summaryrefslogtreecommitdiff
path: root/ironic
Commit message (Collapse)AuthorAgeFilesLines
* Enforce autospec in test_portRiccardo Pittau2021-03-041-23/+37
| | | | | | Remove filter from tox.ini Change-Id: Ic8990ac3cb2ddb6e243ce00918793fc96684fde0
* Enforce autospec in test_volume_connectorRiccardo Pittau2021-03-041-23/+33
| | | | | | Adjust unit tests and remove filter from tox.ini Change-Id: Ide7ac1a29f6e07842462d6e39fe797a309218884
* Enforce autospec in test_volume_targetRiccardo Pittau2021-03-031-23/+32
| | | | | | Adapt unit tests and remove filter from tox.ini Change-Id: I67fe1dd81ae7fe384c869e73d88182fcde402826
* Merge "secure-rbac - minor follow-up for project scoped tests"Zuul2021-03-021-4/+1
|\
| * secure-rbac - minor follow-up for project scoped testsJulia Kreger2021-03-011-4/+1
| | | | | | | | | | | | | | | | | | Just a couple quick items needed to be fixed that were identified in review of the original change. https://review.opendev.org/c/openstack/ironic/+/772451/11/ironic/tests/unit/api/test_rbac_project_scoped.yaml Change-Id: I01701c6908aebbb2e78527087a4f8f2f7a016e1b
* | Merge "Add support to manage certificates in iLO"Zuul2021-03-014-11/+416
|\ \
| * | Add support to manage certificates in iLOvmud2132021-02-104-11/+416
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Adds methods to export and clear certificates on the node during node provisioning. Also enables to implement clean/deploy steps for certificate management through these APIs. Change-Id: Idc86d7b78854e0618f62c7e4c1a88670dc4561b0 Story: #2008297 Task: #41182
* | | Merge "Initial Project scoped tests"Zuul2021-03-012-0/+2436
|\ \ \ | | |/ | |/|
| * | Initial Project scoped testsJulia Kreger2021-02-232-0/+2436
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This patch proposes initial tests to perform validations in relation to supporting project scope access in a deployment where system scope is also delineated. For now, these tests have been disabled with the exception of tests whose scopes are unexpected to see project scope support. * conductors * drivers * chassis * deploy_templates Change-Id: I29c2ea987464b5b210808d9ca806292b8ab2ddf4
* | | Merge "Switch iLO and iRMC to the new secure boot framework"Zuul2021-03-019-294/+145
|\ \ \
| * | | Switch iLO and iRMC to the new secure boot frameworkDmitry Tantsur2021-02-259-294/+145
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | No longer explicit handle secure boot in PXE/iPXE derivatives since it's now handled there. Change-Id: I13b1d53578285b7171bfadb53bb2a7f69e7b53e3 Story: #2008270 Task: #41567
* | | | Merge "[trivial] Remove default parameter from execute"Zuul2021-03-013-15/+6
|\ \ \ \
| * | | | [trivial] Remove default parameter from executeRiccardo Pittau2021-02-243-15/+6
| |/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The param check_exit_code from the processutils extension execute has default already at [0] See: https://opendev.org/openstack/oslo.concurrency/src/branch/master/oslo_concurrency/processutils.py#L214 Change-Id: Ife77ccc5e2aae696ffac14fa78f10125456f9b01
* | | | Merge "Add both IPv4 and IPv6 DHCP options if interface has both"Zuul2021-02-282-20/+80
|\ \ \ \
| * | | | Add both IPv4 and IPv6 DHCP options if interface has bothMohammed Naser2021-02-262-20/+80
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It is possible that an interface has both IPv4 and IPv6 addresses, primarily when using SLAAC with OpenStack Neutron. When this is the case, it is very likely that the first fixed IP would be a SLAAC assigned port and the second IP is the IPv4 address. In an environment where you are looking to boot via IPv4, no DHCPv6 infrastructure exists as IPv6 connectivity is provided via SLAAC, you would not be able to use this network to boot off of. This patch instead grabs all the fixed IP addresses, then inserts the options that match the IP versions which are attached to the interface, potentially resulting in both IPv4 and IPv6 options being included (though the IPv6 ones would be largely omitted). In environments where only IPv4 or IPv6 is in use on the port, it will still only insert the options for those specific IP versions. Story #2008660 Task #41933 Change-Id: I52e4ee022b17cb7f007534cb368136567b139a34
* | | | | Merge "Enforce autospec in test_driver"Zuul2021-02-271-26/+43
|\ \ \ \ \
