From f62b7d447df12b3cea346b7900f751979c4dd1ef Mon Sep 17 00:00:00 2001 From: Jake Hutchinson Date: Fri, 6 Dec 2024 15:34:59 +0000 Subject: [PATCH 01/11] Add checksum support --- etc/kayobe/ansible/pulp-artifact-upload.yml | 47 +++++++++++++++++++++ 1 file changed, 47 insertions(+) diff --git a/etc/kayobe/ansible/pulp-artifact-upload.yml b/etc/kayobe/ansible/pulp-artifact-upload.yml index bbec22099..5ba19c74e 100644 --- a/etc/kayobe/ansible/pulp-artifact-upload.yml +++ b/etc/kayobe/ansible/pulp-artifact-upload.yml @@ -7,6 +7,7 @@ remote_pulp_password: "{{ stackhpc_release_pulp_password }}" repository_name: "{{ artifact_type }}-{{ openstack_release }}-{{ os_distribution }}-{{ os_release }}" pulp_base_path: "{{ artifact_type }}/{{ openstack_release }}/{{ os_distribution }}/{{ os_release }}" + upload_checksum: false tasks: - name: Print artifact tag debug: @@ -36,6 +37,25 @@ checksum_algorithm: sha256 register: file_stats + - name: Write checksum to file + ansible.builtin.copy: + content: "{{ file_stats.stat.checksum }}" + dest: "/tmp/{{ found_files.files[0].path | basename }}.sha256" + when: upload_checksum + + - name: Upload checksum artifact + pulp.squeezer.artifact: + pulp_url: "{{ remote_pulp_url }}" + username: "{{ remote_pulp_username }}" + password: "{{ remote_pulp_password }}" + file: "/tmp/{{ found_files.files[0].path | basename }}.sha256" + state: present + register: checksum_upload_result + until: checksum_upload_result is success + retries: 3 + delay: 60 + when: upload_checksum + - name: Create file content from artifact pulp.squeezer.file_content: pulp_url: "{{ remote_pulp_url }}" @@ -49,6 +69,19 @@ retries: 3 delay: 5 + - name: Create checksum content from artifact + pulp.squeezer.file_content: + pulp_url: "{{ remote_pulp_url }}" + username: "{{ remote_pulp_username }}" + password: "{{ remote_pulp_password }}" + relative_path: "{{ found_files.files[0].path | basename }}.sha256" + state: present + register: checksum_content_result + until: checksum_content_result is success + retries: 3 + delay: 5 + when: upload_checksum + - name: Ensure file repo exists pulp.squeezer.file_repository: pulp_url: "{{ remote_pulp_url }}" @@ -75,6 +108,20 @@ retries: 3 delay: 5 + - name: Add checksum content to file repo + pulp.squeezer.file_repository_content: + pulp_url: "{{ remote_pulp_url }}" + username: "{{ remote_pulp_username }}" + password: "{{ remote_pulp_password }}" + repository: "{{ repository_name }}" + present_content: + - relative_path: "{{ found_files.files[0].path | basename }}.sha256" + register: checksum_repo_content_result + until: checksum_repo_content_result is success + retries: 3 + delay: 5 + when: upload_checksum + - name: Create a new publication to point to this version pulp.squeezer.file_publication: pulp_url: "{{ remote_pulp_url }}" From b88c529f09e8cc5505af975a4b63c8eb997dde4b Mon Sep 17 00:00:00 2001 From: Jake Hutchinson Date: Fri, 6 Dec 2024 16:04:55 +0000 Subject: [PATCH 02/11] debug --- etc/kayobe/ansible/pulp-artifact-upload.yml | 24 +++++++++++++++++++++ 1 file changed, 24 insertions(+) diff --git a/etc/kayobe/ansible/pulp-artifact-upload.yml b/etc/kayobe/ansible/pulp-artifact-upload.yml index 5ba19c74e..1bfd04142 100644 --- a/etc/kayobe/ansible/pulp-artifact-upload.yml +++ b/etc/kayobe/ansible/pulp-artifact-upload.yml @@ -37,12 +37,34 @@ checksum_algorithm: sha256 register: file_stats + - name: debug + debug: + msg: "{{ file_stats.stat.checksum }}" + - name: Write checksum to file ansible.builtin.copy: content: "{{ file_stats.stat.checksum }}" dest: "/tmp/{{ found_files.files[0].path | basename }}.sha256" when: upload_checksum + - name: debugg + debug: + msg: "{{ found_files.files[0].path | basename }}.sha256" + + - name: debuggg + command: cat /tmp/{{ found_files.files[0].path | basename }}.sha256 + register: test_output + + - name: debugggg + debug: + msg: "{{ test_output.stdout }}" + + - name: Get sha256 hash for checksum + ansible.builtin.stat: + path: "/tmp/{{ found_files.files[0].path | basename }}.sha256" + checksum_algorithm: sha256 + register: checksum_stats + - name: Upload checksum artifact pulp.squeezer.artifact: pulp_url: "{{ remote_pulp_url }}" @@ -74,6 +96,7 @@ pulp_url: "{{ remote_pulp_url }}" username: "{{ remote_pulp_username }}" password: "{{ remote_pulp_password }}" + sha256: "{{ checksum_stats.stat.checksum }}" relative_path: "{{ found_files.files[0].path | basename }}.sha256" state: present register: checksum_content_result @@ -116,6 +139,7 @@ repository: "{{ repository_name }}" present_content: - relative_path: "{{ found_files.files[0].path | basename }}.sha256" + sha256: "{{ checksum_stats.stat.checksum }}" register: checksum_repo_content_result until: checksum_repo_content_result is success retries: 3 From 699d6150697bf4c6c286ce990962abf3e2a60746 Mon Sep 17 00:00:00 2001 From: Jake Hutchinson Date: Mon, 9 Dec 2024 11:01:19 +0000 Subject: [PATCH 03/11] Remove debug --- etc/kayobe/ansible/pulp-artifact-upload.yml | 16 ---------------- 1 file changed, 16 deletions(-) diff --git a/etc/kayobe/ansible/pulp-artifact-upload.yml b/etc/kayobe/ansible/pulp-artifact-upload.yml index 1bfd04142..992da0a7f 100644 --- a/etc/kayobe/ansible/pulp-artifact-upload.yml +++ b/etc/kayobe/ansible/pulp-artifact-upload.yml @@ -37,28 +37,12 @@ checksum_algorithm: sha256 register: file_stats - - name: debug - debug: - msg: "{{ file_stats.stat.checksum }}" - - name: Write checksum to file ansible.builtin.copy: content: "{{ file_stats.stat.checksum }}" dest: "/tmp/{{ found_files.files[0].path | basename }}.sha256" when: upload_checksum - - name: debugg - debug: - msg: "{{ found_files.files[0].path | basename }}.sha256" - - - name: debuggg - command: cat /tmp/{{ found_files.files[0].path | basename }}.sha256 - register: test_output - - - name: debugggg - debug: - msg: "{{ test_output.stdout }}" - - name: Get sha256 hash for checksum ansible.builtin.stat: path: "/tmp/{{ found_files.files[0].path | basename }}.sha256" From 53dc8150c582b216435c6395e15310566c2c97b0 Mon Sep 17 00:00:00 2001 From: Jake Hutchinson Date: Fri, 29 Nov 2024 10:32:56 +0000 Subject: [PATCH 04/11] IPA Release Train workflow --- .github/workflows/ipa-image-build.yml | 343 ++++++++++++++++++ .github/workflows/ipa-image-promote.yml | 100 +++++ .../environments/ci-builder/inventory/hosts | 3 + .../environments/ci-builder/stackhpc-ci.yml | 5 + etc/kayobe/kolla/config/bifrost/bifrost.yml | 3 + etc/kayobe/kolla/config/ironic.conf | 3 + etc/kayobe/pulp-ipa-image-versions.yml | 4 + etc/kayobe/stackhpc-ipa-images.yml | 14 + 8 files changed, 475 insertions(+) create mode 100644 .github/workflows/ipa-image-build.yml create mode 100644 .github/workflows/ipa-image-promote.yml create mode 100644 etc/kayobe/kolla/config/ironic.conf create mode 100644 etc/kayobe/pulp-ipa-image-versions.yml create mode 100644 etc/kayobe/stackhpc-ipa-images.yml diff --git a/.github/workflows/ipa-image-build.yml b/.github/workflows/ipa-image-build.yml new file mode 100644 index 000000000..eb2bba94a --- /dev/null +++ b/.github/workflows/ipa-image-build.yml @@ -0,0 +1,343 @@ +--- +name: Build IPA images +on: + workflow_dispatch: + inputs: + rocky9: + description: Build Rocky Linux 9 + type: boolean + default: true + ubuntu-jammy: + description: Build Ubuntu 22.04 Jammy + type: boolean + default: true + secrets: + KAYOBE_VAULT_PASSWORD: + required: true + CLOUDS_YAML: + required: true + OS_APPLICATION_CREDENTIAL_ID: + required: true + OS_APPLICATION_CREDENTIAL_SECRET: + required: true + +env: + ANSIBLE_FORCE_COLOR: True + KAYOBE_ENVIRONMENT: ci-builder + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} +jobs: + ipa-image-build: + name: Build IPA images + if: github.repository == 'stackhpc/stackhpc-kayobe-config' + runs-on: arc-skc-host-image-builder-runner + permissions: {} + steps: + - name: Install Package + uses: ConorMacBride/install-package@main + with: + apt: git unzip nodejs python3-pip python3-venv openssh-server openssh-client jq + + - name: Start the SSH service + run: | + sudo /etc/init.d/ssh start + + - name: Checkout + uses: actions/checkout@v4 + with: + path: src/kayobe-config + + - name: Output image tag of the builder + id: builder_image_tag + run: | + echo image_tag=$(grep stackhpc_rocky_9_overcloud_host_image_version: etc/kayobe/pulp-host-image-versions.yml | awk '{print $2}') >> $GITHUB_OUTPUT + + - name: Determine OpenStack release + id: openstack_release + run: | + BRANCH=$(awk -F'=' '/defaultbranch/ {print $2}' src/kayobe-config/.gitreview) + echo "openstack_release=${BRANCH}" | sed -E "s,(stable|unmaintained)/,," >> $GITHUB_OUTPUT + + - name: Generate IPA image tag + id: ipa_image_tag + run: | + echo "ipa_image_tag=$(date +${{ steps.openstack_release.outputs.openstack_release }}-%Y%m%dT%H%M%S)" >> $GITHUB_OUTPUT + + - name: Display IPA image tag + run: | + echo "${{ steps.ipa_image_tag.outputs.ipa_image_tag }}" + + - name: Install Kayobe + run: | + mkdir -p venvs && + pushd venvs && + python3 -m venv kayobe && + source kayobe/bin/activate && + pip install -U pip && + pip install -r ../src/kayobe-config/requirements.txt + + - name: Install terraform + uses: hashicorp/setup-terraform@v2 + + - name: Initialise terraform + run: terraform init + working-directory: ${{ github.workspace }}/src/kayobe-config/terraform/aio + + - name: Generate SSH keypair + run: ssh-keygen -f id_rsa -N '' + working-directory: ${{ github.workspace }}/src/kayobe-config/terraform/aio + + - name: Generate clouds.yaml + run: | + cat << EOF > clouds.yaml + ${{ secrets.CLOUDS_YAML }} + EOF + working-directory: ${{ github.workspace }}/src/kayobe-config/terraform/aio + + - name: Generate terraform.tfvars + run: | + cat << EOF > terraform.tfvars + ssh_public_key = "id_rsa.pub" + ssh_username = "ubuntu" + aio_vm_name = "skc-ipa-image-builder" + aio_vm_image = "Ubuntu-22.04" + aio_vm_flavor = "en1.large" + aio_vm_network = "stackhpc-ci" + aio_vm_subnet = "stackhpc-ci" + aio_vm_interface = "ens3" + aio_vm_volume_size = 100 + EOF + working-directory: ${{ github.workspace }}/src/kayobe-config/terraform/aio + + - name: Terraform Plan + run: terraform plan + working-directory: ${{ github.workspace }}/src/kayobe-config/terraform/aio + env: + OS_CLOUD: "openstack" + OS_APPLICATION_CREDENTIAL_ID: ${{ secrets.OS_APPLICATION_CREDENTIAL_ID }} + OS_APPLICATION_CREDENTIAL_SECRET: ${{ secrets.OS_APPLICATION_CREDENTIAL_SECRET }} + + - name: Terraform Apply + run: | + for attempt in $(seq 5); do + if terraform apply -auto-approve; then + echo "Created infrastructure on attempt $attempt" + exit 0 + fi + echo "Failed to create infrastructure on attempt $attempt" + sleep 10 + terraform destroy -auto-approve + sleep 60 + done + echo "Failed to create infrastructure after $attempt attempts" + exit 1 + working-directory: ${{ github.workspace }}/src/kayobe-config/terraform/aio + env: + OS_CLOUD: "openstack" + OS_APPLICATION_CREDENTIAL_ID: ${{ secrets.OS_APPLICATION_CREDENTIAL_ID }} + OS_APPLICATION_CREDENTIAL_SECRET: ${{ secrets.OS_APPLICATION_CREDENTIAL_SECRET }} + + - name: Get Terraform outputs + id: tf_outputs + run: | + terraform output -json + working-directory: ${{ github.workspace }}/src/kayobe-config/terraform/aio + + - name: Write Terraform outputs + run: | + cat << EOF > src/kayobe-config/etc/kayobe/environments/ci-builder/tf-outputs.yml + ${{ steps.tf_outputs.outputs.stdout }} + EOF + + - name: Write Terraform network config + run: | + cat << EOF > src/kayobe-config/etc/kayobe/environments/ci-builder/tf-network-allocation.yml + --- + aio_ips: + builder: "{{ access_ip_v4.value }}" + EOF + + - name: Write Terraform network interface config + run: | + mkdir -p src/kayobe-config/etc/kayobe/environments/$KAYOBE_ENVIRONMENT/inventory/group_vars/seed + rm -f src/kayobe-config/etc/kayobe/environments/$KAYOBE_ENVIRONMENT/inventory/group_vars/seed/network-interfaces + cat << EOF > src/kayobe-config/etc/kayobe/environments/$KAYOBE_ENVIRONMENT/inventory/group_vars/seed/network-interfaces + admin_interface: "{{ access_interface.value }}" + aio_interface: "{{ access_interface.value }}" + EOF + + - name: Manage SSH keys + run: | + mkdir -p ~/.ssh + touch ~/.ssh/authorized_keys + cat src/kayobe-config/terraform/aio/id_rsa.pub >> ~/.ssh/authorized_keys + cp src/kayobe-config/terraform/aio/id_rsa* ~/.ssh/ + + - name: Bootstrap the control host + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe control host bootstrap + + - name: Configure the seed host (Builder VM) + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe seed host configure \ + -e seed_bootstrap_user=ubuntu \ + --skip-tags network,apt,docker,docker-registry + env: + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + + - name: Install dependencies + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe seed host command run \ + --command "sudo apt update && sudo apt -y install gcc git libffi-dev python3-dev python-is-python3 python3-venv" --show-output + env: + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + + - name: Build a Ubuntu 22.04 Jammy IPA image + id: build_ubuntu_jammy_ipa + continue-on-error: true + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe overcloud deployment image build --force-rebuild \ + -e os_distribution="ubuntu" \ + -e os_release="jammy" \ + -e ipa_ci_builder_distribution="ubuntu" + env: + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + if: inputs.ubuntu-jammy + + - name: Show last error logs + continue-on-error: true + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe seed host command run --command "tail -200 /opt/kayobe/images/ipa/ipa.stdout" --show-output + env: + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + if: steps.build_ubuntu_jammy_ipa.outcome == 'failure' + + - name: Upload Ubuntu 22.04 Jammy IPA kernel image to Ark + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe playbook run \ + src/kayobe-config/etc/kayobe/ansible/pulp-artifact-upload.yml \ + -e artifact_path=/opt/kayobe/images/ipa \ + -e artifact_type=ipa \ + -e artifact_tag=${{ steps.ipa_image_tag.outputs.ipa_image_tag }} \ + -e os_distribution="ubuntu" \ + -e os_release="jammy" \ + -e file_regex='*.kernel' \ + -e upload_checksum=true + env: + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + if: inputs.ubuntu-jammy && steps.build_ubuntu_jammy_ipa.outcome == 'success' + + - name: Upload Ubuntu 22.04 Jammy IPA ramdisk image to Ark + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe playbook run \ + src/kayobe-config/etc/kayobe/ansible/pulp-artifact-upload.yml \ + -e artifact_path=/opt/kayobe/images/ipa \ + -e artifact_type=ipa \ + -e artifact_tag=${{ steps.ipa_image_tag.outputs.ipa_image_tag }} \ + -e os_distribution="ubuntu" \ + -e os_release="jammy" \ + -e file_regex='*.initramfs' \ + -e upload_checksum=true + env: + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + if: inputs.ubuntu-jammy && steps.build_ubuntu_jammy_ipa.outcome == 'success' + + - name: Build a Rocky 9 IPA image + id: build_rocky_9_ipa + continue-on-error: true + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe overcloud deployment image build --force-rebuild \ + -e os_distribution="rocky" \ + -e os_release="9" \ + -e ipa_ci_builder_distribution="rocky" + env: + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + if: inputs.rocky9 + + - name: Show last error logs + continue-on-error: true + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe seed host command run --command "tail -200 /opt/kayobe/images/ipa/ipa.stdout" --show-output + env: + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + