Commit graph

38529 commits

Author SHA1 Message Date
Kevin Fenzi
f391d8dd45 robosignatory: fix typo and add resigning
There was a typo and we were resigning eln with f38 ima key instead of
f39 one. ;( Fixed

Also added f38/f39 retag signing so we can get everything signed with
the right keys.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-08 13:29:47 -08:00
cbd4238536 Fix pkgdb gnome entries
Signed-off-by: Tomas Hrcka <thrcka@redhat.com>
2023-02-08 21:23:26 +01:00
ce8a92b311 Uncomment f37 tags
Update f39 key

Signed-off-by: Tomas Hrcka <thrcka@redhat.com>
2023-02-08 20:53:04 +01:00
Samyak Jain
549e5d3ace Branch Fedora 38 from rawhide
Signed-off-by: Samyak Jain <samyak.jn11@gmail.com>
2023-02-08 20:30:05 +01:00
Michal Konečný
7e8bf26944 [the-new-hotness] Sync the staging changes with production
With version 1.2.2 deployed on production this needs to be done for bugzilla
ticket to work.

Signed-off-by: Michal Konečný <mkonecny@redhat.com>
2023-02-08 16:10:29 +01:00
David Kirwan
154f97555a fas2discourse: Deploy operator task
Signed-off-by: David Kirwan <dkirwan@redhat.com>
2023-02-08 16:21:53 +09:00
David Kirwan
b7e4fdf852 fas2discourse: Clean whitespace, fix permissions on keytab
Signed-off-by: David Kirwan <dkirwan@redhat.com>
2023-02-08 15:08:07 +09:00
Kevin Fenzi
337285c85f autosign: switch eln to sign things already in it's tag with f39 key
This will allow us to resign everything with this new key.
Normal builds shouldn't be using it as they come via bodhi.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-07 16:49:02 -08:00
Kevin Fenzi
0801e0fdd5 pkgs01: sync ansible up with reality on memory and switch procs to 8 to try and get a bit better performance
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-07 16:47:08 -08:00
Adam Williamson
24d1f467f3 greenwave: prepare for critical-path-base group split
See https://pagure.io/fedora-comps/pull-request/797 - we need the
greenwave policy ready for that change before we land it, so updates
are gated on the correct tests and Bodhi doesn't crash because
there is no policy for the new contexts.

Signed-off-by: Adam Williamson <awilliam@redhat.com>
2023-02-07 15:58:46 -08:00
Kevin Fenzi
e9a8583570 security.txt: move expires out
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-07 13:56:13 -08:00
Kevin Fenzi
d2c0673c1c linux-system-roles/seconday01: need user=root to find the right cron
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-07 13:50:04 -08:00
Jiri Kucera
f49f4a7ffd lsr-logs-clean: Add MAILTO to cron file
Set MAILTO for the particular cron file to the email address
of the Linux system roles community so any output from the log
pruning job going to stderr is reported to them. Send stdout to
/dev/null since it is not important.

Signed-off-by: Jiri Kucera <jkucera@redhat.com>
2023-02-07 16:39:46 +01:00
Jiri Kucera
e207a4cdf9 lsr-logs-clean: Normalize image names
Normalize RHEL image names to RHEL-X.Y. Since RHEL images are
produced quite frequently it is sufficient to keep just one
RHEL <major>.<minor> after the log expires.

Also add contacts to Linux system roles maintainers.

Signed-off-by: Jiri Kucera <jkucera@redhat.com>
2023-02-07 16:39:46 +01:00
Jiri Kucera
dc8c275f09 Clean /srv/pub/alt/linuxsystemroles/logs
Add cron task that prune /srv/pub/alt/linuxsystemroles/logs.

Related: RHELPLAN-104620

Sign-off-by: Jiri Kucera <jkucera@redhat.com>
2023-02-07 16:39:46 +01:00
5fd4fc49a9 kojihub staging: fix my linting issues
Signed-off-by: Ryan Lerch <rlerch@redhat.com>
2023-02-07 20:08:56 +10:00
a91b34f9b9 kojihub staging: use the new fm plugin and schemas
Signed-off-by: Ryan Lerch <rlerch@redhat.com>
2023-02-07 19:58:20 +10:00
Kevin Fenzi
29dcdd6ce5 proxies: new *.id.fedoraproject.org cert
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-06 11:47:26 -08:00
Kalev Lember
9853012f58 fedmsg / irc: drop #fedora-flatpaks bot
We have tested it for a week now and it turned out that the bot's
verbosity was effectively killing communication in the channel.

