Commit Graph

47 Commits

Author SHA1 Message Date
Scott Little d51f8050cd Build layering, script and lst update
Script changes to download content by layer.
Valid options are 'all', 'compiler', 'distro', 'flock'.

Current .lst and yum files under directory centos-mirror-tools
are relocated.  Generic package dependencies are relocated to
centos-mirror-tools/config/<os>/<layer>/ .

Lst entries for compilable content have been relocated to other
git repos by prior updates.  i.e.  those that list tarballs or
srpms to be compiled within that repo.

The original .lst files are deleted to make it easier
to identify new content during development.

Layer 'all' builds all layers in a single workspace.  The
lst files are identical to current content, minus the src.rpm and
tarball entries.

Other layers get only a subset of packages download. The minimum
required to build the layer.  The 'flock' layer will have additional
content to satisfy the run time requirements as well as the build
time requirements.

An upper layer does not need to list rpms known to be provided by
a lower layer.  Instead the config file 'required_layer_pkgs.cfg'
lists urls for lst files for lower layer build outputs.
These build outputs are generated and published by cengn for
each layer.

A second layer config file, 'required_layer_iso_inc.cfg' lists
image.inc files for lower layer builds.  These build outputs are
generated and published by cengn for each layer, summarizing
the image.inc files found in individual git repos.

Image.inc files inform the build-iso process, listing rpms that
that provide services and commands that need to be included in
the iso.  The transitive list of required rpms need not be listed.

Finally the layer config should include a yum.repos.d
directory in which supplementary yum repos are defined to
pick up cengn built content from lower layers.

To allow a designer to do cross-layer building using local sources
rather than those provided by CENGN, there are several options.

The designer can modify the urls for lower layer build outputs,
as found in the .cfg and .repo files within the config directory
'stx-tools/centos-mirror-tools/config/<distro>/<layer-to-build>'
directly within the git.  Substitute urls can use the file:///
syntax.  Just be sure to remove these changes before submitting.

Alternatively new args have been added to download_mirror.sh,
generate-cgcs-centos-repo.sh and commands that override the
normal config.

The easiest to use is a command argurement that substitutes a new
config directory, replacing stx-tools/centos-mirror-tools/config.
The intent is for the designer to do a recursive copy of that
directory into a side location. make his changes there, outside of
git, and provide the path to that directory as an extra arguement
to download_mirror.sh and generate-cgcs-centos-repo.sh.

e.g. For simplicity I'll only list the 'extra' arguements

download_mirror.sh -C <my-config-dir> \
                   -l <layer> \
                   ...

generate-cgcs-centos-repo.sh --config-dir=<my-config-dir> \
                             --layer=<layer> \
                             ...

populate_downloads.sh --config-dir=<my-config-dir> \
                      --layer=<layer> \
                      ...

These arguements can also be suplied via the environment.
For the purpose of containerized builds, these arguements
should be defined in your localrc.

e.g.
export STX_CONFIG_DIR=<my-config-dir>
export LAYER=<layer>

The final alternative is to override things at a more granular level,
replacing a single lst file of image.inc file.  Here you can replace
a single line found in a required_layer_pkgs.cfg or
required_layer_iso_inc.cfg file.

e.g. We are doing a flock build and want to modify the content picked up
from the distro layer's rt build, and that content delivers a service
we want in the iso.  For simplicity I'll only list the 'extra' arguments

./download_mirror.sh -l flock \
    -L distro,rt,file:///<my-distro-workspace>/rt/rpmbuild/RPMS/rpm.lst \
    -I distro,std,file:///<my-distro-workspace>/rt/image.inc \
    ...

generate-cgcs-centos-repo.sh --layer=flock \
    --layer-pkg-url=distro,rt,file:///<my-distro-workspace>/rt/rpmbuild/RPMS/rpm.lst \
    --layer-inc-url=distro,std,file:////<my-distro-workspace>/rt/image.inc \
    ...

NOTE: The triplet syntax for a package list url is
    <lower-layer>,<build-type>,<url-to-rpm.lst>

    lower-layer: 'compiler', 'distro'
    build-type: 'std', 'rt', 'installer'

    Also if 'file:///' syntax is used, a matching change is made to
    the yum *.repo file.  This assumes that the rpm.lst is co-resident with
    repodata directory, as is the norm for our build outputs.

