Fix spelling reported by codespell
Change-Id: I5a1f68189eb75b92bedeaaa8b645be7f10b0d30f
This commit is contained in:
parent
7737a2549d
commit
0f62bd2164
@ -1152,7 +1152,7 @@ i.e. a larger value to enable conductors to have time between running syncs.
|
|||||||
Some or all of my baremetal nodes disappeared! Help?!
|
Some or all of my baremetal nodes disappeared! Help?!
|
||||||
=====================================================
|
=====================================================
|
||||||
|
|
||||||
If you just upgraded, and this has occured:
|
If you just upgraded, and this has occurred:
|
||||||
|
|
||||||
#) Don't Panic
|
#) Don't Panic
|
||||||
#) Don't try to re-enroll the nodes. They should still be there,
|
#) Don't try to re-enroll the nodes. They should still be there,
|
||||||
@ -1181,7 +1181,7 @@ A good starting point is obtaining a ``system`` scoped account with an
|
|||||||
``admin`` or ``member`` role. Either of those roles will permit a node's
|
``admin`` or ``member`` role. Either of those roles will permit a node's
|
||||||
``owner`` or ``lessee`` fields to be changed. Executing
|
``owner`` or ``lessee`` fields to be changed. Executing
|
||||||
``baremetal node list`` commands with this account should show you all
|
``baremetal node list`` commands with this account should show you all
|
||||||
baremetal nodes accross all projects. Alternatively, If you just want to
|
baremetal nodes across all projects. Alternatively, if you just want to
|
||||||
enable the legacy RBAC policies temporarily to change the fields, that is also
|
enable the legacy RBAC policies temporarily to change the fields, that is also
|
||||||
an option, although not encouraged, and can be done utilizing the
|
an option, although not encouraged, and can be done utilizing the
|
||||||
``[oslo_policy] enforce_scope`` and ``[oslo_policy] enforce_new_defaults``
|
``[oslo_policy] enforce_scope`` and ``[oslo_policy] enforce_new_defaults``
|
||||||
@ -1201,7 +1201,7 @@ In this example below, which if successful, should return a list of all
|
|||||||
baremetal nodes known to Ironic, once the executing user supplies the
|
baremetal nodes known to Ironic, once the executing user supplies the
|
||||||
valid password. In this case the "admin" account keystone was
|
valid password. In this case the "admin" account keystone was
|
||||||
bootstrapped with. As a minor note, you will not be able to have
|
bootstrapped with. As a minor note, you will not be able to have
|
||||||
any "OS_*" enviornment variables loaded into your current
|
any "OS_*" environment variables loaded into your current
|
||||||
command shell, including "OS_CLOUD" for this command to be successful.
|
command shell, including "OS_CLOUD" for this command to be successful.
|
||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
@ -1209,7 +1209,7 @@ command shell, including "OS_CLOUD" for this command to be successful.
|
|||||||
$ openstack --os-username=admin --os-user-domain-name=default --os-system-scope all baremetal node list
|
$ openstack --os-username=admin --os-user-domain-name=default --os-system-scope all baremetal node list
|
||||||
|
|
||||||
You can alternatively issue a `system-scoped token <https://docs.openstack.org/keystone/latest/admin/tokens-overview.html#operation_create_system_token>`_
|
You can alternatively issue a `system-scoped token <https://docs.openstack.org/keystone/latest/admin/tokens-overview.html#operation_create_system_token>`_
|
||||||
and re-use further commands with that token, or even generate a new system
|
and reuse further commands with that token, or even generate a new system
|
||||||
scoped account with a role of ``member``.
|
scoped account with a role of ``member``.
|
||||||
|
|
||||||
Changing/Assigning an Owner
|
Changing/Assigning an Owner
|
||||||
@ -1228,7 +1228,7 @@ Why am I only seeing *some* of the nodes?
|
|||||||
|
|
||||||
During the Zed development cycle of Ironic, Ironic added an option which
|
During the Zed development cycle of Ironic, Ironic added an option which
|
||||||
defaulted to True, which enabled project scoped ``admin`` users to be able
|
defaulted to True, which enabled project scoped ``admin`` users to be able
|
||||||
to create their own baremetal nodes without needing higher level acccess.
