17060 Commits

Author SHA1 Message Date
Clark Boylan
ff99f21404 Provision LE cert for storyboard.openstack.org
This provisions the cert but doesn't switch apache to it. When we are
happy with the new cert we can land the child change which will flip
apache over to the new cert.

Change-Id: I9cffd26a51317ea569b078b89cc30dc34c7e7747
2021-05-24 12:35:09 -07:00
Clark Boylan
2fb8998088 Switch ethercalc to the new LE cert
Once we are happy with the ethercalc LE cert we can land this change to
update the apache config to use the LE cert.

Change-Id: Ic35031fb03c928ba4089f292c4d714d4844f29fe
2021-05-24 08:26:10 -07:00
Clark Boylan
46edf8aeb0 Provision ethercalc LE cert
This runs the LE ansible alongside the ethercalc puppetry to get an LE
cert provision for this service. Once we are happy with the new cert we
can land the followup change to switch to the LE cert.

Note we don't add an altname for the host because that will require
extra DNS records in rax DNS.

Change-Id: I04c062eb994f672283aa30ffcc0c4d45fc8c50f6
2021-05-24 08:25:39 -07:00
Zuul
e77edd3169 Merge "Cleanup mailman puppetry" 2021-05-21 20:32:01 +00:00
Zuul
9a0768e601 Merge "Fix typo in gerrit sysadmin doc" 2021-05-19 20:58:07 +00:00
Zuul
c9f4ff2345 Merge "Fixup openstack mailman template perms" 2021-05-19 20:56:32 +00:00
James E. Blair
ec4baa8bcb Fix typo in gerrit sysadmin doc
The label arguments require "=".

Change-Id: I35442033d26060fa639f414aa1a8c6e508716831
2021-05-19 13:19:26 -07:00
Clark Boylan
309ae73b8a Fixup openstack mailman template perms
We are using synchronize to copy the openstack mailman templates which
preserved the ownership and group and permissions of the source files on
bridge. This isn't a major problem but it is ugly so we fix it.

To fix it we set rsync_opts for synchronize to set a usermap and a
groupmap to map the bridge info to the data we want on the remote.

Change-Id: I209345cbe9e27beb18d1ba31e6715bf850bc022b
2021-05-19 12:21:14 -07:00
Zuul
be4f67f23e Merge "Add infra-prod-service-lists job" 2021-05-19 19:16:32 +00:00
Clark Boylan
5efc72a33e Cleanup mailman puppetry
We have shifted over to using ansible for managing the listservs.

This also updates our service docs to point at the corret ansible and
not puppet.

Change-Id: I76f01ff1479c5af0a502a060aac2baa1ab622b21
2021-05-19 12:13:16 -07:00
Zuul
9fbd1ccf2c Merge "Ansible mailman configs" 2021-05-19 15:55:09 +00:00
Ian Wienand
51e3976273 Run haproxy as root user
The usptream haproxy image switched to running as a user, rather than
as root.  This means it can not bind to 80/443 and instantly dies.

I've added a comment with some discussion, but for now, use the root
user.

[1] 82ff028a25

Change-Id: Ic9b04cdd09f73d9df015bcb173871cff1ae58835
2021-05-17 14:28:37 +10:00
Zuul
9ba407ec66 Merge "Double the default number of ansible forks" 2021-05-17 00:26:54 +00:00
Zuul
7535069bb5 Merge "Fix min swap value in make_swap.sh" 2021-05-16 23:53:56 +00:00
Jeremy Stanley
4189add2f7 Temporarily pin haproxy image to 2.3
The haproxy 2.4 images aren't working for us, docker-compose
perpetually reports the container in a "restarting" state. Pin back
from latest to 2.3 until we can sort out what needs to change in how
we integrate this on the server.

Change-Id: I01ae11a31eb8eaeb9e570692d5ec268395f69a97
2021-05-15 12:19:48 +00:00
Clark Boylan
5e43926b5e Fix min swap value in make_swap.sh
We just discovered that a number of new servers have rather small swap
sizes. It appears this snuck in via change 782898 which tries to bound
the max swap size to 8GB. Unfortunately the input to parted expects MB
so we make a swap size of 8MB instead of 8GB.

Bump the min value to 8192 to fix this.

Change-Id: I76b5b7dd8ac76c2ecbab9064bcdf956394b3a770
2021-05-14 14:09:11 -07:00
Clark Boylan
8d9975be67 Double the default number of ansible forks
We run these ansible jobs serially which means we don't gain much by
forcing ansible to use a small number of forks. Double the default for
our infra prod job fork count from 5 to 10 to see if this speeds up our
deploy jobs.

