SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for caasp-container-manifests-2.1.0+git_r208_08bacd5-1.1.noarch.rpm :
Tue May 15 14:00:00 2018 containers-bugownerAATTsuse.de
- Commit 08bacd5 by Kiall Mac Innes kiallAATTmacinnes.ie
Add Housekeeping Job

Mon Apr 30 14:00:00 2018 containers-bugownerAATTsuse.de
- Commit f1ae550 by Joachim Gleissner jgleissnerAATTsuse.com
mount cloud pillar in salt-master cotainer

Wed Apr 18 14:00:00 2018 containers-bugownerAATTsuse.de
- Commit 9578900 by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
set version to 2.1

Thu Apr 12 14:00:00 2018 containers-bugownerAATTsuse.de
- Commit 37df509 by Rafael Fernández López ereslibreAATTereslibre.es
Do not use FileOrCreate resource type.
The init container for the secrets will create this file.
(cherry picked from commit 793b753f906fafedd213b5e42fbc9928b5d0fa1a)
Commit 5f2bcb4 by Rafael Fernández López ereslibreAATTereslibre.es
Move init containers from annotations to their own section.
Also, make indentation style unique throughout the manifests.
Fixes: #114
(cherry picked from commit 682830d4be3d72489e8b369f09be5bb6ff129c9c)

Tue Jan 30 13:00:00 2018 containers-bugownerAATTsuse.de
- Commit 37df509 by Rafael Fernández López ereslibreAATTereslibre.es
Do not use FileOrCreate resource type.
The init container for the secrets will create this file.
(cherry picked from commit 793b753f906fafedd213b5e42fbc9928b5d0fa1a)
Commit 5f2bcb4 by Rafael Fernández López ereslibreAATTereslibre.es
Move init containers from annotations to their own section.
Also, make indentation style unique throughout the manifests.
Fixes: #114
(cherry picked from commit 682830d4be3d72489e8b369f09be5bb6ff129c9c)

Wed Jan 24 13:00:00 2018 containers-bugownerAATTsuse.de
- Commit 7ff7a8c by Federico Ceratto federico.cerattoAATTsuse.de
Disable swap bsc#1075001
Backport of a1851687444f168dd8d2aa200d628b732bc455b9

Tue Oct 10 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 7e86329 by Maximilian Meister mmeisterAATTsuse.de
wait for network to be online
follow up of #127
bsc#1062284
Signed-off-by: Maximilian Meister
(cherry picked from commit a7783198bbc5fbac3c488ac1101a222e34387c13)

Mon Oct 9 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 5d5f765 by Kiall Mac Innes kiallAATTmacinnes.ie
Wait for network before running admin-node-setup.service
As we need to know the IPs and hostnames for use in the TLS certificates this
generates, we should ensure the network is up and running before this unit
triggers.
bsc#1062284

Sat Oct 7 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 3707489 by Kiall Mac Innes kiallAATTmacinnes.ie
Update VERSION file to 2.0.0

Fri Oct 6 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 5ca300e by Maximilian Meister mmeisterAATTsuse.de
kubelet: update deprecated --config flag (bsc#1062011)
new flag: --pod-manifest-path
this needs to be done during upgrade to 2.0 otherwise kubelet wont start
https://bugzilla.suse.com/show_bug.cgi?id=1062011
Signed-off-by: Maximilian Meister
Commit 4d83a38 by Kiall Mac Innes kiallAATTmacinnes.ie
Ensure LDAP cert is generated on upgrade
Moving the call to gen-certs.sh from activate.sh, over to admin-node-setup.sh
will ensure that any missing certs are generated upon upgrade. This will
ensure the new LDAP cert is created.
In order to preserve issue generation, which contains the Velum key
fingerprint, we must also move this to admin-node-setup.
bsc#1062022
Commit 6137ae5 by Kiall Mac Innes kiallAATTmacinnes.ie
Move salt-master-custom.conf creation to admin-node-setup
activate.sh is only ran once, during a fresh install. This step is required
on fresh installs, and 1.0 -> 2.0 upgrades, so moving to admin-node-setup.sh
and ensuring idempotency will resolve this issue.
bsc#1062003

Tue Oct 3 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 98ec2a0 by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
Add helm tiller image

Tue Sep 26 14:00:00 2017 jmassaguerplaAATTsuse.com
- Branch project to release-2.0 branch. This means the tarball is no
longer called master.tar.gz but release-2.0.tar.gz

