Commit Graph

27141 Commits

Author SHA1 Message Date
Pavel Raiskup
55008b601c copr-be: bisect the idempotence problem 2025-10-16 12:49:09 +02:00
Pavel Raiskup
ddf3cbeb89 copr-be: slight reformat & idempotence again 2025-10-16 12:41:40 +02:00
Pavel Raiskup
9a99beadc2 copr-be: last idempotence provision_config idempotence fix 2025-10-16 12:03:11 +02:00
Pavel Raiskup
909681a962 copr-be: and one more idempotence fix 2025-10-16 12:00:39 +02:00
Pavel Raiskup
051ebab3dd copr-be: one more fix for idempotence 2025-10-16 11:58:17 +02:00
Pavel Raiskup
8034925ccb copr-be: one more try with idempotence 2025-10-16 11:54:22 +02:00
Pavel Raiskup
a7c7e14d22 copr-be: one more idempotence fix 2025-10-16 11:52:08 +02:00
Pavel Raiskup
bcd143e211 copr-be: idempotence fix 2025-10-16 11:47:46 +02:00
Pavel Raiskup
a290f10abf copr-be: avoid rsync_opts (not idempotent) 2025-10-16 11:44:28 +02:00
Pavel Raiskup
898f2add81 copr-be: keep executable files executable after rsync 2025-10-16 11:35:06 +02:00
Pavel Raiskup
7aa8578c1c copr-be: more restrictive permissions for provision files 2025-10-16 11:31:32 +02:00
Pavel Raiskup
a22ec30031 copr-be: hardcode resalloc as provision_user is not defined 2025-10-16 11:27:19 +02:00
Pavel Raiskup
fbe3ad235b copr-be: fix ownership and permissions of provision files 2025-10-16 11:24:18 +02:00
Kevin Fenzi
390f5f12d3 hosts / pkgs: set pkgs locally to use proxy01/10
When I switched dns to use proxy110/proxy101 for src internally
in order to fix rust crate building, it broke auth on pkgs01/src.

The problem is that proxy01/10 are setup with a keytab that has
proxy01/proxy10 listed as principals so it can accept auth via them.
However, 101/110 are not listed and thus you get a permission denied.

We might look at a better way to fix this, but for now,
lets just override that here.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-15 17:13:50 -07:00
Kevin Fenzi
d5e1fa08f2 proxies: drop some requests that use referrer of some forks
there's about... 7million hits a day from sites passing a referrer
of forks/kernel or forks/firefox where they are fetching static content
over and over and over. This may be because before they were blocked
from the forks themselves they were also downloading the js and static
content, and now they are just too dumb to see the 403 and still
want to fetch the old static content. Fortunately, they send a
referrer we can match on.

So, this should cut load another chunk.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-15 13:53:28 -07:00
James Antill
90f30deb45 docs-rsync.stg: Cleanup the code adding comments.
Signed-off-by: James Antill <james@and.org>
2025-10-15 13:02:37 -04:00
Siteshwar Vashisht
55fd4eb825 openscanhub: change to ami-09e7e359019156824
... as previous fix used wrong image.

Signed-off-by: Siteshwar Vashisht <svashisht@redhat.com>
2025-10-15 16:03:54 +00:00
Kevin Fenzi
58c8447d1a proxies / src: block all kernel forks for now
Some scraper(s) were very very agressively crawling kernel fork repos
and causing all kinds of problems for koji and src.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-15 07:58:11 -07:00
Jiri Podivin
041a0e468a Change firewall setup to work with containerized service
We are no longer going to force a different firewall driver for containers.
At the same time, nftables service is disabled and stopped. We don't need it
since firewalld is using nftables as a library anyway.

The rule for opening port 8080 has been replaced with rule for 443.
Service has moved to HTTPS.

Signed-off-by: Jiri Podivin <jpodivin@redhat.com>
2025-10-15 09:12:15 +00:00
Siteshwar Vashisht
c739da870b openscanhub: update to ami-005984cdd73d72d6c
Signed-off-by: Siteshwar Vashisht <svashisht@redhat.com>
2025-10-15 08:00:40 +00:00
Kevin Fenzi
37211b2d9c bodhi-backend: tell skopeo to retry
The large flatpak push (290 flatpaks) was hitting an occasional timeout,
which caused the entire compose to fail. Just making it retry gets it
through this.

This is a emerg fix because without it all updates pushes would have
been blocked.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-14 08:47:34 -07:00
Aurélien Bompard
f4477e0bde Fix moved file
Signed-off-by: Aurélien Bompard <aurelien@bompard.org>
2025-10-14 15:48:55 +02:00
Aurélien Bompard
fb967d743a IPA-tuura: add role
Signed-off-by: Aurélien Bompard <aurelien@bompard.org>
2025-10-14 15:46:02 +02:00
Jiri Kyjovsky
3672784d56 copr: disable fedora-infra anubis role
This role currently fails for Copr (idk yet why), and I am currently on
sick leave, this I am disabling it, so the failures don't suprise
someone.
2025-10-14 14:31:21 +02:00
Ryan Lerch
ad7eb4d75a forge: unprettyprint FAS group mappingswq
Signed-off-by: Ryan Lerch <rlerch@redhat.com>
2025-10-14 18:47:38 +10:00
Ryan Lerch
720c224107 Fix Forgejo deployment strategy to prevent queue lock conflicts
Change maxSurge from 100% to 0 and maxUnavailable from 0 to 1 to ensure old pod terminates before new pod starts, preventing LevelDB queue lock conflicts when email notifications are enabled.
2025-10-14 18:26:43 +10:00
Ryan Lerch
bd743bc1d7 forge: add forge-docs-owners and forge-docs-members to fas mappings
Signed-off-by: Ryan Lerch <rlerch@redhat.com>
2025-10-14 18:15:37 +10:00
Ryan Lerch
dc1c006727 Forge: put back mailer config
Signed-off-by: Ryan Lerch <rlerch@redhat.com>
2025-10-14 10:54:27 +10:00
Ryan Lerch
4bd8b5e8fd forge: try helm dependency update
Signed-off-by: Ryan Lerch <rlerch@redhat.com>
2025-10-14 08:11:06 +10:00
Ryan Lerch
f7ca374d4f forge: remove mailing config for now.
Signed-off-by: Ryan Lerch <rlerch@redhat.com>
2025-10-14 07:53:24 +10:00
Kevin Fenzi
3565e5634c httpd / websites: do not enable anubis in internal proxies
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-13 10:37:01 -07:00
Kevin Fenzi
6723e95cba copr_hypervisor: add hosts file
We need this to setup hosts for vpn in rdu3 fedora-isolated

