8992 Commits

Author SHA1 Message Date
Zuul
9f4e2dc2cf Merge "flatten memcached service configuration" 2018-12-18 02:40:07 +00:00
Zuul
454eff05fe Merge "Flatten Ironic services configuration" 2018-12-18 02:40:05 +00:00
Zuul
dc178ca82c Merge "Fix misnaming of service in firewall rule" 2018-12-17 18:01:55 +00:00
Zuul
be9deb3575 Merge "Flatten Glance service configuration" 2018-12-17 18:01:53 +00:00
Zuul
13c59407b9 Merge "Perform docker reconfiguration on upgrade_tasks." 2018-12-17 18:01:50 +00:00
Zuul
7b3439b506 Merge "Fix horizon's iptables rules for haproxy when split off a separate role" 2018-12-17 13:01:56 +00:00
Zuul
beb8ae7dd5 Merge "Correct file modes for rpmlint failures" 2018-12-15 19:06:38 +00:00
Zuul
752695ae12 Merge "Spliting compact services in multiples lines" 2018-12-15 18:14:40 +00:00
Zuul
1ea14520a8 Merge "Add a dual-bond example NIC config template" 2018-12-15 14:54:59 +00:00
Zuul
29d37c1c31 Merge "Drop baremetal job template" 2018-12-15 09:53:47 +00:00
Zuul
cc4e903951 Merge "Add support for cinder NFS snapshots" 2018-12-15 05:07:25 +00:00
Zuul
f632a652de Merge "Enable support for openidc federation in keystone" 2018-12-15 04:23:11 +00:00
Zuul
1282bc27db Merge "Fix service naming conventions" 2018-12-15 02:43:28 +00:00
Zuul
45fe78597b Merge "Add tripleo-ci-centos-7-scenario003-standalone job" 2018-12-15 02:35:26 +00:00
Zuul
707cfc90c6 Merge "Remove deploy steps on empty roles" 2018-12-14 22:38:31 +00:00
Zuul
1a4ee4ee0e Merge "Fix access to /var/lib/haproxy when SELinux is enabled" 2018-12-14 22:08:29 +00:00
Zuul
e8f5104440 Merge "Flatten Keepalived service configuration" 2018-12-14 21:59:41 +00:00
Jill Rouleau
971d97bf99 Correct file modes for rpmlint failures
Numerous files have incorrect modes set. Correct these so that executables
have 755 and yaml files are 644 to address rpmlint errors.

Change-Id: I8db36209b41a492f6b85e3469994de884bf556e8
2018-12-14 13:21:28 -07:00
David J Peacock
7a9d6cbc22 flatten memcached service configuration
This change combines the previous puppet and docker files into a single
file that performs the docker service installation and configuration.

With this patch the baremetal version of memcached services has been removed.

Depends-On: https://review.rdoproject.org/r/#/c/16994/
Change-Id: Ibb74d9e1673d079a6090efe4215c7ee041fce7d6
Related-Blueprint: services-yaml-flattening
2018-12-14 12:06:53 -05:00
Zuul
2ee47591ef Merge "Allow for service_bootstrap_ips empty list in IpListMap" 2018-12-14 14:03:55 +00:00
Michele Baldessari
3114300c9c Fix horizon's iptables rules for haproxy when split off a separate role
This should have been fixed via:
https://review.openstack.org/#/c/460175/2

where we did:
service_config_settings:
  haproxy:
    tripleo.horizon.firewall_rules:
     '127 horizon':
        dport:
          - 80
          - 443

The problem is that the above does not work. Reason for this is the way
tripleo::firewall works.  It will only apply iptables rules for that
show up in hiera('service_names'):
    $service_names = hiera('service_names', [])
    tripleo::firewall::service_rules { $service_names: }

And since horizon is not in the service running on the haproxy role, the
above rule would never have been created.

