- Jan 21, 2025
-
-
Michal Nasiadka authored
Closes-Bug: #2062401 Change-Id: I2f2bdbc9e1c6ad6da4ac7098ddd36143123c3062 (cherry picked from commit 904fae2a)
-
- Sep 23, 2024
-
-
Maksim Malchuk authored
Followup on Ib69fc0017b3bfbc8da4dfd4301710fbf88be661a. This change adds the ability to provide the NTP (time source) server for multiple DHCP ranges in the Ironic Inspector DHCP server. Change-Id: I4bbfef3a391b8582ae73cbe06138715b43584dec Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
- Aug 23, 2024
-
-
Michal Nasiadka authored
See [1]. [1]: https://opendev.org/openstack/ironic-inspector/commit/0b9b1756660b4ea63b44c0f01bbf3c1aa71c1f1a Change-Id: I8866cdab396b805ec75bc4ccccdc5c1909e63bcf
-
- Aug 12, 2024
-
-
Roman Krček authored
For possible config options see docs https://docs.openstack.org/keystonemiddleware/latest/middlewarearchitecture.html#memcache-protection Closes-bug: #1850733 Signed-off-by:
Roman Krček <roman.krcek@tietoevry.com> Change-Id: I169e27899f7350f5eb8adb1f81a062c51e6cbdfc
-
- Mar 25, 2024
-
-
Michal Nasiadka authored
inspector is not running as a WSGI Related-Bug: #2054705 Change-Id: I20dbaef29b2ef2d6ceffc21c156c6fa4b5e8d205
-
- Feb 15, 2024
-
-
Bartosz Bezak authored
This reverts commit d77372e8. Reason for revert: service role support has been fixed in Ironic [1] and added to Kolla-Ansible. [1] https://review.opendev.org/c/openstack/ironic/+/907148 Closes-Bug: #2051837 Change-Id: I49664e3a353f54e0d51f454c552a78846ba64101
-
Bartosz Bezak authored
Ironic recently started to enforce new policies and scope [1]. And Ironic is one of the sole openstack project which need system scope for some admin related api calls [2]. However Ironic also started to allow project-scope behaviour for service role with setting ``rbac_service_role_elevated_access``[3] [4]. This change enables this setting to get similar behaviour of service role as other openstack projects. [1] https://review.opendev.org/c/openstack/ironic/+/902009 [2] https://opendev.org/openstack/governance/src/commit/e2a47de10a689a78c31765fd1b020f17c0d3109c/goals/selected/consistent-and-secure-rbac.rst?display=source#L261 [3] https://review.opendev.org/c/openstack/ironic/+/907148 [4] https://opendev.org/openstack/ironic/src/commit/8ec56066223301230ac0ed0f0c471a10d366b474/releasenotes/notes/service-project-service-role-fix-e4d1a8c23856926a.yaml Related-Bug: #2051837 Change-Id: If8d7cf1663145d0398a2e936486e2b316d4df5e0
-
- Jan 31, 2024
-
-
Bartosz Bezak authored
Ironic started enforcing new RBAC policies [1]. Kolla/Kayobe CI jobs are failing, as K-A doesn't have service role support. Moreover Ironic RBAC is not yet stable enough [2]. Disable enforcing new policies until fix merges and Kolla Ansible service role support is added. [1] https://review.opendev.org/c/openstack/ironic/+/902009 [2] https://review.opendev.org/c/openstack/ironic/+/907148 Related-Bug: #2051837 Change-Id: I424cff6ac96dfe0dd5dc58afca2b785f494c9f02
-
- Jan 04, 2024
-
-
Michal Nasiadka authored
These were missed in I081aa1345603fa27c390e4e09231a5ff226bcb39 Change-Id: I2884bca3c06ff98004e318757a20b60c12375924
-
- Nov 30, 2023
-
-
Sven Kieske authored
This implements a global toggle `om_enable_rabbitmq_quorum_queues` to enable quorum queues for each service in RabbitMQ, similar to what was done for HA[0]. Quorum Queues are enabled by default. Quorum queues are more reliable, safer, simpler and faster than replicated mirrored classic queues[1]. Mirrored classic queues are deprecated and scheduled for removal in RabbitMQ 4.0[2]. Notice, that we do not need a new policy in the RabbitMQ definitions template, because their usage is enabled on the client side and can't be set using a policy[3]. Notice also, that quorum queues are not yet enabled in oslo.messaging for the usage of reply_ and fanout_ queues (transient queues). This will change once[4] is merged. [0]: https://review.opendev.org/c/openstack/kolla-ansible/+/867771 [1]: https://www.rabbitmq.com/quorum-queues.html [2]: https://blog.rabbitmq.com/posts/2021/08/4.0-deprecation-announcements/ [3]: https://www.rabbitmq.com/quorum-queues.html#declaring [4]: https://review.opendev.org/c/openstack/oslo.messaging/+/888479 Signed-off-by:
Sven Kieske <kieske@osism.tech> Change-Id: I6c033d460a5c9b93c346e9e47e93b159d3c27830
-
- Nov 29, 2023
-
-
Jan Gutter authored
* Updates etcd to v3.4 * Updated the config to use v3.4's logging mechanism * Deprecated etcd CA parameters aren't used, so we are not affected by their removal. * Note that we are not currently guarding against skip-version updates for etcd. Notable non-voting jobs exercising some of this: * kolla-ansible-ubuntu-upgrade-cephadm (cinder->tooz->etcd3gw->etcd) * kolla-ansible-ubuntu-zun (see https://review.opendev.org/c/openstack/openstack-ansible/+/883194 ) Depends-On: https://review.opendev.org/c/openstack/kolla/+/890464 Change-Id: I086e7bbc7db64421445731a533265e7056fbdb43
-
- Aug 30, 2023
-
-
Robin Klostermeyer authored
This commit adds the ironic-prometheus-exporter, following the conventions used by the previously integrated exporters. '[The] Ironic Prometheus Exporter is a Tool to expose hardware sensor data in the Prometheus format through an HTTP endpoint.'[0] Prometheus has been enabled in CI jobs to ensure test coverage. [0] https://opendev.org/openstack/ironic-prometheus-exporter Depends-On: https://review.opendev.org/c/openstack/kolla/+/874415 Change-Id: I6d421effd833d2e0524dd0b81736445c9a730ea9
-
- Jun 22, 2023
-
-
yann.degat authored
ironic tftp service binds on 0.0.0.0. This may be an issue in some setup. This patch propose a better default, such as using the same listen address as the dnsmasq service Closes-Bug: #2024664 Change-Id: I0401bfc03cd31d72c5a2ae0a111889d5c29a8aa2
-
- Mar 02, 2023
-
-
Matthew N Heler authored
deployments This allows services to work with etcd when coordination is enabled for TLS internal deployments. Without this fix, we fail to connect to etcd with the coordination backend and the service itself crashes. Change-Id: I0c1d6b87e663e48c15a846a2774b0a4531a3ca68
-
- Feb 14, 2023
-
-
Will Szumski authored
Hardcoding the first etcd host creates a single point of failure. Change-Id: I0f83030fcd84ddcdc4bf2226e76605c7cab84cbb
-
- Jan 13, 2023
-
-
Matt Crees authored
A combination of durable queues and classic queue mirroring can be used to provide high availability of RabbitMQ. However, these options should only be used together, otherwise the system will become unstable. Using the flag ``om_enable_rabbitmq_high_availability`` will either enable both options at once, or neither of them. There are some queues that should not be mirrored: * ``reply`` queues (these have a single consumer and TTL policy) * ``fanout`` queues (these have a TTL policy) * ``amq`` queues (these are auto-delete queues, with a single consumer) An exclusionary pattern is used in the classic mirroring policy. This pattern is ``^(?!(amq\\.)|(.*_fanout_)|(reply_)).*`` Change-Id: I51c8023b260eb40b2eaa91bd276b46890c215c25
-
- Jan 05, 2023
-
-
Matt Crees authored
The ``[oslo_messaging_rabbit] heartbeat_in_pthread`` config option is set to ``true`` for wsgi applications to allow the RabbitMQ heartbeats to function. For non-wsgi applications it is set to ``false`` as it may otherwise break the service [1]. [1] https://docs.openstack.org/releasenotes/oslo.messaging/zed.html#upgrade-notes Change-Id: Id89bd6158aff42d59040674308a8672c358ccb3c
-
- Oct 31, 2022
-
-
