Commit graph

36775 commits

Author SHA1 Message Date
Pavel Raiskup
adee0ddf95 copr-be: typo in lighttpd.conf
Fixes bug in f736ed7ef9
2021-12-10 18:54:59 +01:00
Pavel Raiskup
9be329fb9a copr-be: restrict cgi a bit more
We don't need any other extension than php.
2021-12-10 18:33:27 +01:00
Pavel Raiskup
f736ed7ef9 copr-be: dir-generator fix once more
Seems like with lighttpd v1.4.61 we finally can match the index file
request against the rewritten url, so it is secure!  This allows us to
prettily restrict the configuration to load the php script from only one
possible location.
2021-12-10 18:33:27 +01:00
Kevin Fenzi
3d121ae5ee bkernel: drop nosync here too and fix logic to not change site-defaults in kojibuilder role
This caused a bit of trouble since I disabled nosync in the kojibuilder
role. I think applied that with -t site-defaults, which updated
everything, _including_ bkernel machines. Sadly, bkernel machines have
additional config in site-defaults to allow for secure boot signing and
this was lost. So, make sure only the bkernel role changes site-defaults
on bkernel machines and also drop nosync from it's private config.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-10 09:04:18 -08:00
David Kirwan
9495dd3b77 Removed worker04,05 from ocp stg
Signed-off-by: David Kirwan <dkirwan@redhat.com>
2021-12-10 15:57:20 +00:00
Pavel Raiskup
d1b05865ac copr-be: fixup the php directory generator
- avoid using globals if not necessary
- when opendir then closedir
- drop the undefined SERVER_SOFTWARE env use

This reverts commit 35d389a9fa.
Fixes: https://pagure.io/copr/copr/issue/2009
2021-12-10 16:12:19 +01:00
Pavel Raiskup
7afd769a06 copr-be: drop the --ignore-subnets
Originally added as: d03a23530d

Though that commit was probably related to OpenStack networking we had
those days.  The traffic from Copr builders will have to be filtered-out
based on a specific UserAgent (or something alike), once we are on
the issue https://pagure.io/copr/copr/issue/1263
2021-12-10 14:49:52 +01:00
Mohan Boddu
943064c64a More fixes to epel release symlink
Signed-off-by: Mohan Boddu <mboddu@bhujji.com>
2021-12-09 19:05:00 -05:00
Mohan Boddu
f2d96224d9 More fixes for epel release symlink
Signed-off-by: Mohan Boddu <mboddu@bhujji.com>
2021-12-09 18:36:50 -05:00
Kevin Fenzi
147785c399 buildvm-ppc64le: switch to ppc64le specific install for virt-install
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-09 14:07:18 -08:00
Mohan Boddu
917db82a2c For epel-next-release symlink use the epel subpackage rpm from epel repo
Signed-off-by: Mohan Boddu <mboddu@bhujji.com>
2021-12-09 20:15:43 +00:00
Kevin Fenzi
73ce83f871 buildvm_ppc64le: move ppc64le builders to f35
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-09 11:47:48 -08:00
Mohan Boddu
2976d26f24 Use f36 key to sign eln builds
Signed-off-by: Mohan Boddu <mboddu@bhujji.com>
2021-12-09 12:20:23 -05:00
Kevin Fenzi
5e1791ce44 noggin: Increase the activation token lifetime
Currently gmail is throttling emails from fedoraproject.org, so the new
user tokens time out before they reach the new user. Bump this up to an
hour for now until the gmail issue is over.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-09 07:10:43 -08:00
Michal Konečný
b9403b3ac0 [the-new-hotness]Fix consumer callback for production
Signed-off-by: Michal Konečný <mkonecny@redhat.com>
2021-12-09 13:29:38 +01:00
Michal Konečný
ffe823979d [the-new-hotness] Update configuration for release
There were plenty of changes till the last release and this commit is
updating the current production configuration to reflect changes made
for staging.

Release of the-new-hotness 1.0.0.

