/srv/irclogs.ubuntu.com/2024/07/23/#ubuntu-quality.txt

Skiabluca: with the recent arm64 queues being big, I've had the pleasure of seeing the duplicated requests removal script logging that it indeed removed some stuff. I just wanted to confirm on some PR that indeed there would be no duplicated tests results, but I can't actually find the results. Could you point me at where to look, from your upstream development pov, to get Ubuntu CI autopkgtest results? 09:53
Skiathanks09:53
blucathey are reported in line to the github PR page09:58
blucabut only one result is displayed09:58
blucaie, if there are multiple jobs, there is still only one result09:58
blucaso it's hard to see from there09:58
blucathis is an example where noble-arm64 succeeded: https://github.com/systemd/systemd/pull/3374510:00
blucathis is pending: https://github.com/systemd/systemd/pull/3381010:00
blucahere it failed: https://github.com/systemd/systemd/pull/3375810:00
blucaon our side those are the only 3 cases that can happen for a given job10:01
Skiaoh, I didn't see that the list of checks had a scrollbar, now it's very clear!10:06
SkiaI guess the only one displayed is the last one, at least?10:07
Skiaalso, how come I find xnox there reporting the results? :D  I guess one token somewhere belongs to him, but would it be doable to change that to an org of some kind, either canonical or systemd?10:09
blucaon whether it's the last one - that is a good question10:11
blucaI have noticed sometimes, when tests are failed and rerun, that is not always the case10:12
blucaas far as github is concerned, it should be the last one reported (ie that the rest api call is made for)10:12
blucabut not sure how the autopkgtest cloud side handles it10:12
blucaand yeah xnox set it up10:12
blucabut the token is stored on your side, so you would have to find where and how, and then yeah we could change to a different one10:13
Skiaregarding last one reported: they should be reported to Github in more or less the same order as they've processed, but this looks highly asynchronous, so I would expect jokes in the system10:20
Skiait's not code I'm very familiar with, and I doubt anyone in the team would have more confidence than me in that knowledge either10:21
Skiaas for the token, I've found it, so I guess I should make a card for us to change that at some point10:23
Skiathanks for the answers :-)10:23
blucano problem - for the token if you want one from us that's fine, let me know when you get around to it and I'll figure out how to generate one10:27
blucaI think you need to have permission in the org where the results are posted, so one from canonical's org might not work10:27
blucabut I don't know for sure10:27
Skiaoh, that would indeed probably be easier than getting one from canonical10:28
Skiaand if there is a better chance that it works, I'm all in10:28
Skiathe change is very easy on my side, so whenever you have the token, I can change it10:28
blucalet me try and figure out how :D10:32
blucado you have any details by chance?10:32
SkiaI really don't know github well, but I can tell you what the existing token looks like10:34
blucathat probably would help yes10:34
Skia`ghp_ABCDefgh1234andalltherestlikethat12310:36
Skia`10:36
blucait actually doesn't lol :D10:36
Skiaarg, sorry to hear :D10:37
blucaI meant what kind of token it is, like a "repository secret"10:37
blucaor an "organization personal access token"10:37
blucaand actually, was that the literal token? if so pasting on irc was probably a bad idea...10:37
SkiaI've no idea, I just found it in a text file with no metadata on how it was generated10:38
Skiaand no, that was not the real one :D10:38
Skiathe real is just random mix of [a-zA-Z0-9]10:38
blucaeheh ok10:39
Skiaghp might suggest "personal"10:39
blucalet me try to google a bit10:39
Skiahttps://github.blog/2021-04-05-behind-githubs-new-authentication-token-formats/10:39
Skia> `ghp` for Github personal access tokens10:40
blucaugh these personal tokens expire after a year10:48
Skiahuh, that's short10:48
blucaeh we'll have to deal with it10:50
blucaI have generated it, how do we transfer it securely to you?10:50
Skiaanykind of token would do, it seems10:50
Skiaeither Matrix (@skia:matrix.hya.sk) or email with GPG (key on LP: https://launchpad.net/~hyask)10:50
blucasent via mail10:52
blucaI hoped I ticked the right boxes to allow access10:53
blucaI selected commit status and pr status10:53
blucaplease give it a spin on some random PR and let me know if it works10:53
Skiathe change is applied, but I just had a doubt on the username part, that was `xnox`, and just put `systemd` instead, I hope it'll work11:01
Skianow to force it to run, I need to dig a bit into the asynchronous system to see how to put a message in the system11:01
bluca"Last used: Last used within the last week"11:14
blucasomething happened :D11:14
Skia:D11:14
SkiaI see the script running11:14
Skiabut I see a lot of `ignoring due to different test env`, so I didn't find where it tried to update something11:15
Skiahttps://github.com/systemd/systemd/pull/32363 this one has a status, `noble-ppc64el`, with your avatar on it11:17
Skiaso, still not the org itself, but I think that's an improvement11:18
blucaah perfect11:18
blucaso you cannot create tokens in an org11:18
blucait has to be a member11:18
blucabut with these new PAT you can give ownership to the org11:18
blucaie, it shows up under the org's settings unlike the xnox one11:19
Skiaokay, so that's definitely better11:19
blucaie they show up under https://github.com/organizations/<ORGNAME>/settings/personal-access-tokens/active11:19
blucawhile previously they were only under an individual's11:19
Skiawonderful! \o/11:20
blucais the switch permanent? if so, I can ask xnox to drop the previous token11:21
SkiaI had a backup to be able to rollback, but since this is working, I don't see a reason not to make the change permanent11:21
blucaok I'll ping him11:22
blucathanks for the help11:22
Skiayeah, thanks too, you had your part :-)11:22

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!