NOTE: The triplet syntax for a image inc url is
    <lower-layer>,<include-type>,<url-to-image.inc>

    lower-layer: 'compiler', 'distro'
    build-type: 'std', 'dev'

A typical user is likely only working in the flock layer on the master
branch.  He should be content to use the compiler and distro layer
outputs from cengn.

His workflow looks like ...

1, sync code for flock layer
$ repo init -u https://opendev.org/starlingx/manifest.git -b master -m flock.xml
$ repo sync

2, download rpms for flock layer, and populate a local mirror
$ LOCAL_MIRROR=/import/mirrors/starlingx
$ cd stx-tools/centos-mirror-tools
$ ./download_mirror.sh -n -g -c yum.conf.sample -S -l flock
$ cp -r output/stx-r1/CentOS/pike/* $LOCAL_MIRROR/

3, Prepare a virtual repo and downloads directory for building
$ cd ../toCOPY
$ ./generate-cgcs-centos-repo.sh --layer=flock $LOCAL_MIRROR
$ ./populate_downloads.sh --layer=flock $LOCAL_MIRROR

4, rpm package and iso building
$ build-pkgs && build-iso && build-helm-charts.sh

Building all layers in a single workspace is still supported, and
looks identical to the previous workflow.

1, sync code
$ repo init -u https://opendev.org/starlingx/manifest.git -b master
$ repo sync

2, download rpms for flock layer, and populate a local mirror
$ LOCAL_MIRROR=/import/mirrors/starlingx
$ cd stx-tools/centos-mirror-tools
$ ./download_mirror.sh -n -g -c yum.conf.sample -S
$ cp -r output/stx-r1/CentOS/pike/* $LOCAL_MIRROR/

3, create repo named "StxCentos7Distro" for building
$ cd ../toCOPY
$ generate-cgcs-centos-repo.sh $LOCAL_MIRROR
$ populate_downloads.sh $LOCAL_MIRROR

4, rpm package and iso building
$ build-pkgs && build-iso && build-helm-charts.sh

Only a cross-layer developer should setup two or three copies of the
building environment, one per layer.  We suggest you use seperate shells
for each layer, as the various paths (MY_REPO, MY_WORKSPACE ...) need to
be unique,

Shell 1, compiler layer
$ LOCAL_MIRROR=/import/mirrors/starlingx
$ LOCAL_CONFIG=<some-dir>/config
$ MY_REPO_ROOT_DIR=<some-dir>/layer-compiler
$ MY_REPO=$MY_REPO_ROOT_DIR/cgcs-root
$ MY_WORKSPACE=$MY_REPO_ROOT_DIR/workspace
  ...

$ mkdir -p $MY_REPO_ROOT_DIR
$ cd $MY_REPO_ROOT_DIR
$ repo init -u https://opendev.org/starlingx/manifest.git -b master -m compiler.xml
$ cd stx-tools/centos-mirror-tools
$ cp -r config/* $LOCAL_CONFIG
 ... edit urls in *.cfg and *.repo files under $LOCAL_CONFIG ...

$ ./download_mirror.sh -n -g -c yum.conf.sample -S -C $LOCAL_CONFIG -l compiler
$ cp -r output/stx-r1/CentOS/pike/* $LOCAL_MIRROR/
$ cd ../toCOPY
$ ./generate-cgcs-centos-repo.sh --config-dir=$LOCAL_CONFIG --layer=compiler $LOCAL_MIRROR
$ ./populate_downloads.sh --config-dir=$LOCAL_CONFIG --layer=flock $LOCAL_MIRROR
$ build-pkgs

Shell 2, distro layer
$ LOCAL_MIRROR=/import/mirrors/starlingx
$ LOCAL_CONFIG=<some-dir>/config
$ MY_REPO_ROOT_DIR=<some-dir>/layer-distro
$ MY_REPO=$MY_REPO_ROOT_DIR/cgcs-root
$ MY_WORKSPACE=$MY_REPO_ROOT_DIR/workspace
  ...
$ mkdir -p $MY_REPO_ROOT_DIR
$ cd $MY_REPO_ROOT_DIR
$ repo init -u https://opendev.org/starlingx/manifest.git -b master -m distro.xml
$ repo sync
$ cd stx-tools/centos-mirror-tools
$ ./download_mirror.sh -n -g -c yum.conf.sample -S -C $LOCAL_CONFIG -l distro
$ cp -r output/stx-r1/CentOS/pike/* $LOCAL_MIRROR/
$ cd ../toCOPY
$ ./generate-cgcs-centos-repo.sh --config-dir=$LOCAL_CONFIG --layer=distro $LOCAL_MIRROR
$ ./populate_downloads.sh --config-dir=$LOCAL_CONFIG --layer=flock $LOCAL_MIRROR
$ build-pkgs

