12689 Commits

Author SHA1 Message Date
Michal Nasiadka
496a3df95f CI: Bump Ceph to Pacific
Change-Id: I9c736a586a757b49170977c7f9cf2c4890557a33
2022-02-10 12:15:54 +00:00
Michal Nasiadka
7f2d203354 horizon: Support custom themes
Custom themes support for horizon deployment.
 - horizon role task added for copying theme files
 - added theme copying into the container in templates
 - docs and reno updated

Change-Id: If9982c8e18be31772cb031ef72b7eebd4d768be5
Co-Authored-By: Jakub Darmach <jakub@stackhpc.com>
Depends-On: https://review.opendev.org/c/openstack/kayobe/+/824565
Depends-On: https://review.opendev.org/c/openstack/kolla/+/826672
2022-01-31 14:34:24 +00:00
Zuul
d8b2c72fdf Merge "Fix log rotation for fluentd created files" 2022-01-28 12:24:37 +00:00
Zuul
2d72fc5da4 Merge "prometheus: add tls_connect blackbox module" 2022-01-28 12:24:35 +00:00
Zuul
826dfb4547 Merge "Fix usage of Subject Alternative Name for TLS" 2022-01-27 16:53:28 +00:00
Zuul
92e635bb0a Merge "[CI] Test Ironic on Debian" 2022-01-27 11:31:36 +00:00
Zuul
e4bfedd731 Merge "[CI] Check fluentd errors" 2022-01-27 11:13:55 +00:00
Zuul
f1c68d1d53 Merge "fluentd: remove legacy parsing config" 2022-01-26 17:07:26 +00:00
Zuul
e65c157eb8 Merge "openvswitch: add option to set hw offload" 2022-01-26 10:55:02 +00:00
Zuul
941076eae4 Merge "Fix bad openstack command while registering IDP" 2022-01-26 07:14:05 +00:00
Kevin Rasmussen
f955383b9c Fix bad openstack command while registering IDP
This fixes a bug in registering identity providers

The bug was caused by a missing `=` in the openstack command

Add the missing `=` after `--os-user-domain-name`

Closes-Bug: #1959022
Change-Id: I73f80cd2c81a3944de0933e60f5768956a1a3b70
2022-01-25 18:02:50 +00:00
Zuul
e3d69c7059 Merge "update the default value of node_custom_config" 2022-01-25 17:24:34 +00:00
Zuul
cb69f7d379 Merge "Fluentd cleanup" 2022-01-25 16:22:21 +00:00
Zuul
d241a3dc8c Merge "fluentd: add modern parsing config" 2022-01-25 14:48:49 +00:00
Zuul
70a46fdeb5 Merge "Use subnet_dns_publish_fixed_ip Neutron extension" 2022-01-25 13:40:38 +00:00
Isaac Prior
79b59e2c0b Fix log rotation for fluentd created files
Overrides default fluentd buffer config to stop log files from using
datestamped filenames, allowing logrotate to manage them.

Closes-Bug: #1940118
Change-Id: I40c4e209470d21e0a02fd447fb628acfdae9fa9d
2022-01-25 12:02:20 +00:00
Zuul
b41268308b Merge "Delete the logrotate files because they do not have separate logs" 2022-01-25 10:54:53 +00:00
Zuul
9d5e091b04 Merge "Remove custom value for max_allowed_request_size_in_bytes" 2022-01-25 10:54:09 +00:00
Zuul
2146015cf0 Merge "Revert "Use friendly target names in Prometheus"" 2022-01-25 09:55:44 +00:00
likui
825ef7acd4 update the default value of node_custom_config
The value of node_custom_config should is {{ node_config }}/config,
when specified using --configdir

Change-Id: I076b7d2c8980ddd3baa28f998f84a6b7005dc352
2022-01-25 16:07:57 +08:00
Dr. Jens Harbott
e00e46d337 Use subnet_dns_publish_fixed_ip Neutron extension
There are multiple Neutron extensions that can be used for DNS
integration. The "dns" extension has only minimum functionality, for
most deployments either "dns_domain_ports" or
"subnet_dns_publish_fixed_ip" would be used, with the latter being a
superset of the two others [0].

