Run cloud_launcher from zuul
This is running on a cron right now, let's run it from zuul. This moves the contents from clouds_layouts into the hostvars for bridge and changes the playbook to run against bridge instead of localhost. This lets us not pass in the variables on the CLI, which we don't have support for in the apply job. It also is made possible by the lack of all-clouds.yaml. Change-Id: If0d2aacc49b599a0b51bf7d84f8367f56ed2d003
This commit is contained in:
parent
e0619f17f1
commit
1b126ef48a
21
.zuul.yaml
21
.zuul.yaml
@ -2176,7 +2176,6 @@
|
||||
- playbooks/service-bridge.yaml
|
||||
- playbooks/host_vars/bridge.openstack.org.yaml
|
||||
- playbooks/roles/logrotate/
|
||||
- playbooks/roles/cloud-launcher-cron/
|
||||
- playbooks/roles/edit-secrets-script/
|
||||
- playbooks/roles/install-kubectl/
|
||||
- playbooks/roles/configure-kubectl/
|
||||
@ -2585,6 +2584,20 @@
|
||||
- modules/
|
||||
- manifests/
|
||||
|
||||
- job:
|
||||
name: infra-prod-run-cloud-launcher
|
||||
parent: infra-prod-service-base
|
||||
description: Run cloud launcher playbook
|
||||
vars:
|
||||
playbook_name: run_cloud_launcher.yaml
|
||||
infra_prod_ansible_forks: 1
|
||||
dependencies:
|
||||
- name: infra-prod-service-bridge
|
||||
soft: true
|
||||
files:
|
||||
- playbooks/run_cloud_launcher.yaml
|
||||
- playbooks/host_vars/bridge.openstack.org.yaml
|
||||
|
||||
- job:
|
||||
name: system-config-goaccess-report
|
||||
description: |
|
||||
@ -3008,6 +3021,7 @@
|
||||
- infra-prod-service-eavesdrop
|
||||
- infra-prod-remote-puppet-afs
|
||||
- infra-prod-remote-puppet-else
|
||||
- infra-prod-run-cloud-launcher
|
||||
periodic:
|
||||
jobs:
|
||||
- developer-openstack-goaccess-report
|
||||
@ -3044,6 +3058,11 @@
|
||||
opendev-prod-hourly:
|
||||
jobs:
|
||||
- infra-prod-install-ansible
|
||||
- infra-prod-service-bridge:
|
||||
dependencies:
|
||||
- name: infra-prod-install-ansible
|
||||
soft: true
|
||||
- infra-prod-run-cloud-launcher
|
||||
- infra-prod-service-nodepool:
|
||||
dependencies:
|
||||
- name: infra-prod-install-ansible
|
||||
|
@ -1,404 +0,0 @@
|
||||
# This file is not a playbook, is a YAML file containing the resources layouts
|
||||
# for all the OpenStack Infra clouds.
|
||||
# It is meant to be passed as an argument to the the Ansible cloud launcher.
|
||||
profiles:
|
||||
# Profile to launch AFS server for nodepool.
|
||||
- name: openstackci-projects
|
||||
projects:
|
||||
- name: openstackci
|
||||
description: OpenStack CI project
|
||||
domain: default
|
||||
- name: openstackzuul
|
||||
description: OpenStack zuul project
|
||||
domain: default
|
||||
|
||||
- name: openstackci-security
|
||||
security_groups:
|
||||
- name: default
|
||||
description: Default security group
|
||||
security_groups_rules:
|
||||
- security_group: default
|
||||
ethertype: IPv4
|
||||
remote_group: default
|
||||
state: absent
|
||||
- security_group: default
|
||||
ethertype: IPv6
|
||||
remote_group: default
|
||||
state: absent
|
||||
- security_group: default
|
||||
ethertype: IPv4
|
||||
remote_ip_prefix: 0.0.0.0/0
|
||||
- security_group: default
|
||||
ethertype: IPv6
|
||||
remote_ip_prefix: ::/0
|
||||
|
||||
- name: openstackci-keypairs
|
||||
keypairs:
|
||||
- name: infra-root-keys
|
||||
public_key: |
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLsTZJ8hXTmzjKxYh/7V07mIy8xl2HL+9BaUlt6A6TMsL3LSvaVQNSgmXX5g0XfPWSCKmkZb1O28q49jQI2n7n7+sHkxn0dJDxj1N2oNrzNY7pDuPrdtCijczLFdievygXNhXNkQ2WIqHXDquN/jfLLJ9L0jxtxtsUMbiL2xxZEZcaf/K5MqyPhscpqiVNE1MjE4xgPbIbv8gCKtPpYIIrktOMb4JbV7rhOp5DcSP5gXtLhOF5fbBpZ+szqrTVUcBX0oTYr3iRfOje9WPsTZIk9vBfBtF416mCNxMSRc7KhSW727AnUu85hS0xiP0MRAf69KemG1OE1pW+LtDIAEYp mordred@camelot
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvKYcWK1T7e3PKSFiqb03EYktnoxVASpPoq2rJw2JvhsP0JfS+lKrPzpUQv7L4JCuQMsPNtZ8LnwVEft39k58Kh8XMebSfaqPYAZS5zCNvQUQIhP9myOevBZf4CDeG+gmssqRFcWEwIllfDuIzKBQGVbomR+Y5QuW0HczIbkoOYI6iyf2jB6xg+bmzR2HViofNrSa62CYmHS6dO04Z95J27w6jGWpEOTBjEQvnb9sdBc4EzaBVmxCpa2EilB1u0th7/DvuH0yP4T+X8G8UjW1gZCTOVw06fqlBCST4KjdWw1F/AuOCT7048klbf4H+mCTaEcPzzu3Fkv8ckMWtS/Z9Q== jeblair@operational-necessity
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnfoVhOTkrY7uoebL8PoHXb0Fg4jJqGCbwkxUdNUdheIdbnfyjuRG3iL8WZnzf7nzWnD+IGo6kkAo8BkNMK9L0P0Y+5IjI8NH49KU22tQ1umij4EIf5tzLh4gsqkJmy6QLrlbf10m6UF4rLFQhKzOd4b2H2K6KbP00CIymvbW3BwvNDODM4xRE2uao387qfvXZBUkB0PpRD+7fWPoN58gpFUm407Eba3WwX5PCD+1DD+RVBsG8maIDXerQ7lvFLoSuyMswv1TfkvCj0ZFhSFbfTd2ZysCu6eryFfeixR7NY9SNcp9YTqG6LrxGA7Ci6wz+hycFHXlDrlBgfFJDe5At clark@work
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3KnRBTH5QPpKjf4RWu4akzYt2gwp796cMkFl5vu8e7G/cHuh4979FeNJXMVP6F3rvZB+yXDHLCU5LBVLq0K+1GbAZT/hH38hpMOIvniwKIquvI6C/drkVPHO6YmVlapw/NI530PGnT/TAqCOycHBO5eF1bYsaqV1yZqvs9v7UZc6J4LukoLZwpmyWZ5P3ltAiiy8+FGq3SLCKWDMmv/Bjz4zTsaNbSWThJi0BydINjC1/0ze5Tyc/XgW1sDuxmmXJxgQp4EvLpronqb2hT60iA52kj8lrmoCIryRpgnbaRA7BrxKF8zIr0ZALHijxEUeWHhFJDIVRGUf0Ef0nrmBv fungi-openstack-2015
