip, and part are  previously installed by packet manager),10:27
mcape
 downgraded code runs, but functional tests are not starting due to various dependency problems.10:28
mcapeonly managed to do upgrade-downgrade-run tests succefully once, but since that I can't reproduce that success 10:28
mcapeso the question is maybe there is better path? 10:28
mcapeanother concern is a lot of warnings from sharder, which reports missed shard ranges, while the objects are thankfully reachable11:55
mcapelogs look like this https://pastebin.com/khgVcsvE11:55
mcapenot sure if upgrade will fix that or make things worse :-/11:56
opendevreviewOlivier Chaze proposed openstack/swift master: Emptying buffer when quota is exceeded https://bugs.launchpad.net/swift/+bug/2002985  https://review.opendev.org/c/openstack/swift/+/87054112:29
*** gmann is now known as gmann_afk17:29
*** gmann_afk is now known as gmann17:41
*** gmann is now known as gmann_afk18:06
*** gmann_afk is now known as gmann18:56
kotagood morning20:56
indianwhocodesgood afternoon21:00
mattoliverMorning21:00
opendevreviewMerged openstack/swift master: Clean up a bunch of deprecation warnings  https://review.opendev.org/c/openstack/swift/+/85110021:01
timburke#startmeeting swift21:01
opendevmeetMeeting started Wed Jan 18 21:01:28 2023 UTC and is due to finish in 60 minutes.  The chair is timburke. Information about MeetBot at http://wiki.debian.org/MeetBot.21:01
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.21:01
opendevmeetThe meeting name has been set to 'swift'21:01
timburkewho's here for the swift meeting?21:01
mattolivero/21:02
zaitcevo721:02
kotao/21:02
indianwhocodeso/21:03
timburkeas usual, the agenda's at21:03
timburke#link https://wiki.openstack.org/wiki/Meetings/Swift21:03
timburkefirst up21:03
timburke#topic CVE-2022-4795021:03
timburkethere's a critical CVE for swift that was made public this week21:04
timburkesecurity researchers at OVH discovered a way for authenticated clients to read arbitrary files from proxy-servers21:05
timburke#link https://bugs.launchpad.net/swift/+bug/199862521:06
timburkethis included things like tempauth credentials, keymaster root secrets, swift.conf swift_hash_path_prefix/suffix values, and auth_token service user credentials21:07
timburkethe good news is, this only affects clusters with S3 access enabled21:08
timburkethe bad news is, it's not limited to s3api; swift3 is also affected (for clusters that aren't on rocky yet)21:09
timburkethe fix is already merged to master21:10
timburke#link https://review.opendev.org/c/openstack/swift/+/87082321:10
mattoliverdo we still have a swift3 repo? I haven't looked at that for years21:10
timburkeand backports are up for wallaby through zed -- though i'm realizing that the functional test may need a small update21:10
timburkehttps://opendev.org/x/swift3/ is still a thing, though inactive21:11
mattoliverkk21:12
timburkemaybe also worth noting: the github mirroring went away a while ago: https://github.com/openstack-archive/swift3/21:12
timburkei don't think any patch is expected for swift3 -- i just want to be clear about the scope of affected clusters21:13
mattoliverok, and the readme does say it's frozen and all new patches goto the s3api middleware, so maybe its ok.21:14
mattoliverbut a good reason for anyone to finally upgrade from queens or before21:14
mattoliverzaitcev: did you guys have anyone still on pre-rocky? or is that something to ask cschwede ?21:15
timburkefor sure! thankfully, even if operators can't upgrade directly to a more-recent swift, the code change is literally one line21:15
timburkehttps://review.opendev.org/c/openstack/swift/+/870823/1/swift/common/middleware/s3api/etree.py21:15
zaitcevmattoliver: Yes. We still have customers on Queens.21:16
timburkeunfortunately, the best mitigation i see for anyone that can't do *any* sort of code change is to disable S3 access21:17
mattoliverthe backport is going to what, as low as wallaby you said, so its probably more of a case to anything before there. 21:17
mattoliverLike you say tho isn't a 1 liner21:17
mattoliverif redhat still package swift3 for queens maybe they can just at a patch to it. 21:18
timburkeif i can get stable gates happy again, i'm happy to do more backports -- more on that later, tho21:18
mattoliverkk21:18
timburkeany other questions or comments on the CVE? i want to give everyone a chance to digest it a bit21:20