Shell 3, flock layer
$ LOCAL_MIRROR=/import/mirrors/starlingx
$ LOCAL_CONFIG=<some-dir>/config
$ MY_REPO_ROOT_DIR=<some-dir>/layer-flock
$ MY_REPO=$MY_REPO_ROOT_DIR/cgcs-root
$ MY_WORKSPACE=$MY_REPO_ROOT_DIR/workspace
  ...
$ mkdir -p $MY_REPO_ROOT_DIR
$ cd $MY_REPO_ROOT_DIR
$ repo init -u https://opendev.org/starlingx/manifest.git -b master -m flock.xml
$ repo sync
$ cd stx-tools/centos-mirror-tools
$ ./download_mirror.sh -n -g -c yum.conf.sample -S -C $LOCAL_CONFIG -l flock
$ cp -r output/stx-r1/CentOS/pike/* $LOCAL_MIRROR/
$ cd ../toCOPY
$ ./generate-cgcs-centos-repo.sh --config-dir=$LOCAL_CONFIG --layer=flock $LOCAL_MIRROR
$ ./populate_downloads.sh --config-dir=$LOCAL_CONFIG --layer=flock $LOCAL_MIRROR
$ build-pkgs && build-iso && build-helm-charts.sh

Story: 2006166
Task: 37103

Depends-On: https://review.opendev.org/698756
Depends-On: https://review.opendev.org/700819
Depends-On: https://review.opendev.org/700821
Change-Id: I088020b81f08656e50aa29b5584bbc1dd1378f12
Signed-off-by: Scott Little <scott.little@windriver.com>
2020-02-10 10:45:40 -05:00
Shuicheng Lin a3f18007cc Add Kata Container support
The patch is based on 431885231a
And is updated with kata 1.10 repo and 1.10.0-4.1 rpms.

1. add kata container 1.10 stable repo with kata 1.10.0-4.1 rpms.
   kata-runtime is the main rpm, and other rpms including qemu
   are the rpms required by kata-runtime.
2. upgrade containerd to 1.3.0
   To support kata container, kubernetes need switch runtime from
   dockershim to containerd. And need use containered with 1.3.0
   in order to support secure private registry.
3. add crictl as the CLI for containerd.

Story: 2006145
Task: 36744
Task: 36745
Task: 36746

Change-Id: I932e0dde0a0b48257e4acd17d6550f9ec5029555
Signed-off-by: Shuicheng Lin <shuicheng.lin@intel.com>
2020-01-19 19:32:39 +08:00
Don Penney 83709a0a38 Revert "Add Kata Container support"
This reverts commit 431885231a.

Reverting due to https://bugs.launchpad.net/starlingx/+bug/1859686

Change-Id: Id86981d6b854f5f6f42b99e094b789af263105b7
2020-01-14 20:38:59 +00:00
Shuicheng Lin 431885231a Add Kata Container support
1. add kata container 1.9 stable repo with kata 1.9.2-7.1 rpms.
   kata-runtime is the main rpm, and other rpms including qemu
   are the rpms required by kata-runtime.
2. upgrade containerd to 1.3.0
   To support kata container, kubernetes need switch runtime from
   dockershim to containerd. And need use containered with 1.3.0
   in order to support secure private registry.
3. add crictl as the CLI for containerd.

Story: 2006145
Task: 36744
Task: 36745
Task: 36746
Change-Id: I04076681decfa24335cf8dd2a64fc5233452dfbe
Signed-off-by: Shuicheng Lin <shuicheng.lin@intel.com>
2020-01-02 15:49:28 +08:00
Zuul efd8f0521f Merge "Upgrade std/rt kernel to version 1062.1.2 for fixing CVE bug" 2020-01-02 06:00:20 +00:00
Robin Lu c69bc1ef1e Upgrade std/rt kernel to version 1062.1.2 for fixing CVE bug
To fix below kernel CVE, std/rt kernel will be upgraded to a
higher version than current version.
So we will upgrade kernel srpm to below version, which will
cover this issue.
std kernel: kernel-3.10.0-1062.1.2.el7.src.rpm
https://lists.centos.org/pipermail/centos-announce/2019-October/023457.html
rt kernel: kernel-rt-3.10.0-1062.1.2.rt56.1025.el7.src.rpm
https://access.redhat.com/errata/RHSA-2019:2830

linux-firmware is brought forward due to a kernel spec file
build dependency.