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHGuIVB/WxBd7k1R8x2FyfqT6KxRnoM7lE5RE8gvBk2r8cQeH5k1c+P5JrBvWpmqXv4satoivYOBiIb7JXEgIxx62YUx/JQ0J7k3w+av6h4iFe2OhOtEOjMF5F8/wO8a/95OeTZPzBZlUfA3hx754kuw3Q/aBKQUOHWxJOIedGyVHeJc7XiFj3RXIufFuUfng9+p4Z3q6d2/WpuKqs00WI0CLF17PkU4i8P9CraJR1dmsWW6zoxMT2G+DwMFI7ZMS3xrVBRuLwrLlbylVLW2kOJ0JeyjHnRh7X1kR7KG3cGOOjA1YQ0e+mXvremcO3/3o6Iop/N1AtqVuYCKlZc7Y9 slukjanov@mirantis.com
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDL9x1rhTVOEQEanrN+ecycaDtAbbh3kr41Rxx7galtLq0JwftjsZqv2Vwl9c8ARmm8HiHcLwDoaZB9gvs6teMScCB+5a1fcohiycJBl2olNFRzkGapDaTvl74aLXQBWaV84D8tUavEl26zcgwrv9WLUsy9pnHoo5K0BzbK7vT2g3VictCphveC2vdjCDeptocWvt4zxCmAY6O7QMKeUjKMlvuy+zCohJcR4BbDnw8EriFAmCeQZcAgfLTyeAvjo384NNIFWyhCwvbCLvpgTplMCp896DWLlXu9eaGUCNjT/sZM8zafAXbfc6OKYFQ5iANAiJktWwKaUaphJkbSVWT5 elizabeth@r2d2
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC3onVLOZiiGpQWTCIV0QwHmc3Jvqyl7UaJxIu7D49OQcLHqVZsozI9pSiCdTnWyAaM+E+5wD9yVcSTqMWqn2AZmZSwQ+Fh6KnCgPZ/o63+iCZPGL0RNk20M1iNh5dvdStDnn+j2fpeV/JONF0tBn07QvNL2eF4BwtbTG9Zhl186QNsXjXDghrSO3Etl6DSfcUhxyvMoA2LnclWWD5hLmiRhcBm+PIxveVsr4B+o0k1HV5SUOvJMWtbEC37AH5I818O4fNOob6CnOFaCsbA9oUDzB5rqxutPZb9SmNJpNoLqYqDgyppM0yeql0Kn97tUt7H4j5xHrWoGnJ4IXfuDc0AMmmy4fpcLGkNf7zcBftKS6iz/3AlOXjlp5WZvKxngJj9HIir2SE/qV4Lxw9936BzvAcQyw5+bEsLQJwi+LPZxEqLC6oklkX9dg/+1yBFHsz6mulA0b4Eq7VF9omRzrhhN4iPpU5KQYPRNz7yRYckXDxYnp2lz6yHgSYh2/lqMc+UqmCL9EAWcDw3jsgvJ6kH/YUVUojiRHD9QLqlhOusu1wrTfojjwF05mqkXKmH+LH8f8AJAlMdYg0c2WLlrcxnwCkLLxzU5cYmKcZ41LuLtQR3ik+EKjYzBXXyCEzFm6qQEbR2akpXyxvONgrf7pijrgNOi0GeatUt0bUQcAONYw== jhesketh@infra
|
||||
|
||||
ssh-rsa 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 nibz@hertz
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSR2NmJC8PSanHUpKJuaMmohG80COO2IPkE3Mxhr7US8P1B3p1c6lOrT6M1txRzBY8FlbxfOinGtutP+ADCB2taXfpO8UiaG9eOqojAT/PeP2Y2ov72rVMSWupLozUv2uAR5yyFVFHOjKPYGAa01aJtfzfJujSak8dM0ifFeFwgp/8RBGEfC7atq+45TdrfAURRcEgcOLiF5Aq6fprCOwpllnrH6VoId9YS7u/5xF2/zBjr9PuOP7jEgCaL/+FNqu7jgj87aG5jiZPlweb7GTLJON9H6eFpyfpoJE0sZ1yR9Q+e9FAqQIA44Zi748qKBlFKbLxzoC4mc0SbNUAleEL yolanda@infra
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCz1CW5E87v8o7O8B5fe7j1uaPCToRdaBukjH2HzQZ+DSGTIPjirLpp5ZXPuyNnmtRMzwld6mlHYlevVEwuZTNyQwS7ut5o0LjyW6yoEcvPq0xMEZLxaso5dZAtzNgf3FzbtaUYBnkhSwX7c24lf8wPGAl7TC3yO0dePQh2lXVdaBiGB9ybVeQr+kwJIxleUE4puuQ+ONJE2D+hHjoQ/huUMpb996pb/YzkjkAxqHguMid0c1taelyW8n17nEDoWvlV9Qqbo8cerhgURo1OBt2zENLjQQ0kOkPxJx4qx3652e0kbkr11y50r9BMs418mnJdWselMxkSqQNZ+XotoH5Dwn+3K2a6Wv4OX3Dqb9SF/JTD7lA/tIkNfxgsRlzfEQ01rK1+g7Je10EnDCLEzHpFjvZ5q4EEMcYqY+osLFpHAOWGLMx+3eY4pz/xEzRP/x3sjGU09uNOZ3oCWUfSkE4xebnnWtxwWZKyFmv3GHtaqJn2UvpAbODPEYyYcOS3XV3zd233W3C09YYnFUyZbGLXpD05Yet5fZfGTnveMRn5/9LZai+dBPwoMWUJdX4yPnGXgOG8zk0u1nWfcNJfYg+xajSUDiMKjDhlkuFK/GXNYuINe42s1TxzL7pJ4X4UhqLiopeJvPg/U5xdCV5pxVKf1MVenrGe2pfwf1Yr2WMv5w== rcarrillocruz@infra
|
||||
|
||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILOjz+dkwRWTJcW9Gt3iGHSzRBsvVlTAK6G2oH3+0D41 iwienand+osinfra@redhat.com
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCdzEzB2KpNLTTFJGLCNMY53sja37PXFzHHdjWEGaZtaTcuCn/ufV9ql5yhS5/414u9swoHM71H00+nT4uSWcXc2tTRXYWslaiwU47DOtQsD//CvGgIFBNO1EinWhYa5uTSfxI+Z/x4PBu7XFq5wi/JCfJ+iHIWsvXn8U44r1csURcZU0GMPAVG1MO+s3p1W7daVqF9RR7UuwCECb3hdPN1N/M4s6myBiuRXCeDND98dKLf8b342hw+pWvQ3g/OCLcVlYPWT4fy1YGQT8hT+jA2XPfwCtu/k7HKAGH3E8UcnBtY/RI9ibciIFe+Ro7q8t+tp5SgjGLq1NnE4Yp5rpsh david@koala
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCuP0CZE8AYnbm8gxecCxKeRw0wHRyryd+FKmNNsdr0d3UvfCbqNzLigrqEBZsKpofi3M4qCWNpKRyfhnjPynLTQjP1vnX9AbL9UGoiHxScfvh3skntTYMs9ezJRd0rMJJZO76FPo8bJLDlwxAQl8m/nuj3HfYiO5hYE7P+a3rhsJh4nEfBb7xh+Q5yM0PWObkkBl6IRiBYjlcsXNZHgTA5kNuihUk5bHqAw54sHh05DhpgOITpTw4LFbh4Ew2NKq49dEb2xbTuAyAr2DHNOGgIwKEZpwtKZEIGEuiLbb4DQRsfivrvyOjnK2NFjQzGyNOHfsOldWHRQwUKUs8nrxKdXvqcrfMnSVaibeYK2TRL+6jd9kc5SIhWI3XLm7HbX7uXMD7/JQrkL25Rcs6nndDCH72DJLz+ynA/T5umMbNBQ9tybL5z73IOpfShRGjQYego22CxDOy7e/5OEMHNoksbFb1S02viM9O2puS7LDqqfT9JIbbPqCrbRi/zOXo0f4EXo6xKUAmd8qlV+6f/p57/qFihzQDaRFVlFEH3k7qwsw7PYGUTwkPaThe6xyZN6D5jqxCZU3aSYu+FGb0oYo+M5IxOm0Cb4NNsvvkRPxWtwSayfFGu6+m/+/RyA3GBcAMev7AuyKN+K2vGMsLagHOx4i+5ZAcUwGzLeXAENNum3w== pabelanger@redhat.com
|
||||
|
||||
ssh-rsa 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 dmsimard@hostname
|
||||
|
||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGmc5fbzMptjAb5D86zSH13ZYCbf3QuV1jk9hL0r1qHw frickler@os-infra-2017
|
||||
|
||||
- name: infra-root-keys-2018-06-15
|
||||
public_key: |
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLsTZJ8hXTmzjKxYh/7V07mIy8xl2HL+9BaUlt6A6TMsL3LSvaVQNSgmXX5g0XfPWSCKmkZb1O28q49jQI2n7n7+sHkxn0dJDxj1N2oNrzNY7pDuPrdtCijczLFdievygXNhXNkQ2WIqHXDquN/jfLLJ9L0jxtxtsUMbiL2xxZEZcaf/K5MqyPhscpqiVNE1MjE4xgPbIbv8gCKtPpYIIrktOMb4JbV7rhOp5DcSP5gXtLhOF5fbBpZ+szqrTVUcBX0oTYr3iRfOje9WPsTZIk9vBfBtF416mCNxMSRc7KhSW727AnUu85hS0xiP0MRAf69KemG1OE1pW+LtDIAEYp mordred@camelot
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvKYcWK1T7e3PKSFiqb03EYktnoxVASpPoq2rJw2JvhsP0JfS+lKrPzpUQv7L4JCuQMsPNtZ8LnwVEft39k58Kh8XMebSfaqPYAZS5zCNvQUQIhP9myOevBZf4CDeG+gmssqRFcWEwIllfDuIzKBQGVbomR+Y5QuW0HczIbkoOYI6iyf2jB6xg+bmzR2HViofNrSa62CYmHS6dO04Z95J27w6jGWpEOTBjEQvnb9sdBc4EzaBVmxCpa2EilB1u0th7/DvuH0yP4T+X8G8UjW1gZCTOVw06fqlBCST4KjdWw1F/AuOCT7048klbf4H+mCTaEcPzzu3Fkv8ckMWtS/Z9Q== jeblair@operational-necessity
