- Jun 22, 2023
-
-
yann.degat authored
ironic tftp service binds on 0.0.0.0. This may be an issue in some setup. This patch propose a better default, such as using the same listen address as the dnsmasq service Closes-Bug: #2024664 Change-Id: I0401bfc03cd31d72c5a2ae0a111889d5c29a8aa2
-
- Mar 15, 2023
-
-
Michal Nasiadka authored
Change-Id: I1649a389bdc3977b936402c3ce3e55056d74ba08
-
- Mar 02, 2023
-
-
Matthew N Heler authored
deployments This allows services to work with etcd when coordination is enabled for TLS internal deployments. Without this fix, we fail to connect to etcd with the coordination backend and the service itself crashes. Change-Id: I0c1d6b87e663e48c15a846a2774b0a4531a3ca68
-
- Feb 14, 2023
-
-
Will Szumski authored
Hardcoding the first etcd host creates a single point of failure. Change-Id: I0f83030fcd84ddcdc4bf2226e76605c7cab84cbb
-
- Jan 26, 2023
-
-
Ghanshyam Mann authored
As per the RBAC new direction in Zed cycle, we have dropped the system scope from API policies and all the policies are hardcoded to project scoped so that any user accessing APIs using system scope will get 403 error. It is dropped from all the OpenStack services except for the Ironic service which will have system scope and to support ironic only deployment, we are keeping system as well as project scope in Keystone. Complete discussion and direction can be found in the below gerrit change and TC goal direction: - https://review.opendev.org/c/openstack/governance/+/847418 - https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#the-issues-we-are-facing-with-scope-concept As phase-2 of RBAC goal, services will start enabling the new defaults and project scope by default. For example: Nova did in - https://review.opendev.org/c/openstack/nova/+/866218 Kolla who start accessing the services using system scope token - https://review.opendev.org/c/openstack/kolla-ansible/+/692179 This commit partially revert the above change except keeping system scope usage for Keystone and Ironic. Rest all services are changed to use the project scope token. And enable the scope and new defaults for Nova which was disabled by https://review.opendev.org/c/openstack/kolla-ansible/+/870804 Change-Id: I0adbe0a6c39e11d7c9542569085fc5d580f26c9d
-
- Jan 13, 2023
-
-
Matt Crees authored
A combination of durable queues and classic queue mirroring can be used to provide high availability of RabbitMQ. However, these options should only be used together, otherwise the system will become unstable. Using the flag ``om_enable_rabbitmq_high_availability`` will either enable both options at once, or neither of them. There are some queues that should not be mirrored: * ``reply`` queues (these have a single consumer and TTL policy) * ``fanout`` queues (these have a TTL policy) * ``amq`` queues (these are auto-delete queues, with a single consumer) An exclusionary pattern is used in the classic mirroring policy. This pattern is ``^(?!(amq\\.)|(.*_fanout_)|(reply_)).*`` Change-Id: I51c8023b260eb40b2eaa91bd276b46890c215c25
-
- Jan 12, 2023
-
-
Mark Goddard authored
When running in check mode, some prechecks previously failed because they use the command module which is silently not run in check mode. Other prechecks were not running correctly in check mode due to e.g. looking for a string in empty command output or not querying which containers are running. This change fixes these issues. Closes-Bug: #2002657 Change-Id: I5219cb42c48d5444943a2d48106dc338aa08fa7c
-
- Jan 05, 2023
-
-
Matt Crees authored
The ``[oslo_messaging_rabbit] heartbeat_in_pthread`` config option is set to ``true`` for wsgi applications to allow the RabbitMQ heartbeats to function. For non-wsgi applications it is set to ``false`` as it may otherwise break the service [1]. [1] https://docs.openstack.org/releasenotes/oslo.messaging/zed.html#upgrade-notes Change-Id: Id89bd6158aff42d59040674308a8672c358ccb3c
-
- Dec 21, 2022
-
-
Matt Crees authored
