19:02:19 #startmeeting infra 19:02:20 Meeting started Tue Dec 3 19:02:19 2013 UTC and is due to finish in 60 minutes. The chair is jeblair. Information about MeetBot at http://wiki.debian.org/MeetBot. 19:02:21 * mordred hands morganfainberg his voice 19:02:21 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 19:02:21 mordred is more useful i'm sure in that regard 19:02:24 The meeting name has been set to 'infra' 19:02:33 #link https://wiki.openstack.org/wiki/Meetings/InfraTeamMeeting 19:02:33 #link http://eavesdrop.openstack.org/meetings/infra/2013/infra.2013-11-26-19.02.html 19:02:51 aww, I thought there was going to be an open meeting (for keystone) at the end :( 19:03:03 #topic agenda 19:03:05 tristanC, come chat w/ us in #openstack-dev 19:03:20 * morganfainberg quiets up so Infra can do awesome stuff. 19:03:36 because last week we did not get through the whole agenda 19:03:43 and also there was this holiday in the us... 19:03:52 * coolsvap is away: Away!!! 19:04:05 i think we should skip things covered last week and start with things we did not get to. 19:04:20 #action jeblair file bug about cleaning up gerrit-trigger-plugin 19:04:20 #action jeblair move tarballs.o.o and include 50gb space for heat/trove images 19:04:20 #action fungi grow logs and docs-draft volumes so they're 50% full 19:04:20 #action fungi update docs for static to recommend 1t cinder volumes 19:04:20 #action mordred to harrass hub_cap until he's writen the tempest patches 19:04:37 #topic Maven clouddoc plugin move (zaro, mordred) 19:04:56 zaro, mordred: you're up first! :) 19:05:07 the repo moved 19:05:14 \o/ 19:05:26 ok. patch is up for review. 19:05:50 #link https://review.openstack.org/#/c/46099 19:06:03 #link https://review.openstack.org/#/c/47937 19:06:31 i think that's a future topic 19:06:33 I find this work exciting, btw 19:06:34 opps previous one was wrong. it's https://review.openstack.org/#/c/58349/ 19:07:10 ohh and i think we'll need core to create maven nexus accounts for this to work. 19:07:32 #link https://review.openstack.org/#/c/58349/ 19:07:45 zaro: can you point us at how to create those accounts? 19:08:07 I believe you just go onto oss.sonotype.org and create an account. 19:08:22 its a bit more tricky than that 19:08:25 zaro: is dwcramer up to speed? he knows the repo has been moved? 19:08:30 as their release process requires gpg signing of things 19:08:35 zaro: i don't see any reviews from him... 19:08:37 jeblair: yes, been working with him. 19:08:58 jeblair: what review were you expecting? 19:09:03 but yes, you go to the sonotype site, submit a jira ticket ! and eventually you get an account. I was hoping for more solid footing on the gpg stuff before doing that though 19:09:05 o/ 19:09:18 clarkb: so jenkins needs to gpg sign artifacts before uploading? 19:09:27 yes 19:09:38 ok. i think we have a gpg key for jenkins, btw. 19:09:38 well something needs to sign it with a key that upstream trusts 19:10:11 cool I didn't know that 19:10:12 jeblair: yes, i sign the package when i do a release. 19:10:18 clarkb: i believe that would be jenkins, in our system, right? 19:10:50 we're talking about tag based versioning, right? where jenkins creates an artifact and uploads it based on a tag in gerrit... 19:10:53 jeblair: yes, unless fungi has sorted out a better way of doing it 19:11:01 zaro: i don't think there's an opportunity there for you to sign something. 19:11:18 I know fungi had ideas, but having jenkins sign is most straightforward 19:11:36 zaro: jeblair: right, individual signs the git tag, jenkins signs the package 19:11:41 one proposed alternative is to add a manual step for committing a detached signature to a repo and then having automation key off that change merging to do the upload of the package and sig together 19:11:41 jeblair: ohh. i seem to remember having to enter my password or something upon creating a tag. 19:12:00 zaro: yes, the _tag_ should be signed. 