if: steps.build_rocky_9_ipa.outcome == 'failure' + + - name: Upload Rocky 9 IPA kernel image to Ark + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe playbook run \ + src/kayobe-config/etc/kayobe/ansible/pulp-artifact-upload.yml \ + -e artifact_path=/opt/kayobe/images/ipa \ + -e artifact_type=ipa \ + -e artifact_tag=${{ steps.ipa_image_tag.outputs.ipa_image_tag }} \ + -e os_distribution="rocky" \ + -e os_release="9" \ + -e file_regex='*.kernel' \ + -e upload_checksum=true + env: + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + if: inputs.rocky9 && steps.build_rocky_9_ipa.outcome == 'success' + + - name: Upload Rocky 9 IPA ramdisk image to Ark + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe playbook run \ + src/kayobe-config/etc/kayobe/ansible/pulp-artifact-upload.yml \ + -e artifact_path=/opt/kayobe/images/ipa \ + -e artifact_type=ipa \ + -e artifact_tag=${{ steps.ipa_image_tag.outputs.ipa_image_tag }} \ + -e os_distribution="rocky" \ + -e os_release="9" \ + -e file_regex='*.initramfs' \ + -e upload_checksum=true + env: + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + if: inputs.rocky9 && steps.build_rocky_9_ipa.outcome == 'success' + + - name: Copy logs back + continue-on-error: true + run: | + mkdir logs + scp -r ubuntu@$(jq -r .access_ip_v4.value src/kayobe-config/etc/kayobe/environments/ci-builder/tf-outputs.yml):/opt/kayobe/images/*/*.std* ./logs/ + if: always() + + - name: Upload logs artifact + uses: actions/upload-artifact@v4 + with: + name: Build logs + path: ./logs + + - name: Fail if the IPA image build failed + run: | + echo "Builds failed. See workflow artifacts for details." && + exit 1 + if: steps.build_rocky_9_ipa.outcome == 'failure' || + steps.build_ubuntu_jammy_ipa.outcome == 'failure' + + - name: Destroy + run: terraform destroy -auto-approve + working-directory: ${{ github.workspace }}/src/kayobe-config/terraform/aio + env: + OS_CLOUD: openstack + OS_APPLICATION_CREDENTIAL_ID: ${{ secrets.OS_APPLICATION_CREDENTIAL_ID }} + OS_APPLICATION_CREDENTIAL_SECRET: ${{ secrets.OS_APPLICATION_CREDENTIAL_SECRET }} + if: always() diff --git a/.github/workflows/ipa-image-promote.yml b/.github/workflows/ipa-image-promote.yml new file mode 100644 index 000000000..c2fbb0800 --- /dev/null +++ b/.github/workflows/ipa-image-promote.yml @@ -0,0 +1,100 @@ +--- +name: Promote IPA image +on: + workflow_dispatch: + inputs: + rocky9: + description: Promote Rocky Linux 9 + type: boolean + default: true + ubuntu-jammy: + description: Promote Ubuntu 22.04 Jammy + type: boolean + default: true + image_tag: + description: Tag to promote + type: string + required: true +env: + ANSIBLE_FORCE_COLOR: True +jobs: + ipa-image-promote: + name: Promote IPA image + if: github.repository == 'stackhpc/stackhpc-kayobe-config' + runs-on: ubuntu-22.04 + steps: + - name: Validate inputs + run: | + if [[ ${{ inputs.rocky9 }} == 'false' && ${{ inputs.ubuntu-jammy }} == 'false' ]]; then + echo "At least one distribution must be selected" + exit 1 + fi + + - uses: actions/checkout@v4 + with: + path: src/kayobe-config + + - name: Determine OpenStack release + id: openstack_release + run: | + BRANCH=$(awk -F'=' '/defaultbranch/ {print $2}' .gitreview) + echo "openstack_release=${BRANCH}" | sed -E "s,(stable|unmaintained)/,," >> $GITHUB_OUTPUT + working-directory: src/kayobe-config + + - name: Setup networking + run: | + if ! ip l show breth1 >/dev/null 2>&1; then + sudo ip l add breth1 type bridge + fi + sudo ip l set breth1 up + if ! ip a show breth1 | grep 192.168.33.3/24; then + sudo ip a add 192.168.33.3/24 dev breth1 + fi + if ! ip l show dummy1 >/dev/null 2>&1; then + sudo ip l add dummy1 type dummy + fi + sudo ip l set dummy1 up + sudo ip l set dummy1 master breth1 + + - name: Install Kayobe + run: | + mkdir -p venvs && + pushd venvs && + python3 -m venv kayobe && + source kayobe/bin/activate && + pip install -U pip && + pip install -r ../src/kayobe-config/requirements.txt + + - name: Bootstrap the control host + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe control host bootstrap + + - name: Promote Rocky Linux 9 IPA image artifact + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe playbook run \ + src/kayobe-config/etc/kayobe/ansible/pulp-artifact-promote.yml \ + -e artifact_type="ipa" \ + -e os_distribution='rocky' \ + -e os_release='9' + env: + ARTIFACT_TAG: ${{ inputs.image_tag }} + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + if: inputs.rocky9 + + - name: Promote Ubuntu Jammy 22.04 IPA image artifact + run: | + source venvs/kayobe/bin/activate && + source src/kayobe-config/kayobe-env --environment ci-builder && + kayobe playbook run \ + src/kayobe-config/etc/kayobe/ansible/pulp-artifact-promote.yml \ + -e artifact_type="ipa" \ + -e os_distribution='ubuntu' \ + -e os_release='jammy' + env: + ARTIFACT_TAG: ${{ inputs.image_tag }} + KAYOBE_VAULT_PASSWORD: ${{ secrets.KAYOBE_VAULT_PASSWORD }} + if: inputs.ubuntu-jammy diff --git a/etc/kayobe/environments/ci-builder/inventory/hosts b/etc/kayobe/environments/ci-builder/inventory/hosts index 759e41184..722a42d1b 100644 --- a/etc/kayobe/environments/ci-builder/inventory/hosts +++ b/etc/kayobe/environments/ci-builder/inventory/hosts @@ -3,5 +3,8 @@ [ofed-builder:children] seed +[controllers] +builder + [seed] builder diff --git a/etc/kayobe/environments/ci-builder/stackhpc-ci.yml b/etc/kayobe/environments/ci-builder/stackhpc-ci.yml index 22258a838..9ac2f4c9b 100644 --- a/etc/kayobe/environments/ci-builder/stackhpc-ci.yml +++ b/etc/kayobe/environments/ci-builder/stackhpc-ci.yml @@ -96,3 +96,8 @@ stackhpc_docker_registry_password: !vault | # Username and password of the overcloud host image repository. stackhpc_release_pulp_username: "{{ stackhpc_docker_registry_username }}" stackhpc_release_pulp_password: "{{ stackhpc_docker_registry_password }}" + +# Build during IPA builder workflow +ipa_build_images: true +ipa_build_dib_env_extra: + DISTRO_NAME: "{{ ipa_ci_builder_distribution | default('ubuntu') }}" diff --git a/etc/kayobe/kolla/config/bifrost/bifrost.yml b/etc/kayobe/kolla/config/bifrost/bifrost.yml index 16ea3ac3b..039f7ee2a 100644 --- a/etc/kayobe/kolla/config/bifrost/bifrost.yml +++ b/etc/kayobe/kolla/config/bifrost/bifrost.yml @@ -6,5 +6,8 @@ use_cirros: true cirros_deploy_image_upstream_url: "{{ stackhpc_overcloud_host_image_url }}" {% endif %} +ipa_kernel_url: "{{ stackhpc_ipa_images_url }}/ipa.kernel" +ipa_ramdisk_url: "{{ stackhpc_ipa_images_url }}/ipa.initramfs" + # Disable debug logging to avoid generating large log files ironic_debug: false diff --git a/etc/kayobe/kolla/config/ironic.conf b/etc/kayobe/kolla/config/ironic.conf new file mode 100644 index 000000000..79092a99e --- /dev/null +++ b/etc/kayobe/kolla/config/ironic.conf @@ -0,0 +1,3 @@ +[conductor] +deploy_kernel = {{ stackhpc_ipa_images_url }}/ipa.kernel +deploy_ramdisk = {{ stackhpc_ipa_images_url }}/ipa.initramfs diff --git a/etc/kayobe/pulp-ipa-image-versions.yml b/etc/kayobe/pulp-ipa-image-versions.yml new file mode 100644 index 000000000..43c3084a4 --- /dev/null +++ b/etc/kayobe/pulp-ipa-image-versions.yml @@ -0,0 +1,4 @@ +--- +# IPA image versioning tags +stackhpc_rocky_9_ipa_image_version: "2024.1-20241204T131128" +stackhpc_ubuntu_jammy_ipa_image_version: "2024.1-20241204T131128" diff --git a/etc/kayobe/stackhpc-ipa-images.yml b/etc/kayobe/stackhpc-ipa-images.yml new file mode 100644 index 000000000..041eaa156 --- /dev/null +++ b/etc/kayobe/stackhpc-ipa-images.yml @@ -0,0 +1,14 @@ +--- +################################# +# Release train IPA image sources + +# The IPA image source, defined by os_distribution, +# os_release, and the current stable version. +stackhpc_ipa_image_url: "{{ stackhpc_release_pulp_content_url_with_auth }}/\ + ipa/{{ openstack_release }}/{{ os_distribution }}/\ + {{ os_release }}/{{ stackhpc_ipa_image_version }}" + +# IPA image version tag selection +stackhpc_ipa_image_version: >- + {{ stackhpc_rocky_9_ipa_image_version if os_distribution == 'rocky' and os_release == '9' else + stackhpc_ubuntu_jammy_ipa_image_version if os_distribution == 'ubuntu' and os_release == 'jammy' }} From 76b22bf61093948b4c5354c0ae07a196d91e50ed Mon Sep 17 00:00:00 2001 From: Jake Hutchinson Date: Mon, 9 Dec 2024 11:05:50 +0000 Subject: [PATCH 05/11] Finishing touches --- etc/kayobe/bifrost.yml | 4 ++-- etc/kayobe/ipa.yml | 4 ++-- etc/kayobe/kolla/config/bifrost/bifrost.yml | 3 --- etc/kayobe/kolla/config/ironic.conf | 3 --- etc/kayobe/pulp-ipa-image-versions.yml | 4 ++-- etc/kayobe/stackhpc-ipa-images.yml | 10 ++++++++-- 6 files changed, 14 insertions(+), 14 deletions(-) delete mode 100644 etc/kayobe/kolla/config/ironic.conf diff --git a/etc/kayobe/bifrost.yml b/etc/kayobe/bifrost.yml index 123c53d23..76013ee78 100644 --- a/etc/kayobe/bifrost.yml +++ b/etc/kayobe/bifrost.yml @@ -135,7 +135,7 @@ # Ironic Python Agent (IPA) configuration. # URL of Ironic Python Agent (IPA) kernel image. -#kolla_bifrost_ipa_kernel_upstream_url: +kolla_bifrost_ipa_kernel_upstream_url: "{% if stackhpc_ipa_image_bifrost_enabled | bool %}{{ stackhpc_ipa_image_url }}/ipa.kernel{% endif %}" # URL of checksum of Ironic Python Agent (IPA) kernel image. #kolla_bifrost_ipa_kernel_checksum_url: @@ -144,7 +144,7 @@ #kolla_bifrost_ipa_kernel_checksum_algorithm: # URL of Ironic Python Agent (IPA) ramdisk image. -#kolla_bifrost_ipa_ramdisk_upstream_url: +kolla_bifrost_ipa_ramdisk_upstream_url: "{% if stackhpc_ipa_image_bifrost_enabled | bool %}{{ stackhpc_ipa_image_url }}/ipa.initramfs{% endif %}" # URL of checksum of Ironic Python Agent (IPA) ramdisk image. #kolla_bifrost_ipa_ramdisk_checksum_url: diff --git a/etc/kayobe/ipa.yml b/etc/kayobe/ipa.yml index e1d1a6f0b..ea6bfdf6d 100644 --- a/etc/kayobe/ipa.yml +++ b/etc/kayobe/ipa.yml @@ -87,7 +87,7 @@ ipa_build_dib_elements_extra: #ipa_images_kernel_name: # URL of Ironic deployment kernel image to download. -#ipa_kernel_upstream_url: +ipa_kernel_upstream_url: "{% if stackhpc_ipa_image_overcloud_enabled | bool %}{{ stackhpc_ipa_image_url }}/ipa.kernel{% endif %}" # URL of checksum of Ironic deployment kernel image. #ipa_kernel_checksum_url: @@ -99,7 +99,7 @@ ipa_build_dib_elements_extra: #ipa_images_ramdisk_name: # URL of Ironic deployment ramdisk image to download. -#ipa_ramdisk_upstream_url: +ipa_ramdisk_upstream_url: "{% if stackhpc_ipa_image_overcloud_enabled | bool %}{{ stackhpc_ipa_image_url }}/ipa.initramfs{% endif %}" # URL of checksum of Ironic deployment ramdisk image. #ipa_ramdisk_checksum_url: diff --git a/etc/kayobe/kolla/config/bifrost/bifrost.yml b/etc/kayobe/kolla/config/bifrost/bifrost.yml index 039f7ee2a..16ea3ac3b 100644 --- a/etc/kayobe/kolla/config/bifrost/bifrost.yml +++ b/etc/kayobe/kolla/config/bifrost/bifrost.yml @@ -6,8 +6,5 @@ use_cirros: true cirros_deploy_image_upstream_url: "{{ stackhpc_overcloud_host_image_url }}" {% endif %} -ipa_kernel_url: "{{ stackhpc_ipa_images_url }}/ipa.kernel" -ipa_ramdisk_url: "{{ stackhpc_ipa_images_url }}/ipa.initramfs" - # Disable debug logging to avoid generating large log files ironic_debug: false diff --git a/etc/kayobe/kolla/config/ironic.conf b/etc/kayobe/kolla/config/ironic.conf deleted file mode 100644 index 79092a99e..000000000 --- a/etc/kayobe/kolla/config/ironic.conf +++ /dev/null @@ -1,3 +0,0 @@ -[conductor] -deploy_kernel = {{ stackhpc_ipa_images_url }}/ipa.kernel -deploy_ramdisk = {{ stackhpc_ipa_images_url }}/ipa.initramfs diff --git a/etc/kayobe/pulp-ipa-image-versions.yml b/etc/kayobe/pulp-ipa-image-versions.yml index 43c3084a4..778831c05 100644 --- a/etc/kayobe/pulp-ipa-image-versions.yml +++ b/etc/kayobe/pulp-ipa-image-versions.yml @@ -1,4 +1,4 @@ --- # IPA image versioning tags -stackhpc_rocky_9_ipa_image_version: "2024.1-20241204T131128" -stackhpc_ubuntu_jammy_ipa_image_version: "2024.1-20241204T131128" +stackhpc_rocky_9_ipa_image_version: "2024.1-20241206T160829" +stackhpc_ubuntu_jammy_ipa_image_version: "2024.1-20241206T160829" diff --git a/etc/kayobe/stackhpc-ipa-images.yml b/etc/kayobe/stackhpc-ipa-images.yml index 041eaa156..14412d6c3 100644 --- a/etc/kayobe/stackhpc-ipa-images.yml +++ b/etc/kayobe/stackhpc-ipa-images.yml @@ -2,10 +2,16 @@ ################################# # Release train IPA image sources +# Whether to use Release Train IPA images for Bifrost +stackhpc_ipa_image_bifrost_enabled: true + +# Whether to use Release Train IPA images for Overcloud Ironic +stackhpc_ipa_image_overcloud_enabled: true + # The IPA image source, defined by os_distribution, # os_release, and the current stable version. -stackhpc_ipa_image_url: "{{ stackhpc_release_pulp_content_url_with_auth }}/\ - ipa/{{ openstack_release }}/{{ os_distribution }}/\ +stackhpc_ipa_image_url: "{{ stackhpc_release_pulp_content_url }}/ipa/\ + {{ openstack_release }}/{{ os_distribution }}/\ {{ os_release }}/{{ stackhpc_ipa_image_version }}" # IPA image version tag selection From 147e2f6f03d84e1981c1518365674dd509a8dcc3 Mon Sep 17 00:00:00 2001 From: Jake Hutchinson Date: Mon, 9 Dec 2024 11:51:46 +0000 Subject: [PATCH 06/11] Documentation --- doc/source/configuration/index.rst | 1 + doc/source/configuration/ipa.rst | 34 +++++++++++++++++++ .../environments/ci-builder/inventory/hosts | 1 + .../ipa-build-workflow-cde24f3b9e3e0667.yaml | 6 ++++ 4 files changed, 42 insertions(+) create mode 100644 doc/source/configuration/ipa.rst create mode 100644 releasenotes/notes/ipa-build-workflow-cde24f3b9e3e0667.yaml diff --git a/doc/source/configuration/index.rst b/doc/source/configuration/index.rst index 131dc917f..136cf13a1 100644 --- a/doc/source/configuration/index.rst +++ b/doc/source/configuration/index.rst @@ -21,3 +21,4 @@ the various features provided. magnum-capi ci-cd cloudkitty + ipa diff --git a/doc/source/configuration/ipa.rst b/doc/source/configuration/ipa.rst new file mode 100644 index 000000000..2af655487 --- /dev/null +++ b/doc/source/configuration/ipa.rst @@ -0,0 +1,34 @@ +.. _ipa: + +========================= +Ironic Python Agent (IPA) +========================= + +Release Train IPA +================= + +StackHPC provides built Ironic Python Agent (IPA) images in Release Train +through Ark. + +These images are built in a CI using a Kayobe workflow :kayobe-doc: +`Kayobe documentation ` +and are configured in this repository. + +Release Train IPA is used by Bifrost and Overcloud Ironic by default in +StackHPC Kayobe Configuration, and is pulled in to Inspector when running +``kayobe seed service deploy`` for Bifrost or ``kayobe overcloud post configure`` +for Ironic. This behaviour can be disabled in `stackhpc-ipa-images.yml`: + +.. code-block:: yaml + + stackhpc_ipa_image_bifrost_enabled: false + stackhpc_ipa_image_overcloud_enabled: false + +You can also override the distribution version pulled in during deployment, +to do this you can change ``stackhpc_ipa_image_version`` to be the opposite +distribution. For example, the case of switching to Ubuntu 22.04 on a Rocky 9 +cloud: + +.. code-block:: yaml + + stackhpc_ipa_image_version: "{{ stackhpc_ubuntu_jammy_ipa_image_version }}" diff --git a/etc/kayobe/environments/ci-builder/inventory/hosts b/etc/kayobe/environments/ci-builder/inventory/hosts index 722a42d1b..e2b89f71b 100644 --- a/etc/kayobe/environments/ci-builder/inventory/hosts +++ b/etc/kayobe/environments/ci-builder/inventory/hosts @@ -3,6 +3,7 @@ [ofed-builder:children] seed +# This is neccesary to run `overcloud deployment image build` [controllers] builder diff --git a/releasenotes/notes/ipa-build-workflow-cde24f3b9e3e0667.yaml