Regularly, we experience issues in Kolla Ansible deployments because we use wrong options in OpenStack configuration files. This is because OpenStack services ignore unknown options. We also need to keep on top of deprecated options that may be removed in the future. Integrating oslo-config-validator into Kolla Ansible will greatly help. Adds a shared role to run oslo-config-validator on each service. Takes into account that services have multiple containers, and these may also use multiple config files. Service roles are extended to use this shared role. Executed with the new command ``kolla-ansible validate-config``. Change-Id: Ic10b410fc115646d96d2ce39d9618e7c46cb3fbc
-
- Nov 04, 2022
-
-
Ivan Halomi authored
Second part of patchset: https://review.opendev.org/c/openstack/kolla-ansible/+/799229/ in which was suggested to split patch into smaller ones. THis change adds container_engine to module parameters so when we introduce podman, kolla_toolbox can be used for both engines. Signed-off-by:
Ivan Halomi <i.halomi@partner.samsung.com> Co-authored-by:
Martin Hiner <m.hiner@partner.samsung.com> Change-Id: Ic2093aa9341a0cb36df8f340cf290d62437504ad
-
- Nov 02, 2022
-
-
Ivan Halomi authored
Second part of patchset: https://review.opendev.org/c/openstack/kolla-ansible/+/799229/ in which was suggested to split patch into smaller ones. This change adds container_engine variable to kolla_container_facts module, this prepares module to be used with docker and podman as well without further changes in roles. Signed-off-by:
Ivan Halomi <i.halomi@partner.samsung.com> Co-authored-by:
Martin Hiner <m.hiner@partner.samsung.com> Change-Id: I9e8fa30646844ab4a288555f3aafdda345b3a118
-
- Oct 31, 2022
-
-
Mark Goddard authored
The correct option to use is valid_interfaces [1], not os_endpoint_type. The os_endpoint_type option was removed in Train. [1] https://docs.openstack.org/ironic-inspector/wallaby/configuration/sample-config.html Change-Id: I3906d7b9a2bebfe5c323cba5f80add3e932468c8 Closes-Bug: #1995246 Related-Bug: #1990675
-
- Oct 28, 2022
-
-
Ivan Halomi authored
First part of patchset: https://review.opendev.org/c/openstack/kolla-ansible/+/799229/ in which was suggested to split patch into smaller ones. This implements kolla_container_engine variable in command calls of docker,so later on it can be also used for podman without further change. Signed-off-by:
Ivan Halomi <i.halomi@partner.samsung.com> Change-Id: Ic30b67daa2e215524096ad1f4385c569e3d41b95
-
- Sep 30, 2022
-
-
Pierre Riteau authored
With this option enabled, dnsmasq can offer the same IP address to multiple hosts when their requests are close to each other. Remove this option in order to use the built-in hashing mechanism which will allocate random IP addresses, which should be less likely to conflict. Closes-Bug: #1991390 Change-Id: I09a9fa2d0c54635b899ad7906cc2e2e4580ef5ad
-
- Sep 29, 2022
-
-
Radosław Piliszek authored
By the comment message, it should no longer be necessary to wait at this stage and we can speed up the process a little bit. Change-Id: Ia96bfa79aaad5fbd54a9f527702cca7a63616bf7
-
Radosław Piliszek authored
They served us well in Yoga but they are no longer needed in Zed. This also avoids the early deletion of the ironic-conductor, making it really roll. Change-Id: I9bc85d894b5bf947ac8fca505df446b99b0bb99b
-
Radosław Piliszek authored
Change-Id: Ia8acdf69cb3676ec939777c32f0568cb720c471f
-
- Sep 28, 2022
-
-
Michal Nasiadka authored
Change-Id: Ib068117237a199db380fcdfb757d5d0e5d34326b
-
- Sep 26, 2022
-
-
Pierre Riteau authored
Closes-Bug: #1990819 Change-Id: I12c451077114b77b11810f25eb5b6187cdf08ad9
-
- Sep 21, 2022
-
-
Michal Nasiadka authored
mainly jinja spacing and jinja[invalid] related Change-Id: I6f52f2b0c1ef76de626657d79486d31e0f47f384
-
- Aug 26, 2022
-
-
Radosław Piliszek authored
This avoids root privileges in tftpd's unprivileged container. Change-Id: I50366205c9cefe2af26c27580c02368f029b7605
-
Radosław Piliszek authored
Change-Id: I6b03d7ec0eb84c9a2544c2ad13102028452c2ec1
-
- Aug 09, 2022
-
-
Michal Arbet authored
This patch adds loadbalancer-config role which is "wrapper" around haproxy-config and proxysql-config role which will be added in follow-up patches. Change-Id: I64d41507317081e1860a94b9481a85c8d400797d
-
Michal Arbet authored
Depends-On: https://review.opendev.org/c/openstack/kolla/+/769385 Depends-On: https://review.opendev.org/c/openstack/kolla/+/765781 Change-Id: I3c4182a6556dafd2c936eaab109a068674058fca