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnfoVhOTkrY7uoebL8PoHXb0Fg4jJqGCbwkxUdNUdheIdbnfyjuRG3iL8WZnzf7nzWnD+IGo6kkAo8BkNMK9L0P0Y+5IjI8NH49KU22tQ1umij4EIf5tzLh4gsqkJmy6QLrlbf10m6UF4rLFQhKzOd4b2H2K6KbP00CIymvbW3BwvNDODM4xRE2uao387qfvXZBUkB0PpRD+7fWPoN58gpFUm407Eba3WwX5PCD+1DD+RVBsG8maIDXerQ7lvFLoSuyMswv1TfkvCj0ZFhSFbfTd2ZysCu6eryFfeixR7NY9SNcp9YTqG6LrxGA7Ci6wz+hycFHXlDrlBgfFJDe5At clark@work
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3KnRBTH5QPpKjf4RWu4akzYt2gwp796cMkFl5vu8e7G/cHuh4979FeNJXMVP6F3rvZB+yXDHLCU5LBVLq0K+1GbAZT/hH38hpMOIvniwKIquvI6C/drkVPHO6YmVlapw/NI530PGnT/TAqCOycHBO5eF1bYsaqV1yZqvs9v7UZc6J4LukoLZwpmyWZ5P3ltAiiy8+FGq3SLCKWDMmv/Bjz4zTsaNbSWThJi0BydINjC1/0ze5Tyc/XgW1sDuxmmXJxgQp4EvLpronqb2hT60iA52kj8lrmoCIryRpgnbaRA7BrxKF8zIr0ZALHijxEUeWHhFJDIVRGUf0Ef0nrmBv fungi-openstack-2015
|
||||
|
||||
ssh-rsa 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 jhesketh@infra
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSR2NmJC8PSanHUpKJuaMmohG80COO2IPkE3Mxhr7US8P1B3p1c6lOrT6M1txRzBY8FlbxfOinGtutP+ADCB2taXfpO8UiaG9eOqojAT/PeP2Y2ov72rVMSWupLozUv2uAR5yyFVFHOjKPYGAa01aJtfzfJujSak8dM0ifFeFwgp/8RBGEfC7atq+45TdrfAURRcEgcOLiF5Aq6fprCOwpllnrH6VoId9YS7u/5xF2/zBjr9PuOP7jEgCaL/+FNqu7jgj87aG5jiZPlweb7GTLJON9H6eFpyfpoJE0sZ1yR9Q+e9FAqQIA44Zi748qKBlFKbLxzoC4mc0SbNUAleEL yolanda@infra
|
||||
|
||||
ssh-rsa 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 rcarrillocruz@infra
|
||||
|
||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILOjz+dkwRWTJcW9Gt3iGHSzRBsvVlTAK6G2oH3+0D41 iwienand+osinfra@redhat.com
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtNtbgLw0dyRVnuwZz4oUcWTzEUtpO2V47t4ykijdH1hkEe7qkuusM5bD8pC4L3wDZP5U3lsIAvZ97LCQp+MNJz1j8cjXuAboqP5FC3TtCJR1WtCWmOBSO7sIvcsgwse/9KZN/TETOGA9no1oKS43Adi9bXrRFAKDAAM34IVt/UHNS51vxUhuGv+56yJmaki7CjxrGtXcB4hi+TCQAfKJPzhAMwcFQUyvXJkRei6NN6uYyHnVtLR3KXEkeTesZ2GQxmQ+1jmCMN1zUN2VLypmDqAvlKtuQW+3nY89q4HDwzCpuC1rscJgOuncdMahTMoKA3/dQtT4WuJIwLQa3tEEn shrews2018
|
||||
|
||||
ssh-rsa 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 pabelanger@redhat.com
|
||||
|
||||
ssh-rsa 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 dmsimard@hostname
|
||||
|
||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGmc5fbzMptjAb5D86zSH13ZYCbf3QuV1jk9hL0r1qHw frickler@os-infra-2017
|
||||
|
||||
- name: bridge-root-2014-09-15
|
||||
public_key: |
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSLlN41ftgxkNeUi/kATYPwMPjJdMaSbgokSb9PSkRPZE7GeNai60BCfhu+ky8h5eMe70Bpwb7mQ7GAtHGXPNU1SRBPhMuVN9EYrQbt5KSiwuiTXtQHsWyYrSKtB+XGbl2PhpMQ/TPVtFoL5usxu/MYaakVkCEbt5IbPYNg88/NKPixicJuhi0qsd+l1X1zoc1+Fn87PlwMoIgfLIktwaL8hw9mzqr+pPcDIjCFQQWnjqJVEObOcMstBT20XwKj/ymiH+6p123nnlIHilACJzXhmIZIZO+EGkNF7KyXpcBSfv9efPI+VCE2TOv/scJFdEHtDFkl2kdUBYPC0wQ92rp puppet-remote-2014-09-15
|
||||
|
||||
- name: openstackci-flavors
|
||||
flavors:
|
||||
- name: nodepool
|
||||
ram: 8192
|
||||
vcpus: 8
|
||||
disk: 80
|
||||
- name: mirror
|
||||
ram: 8192
|
||||
vcpus: 4
|
||||
disk: 250
|
||||
|
||||
- name: admin-roles
|
||||
roles:
|
||||
- name: Member
|
||||
|
||||
- name: openstackci-user-roles
|
||||
user_roles:
|
||||
- role: Member
|
||||
user: openstackci
|
||||
project: openstackci
|
||||
|
||||
- name: openstackzuul-user-roles
|
||||
user_roles:
|
||||
- role: Member
|
||||
user: openstackzuul
|
||||
project: openstackzuul
|
||||
|
||||
- name: openstackci-networking
|
||||
networks:
|
||||
- name: openstackci-network1
|
||||
subnets:
|
||||
- name: openstackci-subnet1
|
||||
network_name: openstackci-network1
|
||||
cidr: '10.0.1.0/24'
|
||||
|
||||
- name: openstackzuul-networking
|
||||
networks:
|
||||
- name: openstackzuul-network1
|
||||
subnets:
|
||||
- name: openstackzuul-subnet1
|
||||
network_name: openstackzuul-network1
|
||||
cidr: '10.0.1.0/24'
|
||||
|
||||
clouds:
|
||||
# ovh
|
||||
- name: openstackci-ovh-bhs1
|
||||
oscc_cloud: openstackci-ovh
|
||||
region_name: BHS1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackjenkins-ovh-bhs1
|
||||
oscc_cloud: openstackjenkins-ovh
|
||||
region_name: BHS1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackci-ovh-gra1
|
||||
oscc_cloud: openstackci-ovh
|
||||
region_name: GRA1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackjenkins-ovh-gra1
|
||||
oscc_cloud: openstackjenkins-ovh
|
||||
region_name: GRA1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
# inap
|
||||
- name: openstackci-inap-mtl01
|
||||
oscc_cloud: openstackci-inap
|
||||
region_name: mtl01
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackjenkins-inap-mtl01
|
||||
oscc_cloud: openstackjenkins-inap
|
||||
region_name: mtl01
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
# vexxhost
|
||||
- name: openstackci-vexxhost-mtl1
|
||||
oscc_cloud: openstackci-vexxhost
|
||||
region_name: ca-ymq-1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackjenkins-vexxhost-mtl1
|
||||
oscc_cloud: openstackjenkins-vexxhost
|
||||
region_name: ca-ymq-1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackci-vexxhost-sjc1
|
||||
oscc_cloud: openstackci-vexxhost
|
||||
region_name: sjc1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackjenkins-vexxhost-sjc1
|
||||
oscc_cloud: openstackjenkins-vexxhost
|
||||
region_name: sjc1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