19:12:03 by you 19:12:29 fungi: of what would the signature be? 19:12:36 * ttx lurks 19:12:39 signature of the generated release artifact 19:12:47 fungi: roger 19:12:55 mvn repo requires signed artifacts 19:13:09 download the tarball or whatever it is, create a detached sig of it, and then upload a change containing that sig (to a separate signatures repo or branch or something) 19:13:47 this was the suggested alternative (or addition) to having automated package signing 19:13:54 clarkb: so what's the tricky bit again? same process as the jenkins deployments right? 19:13:58 i think we should proceed with jenkins signing for the clouddocs repo, for expediency 19:14:13 zaro: the tricky bit is the signing, we can go the easy route or we can do fancy things that fungi suggests 19:14:26 but I don't want to setup accounts until we have at least a solid idea of which route we are going 19:14:31 jeblair: ++ 19:14:33 fungi: because what you are discussing sounds more like something we want to do long-term for openstack releases 19:14:41 I agree with jeblair 19:14:43 well, i only suggest them as an alternative to people who have expressed concerns about the simpler way 19:14:58 right the simpler way seems like signing to have a signature 19:15:02 rather than signing to actually trust a thing 19:15:03 i am cool with the automated solution 19:15:35 clarkb: well, it means you can trust that this thing was created by our jenkins. 19:15:58 clarkb: and put the appropriate level of trust in 'a thing created by our jenkins'. which may not be high. :) 19:16:00 the upload slave can certainly provide some assertion. i already have a proposed mechanism in that bug, elegantly simple, to have it confirm the tag on the git repo matches the contents of the tarball it retrieves 19:16:48 the slave can't assert that it is not compromised itself, but it can at least indicate whether the tarball and/or git repo have been tampered with 19:16:56 I don't think the jenkins sig is perfect 19:16:57 BUT 19:16:59 it's better than no sig 19:17:06 and it's sooner than a perfect human sig 19:17:13 so we should at least do it 19:17:17 yup 19:17:21 while we figure out a way to do the other thing thta doesn't kill us 19:17:21 ++ 19:17:34 zaro: have you signed up a core person to get a nexus account? 19:17:36 no question. and i think it's possible to tack on the human sig solution without significant retooling later 19:17:45 ++ 19:18:05 jeblair: nope, looking for volunteers. 19:18:06 jeblair: zaro: I had looked at it at one point, and can look at it again. Unless someone more familiar with gpg wants to do it 19:18:19 sign me up 19:18:30 zaro: get me the specifics after the meeting 19:18:35 fungi: you got it 19:18:41 #action fungi create maven nexus account 19:18:43 fungi: cool 19:18:56 clarkb: fungi seemed to want it more. :) 19:19:14 #topic Private gerrit for security reviews (zaro, fungi) 19:19:32 :) np my brain melted a little the first time I looked at it (probably overthinking the signing problem) 19:19:38 zaro: sorry on this one--i haven't caught up far enough in my review backlog to revisit the current patchset 19:20:17 ohh. i'm trying to remember todo list for this one. but i think this one needs accounts as well. 19:20:43 the bigger thing it needs is for us to figure out how the projects will work. 19:21:03 you mean as far as git replication vs uploaded changes? 19:21:23 clarkb says we should set acls in all-projects and have per-project acls 19:21:23 or the manage-projects pieces 19:21:28 that's a lot of work. 19:21:33 zaro: we do it today 19:21:52 yea, seems like a lot of work. 19:21:54 its not that much work once you have it in place, the acls themselves don't change, just group membershio 19:22:25 right, that part. so the trick was working out a mechanism to manage the all-projects acl outside of gerrit's interface, including bootstrapping it. and the current suggestion is to punt because that's how we do the prod one 19:22:29 well. if that's the way we do it now. then i guess we replicate for private gerrit? 19:22:45 yes 19:22:56 i think so, anyway 19:23:17 ok. then i'll need to work with fungi to figure out all-project & per-project acl settings. 19:23:27 sounds good 19:23:32 i'm okay with punting for this 19:23:33 then somehow get that all into config? 