Signed-off-by: Michal Konečný <mkonecny@redhat.com>
2021-12-09 13:19:21 +01:00
Kevin Fenzi
84b9d7bcc3 koji_builder / mock / site-defaults: disable nosync in prod too
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-08 19:42:26 -08:00
Kevin Fenzi
5bc6dd435f Strike that. Reverse it.
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-08 17:26:39 -08:00
Kevin Fenzi
ee83b72687 koji_builders: disable nosync in stg
nosync has some glibc symbols that break when doing older chroots on f35
hosts. This breaks epel7 builds for example.
https://bugzilla.redhat.com/show_bug.cgi?id=2019329
So, until thats sorted, disable nosync

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-08 17:10:03 -08:00
fb3363e9a6 websites: use f34 for build & nss_wrapper for git+ssh 2021-12-08 23:10:06 +01:00
Kevin Fenzi
9fddbf3f3a serial-console: rework and enable on buildhw-x86
The buildhw-x86 blades also can enable serial console for ipmi/sol.
Rework this to handle the fedora case of options not being in
/etc/grub2-efi.cfg anymore.
Also set both serial S0 and S1 enabled, since some hardware seems to use
one and some uses the other.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-08 12:48:21 -08:00
T.C. Williams
274f347097 Issue#10377 - Allow underscore in fedorapeople username 2021-12-08 17:53:19 +00:00
Kevin Fenzi
cf7a0a326b koji_hub: fix weird permissions on fedmsg plugin
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-08 07:49:25 -08:00
Pavel Raiskup
013344529a copr-be: logrotate helpers
Stop using cronolog for now, and use "cat" (sort-of) with the SIGHUP
support.
2021-12-08 16:15:11 +01:00
Adam Saleh
962ac282c7 Updating bodhi to 5.7.3 2021-12-08 11:12:23 +01:00
Pavel Raiskup
83673506b6 copr-be: use cronolog also for error.log
I haven't realized this can actually be done (mod_accesslog supports
error.log, too).  And this finally _should be_ the working solution
for now.  At least till we rework the hitcounter entirely, to also
support the AWS CloudFronts logs:

    https://pagure.io/copr/copr/issue/1263

This will allow us to never reload the Lighty server processes for the
log rotation purposes, which turned out to be very problematic for no
obvious reason.  Simply, when the Lighty server is under certain
"production" load (not reproducible via /bin/ab), Lighty fails to reload
(both on SIGHUP and SIGUSR1 signals). Something simply hangs the
processes.

If I had to guess, writes to the pipe to the cronolog process are
blocked causing some weird deadlock?  Since we still have to SIGHUP the
cronolog process, Lighty fails to handle both (a) SIGHUP/SIGUSR1 and (b)
detect cronolog exitted at the same time?  But I'm tired of the
debugging this now.
2021-12-08 10:20:55 +01:00
Pavel Raiskup
9f5ae51805 copr-be: send -HUP just to parent lighttpd process 2021-12-07 19:43:00 +01:00
Pavel Raiskup
333e10a0ce copr-be-dev: useless config option
2021-12-07 18:12:16: (configfile.c.1193) WARNING: unknown config-key: ssl.use-compression (ignored)
2021-12-07 19:08:58 +01:00
Pavel Raiskup
81f9578cd7 copr-be: enable mod_openssl
Fixes: https://pagure.io/copr/copr/issue/2000
2021-12-07 18:36:03 +01:00
Pavel Raiskup
c2a50a9e84 copr-be: fix the lighty permissions
.. and idempotence of the playbook, finally.  The 'root' group needs to
stay '---', while 'lighty' gets 'r--'.
2021-12-07 18:29:13 +01:00
Pavel Raiskup
bb0537b997 copr-be: seems like 'acl' fights with 'copy' module
Will this help with the playbook idempotence?
2021-12-07 16:22:42 +01:00
Pavel Raiskup
a2b7a1381c copr-be: fixup the cert file locations 2021-12-07 15:14:44 +01:00
Pavel Raiskup
ed2ae27700 copr-be: don't add access_log.conf
The only configuration option there is to "load" the module, and that
can be easily done directly in lighttpd.conf.
2021-12-07 15:05:53 +01:00
Pavel Raiskup
3b82253333 copr-be: allow Lighty to read production certs
Complements: 523be3de09
2021-12-07 14:54:46 +01:00
Pavel Raiskup
06dcef4c38 certbot: typo in ACL specification 2021-12-07 14:25:01 +01:00
Pavel Raiskup
41c3c869aa certbot: document why Lighty needs the access to certbot's dirs 2021-12-07 14:22:41 +01:00
Pavel Raiskup
523be3de09 certbot: allow lighttpd to step into certbot dirs 2021-12-07 14:15:23 +01:00
Silvie Chlupova
7173e269bc copr: support for generating metrics on copr keygen 2021-12-07 12:15:24 +01:00
Adam Williamson
38888162ea openQA: remove swtpm-teardown now the work is done
Signed-off-by: Adam Williamson <awilliam@redhat.com>
2021-12-06 14:18:46 -08:00
Adam Williamson
7a5d7f59fb openQA: Drop already-done step from swtpm-teardown
This is just cleaning up the mess of the bad parameter from
earlier, run of this play broke halfway through, need to do the
remaining half without choking on this part.