# rackspace
|
||||
- name: openstackci-rax-dfw
|
||||
oscc_cloud: openstackci-rax
|
||||
region_name: DFW
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- name: openstackjenkins-rax-dfw
|
||||
oscc_cloud: openstackjenkins-rax
|
||||
region_name: DFW
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- name: openstackci-rax-ord
|
||||
oscc_cloud: openstackci-rax
|
||||
region_name: ORD
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- name: openstackjenkins-rax-ord
|
||||
oscc_cloud: openstackjenkins-rax
|
||||
region_name: ORD
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- name: openstackci-rax-iad
|
||||
oscc_cloud: openstackci-rax
|
||||
region_name: IAD
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- name: openstackjenkins-rax-iad
|
||||
oscc_cloud: openstackjenkins-rax
|
||||
region_name: IAD
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
|
||||
# Citycloud
|
||||
- name: openstackci-citycloud-Lon1
|
||||
oscc_cloud: openstackci-citycloud
|
||||
region_name: Lon1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackci-networking
|
||||
routers:
|
||||
- name: openstackci-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackci-subnet1
|
||||
- name: openstackzuul-citycloud-Lon1
|
||||
oscc_cloud: openstackzuul-citycloud
|
||||
region_name: Lon1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackzuul-networking
|
||||
routers:
|
||||
- name: openstackzuul-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackzuul-subnet1
|
||||
- name: openstackci-citycloud-Kna1
|
||||
oscc_cloud: openstackci-citycloud
|
||||
region_name: Kna1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackci-networking
|
||||
routers:
|
||||
- name: openstackci-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackci-subnet1
|
||||
- name: openstackzuul-citycloud-Kna1
|
||||
oscc_cloud: openstackzuul-citycloud
|
||||
region_name: Kna1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackzuul-networking
|
||||
routers:
|
||||
- name: openstackzuul-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackzuul-subnet1
|
||||
- name: openstackci-citycloud-Sto2
|
||||
oscc_cloud: openstackci-citycloud
|
||||
region_name: Sto2
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackci-networking
|
||||
routers:
|
||||
- name: openstackci-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackci-subnet1
|
||||
- name: openstackzuul-citycloud-Sto2
|
||||
oscc_cloud: openstackzuul-citycloud
|
||||
region_name: Sto2
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackzuul-networking
|
||||
routers:
|
||||
- name: openstackzuul-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackzuul-subnet1
|
||||
|
||||
# Linaro
|
||||
- name: openstackci-linaro-london
|
||||
oscc_cloud: openstackci-linaro-london
|
||||
region_name: London
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
images:
|
||||
- name: ubuntu-xenial
|
||||
download_image_url: https://cloud-images.ubuntu.com/releases/16.04/release/ubuntu-16.04-server-cloudimg-arm64-uefi1.img
|
||||
download_image_dest: /tmp/ubuntu-xenial-aarch64-uefi.img
|
||||
filename: /tmp/ubuntu-xenial-aarch64-uefi.img
|
||||
properties:
|
||||
hw_firmware_type: uefi
|
||||
os_command_line: console=ttyAMA0
|
||||
hw_disk_bus: scsi
|
||||
hw_scsi_model: virtio-scsi
|
||||
- name: openstackzuul-linaro-london
|
||||
oscc_cloud: openstackzuul-linaro-london
|
||||
region_name: London
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
- name: openstackci-linaro-us
|
||||
oscc_cloud: openstackci-linaro-us
|
||||
region_name: RegionOne
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
- name: openstackzuul-linaro-us
|
||||
oscc_cloud: openstackzuul-linaro-us
|
||||
region_name: RegionOne
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
# Limestone
|
||||
- name: openstackci-limestone
|
||||
oscc_cloud: openstackci-limestone
|
||||
region_name: RegionOne
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackzuul-limestone
|
||||
oscc_cloud: openstackzuul-limestone
|
||||
region_name: RegionOne
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
# Open Edge
|
||||
- name: openstackci-openedge
|
||||
oscc_cloud: openstackci-openedge
|
||||
region_name: us-east
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackzuul-openedge
|
||||
oscc_cloud: openstackzuul-openedge
|
||||
region_name: us-east
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
- name: opendevci-airship-kna1
|
||||
oscc_cloud: opendevci-airship
|
||||
region_name: Kna1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackci-networking
|
||||
routers:
|
||||
- name: openstackci-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackci-subnet1
|
||||
- name: opendevzuul-airship-kna1
|
||||
oscc_cloud: opendevzuul-airship
|
||||
region_name: Kna1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackci-networking
|
||||
routers:
|
||||
- name: openstackci-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackci-subnet1
|
@ -2,3 +2,404 @@ bastion_key_exclusive: false
|
||||
kube_config_template: clouds/bridge_kube_config.yaml.j2
|
||||
extra_users:
|
||||
- zuul
|
||||
cloud_launcher_profiles:
