Thursday, 2018-08-23

*** sfbender has joined #softwarefactory05:33
sfbenderTristan de Cacqueray created software-factory/python-log2gearman-distgit master: Add missing paho-mqtt worker requirement  https://softwarefactory-project.io/r/1348705:33
*** nchakrab has joined #softwarefactory06:23
nchakrabHey folks, I am trying to add https://github.com/ansible-network/vyos/ repo to https://softwarefactory-project.io/r/#/c/13403/1/resources/tenant-ansible.yaml. Can anyone please point me to the repo that I need to clone and raise a PR for adding `-ansible-network/vyos`?06:30
tristanCnchakrab: on that click, you can click the "gear" next to the project name to get clone command07:15
tristanCnchakrab: it's "git clone https://softwarefactory-project.io/r/config"07:16
tristanCnchakrab: https://softwarefactory-project.io/docs/user/contribute.html07:16
nchakrabtristanC: Thanks! Cloned the repo.07:22
*** jpena|off is now known as jpena07:36
nchakrabtristanC: Successfully pushed the changes using git review07:48
nchakrabRequesting you to have a look at it. Thanks!07:48
tristanCnchakrab: nice, thanks! i've approved it08:02
nchakrabThank you!08:02
tristanConce it's merged, a config-update job will run to apply the configuration, the new project should be registered in few minutes in https://ansible.softwarefactory-project.io/zuul/projects.html08:02
nchakrabDo I need to merge it?08:06
nchakrabtristanC: ^08:06
tristanCnhicher: zuul merge the change when it's approved, it actually just merged08:06
nchakrabOk. Great!08:10
*** jpena is now known as jpena|lunch11:03
ganeshrnhttps://github.com/ansible-network/yang/pull/7 <-- need help with this PR11:27
ganeshrni want hold the junos node so that i can ssh and try to figure out the root cause of failure11:27
tristanCganeshrn: i'll add an autohold for the yang_fetch-vqfx-devel-py2 job12:00
nhicher /names12:03
*** jpena|lunch is now known as jpena12:09
ganeshrntristanC: thanks12:19
tristanCganeshrn: how to add your key on such nodes? the shell is admin@test> ...12:28
*** nchakrab has quit IRC12:29
tristanCoh, sftp works, let me copy your key12:29
tristanCganeshrn: you should be able to ssh admin@38.145.35.108   using your github ssh key12:31
ganeshrntristanC: yes i can login12:32
ganeshrnthanks for the help12:32
gundalowtristanC: pabelanger rcarrillocruz How do you you think we can proceed with tenant configuration (end of) https://etherpad.openstack.org/p/gundalow14:25
tristanCgundalow: not sure if rcarrillocruz documented what he would like to have. we could proceed with any choosen proposal14:27
gundalowah, good spot14:28
tristanCi would prefer proposal C as it only need better documentation, but don't mind any other proposals14:29
rcarrillocruzi prefer different tenants prroposal14:36
rcarrillocruzif it can be done within SF, let's be it14:36
rcarrillocruzwe don't have a common CI team across all Ansible14:36
rcarrillocruzdifferent teams have different needs14:37
rcarrillocruzdifferent secrets, different cloud providers needs14:37
rcarrillocruzetc14:37
rcarrillocruzhaving two trusted projects is confusing, regardless of documentation, and can wedge things14:37
* rcarrillocruz goes away for other call14:37
pabelangerwould agree with 2 tenants too, even to start. Merging back to a single tenant down the road could be a long term goal too.14:44
tristanCrcarrillocruz: having a common CI across all Ansible is why i think we should try to make a single tenant work as needed14:44
pabelangerwe'll be making pipeline changes for ansible-network to be gating, and since ansible/ansible isn't up to speed yet for CI configuraiton, we don't want to confuse their pipelines too14:45
tristanCpabelanger: why would it confuse the pipelines?14:46
pabelangercould see confusion if SF bot started leaving comments on a check job in ansible/ansible if configured14:47
pabelangertoday, it is not reporting IIRC.14:47
pabelangerwe'll need zuul to start dropping label to start gating14:47
gundalowJust for clarification, one of the business goals of the Galaxy roles under gh/ansible-network was so the Network Team can release Ansible Roles independently from Ansible. ie Roles can be release every two weeks, where as Ansible releases only 2-3 times a year14:47
gundalowpabelanger: Could you please expand on `we'll need zuul to start dropping label to start gating`?14:48
rcarrillocruztristanC: that's the thing, organization wise, we don't have a common CI team. It would make sense to have one tenant if we have one, but we don't14:48