Signed-off-by: Kalev Lember <klember@redhat.com>
2023-02-06 17:24:52 +01:00
Pavel Raiskup
2b4e3c2f0e copr: incremental backup: preserve hardlinks
Relates: https://github.com/fedora-copr/copr/pull/2526
2023-02-06 10:34:04 +01:00
David Kirwan
f65c1808de fas2discourse: Correct host target
Signed-off-by: David Kirwan <dkirwan@redhat.com>
2023-02-06 14:06:34 +09:00
David Kirwan
a21dfeea4f fas2discourse: structure to deploy the fas2discourse-operator
Signed-off-by: David Kirwan <dkirwan@redhat.com>
2023-02-06 13:22:22 +09:00
953f2e5c4a ocp_monitoring: fix cronjob alert rule 2023-02-05 22:52:10 +00:00
d0704659a7 docsbuilding: set alert_users list 2023-02-05 22:49:44 +00:00
1304f93460 ocp_monitoring: allows a separate list of alert recipients 2023-02-05 22:49:44 +00:00
7e979cb2f7 communishift: set default resource limits for pods
Once a resource quota is set for a namespace, kube will refuse to
schedule any pod without limits set, including build pod.
This can be difficult to figure out unless you know where to look, and
can be challenging for new openshift/kubernetes users.
Setting a default limit would, at least, avoid the non-schedulable
issue.
2023-02-05 22:46:55 +00:00
Pavel Raiskup
57065bd9b0 copr: incremental backups: documentation 2023-02-05 12:32:12 +01:00
Pavel Raiskup
182dce43e8 copr: incremental backup: tweak periods once more 2023-02-05 12:15:58 +01:00
Pavel Raiskup
9ffbaef878 copr: incremental backup: do backup twice a week 2023-02-05 12:12:41 +01:00
Pavel Raiskup
b771f93a53 copr: incremental backup: don't spam /var/log/crond 2023-02-05 11:43:46 +01:00
Pavel Raiskup
f146b38572 copr: incremental backup: don't eat too much I/O 2023-02-05 11:34:47 +01:00
Pavel Raiskup
6dac8b3a1b copr: incremental backup: more readable rsync progress 2023-02-05 11:27:28 +01:00
Pavel Raiskup
c79930b602 copr: incremental backup: backup real data 2023-02-05 11:20:00 +01:00
Pavel Raiskup
4a29bba927 copr: incremental backup: tweak periods 2023-02-05 11:10:22 +01:00
Pavel Raiskup
41775f37e9 copr: incremental backup to storinator, part 7
Use SSH transport, not RSYNC.
2023-02-05 09:44:20 +01:00
Pavel Raiskup
54f95026a9 copr: incremental backup to storinator, part 6
Install rsnapshot.
2023-02-05 09:32:33 +01:00
Pavel Raiskup
558ad3a1d0 copr: incremental backup to storinator, part 5
Install the "push" rsync action.
2023-02-05 09:26:04 +01:00
Pavel Raiskup
2c86047667 copr: incremental backup to storinator, part 4
Fix the timing specs once more.
2023-02-04 20:47:39 +01:00
Pavel Raiskup
0411ecda7d copr: incremental backup to storinator, part 3
Fixup timing plan specs.
2023-02-04 20:45:18 +01:00
Pavel Raiskup
632cc1df47 copr: incremental backup to storinator, part 3
- fix crontab specification
- better timing plan default
2023-02-04 20:42:37 +01:00
Pavel Raiskup
4035b6eea6 copr: incremental backup to storinator, part 2 2023-02-04 20:33:10 +01:00
Pavel Raiskup
c1335a72d9 copr: incremental backup to storinator, part 1
These scripts are based on my personal "Don't Delay Backups" project,
which is not yet available as a public role.
2023-02-04 20:29:21 +01:00
Kevin Fenzi
e1818e7a8c virthost: rkhunter is available for epel9 for a while now
Go ahead and install this on rhel9 virthosts as well.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-03 15:09:02 -08:00
Kevin Fenzi
8152927cf0 debuginfod01.stg: increase memory to 16gb
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-03 11:14:39 -08:00
Kevin Fenzi
ecce8cc965 crypto-policies: Set ns01.iad2/ns02.iad2 to use DEFAULT:SHA1 crypto-policy
ns01 and ns02 are used by internal iad2 ssytems for dns resolution.
This means bastion uses them for smtp outgoing at least.
Lots of dnssec servers out there still are using SHA1 signatures, and
without this the hosts will simply not resolve at all.
So, until things are better we need to set these back to allow SHA1.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-02 17:42:15 -08:00
Kalev Lember
6fbab55010 fedmsg / irc: adjust #fedora-flatpaks bot a bit
Try to limit the messages to PRs and git commits in flatpaks/
namespace, and bodhi FEDORA-FLATPAK updates.

Signed-off-by: Kalev Lember <klember@redhat.com>
2023-02-01 23:22:49 +01:00
Kevin Fenzi
b08a95a1d6 bkernel: we can't use the kojibuilder group because it uses mock group in the chroot
So, instead we need to user the kojibuilder user on the acl. That should
match up to the mockbuild user in the chroot.
Hopefully.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-01 12:15:30 -08:00
Kevin Fenzi
b4cf3d1cf0 bkernel: use more acls
We need also to allow pesign to the dir/socket so it can start and then
we need kojibuilder access to the socket too.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-01 10:59:32 -08:00
Kevin Fenzi
4e23d73129 bkernel: set pesign perms with acl instead of user/group
We have to use acls here because the mock chroot has it's own user/group
files and it dynamically adds users, but if we use acls it will look up
the user and do the right thing because the name is the same.
(Hopefully)

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-01 10:36:37 -08:00
Kevin Fenzi
50f413c3eb bkernel: set pesign perms locally now.
This used to get set in pesignd when it started, but upstream has
dropped that because it's more of a local config issue.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-02-01 09:39:18 -08:00