|
||||
# Profile to launch AFS server for nodepool.
|
||||
- name: openstackci-projects
|
||||
projects:
|
||||
- name: openstackci
|
||||
description: OpenStack CI project
|
||||
domain: default
|
||||
- name: openstackzuul
|
||||
description: OpenStack zuul project
|
||||
domain: default
|
||||
|
||||
- name: openstackci-security
|
||||
security_groups:
|
||||
- name: default
|
||||
description: Default security group
|
||||
security_groups_rules:
|
||||
- security_group: default
|
||||
ethertype: IPv4
|
||||
remote_group: default
|
||||
state: absent
|
||||
- security_group: default
|
||||
ethertype: IPv6
|
||||
remote_group: default
|
||||
state: absent
|
||||
- security_group: default
|
||||
ethertype: IPv4
|
||||
remote_ip_prefix: 0.0.0.0/0
|
||||
- security_group: default
|
||||
ethertype: IPv6
|
||||
remote_ip_prefix: ::/0
|
||||
|
||||
- name: openstackci-keypairs
|
||||
keypairs:
|
||||
- name: infra-root-keys
|
||||
public_key: |
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLsTZJ8hXTmzjKxYh/7V07mIy8xl2HL+9BaUlt6A6TMsL3LSvaVQNSgmXX5g0XfPWSCKmkZb1O28q49jQI2n7n7+sHkxn0dJDxj1N2oNrzNY7pDuPrdtCijczLFdievygXNhXNkQ2WIqHXDquN/jfLLJ9L0jxtxtsUMbiL2xxZEZcaf/K5MqyPhscpqiVNE1MjE4xgPbIbv8gCKtPpYIIrktOMb4JbV7rhOp5DcSP5gXtLhOF5fbBpZ+szqrTVUcBX0oTYr3iRfOje9WPsTZIk9vBfBtF416mCNxMSRc7KhSW727AnUu85hS0xiP0MRAf69KemG1OE1pW+LtDIAEYp mordred@camelot
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvKYcWK1T7e3PKSFiqb03EYktnoxVASpPoq2rJw2JvhsP0JfS+lKrPzpUQv7L4JCuQMsPNtZ8LnwVEft39k58Kh8XMebSfaqPYAZS5zCNvQUQIhP9myOevBZf4CDeG+gmssqRFcWEwIllfDuIzKBQGVbomR+Y5QuW0HczIbkoOYI6iyf2jB6xg+bmzR2HViofNrSa62CYmHS6dO04Z95J27w6jGWpEOTBjEQvnb9sdBc4EzaBVmxCpa2EilB1u0th7/DvuH0yP4T+X8G8UjW1gZCTOVw06fqlBCST4KjdWw1F/AuOCT7048klbf4H+mCTaEcPzzu3Fkv8ckMWtS/Z9Q== jeblair@operational-necessity
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnfoVhOTkrY7uoebL8PoHXb0Fg4jJqGCbwkxUdNUdheIdbnfyjuRG3iL8WZnzf7nzWnD+IGo6kkAo8BkNMK9L0P0Y+5IjI8NH49KU22tQ1umij4EIf5tzLh4gsqkJmy6QLrlbf10m6UF4rLFQhKzOd4b2H2K6KbP00CIymvbW3BwvNDODM4xRE2uao387qfvXZBUkB0PpRD+7fWPoN58gpFUm407Eba3WwX5PCD+1DD+RVBsG8maIDXerQ7lvFLoSuyMswv1TfkvCj0ZFhSFbfTd2ZysCu6eryFfeixR7NY9SNcp9YTqG6LrxGA7Ci6wz+hycFHXlDrlBgfFJDe5At clark@work
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3KnRBTH5QPpKjf4RWu4akzYt2gwp796cMkFl5vu8e7G/cHuh4979FeNJXMVP6F3rvZB+yXDHLCU5LBVLq0K+1GbAZT/hH38hpMOIvniwKIquvI6C/drkVPHO6YmVlapw/NI530PGnT/TAqCOycHBO5eF1bYsaqV1yZqvs9v7UZc6J4LukoLZwpmyWZ5P3ltAiiy8+FGq3SLCKWDMmv/Bjz4zTsaNbSWThJi0BydINjC1/0ze5Tyc/XgW1sDuxmmXJxgQp4EvLpronqb2hT60iA52kj8lrmoCIryRpgnbaRA7BrxKF8zIr0ZALHijxEUeWHhFJDIVRGUf0Ef0nrmBv fungi-openstack-2015
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHGuIVB/WxBd7k1R8x2FyfqT6KxRnoM7lE5RE8gvBk2r8cQeH5k1c+P5JrBvWpmqXv4satoivYOBiIb7JXEgIxx62YUx/JQ0J7k3w+av6h4iFe2OhOtEOjMF5F8/wO8a/95OeTZPzBZlUfA3hx754kuw3Q/aBKQUOHWxJOIedGyVHeJc7XiFj3RXIufFuUfng9+p4Z3q6d2/WpuKqs00WI0CLF17PkU4i8P9CraJR1dmsWW6zoxMT2G+DwMFI7ZMS3xrVBRuLwrLlbylVLW2kOJ0JeyjHnRh7X1kR7KG3cGOOjA1YQ0e+mXvremcO3/3o6Iop/N1AtqVuYCKlZc7Y9 slukjanov@mirantis.com
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDL9x1rhTVOEQEanrN+ecycaDtAbbh3kr41Rxx7galtLq0JwftjsZqv2Vwl9c8ARmm8HiHcLwDoaZB9gvs6teMScCB+5a1fcohiycJBl2olNFRzkGapDaTvl74aLXQBWaV84D8tUavEl26zcgwrv9WLUsy9pnHoo5K0BzbK7vT2g3VictCphveC2vdjCDeptocWvt4zxCmAY6O7QMKeUjKMlvuy+zCohJcR4BbDnw8EriFAmCeQZcAgfLTyeAvjo384NNIFWyhCwvbCLvpgTplMCp896DWLlXu9eaGUCNjT/sZM8zafAXbfc6OKYFQ5iANAiJktWwKaUaphJkbSVWT5 elizabeth@r2d2
|
||||
|
||||
ssh-rsa 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 jhesketh@infra
|
||||
|
||||
ssh-rsa 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 nibz@hertz
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSR2NmJC8PSanHUpKJuaMmohG80COO2IPkE3Mxhr7US8P1B3p1c6lOrT6M1txRzBY8FlbxfOinGtutP+ADCB2taXfpO8UiaG9eOqojAT/PeP2Y2ov72rVMSWupLozUv2uAR5yyFVFHOjKPYGAa01aJtfzfJujSak8dM0ifFeFwgp/8RBGEfC7atq+45TdrfAURRcEgcOLiF5Aq6fprCOwpllnrH6VoId9YS7u/5xF2/zBjr9PuOP7jEgCaL/+FNqu7jgj87aG5jiZPlweb7GTLJON9H6eFpyfpoJE0sZ1yR9Q+e9FAqQIA44Zi748qKBlFKbLxzoC4mc0SbNUAleEL yolanda@infra
|
||||
|
||||
ssh-rsa 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 rcarrillocruz@infra
|
||||
|
||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILOjz+dkwRWTJcW9Gt3iGHSzRBsvVlTAK6G2oH3+0D41 iwienand+osinfra@redhat.com
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCdzEzB2KpNLTTFJGLCNMY53sja37PXFzHHdjWEGaZtaTcuCn/ufV9ql5yhS5/414u9swoHM71H00+nT4uSWcXc2tTRXYWslaiwU47DOtQsD//CvGgIFBNO1EinWhYa5uTSfxI+Z/x4PBu7XFq5wi/JCfJ+iHIWsvXn8U44r1csURcZU0GMPAVG1MO+s3p1W7daVqF9RR7UuwCECb3hdPN1N/M4s6myBiuRXCeDND98dKLf8b342hw+pWvQ3g/OCLcVlYPWT4fy1YGQT8hT+jA2XPfwCtu/k7HKAGH3E8UcnBtY/RI9ibciIFe+Ro7q8t+tp5SgjGLq1NnE4Yp5rpsh david@koala
|
||||
|
||||
ssh-rsa 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 pabelanger@redhat.com
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDDyXfFj44OTsJZnHbecbYrwA8zXuMiULb+o326maOh3wh5/6fk+MzivkUzJC2uZqAlKvBnNXsrb/07eV1gRjaIQBQJxaV9HQUwMNX7AkjkDzaMXVDjG/JOium90R23gVGMukzp9IamezUscAqAxVK+2C10k3tq8dZ/GeZfHl3NFGRHlIAXsJ/SIQoxJAEA0IQ/8Y50nR1Hp2mV2xsfxH9oZhLR/eiFdhJpNupdfw/oE9+vpCHS8SG88KGeLYbn+EhH6LSCD+6WNthF6oE7NANnScqn1Fl0ZpSd3RlRb+kDVKGqNxfB7EJTeimYvqaYmrTiTZTaTJua5Bj5yBTudqnBgdHCz3xMb2Nv2s2INNcJmP/CKpivYQ8AJs6cVlqRWnLJiNQQYCj+xAXBvY5T0Xq/qOhVifLiWZvZQOTHFWqFP9asZkrGa1mFWIaR9VPQY0FoYlUOT9t6J6TRbzktJIuP5AiOVoJLL6wjZuUMjghHfkYbqtyBqE4BbCY8YF3JSf8jx+9eWy+sD+dRwKXBCrGV0dNidioZR7ZJpBb6ye8wElebjPZizKhppsNpwtRxPfiAM52f55lXGD7IDpz9CZrOKUcV2uc3Rhl50u7T3psZfX7GysZvlnAH+Yr+UM+LPBAabXAfKlMnJp+SskLuOplTeQrvAwMluBmFnla8TnwnxQ== dmsimard@hostname
|
||||
|
||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGmc5fbzMptjAb5D86zSH13ZYCbf3QuV1jk9hL0r1qHw frickler@os-infra-2017
|
||||
|
||||