Thu Sep 21 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 17a0d8d by Kiall Mac Innes kiallAATTmacinnes.ie
Allow custom options to be passed to the Salt Master
Create a file for custom salt-master configuration options to be supplied.
This will be loaded in numeric order, allowing for certain options (e.g.
worker thread counts).
bsc#1059724

Wed Sep 20 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 66f75e1 by Robert Roland robert.rolandAATTsuse.com
Put the OpenLDAP config db and data db on the host
OpenLDAP did not put its configuration database and data database on the
admin node\'s filesystem, so if the OpenLDAP container restarted, all login
data and TLS configuration data were lost.
Fixes bsc#1059407

Fri Sep 15 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 531839c by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
Revert requirement on helm-tiller image.
We will add this later.
Signed-off-by: Jordi Massaguer Pla

Wed Sep 13 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit fed0ac3 by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
add helm tiller image
Signed-off-by: Jordi Massaguer Pla

Wed Sep 13 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 8d9256d by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
update openldap and dex version requirement
Signed-off-by: Jordi Massaguer Pla

Wed Sep 13 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 188d179 by Robert Roland robert.rolandAATTsuse.com
Removing hardcoded admin password for LDAP
Switching to sles12/openldap image from other image

Mon Sep 11 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 838e5ac by Robert Roland robert.rolandAATTsuse.com
Adding RBAC dependencies to make_spec

Mon Sep 11 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 0931f23 by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
Revert \"Revert \"update image requirements\"\"
This reverts commit cc67389ddc19b50cf49ba9139389f4ab3cbb8aa9.
This is to update the requirements for the sles12sp3 images. We had to revert
that because the images were not in the iso.

Thu Sep 7 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit d010b99 by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
flannel docker image is not yet needed
This image is for CNI and we still don\'t need this
Signed-off-by: Jordi Massaguer Pla

Wed Sep 6 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit cc67389 by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
Revert \"update image requirements\"
This reverts commit 777e2226d8055566212bd7fc16e5b9324210fa0a.
This broke our dvd cause the new packages are not yet in. Let\'s revert it and
do this again once the new packages are in.

Wed Sep 6 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 777e222 by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
update image requirements
For CAASP 2.0, image version is > 2.0 and we have renamed the images to not
contain \"docker\" in its name.
Signed-off-by: Jordi Massaguer Pla

Tue Sep 5 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit e21f9a6 by Robert Roland rob.rolandAATTgmail.com
RBAC: Adding OpenLDAP to admin node (#89)

* adding OpenLDAP container to the public manifest

* Adding LDAP configuration to velum

Fri Sep 1 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 1f7ce09 by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
update requirements of docker images
admin-node-setup.sh script expects images to have a .tag file in order to
substitute the __TAG__ tags in public.yaml and private.yaml
This .tag is in the update images, which are >= 1.1.0

Mon Aug 28 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 5ed140b by Kiall Mac Innes kiallAATTmacinnes.ie
Use the tagfiles rather than hardcoding a tag
This decouples our manifests from the tag of the images contained within the
RPMs. These tagfiles will contain the latest, and most specifc, tag for a
given image.

Mon Aug 28 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 35c6630 by Aishwarya Thangappa aishwarya.thangappaAATTgmail.com
Include kubedns, dnsmasq-nanny and sidecar as dependecies

Fri Aug 18 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 89e2fa5 by Alvaro Saurin alvaro.saurinAATTgmail.com
Require the flannel docker image

Fri Aug 18 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 66e9487 by Kiall Mac Innes kiallAATTmacinnes.ie
Include haproxy as a dependency
haproxy will be used to loadbalance requests over the chosen masters, so
we\'ll need to include the haproxy docker RPM as a dependency.

Thu Aug 17 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 5b61692 by Kiall Mac Innes kiallAATTmacinnes.ie
Increase MariaDBs max_allowed_packet to 16MB
MariaDB\'s max allowed packet size is too small for some larger deployments,
by increasing it, we allow ourselves some time to implement an alternative
pattern for handling salt\'s event stream.
Fixes bsc#1054250

Fri Aug 11 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 8473650 by Kiall Mac Innes kiallAATTmacinnes.ie
etcd on admin node does not have any peers
As such, there is no reason to listen on 0.0.0.0 for peering.