| * | | | | Enforce autospec in test_driverRiccardo Pittau2021-02-231-26/+43
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | And remove filter from tox.ini Change-Id: I90efb9f309df46c9b0ef073e789e1f1aaa1b1a1c
* | | | | | Merge "Enforce autospec in test_notification_utils module"Zuul2021-02-271-3/+4
|\ \ \ \ \ \ | |/ / / / /
| * | | | | Enforce autospec in test_notification_utils moduleRiccardo Pittau2021-02-191-3/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | And remove tox.ini filter Change-Id: I29257c805ce0afb01ae9422671d71d225f4b2573
* | | | | | Merge "Enforce autospec in test_node"Zuul2021-02-271-272/+393
|\ \ \ \ \ \ | |/ / / / /
| * | | | | Enforce autospec in test_nodeRiccardo Pittau2021-02-191-272/+393
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | And remove filter from tox.ini Also sets noqa for 2 mocks to keep ignoring autospec. Change-Id: I0eadacf87baf68bc1c6547aac562f85edcad1aa3
* | | | | | Merge "[Trivial] Fix testing of volume connector exception"Zuul2021-02-271-1/+1
|\ \ \ \ \ \ | |_|/ / / / |/| | | | |
| * | | | | [Trivial] Fix testing of volume connector exceptionArne Wiebalck2021-02-261-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Restore test symmetry. Change-Id: I54a9fed73e366a30545c3cd1982588d2f544d228
* | | | | | Merge "RBAC System Scope: observer -> reader"Zuul2021-02-261-196/+195
|\ \ \ \ \ \ | | |_|_|/ / | |/| | | |
| * | | | | RBAC System Scope: observer -> readerJulia Kreger2021-02-231-196/+195
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | One of the default role names in the RBAC model with system and project scopes is reader. Reader replaces observer, and while this was not done earlier to the tests in system scope was because it is better to evolve the tests being able to run individual groups with the same name as opposed to different names. Change-Id: I57bab93adaf7e562c4c46febd612e1f27ea50bfa
* | | | | | Merge "Implement system scoped RBAC for the deploy templates APIs"Zuul2021-02-263-40/+87
|\ \ \ \ \ \ | |/ / / / /
| * | | | | Implement system scoped RBAC for the deploy templates APIsLance Bragstad2021-02-233-40/+87
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates the policies for baremetal deploy template policies to understand scope checking and account for a read-only role. This is part of a broader series of changes across OpenStack to provide a consistent RBAC experience and improve security. Change-Id: I1d1d1bdae0171c44e122018a8a83b35dbb093c39
* | | | | | Merge "Implement system scoped RBAC for the event APIs"Zuul2021-02-262-4/+46
|\ \ \ \ \ \ | |/ / / / / | | / / / / | |/ / / / |/| | | |
| * | | | Implement system scoped RBAC for the event APIsLance Bragstad2021-02-232-4/+46
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates the policies for baremetal event policies to understand scope checking and account for a read-only role. This is part of a broader series of changes across OpenStack to provide a consistent RBAC experience and improve security. Change-Id: I9543b0524f2e85eae0d4fd4331ea1ed9a66322d8
* | | | | Merge "[trivial] fix typos in conductor"Zuul2021-02-252-4/+4
|\ \ \ \ \
| * | | | | [trivial] fix typos in conductorRiccardo Pittau2021-02-232-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | Change-Id: Ib431c3507cb4bdbd9ba30b58e30b078e855e7754
* | | | | | Enable swift temporary URLs in grenade and provide a good error messageDmitry Tantsur2021-02-241-1/+6
| |_|_|/ / |/| | | | | | | | | | | | | | | | | | | | | | | | The fixed configdrive_use_object_store requires them. Change-Id: Ie7323ae107c7f801be010353c7c4f3b8a43c3a1a
* | | | | Merge "Fix broken configdrive_use_object_store"Zuul2021-02-232-8/+9
|\ \ \ \ \
| * | | | | Fix broken configdrive_use_object_storeDmitry Tantsur2021-02-182-8/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When it is set to True, we try to write text data to a binary file, which is not possible in Python 3. The issue has been "helpfully" hidden by the fact that we use bytes in unit tests, as well as by lack of CI coverage. Change-Id: Ibbf90dcbcb36a5f7cf084a44a221c0c5c003b95a
* | | | | | Merge "Implement system scoped RBAC for the allocation APIs"Zuul2021-02-233-58/+134
|\ \ \ \ \ \ | |_|/ / / / |/| | / / / | | |/ / / | |/| | |
| * | | | Implement system scoped RBAC for the allocation APIsLance Bragstad2021-02-223-58/+134