pabelangerbasically, I think ansible-network is ready to gate on zuul and start experimenting on the faster release cycle that gundalow just mentioned. I think ansible/ansible needs more planing and dicussing with the larger community14:48
rcarrillocruztherefore, it makes sense to setup the tenants to mimic our orgs14:48
rcarrillocruzthere's no  word on whether core is going to adopt zuul14:48
tristanCgundalow: i don't understand why you can't have 2 project with 2 different releases system not share the same tenant and pipelines14:48
rcarrillocruzor galaxy14:48
rcarrillocruzor tower14:48
rcarrillocruzthey may14:48
rcarrillocruzmay be not14:49
rcarrillocruzthere's no schedule14:49
rcarrillocruzplease let's not confuse branching and releases  with tenants14:49
rcarrillocruzlet's talk about the tenants14:49
pabelangergundalow: we need to configure the zuul github app to vote on a PR, I believe this is done with label in github14:49
pabelangergundalow: so, then zuul will first look to that, to ensure all tests passed, before adding the PR into gate pipeline and trying to merge14:49
gundalowTristanC I was just giving background, I currently have no preference on single vs multi tenant14:50
tristanCpabelanger: you can do with 'status', and the gate pipeline is already configured to required a check success status14:50
pabelangerah, okay. Getting term mixed up14:50
rcarrillocruzhere's my vote:14:51
rcarrillocruz1 prefer two tenants14:51
rcarrillocruznow, if two tenants are not possible due to SF resources or limitations14:52
rcarrillocruzwe rename ansible tenant to ansible-network tenant14:52
rcarrillocruzand ew consolidate all jobs in ansible-network zuul-config14:52
rcarrillocruzhaving two trusted projects is a no go to me14:52
pabelangeryah, that would work too14:52
pabelangeruntil ansible/ansible as a community has the zuul discussion14:53
rcarrillocruzin the end, what we are going to test in ansible/ansible are *just* network things, i.e. things my team takes care14:53
rcarrillocruzso it makes sense to have it on our namespace14:53
rcarrillocruzotherwise contributors may look around ansible namespace, which obviously has more eyes than ansible-network, and will just 'assume' 'oh, this is the new zuul ci thing, let me PR against it'14:53
pabelangertristanC: how does ^ sound?14:54
tristanCthat sounds like what we had before we migrated stuff to a/z-c :)14:55
tristanCi thought the goal with the merge was to aim for a common ci accross ansible things14:56
rcarrillocruzwell, i never said to have a zuul-config on ansible/ansible AND ansible-network, i wasn't part of that conversation14:56
rcarrillocruztristanC: we use the tools to serve our processes, the thing is we don't have a common CI team, therefore we  said to have two tenants14:56
rcarrillocruznow you pushed back, cos you said it was hard for SF14:56
rcarrillocruzto support multitenant14:56
rcarrillocruzthe vhosts on ansible.sf.io etc14:57
tristanCrcarrillocruz: it's not particular hard for SF, i just want to get this story right and not have to revert changes in a few weeks14:57
pabelangerI don't know if it is hard, but maybe not something supported right now on a single SF install14:57
pabelangerat least that is what I understand from ticket14:58
rcarrillocruzok tristanC14:58
rcarrillocruzi thikn it's better for you14:58
rcarrillocruzto have one tenant14:58
rcarrillocruzright?14:58
rcarrillocruzit's more appealing than two ?14:58
rcarrillocruzcos frankly, what i'm -2 is two trusted projects14:58
rcarrillocruzi think tenants to isolate is good, but not a blocker for me14:58
gundalowYup, is "Do we have to use two trusted projects" the real question here?14:59
rcarrillocruzin the end , dev moving forward is going to be largely in ansible-network for us, not ansible/ansible14:59
rcarrillocruzansible/ansible will stay mostly frozen14:59
pabelangergundalow: I think it was the comment about ansible/ansible not depending on ansible-network namespace for jobs14:59
gundalowfor gh/ansible/ trusted config shouldn't change much14:59
pabelangerwhich, if 2 tenants, makes that easy to protect14:59
tristanCi don't mind either way, but as you say, if a/a is frozen, then why bother with having a tenant for a/a/ ?14:59
pabelangerin a single tenant, it is up to users to try and pervent that15:00
rcarrillocruztristanC: ok, then i think we have a winner15:00
rcarrillocruzsingle tenant15:00
rcarrillocruzrename to ansible-network15:00
rcarrillocruzditch ansible/zuul-config15:00