Mark Goddard authored
The correct option to use is valid_interfaces [1], not os_endpoint_type. The os_endpoint_type option was removed in Train. [1] https://docs.openstack.org/ironic-inspector/wallaby/configuration/sample-config.html Change-Id: I3906d7b9a2bebfe5c323cba5f80add3e932468c8 Closes-Bug: #1995246 Related-Bug: #1990675
-
- Sep 30, 2022
-
-
Pierre Riteau authored
With this option enabled, dnsmasq can offer the same IP address to multiple hosts when their requests are close to each other. Remove this option in order to use the built-in hashing mechanism which will allocate random IP addresses, which should be less likely to conflict. Closes-Bug: #1991390 Change-Id: I09a9fa2d0c54635b899ad7906cc2e2e4580ef5ad
-
- Sep 28, 2022
-
-
Michal Nasiadka authored
Change-Id: Ib068117237a199db380fcdfb757d5d0e5d34326b
-
- Aug 26, 2022
-
-
Radosław Piliszek authored
This avoids root privileges in tftpd's unprivileged container. Change-Id: I50366205c9cefe2af26c27580c02368f029b7605
-
- Jul 12, 2022
-
-
Michal Arbet authored
Render {{ openstack_service_workers }} for workers of each openstack service is not enough. There are several services which has to have more workers because there are more requests sent to them. This patch is just adding default value for workers for each service and sets {{ openstack_service_workers }} as default, so value can be overrided in hostvars per server. Nothing changed for normal user. Change-Id: Ifa5863f8ec865bbf8e39c9b2add42c92abe40616
-
Christian Berendt authored
To use notifications with ironic, the notification_level option in the [DEFAULT] section of the configuration file must be set, we use ``info`` as a reasonable level. Closes-Bug: #1969826 Change-Id: I38bb1e5404e917c788689a3181741022f875da06
-
- Jul 06, 2022
-
-
Mark Goddard authored
In a multi-region environment without a local keystone, we should still use authentication. Change-Id: I9df0ddf6e0d56f0817256b07ae0a0a7021209663
-
- Jun 24, 2022
-
-
Christian Berendt authored
With the ironic_http_interface/ironic_http_interface_address parameters it is possible to set the addresses for the ironic_http service. Change-Id: I72c257ebedf283cdef1b98485a576631e2190657
-
- Jun 09, 2022
-
-
Will Szumski authored
Fixes an issue where access rules failed to validate: Cannot validate request with restricted access rules. Set service_type in [keystone_authtoken] to allow access rule validation I've used the values from the endpoint. This was mostly a straight forward copy and paste, except: - versioned endpoints e.g cinderv3 where I stripped the version - monasca has multiple endpoints associated with a single service. For this, I concatenated logging and monitoring to be logging-monitoring. Closes-Bug: #1965111 Change-Id: Ic4b3ab60abad8c3dd96cd4923a67f2a8f9d195d7
-
- May 28, 2022
-
-
Radosław Piliszek authored
Following up on [1]. The 3 variables are only introducing noise after we removed the reliance on Keystone's admin port. [1] I5099b08953789b280c915a6b7a22bdd4e3404076 Change-Id: I3f9dab93042799eda9174257e604fd1844684c1c
-
- Apr 21, 2022
-
-
Christian Berendt authored
Change-Id: Ide82b7a7fa6752b60f2c9c31cdc4c79183fc62f6
-
- Apr 13, 2022
-
-
Maksim Malchuk authored
Add a new parameter 'ironic_dnsmasq_dhcp_ranges' and enable the configuration of the corresponding 'dhcp-range' and 'dhcp-option' blocks in Ironic Inspector dnsmasq for multiple ranges. The old parameters 'ironic_dnsmasq_dhcp_range' and 'ironic_dnsmasq_default_gateway' used for the only range are now removed. This change implements the same solution used in the TripleO several years ago in the: Ie49b07ffe948576f5d9330cf11ee014aef4b282d Also, this change contains: Iae15e9db0acc2ecd5b087a9ca430be948bc3e649 fix for lease time. The value can be changed globally or per range. Change-Id: Ib69fc0017b3bfbc8da4dfd4301710fbf88be661a Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com> Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