Tue Jul 25 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 1655395 by Flavio Castelli fcastelliAATTsuse.com
Improve comment about how to access velum
Be explicit about using `https://`, some users tried to access velum using
`http://velum-ip:443`.
Fixes bsc#1047310

Mon Jul 24 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 453eac7 by Rafael Fernández López ereslibreAATTereslibre.es
Cache the grains on the `ca` container
Rendering grains on the `ca` takes a fair amount of time if they are not
cached, as lots of grains are falling back to other cases, making other calls
like `publish.publish` timeout (timeouts by default after 5 seconds).
Forcing the grains cache will be slow only the first time, when the grains
get populated, and will get cached, making future uses faster.
Fixes: bsc#1049886

Thu Jul 20 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 1676983 by Rafael Fernández López ereslibreAATTereslibre.es
Add fingerprints to the velum issue
By adding SHA1 and SHA256 fingerprints to the Velum issue, we can ensure that
the instance we are accessing is the right one, and we are not mistaken
(several clusters) or to reject a MITM, since the certificates chain of trust
does not exist (the CA is autogenerated), and the customer has no way to
import the CA as trusted for now.
Fixes: bsc#1048135

Fri Jul 14 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit d376008 by Maximilian Meister mmeisterAATTsuse.de
make branch safe by transforming slashes to dashes
Signed-off-by: Maximilian Meister
Commit 4cfa01c by Maximilian Meister mmeisterAATTsuse.de
packaging: make branch configurable
Signed-off-by: Maximilian Meister

Fri Jul 14 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 1e3ef9e by Kiall Mac Innes kiallAATTmacinnes.ie
Add Jenkinsfile
The Jenkinsfile in each repo, if we adopt Jenkins in the end, will be very
thin, including just a single library load, and a single method call. This
prevents us from needing to keep each projects Jenkinsfile in sync as CI
changes are made.

Tue Jul 11 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 1e3ef9e by Kiall Mac Innes kiallAATTmacinnes.ie
Add Jenkinsfile
The Jenkinsfile in each repo, if we adopt Jenkins in the end, will be very
thin, including just a single library load, and a single method call. This
prevents us from needing to keep each projects Jenkinsfile in sync as CI
changes are made.

Thu Jul 6 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 2a2a6af by Kiall Mac Innes kiallAATTmacinnes.ie
Reinstate critical flag on x509 extensions
Reinstate the critiical flag on two x509 extenstions:

* X509v3 Basic Constraints (CA=False)

* X509v3 Key Usage (Digital Signature, Non Repudiation, Key Encipherment)
bsc#1046708

Tue Jul 4 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit c685e59 by Kiall Mac Innes kiallAATTmacinnes.ie
Match up TLS cert generation to genca.sh

* Remove critical constraints

* Add nonRepudiation and digitalSignature key usages

* Include only the keyid Authority Identifier
bsc#1046708
Commit eb05991 by Kiall Mac Innes kiallAATTmacinnes.ie
Include a UUID in the CA\'s Subject field
Including a random UUID in the CA\'s subject fields ensures that browsers do
not cache certs from older deployments, preventing access to replacement
deployments.
bsc#1046881
Commit ee9d3ab by Kiall Mac Innes kiallAATTmacinnes.ie
Include x509 Subject and Authority IDs in certs
e.g:
X509v3 extensions:
X509v3 Subject Key Identifier:
15:5F:91:F5:63:EA:85:B6:91:AB:8C:A9:9E:C2:36:F0:FD:11:B8:2E
X509v3 Authority Key Identifier:
keyid:F2:AA:7D:21:48:9D:45:00:FA:0C:94:40:48:81:B7:92:33:B5:27:12
bsc#1046881
Commit 69a738d by Kiall Mac Innes kiallAATTmacinnes.ie
End entity TLS certs should not be CA certs
Use different extentions when self signing the CA cert, and when signing end
entity certs.
bsc#1047177
Commit 0c4bbd7 by Kiall Mac Innes kiallAATTmacinnes.ie
CA: Add some logging to more easily identify the steps

Fri Jun 30 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 7ae4dac by Rafael Fernández López ereslibreAATTereslibre.es
Rename `velum-dashboard-autoyast` to `velum-autoyast`
We have a lot of processes in the development, e2e-tests and debugging
environments that use `velum-dashboard`. Renaming the autoyast serving to
`velum-autoyast` will make them still only match one container, the one they
expect (actually both of them are practically the same thing, but to keep
things as they were).

