[02:15] what does bzr mean when it returns error code 3 ? [06:02] rogpeppe: i think i have a solution to maek the ssh tests much cleaner [06:02] if you want it [06:02] -- but i know you're busy tearing that out [06:43] fwereade_: morning! [06:43] rogpeppe, heyhey [06:43] rogpeppe, how's it going? [06:43] fwereade_: sorry about trunk breakage last night [06:43] fwereade_: i didn't realise i had an old version of mongodb [06:44] rogpeppe, no worries [06:44] fwereade_: not bad at all, thanks. [06:44] fwereade_: and you? [06:44] rogpeppe, yeah, not bad :) [07:00] morning [07:05] fwereade_: i'm adding admin-secret to the environment configuration, and i *think* it should be part of config.Config, not specific to the ec2 config. it's an interesting case though, because it's *really* secret - it doesn't get pushed with the other secrets. [07:06] fwereade_: so i'm not sure whether to have a "ReallySecretAttrs" method in environs, or just to make a special case for admin-secret [07:06] * fwereade_ thinks [07:06] morning TheMue btw [07:07] fwereade_: heya [07:07] rogpeppe, sorry, no strong feelings either way, just a sense of unease [07:08] fwereade_: yeah, special cases make me uncomfortable too [07:08] TheMue: hiya [07:09] rogpeppe: a wonderful morning to you too (even if it is raining here) ;) [07:09] TheMue: beautifully sunny this morning. (sun just up) [07:10] rogpeppe: we had a nice october so far until yesterday. since then mostly rain, too much rain [07:43] rogpeppe, wow, massive filter change works as expected; simplifies uniter noticeably; but pushes the tests up over a minute :/ [07:44] fwereade_: cool, but... [07:44] fwereade_: what's taking all the time in the tests, out of interest? [07:44] rogpeppe, thus far I know not, I will do some poking around [07:44] fwereade_: worth doing, i think. [07:45] fwereade_: go test -gocheck.vv | timestamp is always a good start [07:45] rogpeppe, some of it is probably attributable to just doing more work more often but iyt's a bit of a big change for that I think [07:55] fwereade_: a small CL: https://codereview.appspot.com/6589072/ [07:56] fwereade_: for context, here's the authentication sketch: http://paste.ubuntu.com/1259533/ [07:56] davecheney: it would be good to have some feedback from you about the authentication scheme too, if poss [07:56] rogpeppe: sure thing [07:57] rogpeppe: did you see my comment about improving the ssh tests ? [07:57] davecheney: i did [07:57] althought I realise the horse has bolted [07:57] davecheney: yeah, no point in flogging that one [07:57] rogpeppe: right-o [07:57] rogpeppe, so --initial-password will be ignored if a password file exists [07:57] davecheney: i'm interested to know what your plan was though [07:57] fwereade_: yes [07:57] rogpeppe: http://codereview.appspot.com/6601043/diff/3011/ssh/sshtest/sshtest_unix_test.go [07:57] ~ line 150 [07:57] fwereade_: well actually, it might not be [07:58] rogpeppe: which CL is the authn Cl ? [07:58] fwereade_: if we fail to connect with the password, we'll try initial-password [07:58] the paste ? [07:58] davecheney: yeah [07:58] kk [07:58] fwereade_: because we might have written the password file but failed to change it [07:59] rogpeppe, ah, sensible [07:59] rogpeppe: i'm not sure how helpful this is [08:00] but the primary customer inside canonical is Elmo [08:00] so if he doesn't like the smell of this [08:00] irrespective of its other merits [08:00] it's game over [08:00] not saying he won't like it, or that what you have is not correct [08:00] rogpeppe, CL LGTM, I will try to get myself into a suitably adversarial mode before tackling the auth overview [08:00] davecheney: i'm not sure who Elmo is [08:01] me neither [08:01] but I hear he's the big cheese of the internal sysadmin team [08:02] davecheney: ok, i'll make a write-up and put it on juju-dev [08:03] rogpeppe: that sounds like an excellent plan, then others can distribute as necessary [08:04] rogpeppe: my only comment of note, is the storing of the key on disk per machine agent [08:04] i don't have a solution to this [08:04] davecheney: indeed. we need to store it somewhere [08:04] only observe that others will see it as a potential loophole [08:04] davecheney: we must be able to connect after reboot [08:04] yeah, [08:04] is there a concept of differeing levels of privilige ? [08:04] davecheney: ssh has exactly the same issue [08:05] rogpeppe: yup, it sure does [08:05] davecheney: in fact any autonomous agent must have the same issue [08:05] davecheney: the only solution is authenticated h/w [08:05] davecheney: which we don't have. [08:06] rogpeppe: and i'm not sure if that would actually solve the problem [08:06] the issue, as i understand it is [08:06] user X on machine Y can get root, then get whatever details they need to connect to the state, rip off the AWS keys .. [08:06] is that correct ? [08:07] davecheney: if there was a way of propagating a secret from bootstrap stage to the agent itself, then we could use the secret, then destroy it. then even if you were root, you couldn't get it. [08:08] davecheney: but of course the agent needs to keep the secret around, so even then we're vulnerable [08:08] rogpeppe: the secrets are in the /e document in the /e collection, right ? [08:08] davecheney: it's a pity everyone has root access [08:08] davecheney: no [08:08] davecheney: these secrets are not [08:08] rogpeppe: but the AWS creds we're trying to protect are [08:09] davecheney: yes, they are currently [08:09] davecheney: but they won't be when we use this scheme to leverage principal-specific access controls [08:09] so, if by some mech, the /e document could be protected from access by the machine agent, would that be a solution ? [08:10] davecheney: it's not a solution to malicious entities on the machine being able to impersonate the machine agent [08:10] davecheney: but that is necessary too, yes [08:10] rogpeppe: is their a spec for the security model ? [08:10] davecheney: no [08:11] davecheney: sigh [08:11] rogpeppe: i'm not sure how to proceed without this [08:11] at best you'll implement whatever is inside gustavos head [08:11] and worse, you won't [08:11] and niether case may be what customres want [08:12] davecheney: i see what we're doing here as a necessary prelude to implementing the final security model, which is unspecified [08:12] davecheney: we're adding the notion of a principal to the state info, which i think is always going to be necessary. [08:12] rogpeppe: i'm concerned it is equiv to starting to walk in an unspecified direction, without picking a destination [08:13] rogpeppe: please understand, i'm not have a go at your solution, [08:13] davecheney: ok, the basic security model, as i understand it is: [08:13] you know my pickyness for implementing security without a spec [08:14] davecheney: agents identify