Signed-off-by: Adam Williamson <awilliam@redhat.com>
2021-12-06 14:12:43 -08:00
Adam Williamson
ca2684c711 openQA: fix stupid semodule argument
gah.

Signed-off-by: Adam Williamson <awilliam@redhat.com>
2021-12-06 14:05:14 -08:00
Kevin Fenzi
4ba0ee487c internetx01: fix br0_ipv6_nm missing
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-06 12:46:30 -08:00
Kevin Fenzi
6d3ef70845 internetx01: fix gateway
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-06 12:35:47 -08:00
Kevin Fenzi
74f3f9f937 ibiblio disable network linux-system-roles on ibiblio hosts for now
ibiblio hosts use bonded pairs of etherent.
We need to adjust config to handle this before we enable it.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-06 11:56:47 -08:00
Kevin Fenzi
cf2ce21c1e buildvmhost-s390x-01: ok, leave off mac on bridge
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-06 11:19:43 -08:00
Kevin Fenzi
6227917f8e buildvmhost-s390x-01: bridge has a different mac address from the interface
For some reason here the bridge has a different mac address than the
interface that it's using to talk to the network.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-06 11:14:14 -08:00
Kevin Fenzi
6ab971985d Drop auto6: false from hostvars
See 7cb3fddb79 for more info

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-06 10:52:29 -08:00
Adam Williamson
224e28131d openQA: prepare for prod deployment of latest releases
This unifies prod and stg onto the ways of doing things for the
latest packages, and rejigs the swtpm stuff a bit to tear down
more (we shouldn't need the custom SELinux policy any more).

Signed-off-by: Adam Williamson <awilliam@redhat.com>
2021-12-06 10:40:33 -08:00
Peter Buffon
a21106f88b Last batch update of Ansible host_vars files for linux-system-roles/network conversion. 2021-12-06 18:26:35 +00:00
Kevin Fenzi
579e646af0 osbs: exclude docker* from upgrades
Right now we are running a special docker on osbs nodes that allows it
to actually work with f35+ containers. Without this glibc does a syscall
that docker doesn't understand and just blocks, breaking (at least) dns
resolution in the container. So, until we move these nodes from rhel7,
we are going to have to deal with this.

In addtion to excluding this, if it ever gets mistakenly upgraded, you
need to downgrade and then: remove
'--seccomp-profile=/etc/docker/seccomp.json \' from
/usr/lib/systemd/system/docker.service
do 'systemctl daemon-reload'
do 'systemctl restart docker'

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-12-06 09:38:30 -08:00