Fri Jun 30 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit ab71633 by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
fix requirements for the docker images
This is needed to fix bsc#1046378
Signed-off-by: Jordi Massaguer Pla

Thu Jun 29 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit f9ee78a by Rafael Fernández López ereslibreAATTereslibre.es
Add gen-certs script
This script will generate a CA and both certificates for services that
require to start with TLS enabled: `velum` and `salt-api`.
Thanks to Robert Roland (AATTrobdaemon) for providing the original script.
Fixes: bsc#1043570 Fixes: bsc#1043589

Wed Jun 28 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 6714137 by Kiall Mac Innes kiallAATTmacinnes.ie
Clear TX update grains on admin node boot bsc#1045379
Clear the tx_update_{reboot_needed,failed} grains upon boot. This ensures the
UI doesn\'t continue to show an admin node upgrade after we\'ve upgraded.

Wed Jun 28 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit aa1a388 by Alvaro Saurin alvaro.saurinAATTgmail.com
Minor: some comments

Wed Jun 28 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 0ea70ff by Kiall Mac Innes kiallAATTmacinnes.ie
Remove unnecessary code from activate.sh
See SR#135010, SR#134883, SR#134572

Wed Jun 28 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit b738430 by Graham Hayes graham.hayesAATTsuse.com
bsc#1045350 Accept salt keys that have been pre-generated
Currently the admin nodes salt minion starts before the container that
generates and accepts keys is ran.
This means that the salt minion is started with a key that is not accepted,
and goes to a pending state.
This checks if the key is pre-generated, and if we have accepted a key from
this minion before. If the key has been generated, but not accepted, we
accept the key and continue.

Tue Jun 27 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit bf6b0f0 by Graham Hayes graham.hayesAATTsuse.com
bsc#1043592 Use mktemp to create tmp directories
Use `mktemp` to ensure that directory has a random name

Tue Jun 27 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 2ab0646 by Thorsten Kukuk kukukAATTthkukuk.de
Fix ordner number of velum.conf for issue.d (we use only two digit numbers)

Tue Jun 27 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 09c947b by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
add the admin-node-setup script and service to the package
This is the 3rd step to fix bsc#1045378 - activate.sh was not reran after
admin node upgrade
Commit 81a7983 by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
add admin-node-setup service
This is the second step to fix bsc#1045378 - activate.sh was not reran after
admin node upgrade
We create a service that will run the admin-node-setup.sh on every reboot
(thus on every update)
Enable this in the activate.sh
Commit 68926c0 by Jordi Massaguer Pla jmassaguerplaAATTsuse.de
split activate into 2
This is the first step to fix bsc#1045378 - activate.sh was not reran after
admin node upgrade.
We need to split the script in 2:
- activate.sh: run only once after the installation
- admin-node-setup.sh: run on every reboot (thus in every update)

Mon Jun 26 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit d5a5ccc by Graham Hayes graham.hayesAATTsuse.com
bsc#1043592 Add pre-generation of minion keys
Generates 2 salt keys (ca and admin) and places them in the correct
directories.
This allows us to remove
*auto_accept
* from the master config file and select
the rest of the members of the cluster.
The admin key is writen out to
*/etc/salt/pki/minion/minion.(pub|pem)
* The ca
key is written out the same path in the container.
bsc#1043592

Fri Jun 23 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 1f5680c by Rafael Fernández López ereslibreAATTereslibre.es
Mount `salt-master` and `salt-minion-ca` caches from the host
This way we ensure that the mine information and other cached information
survives reboots.
Fixes: bsc#1045368

Thu Jun 22 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 5e81ace by Graham Hayes graham.hayesAATTsuse.com
Add \'grains_refresh_every\' to config

Tue Jun 20 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit ea55036 by Rafael Fernández López ereslibreAATTereslibre.es
Connect the `salt-minion` in the administration dashboard machine to the
`salt-master`
Set the `admin` role to the administration dashboard machine, as well as the
minion configuration (`id` and `master` location).
This way we will leave the `salt-minion` in the administration dashboard
connected to the `salt-master` for future orchestrated upgrades.

Thu Jun 8 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 6db8409 by Rafael Fernández López ereslibreAATTereslibre.es
Do not mount `/usr/share/salt/kubernetes/config/master.d` from the host
We will mounting other volumes on top of this on the containers, and they
will fail because on the host, `/usr/share/salt/kubernetes/config/master.d`
is a `RO` volume.
We fix this by mounting all specific files in the containers instead of the
top level directory of the hierarchy. This imposes us the restriction to
modify the container manifests every time a new config file appears, but that
should not happen very often.
Otherwise, we cannot add our own configuration files on top of the `RO`
mounted volume, because they will fail. In this case, the mounted folder on
the containers will be `/etc/salt/master.d`, but in this case this folder
won\'t be mounted from `/usr/share/salt/kubernetes/config/master.d`, it will
live only in the container, and we will mount the specific files under it,
what will avoid the `RO` volume problems from the host.