[0] https://docs.openstack.org/neutron/xena/admin/config-dns-int-ext-serv.html#use-case-3-ports-are-published-directly-in-the-external-dns-service

Signed-off-by: Dr. Jens Harbott <harbott@osism.tech>
Change-Id: I1056bddfd49265ffe21b4d000898d72bba3ebfad
2022-01-21 22:27:23 +00:00
Zuul
fb26785ce9 Merge "Use Docker healthchecks for ironic-neutron-agent services" 2022-01-21 13:11:44 +00:00
Zuul
5dfb0d48bd Merge "[CI] Test Ironic when touching Neutron" 2022-01-21 12:18:25 +00:00
Zuul
1324be4f38 Merge "Revert "[CI] [to-revert] Avoid upgrades on CentOS Stream 8"" 2022-01-21 10:04:12 +00:00
Zuul
b7babcdcfe Merge "Make nova_ssh listen on api_interface as well" 2022-01-20 20:53:06 +00:00
Zuul
d5dcb66479 Merge "Add Ansible 5 aka core 2.12 support" 2022-01-20 20:53:03 +00:00
Zuul
841bfd1bb4 Merge "Deprecate storage_interface variable" 2022-01-20 20:51:27 +00:00
Zuul
a98d13ed7b Merge "[docs] swift: fix mentions of interfaces config" 2022-01-20 20:51:25 +00:00
Michal Nasiadka
dac58808c0 openvswitch: add option to set hw offload
Change-Id: I8bf5453c6943fd2ad8912e5d80af179296ada894
2022-01-20 19:57:09 +00:00
Radosław Piliszek
63141a191d Revert "[CI] [to-revert] Avoid upgrades on CentOS Stream 8"
This reverts commit 9449bcfb705f6547dd1774c33fdcb65784b9a490.

Reason for revert: Ping bug fixed

Change-Id: If52d6757c8c57a6a32b2cf2a481b748e25fc5607
2022-01-20 13:30:54 +00:00
Zuul
e048401940 Merge "Clean up chrony cleanup" 2022-01-20 03:59:07 +00:00
likui
98c6a4b65a Use Docker healthchecks for ironic-neutron-agent services
This change enables the use of Docker healthchecks for ironic-neutron-agent services.

Change-Id: I80f8319b2cf2e4ae09904a08532cde5ec0385fa3
Implements: blueprint container-health-check
2022-01-19 10:06:41 +00:00
Radosław Piliszek
9619b67458 [CI] Test Ironic when touching Neutron
Changes to Neutron can also affect Ironic.
Nova was already triggering these jobs.

Change-Id: I58d5f3d8e3512ee69a4d08438f4fd91ca15158b8
2022-01-19 10:04:45 +00:00
Pierre Riteau
57fb7fd0a5 Remove custom value for max_allowed_request_size_in_bytes
There is no explanation for why this option was bumped to 1 MB instead
of the upstream default. This has been the case since the original
barbican role commit in 2016.

Restore upstream default in Yoga.

Change-Id: Ib0245f44d2b049f7e2254d8d2ea4b2080a8d62dd
2022-01-18 22:04:31 +01:00
Zuul
646868ebf4 Merge "Remove custom value of max_allowed_secret_in_bytes" 2022-01-18 18:14:33 +00:00
Zuul
d83959beaf Merge "multiple: remove duplicated variables between defaults and group vars" 2022-01-18 16:34:41 +00:00
Radosław Piliszek
e63bbed18d Clean up chrony cleanup
In the Yoga cycle we no longer need kolla chrony container removal
procedures.

Change-Id: I4dc246cf0fd68838470bf9e9bf749fa9be4d6670
2022-01-18 15:37:51 +00:00
Pierre Riteau
20a3b14001 Remove custom value of max_allowed_secret_in_bytes
Barbican has recently bumped max_allowed_secret_in_bytes from 10 KB to
20 KB since the original value was too small for some certificates [1].
Remove custom value from the barbican.conf template, which anyway was
the same as the default configuration before the recent upstream change.