- name: infra-root-keys-2018-06-15
|
||||
public_key: |
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDLsTZJ8hXTmzjKxYh/7V07mIy8xl2HL+9BaUlt6A6TMsL3LSvaVQNSgmXX5g0XfPWSCKmkZb1O28q49jQI2n7n7+sHkxn0dJDxj1N2oNrzNY7pDuPrdtCijczLFdievygXNhXNkQ2WIqHXDquN/jfLLJ9L0jxtxtsUMbiL2xxZEZcaf/K5MqyPhscpqiVNE1MjE4xgPbIbv8gCKtPpYIIrktOMb4JbV7rhOp5DcSP5gXtLhOF5fbBpZ+szqrTVUcBX0oTYr3iRfOje9WPsTZIk9vBfBtF416mCNxMSRc7KhSW727AnUu85hS0xiP0MRAf69KemG1OE1pW+LtDIAEYp mordred@camelot
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvKYcWK1T7e3PKSFiqb03EYktnoxVASpPoq2rJw2JvhsP0JfS+lKrPzpUQv7L4JCuQMsPNtZ8LnwVEft39k58Kh8XMebSfaqPYAZS5zCNvQUQIhP9myOevBZf4CDeG+gmssqRFcWEwIllfDuIzKBQGVbomR+Y5QuW0HczIbkoOYI6iyf2jB6xg+bmzR2HViofNrSa62CYmHS6dO04Z95J27w6jGWpEOTBjEQvnb9sdBc4EzaBVmxCpa2EilB1u0th7/DvuH0yP4T+X8G8UjW1gZCTOVw06fqlBCST4KjdWw1F/AuOCT7048klbf4H+mCTaEcPzzu3Fkv8ckMWtS/Z9Q== jeblair@operational-necessity
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnfoVhOTkrY7uoebL8PoHXb0Fg4jJqGCbwkxUdNUdheIdbnfyjuRG3iL8WZnzf7nzWnD+IGo6kkAo8BkNMK9L0P0Y+5IjI8NH49KU22tQ1umij4EIf5tzLh4gsqkJmy6QLrlbf10m6UF4rLFQhKzOd4b2H2K6KbP00CIymvbW3BwvNDODM4xRE2uao387qfvXZBUkB0PpRD+7fWPoN58gpFUm407Eba3WwX5PCD+1DD+RVBsG8maIDXerQ7lvFLoSuyMswv1TfkvCj0ZFhSFbfTd2ZysCu6eryFfeixR7NY9SNcp9YTqG6LrxGA7Ci6wz+hycFHXlDrlBgfFJDe5At clark@work
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3KnRBTH5QPpKjf4RWu4akzYt2gwp796cMkFl5vu8e7G/cHuh4979FeNJXMVP6F3rvZB+yXDHLCU5LBVLq0K+1GbAZT/hH38hpMOIvniwKIquvI6C/drkVPHO6YmVlapw/NI530PGnT/TAqCOycHBO5eF1bYsaqV1yZqvs9v7UZc6J4LukoLZwpmyWZ5P3ltAiiy8+FGq3SLCKWDMmv/Bjz4zTsaNbSWThJi0BydINjC1/0ze5Tyc/XgW1sDuxmmXJxgQp4EvLpronqb2hT60iA52kj8lrmoCIryRpgnbaRA7BrxKF8zIr0ZALHijxEUeWHhFJDIVRGUf0Ef0nrmBv fungi-openstack-2015
|
||||
|
||||
ssh-rsa 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 jhesketh@infra
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSR2NmJC8PSanHUpKJuaMmohG80COO2IPkE3Mxhr7US8P1B3p1c6lOrT6M1txRzBY8FlbxfOinGtutP+ADCB2taXfpO8UiaG9eOqojAT/PeP2Y2ov72rVMSWupLozUv2uAR5yyFVFHOjKPYGAa01aJtfzfJujSak8dM0ifFeFwgp/8RBGEfC7atq+45TdrfAURRcEgcOLiF5Aq6fprCOwpllnrH6VoId9YS7u/5xF2/zBjr9PuOP7jEgCaL/+FNqu7jgj87aG5jiZPlweb7GTLJON9H6eFpyfpoJE0sZ1yR9Q+e9FAqQIA44Zi748qKBlFKbLxzoC4mc0SbNUAleEL yolanda@infra
|
||||
|
||||
ssh-rsa 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 rcarrillocruz@infra
|
||||
|
||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILOjz+dkwRWTJcW9Gt3iGHSzRBsvVlTAK6G2oH3+0D41 iwienand+osinfra@redhat.com
|
||||
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtNtbgLw0dyRVnuwZz4oUcWTzEUtpO2V47t4ykijdH1hkEe7qkuusM5bD8pC4L3wDZP5U3lsIAvZ97LCQp+MNJz1j8cjXuAboqP5FC3TtCJR1WtCWmOBSO7sIvcsgwse/9KZN/TETOGA9no1oKS43Adi9bXrRFAKDAAM34IVt/UHNS51vxUhuGv+56yJmaki7CjxrGtXcB4hi+TCQAfKJPzhAMwcFQUyvXJkRei6NN6uYyHnVtLR3KXEkeTesZ2GQxmQ+1jmCMN1zUN2VLypmDqAvlKtuQW+3nY89q4HDwzCpuC1rscJgOuncdMahTMoKA3/dQtT4WuJIwLQa3tEEn shrews2018
|
||||
|
||||
ssh-rsa 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 pabelanger@redhat.com
|
||||
|
||||
ssh-rsa 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 dmsimard@hostname
|
||||
|
||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGmc5fbzMptjAb5D86zSH13ZYCbf3QuV1jk9hL0r1qHw frickler@os-infra-2017
|
||||
|
||||
- name: bridge-root-2014-09-15
|
||||
public_key: |
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDSLlN41ftgxkNeUi/kATYPwMPjJdMaSbgokSb9PSkRPZE7GeNai60BCfhu+ky8h5eMe70Bpwb7mQ7GAtHGXPNU1SRBPhMuVN9EYrQbt5KSiwuiTXtQHsWyYrSKtB+XGbl2PhpMQ/TPVtFoL5usxu/MYaakVkCEbt5IbPYNg88/NKPixicJuhi0qsd+l1X1zoc1+Fn87PlwMoIgfLIktwaL8hw9mzqr+pPcDIjCFQQWnjqJVEObOcMstBT20XwKj/ymiH+6p123nnlIHilACJzXhmIZIZO+EGkNF7KyXpcBSfv9efPI+VCE2TOv/scJFdEHtDFkl2kdUBYPC0wQ92rp puppet-remote-2014-09-15
|
||||
|
||||
- name: openstackci-flavors
|
||||
flavors:
|
||||
- name: nodepool
|
||||
ram: 8192
|
||||
vcpus: 8
|
||||
disk: 80
|
||||
- name: mirror
|
||||
ram: 8192
|
||||
vcpus: 4
|
||||
disk: 250
|
||||
|
||||
- name: admin-roles
|
||||
roles:
|
||||
- name: Member
|
||||
|
||||
- name: openstackci-user-roles
|
||||
user_roles:
|
||||
- role: Member
|
||||
user: openstackci
|
||||
project: openstackci
|
||||
|
||||
- name: openstackzuul-user-roles
|
||||
user_roles:
|
||||
- role: Member
|
||||
user: openstackzuul
|
||||
project: openstackzuul
|
||||
|
||||
- name: openstackci-networking
|
||||
networks:
|
||||
- name: openstackci-network1
|
||||
subnets:
|
||||
- name: openstackci-subnet1
|
||||
network_name: openstackci-network1
|
||||
cidr: '10.0.1.0/24'
|
||||
|
||||
- name: openstackzuul-networking
|
||||
networks:
|
||||
- name: openstackzuul-network1
|
||||
subnets:
|
||||
- name: openstackzuul-subnet1
|
||||
network_name: openstackzuul-network1
|
||||
cidr: '10.0.1.0/24'
|
||||
|
||||
cloud_launcher_clouds:
|
||||
# ovh
|
||||
- name: openstackci-ovh-bhs1
|
||||
oscc_cloud: openstackci-ovh
|
||||
region_name: BHS1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackjenkins-ovh-bhs1
|
||||
oscc_cloud: openstackjenkins-ovh
|
||||
region_name: BHS1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackci-ovh-gra1
|
||||
oscc_cloud: openstackci-ovh
|
||||
region_name: GRA1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackjenkins-ovh-gra1
|
||||
oscc_cloud: openstackjenkins-ovh
|
||||
region_name: GRA1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
# inap
|
||||
- name: openstackci-inap-mtl01
|
||||
oscc_cloud: openstackci-inap
|
||||
region_name: mtl01
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackjenkins-inap-mtl01
|
||||
oscc_cloud: openstackjenkins-inap
|
||||
region_name: mtl01
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
# vexxhost
|
||||
- name: openstackci-vexxhost-mtl1
|
||||
oscc_cloud: openstackci-vexxhost
|
||||