Tested this change and now I correctly get the iptables rules on the
haproxy role for horizon:
[root@overcloud-core-0 ~]# iptables -nvL |grep horizon
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0 0.0.0.0/0            multiport dports 80,443 state NEW /* 127 horizon ipv4 */
[root@overcloud-core-0 ~]# hiera -c /etc/puppet/hiera.yaml service_names |grep horizon
[root@overcloud-core-0 ~]#

Closes-Bug: #1808530

Change-Id: Ia4a795d1a7fb926f5900c739c1932b20d81ed7fc
Co-Authored-By: Damien Ciabrini <dciabrin@redhat.com>
2018-12-14 14:40:08 +01:00
Zuul
4d83acd892 Merge "Update tuned profile variable configuration file if it exists" 2018-12-14 13:40:04 +00:00
Harald Jensås
974c68e4b6 Add tripleo-ci-centos-7-scenario003-standalone job
This job is required to cover designate.

UPDATE:
  - Also ensure we run all jobs if zuul.d/* are changed.
  - Removed:
      tripleo-ci-centos-7-scenario003-multinode-oooq-container

Change-Id: I31ae7f873617b69bfd8fee7010bab133e384795b
Story: https://tree.taiga.io/project/tripleo-ci-board/us/338
2018-12-14 13:44:05 +01:00
Cédric Jeanneret
7fbc4b098f Flatten Glance service configuration
This change combines the previous puppet and docker files into a single file
that performs the docker service installation and configuration.

With this patch the baremetal version of glance services has been removed.

Change-Id: Ie2ac2072f0742ec5e521fc6e3734e89f8a007077
Related-Blueprint: services-yaml-flattening
2018-12-14 08:23:32 +01:00
Cédric Jeanneret
ced9f888e9 Flatten Ironic services configuration
This change combines the previous puppet and docker files into a single file
that performs the docker service installation and configuration.

With this patch the baremetal version of Ironic services have been removed.

Change-Id: Icb33158a129356d939940433c82dae25a6334baf
Related-Blueprint: services-yaml-flattening
2018-12-14 07:25:13 +01:00
Zuul
c4b816e8c5 Merge "Ensure we get dedicated logging file for HAProxy" 2018-12-14 05:40:57 +00:00
Rabi Mishra
ce72766b97 Update tuned profile variable configuration file if it exists
Update /etc/tuned/{{ _TUNED_PROFILE_NAME_ }}-variables.conf only
if it exists.

Change-Id: I20562efd61ba49b3ae0af62c079967681e05aeed
Closes-Bug: #1806812
2018-12-14 11:01:42 +05:30
Zuul
75ff38ba62 Merge "Switch debug to use logging classes" 2018-12-14 05:06:23 +00:00
Rabi Mishra
571a764cba Allow for service_bootstrap_ips empty list in IpListMap
It seems in some cases we get an empty list for services in
service_bootstrap_ips and the yaql expression fails. Though
there can be better solution to not look for EnabledServices
for roles that has zero count, this would probably fix the
immediate scenario008 failures.

Change-Id: Ife1fc3f7736ed5743c80fa3748a75cb0bb52b817
Closes-Bug: #1808240
2018-12-14 03:48:56 +00:00
Zuul
f520c3bd99 Merge "Ironic Inspector - disjoint ip range(s) for HA" 2018-12-14 01:44:47 +00:00
Zuul
6454b7d2a8 Merge "Add deployments/README.rst" 2018-12-13 23:18:36 +00:00
Alex Schultz
b390ddd53c Drop baremetal job template
https://review.openstack.org/#/c/619337/ switched the jobs to a noop for
master and since this file is branched we no longer need to keep this
template definition in THT.

Change-Id: I305c175392089e103dec85461f289ab38127398d
2018-12-13 13:46:19 -07:00
Zuul
841c5b6dc6 Merge "Add TunedCustomProfile parameter and HCI Ceph filestore environment" 2018-12-13 20:32:23 +00:00
Zuul
5131988b82 Merge "Put user data in the main stack" 2018-12-13 18:53:27 +00:00
Zuul
d34892be63 Merge "docker: wire SELinuxMode with Ansible vars" 2018-12-13 18:07:58 +00:00
Zuul
224bdd7f3a Merge "Configure registry to use gluster" 2018-12-13 17:17:44 +00:00
Zuul
fd10f25b58 Merge "Call etcd scaleup playbook when adding master nodes" 2018-12-13 17:17:42 +00:00
Emilien Macchi
7345963531 Flatten Keepalived service configuration
This change combines the previous puppet and docker files into a single file
that performs the docker service installation and configuration.
With this patch the baremetal version of keepalived service have been removed.