19:23:52 i'm hoping that some of the folks working on downstream "infras" will contribute all-projects bootstrapping 19:24:22 zaro: yeah, i think it can be documented (the central bits) and then the per-project special acls can be kept in the config repo i think, applied via manage-projects like we do on prod 19:24:37 ohh yea, also i remember looking at this and it seems like a lot of work change pp files to templates. 19:24:49 fungi, mordred: though after bootstrapping, can't we manage all-projects acls in the usual way? 19:25:03 jeblair: yes 19:25:05 jeblair: yes, except for the part where it might lock you out 19:25:20 fungi: ssh? 19:25:33 fungi: more words: in such a situation, we could fix it by shelling into the server, surely? 19:25:37 since the all-projects acl also controls whether your automation account can push changes for acls 19:25:55 fungi: oh, and in that case we can even fix it using the webui. 19:26:02 yes, we could ssh in and hand-edit the acl on disk and hope we get it correct (or revert it would make more sense) 19:26:42 but correct, we could move that into config 19:26:50 zaro, fungi: maybe the security gerrit can guinea-pig managing all-projects in git? 19:26:58 zaro, fungi: and then we can extend that to regular gerrit 19:27:17 ++ I like that idea 19:27:29 sure. an easy first step would be simply documenting the minimal initial acl needed to get manage-projects able to apply the full one 19:27:49 why don't we guinea-pig in review-dev? 19:27:57 that would help the full bootstrapping process. 19:28:00 zaro: that's fine too. 19:28:20 win 23 19:28:26 i'de prefer to keep it seperate because to get all the acls right would be a large change. 19:28:49 zaro: what do you mean? 19:29:15 i think the right way to do the per-project acls would be to template the current set of alc config files. 19:29:29 though it's worth noting that there will be far fewer per-project acls for security reviewing. we can have one per program (not per project) receiving security support through the vmt, which is no more than a dozen in total 19:29:31 i'm not even sure how to do that yet. 19:30:04 ohh, that's a revelation. then maybe it's not such a big change. 19:30:32 i'd suggest a field in the jeepyb projects.yaml which indicates the name of the security acl, and then maybe a little tweak to manage-projects to determine which kind of acl to apply 19:30:50 fungi: sounds good. 19:30:54 that's just off the top of my head. might be better alternatives 19:31:00 mordred: ^ you've been in this code lately; thoughts? 19:31:11 why not two different project lists? 19:31:27 also doable, though results in more duplication 19:31:31 maybe that is too much trouble, but I don't see us putting stackforge projects on that server 19:32:00 clarkb: that's a good idea.... also, might we want to use the track-upstream feature? 19:32:05 i think we can either ignore the extra repos, or we can simply specialize manage-projects and the one yaml file a little further 19:32:08 to have security-gerrit track regular gerrit? 19:32:33 but tracking might be a good feature to leverage there instead of using one list, agreed 19:32:40 jeblair: I think we want to go the other way nad have regular gerrit update security gerrit 19:32:50 jeblair: but tracking may be more sane depending on workflow 19:32:57 clarkb: i think we said the same thing? :) 19:33:21 jeblair: replication vs tracking 19:33:22 yeah, tracking branches on the security gerrit would pull in updates from public gerrit 19:33:30 clarkb: security gerrit is downstream of regular gerrit. 19:33:35 I prefer replication over tracking, but am not involved in the workflow 19:34:07 clarkb: can you elaborate on what you mean by replication vs tracking? 