themselves to the state; the state allows agents to agent-specific things. [08:14] s/to agent/to do agent/ [08:14] rogpeppe: but there is an unspoken requirement that agents cannot be impersonanted [08:14] davecheney: yes... well, kinda. [08:15] davecheney: damage limitation [08:15] davecheney: we don't want any random non-root user on a machine to be able to impersonate that machine's machine agent. [08:15] davecheney: but if you're root, you're going to be able to do what you damn please [08:15] rogpeppe: then putting the per machine agent password in a 0600 file would work [08:16] but i think further consultation with the customer is needed [08:16] davecheney: yes, that's what we're doing [08:16] i'm pretty sure that someone is going to say 'but what if they get root' [08:16] davecheney: there's nothing we can do in that case. [08:17] yup [08:17] davecheney: the trickiness in the spec i pasted above is because there's no way of passing a secret to the initial machine agent that's not accessible by non-root users. [08:17] davecheney: hence --initial-password [08:17] but that is probably going to meen elmo rejects the idea, and we've done a lot of work for nohting [08:17] davecheney: he can't ask the impossible [08:18] he's a very powerful customer [08:18] davecheney: this is significantly better than what we had before - entities get permissions on a need-to-have basis. [08:18] davecheney: sure, but we're talking *impossible* here [08:19] davecheney: noone else will be able to do better [08:19] rogpeppe: i never said the customer was rational :) [08:20] davecheney: also, you won't be able to do much by impersonating a machine agent, even if you are root. [08:20] and malicious [08:21] davecheney: in fact the machine agent doesn't need to be able to write to the state at all [08:22] davecheney: you can do a little more by impersonating a unit agent, but again, not too bad, i think. [08:23] davecheney: this all assumes an entity-aware API of course. [08:24] davecheney: the thing i'm most concerned with is man-in-the-middle attacks. i don't see how we can protect against those unless we have some kind of key-distribution scheme. [08:26] rogpeppe: them why does the MA need a password at all ?> [08:26] i we treat the machine and the machine agent as untrusted [08:26] you can ignore their credentials [08:26] davecheney: we want to partition machines [08:27] rogpeppe: can we trust the LXC security boundary ? [08:27] davecheney: and i don't think we can entirely assume that non-root users can always obtain root. [08:27] davecheney: apparently not. for root users within LXC anyway. [08:27] rogpeppe: if that is a working assumption, then the job is a lot easier [08:29] davecheney: i think our advice should be (as per usual) don't run untrusted stuff as root. [08:29] seconded [08:30] davecheney: this means we've essentially got a two-tier security model. primary layer: TLS-based authentication; secondary layer: entity name/password authentication [08:31] davecheney: we assume that a malicious root user can bypass the secondary layer, but not the primary layer. [08:32] rogpeppe: is the tls layer using client side certs ? [08:32] davecheney: it'd better! [08:32] otherwise it isn't a security authn mech :) [08:32] davecheney: indeed [08:32] davecheney: and vulnerable to man-in-the-middle too [08:33] davecheney: we need a way of securely passing a cert to a new machine [08:33] davecheney: ISTR that amz supports this [08:33] davecheney: dunno about others [08:33] rogpeppe: in the puppet model the client generates the cert and sends it to the server for signing [08:34] davecheney: how does the server know where the cert is coming from? [08:34] the admin is expected to manage that out of band [08:34] just like gpg [08:34] davecheney: we can't do that - it's all autonomous [08:35] ie, if you weren't expecting to see a cert request, then don't sign it [08:35] of course, most envs turn on automatic cert signing [08:35] davecheney: of course. [08:35] davecheney: i don't even see how an admin can know [08:35] security is hard, shall we go shopping ? [08:35] davecheney: ooh shiny [08:36] rogpeppe: generally you install machine x, insgtall puppet, then tell it to join your puppet server [08:36] go to the server, accept the request [08:36] then profit [08:36] davecheney: what if someone got in there between the install and going to the server? [08:36] davecheney: of course, it may be improbable, but... [08:37] puppet assumes you control the security of your environment [08:37] it's a cfg management tool [08:37] and there is a reason juju exists :) [08:37] rogpeppe: my friends that work in hosting companies [08:37] run one puppet server per customer [08:37] davecheney: the way i did this when we had a similar thing was i installed manually on a machine, including a private key. [08:37] the idea of a single puppet instnace for all customers is impractical [08:38] davecheney: then when the machine dials in, you *know* that it's the right machine. [08:38] davecheney: but that assumes a manual install, of course. [08:38] rogpeppe: yup [08:38] davecheney: which is why you have to assume that the cloud provider can do something similar [08:38] my friends in hosting companies use vlans and shit [08:38] to separate customers environments [08:39] davecheney: worst comes to worst you're vulnerable to mitm, but if the hosting co is compromised, you're fucked anyway [08:42] davecheney: "For Linux instances, you can provide an optional key pair ID in the launch request (created using the CreateKeyPair or ImportKeyPair operation). The instances will have access to the public key at boot. You can use this key to provide secure access to an instance of an image on a per-instance basis. Amazon EC2 public images use this feature to provide secure access without passwords." [08:43] davecheney: i *think* we can leverage that [08:46] rogpeppe: ooooooooooh [08:46] but, are we likely to end up in the same 'too many firewall groups' quagmire ? [08:47] davecheney: i don't think there should be a problem creating a keypair per machine, but i may well be wrong :-) [08:47] another stupid amazon limitation [08:47] and you'll probably get asked how to do it in the openstack/azure/hp world [08:50] davecheney: the main problem is that this mechanism is designed for allowing you to connect to a new machine securely, not the other way around. [08:51] mmm [08:51] davecheney: i think we'd need to create a cert based on a hash of the key pair's public key or something. [08:58] davechen1y: actually, i think we could probably go quite a long way by moving the environ config into a separate database. [08:59] davechen1y: then we could at least restrict access to the AWS keys without needing an API [08:59] rogpeppe: yes [08:59] which sounds like the juju-as-a-service plan [08:59] customers