Skip to content
Snippets Groups Projects
  1. Sep 26, 2022
  2. Aug 25, 2022
  3. Aug 24, 2022
  4. Aug 22, 2022
  5. Aug 15, 2022
  6. Aug 12, 2022
  7. Aug 10, 2022
  8. Aug 09, 2022
  9. Aug 08, 2022
  10. Aug 05, 2022
    • Zuul's avatar
      e2d276cd
    • Michal Nasiadka's avatar
      cephadm: Use distro-provided Quincy on Jammy · 532b81d6
      Michal Nasiadka authored
      Ubuntu Jammy will only support Ceph Quincy.
      Workaround for now - use Jammy in-distro packages for cephadm.
      
      Change-Id: I30f071865b9b0751f1336414a0ae82571a332530
      532b81d6
    • Marcin Juszkiewicz's avatar
      loadbalancer: ignore missing keepalived container · f6a1e607
      Marcin Juszkiewicz authored
      During deployment I got this error:
      
      RUNNING HANDLER [loadbalancer : Stop master haproxy container]
      ok: [192.168.66.143]
      
      RUNNING HANDLER [loadbalancer : Stop master proxysql container]
      ok: [192.168.66.143]
      
      RUNNING HANDLER [loadbalancer : Stop master keepalived container]
      fatal: [192.168.66.143]: FAILED! => changed=false
        msg: 'No such container: keepalived to stop'
      
      Looks like we forgot to allow keepalived to not be present.
      
      Change-Id: I720c719a6a6b35c5c2d5b5ee59b48349e58bac82
      f6a1e607
  11. Aug 03, 2022
  12. Aug 02, 2022
    • Mark Goddard's avatar
      Persist Bifrost's autogenerated passwords · d95e237f
      Mark Goddard authored
      By default Bifrost generates passwords for use by services, and stores
      them in files in /root/.config/bifrost/ in the container. This directory
      is not persistent, so the passwords are lost if the container is
      recreated. This is generally not a problem, because recreating the
      container is generally done when redeploying Bifrost, and new passwords
      will be generated and written to configuration files. However, if you
      access the Ironic or Inspector APIs outside of the Bifrost playbooks,
      the credentials will have changed.
      
      This change fixes the issue by persisting the credentials directory in a
      Docker volume. Note that applying this change will cause existing
      credentials to be removed.
      
      Closes-Bug: #1983356
      
      Change-Id: I45a899e228b7634ba86fab5822139252c48a7f07
      d95e237f
  13. Jul 29, 2022
  14. Jul 28, 2022
  15. Jul 27, 2022
    • Radosław Piliszek's avatar
      Remove RabbitMQ policy removal code · fe522955
      Radosław Piliszek authored
      It is no longer needed per the removed comment.
      
      Change-Id: I8d88c21c7e115b842a56f0ba5c780c3bde593964
      fe522955
    • k-s-dean's avatar
      adds firewalld configuration based on enabled services · 8553e52a
      k-s-dean authored
      This change introduces automated configuration of firewalld and adds
      a new filter for extracting services from the project_services dict.
      the filter selects any enabled services and their haproxy element
      and returns them so they can be iterated over.
      This commit also enables automated configuration of firewalld from enabled
      openstack services and adds them to the defined zone and reloads the
      system firewall.
      
      Change-Id: Iea3680142711873984efff2b701347b6a56dd355
      8553e52a
Loading