Thu Jun 8 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit faa0ddb by Rafael Fernández López ereslibreAATTereslibre.es
Do not mount these three mountpoints readonly
Related to infrastructure secrets.
It makes the container initialization to fail. Ideally they should be
read-only, as they will only read from here, but something is trying to write
in there, avoiding containers to start.

Thu Jun 8 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 46e5def by Rafael Fernández López ereslibreAATTereslibre.es
Install setup folder -- we need it to mount the initialization scripts
Related to hardcoded secrets removal, was a bug in the packaging side

Wed Jun 7 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 5c48335 by Rafael Fernández López ereslibreAATTereslibre.es
Remove hardcoded secrets
We will be generating secrets with init containers. These secrets will be
created in a volume mounted from the host, so they survive reboots.
While being sufficient for our GA purposes we will need to rethink how we do
this in a HA environment.
Some secrets are generated with the init containers:

* mysql root password

* mysql velum user password

* mysql salt user password

* saltapi user password
Once we have generated all the passwords, we need to write this configuration
on files that will be mounted on the different containers, so the different
services can read the files where the passwords are written. By default,
passwords will be created in files with permissions 400.
Password generation uses `/dev/random`, performing a `base64` encoding to
that random content, and pick up a line of the `base64` output.
Images will take this environment variables and they will use their
entrypoint to perform the required actions. Example:

* mariadb container will set the root password and do some initializations

* salt-master container will `chpasswd` the `saltapi` user to the generated
saltapi password.

Tue Jun 6 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit bf0bce0 by Kiall Mac Innes kiallAATTmacinnes.ie
Bump image tag for salt pods to 2016.11.4

Fri Jun 2 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 331fd9b by Kiall Mac Innes kiallAATTmacinnes.ie
Update RPM spec for salt 2016.11.4
As the RPM names have changed with the new tag, we need to update the spec to
require the new salt version.

Thu May 25 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit 1880b3f by Rafael Fernández López ereslibreAATTereslibre.es
- Make substitution in a safer way for --pod-infra-container-image argument
-
- This wasn\'t working on our production image because we are using Kubernetes
- 1.5 that in our config comes with the following setting in
- /etc/kubernetes/kubelet:
-
- KUBELET_ARGS=\"--config=/etc/kubernetes/manifests\"
-
- On 1.6, --config has been completely removed and it will use
- --pod-manifest-path, but not on our current installed configuration.
-
- By adding this change, we ensure that we only make the replacement once (if
- the pod-manifest-path is already there we won\'t do anything), and we don\'t
- rely on the current contents for making the substitution.
-
- Fixes: bsc#1039863

Wed May 24 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit f24962e by Rafael Fernández López ereslibreAATTereslibre.es
- Mount MariaDB configuration under `/etc/my.cnf.d`
-
-
* Under SLE the configuration lives under `/etc/my.cnf.d`
-
* Add `[mysqld]` section to the skip-networking file so it will be
- processed by mysqld (otherwise it\'s ignored)
-
* Mount only the `skip-networking.cnf` file, as other cnf files come
- pre-installed in `/etc/my.cnf.d` and we would be shadowing them

Tue May 23 14:00:00 2017 containers-bugownerAATTsuse.de
- Commit b050481 by Michal Jura mjuraAATTsuse.com
- Kubernetes does not pick the sles12/pause image, bsc#1039863
-
- Kubernetes does not pick the sles12/pause image, but the one from GCR on
- OpenStack.
-
- After Kubernetes version upgrade KUBELET_ARGS changed and option --config for
- sed regular expresion is not matched.
-
- This change is fixing sed regular expresion for
- /etc/kubernetes/kubelet config file.