19:34:25 replication also ends up sending the refs/for/stuff though, right? i mean, it can probably be ignored--i don't think it would cause collissions--but... 19:34:27 jeblair: I want review.o.o to replicate its repos to review-secure.o.o. So that review-secure.o.o is always up to date 19:34:44 jeblair: we might need to pick a crazy change number offset and that might still bite us, so not perfect 19:35:10 clarkb: isn't this what jeepyb's upstream-tracking is designed for? to keep a downstream repo up-to-date with an upstream one? 19:35:15 change numbers are only a concept inside the db (change-id headers are also unlikely to collide) 19:35:17 jeblair: sort of 19:35:31 jeblair: I am not a fan of tracking fwiw 19:35:47 it keeps certain branches in sync 19:36:02 but not the branches you want to work against in most cases, that is a manual step 19:36:10 clarkb: which, for security support development, is probably fine 19:36:21 right it depends on the workflow 19:36:55 we essentially want to track master and one or two stable branches per project we're supporting for this 19:38:06 fungi: so in this case all changes could be proposed against upstream/stable/foo rather than stable/foo 19:38:13 jeblair: sorry - was afk for a sec 19:38:17 and since changes won't get submitted and merged it is probably fine 19:38:26 jeblair: I agree that the work we're doing with track-upstream is EXACTLY trying to solve this issue 19:38:30 clarkb: ok, i could see how replicating might be preferable by being a bit more real-time (and not depending as much on manage-projects) 19:38:32 the problems arise when you need to take upstream/stable/foo and stable/foo and not hate each other 19:38:44 clarkb: right. just provides a convenient place to iterate through code review, and then they get discarded, downloaded, and pushed to proper public gerrit 19:39:05 the problem is exactly the same as a company working on a private fork of openstack that tehy're trying to track upstream on 19:39:19 mordred: agreed 19:39:21 mordred: except in this case we shouldn't have the merge problem so I am ok with it 19:39:35 :) 19:39:49 how about we take an action to sync up on the tracking thoughts 19:39:59 I think it's slightly verbose of a topic to cover this instant 19:40:05 ++ 19:40:09 ++ 19:40:15 yes, meeting topic sufficiently beaten to death for this week 19:40:27 i'm glad we uncovered this. :) 19:40:30 #topic Upgrade gerrit (zaro) 19:40:40 ok. best news of the week. 19:40:45 #link https://gerrit-review.googlesource.com/#/c/48254 19:40:48 it's merged! 19:40:51 * fungi cheers loudly 19:40:51 \o/ 19:40:56 congrats, zaro :) 19:41:07 yaaaay! 19:41:13 what now? 19:41:29 zaro: this is post 2.8, and should be in 2.9, right? 19:41:35 zaro: eta on 2.9? 19:41:38 yes. 19:41:40 woohoo! 19:41:48 does this achieve upstream feature parity with our current workflows? 19:42:01 fungi: or what we hope will be equivalent 19:42:01 or is there more outstanding 19:42:11 I would be ok with running a forked 2.8 with that patch on top of it if we can iterate that quickly 19:42:15 then go to 2.9 when that happens 19:42:29 clarkb: me too, but i'm trying to figure out if that's necessary... 19:42:33 ++ 19:42:49 gerrit doesn't have release cycles aiui so 2.9 could happen whenever 19:42:56 though they seem better at doing them regularly now 19:43:04 carrying patches we know are already merged upstream and will go away when we upgrade seems okay *if& we need to do that 19:43:20 _david_ might know 19:43:25 zaro: so, assuming 2.9 isn't expected in, say, 2 weeks.... 19:43:58 zaro: we pull 2.8 into openstack-infra/gerrit, build it, and deploy on review-dev 19:44:15 figure out what needs to happen to do the upgrade (if it's not fully automatic) 19:44:18 jeblair: sounds good to me 19:44:19 make config changes, etc... 19:44:37 there are some _serious_ problems with the gerrit ui that have developed since the last time i looked 19:44:45 oh yeah? 19:44:48 jeblair: do we want to do WIP vote or WIP button (plugin) 19:44:50 ? 19:44:53 change screen 2 is not fungi device happy 19:44:53 mordred: look at the link zaro sent 19:45:05 WOAH 19:45:28 that's crazy looking 19:45:39 comments are too wide, the tabs can get even wider, meaning it won't fit even on a 1280 pixel wide screen 19:45:52 it uses g+ avatars (i assume/hope that can be disabled) 19:46:04 I like some of the changes, in particular in the diff screen 19:46:18 that cherry-picks thing is interesting 19:46:25 that is sorta wideish. i still have to scroll sideways when fullscreening a browser on a 1080px-wide display 19:46:56 so anyway, i expect we have some tuning we may need to do. 19:46:56 i'm hoping 1440px will be wide enough 19:47:04 I like that the reply button popup is better 19:48:02 maybe