timburkeall right, we'll move on -- if anyone needs more info about it, feel free to reach out to me, either in channel or privately21:23
timburkeand i'd like to give special thanks to OVH for discovering the issue, mattoliver acoles and clayg for reviewing the patch, and fungi for getting the patches into gerrit!21:23
timburke#topic vPTG21:23
fungimy pleasure!21:24
timburkejust a reminder that there's a vPTG scheduled for the end of march21:24
timburkemattoliver and i still need to get doodle poll and etherpad up21:24
timburkebut everyone should go ahead and register if they haven't already!21:25
timburke#link https://www.eventbrite.com/e/project-teams-gathering-march-2023-tickets-48397157099721:25
mattoliveroh yeah, I'll get on that etherpad, so we can start gathering ideas21:25
timburkethanks mattoliver21:25
timburke#topic gate health21:26
timburkeanother week, another gate breakage21:26
mattoliversigh21:26
timburkednspython 2.3.0 was recently released, which caused eventlet's monkey-patching of it to break21:27
mattoliveroh great :( 21:27
timburkethis would happen as soon as you went to import eventlet21:27
timburke#link https://github.com/eventlet/eventlet/issues/78121:27
timburkegood news is that a fix has merged to eventlet, and temoto tagged a new 0.33.3 release that includes it21:28
mattoliverSo we need to pin the package until there is an upstream fix?21:28
mattoliveroh wow, I like a quick turn around!21:28
timburke...yes and no. so, we *should* have been safe from this because of the general openstack upper-constraints policy21:29
timburkehttps://github.com/openstack/requirements/blob/master/upper-constraints.txt still lists dnspython===2.2.121:29
timburkeand in fact, *most* of our jobs were still fine21:30
timburkebuuuut... our docs build previously only specified the extra doc-building requirements21:30
mattoliverhey, it looks like you fixed it in upstream eventlet timburke, nice work!21:30
timburke:D21:30
timburkei also went ahead and fixed our docs job to properly use constraints21:31
timburke#link https://review.opendev.org/c/openstack/swift/+/87085321:31
fungiif it makes anyone feel any better (it probably doesn't), you're not alone. mistral spotted the exact same problem today, so i was able to point amorin at timburke's fix. worked like a charm there as well21:31
timburke👍 as long as the pain saves someone else some trouble, right?21:32
mattolivernice21:33
timburkereally, i don't think i would've minded *nearly* as much if we weren't also trying to get the CVE fix merged21:33
timburkethe doc-building fix also got backported -- wallaby through zed all have it now21:34
mattoliverlol, true21:34
timburkevictoria started running into other issues, though21:35
timburke#link https://review.opendev.org/c/openstack/swift/+/87078421:35
timburkethis is unfortunate and annoying -- not two weeks ago that gate was working and we merged the fix for the cpython '//' bug21:36
timburke#link https://review.opendev.org/c/openstack/swift/+/86814321:36
timburkei'll work on trying to get it functional again, but wanted to float a couple ideas21:38
timburke1. declare more stable branches end-of-life21:39
mattoliverfailures seem to be caused by the smmap package verson mismatch, maybe needs a specific pin? 21:40
timburke2. remove (or mark non-voting) some/many jobs from stable branches21:40
mattoliveryeah true, is there an openstack policy on how many stable branches to maintain?21:41
timburkemattoliver, yeah -- i think it's probably related to py2 support. thinking longer term, though, i'm willing to bet we'll see similar issues cropping up for py36 (which is no longer maintained by upstream cpython)21:41
mattoliveryeah, definitely looks py2, as obvioulsy the new version of smmap looks only py3+21:42
mattoliverso yeah, we're just going to get more and more of these21:42
timburkethere's https://docs.openstack.org/project-team-guide/stable-branches.html -- "OpenStack development typically has 3 branches active at any point of time, master (the current development release), stable (the most recent release) and oldstable (previous release)."21:43
mattoliverwe either need to lock all pre py3 branches down, pinning everything. Or maybe mark them as non-voting knowing that py2 support has bacially gone21:43
timburkewith the introduction of "extended maintenance" i'm not sure that quote is entirely true21:44
mattoliverWell based on n-2, we could remove a bunch of stable21:44