region_name: ca-ymq-1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackjenkins-vexxhost-mtl1
|
||||
oscc_cloud: openstackjenkins-vexxhost
|
||||
region_name: ca-ymq-1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackci-vexxhost-sjc1
|
||||
oscc_cloud: openstackci-vexxhost
|
||||
region_name: sjc1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackjenkins-vexxhost-sjc1
|
||||
oscc_cloud: openstackjenkins-vexxhost
|
||||
region_name: sjc1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
# rackspace
|
||||
- name: openstackci-rax-dfw
|
||||
oscc_cloud: openstackci-rax
|
||||
region_name: DFW
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- name: openstackjenkins-rax-dfw
|
||||
oscc_cloud: openstackjenkins-rax
|
||||
region_name: DFW
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- name: openstackci-rax-ord
|
||||
oscc_cloud: openstackci-rax
|
||||
region_name: ORD
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- name: openstackjenkins-rax-ord
|
||||
oscc_cloud: openstackjenkins-rax
|
||||
region_name: ORD
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- name: openstackci-rax-iad
|
||||
oscc_cloud: openstackci-rax
|
||||
region_name: IAD
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- name: openstackjenkins-rax-iad
|
||||
oscc_cloud: openstackjenkins-rax
|
||||
region_name: IAD
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
|
||||
# Citycloud
|
||||
- name: openstackci-citycloud-Lon1
|
||||
oscc_cloud: openstackci-citycloud
|
||||
region_name: Lon1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackci-networking
|
||||
routers:
|
||||
- name: openstackci-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackci-subnet1
|
||||
- name: openstackzuul-citycloud-Lon1
|
||||
oscc_cloud: openstackzuul-citycloud
|
||||
region_name: Lon1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackzuul-networking
|
||||
routers:
|
||||
- name: openstackzuul-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackzuul-subnet1
|
||||
- name: openstackci-citycloud-Kna1
|
||||
oscc_cloud: openstackci-citycloud
|
||||
region_name: Kna1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackci-networking
|
||||
routers:
|
||||
- name: openstackci-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackci-subnet1
|
||||
- name: openstackzuul-citycloud-Kna1
|
||||
oscc_cloud: openstackzuul-citycloud
|
||||
region_name: Kna1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackzuul-networking
|
||||
routers:
|
||||
- name: openstackzuul-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackzuul-subnet1
|
||||
- name: openstackci-citycloud-Sto2
|
||||
oscc_cloud: openstackci-citycloud
|
||||
region_name: Sto2
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackci-networking
|
||||
routers:
|
||||
- name: openstackci-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackci-subnet1
|
||||
- name: openstackzuul-citycloud-Sto2
|
||||
oscc_cloud: openstackzuul-citycloud
|
||||
region_name: Sto2
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackzuul-networking
|
||||
routers:
|
||||
- name: openstackzuul-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackzuul-subnet1
|
||||
|
||||
# Linaro
|
||||
- name: openstackci-linaro-london
|
||||
oscc_cloud: openstackci-linaro-london
|
||||
region_name: London
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
images:
|
||||
- name: ubuntu-xenial
|
||||
download_image_url: https://cloud-images.ubuntu.com/releases/16.04/release/ubuntu-16.04-server-cloudimg-arm64-uefi1.img
|
||||
download_image_dest: /tmp/ubuntu-xenial-aarch64-uefi.img
|
||||
filename: /tmp/ubuntu-xenial-aarch64-uefi.img
|
||||
properties:
|
||||
hw_firmware_type: uefi
|
||||
os_command_line: console=ttyAMA0
|
||||
hw_disk_bus: scsi
|
||||
hw_scsi_model: virtio-scsi
|
||||
- name: openstackzuul-linaro-london
|
||||
oscc_cloud: openstackzuul-linaro-london
|
||||
region_name: London
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
- name: openstackci-linaro-us
|
||||
oscc_cloud: openstackci-linaro-us
|
||||
region_name: RegionOne
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
- name: openstackzuul-linaro-us
|
||||
oscc_cloud: openstackzuul-linaro-us
|
||||
region_name: RegionOne
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
# Limestone
|
||||
- name: openstackci-limestone
|
||||
oscc_cloud: openstackci-limestone
|
||||
region_name: RegionOne
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackzuul-limestone
|
||||
oscc_cloud: openstackzuul-limestone
|
||||
region_name: RegionOne
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
# Open Edge
|
||||
- name: openstackci-openedge
|
||||
oscc_cloud: openstackci-openedge
|
||||
region_name: us-east
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- name: openstackzuul-openedge
|
||||
oscc_cloud: openstackzuul-openedge
|
||||
region_name: us-east
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
|
||||
- name: opendevci-airship-kna1
|
||||
oscc_cloud: opendevci-airship
|
||||
region_name: Kna1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackci-networking
|
||||
routers:
|
||||
- name: openstackci-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackci-subnet1
|
||||
- name: opendevzuul-airship-kna1
|
||||
oscc_cloud: opendevzuul-airship
|
||||
region_name: Kna1
|
||||
profiles:
|
||||
- openstackci-keypairs
|
||||
- openstackci-security
|
||||
- openstackci-networking
|
||||
routers:
|
||||
- name: openstackci-router1
|
||||
network: ext-net
|
||||
interfaces:
|
||||
- openstackci-subnet1
|
||||
|
@ -1,33 +0,0 @@
|
||||
Setup periodic runs of ``run_cloud_launcher.sh``, which runs the cloud setup
|
||||
playbook against our clouds.
