Commit Graph

316 Commits

Author SHA1 Message Date
Kevin Fenzi
599656a420 storinator01: add hosts file for rdu3 iso
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2026-02-10 10:29:28 -08:00
Kevin Fenzi
2d28e5de7b hosts: set specific gateway for a few iso hosts
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2026-01-30 09:21:17 -08:00
Kevin Fenzi
c5482adb6c proxy03/14: set hosts to use internal ip for gateway
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2026-01-19 13:59:03 -08:00
Kevin Fenzi
8db612803a pagure: hard code gateway to the internal ip for now
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2026-01-19 09:21:27 -08:00
Kevin Fenzi
fe1015ab14 add vpn hosts for proxy03/smtp-mm-iso01
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-12-12 14:57:53 -08:00
Kevin Fenzi
e6b034c4fa proxy14: sheesh
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-12-11 20:40:19 -08:00
Kevin Fenzi
4859a58b4b smtp-auth-iso01 and download-iso01: add vpn based hosts files.
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-12-11 15:09:59 -08:00
Kevin Fenzi
fbb3727fa5 retrace03: use vpn for ipa since it's in the ioslated network
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-12-10 12:48:25 -08:00
Kevin Fenzi
99633bb861 backup: use external pagure01 ip
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-12-04 14:31:14 -08:00
Kevin Fenzi
a6bda803d5 pagure01: setup vpn hosts file
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-11-21 12:08:00 -08:00
Kevin Fenzi
247cf23b0f pagure-stg02: make sure and use a vpn hosts file
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-11-17 15:04:35 -08:00
Kevin Fenzi
e81f8626a7 use a host specific hosts file for now
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-11-17 13:49:40 -08:00
Kevin Fenzi
c763353f0d also add the actual hosts file
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-11-17 13:38:01 -08:00
Kevin Fenzi
390f5f12d3 hosts / pkgs: set pkgs locally to use proxy01/10
When I switched dns to use proxy110/proxy101 for src internally
in order to fix rust crate building, it broke auth on pkgs01/src.

The problem is that proxy01/10 are setup with a keytab that has
proxy01/proxy10 listed as principals so it can accept auth via them.
However, 101/110 are not listed and thus you get a permission denied.

We might look at a better way to fix this, but for now,
lets just override that here.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-15 17:13:50 -07:00
Kevin Fenzi
6723e95cba copr_hypervisor: add hosts file
We need this to setup hosts for vpn in rdu3 fedora-isolated

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-10-13 07:45:54 -07:00
Michal Konecny
e8d1095e67 [hosts] Add ipa vpn entries to cloud hosts
Most of the cloud hosts are on VPN, this will allow them to reach the IPA hosts.
2025-07-17 17:36:54 +02:00
Nils Philippsen
6c85fda0c9 Mass remove/replace iad2 -> rdu3, 10.3. -> 10.16.
Signed-off-by: Nils Philippsen <nils@redhat.com>
2025-07-03 20:05:02 +02:00
Kevin Fenzi
c9cf6c1e38 buildvm-s390x: no bad hosts file
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-07-02 09:46:39 -07:00
James Antill
61046a1ca6 More remove bad hosts entry pointing to iad2
Signed-off-by: James Antill <james@and.org>
2025-07-01 20:07:13 -04:00
Kevin Fenzi
a2d4dc8a62 ns01: remove bad hosts entry pointing to iad2
Argh.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-07-01 16:48:29 -07:00
Kevin Fenzi
e4e4e305de rdu3: add some hosts files until dns is sorted
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2025-05-21 15:37:17 -07:00
Michal Konecny
7b58dfdce8 Remove fedmsg and github2fedmsg from staging
The messaging bridges openshift project and github2fedmsg VM were
already removed in staging. This is to clean the ansible playbooks.

I will create a separate one for production after this one is merged.

Signed-off-by: Michal Konecny <mkonecny@redhat.com>
2025-02-04 09:13:40 +01:00
Ryan Lerch
6a3816dfdc ansiblelint fixes-- fqcn[action-core] - copy to ansible.builtin.copy
Replaces many references to 'copy' with ansible.builtin.copy

Signed-off-by: Ryan Lerch <rlerch@redhat.com>
2025-01-15 10:43:31 +10:00
Ryan Lerch
691adee6ee Fix name[casing] ansible-lint issues
fix 1900 failures of the following case issue:

`name[casing]: All names should start with an uppercase letter.`

Signed-off-by: Ryan Lerch <rlerch@redhat.com>
2025-01-14 20:20:07 +10:00
Kevin Fenzi
a60ca7159f nuancier: retire and remove from ansible
See https://pagure.io/fedora-infrastructure/issue/11371
This service is retired.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-11-15 10:44:00 -08:00
Kevin Fenzi
c1e6e2fb02 ns13: define a local hosts file so we can get to the vpn to install
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2023-01-30 15:21:16 -08:00
Kevin Fenzi
8ee9c66072 hosts: try again as the last simple fix was too simple
So, we need a bit more logic here.
We want to use the vpn hosts file only if something is on the vpn and
it's also not in iad2. In iad2 we want the normal hosts file.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-04-05 10:15:52 -07:00
Kevin Fenzi
d36a478580 hosts: make a hacky, but hopefully working way of handling vpn
This isn't very clever, but it should work and be easily understandable.
We likely want to come up with a better way to do these hosts files
entirely, but it can wait until after freeze.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-04-05 10:07:58 -07:00
Kevin Fenzi
b4df850535 Revert "hosts: then and if swapped?"
This reverts commit b8f411c96b.
2021-04-01 16:47:21 -07:00
Kevin Fenzi
b8f411c96b hosts: then and if swapped?
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-04-01 16:16:23 -07:00
Nils Philippsen
7a2024398f hosts: do the right thing for VPN hosts
Move the vpn ./. base logic from the ipa/client role into the hosts
role, so that applying the latter doesn't apply the base profile on VPN
hosts.

