186 Commits

Author SHA1 Message Date
Zuul
a4a885b12d Merge "Remove logging from Kata IRC channels" 2025-04-24 21:28:15 +00:00
Ildiko Vancsa
79dd876ac8 Remove logging from Kata IRC channels
The Kata Containers community has moved off of IRC. In the attempt
to archive the IRC channels this patch removes logging for them by
removing the #kata-dev and #kata-general channels from the
inventory/service/group_vars/eavesdrop.yaml file.

Change-Id: I7af3ba965abb6f7852addf40f8d2112b211557ef
Signed-off-by: Ildiko Vancsa <ildiko.vancsa@gmail.com>
2025-04-24 16:32:27 +02:00
Clark Boylan
9d6e8ea0a0 Remove review02 from the inventory
This change removes review02 from our inventory and configuration
management. This should be landed after we're confident we're unlikely
to need to roll back to that server. That said if we do rollback before
the server is cleaned up reverting this change isn't too bad.

Change-Id: Ica14ae92c4c1ef6db76acef93d6d65977aab4def
2025-04-21 11:07:22 -07:00
Clark Boylan
2b85c5ed13 Add review03 to a couple of places that were missed
This adds review03 to cacti, zuul known_hosts, and
infra-prod-service-review file matchers. This catches us up with
review02's old state before we start to clean up review02 which may be
in a few days.

Change-Id: I8b58febd16af6c4c8ed13d21b9758a3b65812129
2025-04-21 11:05:50 -07:00
James E. Blair
63d8264d0e Add remaining clouds as zuul connections
This adds the remaining in-service openstack clouds to the zuul
config for use by the zuul-launcher.

Change-Id: I5475a9ec3914c1fee672a3de8d9baf888ee46fd2
2025-03-19 12:18:26 -07:00
Clark Boylan
873f862963 Drop public port 3000 access for Gitea
The web bot crawlers have discovered port 3000 and have brought gitea09
to its knees. Block port 3000 access and force traffic through the
proxies which help moderate things better.

Change-Id: I16f55a7ebb222466b8823cfee7c4ac8c628ff5b1
2025-03-11 16:03:41 -07:00
Jeremy Stanley
ed20f2b8d6 Clean up old Rackspace Flex SJC3 project
We've moved all our resources to the new project now, so no longer
need old cloud and hostvar references.

Also include some comments about manual adjustments we made to the
MTU in the new projects.

Change-Id: I0bca50f2193d89fffd3ca20c8f8fc79e376eebb1
2025-03-06 17:27:42 +00:00
James E. Blair
af41d1a540 Add ovh connection to zuul launcher
Rax-flex is out of service, so add ovh to continue dogfooding.

Change-Id: Iee17c328b10698f46ed8007d3fce5103f3d8bae6
2025-02-28 17:31:33 -08:00
Jeremy Stanley
17d8d0b7c5 Add networks and routers in new flex tenants
The new projects/tenants we have in Rackspace Flex DFW3 and SJC3
regions still need private networks and routers in order to bind
floating IPs on server instances. Add them to our cloud-launcher
config so they'll get created the next time it runs.

Change-Id: I63a41c23d4b5b4f0e2c37afae48032db44bc30ed
2025-02-27 17:54:31 +00:00
Jeremy Stanley
8cc89f8597 Add new Rackspace Flex projects
With the introduction of the DFW3 region, there are new projects
consistent across all regions. We want to switch to using those, but
right now our existing resources are in a legacy project that only
exists in the SJC3 region. Add the new projects to our bridge config
for both regions as new clouds, and remove the nonfunctional DFW3
from the old one for clarity. Once we've built up new resources and
cleaned up the old project in SJC3, we can clean up the entries
associated with it.

Change-Id: I66beaae4a6d53ad07293300153a2d4b8da33cc9f
2025-02-19 21:27:35 +00:00
Clark Boylan
dc47b469b7 Add AI openstack working group list to lists.openinfra.org
This has been requested by Jimmy at the foundation.