|
||||
|
||||
Note that this runs in an independent cron beacuse we don't need to run it
|
||||
as frequently as our normal ansible runs and this ansible process needs
|
||||
access to the all-clouds.yaml file which we don't run the normal ansible runs
|
||||
with.
|
||||
|
||||
**Role Variables**
|
||||
|
||||
.. zuul:rolevar:: cloud_launcher_cron_interval
|
||||
|
||||
.. zuul:rolevar:: minute
|
||||
:default: 0
|
||||
|
||||
.. zuul:rolevar:: hour
|
||||
:default: */1
|
||||
|
||||
.. zuul:rolevar:: day
|
||||
:default: *
|
||||
|
||||
.. zuul:rolevar:: month
|
||||
:default: *
|
||||
|
||||
.. zuul:rolevar:: weekday
|
||||
:default: *
|
||||
|
||||
.. zuul:rolevar:: cloud_launcher_disable_job
|
||||
:default: false
|
||||
|
||||
Prevent installation of cron job. This is only useful for CI
|
||||
jobs testing bridge.o.o so that the test host does not randomly
|
||||
run the script during CI tests that fall during the interval.
|
@ -1,7 +0,0 @@
|
||||
cloud_launcher_cron_interval:
|
||||
minute: '0'
|
||||
hour: '*/1'
|
||||
day: '*'
|
||||
month: '*'
|
||||
weekday: '*'
|
||||
cloud_launcher_disable_job: false
|
@ -1,22 +0,0 @@
|
||||
- name: Ensure directory exists for lock files
|
||||
file:
|
||||
state: directory
|
||||
path: /var/run/ansible
|
||||
|
||||
- name: Set up cron job for running run_cloud_launcher.sh
|
||||
cron:
|
||||
name: run_cloud_launcher.sh
|
||||
state: present
|
||||
disabled: "{{ cloud_launcher_disable_job }}"
|
||||
job: '/usr/bin/flock -n /var/run/ansible/run_cloud_launcher.lock /bin/bash /home/zuul/src/opendev.org/opendev/system-config/run_cloud_launcher.sh -c >> /var/log/ansible/run_cloud_launcher_cron.log 2>&1'
|
||||
minute: "{{ cloud_launcher_cron_interval.minute }}"
|
||||
hour: "{{ cloud_launcher_cron_interval.hour }}"
|
||||
day: "{{ cloud_launcher_cron_interval.day }}"
|
||||
month: "{{ cloud_launcher_cron_interval.month }}"
|
||||
weekday: "{{ cloud_launcher_cron_interval.weekday }}"
|
||||
|
||||
- name: Setup log rotation
|
||||
include_role:
|
||||
name: logrotate
|
||||
vars:
|
||||
logrotate_file_name: /var/log/ansible/run_cloud_launcher_cron.log
|
@ -1,6 +1,7 @@
|
||||
- hosts: localhost
|
||||
- hosts: bridge.openstack.org:!disabled
|
||||
name: "Cloud-launcher: Run cloud launcher"
|
||||
connection: local
|
||||
gather_facts: false
|
||||
roles:
|
||||
- cloud-launcher
|
||||
- role: cloud-launcher
|
||||
profiles: '{{ cloud_launcher_profiles }}'
|
||||
clouds: '{{ cloud_launcher_clouds }}'
|
||||
|
@ -1,13 +1,16 @@
|
||||
- hosts: bridge.openstack.org:!disabled
|
||||
name: "Bridge: configure the bastion host"
|
||||
roles:
|
||||
- cloud-launcher-cron
|
||||
- edit-secrets-script
|
||||
- install-docker
|
||||
- install-osc-container
|
||||
- install-kubectl
|
||||
- configure-kubectl
|
||||
tasks:
|
||||
- name: Remove cloud launcher cron
|
||||
cron:
|
||||
name: run_cloud_launcher.sh
|
||||
state: absent
|
||||
- include_role:
|
||||
name: configure-openstacksdk
|
||||
vars:
|
||||
|
@ -1,61 +0,0 @@
|
||||
#!/bin/bash
|
||||
|
||||
# Copyright 2014 Hewlett-Packard Development Company, L.P.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
# If updating the puppet system-config repo or installing puppet modules
|
||||
# fails then abort the puppet run as we will not get the results we
|
||||
# expect.
|
||||
set -e
|
||||
export ANSIBLE_LOG_PATH=/var/log/puppet_run_cloud_launcher.log
|
||||
SYSTEM_CONFIG=/home/zuul/src/opendev.org/opendev/system-config
|
||||
ANSIBLE_PLAYBOOKS=$SYSTEM_CONFIG/playbooks
|
||||
|
||||
# It's possible for connectivity to a server or manifest application to break
|
||||
# for indeterminate periods of time, so the playbooks should be run without
|
||||
# errexit
|
||||
set +e
|
||||
|
||||
# We only send stats if running under cron
|
||||
UNDER_CRON=0
|
||||
|
||||
while getopts ":c" arg; do
|
||||
case $arg in
|
||||
c)
|
||||
UNDER_CRON=1
|
||||
;;
|
||||
esac
|
||||
done
|
||||
|
||||
_START_TIME=$(date '+%s')
|
||||
|
||||
echo "--- begin run @ $(date -Is) ---"
|
||||
|
||||
# Pass -i /dev/null to avoid the ansible-playbook run with all-clouds.yaml
|
||||
# being active messing with the normal inventory cache.
|
||||
/usr/bin/timeout -k 2m 120m /usr/local/bin/ansible-playbook -i /dev/null -f 1 \
|
||||
${ANSIBLE_PLAYBOOKS}/run_cloud_launcher.yaml \
|
||||
-e@${ANSIBLE_PLAYBOOKS}/clouds_layouts.yml
|
||||
|
||||
echo "--- end run @ $(date -Is) ---"
|
||||
|
||||
# Only send stats under cron conditions
|
||||
if [[ ${UNDER_CRON} != 1 ]]; then
|
||||
return
|
||||
fi
|
||||
|
||||
_CURRENT_TIME=$(date '+%s')
|
||||
_ELAPSED_MS=$(( (_CURRENT_TIME - _START_TIME) * 1000 ))
|
||||
echo "bridge.ansible.run_cloud_launcher:${_ELAPSED_MS}|ms" | \
|
||||
nc -w 1 -u graphite.opendev.org 8125
|
@ -40,12 +40,6 @@ def test_openstacksdk_config(host):
|
||||
assert f.mode == 0o640
|
||||
|
||||
|
||||
def test_cloud_launcher_cron(host):
|
||||
with host.sudo():
|
||||
crontab = host.check_output('crontab -l')
|
||||
assert 'run_cloud_launcher.sh' in crontab
|
||||
|
||||
|
||||
def test_root_authorized_keys(host):
|
||||
authorized_keys = host.file('/root/.ssh/authorized_keys')
|
||||
assert authorized_keys.exists
|
||||
|
Loading…
x
Reference in New Issue
Block a user