have MA's, we run the PA [08:59] davechen1y: yeah, that's certainly part of it [08:59] davechen1y: by separate database, i didn't mean a separate mongo server, as it happens [09:00] davechen1y: i meant a separate mgo.Database [09:00] davechen1y: (we already use two) [09:00] rogpeppe: yup [09:00] i thought we did that already [09:01] or is that just different connections, same db ? [09:01] davechen1y: same connection, different dbs [09:01] davechen1y: but each db has its own set of users [09:02] davechen1y: did you see this CL BTW? https://codereview.appspot.com/6587060 [09:05] * davechen1y looks [09:09] rogpeppe: fwereade_ trivial: http://codereview.appspot.com/6601056/ [09:10] looking for a LGTM [09:10] * fwereade_ looks [09:11] davechen1y: LGTM, although i suppose the question is: why --format and not something else? [09:12] rogpeppe: this is the thing that broke [09:12] and it's intended to get people to update their gnuflag instance [09:12] davechen1y: fair enough. [09:12] davechen1y: it's gotta be somewhere; why not there? [09:13] davechen1y: (rhetorical question) [09:16] davechen1y, LGTM [09:17] thanks folks [09:18] * fwereade_ has made the uniter tests fast again by fixing a huge obvious repeated 500ms sleep [09:18] * fwereade_ knows that has been there for ages [09:18] * davechen1y applauds [09:19] * rogpeppe applauds loudly [09:19] fwereade_: duration of uniter tests now? [09:20] rogpeppe, back to ~45s [09:20] fwereade_: hmm, still slow then [09:21] rogpeppe, well, yeah, the bit I fixed was pre-existing, so there's probably another 20s to be extracted somewhere, but it's really not obvious [09:21] fwereade_: 20s shorter would be much more reasonable... but i know the feeling. [09:22] davechen1y: here's a draft of the first part of a heads-up email: http://paste.ubuntu.com/1259631/ [09:23] * davechen1y reads [09:24] i don't see why we need both certs and usernames/passwords [09:25] certs can already be associated with a principal [09:25] davechen1y: in mongodb? [09:25] davechen1y: (i tend to agree - i feel that passwords are a bit retro) [09:28] rogpeppe, davechen1y: I need to pop out for a while, but I have this: https://codereview.appspot.com/6588053 [09:28] rogpeppe, davechen1y: still WIP [09:29] rogpeppe: not sure how mongo does it [09:29] rogpeppe, davechen1y: but it incorporates some significant changes after niemeyer's suggestions in various places [09:29] fwereade_: will have another look [09:29] but if you have a TLS cert, then you can request client authentication (ie, they need a sub cert signed by the same CA that issued your cert) [09:29] rogpeppe, davechen1y: and if you have time to cast a quick eye over it for general sanity that would be great [09:29] or the TLS handshake fails [09:29] rogpeppe, issues like "all the filter tests are broken" are not what I'm looking for ;p [09:29] bbiab [09:30] davechen1y: i'm wondering how/whether mongo converts client certs into mongo users [09:30] sounds complicate [09:30] compilcated [09:30] i reckon drop it [09:31] just use TLS for a secure channel to transmit creds over [09:31] davechen1y: so don't connect direct to mongo? [09:31] davechen1y: but use a forwarder? [09:32] davechen1y: i don't know if that's easy [09:32] (although at least the mongo client is written in Go) [09:36] oh why, oh why are certificates so horribly useless in this world? [09:37] and hard, dont' forget that [09:37] davechen1y: indeed [09:37] davechen1y: so unnecessary [09:38] davechen1y: it looks to me as if mongodb can't do client-certificate verification [09:39] scratch that [10:26] yo. [11:01] Aram: hiya [11:09] rogpeppe: fwereade_ : comments ? https://codereview.appspot.com/6591080 [11:15] davecheney: looks reasonable to me, but i'm not really familiar with the issue, i'm afraid [11:15] davecheney: "I want to ask that it be accepted." - you can always just *ask*, y'know :-) [11:17] rogpeppe: what mongodb version do you use? [11:17] Aram: i've just started using a different version [11:17] Aram: i was using... 2.0.3 i think [11:17] aha. [11:17] Aram: now i've downloaded the version we use on ec2 and am using that [11:18] I'm kind of nervous that behavior changes so often between versions so close to eachother. [11:18] Aram: me too. it's a pretty shitty thing to get wrong. [11:18] slow cloud-init, is slow [11:19] Aram: rogpeppe: i think we should switch to using the version from the public bucket, exclusively [11:19] davecheney: and download it each time we run a test? [11:21] no, i'm sure there is a way to avoid that expense [11:21] davecheney: it's important that we be able to run tests on an aeroplane too. [11:22] rogpeppe: i think you're reading too much into my suggestion [11:22] davecheney: i suppose we could check the mongodb binaries into the repo [11:22] i'm just thinking of unpacking the version into somewhere inside the juju-tree [11:22] then just call that path directly [11:22] if it's there 'win' [11:22] if not, fail [11:23] * davecheney wishes we have juju destroy-service [11:23] davecheney: is there no such command in the original juju? [11:23] yeah, but we don't have it in cmd/juju yet [11:23] makes testing harder :) [11:25] davecheney: if we don't check it into the repo (and i'm not sure we want to clutter the repo with an 8MB binary) i'm not sure that running from a different path buys us that much [11:25] rogpeppe: we don't have to check it in [11:26] davecheney: we'd be better off running mongod --version to check that we get the expected version [11:26] davecheney: if we don't check it in, then we have the same problem of possible version skew [11:26] just change the mongo tests to call to a specific path, one where we have already downloaded the mongodb version, rather than just calling any mongod in th epath [11:28] ha, it looks like niemeyer didn't build mongod with ssl support [11:29] I thought that building with SSL was the reason why we needed to build it. [11:29] rogpeppe: crap -- that was the _ENTIRE_ reason for cmd/builddb [11:29] Aram: me too [11:30] davecheney: try mongod --help 2>&1 | grep -i ssl [11:31] % juju deploy couchbase &error: cannot assign unit "cf-mongodb/0" to machine: cannot assign unit "cf-mongodb/0" to machine 8: duplicate key insert for unique index of capped collection [11:31] davecheney: hmm, it *looks* as if builddb builds it with ssl [11:32] i wish we prefixed our errors with "juju: " rather than "error: ". i've been meaning to fix that for ages. [11:40] here is some good news --> http://paste.ubuntu.com/1259806/ [11:40] davecheney: woo! [11:41] fwereade_: check it out! [11:41] and most of them worked ! [11:41] davecheney: that's almost like a real installation :-) [11:42] i don't think I can start any more machines [11:42] amazon will chide me [11:42] davecheney: the security description gets longer (still haven't got to the bit that