Change-Id: I7bcbca594f42287b6219704e1797a2e2c5d2b1d5
2025-02-05 10:13:09 -08:00
Jeremy Stanley
242322f07c Move OpenInfra mailing lists to new domain
The OpenInfra Foundation is switching from openinfra.dev to
openinfra.org, so move all the mailing lists to prefer the new
addresses and URLs while still supporting the previous ones.

Also add some redirect testing to exercise the Apache rewrites.

Change-Id: Ic10d6519e2a1c4ddab38fdb3119cc20ee62ca741
2024-12-02 15:20:29 +00:00
James E. Blair
660a906c09 Add vexxhost connection to zuul-launcher
Thiss adds vexxhost as a second openstack cloud connection to the
zuul launcher.  This will help us benchmark image times for "raw"
images.

Change-Id: Ifdab5abb9915f384482eda844194f77e8d1b80ca
2024-11-16 10:35:04 -08:00
Goutham Pacha Ravi
24aaa9403a Add meetbot and statusbot to openstack-eventlet-removal
There are team meetings hosted on this channel.

Change-Id: I9c1b343b38942c63a633a3f5334e4d7285d6ff43
2024-11-05 17:58:34 +00:00
James E. Blair
90be36e513 Fix raxflex connection entry for zuul-launcher
The connection entry omitted the cloud name.

Change-Id: I76a95d167cbd12ac01a069885aa6c3c96227fcab
2024-10-10 13:30:24 -07:00
James E. Blair
19cc385403 Install clouds.yaml on zuul-launcher
And configure it with a connection to rax-flex for testing.

Change-Id: I127ba4a2cf33f7ffcecdf81acfc5c38db565da82
2024-10-10 09:05:59 -07:00
Jeremy Stanley
9b9c835e09 Increase opendevzuul-subnet1 from /24 to /20
Since these are not globally routable addresses anyway, we might as
well use a larger network so that we're not constrained by the
subnet size later if we get more than 253 servers worth of quota.

This should be safe since the network is not presently in use for
anything outside of Rackspace Flex, which we haven't hooked up to
Nodepool yet. A cursory search of subset CIDRs also indicates
addresses in this range aren't being configured on virtual
interfaces for existing tests.

Change-Id: Ic32cbc0b24d037c67a5c2f8dd2834013017b8c87
2024-09-03 13:04:32 +00:00
Zuul
d1e6ca724c Merge "Set up networking for Rackspace Flex tenants" 2024-08-28 23:25:12 +00:00
Jeremy Stanley
da5a393cfe Set up networking for Rackspace Flex tenants
The default environment for Rackspace Flex requires user-created
Neutron networks. Add our custom subnets connected to the provider
network "PUBLICNET" with our usual keypairs and open security
groups.

This is based on Clark's change several years ago for the old
InMotion cloud: I2aed6dffde4a1d6e3044c4bd8df4ca60065ae1ea

Change-Id: I8878ff36381d1e82d3bb5180e72a7eec1ce28056
2024-08-26 22:22:15 +00:00
Jeremy Stanley
7640244fc0 Stop null-routing mail for edge-computing-owner
Years ago, while combating a rather nasty and prolonged bout of spam
to mailing list owner addresses, we added configuration to silently
drop any messages for them. That had a side-effect of also
discarding list moderation notifications. As the spam wave subsided
some time back and the primary manager of the edge-computing mailing
list would like to start receiving these notifications once more,
we're removing the line responsible from our listserv's MTA
configuration.

We could consider doing the same for other lists, but since the
sudden arrival of new notifications after years of silence may be a
surprise, we need to think about that more carefully before doing
so.