- Apr 06, 2022
-
-
Radosław Piliszek authored
Change-Id: I2ae1a402e723cd1063618d1b9fb18f6adb27a390
-
Radosław Piliszek authored
Change-Id: I8e4096d7136d0ce9e54f1af0bb9ba110487fb35b
-
Radosław Piliszek authored
Depends-On: https://review.opendev.org/c/openstack/kolla/+/832163 Change-Id: Ia2dba1854e925041ae23c731273b810bb2d5ec30
-
- Apr 05, 2022
-
-
Marcin Juszkiewicz authored
As we have only source image type then we do not need to handle other option. Change-Id: I753aa0182cfc975bb8b5cd1476ab2c336a7691fa
-
- Mar 04, 2022
-
-
Radosław Piliszek authored
Ironic is dropping default_boot_option and the new default has been around for quite a while now so let's remove this old scary comment. Change-Id: I80d645cb97251ac63e04d7ec1c87d4600d17d4ee
-
Radosław Piliszek authored
Set kernel_append_params instead. Change-Id: I4fb42d376636dc363cd86950ed37de4a3d28df73
-
- Feb 10, 2022
-
-
Mark Goddard authored
The bootloader used to boot Ironic nodes in UEFI boot mode during inspection when iPXE is enabled has been changed from ipxe.efi to snponly.efi. This is in line with the default UEFI iPXE bootloader used in Ironic since the Xena release. The bootloader may be changed via ironic_dnsmasq_uefi_ipxe_boot_file. Note that snponly.efi was not available via in the ironic-pxe image prior to I79e78dca550262fc86b092a036f9ea96b214ab48. Related-Bug: #1959203 Change-Id: I879db340769cc1b076e77313dff15876e27fcac4
-
- Dec 22, 2021
-
-
Margarita Shakhova authored
Fix configuration for ironic role in order to apply custom policies for ironic-inspector API Closes-Bug: #1952948 Change-Id: Id454c693f570e99ea58d2a6231f01a84b80ca56a
-
- Oct 12, 2021
-
-
Maksim Malchuk authored
This change adds the dnsmasq.log for the ironic-dnsmasq container and also enables more verbose logging when debug logging enabled. This can be triggered globbaly via 'openstack_logging_debug' or per service via 'ironic_logging_debug' or 'neutron_logging_debug'. Change-Id: I0e6b089beb88827effbcc365625eb2df902f5470 Signed-off-by:
Maksim Malchuk <maksim.malchuk@gmail.com>
-
- Sep 28, 2021
-
-
Niklas Hagman authored
A system-scoped token implies the user has authorization to act on the deployment system. These tokens are useful for interacting with resources that affect the deployment as a whole, or exposes resources that may otherwise violate project or domain isolation. Since Queens, the keystone-manage bootstrap command assigns the admin role to the admin user with system scope, as well as in the admin project. This patch transitions the Keystone admin user from authenticating using project scoped tokens to system scoped tokens. This is a necessary step towards being able to enable the updated oslo policies in services that allow finer grained access to system-level resources and APIs. An etherpad with discussion about the transition to the new oslo service policies is: https://etherpad.opendev.org/p/enabling-system-scope-in-kolla-ansible Change-Id: Ib631e2211682862296cce9ea179f2661c90fa585 Signed-off-by:
Niklas Hagman <ubuntu@post.blinkiz.com>
-
- Aug 10, 2021
-
-
Mark Goddard authored
Follow up for I0c7e9a28876a1d4278fb2ed8555c2b08472864b9 which added a ironic_enable_keystone_integration variable to support Ironic in multi-region environments. This change skips Keystone service registration based on ironic_enable_keystone_integration rather than enable_keystone. It also updates the ironic-inspector.conf template to use the new variable. Change-Id: I2ecba4999e194766258ac5beed62877d43829313
-