-
Notifications
You must be signed in to change notification settings - Fork 1.3k
4.11.1.0: Stabilization and blocker/issues fixes #2616
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
borisstoyanov
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, VM migrations should get SKIPPED with hypervisor other than KVM
Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>
|
Trillian test result (tid-2579)
|
This ensures that certificate setup includes all the IP addresses (v4 and v6) when a (KVM) host is added to CloudStack. This fixes apache#2530. Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>
On patching, the global cacerts keystore is imported in 'cloud' service specific local keystore. This fixes apache#2541. Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>
This fixes incorrect xenstore-read binary path, this failed systemvm to be patched/started correctly on xenserver. The other fix is to keep the xen-domU flag that may be returned by virt-what. This effect won't change the cmdline being consumed as the mgmt server side (java) code sets the boot args in both xenstore and as pv args. The systemvm's /boot is ext2 that can be booted by PyGrub on both old and recent XenServer versions. Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>
This fixes SAML2 certificate encoding/decoding issue due to refactoring regression introduced in 7ce54bf that did not account for base64 based encoding/decoding. The changes effectively restore the same logic as used in previous versions. Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>
This fixes the issue that post-upgrade egress rules are not applied on VR, restarting the network with cleanup used to be the workaround. Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>
Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>
This moves db upgrade paths and checks around a new systemvmtemplate for 4.11.1. The new systemvmtemplate compared to 4.11.0 template is slightly smaller and has meltdown/spectre fixes among few other security fixes from Debian and changes to cloud-early-config. Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>
|
@blueorangutan package |
|
@rhtyd a Jenkins job has been kicked to build packages. I'll keep you posted as I make progress. |
|
Packaging result: ✔centos6 ✔centos7 ✔debian. JID-1997 |
|
@blueorangutan test matrix |
|
@rhtyd a Trillian-Jenkins matrix job (centos6 mgmt + xs71, centos7 mgmt + vmware65, centos7 mgmt + kvmcentos7) has been kicked to run smoke tests |
|
Trillian test result (tid-2593)
|
|
Trillian test result (tid-2594)
|
|
Test LGTM |
|
@blueorangutan test centos7 xenserver-71 |
|
@rhtyd a Trillian-Jenkins test job (centos7 mgmt + xenserver-71) has been kicked to run smoke tests |
|
Merging this based on 2 code reviews and test results with near 100% smoke test pass, and to allow other PRs to be unblocked from intermittent errors. |
Description
This includes several (smoke) test, stabilization fixes and blocker fixes towards 4.11.1.0 milestone. Please review individually melded commits.
This should be merged when we've near 100% smoke test pass.
Fixed issues list:
#2530 (kvm blocker)
#2561 (xenserver blocker)
#2548 (saml2 blocker)
#2541
Types of changes
GitHub Issue/PRs
Screenshots (if appropriate):
How Has This Been Tested?
SystemVM templates used: https://lab.yadav.cloud/systemvmtemplates/4.11/
Checklist:
Testing