Change-Id: I10e371e22fd560f133445ce8d17f1c3a2698e839
2024-08-06 17:25:10 +00:00
Clark Boylan
e66eeb8c3c Remove most linaro cloud resources
This removes ansible configuration for the linaro cloud itself and the
linaro cloud mirror. This cloud is in the process of going away and
having these nodes in our inventory is creating base jobs failures due
to unreachable nodes. This then dominoes into not running the LE refresh
job and now some certs are not getting renewed. Clean this all up so
that the rest of our systems are happy.

Note that we don't fully clean up the idea of an unmanaged group as
there may be other locations we want to do something similar (OpenMetal
perhaps?). We also don't remove the openstack clouds.yaml entries for
the linaro cloud yet. It isn't entirely clear when things will go
offline, but it may be as late as August 10 so we keep those credentials
around as they may be useful until then.

Change-Id: Idd6b455de8da2aa9901bf989b1d131f1f4533420
2024-08-02 09:21:11 -07:00
Clark Boylan
0d23743dc9 Add vmware migration list to lists.openinfra.dev
This has been requested by Jimmy at the foundation.

Change-Id: I997783b29b98dc001152d1fd8e3d8f439caece9a
2024-07-18 12:03:33 -07:00
Jeremy Stanley
1f10a66956 Correct the Exim queue threshold for Mailman
In change I9e21eb19b85c9a4b19f5e6c5d03a89c89028bbc4 we incorrectly
adjusted Exim's smtp_accept_max_per_host option from 10 to 50 rather
than setting the smtp_accept_queue_per_connection option we actually
needed. Add this parameter as a new tunable in the role, set the
other option back to its prior value, and update comment references
accordingly.

Change-Id: I13f0275202eba8b5190a76bff921f1ac5adbeea0
2024-06-26 15:39:50 +00:00
Jeremy Stanley
cca985c25b Rebalance Mailman's and Exim's outgoing batch size
In order to avoid tripping Exim's threshold for punting deliveries
to periodic queue processing, make sure to set Mailman's
mta.max_recipients value less than Exim's smtp_accept_max_per_host.
This should eliminate the "no immediate delivery: more than X
messages received in one connection" errors in Exim's mainlog.

While we're at it, increase both for greater throughput.

Change-Id: I9e21eb19b85c9a4b19f5e6c5d03a89c89028bbc4
2024-06-25 03:16:51 +00:00
Tony Breeds
2ed255798f Add OpenMetal to cloud-launcher
Change-Id: Ifcd62c5e41294da6a7912959483bea5a1cf08738
2024-06-11 17:45:05 -05:00
Clark Boylan
8c4977181b Remove inmotion cloud management
This removes management of the inmotion cloud mirror and cloud launcher
configs in prepration for retirement of this cloud. We don't remove the
cloud from clouds.yaml files as it is a bit more ambiguous as to how
long that will be useful (potentially necessary for manual cleanup
steps). Instead when we get around to adding openmetal after inmotion
has been shutdown and resurrected as a new openmetal cloud we can
replace clouds.yaml config then.

This cleanup is necessary to avoid errors when the cloud goes away. We
will be working with OpenMetal to make this happen. It shouldn't matter
if we land this before or after the project-config changes for nodepool
cleanup as things are decoupled sufficiently well.

Change-Id: I9d224318a9cfac35b867babff92e1071ca23c574
2024-06-03 13:21:31 -07:00
Jeremy Stanley
82a3c31641 Host a redirect for api.openstack.org
There is some ancient redirect we don't control somewhere in Liquid
Web's IP space which has been serving a redirect from
api.openstack.org to developer.openstack.org for who knows how long.
Since we already have a farm of redirect vhosts for other sites on
static.openstack.org, add this one as well so we can clean up this
strange and confusing external dependency.