they could make the layout configurable/skinnable 19:48:31 fungi: i honestly don't know what's tunable, which is why i think we should get it up on review-dev and start poking at it 19:48:36 ++ 19:48:36 jeblair: ++ 19:48:43 yup, absolutely 19:48:51 hopefully there are things we can do in config and css 19:49:05 but there's a possibility that some things may need upstream patches (if just to expose a parameter in config) 19:49:13 so we should be prepared for that. 19:49:40 btw how it looks like on MBA (1440x900) - https://dl.dropboxusercontent.com/u/33687550/Screen%20Shot%202013-12-03%20at%2011.48.21%20PM.png 19:49:44 at any rate, as much as i'd like to roll this out as quickly as possible... we have _a lot_ of developers, so we need to get the details right. 19:50:25 yes, i think the fewer number of times we change this up on them in production, the happier everyone will be 19:50:36 it's going to be disruptive no matter how smoothly it goes 19:51:10 #topic Proposed next bug day: Tuesday, December 17th at 1700 UTC (pleia2) 19:51:24 we should also maybe compile a list of the good new features so that people are aware of them eg better search 19:51:25 so I was looking at the calendar 19:51:38 our final two meetings of the month land on Christmas Eve and New Years Eve 19:51:52 I'm going to be doing the family thing for the holidays, so I'll be family + airplane respectively on these days 19:52:04 but it would be nice to have a bug day before the new year, so December 18th 19:52:07 err 17th 19:52:15 i can be around for both those meetings, but suspect i might be one of the only people in here 19:52:17 17th isn't good for me, but 18th should work 19:52:24 or next week is good 19:52:58 i'll be around 19:53:00 isn't icehouse-1 this week? 19:53:06 yeah 19:53:12 we could try to stick to week after milestone which would mean bug day next week 19:53:18 wfm 19:53:28 so December 10th 19:53:30 i think we may cancel the christmas and new years meetings. :) 19:53:38 ++ 19:53:41 jeblair: yeah, I'm thinking that too 19:53:44 pleia2: I like that plan 19:54:10 i'm good with the 10th for bugs 19:54:15 me too 19:54:18 great, I'll add it to our wiki 19:54:42 thanks pleia2! 19:55:02 pleia2: thanks! 19:55:05 #topic Zuul release (2.0?) / packaging (pabelanger) 19:55:33 pabelanger: i take this to mean you think it's time. :) 19:55:40 it's probably a bit past time, really 19:55:47 jeblair: Ya, I think we are ready to get started on packaging 19:56:04 and since it is a big change after 1.3 for the triggers, I guess we should consider 2.0? 19:56:05 though it might be worth waiting a bit to see if the split gate bug can be tracked down 19:56:05 i will try to take a look and make sure it's ready (docs caught up with features, etc) 19:56:23 and yes, definitely 2.0 -- it's full of breaking changes (documented in the NEWS file i believee) 19:56:37 2.z0mg 19:56:45 jeblair: ++ 19:56:46 Event if it is not a full release, maybe an alpha? 19:56:54 Even* 19:58:00 pabelanger: i think we can do a full release soon 19:58:07 Perfect 19:58:42 we certainly have tested it (in production!) 19:58:54 indeed! 19:59:02 #topic Open discussion 19:59:12 anything else in the next minute? :) 19:59:14 o/ not much time left 19:59:19 thought I'd mention a pecan review I have open 19:59:19 https://review.openstack.org/#/c/58643/1 19:59:31 it's failing to run ceilometer tests, as it can't connect to mongodb for some reason 19:59:43 I nagged Monty about it yesterday, but just thought I'd ask around again 19:59:44 I have looked at the above and find it very odd 19:59:54 mongodb is only available on the centos slaves 19:59:55 because the log does show mongo launching successfully 19:59:57 I can confirm that it works just fine when run via tox on my own precise images on DH's cloud 19:59:58 where are those jobs running? 20:00:03 i will be disappearing for a couple hours tomorrow afternoon 20:00:07 local osug meetup 20:00:07 mongodb on precise is too old for ceilometer 20:00:16 oh I am disappearing tomorrow mid day due to dentist 20:00:17 ah. that might be the problem ryanpetrello is seeing then :) 20:00:22 yep, that might be it 20:00:56 thanks everyone 20:00:58 #endmeeting