|
to create their own baremetal nodes without needing higher level access.
|
||||||
This default enabled option, ``[api] project_admin_can_manage_own_nodes``,
|
This default enabled option, ``[api] project_admin_can_manage_own_nodes``,
|
||||||
automatically stamps the requestor's project ID on to a baremetal node if an
|
automatically stamps the requestor's project ID on to a baremetal node if an
|
||||||
``owner`` is not otherwise specified upon creation. Obviously, this can
|
``owner`` is not otherwise specified upon creation. Obviously, this can
|
||||||
|
@ -168,7 +168,7 @@ def _test_retry(exception):
|
|||||||
|
|
||||||
|
|
||||||
def _has_vmedia_via_systems(system):
|
def _has_vmedia_via_systems(system):
|
||||||
"""Indicates if virtual media is available trough Systems
|
"""Indicates if virtual media is available through Systems
|
||||||
|
|
||||||
:param system: A redfish System object
|
:param system: A redfish System object
|
||||||
:return: True if the System has virtual media, else False
|
:return: True if the System has virtual media, else False
|
||||||
|
@ -2,5 +2,5 @@
|
|||||||
fixes:
|
fixes:
|
||||||
- |
|
- |
|
||||||
Fixes Redfish virtual media boot on BMCs that only expose the VirtualMedia
|
Fixes Redfish virtual media boot on BMCs that only expose the VirtualMedia
|
||||||
resource on Systems instead of Managers. For more informations, you can see
|
resource on Systems instead of Managers. For more information, you can see
|
||||||
`bug 2039458 <https://bugs.launchpad.net/sushy/+bug/2039458>`_.
|
`bug 2039458 <https://bugs.launchpad.net/sushy/+bug/2039458>`_.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
fixes:
|
fixes:
|
||||||
- |
|
- |
|
||||||
Some of Ironic's API endpoints, when the new RBAC policy is being enforced,
|
Some of Ironic's API endpoints, when the new RBAC policy is being enforced,
|
||||||
were previously emitting *500* error codes when insufficent access rights were
|
were previously emitting *500* error codes when insufficient access rights were
|
||||||
being used, specifically because the policy required ``system`` scope. This
|
being used, specifically because the policy required ``system`` scope. This
|
||||||
has been corrected, and the endpoints should now properly signal a *403* error
|
has been corrected, and the endpoints should now properly signal a *403* error
|
||||||
code if insufficient access rights are present for an authenticated requestor.
|
code if insufficient access rights are present for an authenticated requester.
|
||||||
|
@ -299,7 +299,7 @@
|
|||||||
parent: ironic-base
|
parent: ironic-base
|
||||||
vars:
|
vars:
|
||||||
# NOTE(iurygregory): switch to only wholedisk test, since the
|
# NOTE(iurygregory): switch to only wholedisk test, since the
|
||||||
# partition test is failling randomly.
|
# partition test is failing randomly.
|
||||||
tempest_test_regex: test_baremetal_server_ops_wholedisk_image
|
tempest_test_regex: test_baremetal_server_ops_wholedisk_image
|
||||||
devstack_localrc:
|
devstack_localrc:
|
||||||
IRONIC_DEPLOY_DRIVER: redfish
|
IRONIC_DEPLOY_DRIVER: redfish
|
||||||
@ -471,7 +471,7 @@
|
|||||||
parent: ironic-base
|
parent: ironic-base
|
||||||
vars:
|
vars:
|
||||||
# NOTE(iurygregory): switch to only wholedisk test, since the
|
# NOTE(iurygregory): switch to only wholedisk test, since the
|
||||||
# partition test is failling randomly.
|
# partition test is failing randomly.
|
||||||
tempest_test_regex: test_baremetal_server_ops_wholedisk_image
|
tempest_test_regex: test_baremetal_server_ops_wholedisk_image
|
||||||
devstack_localrc:
|
devstack_localrc:
|
||||||
IRONIC_AUTOMATED_CLEAN_ENABLED: False
|
IRONIC_AUTOMATED_CLEAN_ENABLED: False
|
||||||
|
Loading…
Reference in New Issue
Block a user