rcarrillocruzkeep ansible-network/zuul-config as single trusted project15:00
rcarrillocruzas for branching, which is what gundalow was concerned about, that doesn't matter where it lives, the branches are a repo thing15:00
rcarrillocruzmeaning15:00
rcarrillocruzwe can have devel/stable-2.6, etc jobs15:00
rcarrillocruzin ansible-zuul-jobs15:01
tristanCso that's new proposal, would you mind recording it in the etherpad please?15:01
rcarrillocruzand even ansible-network/zuul-config15:01
gundalowI don't want branches in anything apart from ansible/ansible. Need to have all of of what changes in the ansible/ansible repo15:02
tristanCi mean we'll propose a story with action item, and add it to the next sprint15:02
rcarrillocruzdone15:02
rcarrillocruzgundalow: that's not an issue, if you want to have all job definitions for ansible/ansible and not depend anywhere, then you put zuul.d within it with the job definitions15:03
pabelangergundalow: I think that will work, the part we might need to dive into is branching zuul config project, etc zuul-config. It possible to branch that, but so far zero projects are doing it. I think my suggestion would be to keep that branchless for easy of use15:03
pabelangerand keep backwards support of jobs until stable branches are retired15:04
gundalowThough a/a is not trusted, so we can test the PRs15:04
gundalowCurrently I think it's only the base jobs that are outside of a/a15:04
pabelangeryah, I don't think ansible/ansible would be trusted, because just for that reason no pre-merge testing15:05
pabelangergundalow: right15:05
rcarrillocruzit can't be ... ansible/ansible is not a trusted project15:05
rcarrillocruzit's a repo that contains software that we want to test15:05
tristanCpabelanger: https://git.zuul-ci.org/cgit/zuul/tree/zuul/configloader.py#n1934 seems to indicate only the master branch is loaded from config-projects15:05
rcarrillocruza trusted project is roughly a zuul specific repo15:05
rcarrillocruzto host15:05
rcarrillocruzbase jobs15:05
rcarrillocruzsecrets15:05
rcarrillocruzand that about it15:05
pabelangertristanC: yah, I don't think we've every discussed multi branch for config project15:06
pabelangerI think zuul would get very complicated fast in that case15:06
gundalowadding more branches in sounds like it's making it more complex, and moving away from your existing established workflowa15:07
gundalowworkflows*15:08
rcarrillocruzi'm confused gundalow , you said jobs needed to be versioned... i.e. jobs for ansible devel, devel branch on ansible-zuul-jobs15:13
rcarrillocruzstable-2.5, stable-2.5 jobs branch15:13
rcarrillocruzetc15:13
rcarrillocruzi mean, we need to have the jobs in branches accordingly...it's part of how zuul works, it implictly checks out the branch being tested15:13
gundalowI thought you meant branched zuul-config15:16
gundalowAs well as branched a/a15:17
rcarrillocruzupstream openstack does not have branched zuul-config, i think some have it hacked it up, but is not the common case15:18
rcarrillocruzthe branches are in the untrusted repos15:18
gundalowOK15:18
pabelangergundalow: right, I think from ansible POV and workflow, you can keep your current branching strategies but for zuul base jobs and some zuul config, I would think it will be easier to manage if branchless.15:19
pabelangerzuul jobs have setting for branch selection and overrides15:20
pabelangerso we can have 2 jobs in a single branch, but will work differently on branch A and B15:20
pabelangerso far with openstack and rdoproject, a master branch for zuul config has worked well15:20
pabelangerwhile projects themself branch at will15:20
rcarrillocruzyeah, and if three's really a need for a base job that is only needed in a branch, is not the end of the world to create a new one with a different name15:23
gundalow+115:24
rcarrillocruzgah, other call15:25
rcarrillocruzwhat a day15:25
rcarrillocruzttyl15:25
pabelangergundalow: rcarrillocruz: https://zuul-ci.org/docs/zuul/user/config.html#attr-job.branches would be the job setting15:26
pabelangereven has an example15:26
pabelangeryou'd likely do that for per branch base jobs15:26
pabelangerhowever, I've yet to see an example where that is needed15:27
gundalowAs most configuration for a/a will be in the branch, including job definitions which specify modest. I agree I doubt we'd need that15:28
gundalowThe reason I keep on going on about a/a is we need to support testing n-3 major releases and things will change dramatically over time15:29