was the whole point yet though!) http://paste.ubuntu.com/1259811/ [11:43] the buildbot charm failures, somethign happened with apt, it wasn't us [11:43] davecheney: nice environment ;) [11:43] % juju ssh ceph/0 -- -t 'less /var/log/juju/unit*' [11:43] nice [11:43] davecheney: what does -t do? [11:44] tells ssh'd to allocate a pty [11:44] normally if you do ssh host /some/command [11:44] no pty is allocated [11:44] davecheney: ah of course [11:44] which sucks [11:44] ssh cmd does a lot of things for you [11:44] davecheney: no, that's a good thing :-) [11:45] yeah, but then you have to figure out why it is how it is [11:45] davecheney: for most commands a pty gets in the way [11:45] true [11:45] so, the ceph charm is flat broke, not our fault [11:45] davecheney: paste the log? [11:46] two secs [11:46] most of them are missing debs [11:47] rogpeppe: http://paste.ubuntu.com/1259818/ << ceph [11:48] davecheney: i wonder what radosgw is and if it was installed by default before. [11:48] 2012/10/04 11:35:31 JUJU HOOK ERROR: command: cluster-init: 10.190.42.228:8091, [Errno 111] Connection refused [11:48] 2012/10/04 11:35:32 JUJU HOOK + /opt/couchbase/bin/couchbase-cli bucket-create -c 10.190.42.228:8091 -u Administrator -p administrator --bucket=jienaigo --bucket-type=couchbase --bucket-password= --bucket-ramsize=1607 --bucket-replica=1 [11:48] 2012/10/04 11:35:32 JUJU HOOK ERROR: command: bucket-create: 10.190.42.228:8091, [Errno 111] Connection refused [11:48] ^ couchbase [11:49] i wonder if some charms install the py juju tools by accident ... [11:51] rogpeppe: re your email [11:51] drop the bit about a machine cert [11:51] i thought we weren't/couldn't do that [11:52] davecheney: i think we have to do that, somehow. [11:52] davecheney: although we can't currently. [11:52] rogpeppe: yup, good point [11:54] davecheney: one way of doing it is to have a server that exchanges one-time tokens for certificate signing. [11:54] davecheney: then we can pass a one-time token into cloudinit [11:55] davecheney: the machine agent leverages that to get its own certificate signed. [11:56] the couchdb charm requires a ppa which is broken [11:56] davecheney: i wonder what your duplicate key insert problem was about [11:56] mongo bug [11:56] happens a lot [11:56] niemeyer has raised a bug upstream [11:57] couchdb [11:57] 2012/10/04 11:37:39 JUJU HOOK * Starting database server couchdb [11:57] 2012/10/04 11:37:39 JUJU HOOK ...done. [11:57] 2012/10/04 11:37:39 JUJU hook failed: exit status 1 [11:57] 2012/10/04 11:37:39 JUJU reading uniter state from disk... [11:57] nice [11:58] yeah, mongodb is... less than stellar. [11:58] Aram: it's better than zk though [11:59] 2012/10/04 11:37:32 JUJU HOOK + sed -e 's/^STARTDISTCC=.*/STARTDISTCC="true"/' -i /etc/default/distcc [11:59] the products are so different they can't be compared like that. [11:59] 2012/10/04 11:37:32 JUJU HOOK + '[' -x /usr/bin/open-port ']' [11:59] 2012/10/04 11:37:32 JUJU hook failed: exit status 1 [11:59] they solve a diferent problem. [11:59] ^ hard coded tools [11:59] Aram: you're probably right. [12:00] Aram: from my brief look at the mongo source earlier today, i wasn't enormously overjoyed. [12:00] oh, it's bad, I had to look through it when solving various quirks and bugs. [12:01] 2012/10/04 11:39:15 JUJU HOOK ldconfig deferred processing now taking place [12:01] 2012/10/04 11:39:17 JUJU HOOK install: cannot stat `files/php/php_conf.d_apc.ini': No such file or directory [12:01] 2012/10/04 11:39:17 JUJU hook failed: exit status 1 [12:01] 2012/10/04 11:39:17 JUJU reading uniter state from disk... [12:01] ^ drupal6 expects a file not owned by a deb that it installed [12:01] Aram: i'd forgotten that people still like ifdefs. ugh. [12:02] so, short summary, 19 charms, 9 working [12:02] none are our fault (directly) [12:02] open source stuff is plagued by ifdefs. [12:03] someone please pass on to mramm and gustavo [12:03] i [12:03] i'm off to bed [12:04] davecheney: good work, man [12:04] davecheney: enjoy your rest [12:04] no, congratulations to all of you [12:04] with the exceptoin of juju-log -l [12:04] davecheney: what was the issue with that? [12:04] i haven't found a charm that is broken because we are incompatible with py juju [12:04] rogpeppe: we didn't support -l $LEVEL [12:05] davecheney: ah [12:05] davecheney: well, gnuflag was broken too... [12:05] rogpeppe: https://codereview.appspot.com/6584069 [12:06] % juju destroy-environment [12:06] error: The request signature we calculated does not match the signature you provided. Check your AWS Secret Access Key and signing method. Consult the service documentation for details. (SignatureDoesNotMatch) [12:06] FUCK YOU AWS [12:06] not tonight [12:06] not with 20 machines running [12:06] it always does this when I have more than a few machines running [12:07] davecheney: hmm, that might be our bug, i suppose [12:08] davecheney: just got to the aws console :-) [12:08] s/got/go/ [12:09] right, i have ceased hemorhaging money [12:09] davecheney: i hope you claim it back on expenses [12:09] davecheney: (i've been a bit crap at doing that recently) [12:09] night all [12:09] davecheney: but i had $200 bill last month, so it's worth doing [12:33] fwereade_: howdy, can I bug you for a bit please? got a vexing problem with juju [12:45] bigjools, heyhey [12:45] how's it going? [12:45] bigjools, ah, not bad thanks, not sure if I can *actually* remember anything about python but I'm game for a try [12:45] ah you're a Goer [12:46] bigjools, that's what they tell me [12:46] :) [12:46] * fwereade_ maintains a perfectly straight face [12:46] I'm trying use juju to test deployment on maas and it's saying it did it, yet there's no attempt at all to start a machine [12:46] I can't see start_machine being called, not sure how to debug this and even why it started misbehaving [12:47] bigjools, hmmmm -- you're bootstrapping? [12:47] after that [12:47] bootstrap is ok [12:47] just deploy going wrong [12:49] bigjools, what does status tell you? is it that there "should be" a machine, but it's just not started? or that the machine never gets added to state in the first place? [12:49] bigjools: have you looked at the logs on the bootstrap machine? [12:49] bigjools: (something to do after fwereade_'s suggestion, possibly) [12:49] bigjools, yeah, the start_machines will be called by the provisioning agent [12:49] fwereade_: I see no attempt at all to even try to start a machine, but status says it's waiting for it [12:50] bigjools, assuming they're making it into state, which you can check with status, your best bet is the PA logs [12:50] rogpeppe: I didn't look there, will do so! [12:50] fwereade_: PA? [12:50] bigjools, provisioning agent [12:51] bigjools: /var/log/juju/*.log i think [12:51] bigjools, upstart job called somehign beginning with juju-pro