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates the policies for baremetal allocation policies to understand scope checking and account for a read-only role. This is part of a broader series of changes across OpenStack to provide a consistent RBAC experience and improve security. Change-Id: I1cb3a7e885710c19f20df63b83beaa787ffa3bc3
* | | | | Merge "Implement system scoped RBAC for conductor APIs"Zuul2021-02-233-15/+30
|\ \ \ \ \ | |/ / / /
| * | | | Implement system scoped RBAC for conductor APIsLance Bragstad2021-02-223-15/+30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates the policies for baremetal conductor policies to understand scope checking and account for a read-only role. This is part of a broader series of changes across OpenStack to provide a consistent RBAC experience and improve security. Change-Id: I331f46092405ffd399ad45ba4ccb6dc7639051e5
* | | | | Merge "Implement system scoped RBAC for volume APIs"Zuul2021-02-233-88/+141
|\ \ \ \ \ | |/ / / /
| * | | | Implement system scoped RBAC for volume APIsLance Bragstad2021-02-223-88/+141
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates the policies for baremetal volume policies to understand scope checking and account for a read-only role. This is part of a broader series of changes across OpenStack to provide a consistent RBAC experience and improve security. Change-Id: I361a6410f5825b2dc97b50586475a4fa8e0f0f1f
* | | | | Merge "Implement system scoped RBAC for utility APIs"Zuul2021-02-232-8/+63
|\ \ \ \ \ | |/ / / /
| * | | | Implement system scoped RBAC for utility APIsLance Bragstad2021-02-222-8/+63
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates the policies for baremetal utility policies to understand scope checking and account for a read-only role. This is part of a broader series of changes across OpenStack to provide a consistent RBAC experience and improve security. Also adds duplicate Heartbeat and Lookup test classes with the middleware scope enforcement enabled and enforced, to ensure that we do not adversely impact these special API endpoints. Change-Id: I89176b3adf1489e12493c62b908bf135c912e017
* | | | | Merge "Implement system scoped RBAC for node and driver passthru"Zuul2021-02-233-60/+92
|\ \ \ \ \ | |/ / / /
| * | | | Implement system scoped RBAC for node and driver passthruLance Bragstad2021-02-223-60/+92
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates the policies for baremetal passthru policies to understand scope checking and account for a read-only role. This is part of a broader series of changes across OpenStack to provide a consistent RBAC experience and improve security. Change-Id: I31a258e0ce7db7e931e62f2a06e610857dabdd47
* | | | | Merge "Implement system scoped RBAC for baremetal drivers"Zuul2021-02-234-39/+70
|\ \ \ \ \ | |/ / / /
| * | | | Implement system scoped RBAC for baremetal driversLance Bragstad2021-02-224-39/+70
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates the policies for baremetal drivers to understand scope checking and account for a read-only role. This is part of a broader series of changes across OpenStack to provide a consistent RBAC experience and improve security. Change-Id: I7e2f205a5fbc186bfdaf2f5f58fb3b07abc9765d
* | | | | Merge "Implement system scoped RBAC for chassis"Zuul2021-02-233-41/+84
|\ \ \ \ \ | |/ / / /
| * | | | Implement system scoped RBAC for chassisLance Bragstad2021-02-223-41/+84
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates the policies for baremetal chassis to understand scope checking and account for a read-only role. This is part of a broader series of changes across OpenStack to provide a consistent RBAC experience and improve security. Change-Id: I5ecb44a389b057519599c7b812f8c913db4f085a
* | | | | Merge "Implement system scoped RBAC for port groups"Zuul2021-02-234-69/+114
|\ \ \ \ \ | |/ / / /
| * | | | Implement system scoped RBAC for port groupsLance Bragstad2021-02-224-69/+114
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit updates the policies for baremetal port groups to understand scope checking and account for a read-only role. This is part of a broader series of changes across OpenStack to provide a consistent RBAC experience and improve security. Co-Authored-By: Julia Kreger <juliaashleykreger@gmail.com> Change-Id: Ida3b341285e3f889311a44f615e0665a0736f6af