Commit Graph

4067 Commits

Author SHA1 Message Date
Zuul
f0f91d9715 Merge "Configure ansible-role-lunasa-hsm for release" 2020-05-25 06:25:34 +00:00
Monty Taylor
1b93b3dea4 Allow ansible-collections-openstack-release team to push tags
ansible-collections-openstack doesn't do openstack releases and
needs to be able to push signed tags.

Change-Id: I8414d97f7b41040c2b9bae0a490093c2a6bcf097
2020-05-21 16:28:57 -05:00
Douglas Mendizábal
965410963c Configure ansible-role-lunasa-hsm for release
This patch adds the publish-to-pypi template to the ansible
role repo, as well as a storyboard project to track issues.

Change-Id: Id0d49459d84ad9540ef373a838a01ca0ca06486c
2020-05-20 00:05:41 +00:00
Zuul
cc61ac970d Merge "Finish retiring x/pbrx" 2020-05-15 16:35:32 +00:00
OpenStack Proposal Bot
3ed1833836 Normalize projects.yaml
Change-Id: Ie474791f2d9c5b66bca1db0215f2b2ff146a5dba
2020-05-12 06:09:58 +00:00
Andreas Jaeger
42878cf71e Finish retiring syntribos repos
syntribos is now retired, remove it from Zuul et al.

Change-Id: I3d45fbf2995267ddc2395d0c564f31048ea31521
2020-05-09 10:27:57 +02:00
Andreas Jaeger
c6d2d35efc Finish retiring x/pbrx
Depends-On: https://review.opendev.org/726462
Change-Id: I0a5b2a352cdbf443976b18db4e4d210e4c7af581
2020-05-08 21:32:16 +02:00
Thierry Carrez
2146c3afc1 Add repository for oslo.metrics
Following [1], initial code for oslo.metrics should soon be proposed.
Let's create a repository in OpenDev to host that code.

[1] https://specs.openstack.org/openstack/oslo-specs/specs/ussuri/oslo-metrics.html

Needed-By: I454700e72ba8c9a7a59e69c97011884ea5b7ae15
Change-Id: I5b12f0343cbb9348e75f090ae59115035970372c
2020-05-06 14:46:46 +02:00
Jeremy Stanley
32982452f1 Create new project for OpenDev Engagement Stats
Initialize a fresh repository to hold tooling used for generating
coarse-grained reports of aggregate collaboration activity from
publicly available APIs and archives provided by OpenDev hosted
services.

Change-Id: Idfc6007516b3446541e830db0120a0801f17303e
2020-05-01 16:45:33 +00:00
Paul Belanger
078d3f16f3 Create ansible-role-boto3 project
We'll be using this in the windmill project to help managed boto3 which
is a nodepool dependency.

Change-Id: I99ede4f0fbabdce26fc981a38e75854d97f5b337
Signed-off-by: Paul Belanger <pabelanger@redhat.com>
2020-04-30 08:46:05 -04:00
Zuul
cfd3454673 Merge "Retire airship-in-a-bottle" 2020-04-30 08:09:47 +00:00
Guilherme Steinmüller
3cc906a793 Add vexxhost/google-directory-api-linux-agent
Change-Id: I509d701f21b391e27111617de994cf64595c9db3
2020-04-28 14:12:03 +00:00
OpenStack Proposal Bot
ba6808ceca Normalize projects.yaml
Change-Id: Idd676d09929419cf99b1a1290d9a8649d1ca611e
2020-04-28 06:22:14 +00:00
Zuul
228e0dbfa5 Merge "Add ansible role for managing Luna SA HSM" 2020-04-27 17:29:29 +00:00
Zuul
fc4aad54ee Merge "Add Portieris Armada app to StarlingX" 2020-04-27 17:16:46 +00:00
Zuul
809a1e7288 Merge "Define stable cores for horizon plugins in neutron stadium" 2020-04-27 17:16:43 +00:00
Akihiro Motoki
614ca871fb Define stable cores for horizon plugins in neutron stadium
As of now, neutron-fwaas-dashboard and neutron-vpnaas-dashboard do not
define separate groups for stable branch reviewers. It looks better to
define separate teams to align what we do for other repositories under
neutron stadium so that stable branches under all neutron stadium are
controlled by the same maintenance right.

neutron-*-dashboard core reviewer team is a combined group of
corresponding neutron project and horizon cores, so the proposed stable
cores are defined as a combined group from neutron stable core and
horizon stable core.