IIRC [12:51] ok [12:51] fwereade_: here's the text of an email that i'm considering sending to juju-dev: http://paste.ubuntu.com/1259902/ [12:51] * fwereade_ reads [12:52] well, there's a traceback [12:55] bigjools: that sounds fairly indicative :-) [12:55] http://pastebin.ubuntu.com/1259905/ [12:57] niemeyer: yo! [12:57] rogpeppe: Heya! [12:57] Hello all! [12:57] bigjools, sorry, never seen that before [12:58] fwereade_: darn :( [12:58] fwereade_: happens on packaged or trunk version, I suspect some config problem but I can't work out what exactly from that traceback, it's not very helpful :( [12:58] bigjools, indeed not :( [12:59] niemeyer: i was getting feedback from dfc this morning about the security stuff, and he suggested sensibly that we should make sure that our potential users (e.g. Elmo) are happy with the direction we're going, so i put an email together trying to explain things. i don't know whether it's actually worth sending, but it focused my mind helpfully anyway. http://paste.ubuntu.com/1259902/ [13:00] niemeyer: i sent the cl yesterday https://codereview.appspot.com/6586073/ :) [13:00] fwereade_: I think I know what it is .... :/ [13:01] rogpeppe: I don't think it's worth sending because this is not our end goal [13:01] bigjools, go on... [13:01] niemeyer: ok. i'm not sure what our end goal is then. [13:01] fwereade_: the ZK machine can't reach the maas server. why that is, I don't know [13:02] bigjools, oh, hell [13:02] Oct 01 11:54:59 rogpeppe: In a future universe, we'll then introduce an HTTPS API to which everyone will talk to [13:02] niemeyer: that's what i talk about in the email [13:02] niemeyer: as an intro [13:02] niemeyer: then i say that these are steps in that direction [13:03] fwereade_: well, that "integer is required" error is the fundamental problem causing that in fact. So still not closer to working it out. [13:03] bigjools, oh, for real tracebacks in twisted [13:03] rogpeppe: That's what I mean.. our focus is on implementing these steps. If you want to discuss future with James, that sounds great, but I suggest getting hold of him in two weeks and talking to him [13:04] fwereade_: quite :/ [13:04] fwereade_: you have to turn on deferred debugging to get them [13:04] bigjools, I don't think we expose a switch for that [13:04] bigjools, I guess you can always hack at the code the PA runs :/ [13:05] rogpeppe: Meanwhile, I hope we *implement* the steps, rather than just discuss how a perfect future looks like [13:05] fwereade_: awesome :) [13:05] niemeyer: ok. i was thinking that it might be useful to know if we're stepping in the right direction, but if you think that's fine, i won't send anything. [13:06] rogpeppe: I'm not sure I understand your concerns [13:06] rogpeppe: If authenticating is a step in the right direction? Of course it is.. if transport security is a step in the right direction? Of course it is [13:06] niemeyer: it may be that we don't need anything of what we're doing now. [13:06] rogpeppe: We're not doing anything fancy.. we're implementing what should be in place from day zero [13:06] niemeyer: we already authenticate and do transport security. [13:06] rogpeppe: Transport security? Authentication? [13:06] ssh [13:07] rogpeppe: Please read the code of our agents :) [13:07] niemeyer: ok, we don't currently use ssh intra-cloud, but we could. [13:08] niemeyer: we could do SSL security without any of the SetPassword stuff. [13:08] rogpeppe: How do you put a client SSL certificate in place? [13:10] niemeyer: that's a question for us now too [13:10] rogpeppe: Heh [13:11] niemeyer: perhaps we're not concerned with man-in-the-middle attacks though [13:12] rogpeppe: What man-in-the-middle attacks? [13:13] rogpeppe: Do you have man-in-the-middle attacks when you use a password on gmail? [13:13] niemeyer: yes, potentially. [13:13] rogpeppe: No, you don't unless you ignore the security warnings from your browser [13:17] rogpeppe: I'm happy to hear proposals that are better than the one I've explained. I'm not greatly interested in stopping progress to hunt for a proposal without clear articulation of what is the problem, the solution, and the way we'll get there in time. [13:17] niemeyer: i suppose that's what i was trying to articulate. [13:18] rogpeppe: I haven't noticed that yet.. you just told me we already authenticate and do transport security [13:21] niemeyer: i wanted to put my sketch up on juju-dev to see if anyone could see obvious flaws in it, as we'll probably be using this model for a while. do you think that's a bad idea? [13:24] rogpeppe: Yes, I personally think it is. I'd like to see progress being made instead of exposing a half-baked plan. This is not the end goal.. we'll *not* use database constraint to secure data. [13:24] niemeyer: ok, fair enough [13:24] rogpeppe: It's up to you, though [13:24] niemeyer: changing the subject, what do we do about admin-secret vs the environment config? [13:24] niemeyer: it's secret, but we don't want to push it with the rest of the secrets [13:24] rogpeppe: I personally don't mind that you're talking about it with people, of course. Feel free to do contact James, juju-dev, or whoever else. [13:25] rogpeppe: I'll be doing pressure for progress, though. [13:25] rogpeppe: I want to see code being merged that improves the situation. [13:25] niemeyer: i'm not going to delay things at all [13:26] rogpeppe: Also, doing homework is good.. [13:26] """ [13:26] It is not clear to me whether it is possible to make MongoDB [13:26] perform client-certificate verification; if it cannot, for the time being [13:26] we will remain vulnerable to man-in-the-middle attacks within the cloud. [13:26] """ [13:26] """ [13:26] Even within this interim [13:26] model, we can significantly improve things by separating concerns within [13:26] the database. For example the environment configuration (containing [13:26] the cloud access keys), the machines collection (allowing the creation [13:26] of new instances), and the unit-related collections could each be in [13:26] """ [13:26] We won't do that. [13:26] niemeyer: no? [13:26] rogpeppe: No [13:27] niemeyer: do we have transaction that span machines and units? [13:27] transactions [13:27] rogpeppe: Erm? [13:28] niemeyer: sorry, i jumped to conclusions. why won't we do that? [13:28] niemeyer: it seemed to me like keeping the environ config separate might be a cheap and easy way to make things more secure. [13:29] rogpeppe: Cheap? How do you separate out everyone that needs the environment configuration? [13:29] rogpeppe: Everybody uses it right now [13:30] niemeyer: hmm. i suppose we do need to read the private bucket. [13:30] rogpeppe: How does MongoDB authentication will permit you to do it in a single database, or alternatively how do you span multiple databases with transactions? [13:31] rogpeppe: The solution is not to hack together such change.. the solution is to have a real API to which clients talk to, instead of communicating with the database [13:31] niemeyer: depends whether we need to span those things in a single transaction. i thought perhaps we did not. it's true i didn't check, though. [13:31] niemeyer: yeah that's true at least. [13:32] niemeyer: i did try to do my homework regarding mongod client-side certificate verification, but got lost in a) the source code b) the openssl docs. === TheMue_ is now known as TheMue [13:34] niemeyer: please disregard the proposed email. i wanted feedback and i got it, thanks. [13:35] niemeyer: currently i am wondering whether to make admin-secret a special case, or to have a VerySecretAttrs method on EnvironProvider. [13:36] niemeyer: i'm tending towards the former, and putting admin-secret in config.Config. [13:37] rogpeppe: Transport security and authentication, in place, working.. that's what we have to focus on for the moment. The need for the API is being strongly requested, and won't take long. What we're doing is a good step towards supporting it. [13:37] niemeyer: that's cool. i understand that now. let's move on. [13:38] rogpeppe: Special case in which sense? [13:38] niemeyer: we don't want to push it to the state [13:39] niemeyer: at least i *think* we don't want to push it to the state [13:39] niemeyer: otherwise it makes a mockery of our careful password management [13:39] rogpeppe: Hmm [13:39] rogpeppe: Indeed [13:40] rogpeppe: This will likely be somewhat boring, in fact.. [13:40] niemeyer: yeah [13:40] rogpeppe: Since we replace the local config with the remote one regularly [13:40] rogpeppe: and the remote one won't have the secret [13:41] niemeyer: i'm tempted to make it a special case [13:41] niemeyer: and never push an attribute named "admin-secret" [13:41] rogpeppe: It is a special case in either case.. I'm just wondering what that means in practice [13:42] rogpeppe: Well, I guess we only need the password when connecting, so the regular replacement may not be much of an issue [13:43] niemeyer: i'm not sure which piece you're thinking of when you say "we replace the local config with the remote one regularly" [13:43] niemeyer: which "local" and which "remote"? [13:43] rogpeppe: the one in memory vs. the one in the database [13:44] niemeyer: i don't think that's a problem - we'd never have the admin-secret attribute in the cloud [13:44] rogpeppe: Exactly [13:44] niemeyer: ah, when *the client is* connecting. yeah. [13:44] rogpeppe: Means we'll lose the local password from the configuration.. but I think that's ok [13:45] niemeyer: i don't think we *need* to remove the password from the client-side Config object, but perhaps that's not what you're thinking of [13:46] rogpeppe: I'm thinking it is going to be removed even if we don't need it [13:46] rogpeppe: Because we load the environment configuration from the remote side [13:50] niemeyer: we just have to change BootstrapConfig to remove admin-secret too [13:51] niemeyer: but it would seem a bit odd if SecretAttrs didn't return admin-secret actually [13:51] fwereade_: I restarted the PA and it made the error go away ... wtf! [13:52] niemeyer: so a better fix would be to remove admin-secret from the secrets within juju.Conn.updateSecrets [13:52] rogpeppe: Not sure.. that's a setting for the provider itself [13:52] niemeyer: is it? [13:53] niemeyer: aren't we doing provider non-specific stuff with it? [13:53] rogpeppe: EnvironProvider.SecretAttrs is [13:53] niemeyer: ah, yeah [13:53] niemeyer: in which case changing BootstrapConfig would seem better [13:54] rogpeppe: Yeah, I think it's quite fitting [13:54] rogpeppe: We should also add a panic to State.SetEnvironConfig [13:54] rogpeppe: In case it ever sees an admin-secret [13:55] niemeyer: that seems reasonable [13:55] rogpeppe: Or perhaps just an error.. I think we might reach the panic with "juju set admin-secret=foo" [13:55] bigjools, grar [13:55] niemeyer: hmm yeah [13:55] niemeyer: i was thinking a panic seemed a bit harsh actually [13:55] rogpeppe: +1 [13:56] niemeyer: actually, we could make juju set admin-secret work if we wanted, i think [13:58] rogpeppe: Yeah, sounds sane, but it's a different code path anyway [13:58] niemeyer: yeah [13:59] niemeyer: the error case would remain [14:15] niemeyer: oh yeah, small CL from this morning: https://codereview.appspot.com/6589072/ [14:33] niemeyer: morning btw from me too [14:33] niemeyer: and also a CL regarding the firewall mode in EC2: https://codereview.appspot.com/6589073/ [14:44] TheMue: Heya [14:49] rogpeppe: ping [14:49] niemeyer: pong [14:49] rogpeppe: Have a moment for a call? An idea just crossed my mind [14:49] niemeyer: sure [14:50] rogpeppe: I'm not sure if it's crack or not, or if it'd take longer or not, so would appreciate some brainstorm [14:50] niemeyer: i'll fetch the other computer, so it doesn't die half way through [14:50] niemeyer: on mo [14:50] rogpeppe: Cool [14:53] TheMue: Quick question before the review: is the *-global group needed? Couldn't we just use the one group? [14:54] niemeyer, this should be a trivial: https://codereview.appspot.com/6607043 [14:55] niemeyer: started that way too, but then I found it could make sense that our machines internally share one group with possible pure internal needed ports for machine to machine communication while the global group contains those ports open to the public. [14:56] TheMue: COol [14:57] TheMue: And is there any practical benefits with that? [15:00] niemeyer: currently our firewall model doesn't use it, everything is done on the global group. but we should discuss it. [15:01] niemeyer: have been interrupted here, sorry [15:03] niemeyer: so we can distiinguish between the source [15:03] TheMue: Cool, sounds ok [15:04] niemeyer: glad you like it [15:32] niemeyer: admin-secret: https://codereview.appspot.com/6587085 [15:33] rogpeppe: Cheers [15:33] fwereade_: Is it just moving the package without any semantic changes? [15:33] niemeyer, yes, + package comment tweaking [15:34] fwereade_: Beautiful, LGTM [15:34] niemeyer, cheers [15:38] rogpeppe: Great stuff [15:39] niemeyer: thanks! unfortunately i accidentally made it dependent on a prereq, so perhaps you could have a look at that too (it's very small) https://codereview.appspot.com/6589072/ [15:39] rogpeppe: Looking [15:39] rogpeppe: Hmm.. that's reviewed already [15:39] niemeyer: oh really? cool! [15:52] Lunch.. biab [16:44] fwereade_: Back on uniter here [16:52] niemeyer, ah, cool, thanks [16:53] fwereade_: Looking pretty good [16:53] fwereade_: Looks like you've managed to get the upgrade decision entirely inside the filter [16:54] niemeyer, yeah, I think it's reasonably clean [16:54] niemeyer, and it does make for a very nice interface [16:55] fwereade_: Very true [16:55] fwereade_: I'm thinking through the relationship between ModeInstalling and the follow up continuation [16:55] fwereade_: In terms of possible races given the different origins of the charm [16:56] niemeyer, not sure I follow... this is rarely a good sign ;) what race? [16:56] fwereade_: Well, that's what I'm trying to find :) [16:58] niemeyer, ok, well, I don't *think* the changes matter re upgrading at all: at some single point in time we write the current service charm in an install op, and that is the charm that gets installed, full stop [16:58] s/upgrading/installing/ [16:59] fwereade_: When a delta is taken from foo to bar, and then we pick current state from baz, that's always an eye-opener [16:59] fwereade_: Okay, imagine this: [16:59] 1) Unit starts up [17:00] 2) filter goroutine starts up, and blocks [17:00] 3) ModeInstalling runs, and picks charm C1 [17:00] 4) filter runs, and picks charm C2 as current charm [17:00] fwereade_: What happens next? [17:02] niemeyer, at some point after this we will be in a mode that needs charms, so it will ask for charm events relative to a baseline of C1, and (assuming appropriate forcing) get the *Charm corresponding to C2 next time it reads from charmEvents [17:02] fwereade_: Why? C1 was never seen by the filter [17:02] niemeyer, yeah, we tell the filter what charm events we're interested in [17:03] fwereade_: Ah, maybe that's what I'm missing [17:03] niemeyer, wantCharmEvent now takes something like (upfradeFrom *state.Charm, mustForce bool) [17:03] fwereade_: Aha, makes sense, thanks [17:04] fwereade_: Quite nice [17:05] fwereade_: Very nice, in fact [17:05] niemeyer, cheers :) [17:06] fwereade_: Okay, so.. [17:06] fwereade_: New branch/logic/etc is *awesome* [17:07] fwereade_: You did changes inside the filter that look like a great direction too [17:07] fwereade_: The select statement is neat and tight [17:07] niemeyer, it seemed worth trying again, and it seemed to work out ok this time :) [17:08] fwereade_: There's one thing I think we can improve slightly, but it's just in terms of how to do exactly the same thing, rather than changing it [17:08] niemeyer, great, improvements always welcome :) [17:08] [in the background, a wail of shock: no! mum! I don't want to eat salad!] [17:09] ROTFL [17:09] fwereade_: These new closures are great in terms of naming and isolating logic, but they're begging to be real methods [17:09] niemeyer, yeah, I felt the pull [17:10] niemeyer, and then I felt like putting them on the same type as the chans would end up obscuring its purpose, and that a separate type wasn't quite right [17:10] niemeyer, which would you favour? [17:10] fwereade_: This, I suspect, will also reduce a bit the massive namespacing that we have within that one method [17:10] niemeyer, OTOH the same type as the chans is clearly the right place, given that they manipulate them [17:11] niemeyer, yeah, indeed [17:11] niemeyer, incidentally, obscuring the field namespace was also a concern [17:11] fwereade_: I'd put them in the same type.. they're a different category of methods, guaranteed [17:11] niemeyer, if I'm going to have a busy namespace a single function scope sometimes seems like the right place ;p [17:12] fwereade_: They are private methods, except everything is private at the moment because the whole type is private [17:12] niemeyer, how would yu feel about me exposing filter as Filter, and making the Events methods public? [17:12] niemeyer, or just the methods even [17:12] fwereade_: I was about to suggest the latter half only [17:12] fwereade_: +1 [17:12] niemeyer, convergence :) [17:12] fwereade_: ftw :) [17:13] niemeyer, great [17:14] fwereade_: The field names so far are very clear.. we have well known fields, plus want* and out*.. we can then share a few private things with proper names, and I suspect the methods will hide a few variables within their own scope [17:15] niemeyer, yeah, I think it'll work out pretty nice [17:18] niemeyer, it's just the duplication of out* names that bugs me [17:20] fwereade_: Hmm, which duplication? [17:22] niemeyer, the field that holds the real chan and the one that's the same but sometimes nil [17:22] niemeyer, which is manipulated in those closures [17:22] niemeyer, outCharm = nil; outCharm = f.outCharm [17:24] fwereade_: Hmm.. that doesn't feel too bad to me [17:24] niemeyer, well, I certainly can't think of good names for the pair [17:24] niemeyer, the outCharm above will need t be a field,right? [17:25] fwereade_: Ah, okay, I see [17:25] niemeyer, f.maybeOutCharm = f.outCharm [17:25] ;p [17:25] fwereade_: f.outCharm and f.outCharmOn? [17:26] niemeyer, f.outCharm = f.outCharmOn [17:26] niemeyer, I like it [17:26] niemeyer, ty [17:26] fwereade_: np [17:27] niemeyer: i'm thinking about putting some encoding of the admin-secret (secure hash or b64) into cloudinit, rather than the raw password, as using the raw password exposes us to awkward upstart quoting issues. [17:27] niemeyer: do you think that's reasonable? [17:28] rogpeppe: I don't think we ever want the raw password in cloud init [17:28] niemeyer: good point. doh. [17:30] niemeyer: so we can assume that the Password in the StateInfo passed to cloud-init is always nicely formed. [17:34] rogpeppe: As in, contains reasonable text? Yeah [17:34] niemeyer: yeah [17:40] i'm off for the day. see y'all tomorrow. [17:48] rogpeppe: Cheers man [17:48] fwereade_: Sent some other minor comments on the review of that same branch [17:49] fwereade_: Only one point there may need some further talking [17:49] niemeyer, heyhey [17:50] niemeyer, I'll take a look [17:51] niemeyer, about the config events? [17:51] fwereade_: Yeah [17:51] niemeyer, it just means that if we get a really early wantConfig, we don't end up sending an event not corresponding to a real change when the initial watcher change shows up [17:51] niemeyer, clearly it's not expressed very well :) [17:53] fwereade_: I don't think I get it still [17:53] niemeyer, and re "Upgrading?" -- yes, only ModeUpgrading checks for ErrConflict, because all ModeInstalling does is pull into a new empty dir, and is therefore unlikely to experience conflicts ;) [17:53] fwereade_: How does it prevent anything.. the order is still unpredictable, and the block in the early select is the same block on the later select [17:54] niemeyer, the order is not unpredictable: doing what I do guarantees that the config.Changes() chan will be read at least once before the want chan [17:55] niemeyer, and that therefore it is impossible to (re?)activate the outConfig chan via a want *before* getting the initial event which is actually un *un*requested resend of the "original" event [17:56] niemeyer, yeah, the above is not clear [17:56] niemeyer, consider without that block [17:56] niemeyer, 1) start config watch [17:56] niemeyer, 2) get a wantConfig [17:57] niemeyer, 3) send a config event [17:57] niemeyer, 4) get the initial config change [17:57] niemeyer, 5) send a config event [17:58] niemeyer, the above sequence STM to be possible -- two events from a single config after only one want [17:59] fwereade_: Makes sense, thanks [17:59] niemeyer, np, I'll try to make it clear in the code [17:59] fwereade_: Thanks! [17:59] niemeyer, did the Upgrading? explanation make sense? [18:00] fwereade_: Does as well, thank you [18:00] niemeyer, cool [18:02] niemeyer, (just to check: you're ok with wantUpgradeEvent etc over wantCharmEvent?) [18:03] niemeyer, that's what it actually *is* now after all :) [18:03] fwereade_: Yeah, definitely [18:03] fwereade_: Happy with it, actually [18:04] niemeyer, sudden hare-brained idea, but since you're here: [18:04] niemeyer, u.f.wantConfigEvent() is not really so bad [18:04] niemeyer, I don't really think we get much from emebedding [18:05] fwereade_: +1 [18:05] niemeyer, cool [18:05] niemeyer, I should manage to propose again later tonight [18:05] fwereade_: Superb [18:06] fwereade_: I'll have to step out in a bit to sign routine bank papers, but will be back working later too [18:06] niemeyer, have fun :) [18:07] fwereade_: "fun" :) [18:30] * niemeyer steps out === fss is now known as flaviamissi_ === flaviamissi_ is now known as fss [20:16] * niemeyer is back [21:57] niemeyer, https://codereview.appspot.com/6588053 reproposed [21:57] fwereade_: Brilliant.. on the phone with mramm, but will be there soon [21:57] niemeyer, cool, thanks [22:15] fwereade_: Looking [22:15] niemeyer, cheers [22:40] fwereade_: done [22:40] fwereade_: LGTM, with a few last suggestions for your consideration [22:40] niemeyer, awesome :D [22:40] niemeyer, I'll take a look [22:43] niemeyer, I'm a bit uncomfortable about serviceCharm.force sometimes meaning "force" and sometimes meaning "must force" depending on the var... but the only reason I didn't succumb to its convenience was because I though you wouldn't like it :) [22:43] niemeyer, not sure I'll quite get that merged tonight, I'm thinking sleep sounds interesting once I get my current jujuc butchery building again [22:43] fwereade_: I can definitely understand.. it took me some time to suggest variable names properly for this to not be awkward [22:44] niemeyer, yeah, those names help a lot [22:44] fwereade_: upgradeRequested.force and upgradeAvailable.force both sound about right, if not ideal [22:45] niemeyer, definitely better than anything I could think of :) [22:45] fwereade_: About sleep, I can only say have a great one! :-) [22:54] davecheney: Morning! [22:54] We've got an empty review queue again [22:54] niemeyer: nice one [22:54] i'll see what I can do about that [22:54] just trying to debug this atm [22:54] lucky(~/src/launchpad.net/juju-core) % juju destroy-environment [22:54] error: The request signature we calculated does not match the signature you provided. Check your AWS Secret Access Key and signing method. Consult the service documentation for details. (SignatureDoesNotMatch) [22:54] davecheney: Uh oh ;) [22:55] davecheney: Curious [22:55] ^ happens when I have more than a few machines' running [22:55] davecheney: Up-to-date goamz/ec2? [22:55] * davecheney shrugs [22:55] it's the one i've been using since hte last goamz fix [22:56] * davecheney mumbles something about having to add tests to catch people using old pkg versions [22:57] davecheney: Yeah, seems interesting [22:58] niemeyer: did you see the results from my charm testing last night [22:59] 9 out of 19 charms worked [22:59] davecheney: Woah, I hadn't seen that [22:59] non failed because of compatability issues between py and go [22:59] niemeyer: check the logs for ~12 hours ago [23:03] niemeyer: http://paste.ubuntu.com/1259806/ [23:04] davecheney: Woah [23:04] This is *awesome* [23:04] davecheney: Deserves a mail to juju@ [23:05] i don't have it setup on this machine [23:05] i was going to do a bit more triage on the failing charms [23:05] niemeyer: https://bugs.launchpad.net/juju-core/+bug/1061941 [23:05] bug report for aws destroy-environment failure [23:07] davecheney: Can you post some more details of the problem there? [23:07] davecheney: This is indeed a critical issue [23:08] davecheney: and probably easy to solve too [23:08] davecheney: There's a private debug flag withing goamz/ec2 [23:08] davecheney: I'm working a bit on multi-config meanwhile [23:14] niemeyer: ok, i'll rebuild goamz now i have a test case [23:16] niemeyer: please review the irc logs from yesterday [23:16] re: the failed charms [23:21] davecheney: Can you paste the section you'd like me to look at so I don't have to second guess? [23:25] niemeyer: http://irclogs.ubuntu.com/2012/10/04/%23juju-dev.html#t11:48 [23:25] ^ are we missing a command ? [23:25] http://irclogs.ubuntu.com/2012/10/04/%23juju-dev.html#t11:57 [23:25] ^ dud charm [23:25] http://irclogs.ubuntu.com/2012/10/04/%23juju-dev.html#t11:59 [23:25] ^ hard coded tools path [23:26] http://irclogs.ubuntu.com/2012/10/04/%23juju-dev.html#t12:01 [23:26] ^ unhygenic charm [23:26] and that was as far as I got before I realised destroy-environment wasn't working :) [23:27] davecheney: Which command are we missing? [23:28] is bucket-create a juju command ? [23:28] davecheney: It's a bit hard to read it all and guess what you think is going on [23:29] niemeyer: yeah, i'll do more triage today [23:29] davecheney: " /opt/couchbase/bin/couchbase-cli bucket-create" [23:29] davecheney: That's couchbase, not juju [23:29] right, then the tally is 9 out of 19 charms make it to started, non fail because of compatibility between us and py juju [23:30] niemeyer: http://jujucharms.com/charms/precise [23:30] ^ can i get this data in xml/json ? [23:31] davecheney: The list of charms? [23:31] yup [23:31] davecheney: Let me see.. [23:31] just the charm names [23:37] niemeyer: thank you for your review on http://codereview.appspot.com/6591080/ [23:37] i know it's not the right solution, but it lets me at least have a working deploy [23:38] davecheney: np, the interim solution looks good [23:38] davecheney: Doesn't corrupt the state, and easy to rollback [23:39] and it will be fairly obvious for others coming alone later [23:47] niemeyer: what do you think about adding so documentation to the top level, INSTALL and CONTRIBUTE [23:47] also adding a scripts directory for some of the things like the stress test [23:47] and running gocov will need some scripting support [23:48] davecheney: +1 on docs.. for the stress test, I'd prefer for it to have its own code base [23:49] even if it's just a bash script ? [23:49] davecheney: Okay, that sounds fine to have in [23:50] davecheney: Unless the bash script is doing while true; do go test; done [23:50] ;) [23:50] well, there is a little bit more, where it sets a random GOMAXPROCS