-
- Jul 25, 2022
-
-
Michal Nasiadka authored
ansible-lint introduced var-spacing - let's fix our code. Change-Id: I0d8aaf3c522a5a6a5495032f6dbed8a2be0251f0
-
- Jul 12, 2022
-
-
Michal Arbet authored
Render {{ openstack_service_workers }} for workers of each openstack service is not enough. There are several services which has to have more workers because there are more requests sent to them. This patch is just adding default value for workers for each service and sets {{ openstack_service_workers }} as default, so value can be overrided in hostvars per server. Nothing changed for normal user. Change-Id: Ifa5863f8ec865bbf8e39c9b2add42c92abe40616
-
Christian Berendt authored
To use notifications with ironic, the notification_level option in the [DEFAULT] section of the configuration file must be set, we use ``info`` as a reasonable level. Closes-Bug: #1969826 Change-Id: I38bb1e5404e917c788689a3181741022f875da06
-
- Jul 06, 2022
-
-
Mark Goddard authored
In a multi-region environment without a local keystone, we should still use authentication. Change-Id: I9df0ddf6e0d56f0817256b07ae0a0a7021209663
-
- Jun 24, 2022
-
-
Christian Berendt authored
With the ironic_http_interface/ironic_http_interface_address parameters it is possible to set the addresses for the ironic_http service. Change-Id: I72c257ebedf283cdef1b98485a576631e2190657
-
- Jun 09, 2022
-
-
Will Szumski authored
Fixes an issue where access rules failed to validate: Cannot validate request with restricted access rules. Set service_type in [keystone_authtoken] to allow access rule validation I've used the values from the endpoint. This was mostly a straight forward copy and paste, except: - versioned endpoints e.g cinderv3 where I stripped the version - monasca has multiple endpoints associated with a single service. For this, I concatenated logging and monitoring to be logging-monitoring. Closes-Bug: #1965111 Change-Id: Ic4b3ab60abad8c3dd96cd4923a67f2a8f9d195d7
-
- May 28, 2022
-
-
Radosław Piliszek authored
Following up on [1]. The 3 variables are only introducing noise after we removed the reliance on Keystone's admin port. [1] I5099b08953789b280c915a6b7a22bdd4e3404076 Change-Id: I3f9dab93042799eda9174257e604fd1844684c1c
-
- May 23, 2022
-
-
Radosław Piliszek authored
Change-Id: Ib4b15ed4feac82d8492b1c0f0238a752eac668e6
-
- Apr 21, 2022
-
-
Christian Berendt authored
Change-Id: Ide82b7a7fa6752b60f2c9c31cdc4c79183fc62f6
-
- Apr 20, 2022
-
-
Marcin Juszkiewicz authored
We have only one value for install_type now and it gets removed from image names. Change-Id: I8bf95fd7aa9dd26b80d618ca0fcb097003b4cb0a
-
- Apr 13, 2022
-
-
Maksim Malchuk authored
Add a new parameter 'ironic_dnsmasq_dhcp_ranges' and enable the configuration of the corresponding 'dhcp-range' and 'dhcp-option' blocks in Ironic Inspector dnsmasq for multiple ranges. The old parameters 'ironic_dnsmasq_dhcp_range' and 'ironic_dnsmasq_default_gateway' used for the only range are now removed. This change implements the same solution used in the TripleO several years ago in the: Ie49b07ffe948576f5d9330cf11ee014aef4b282d Also, this change contains: Iae15e9db0acc2ecd5b087a9ca430be948bc3e649 fix for lease time. The value can be changed globally or per range. Change-Id: Ib69fc0017b3bfbc8da4dfd4301710fbf88be661a Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com> Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
- Apr 06, 2022
-
-
Radosław Piliszek authored
Change-Id: I2ae1a402e723cd1063618d1b9fb18f6adb27a390
-
Radosław Piliszek authored
Change-Id: I8e4096d7136d0ce9e54f1af0bb9ba110487fb35b
-
Radosław Piliszek authored
Depends-On: https://review.opendev.org/c/openstack/kolla/+/832163 Change-Id: Ia2dba1854e925041ae23c731273b810bb2d5ec30
-
- Apr 05, 2022
-
-
Marcin Juszkiewicz authored
As we have only source image type then we do not need to handle other option. Change-Id: I753aa0182cfc975bb8b5cd1476ab2c336a7691fa
-
- Mar 21, 2022
-
-
Radosław Piliszek authored
Like other containers. This ensures that upgrade already updates PXE components and no additional deploy/reconfigure is needed. Closes-Bug: #1963752 Change-Id: I368780143086bc5baab1556a5ec75c19950d5e3c
-