Change-Id: I9d79688e08f9b8843b89dbd2b2fcdd5e352cc534
2020-04-26 01:24:54 +00:00
Zuul
d79b293968 Merge "Retire openstack/networking-ovn repository" 2020-04-24 19:04:41 +00:00
Roman Gorshunov
b40313a720 Retire airship-in-a-bottle
Depends-On: Iabd48994f97a7c58fe902216f831f51cb72115f0
Change-Id: Ic16d19eb805589ab1dbc02cafb8f2d3724ab0302
2020-04-24 17:04:17 +00:00
Maciej Józefczyk
d3181bdfb4 Retire openstack/networking-ovn repository
During Ussuri cycle code from this repository has been
moved to Neutron [1].

All changes to master branch will not be accepted, but we will
keep stable branches and accept bug fixes.

Announcement:
http://lists.openstack.org/pipermail/openstack-discuss/2020-April/014307.html
http://lists.openstack.org/pipermail/openstack-discuss/2020-April/014308.html

[1] https://blueprints.launchpad.net/neutron/+spec/neutron-ovn-merge

Change-Id: Idaa872b6cb226d3b28b8f506544ffcc044528ddd
2020-04-24 12:10:22 -04:00
Zuul
3de4104163 Merge "Add tripleo-ci-shared-core group" 2020-04-24 15:30:46 +00:00
Douglas Mendizábal
876de71b40 Add ansible role for managing Luna SA HSM
This patch adds a new ansible role used to manage client software
for the Gemalto Luna SA Hardware Security Module (HSM).  This role
is used in TripleO to install HSM client software on Controller nodes
to enable the PCKS#11 backend for Barbican.

Change-Id: Id694007e7da55f92952b1f55474a7f87bfdb3339
Needed-By: Ifb1c1f3ac87caf93d8e1d673b4c07753ca72fe93
2020-04-24 09:21:36 -05:00
Zuul
f1899bd92d Merge "Finish retiring i18n-specs" 2020-04-24 13:43:38 +00:00
Sorin Sbarnea
b84932a27b Add tripleo-ci-shared-core group
Adds new group tripleo-ci-shared-core group which will include
tripleo-core and be used to grant access to other collaborators to
specific list of repositories which contain shared code.

Once the new group is created, I will add tripleo-core as a subgroup
and the members from the retired openstack-tempest-skiplist group.

The purpose of this group is to ease ACL maintenance by re-using
it among several similar projects.

Change-Id: I52de44bca33d8faea10fa403e53959a194ff2889
2020-04-23 19:57:55 +01:00
Colleen Murphy
baaf486cc7 Add core group for python-keystoneclient
This group is meant to behave the same way as the core group for
keystoneauth and keystonemiddleware, in that it is distinct from but
includes the keystone-core group.

Change-Id: I8ab9e2a9dc23dfb235d836882dd4345e080e344b
2020-04-23 07:31:52 -07:00
Andreas Jaeger
2cdd7f126e Finish retiring i18n-specs
Remove repo from infrastructure, it's empty now.

Depends-On: https://review.opendev.org/721720
Needed-By: https://review.opendev.org/721723
Change-Id: Iec11018b3a17c7667f91e27856e68e922cae8336
2020-04-22 17:28:08 +02:00
OpenStack Proposal Bot
67b12b9f0d Normalize projects.yaml
Change-Id: If9da618daa4fe30bfb622519690855d147eaa6b4
2020-04-21 06:06:02 +00:00
Joseph Richard
f9367a5fff Add Portieris Armada app to StarlingX
Change-Id: I949ed8a6479db6450b857040f1f2a09ab7f52fa6
Signed-off-by: Joseph Richard <joseph.richard@windriver.com>
2020-04-20 16:54:37 -04:00
Zuul
73b0a0b705 Merge "Add TrilioVault charms" 2020-04-20 07:47:11 +00:00
James Page
83402f0747 Add TrilioVault charms
Add new charms for deployment of TrilioVault, a backup solution
for OpenStack Clouds, to the OpenStack Charms project.

Change-Id: Ia3714f7d6919b8cb4a0317abd0e927a716ea86a6
Required-By: I1c27cf58f5dea38a62761350cf809ebb9b88a9bc
2020-04-16 16:59:11 +01:00
Brian Rosmaita
bf5b3504c4 Change gerrit ACLs for cinder-tempest-plugin
Currently the cinder-tempest-plugin repo uses the cinder ACLs.
Change it to use its own ACL config file governed by a specific
'cinder-tempest-plugin-core' gerrit group.  The cinder-core group
will be added to this as an included group.  This will give us the
option to add cores to cinder-tempest-plugin who aren't also in
cinder-core.