The upstream change was backported to Wallaby and has been proposed to
Victoria, Ussuri and Train [2], so this change should be backported too.

[1] https://review.opendev.org/c/openstack/barbican/+/783381
[2] https://review.opendev.org/q/I59d11c5c9c32128ab9d71eaecdf46dd2d789a8d1

Change-Id: I83e4cb48192c8024650a8d347363f6babb75ad90
Closes-Bug: #1957795
2022-01-18 16:22:03 +01:00
Zuul
7b3527819f Merge "Continue to run all actions if one action failed in curator" 2022-01-18 10:48:22 +00:00
Zuul
45452c1ae2 Merge "[CI] Drop unused nodeset" 2022-01-18 09:21:06 +00:00
Zuul
e207a97fc3 Merge "Fix permission denied errors with ping on c8s" 2022-01-17 15:41:31 +00:00
Pierre Riteau
e6cfaee10c Fix permission denied errors with ping on c8s
They seem to think ping is too dangerous for normal users.

Co-Authored-By: Pierre Riteau <pierre@stackhpc.com>
Signed-off-by: Dr. Jens Harbott <harbott@osism.tech>
Depends-On: https://review.opendev.org/c/openstack/kolla-ansible/+/824903
Change-Id: I30c2a7b6850350901b15fe196175508634c8e9a5
2022-01-17 08:59:45 +00:00
Radosław Piliszek
9449bcfb70 [CI] [to-revert] Avoid upgrades on CentOS Stream 8
CentOS Stream 8 currently has a bug which makes it require root
privileges for ping.
A workaround patch (see needed-by below) has been proposed, yet
the dependency on previous branches via the upgrade jobs make it
fail the CI.
Thus, this patch temporarily disables those jobs on CentOS Stream 8.
This patch is to be reverted once we patch the affected branches.

Needed-By: https://review.opendev.org/c/openstack/kolla-ansible/+/824681
Change-Id: I827ed30d0247f21478a45d96ae8396ec0e778d3b
2022-01-17 08:54:10 +00:00
Zuul
12d3e1d23e Merge "Access to zun container fails when tls_external enabled." 2022-01-13 10:45:16 +00:00
Buddhika Sanjeewa
d8c73aa206 Access to zun container fails when tls_external enabled.
Access to console of any zun container fails when
kolla_enable_tls_external is true.
This is due to the protocol of the base_url of the websocket_proxy
section in zun.conf is hardcoded to 'ws'.
[base_url = ws://<external_fqdn>:<port>]

This fix adds a new variable zun_wsproxy_protocol
and sets it's value to 'wss' when kolla_enable_tls_external is true
or to 'ws' otherwise

Then the base url's protocol of the websocket_proxy section
in zun.conf is set by zun_wsproxy_protocol
[base_url = "{{ zun_wsproxy_protocol }}://<external_fqdn>:<port>"]

Closes-Bug: 1957117
Change-Id: Ibd9ca6e40ee8c265775b0657d318aa3f82e4cccb
2022-01-12 13:30:41 +00:00
Radosław Piliszek
ea014b203c [CI] Test that Cinder can create volume from image
To catch early issues like [1].

[1] https://bugs.launchpad.net/cinder/+bug/1947518

Change-Id: I8091817939b976fbd5e44a9640b573cc112a0525
2022-01-12 09:41:40 +00:00
Michal Nasiadka
1736c788d1 multiple: remove duplicated variables between defaults and group vars
Change-Id: I547ab4b05aa14ed3bbee8be2dc77a6840d4816f6
2022-01-12 09:28:41 +00:00
Zuul
9bbba35b2f Merge "Add logrotate configuration for placement service" 2022-01-11 16:02:51 +00:00
Zuul
c052bbff90 Merge "rabbitmq: enable/disable prometheus plugin follow up" 2022-01-11 12:29:02 +00:00
Zuul
6d5f6a048b Merge "OpenID Connect certifiate file is optional" 2022-01-11 10:38:16 +00:00