Note some jobs override this value to either add more forks or fewer
when necessary. These are left as is.

Change-Id: I6fded724cb9c8654153bcc5937eae7203326076e
2021-05-14 12:14:15 -07:00
Clark Boylan
d4176aff5b Sync zuul status json backup list with current tenants
This removes the kata-containers tenant backup entry as that tenant no
longer exists. We also add status json backups for the opendev,
vexxhost, zuul, pyca, and pypa tenants. This gets us in sync with the
current tenant list.

Change-Id: I8527676dda67915e6ebe0d1c5fde7a57a7ac2e5b
2021-05-14 10:32:07 -07:00
Clark Boylan
39f10b5fe5 Fixup small issues on new zuul scheduler
This fixes the zuul debug log's logrotate filename. We also increase the
rotation count to 30 daily logs for all zuul scheduler zuul processes
(this matches the old server).

We also create a /var/lib/zuul/backup dir so that status.json backups
have a location they can write to. We do this in the base zuul role
which means all zuul servers will get this dir. It doesn't currently
conflict with any of the cluster members' /var/lib/zuul contents so
should be fine.

Change-Id: I4709e3c7e542781a65ae24c1f05a32444026fd26
2021-05-14 08:20:56 -07:00
Zuul
6aab5d7013 Merge "Clean up zuul01 from inventory" 2021-05-13 23:09:53 +00:00
Zuul
f75cf08a5a Merge "Add zuul02 to inventory" 2021-05-13 15:52:01 +00:00
Clark Boylan
c743b7e484 Clean up zuul01 from inventory
This cleans up zuul01 as it should no longer be used at this point. We
also make the inventory groups a bit more clear that all zuul servers
are under the opendev.org domain now.

Depends-On: https://review.opendev.org/c/opendev/zone-opendev.org/+/790483
Change-Id: I7885fe60028fbd87688f3ae920a24bce4d1a3acd
2021-05-13 06:58:36 -07:00
Clark Boylan
533594d959 Add zuul02 to inventory
This zuul02 instance will replace zuul01. There are a few items to
coordinate when doing an actual switch so we haven't removed zuul01 from
inventory here. In particular we need to update gearman server config
values in the zuul cluster and we need to save queues, shutdown zuul01,
then start zuul02's scheduler and restore queues there.

I believe landing this change is safe as we don't appear to start zuul
on new instances by default. Reviewers should double check this.

Depends-On: https://review.opendev.org/c/opendev/zone-opendev.org/+/791039
Change-Id: I524b456e494124d8293fbe8e1468de40f3800772
2021-05-13 06:58:30 -07:00
Martin Kopec
e2b6a170bf refstack: trigger image upload
Include the latest refstack changes in the image.

Change-Id: I14f58a726117f31a3cc986a1b5770da3b52944e6
2021-05-12 19:02:11 +00:00
Zuul
4403289ef7 Merge "Cleanup ssl_cert_check puppet components" 2021-05-12 06:02:37 +00:00
Clark Boylan
caedb11d3d Add infra-prod-service-lists job
This job is not added in the parent so that we can manually run
playbooks after the parent lands. Once we are happy with the results
from the new service-lists.yaml playbook we can land this change and
have zuul automatically apply it when necessary.

Change-Id: I38de8b98af9fb08fa5b9b8849d65470cbd7b3fdc
2021-05-11 08:40:06 -07:00
Clark Boylan
4c4e27cb3a Ansible mailman configs
This converts our existing puppeted mailman configuration into a set of
ansible roles and a new playbook. We don't try to do anything new and
instead do our best to map from puppet to ansible as closely as
possible. This helps reduce churn and will help us find problems more
quickly if they happen.

Followups will further cleanup the puppetry.

Change-Id: If8cdb1164c9000438d1977d8965a92ca8eebe4df
2021-05-11 08:40:01 -07:00
Zuul
ba929562c3 Merge "Retire Asterisk service" 2021-05-10 21:45:12 +00:00
Zuul
68abc67119 Merge "Remove obsolete Bazel spawn strategies" 2021-05-07 03:33:53 +00:00
Zuul
ae9a3ffdee Merge "gerrit docker: match some more files" 2021-05-07 03:03:53 +00:00
Zuul
6f59af3638 Merge "system-config-roles: only match jobs on roles tested" 2021-05-07 03:03:43 +00:00
Zuul
712bd77e62 Merge "Remove some unnecessary debug: statements" 2021-05-07 03:03:35 +00:00
Zuul
f778e7cd9d Merge "host_vars : add .yaml extension" 2021-05-07 02:42:51 +00:00
Ian Wienand
984580f96d Remove some unnecessary debug: statements
With the roles now in production, these debug statements are more
noise than help.