gundalowAs long as that requirement is met I don't care much15:30
gundalowIf we have separate tenants does that mean we have separate VM resource pools?15:31
pabelangerno, VM pools can be shared across tenants right now15:35
pabelangergundalow: is there a list of nodesets that ansible/ansible needs today?15:36
rcarrillocruznone unfortunately15:37
pabelangergundalow: again, in openstack-infra, we had openstack-zuul-jobs which contained things like default nodesets and job templates, which projects would use15:37
rcarrillocruzpabelanger: let me link what i worked on since last week15:37
pabelangerthen, more specific testing needs would be contained in openstack-dev/devstack, since that is the default testing platform15:37
rcarrillocruzhttps://github.com/ansible-network/yang/pull/715:37
rcarrillocruzcheck the depends on15:37
rcarrillocruzthe idea is15:38
rcarrillocruza n integration job will be made of two nodes15:38
rcarrillocruza controller (fedora for example)15:38
gundalowpabelanger: today just `ansible-network-vyos-1.1.8` for  a/a15:38
pabelangerso far, I've found keeping nodesets out of branches to be a good practice, but means nodesets need to live as long as the oldest branches15:38
rcarrillocruzand an appliance15:38
rcarrillocruzvyos15:38
rcarrillocruzvqfx15:38
rcarrillocruznxos15:38
pabelangerbut, the majority of testing in openstack is on LTS platforms, so ubuntu / centos15:38
rcarrillocruzright now we just have vqfx, the ansible-network-vyos is somethingi pulled up with the nested VM idea15:38
rcarrillocruzbut since we are going to vexxhost for nodepool, we don't share a sec group15:39
pabelangerwith the appliances you listed, I think they could be in a branchless project for all branches to use15:39
rcarrillocruzso we can have appliances running witout opening ports that may not be relevant to other node types for other tenants/projects15:39
pabelangerthen only removed, once all jobs have been retired15:39
pabelangerand the cool thing about zuul15:39
rcarrillocruz( i know now nodepool you can specify a sec group, ,but months ago it was just 'default' secgroup)15:39
pabelangeryou cannot just remove a nodeset if still in use by a job in a branch15:39
pabelangerso there shouldn't be a way to break job config15:40
pabelangerrcarrillocruz: is there any redistubtion issues with some of the images?15:41
rcarrillocruzwith these, we don't15:41
rcarrillocruzthere are some we are using in DCI that we shouldn't be using in CI, but...15:41
rcarrillocruzi want get rid of them15:41
pabelangerokay15:41
pabelangerrcarrillocruz: and some are using nested virt?15:42
rcarrillocruzwith the nested approach, i was15:42
rcarrillocruzi.e. the ansible-network-vyos it's a fedora, that on boot launches with qemu and nested virt enabled a vyos appliance15:42
rcarrillocruzbut the vqffx thing i pasted, it's not a nested image15:42
rcarrillocruzis THE vqfx15:42
rcarrillocruzthat's why i need a controller, two nodes nodeset15:43
rcarrillocruzso i can checkout the PR, and do 'ansible-playbook tests/test.yml' kind of thing15:43
pabelangeryah15:43
pabelangerrcarrillocruz: is there any plans for ubuntu testing?15:43
pabelangerright now I think you are using fedora15:43
rcarrillocruzwe don't care15:44
rcarrillocruzthe roles and modules we write interact with network appliances15:44
rcarrillocruzthe only thing we do care from testing perspective is py2 and py315:44
pabelangerI've found, since fedora is fast moving, it is a little disruptive for jobs. And maybe consider some LTS for that15:44
rcarrillocruzand branches, e.g. devel, 2.615:44
pabelangerhopefully centos-8 in coming months15:44
rcarrillocruzpabelanger: i don't care, providing we can have py2 and py3, we can use ansible with pip15:44
pabelangerokay, so maybe ubuntu-bionic15:45
pabelangergives you 2 years15:45
pabelangerbefore moving again15:45
pabelangerpython3 on centos-7 is a non starter sadly15:45
pabelangerunless you pull in a bunch of external repos15:45
rcarrillocruzpabelanger: i think from 'politics' perspective, maybe better centos with external repos15:46
rcarrillocruzlike, i got asked 'why you test ovs against ubuntu, you should use centos/fedora' :P15:46
pabelangeryah15:47
pabelangerthere is just some issues with dual python stack right now15:47
pabelangeropenstack is having a hard time with that from redhat POV too15:47
*** jpena is now known as jpena|off16:25
*** sshnaidm is now known as sshnaidm|off17:54

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!