mattoliveralthough I know redhat do support for longer. So do they need more stable branches upstream?21:44
mattoliveror do we just need to support n-2 + some point in time LTS, but the latter can be non-voting for a bunch of tests?21:45
timburkemy impression is that we have a lot of discretion about both how many stable branches to support and what level of testing and support "extended maintenance" should mean21:47
mattoliverextended maintence does say reduced CI commitment which makes me think, non-voting or even removed gate checks21:48
timburkefwiw, i've left so many stable branches open so far for exactly the sort of situation in which we find ourselves: a pretty big security issue for which it'd be nice to offer downstream packagers an official release for old versions21:49
mattoliveryeah21:49
mattoliverwhich is good21:49
timburkebut if it turns into me fighting with CI off and on for a month or two to be able to land *anything*, i'm not sure it's worth it21:50
mattolivergo n-2 of them should be supported (cI etc) the rest we should be able to reduce  CI committment. maybe reduce it to pep8 and unit tests?21:51
mattoliverI guess functional and probe too, but we seem to be having package issues breaking those21:52
mattoliverOR, do we just force in this security bug to the old old stables and then EOF everything below wallaby and be done with it for now?21:53
mattoliver*security patch21:53
timburkenot on victoria, at least. could keep in-process func tests but drop dsvm, for example21:53
mattolivertrue21:53
timburkeidk -- i'll poke at it for another day or two, see what i can come up with. seems like a good topic for the PTG tho :-)21:54
timburke#topic open discussion21:54
timburkeanything else we should bring up this week?21:54
mattoliverWell I can't speak for anyone, but for now, I think reduce CI to make them work and get the current security fix in, then we can discuss ditching them at the PTG21:55
mattoliveror at least having our own definition of reduced CI committment that doesn't take all your time21:55
mattoliveralso sorry about it always falling to you timburke 21:55
timburkeeh, no worries -- there are worse things. just feels like i'm spinning my wheels sometimes, tho21:56
mattoliverOK open discussion, I'm playing with a sharding statemachine change to just freakin update the state_timestamp everytime a state changes (why we don't already is historic), but I feel it'll make life easier. So having a play with how much churn it causes21:58
mattoliveralot it seems in tests. 21:58
mattoliverhaven't pushed it up yet, and it's currently only an experiment, but if it works I think it'll make the early cleave and active stuff much more trivial to deal with.21:58
timburkenice! looking forward to it21:59
mattolivertrying to tread carefully because the state_timestamp is used to cycle round the statemachine, and statemachine changes can be fickle, so hoping I haven't missed something past al or I knew that currement me doesn't. 21:59
timburkei do wonder why it isn't like that already...21:59
mattoliveryeah, I agree, and it's because state_timestamp was added later to allow us to do back to active in roots, ie restart the statemachine22:00
timburkeall right, we're at time so i'll call it22:00
mattoliverkk22:01
timburkethank you all for coming, and thank you for working on swift!22:01
timburke#endmeeting22:01
opendevmeetMeeting ended Wed Jan 18 22:01:15 2023 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)22:01
opendevmeetMinutes:        https://meetings.opendev.org/meetings/swift/2023/swift.2023-01-18-21.01.html22:01
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/swift/2023/swift.2023-01-18-21.01.txt22:01
opendevmeetLog:            https://meetings.opendev.org/meetings/swift/2023/swift.2023-01-18-21.01.log.html22:01
mattoliverthanks for all the hardwork on the gate timburke 22:01
opendevreviewMerged openstack/swift stable/zed: s3api: Prevent XXE injections  https://review.opendev.org/c/openstack/swift/+/87082522:03
timburke🎉 i just realized! swift had it's 10,000th commit recently! 🎉22:59
timburkeof course, nearly half of those are merge commits -- but still, it's fun to celebrate round numbers :-)23:00
opendevreviewTim Burke proposed openstack/swift master: tests: Ensure XXE injection tests have config loaded  https://review.opendev.org/c/openstack/swift/+/87100523:16

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!