Change-Id: Ic0ddf1174e1d0a62f83f26f0ca6bc29ec7b078b7
Related-Blueprint: services-yaml-flattening
2018-12-13 10:26:26 -05:00
Dan Prince
bcf80d474a Add deployments/README.rst
To help clarify current and future naming conventions in this directory.

Change-Id: Ib9d24f9844f5aecd47cdd6a47247562dce2092ee
Related-Blueprint: services-yaml-flattening
2018-12-13 10:25:09 -05:00
Alex Schultz
bf1c16d48b Fix service naming conventions
We want to include the way the service is deployed (container/baremetal)
and the configuration management tool used (ansible/puppet) in the
service file name so folks can easily identify how a service is being
deployed and with what tooling.

Change-Id: Id884009131ea1587042a8ac01eec7afd83d7eb6a
Related-Blueprint: services-yaml-flattening
2018-12-13 08:12:36 -07:00
Zuul
4e9a66ae86 Merge "Removing the deprecated environment files for hw offloading" 2018-12-13 14:14:28 +00:00
Zuul
071cae6a9f Merge "Remove invalid comment in ips-from-pool-ctlplane" 2018-12-13 11:44:22 +00:00
Carlos Goncalves
29da33fae2 Fix misnaming of service in firewall rule
On Octavia-enabled composable role deployments where the Octavia health
manager service doesn't run co-located with the API service, the
firewall rule to allow messages in to the o-hm0 interface was not being
created. As a result of that, the load balancers were not going ONLINE.

Closes-Bug: #1808190
Depends-On: https://review.openstack.org/#/c/624403/
Change-Id: Icc568a551b902e6d9f003250226468ed38a776fc
2018-12-13 08:28:54 +00:00
Zuul
f95b0197bd Merge "Use https instead of http for docs links" 2018-12-13 07:22:35 +00:00
Zuul
84c0748674 Merge "Enable image import plugins & image output format" 2018-12-13 07:22:32 +00:00
Zuul
7e94554c0e Merge "Upload amphora image in RAW format if RBD backend" 2018-12-13 07:22:30 +00:00
Lars Kellogg-Stedman
a0a7c4fa83 Enable support for openidc federation in keystone
This exposes parameters to configure OpenIDC federation in Keystone.

Change-Id: I3e06ca5fde65f3e2c3c084f96209d1b38d5f8b86
Depends-on: Id2ef3558a359883bf3182f50d6a082b1789a900a
2018-12-12 19:35:03 -08:00
Raildo Mascena
12468acb11 Spliting compact services in multiples lines
When we generate metadata for compact services, all of the compact
services where joining in one single blob and we hit the size limit
for it. Splitting compact services each one with per line with the
compact service name and a list of their networks, so we will not hit
this size limit anymore.

Change-Id: I90d7bc73000352ad2c4b3f08f00d2a115f075a5e
Depends-On: Ida39f5768c67f982b2fe316f6fae4988a74c8534
2018-12-12 20:57:24 +00:00
Zuul
c2c48aae03 Merge "Force rhsm re-registration during upgrades." 2018-12-12 15:32:11 +00:00
Mike Fedosin
32f4db83c6 Fix access to /var/lib/haproxy when SELinux is enabled
Currently we don't use relabeling of the folder when SELinux is enabled.
This leads to the fact that we can not update the configuration of
haproxy during the update, because of missing permissions.

This commit adds the relabeling for the folder, which allows the
container with haproxy to write into it.

Closes-Bug: #1807933

Change-Id: Ie79aed5f5665658ea09e000a4847062e9207e25c
2018-12-12 15:02:45 +00:00