Change-Id: I8051121761366ccbd07f3795c9aecc766f9fb7ff
2024-05-14 19:49:32 +00:00
Zuul
764b9968e0 Merge "Add a new infra-root-keys for 2024" 2024-05-14 16:30:36 +00:00
Zuul
08f0af0d8e Merge "Remove old infra-root-keys content" 2024-05-14 16:20:50 +00:00
Tony Breeds
6ab0c84546 Switch +meetpad_jvb_xmpp_server to the correct server
Change-Id: Iae3605e5f3ab6be094f044d152f0bec633a61787
2024-05-10 14:52:48 -05:00
Tony Breeds
5f0e06963a Use group var to define letsencrypt_certs
Change-Id: Ibcc11bd4fb120a046b428fe3c6eb9ba8505495d0
2024-05-02 13:42:56 -05:00
Tony Breeds
ba511c4d1c Allow overriding of meetpad PUBLIC_URL
In testing jammy updates we discovered that this value need to match
so that websockets are directed to the correct host.

Change-Id: Id44bf92edff411389f05a652dad2ae78607e4d55
2024-05-02 13:41:47 -05:00
Clark Boylan
6b90189b7b Add a new infra-root-keys for 2024
This notably drops pabelanger and mordred (thank you for all the help!),
changes clarkb's, frickler's and fungi's keys, and adds tonyb's key.

Once this is applied to our clouds we can update nodepool configs.

Change-Id: I9f1b205099285a5e735b2f9c8f85a3b3d3666dd5
2024-04-23 20:46:48 +00:00
Clark Boylan
7dbebed015 Remove old infra-root-keys content
This will stop us from trying to add old versions of infra-root-keys to
new clouds. I'm fairly certain this won't remove them from existing
clouds (something we can do manually after this change lands). All of
the nodepool nodes seem to use the latest 2020 version so this should be
safe for running workloads.

Change-Id: I105cf90e1ff2571c8962abfbc6c747e42e899853
2024-04-08 10:38:14 -07:00
James E. Blair
99342db824 Add a standalone zuul db server
Change-Id: Ibb260f820dbc1d9d6ca523ff3903134612cb003e
2024-04-04 12:25:23 -07:00
Zuul
f85db03506 Merge "Setup ML for FLOSS Mentorship Group" 2024-04-02 01:08:25 +00:00
Jeremy Stanley
f1ad3c5198 Add backups for the new Keycloak server
We should really be backing this up before it begins to get used by
additional services. Also, since our newer deployment uses a
separate RDBMS, back that up safely.

Change-Id: I4510dd05204f4b0f450d1925ed7be148d7d73e6e
2024-02-09 17:35:02 +00:00
Zuul
606229382f Merge "Upgrade to Keycloak 23.0" 2024-02-08 15:09:50 +00:00
Jeremy Stanley
f477e35561 Upgrade to Keycloak 23.0
This includes a switch from the "legacy" style Wildfly-based image
to a new setup using Quarkus.

Because Keycloak maintainers consider H2 databases as a test/dev
only option, there are no good migration and upgrade paths short of
export/import data. Go ahead and change our deployment model to rely
on a proper RDBMS, run locally from a container on the same server.

Change-Id: I01f8045563e9f6db6168b92c5a868b8095c0d97b
2024-02-06 05:33:37 +00:00
Jeremy Stanley
02040d6bb2 Retire the OpenInfra Labs mailing list
The OpenInfra Labs pilot project was closed down by mutual agreement
of the OpenInfra Foundation and former project contributors[*]. Its
mailing list will no longer be used. Reject any future posts at the
MTA in order to avoid creating the backscatter which would result if
Mailman itself were configured to bounce messages or send notices.

[*] https://lists.opendev.org/archives/list/openinfralabs@lists.opendev.org/thread/FHFSNRS5ZOWW7LJCKSMXT3HVPMSTSUEA/

Change-Id: I40c1568928399e86ac4ab501040ded6874172243
2024-01-29 17:12:32 +00:00
Clark Boylan
88893cad0b Set both replication gitea ssh keys to the same value
This should have the side effect of removing the older smaller key from
gitea. This is now safe as we have just restarted gerrit to pick up new
configuration forcing it to replicate with the new key. We know it isn't
using the old key because we moved the old key aside during the restart.