b/releasenotes/notes/ipa-build-workflow-cde24f3b9e3e0667.yaml new file mode 100644 index 000000000..fb5130b5f --- /dev/null +++ b/releasenotes/notes/ipa-build-workflow-cde24f3b9e3e0667.yaml @@ -0,0 +1,6 @@ +--- +features: + - | + Adds a new build workflow to Release Train for building IPA + images, and deployment for Release Train IPA images to Bifrost + and Ironic inspector. From 0198c004400a46a647d328b56834577dfd20e73f Mon Sep 17 00:00:00 2001 From: Jake Hutchinson <39007539+assumptionsandg@users.noreply.github.com> Date: Thu, 12 Dec 2024 12:42:16 +0000 Subject: [PATCH 07/11] Apply suggestions from code review Co-authored-by: Alex-Welsh <112560678+Alex-Welsh@users.noreply.github.com> --- .github/workflows/ipa-image-build.yml | 4 ++-- doc/source/configuration/ipa.rst | 17 +++++++++-------- etc/kayobe/bifrost.yml | 4 ++-- etc/kayobe/stackhpc-ipa-images.yml | 2 +- 4 files changed, 14 insertions(+), 13 deletions(-) diff --git a/.github/workflows/ipa-image-build.yml b/.github/workflows/ipa-image-build.yml index eb2bba94a..c5c960318 100644 --- a/.github/workflows/ipa-image-build.yml +++ b/.github/workflows/ipa-image-build.yml @@ -76,7 +76,7 @@ jobs: pip install -r ../src/kayobe-config/requirements.txt - name: Install terraform - uses: hashicorp/setup-terraform@v2 + uses: hashicorp/setup-terraform@v3 - name: Initialise terraform run: terraform init @@ -228,7 +228,7 @@ jobs: kayobe playbook run \ src/kayobe-config/etc/kayobe/ansible/pulp-artifact-upload.yml \ -e artifact_path=/opt/kayobe/images/ipa \ - -e artifact_type=ipa \ + -e artifact_type=ipa-images \ -e artifact_tag=${{ steps.ipa_image_tag.outputs.ipa_image_tag }} \ -e os_distribution="ubuntu" \ -e os_release="jammy" \ diff --git a/doc/source/configuration/ipa.rst b/doc/source/configuration/ipa.rst index 2af655487..c55b91040 100644 --- a/doc/source/configuration/ipa.rst +++ b/doc/source/configuration/ipa.rst @@ -7,17 +7,18 @@ Ironic Python Agent (IPA) Release Train IPA ================= -StackHPC provides built Ironic Python Agent (IPA) images in Release Train +StackHPC provides prebuilt Ironic Python Agent (IPA) images in Release Train through Ark. -These images are built in a CI using a Kayobe workflow :kayobe-doc: -`Kayobe documentation ` -and are configured in this repository. +These images are built in CI using a GitHub workflow and are configured in this +repository. See :kayobe-doc: `Kayobe documentation +` for more details on IPA. -Release Train IPA is used by Bifrost and Overcloud Ironic by default in -StackHPC Kayobe Configuration, and is pulled in to Inspector when running -``kayobe seed service deploy`` for Bifrost or ``kayobe overcloud post configure`` -for Ironic. This behaviour can be disabled in `stackhpc-ipa-images.yml`: +Release Train IPA images are used by Bifrost and Overcloud Ironic by default in +the StackHPC Kayobe Configuration, and are pulled in to the Ironic Inspector +when running ``kayobe seed service deploy`` for Bifrost or ``kayobe overcloud +post configure`` for Overcloud Ironic. This behaviour can be disabled in +`stackhpc-ipa-images.yml`: .. code-block:: yaml diff --git a/etc/kayobe/bifrost.yml b/etc/kayobe/bifrost.yml index 76013ee78..4a060deb6 100644 --- a/etc/kayobe/bifrost.yml +++ b/etc/kayobe/bifrost.yml @@ -135,7 +135,7 @@ # Ironic Python Agent (IPA) configuration. # URL of Ironic Python Agent (IPA) kernel image. -kolla_bifrost_ipa_kernel_upstream_url: "{% if stackhpc_ipa_image_bifrost_enabled | bool %}{{ stackhpc_ipa_image_url }}/ipa.kernel{% endif %}" +kolla_bifrost_ipa_kernel_upstream_url: "{{ (stackhpc_ipa_image_url + '/ipa.kernel') if stackhpc_ipa_image_bifrost_enabled | bool }}" # URL of checksum of Ironic Python Agent (IPA) kernel image. #kolla_bifrost_ipa_kernel_checksum_url: @@ -144,7 +144,7 @@ kolla_bifrost_ipa_kernel_upstream_url: "{% if stackhpc_ipa_image_bifrost_enabled #kolla_bifrost_ipa_kernel_checksum_algorithm: # URL of Ironic Python Agent (IPA) ramdisk image. -kolla_bifrost_ipa_ramdisk_upstream_url: "{% if stackhpc_ipa_image_bifrost_enabled | bool %}{{ stackhpc_ipa_image_url }}/ipa.initramfs{% endif %}" +kolla_bifrost_ipa_ramdisk_upstream_url: "{{ (stackhpc_ipa_image_url + '/ipa.initramfs') if stackhpc_ipa_image_bifrost_enabled | bool }}" # URL of checksum of Ironic Python Agent (IPA) ramdisk image. #kolla_bifrost_ipa_ramdisk_checksum_url: diff --git a/etc/kayobe/stackhpc-ipa-images.yml b/etc/kayobe/stackhpc-ipa-images.yml index 14412d6c3..2246e678a 100644 --- a/etc/kayobe/stackhpc-ipa-images.yml +++ b/etc/kayobe/stackhpc-ipa-images.yml @@ -10,7 +10,7 @@ stackhpc_ipa_image_overcloud_enabled: true # The IPA image source, defined by os_distribution, # os_release, and the current stable version. -stackhpc_ipa_image_url: "{{ stackhpc_release_pulp_content_url }}/ipa/\ +stackhpc_ipa_image_url: "{{ stackhpc_release_pulp_content_url }}/ipa-images/\ {{ openstack_release }}/{{ os_distribution }}/\ {{ os_release }}/{{ stackhpc_ipa_image_version }}" From 91da97f8e2eff9c9c89ff6cc48a116baf2fac5d4 Mon Sep 17 00:00:00 2001 From: Jake Hutchinson Date: Thu, 12 Dec 2024 12:47:19 +0000 Subject: [PATCH 08/11] Update artifact-type to ipa-images --- .github/workflows/ipa-image-build.yml | 6 +++--- .github/workflows/ipa-image-promote.yml | 4 ++-- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/.github/workflows/ipa-image-build.yml b/.github/workflows/ipa-image-build.yml index c5c960318..a62e91fbf 100644 --- a/.github/workflows/ipa-image-build.yml +++ b/.github/workflows/ipa-image-build.yml @@ -245,7 +245,7 @@ jobs: kayobe playbook run \ src/kayobe-config/etc/kayobe/ansible/pulp-artifact-upload.yml \ -e artifact_path=/opt/kayobe/images/ipa \ - -e artifact_type=ipa \ + -e artifact_type=ipa-images \ -e artifact_tag=${{ steps.ipa_image_tag.outputs.ipa_image_tag }} \ -e os_distribution="ubuntu" \ -e os_release="jammy" \ @@ -286,7 +286,7 @@ jobs: kayobe playbook run \ src/kayobe-config/etc/kayobe/ansible/pulp-artifact-upload.yml \ -e artifact_path=/opt/kayobe/images/ipa \ - -e artifact_type=ipa \ + -e artifact_type=ipa-images \ -e artifact_tag=${{ steps.ipa_image_tag.outputs.ipa_image_tag }} \ -e os_distribution="rocky" \ -e os_release="9" \ @@ -303,7 +303,7 @@ jobs: kayobe playbook run \ src/kayobe-config/etc/kayobe/ansible/pulp-artifact-upload.yml \ -e artifact_path=/opt/kayobe/images/ipa \ - -e artifact_type=ipa \ + -e artifact_type=ipa-images \ -e artifact_tag=${{ steps.ipa_image_tag.outputs.ipa_image_tag }} \ -e os_distribution="rocky" \ -e os_release="9" \ diff --git a/.github/workflows/ipa-image-promote.yml b/.github/workflows/ipa-image-promote.yml index c2fbb0800..acba60194 100644 --- a/.github/workflows/ipa-image-promote.yml +++ b/.github/workflows/ipa-image-promote.yml @@ -77,7 +77,7 @@ jobs: source src/kayobe-config/kayobe-env --environment ci-builder && kayobe playbook run \ src/kayobe-config/etc/kayobe/ansible/pulp-artifact-promote.yml \ - -e artifact_type="ipa" \ + -e artifact_type="ipa-images" \ -e os_distribution='rocky' \ -e os_release='9' env: @@ -91,7 +91,7 @@ jobs: source src/kayobe-config/kayobe-env --environment ci-builder && kayobe playbook run \ src/kayobe-config/etc/kayobe/ansible/pulp-artifact-promote.yml \ - -e artifact_type="ipa" \ + -e artifact_type="ipa-images" \ -e os_distribution='ubuntu' \ -e os_release='jammy' env: From 5a74e2f4d64da1db8b37347d2fc7bce961802f1f Mon Sep 17 00:00:00 2001 From: Jake Hutchinson Date: Thu, 12 Dec 2024 12:50:24 +0000 Subject: [PATCH 09/11] Update overcloud IPA URLs --- etc/kayobe/ipa.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/etc/kayobe/ipa.yml b/etc/kayobe/ipa.yml index ea6bfdf6d..74b964536 100644 --- a/etc/kayobe/ipa.yml +++ b/etc/kayobe/ipa.yml @@ -87,7 +87,7 @@ ipa_build_dib_elements_extra: #ipa_images_kernel_name: # URL of Ironic deployment kernel image to download. -ipa_kernel_upstream_url: "{% if stackhpc_ipa_image_overcloud_enabled | bool %}{{ stackhpc_ipa_image_url }}/ipa.kernel{% endif %}" +ipa_kernel_upstream_url: "{{ (stackhpc_ipa_image_url + '/ipa.kernel') if stackhpc_ipa_image_overcloud_enabled | bool }}" # URL of checksum of Ironic deployment kernel image. #ipa_kernel_checksum_url: @@ -99,7 +99,7 @@ ipa_kernel_upstream_url: "{% if stackhpc_ipa_image_overcloud_enabled | bool %}{{ #ipa_images_ramdisk_name: # URL of Ironic deployment ramdisk image to download. -ipa_ramdisk_upstream_url: "{% if stackhpc_ipa_image_overcloud_enabled | bool %}{{ stackhpc_ipa_image_url }}/ipa.initramfs{% endif %}" +ipa_ramdisk_upstream_url: "{{ (stackhpc_ipa_image_url + '/ipa.initramfs') if stackhpc_ipa_image_overcloud_enabled | bool }}" # URL of checksum of Ironic deployment ramdisk image. #ipa_ramdisk_checksum_url: From a507077bcf5883eecab0d1dbefe58bcd953769c3 Mon Sep 17 00:00:00 2001 From: Jake Hutchinson Date: Thu, 12 Dec 2024 12:52:20 +0000 Subject: [PATCH 10/11] Update release note --- releasenotes/notes/ipa-build-workflow-cde24f3b9e3e0667.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/releasenotes/notes/ipa-build-workflow-cde24f3b9e3e0667.yaml b/releasenotes/notes/ipa-build-workflow-cde24f3b9e3e0667.yaml index fb5130b5f..2b1612b41 100644 --- a/releasenotes/notes/ipa-build-workflow-cde24f3b9e3e0667.yaml +++ b/releasenotes/notes/ipa-build-workflow-cde24f3b9e3e0667.yaml @@ -4,3 +4,5 @@ features: Adds a new build workflow to Release Train for building IPA images, and deployment for Release Train IPA images to Bifrost and Ironic inspector. + - | + Release Train IPA is enabled by default. From b0cf130d15f8c1d187a3ea7b90909243e468fdef Mon Sep 17 00:00:00 2001 From: Jake Hutchinson Date: Thu, 12 Dec 2024 15:59:38 +0000 Subject: [PATCH 11/11] Disable StackHPC repos --- etc/kayobe/environments/ci-builder/stackhpc-ci.yml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/etc/kayobe/environments/ci-builder/stackhpc-ci.yml b/etc/kayobe/environments/ci-builder/stackhpc-ci.yml index 9ac2f4c9b..4c3feb0ee 100644 --- a/etc/kayobe/environments/ci-builder/stackhpc-ci.yml +++ b/etc/kayobe/environments/ci-builder/stackhpc-ci.yml @@ -101,3 +101,8 @@ stackhpc_release_pulp_password: "{{ stackhpc_docker_registry_password }}" ipa_build_images: true ipa_build_dib_env_extra: DISTRO_NAME: "{{ ipa_ci_builder_distribution | default('ubuntu') }}" + +# Ensure Ark repos are disabled during CI runs, this is due to +# builder being a member of the 'overcloud' group for IPA builds. +stackhpc_repos_enabled: false +enable_docker_repo: true