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-13 07:45:54 -07:00
Ryan Lerch
6ce56fb5a9 Update config for staging forge to enable email
This also sets two other email privacy settings for both prod and stg

Signed-off-by: Ryan Lerch <rlerch@redhat.com>
2025-10-13 22:14:10 +10:00
Ryan Lerch
244a7fbf17 Set APP_NAME to 'Fedora Forge' in Forgejo config
Resolves: https://codeberg.org/fedora/forgejo-deployment/issues/225
2025-10-13 11:57:58 +10:00
Jiri Kyjovsky
ecebfd4753 copr: switch dist-git to fedora-infra default anubis role 2025-10-12 20:02:04 +00:00
Pavel Raiskup
fbb355425a copr-be: whitespace fix 2025-10-12 09:34:51 +02:00
Pavel Raiskup
ab0dc78638 copr-be: high-performance ppc64le builders for rathann
Relates: https://github.com/fedora-copr/copr/issues/3944
2025-10-12 09:34:05 +02:00
Kevin Fenzi
87d350504a haproxy: retry failed connections to pkgs01/src
This seems to be a similar case to the kojipkgs one, where we see from
time to time timeouts from proxies to pkgs01.

If it's a health check, haproxy will mark the backend down.
If it's a user request they will get a timeout and a 503 back.

This will help mitigate the second problem and retry those.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-11 01:20:49 +00:00
Kevin Fenzi
b5cbcb0536 vmhost-p09-copr02/03/04: add 3 power9 machines in rdu3 for copr
This adds 3 power9 machines in the new 'fedora-isolated' vlan
in rdu3. This is the vlan thats going to house the moved rdu2-cc
hardware in rdu3. We already moved these 3 machines from iad2
so we can use them to try out the new vlan and acls and such.

This adds host vars for the 3 new machines (mac address, ips, etc)
It adds them to the copr_hypervisor group in inventory
It adds their mgmt to dhcpd config so they get known ip's for
their mgmt interfaces instead of dynamic ones.
It adds a 8 disk ppc64le kickstart to install them with.

It also fixes the dhcpd config for the bvmhost-p09-01-stg mgmt
interface, it's off by one.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-10 19:05:37 +00:00
Pavel Raiskup
331c64b76f copr-be: the enable-swap service has been renamed
2895ed83b9
2025-10-09 12:15:30 +02:00
Pavel Raiskup
57cf017758 copr: high-perf builders for ppc64le @kernel-vanilla projects 2025-10-09 10:26:54 +02:00
Kevin Fenzi
46fd68d504 proxies / haproxy: setup some retry for kojipkgs
We are having problems with connections sometimes hanging from proxies
to kojipkgs. Lets try and mitigate that at the haproxy level and
hopefully improve things while we try and figure out what the underlying
cause is.

This should retry connections that failed for any 'retryable' output
(including timeout) and also it should try a _different_ backend than
the one that returned the error. This will not eliminate errors, but
should reduce them.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-08 13:39:38 -07:00
Kevin Fenzi
fd53786d35 f43 final freeze
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-07 17:55:46 -07:00
Greg Sutcliffe
69645f5da5 HAProxy/Rsyslog: fix logging to the rsyslog UDP port that haproxy expects
Signed-off-by: Greg Sutcliffe <fedora@emeraldreverie.org>
2025-10-07 21:21:02 +00:00
Greg Sutcliffe
9b38df0550 Certs: Use renewed *.fedorapeople.org cert
Signed-off-by: Greg Sutcliffe <fedora@emeraldreverie.org>
2025-10-07 22:00:26 +01:00
Greg Sutcliffe
bfedcf64b7 Zabbix: Hostgroups seem to work, enabling for prod too
Signed-off-by: Greg Sutcliffe <fedora@emeraldreverie.org>
2025-10-07 12:34:57 +01:00
Greg Sutcliffe
3d70d99b96 Zabbix: (staging) Try out defining *all* hostgroups as per Nagios
Signed-off-by: Greg Sutcliffe <fedora@emeraldreverie.org>
2025-10-07 12:30:44 +01:00
Aurélien Bompard
825afa22f1 Remove unused OSCI pipelines queues in RabbitMQ
See: https://pagure.io/fedora-infrastructure/issue/12810

Signed-off-by: Aurélien Bompard <aurelien@bompard.org>
2025-10-07 12:38:37 +02:00
James Antill
6f7a1f12de log01: Add /usr/local/bin to combineHttpLogs PATH. issue#12833
Signed-off-by: James Antill <james@and.org>
2025-10-06 15:53:18 -04:00
James Antill
26b373d066 bastion: Fix empty package-owner entries. issue#12834
Signed-off-by: James Antill <james@and.org>
2025-10-06 15:49:03 -04:00