[06:07] Good morning [10:35] coreycb: working through the py37/async syntax failures [10:35] most upstreams have commits at least so generally picking those === tikund is now known as sikun [11:48] jamespage: great, thanks [12:23] rbasak: hi, good morning, did you see my ping about the git-ubuntu importer being apparently stuck? [12:25] Yes [12:25] The experimental deployment environment had died. [12:25] I intend on restoring it this afternoon [12:27] ok [13:20] rbasak: I have a salsa merge request to add dep8 tests to the krb5 package. This package is currently a sync in ubuntu [13:20] rbasak: no response from salsa yet [13:20] rbasak: should I keep waiting, or is it worth it to add a delta because of dep8? [13:21] rbasak: https://salsa.debian.org/debian/krb5/merge_requests/2 [13:30] ahasenack: good job with the tests. I think it's fine to add a delta. Though does the slapd-gssapi test perhaps belong in the openldap side source package? [13:30] rbasak: it's testing mostly gssapi, not ldap [13:31] since the only call I'm making is ldapwhoami [13:31] I'm not even seting up an ldap "database" [13:31] Sure it's testing mostly gssapi, but really isn't it openldap's gssapi implmentation that's being tested here? Anyway, it's clearly subjective :) [13:33] no, it's also testing cyrus-sasl [13:33] kerberos is used also for services, not just people [13:33] so any service I pick could have this argument [13:34] it's testing both [13:34] but I'm sticking to authentication when talking to this other service, that's where I think the separation lies [13:35] if I had been exercising slapd acls with this authentication and authorization, then it would belong in the slapd package, for example [13:35] for slapd dep8 tests I have other ideas, much more ldap cnetric [13:35] centric* [13:43] I appreciate it's sort of "in the middle" so which end is very much opinion. Let's see if the Debian maintainer accepts it :) [14:10] rbasak: there is one argument in your favor, though. If there is a related bug in the slapd package, the krb5 dep8 tests will fail [14:10] rbasak: but so will apache2 tests if openssl has a bug, for example [14:11] if, say, slapd gets a bug like the current mariadb one, where it's not running after installation, the krb5 dep8 tests could fail because of that [14:22] Is the ntp package missing from the 18.04 server ISO on purpose? I have some Packer builds that don't reach out to the Internet, and they're failing b/c that package is missing from the install media. [14:23] It's easy enough to fix on my end, but wondering if it'll be back in the 18.04.1 server ISO. [14:24] I based my build off of this preseed.cfg, and it's works for 14.04 and 16.04: [14:24] https://github.com/boxcutter/ubuntu/blob/master/http/preseed.cfg [14:26] mattk: on purpose. ntp has been demoted to universe in 18.04 in favour of chrony. [14:26] mattk: https://wiki.ubuntu.com/BionicBeaver/ReleaseNotes#Chrony [14:27] ahhh, good to know. And thanks for the pointer! rtfm ;) [14:53] jamespage: comparing neutron-lbaas and neutron-fwaas. why do you have python(3)-neutron-fwaas -> neutron-fwaas-common and neutron-lbaas-common -> python(3)-neutron-lbaas? i thought the plan was to do the former but maybe i'm missing something. === gogbog11 is now known as gogbog [15:34] Hi, I'm trying to bring up a bridge without any external interfaces (for containers to use) on Ubuntu 18.04, I have the following in /etc/netplan/01-netcfg.yaml: https://pastebin.com/0S9hqZ95 [15:35] After running `netplan generate && netplan apply` and looking at the ouput of `ip addr` I have a new lxdbr0 interface but it's not fully up: https://pastebin.com/mGXQZ2Pm [15:35] I've done some googling but can't find much info on how to set up an "isolated", "private" or "internal" bridge (those are the terms I've searched for as that's what I'd call it) [15:35] Anyone got any ideas? [15:37] paulbarker: you can't bring an bridge with no member interfaces up right now with netplan, some config is missing from the generated systemd config [15:37] (I'm working on fixing this) [15:38] I think dja wrote down exactly what you need to do to make it work, if I can find the blog post again [15:38] Ok. I'm only trying to set this up in netplan manually due to problems with lxd's managed interfaces [15:39] right [15:39] I use bridges for kvm guests, and i found in 18.04, kvm wont see bridges created in netplan [15:39] paulbarker ^ [15:39] Even with "ipv4.firewall", "ipv4.nat", "ipv6.firewall" and "ipv6.nat" set to false in my lxd network config it's still injecting iptables rules [15:39] it's top of my list for stuff in netplan, I'm getting to that today [15:39] compdoc: you mean libvirt? we fixed this recently [15:40] My actual end goal is using lxd + nftables instead of lxd + iptables [15:40] but if you create the interfaces in netplan, and the bridges in /etc/network/insterfaces, kvm will see them and use them [15:40] *interfaces [15:40] compdoc: yes, but this is unrelated to what we're talking about here [15:40] (and we fixed it, at least in bionic) [15:40] compdoc: From what I've seen other people post online, lxd should be able to see those interfaces if netplan brings them up correctly [15:41] try it. create the bridge the old way [15:41] cyphermox: I'll be a happy guinea pig to test any fix for this when you have one out [15:41] i figure kvm will catch up to netplan eventually [15:42] compdoc: What's the "old way"? Purge netplan and move back to ifupdown? [15:42] paulbarker: what compdoc is suggesting (using ifupdown) will work for now (though not for