Change-Id: I3da4ac0ae1f8ea8b64ab8d6ba75ccb110787db2e
2021-05-07 11:11:56 +10:00
David Ostrovsky
6c509c2ad0 Remove obsolete Bazel spawn strategies
After the latest Bazel upgrade, the --spawn_strategy=standalone
doesn't show the output of the subprocess created, making the
troubleshoot of the failures impossible.

Since release 0.27 Bazel auto detects the execution strategy, if no
strategy flag is provided. If none of the strategy flags was used,
Bazel will generate a default list of strategies (in this order):

   remote,worker,sandboxed,local

and, for every action it wants to execute, will pick up the first
strategy that can execute it.

See this blog entry for more details: [1].

[1] https://blog.bazel.build/2019/06/19/list-strategy.html

Change-Id: I4be8375cee88f3565bae5c53cd1a3484ce398aba
2021-05-07 11:06:15 +10:00
Ian Wienand
5357b33e57 gerrit docker: match some more files
These files are involved in creating gerrit docker images; make sure
we trigger jobs when they are modified.

Change-Id: I7c4436e066cfb0c2d0b2ca7adf54c99b09dac95f
2021-05-07 11:06:13 +10:00
Ian Wienand
57e29c3680 system-config-roles: only match jobs on roles tested
It seems we have some debugging to do on the openafs roles.  The other
roles here, particularly the bazelisk one, aren't tested here, so
reduce the file matcher.

We can overhaul this more, but it seems like a post-puppet/xenial
thing to do.

Change-Id: I0a41ef48eab0560a23a4e29463435dfe0758d01e
2021-05-07 11:05:21 +10:00
Ian Wienand
320bd0406c certcheck: cleanup letsencrypt domains
Several of these domains have migrated to be deployed via our
letsencrypt roles and thus no-longer need special casing in the
certcheck list as they are automatically added now.

Change-Id: Id417db6af09f3ba96bb6da09d8cbf28dd8ddf276
2021-05-07 11:01:38 +10:00
Ian Wienand
e0acf4a68d Retire Asterisk service
As announced in [1], retire the Asterisk PBX service

[1] http://lists.opendev.org/pipermail/service-discuss/2021-March/000198.html

Change-Id: I527eb3423831c6a155228b6d79428681f60a3273
2021-05-07 09:53:17 +10:00
Ian Wienand
b711714762 Trigger python container promote
Because Id68080575a30e4a08c99df0af603fbb65a0983bd didn't touch any of
the docker files (but just added new 3.9 builds) they didn't get
promoted.  Update timestamp to trigger this.

Change-Id: I6bf33936d4da773329900a2a52d09654087313d4
2021-05-06 12:35:49 +10:00
Zuul
b87ed55db3 Merge "reprepro: mirror Ubuntu UCA Xena" 2021-05-06 02:02:09 +00:00
Zuul
84b6bedb26 Merge "Build Python 3.9 python-builder/base containers" 2021-05-06 02:02:02 +00:00
Zuul
d3b75eaa30 Merge "Use ECC (ed25519) for artifact signing keys" 2021-05-06 00:14:21 +00:00
Zuul
2cf61a5aee Merge "Add support for Xenial ESM repos to our base roles" 2021-05-05 19:54:34 +00:00
Marcin Juszkiewicz
8c90c2a611 reprepro: mirror Ubuntu UCA Xena
Change-Id: I918baf8bc9f4c7bb28c471875c04e4ff2ff2c508
2021-05-05 17:44:48 +02:00
Zuul
fec37d6534 Merge "Deprovision Limesurvey config management and docs" 2021-05-05 00:37:39 +00:00
Ian Wienand
159ada0e7c Cleanup ssl_cert_check puppet components
This migrated to Ansible with
Idbe084f13f3684021e8efd9ac69b63fe31484606.  Remove the now unused
puppet components.

Change-Id: I500d6eefcb64f4941e216b8590f4cd60ceec0811
2021-05-05 10:22:01 +10:00
Ian Wienand
629fdec768 Build Python 3.9 python-builder/base containers
Python 3.9 is released, so let's build containers.

This splits the docker-images/ files up as they are becoming a bit
crowded.

Change-Id: Id68080575a30e4a08c99df0af603fbb65a0983bd
2021-05-05 09:55:56 +10:00
Zuul
00cd471c99 Merge "Clean up Gerrit global config documentation" 2021-05-04 20:28:19 +00:00
Zuul
8faf9a8a49 Merge "nodepool clouds: adds stats prefix" 2021-05-04 20:28:00 +00:00