Change-Id: I2244b680eef93f9ff30ffd69c7da0e226a76d427
2020-04-15 12:09:22 -04:00
OpenStack Proposal Bot
7a07f4cc7d Normalize projects.yaml
Change-Id: Icba33b3074ef946324155d3c9a0af694a6735273
2020-04-15 06:03:54 +00:00
Zuul
307aedbdca Merge "Add kernel to StarlingX" 2020-04-14 13:50:06 +00:00
Davlet Panech
d31b86c111 Add kernel to StarlingX
Repo extracted from starlingx/integ

Change-Id: I4b171accd8b489c92f6d2c69cb7aa5c63e75f336
Signed-off-by: Davlet Panech <davlet.panech@windriver.com>
2020-04-11 11:09:25 -04:00
Zuul
395dfed08c Merge "Add vexxhost/documentation" 2020-04-09 22:59:12 +00:00
okozachenko
c2f9398f8d Add vexxhost/rbac-helm
Change-Id: Iadcdf01c6e1a5c3ea10c8a43fe84dc6168f160c3
2020-04-09 15:27:06 -07:00
Vladimir Blando
81ffec4acc Add vexxhost/documentation
Change-Id: I0eee5032396b25962bee45b430d457df5cf72011
2020-04-10 01:02:37 +08:00
Zuul
06a6a6afad Merge "Retire OSA repo_build and pip_install projects" 2020-04-09 15:08:10 +00:00
okozachenko
9f1629f186 Add vexxhost/ansible-role-base-server
Change-Id: I67a034c9afc7c16797d89a569f46077b1eaba72c
2020-04-07 12:56:46 -07:00
Dmitriy Rabotyagov
44e6bd68fc Retire OSA repo_build and pip_install projects
This is final step in retirement of openstack-ansible-repo_build and
openstack-ansible-pip_install projects.

Needed-By: https://review.opendev.org/717832/
Depends-On: https://review.opendev.org/717717
Depends-On: https://review.opendev.org/716389
Change-Id: Ib91e58cec330f702620d789d0c52aa3c4c4e8f4d
2020-04-07 04:55:09 +00:00
Monty Taylor
5038a9191f Be clear that zone repos are owned by infra-core
Until we have a better triggering story, this is purely an
infra-core repo.

Change-Id: I6eee810b524a45eb03901ca3d1add911182114c0
2020-04-02 15:56:23 -05:00
Zuul
1d5160ec57 Merge "vexxhost: move base-jobs to config-project" 2020-04-01 14:31:25 +00:00
OpenStack Proposal Bot
37ee543582 Normalize projects.yaml
Change-Id: I222a148a30dc155f4a6fc442f9678c575aa79a67
2020-04-01 06:03:38 +00:00
Mohammed Naser
2545dfd73a vexxhost: move base-jobs to config-project
Inside the VEXXHOST tenant, we have a need to be able to use build
Docker images in many different places.  Therefore, we need the
ability to have secrets inside of a repository which other repos
can just use the jobs for, avoiding the need of encrypting the
Docker credentials for every single repository.

However, due to the current limitation in Zuul, it's not possible
to accomplish this without having a config-project, and by being
a config-project, that provides an elevated set of access.  As
an interim solution until Zuul has the ability to do this without
using a config-project, this change makes the project a config
project however changes the ACLs to include project-config-core.

The rationale was that I (mnaser) is already part of that group
and therefore this wouldn't be providing me any more access to
make changes to config projects.  This would be an interim solution
until we're able to do this natively with Zuul and the ACLs can
return to VEXXHOST.

In this change, we also move opendev/project-config to only load
jobs, secrets and nodesets and to avoid loading the project so we
don't end up reporting to changes to opendev/project-config.

Change-Id: I6baefcae3e23767aeeaa2d572b1a17fd2aa5ebe6
2020-03-31 22:53:02 -04:00
Monty Taylor
a311ab9274 Remove upstream from xstatic-dagre
Change-Id: I13f5456ad392e672abe1d42118acebd98a33c30c
2020-03-31 14:55:31 -05:00
Mohammed Naser
d1c645f6e6 vexxhost: add vexxhost/base-jobs
Change-Id: I278c31666a46193640d29121800470d9d79a5e5e
2020-03-31 13:53:51 -04:00
Zuul
8b9086c798 Merge "Add ability to push signed tags to tripleo-ipa" 2020-03-31 17:16:05 +00:00
Zuul
b2799c12a2 Merge "Add Cert-Manager Armada app to StarlingX" 2020-03-30 21:13:58 +00:00
Zuul
640c0c74db Merge "Add Rook to StarlingX" 2020-03-30 21:13:56 +00:00
Zuul
e233b156a9 Merge "Add xstatic-** projects for vitrage-dashboard" 2020-03-30 20:56:17 +00:00