the same reason as it does anything for libvirt/kvm) [15:42] you don't need to purge netplan for that [15:42] I did that when Ubuntu 18.04 came up but figured it was time to move to the new stuff [15:42] but there's another way too, you can add an extra file to /etc/systemd/network [15:43] Manually messing with systemd-networkd configuration is not something I ever want to do [15:44] Happy to learn one new config language (netplan) but not 2 [15:44] jackie_chan_meme.jpg [15:45] paulbarker: you should be able to copy /run/systemd/network/00-netplan-lxdbr0.network to /etc/systemd/network/00-netplan-lxdbr0.network, and add to it "ConfigureWithoutCarrier=true" under the [Network] block. [15:46] paulbarker: that's your alternative, if you don't want to use ifupdown instead for now [15:46] cyphermox: Do I then remove it from the netplan config for now? [15:46] or you'll have to wait until I put up the fix on my ppa or upload it to the archive [15:46] don't need to, but you can if you wish [15:47] I'd rather not throw everything out and move back to ifupdown when I've got almost everything working now with netplan [15:47] So will give that a go for now [15:47] it's not throwing everything out [15:47] on a new install of 18.04, you don't have ifupdown, but you don't need to remove netplan to use it [15:47] both can coexist fine if you don't try to configure the same device in both :) [15:48] OTOH, what I suggested for systemd-networkd is essentially the fix that will be implemented in netplan's generator, just it will be written in the file under /run (which doesn't help you here, if you don't want to write it yourself every time you reboot) [15:48] Living in a world of multiple admins here, having both a netplan config and a network interfaces file on the same server is just inviting others to accidentally break it [15:49] indeedy. less conflicting layers the better. [15:49] I'll do the systemd-networkd config fix for now as it's easy to then back that out when you've got a fix out [15:50] since netplan is only creating networkd config and not itself doing any networking API, you can do both netplan and throw in a separate .network file for the bridge [15:50] paulbarker: I'm a bit surprised you didn't just let lxd handle things, it usually does the bridges just fine itself [15:50] cyphermox: Even with "ipv4.firewall", "ipv4.nat", "ipv6.firewall" and "ipv6.nat" set to false in my lxd network config it's still injecting iptables rules [15:52] That causes the iptable_nat kernel module to be loaded which prevents me from using nftables (as the modules conflict) [15:52] ok [15:52] are nftables even ready for prime time yet? [15:52] paulbarker: then, please also file a bug for lxd so stgraber can potentially fix this [15:53] cyphermox: Already done. Also happy to help testing a fix for that [15:53] I'm reasonably sure if you set ipv4.firewall=fasle and whatnot, you shouldn't still get stuff injected in iptables :) [15:53] paulbarker: ok [15:53] https://github.com/lxc/lxd/issues/4739 [15:53] paulbarker: great [15:53] It's still injecting the rule for automatic checksum generation [15:56] blackflow: As long as you're running a recent kernel, nftables should be pretty stable now [15:57] neat, I might start toying with then. [15:59] I'm currently loving the ability to split my rules file using "Include" directives but still get atomic switchover to a new ruleset [16:00] Never found how to do something like that with iptables [16:01] paulbarker: different files you use for iptables-restore? with the flush directive available, the replacement should be atomic, no? [16:03] Yea you can do atomic replacement with iptables-restore but not with the rules split into multiple files [16:05] I'm using ansible to push configurations to a bunch of servers and have never got on well with the ansible iptables module. [16:05] paulbarker: I use something along those lines: cat /etc/iptables/*.snippets | iptables-restore [16:06] sdezial: Yea, I could put together a script to do that and then write a systemd unit file for it I suppose [16:06] But with nftables that's built-in and I can use the existing nftables service [16:07] I have `include "/etc/nftables.d/*.conf` in my /etc/nftables.conf file and it works really well [16:07] paulbarker: check out iptables-persistent and netfilter-persistent packages (the former being a plugin for netfilter), it already comes with a service. [16:08] blackflow: Don't need either and iptables-persistent just calls iptables-restore which doesn't support includes [16:09] why do you need includes if you use ansible? just combine one file from multiple files [16:12] The fragments are split across different roles. Yes I can mash it all together using templates in ansible but that's more of a mess [16:13] As usual there's 20 ways to solve the problem depending on personal taste [16:15] no, you can have one role or action run at the end that takes all the files other roles placed into /etc/my-iptables-fragments.d/, creates a single file out of them and has a change handler that feeds it to iptables-restore if they're changed ;) [16:18] blackflow: That would work. But I still want to play with the new shiny nftables :p [16:20] oh, sure :) I just mean it's more than possible to achieve that with iptables, if you want. [18:29] coreycb: most pkgs with agents ave the dep common -> py [18:29] not py->common [18:29] we should switcharoo [18:30] jamespage: ok so everything should switch to py->common, even pkgs with agents. === chiluk_ is now known as chiluk === medberry is now known as med_