This is being done so that the gitea 1.21 upgrade can be made without
disabling key verification in gitea.

Change-Id: I1bad1dda2adf32c5c01b8b5f134130d887d8ec06
2023-12-15 09:36:02 -08:00
Clark Boylan
91322002ff Rotate the new Gitea replication key into Gitea config
We use a new larger rsa key so that gitea checks on key size don't fail
when we upgrade gitea to 1.21 or newer. We did consider an ed25519 key
isntead but those keys can only be generated in the new openssh key file
format and there is some question around whether or not Gerrit's
replication plugin (ultimately MINA ssh client) can read those files. To
be safe we stick with what we know works and simply increase the bit
count.

Change-Id: I51e97e8545a54202b05f32de70c0715083954119
2023-11-30 11:02:36 -08:00
Zuul
89909790b2 Merge "Add ssh key rotation to gitea ssh key management" 2023-11-29 23:53:18 +00:00
Jeremy Stanley
e4a59f29ba Add OpenInfra Asia mailing lists
The OpenInfra Foundation executive team is requesting creation of
new mailing lists on lists.openinfra.dev for the foundation's new
Asia hub. One list will have an open subscription policy and
publicly available archives, while the other will be utilized by the
advisory board for any sensitive topics that must be kept private.

Change-Id: Ie8b6b21b27dfaf932267266f644e7bd8c2f03981
2023-11-29 17:54:13 +00:00
Kendall Nelson
b58715c5d3 Setup ML for FLOSS Mentorship Group
A different group than the FLOSS MOOC looking for a place
to have asynch discussions around setting up and maintaining
OSS mentorship programs at academic institutions.

Change-Id: I41c83b65ff85f7d7048570ddfe0f793613e39e34
2023-11-21 11:16:58 -06:00
Clark Boylan
c843085a02 Add ssh key rotation to gitea ssh key management
This change refactors how gerrit's key(s) in gitea are managed. The
motivation behind this is to allow us to do key rotation with overlap in
accepted keys. To do this we first check whcih keys are present. Then
any missing keys are added. Finally we remove any keys which are not in
our key options.

This also corrects a bug where replacing keys would've required two
Ansible passed to delete the old key then add the new key. All keys
should be properly set in a single Ansible pass with this update.

Change-Id: I1eaf5ae89542e3e4f479c77e4df72a34d65d9c46
2023-11-15 15:12:19 -08:00
Zuul
a01fecb422 Merge "Revert registry.zuul-ci.org" 2023-11-15 02:46:11 +00:00
James E. Blair
3d5c2a810e Revert registry.zuul-ci.org
This project didn't proceed past the test phase,
let's clean it up.

Revert "Add a functional test for registry.zuul-ci.org"
This reverts commit e701fdd3ca1d798bd912b19e91e154e8a88f43b8.

Revert "Add testinfra for registry.zuul-ci.org"
This reverts commit e00f4e59b39cabc3e33823a957d3623dce06f9c4.

Revert "Add static site for registry.zuul-ci.org"
This reverts commit 31b505d3ba29f751b8f02ff365ee6de6b5d350f9.

Revert "Add SSL cert for registry.zuul-ci.org"
This reverts commit d0a8473d42bb0ee3ab1cc8bffbf5bb2fea90f755.

Change-Id: I1d39306187c7b2d7a908389f88d1a60e1b29ffe3
2023-11-14 16:05:28 -08:00
Tony Breeds
75713169b0 Add tonyb to statusbot nicks
Change-Id: I5c37544e799023d91ededb19d528c447a71da7fc
2023-11-14 16:54:35 -06:00
Jeremy Stanley
89d01144a1 Clean up old Mailman v2 roles and vars
Now that we no longer run a Mailman v2 server, we can drop all the
automation we used for deploying and maintaining it.

Change-Id: I522cdbef86d1fe491d446e4b721a7873564c927a
2023-10-31 18:20:12 +00:00