Fri May 12 14:00:00 2017 containers-bugownerAATTsuse.de
- Share ssh public key for autoyast profile, bsc#1030876

Mon May 8 14:00:00 2017 containers-bugownerAATTsuse.de
- Use the configuration files found in the kubernetes-salt package

Wed May 3 14:00:00 2017 containers-bugownerAATTsuse.de
- activate.sh: notify that velum is starting (bsc#1031682)

Wed May 3 14:00:00 2017 containers-bugownerAATTsuse.de
- Set the presence flag

Wed Apr 26 14:00:00 2017 containers-bugownerAATTsuse.de
- Mount mysql data dir

Tue Apr 25 14:00:00 2017 containers-bugownerAATTsuse.de
- Update salt-master configuration

Tue Apr 25 14:00:00 2017 containers-bugownerAATTsuse.de
- Update mysql paths after checking manifests in production
- Migrate https://github.com/kubic-project/velum/pull/104 to production

Tue Apr 25 14:00:00 2017 containers-bugownerAATTsuse.de
- Migrate https://github.com/kubic-project/velum/pull/126/files to production

Wed Apr 19 14:00:00 2017 containers-bugownerAATTsuse.de
- Add missing VELUM_SALT_PASSWORD

Tue Apr 18 14:00:00 2017 containers-bugownerAATTsuse.de
- activate.sh: fix bsc#1032651

Fri Mar 31 14:00:00 2017 containers-bugownerAATTsuse.de
- Persist CA certificates and issued certificates

Tue Mar 28 14:00:00 2017 containers-bugownerAATTsuse.de
- Enable etcd using the activate.sh script

Mon Mar 27 14:00:00 2017 containers-bugownerAATTsuse.de
- Added a temporary fix for the pause container in the dashboard

Fri Mar 24 13:00:00 2017 containers-bugownerAATTsuse.de
- Rename database

Fri Mar 24 13:00:00 2017 containers-bugownerAATTsuse.de
- Remove leftover that made the kubelet ignore salt.yaml file

Thu Mar 23 13:00:00 2017 containers-bugownerAATTsuse.de
- fix call to init

Thu Mar 23 13:00:00 2017 containers-bugownerAATTsuse.de
- use bundle as this is a symlink now in the image
- review entry commands

Thu Mar 23 13:00:00 2017 containers-bugownerAATTsuse.de
- Fix TODO comments about path prefixes
- Add velum configuration settings

Thu Mar 23 13:00:00 2017 containers-bugownerAATTsuse.de
- Use port 80 by default

Thu Mar 23 13:00:00 2017 containers-bugownerAATTsuse.de
- fix velum version in spec
- replace opensuse by sles12 images

Thu Mar 23 13:00:00 2017 containers-bugownerAATTsuse.de
- redirect errors to standard error

Wed Mar 22 13:00:00 2017 containers-bugownerAATTsuse.de
- check if the activate is being run by YaST or by cloud-init

Wed Mar 22 13:00:00 2017 containers-bugownerAATTsuse.de
- Clarify the important assumption that DB container will not move to a different host after it is started for the very first time.

Wed Mar 22 13:00:00 2017 containers-bugownerAATTsuse.de
- fix enabled services in controller node

Wed Mar 22 13:00:00 2017 containers-bugownerAATTsuse.de
- add executable permissions to activate.sh

Tue Mar 21 13:00:00 2017 containers-bugownerAATTsuse.de
- fix velum name

Mon Mar 20 13:00:00 2017 containers-bugownerAATTsuse.de
- add the required images for caasp as Requires

Fri Mar 17 13:00:00 2017 containers-bugownerAATTsuse.de
- add activate in rpm

Fri Mar 17 13:00:00 2017 containers-bugownerAATTsuse.de
- Revert \"add pv-recycler-node image\"

Wed Mar 15 13:00:00 2017 containers-bugownerAATTsuse.de
- Revert \"add pv-recycler-node image\"

Wed Mar 15 13:00:00 2017 containers-bugownerAATTsuse.de
- add pv-recycler-node image

Wed Mar 15 13:00:00 2017 containers-bugownerAATTsuse.de
- use mariadb docker image based on sles12sp2

Wed Mar 15 13:00:00 2017 containers-bugownerAATTsuse.de
- update salt images to sles12 images

Tue Mar 14 13:00:00 2017 containers-bugownerAATTsuse.de
- packaging: don\'t expand inner variables in the template

Tue Mar 14 13:00:00 2017 containers-bugownerAATTsuse.de
- packaging: help automated packaging for caasp-container-manifests

Thu Mar 9 13:00:00 2017 jmassaguerplaAATTsuse.com
- Add configuration files

Thu Mar 2 13:00:00 2017 hguoAATTsuse.com
- New package, initial release.


 
ICM