Fixes: fedora-infrastructure#9822

Signed-off-by: Nils Philippsen <nils@redhat.com>
2021-04-01 16:31:59 +02:00
Francois Andrieu
110084afb1 cleanup: remove phx2 hosts files 2021-03-29 22:49:35 +00:00
Nils Philippsen
bcfe96b710 ipa/client: Enable VPN hosts to talk to IPA
This requires the canonical names of IPA servers to be mapped to their
IP addresses on the VPN as well as specifying the IPA server explicitly
when enrolling clients.

Signed-off-by: Nils Philippsen <nils@redhat.com>
2021-03-24 18:19:11 +01:00
Kevin Fenzi
2af0042d5c koji01.stg: rename some files to the current domain name.
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-08-26 15:46:55 -07:00
Kevin Fenzi
450cc3db87 hosts: drop stg hosts file that was phx2 specific
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-07-20 12:47:17 -07:00
Kevin Fenzi
b4c583b8ef Remove old infrastructure ip from cloud hosts.
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-07-12 17:16:55 -07:00
Kevin Fenzi
122e0e2707 hosts / notifs*: drop all these wrong host files.
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-07-02 14:52:15 -07:00
Kevin Fenzi
73f8fe76ad proxies: drop vpn workaround for registries
The iad2 registries should be reachable now via the normal path, so we
can drop this workaround. Should make things faster too.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-06-20 13:16:09 -07:00
Kevin Fenzi
f8043f6c5a pagure01: For some reason workers started looking for db-pagure
I have no idea why they are, perhaps this is an upstream default?

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-06-20 11:56:28 -07:00
Kevin Fenzi
624dbd04a9 proxies in iad2: set hosts file to use vpn for talking to container regestries
Currently the proxies can't talk to the container registries directly,
so for now route these over the vpn.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-06-13 14:37:46 -07:00
Kevin Fenzi
f3233ba3d6 iad2 / proxy101: candidate registry
Right now, proxy101 is what is resolved to internally in iad2 for
candidate-registry.fedoraproject.org. It has haproxy to reach
oci-candidate-registry01.iad2.fedoraproject.org on port 5000 for this,
but that doesn't work currently due to RHIT firewall.

So, for now we add the vpn endpoint to /etc/hosts there so haproxy works
and internal machines can use the candidate registry.

Once we fix the rhit firewall we should remove this.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-06-11 18:10:33 -07:00
Kevin Fenzi
cb2fa9f453 openshift cluster: drop hosts
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-06-11 16:55:43 -07:00
Patrick Uiterwijk
1ffffcbfb3 Revert "iad2: add a hosts file for now on wiki01.iad2 to get auth working"
This reverts commit d03c3a528b.
2020-06-11 18:16:53 +02:00
Kevin Fenzi
83d53fd622 iad2: delete hosts file for autosign01.
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-06-07 16:03:48 -07:00
Stephen Smoogen
11baf9ef99 try adding a hosts files for the s390 builders 2020-06-07 15:35:15 -04:00
Kevin Fenzi
d03c3a528b iad2: add a hosts file for now on wiki01.iad2 to get auth working
The problem is that id.fedoraproject.org resolves to the iad2 versions
in iad2. This is fine, but break oidc which has a talk between the
provider and the requestor, so if you use the phx2 ipsilon, you need
to use it for the entire thing. Will fix this better in dns soon.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-06-05 18:17:47 -07:00
Pierre-Yves Chibon
0f7a6efc2b pagure and distgit/pagure: Drop the db-pagure hostname and populate the db used in the inventor host file instead
Basically, instead of relying on an obscure db-pagure variable that
then needs to be specified in the /etc/hosts file.
Just define the pagure_db_host variable in the host's inventory
file so it exists as a variable available in the playbook/role.
This makes things more explicit and easier to debug/tweak as needed.

Signed-off-by: Pierre-Yves Chibon <pingou@pingoured.fr>
2020-05-26 14:08:01 +02:00
Pierre-Yves Chibon
d898123fb3 Drop hosts file for a host that is long gone
Signed-off-by: Pierre-Yves Chibon <pingou@pingoured.fr>
2020-05-26 14:04:14 +02:00
Kevin Fenzi
ace20e5603 iad2: clean up some hosts files and make sure bodhi-backend01.iad2 is actually in the iad2 datacenter
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-05-25 16:38:58 -07:00
Kevin Fenzi
ba001ac2eb blockerbugs: drop hosts files.
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-05-23 11:32:45 -07:00