CVE bug: CVE-2019-11810:kernel: a NULL pointer dereference in
drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS
CVE bug: CVE-2019-11811: kernel: use-after-free in IPMI Edit
CVE bug: CVE-2019-14835: kernel: vhost-net: guest to host kernel
escape during migration

Closes-Bug: 1849206
Closes-Bug: 1849209
Closes-Bug: 1847817

Change-Id: Ic8c107e4850d0679470a4c8214c85c6d9a800beb
Signed-off-by: Robin Lu <bin1.lu@intel.com>
2019-12-19 09:27:47 +08:00
Zuul c0ce51dd42 Merge "Update OVMF rpm, due to CVE bug." 2019-12-06 01:12:53 +00:00
Robin Lu 1d33f5ae60 Update OVMF rpm, due to CVE bug.
CVE bug: CVE-2019-0160
The updated rpm is selected from the below link.
https://lists.centos.org/pipermail/centos-cr-announce/2019-August/006035.html

Tests:
simplex, duplex, multi-node

Closes-Bug: 1849205

Change-Id: Ifdbbd82de912488af201f028a65c679acc204ed9
Signed-off-by: Robin Lu <bin1.lu@intel.com>
2019-11-26 09:30:51 +08:00
Jim Somerville 855ef14c83 Uprev elfutils to version 0.176-2.el7
This solves:
elfutils: Double-free due to double decompression of sections in
crafted ELF causes crash (CVE-2018-16402)

along with quite a few other issues.

See the announcement link:

https://lists.centos.org/pipermail/centos-cr-announce/2019-August/005856.html

for more details.

Change-Id: Ia328b6043c1815a023ab45ea6f8142dcef91864b
Closes-Bug: 1849201
Signed-off-by: Jim Somerville <Jim.Somerville@windriver.com>
2019-11-22 12:06:45 -05:00
Jim Somerville 391b7d5e34 Uprev systemd to version 219-67.el7
This solves:
systemd: line splitting via fgets() allows for state injection
during daemon-reexec (CVE-2018-15686)

along with some other less critical issues.  See the security
announcement link:

https://lists.centos.org/pipermail/centos-cr-announce/2019-August/006149.html

for more details.

Change-Id: Ia0fcc7184efea5b31408d7514921b58377beb329
Partial-Bug: 1849200
Signed-off-by: Jim Somerville <Jim.Somerville@windriver.com>
2019-11-21 14:29:44 -05:00
Zuul 6a36dcd2ba Merge "Update packages to use new versions from upstream." 2019-09-16 17:40:03 +00:00
Steven Webster 29cac7d1eb Add the containernetworking-plugins package
This commit adds the containernetworking-plugins package, which
brings in a number of CNI plugins including static and dhcp.

The containernetworking-cni package is removed, as it used to
contain the actual plugins before a new separate package /
project was created.

Change-Id: Ia6db0103fff8edadef0ec1c881b766bf7e5f661a
Closes-Bug: #1840391
Signed-off-by: Steven Webster <steven.webster@windriver.com>
2019-09-05 09:22:31 -05:00
Erich Cordoba 20f351a799 Update packages to use new versions from upstream.
These packages has been updated in upstream, this will cause
that whenever ./download_mirror.sh -u is used it will generate
a broken mirror.

This update has been tested generating a complete build and running
a provisioning in a duplex configuration.

Closes-Bug: 1817351

Change-Id: I80defd8f305377fd3660b32f18fa6459c5d4da20
Signed-off-by: Erich Cordoba <erich.cordoba.malibran@intel.com>
2019-08-31 10:11:30 -05:00
zhao.shuai 73025a11f3 Upgrade kernel to version kernel-3.10.0-957.21.3.el7
Security Fix(es):
(CVE-2019-11477)-
An integer overflow flaw was found in the way
the Linux kernel's networking subsystem processed
TCP Selective Acknowledgment (SACK) segments.
While processing SACK segments,
the Linux kernel's socket buffer (SKB) data structure
becomes fragmented. Each fragment is about TCP
maximum segment size (MSS) bytes.
To efficiently process SACK blocks, the Linux kernel merges
multiple fragmented SKBs into one, potentially overflowing
the variable holding the number of segments.
A remote attacker could use this flaw to crash the Linux kernel
by sending a crafted sequence of SACK segments on a TCP
connection with small value of TCP MSS,
resulting in a denial of service (DoS).

(CVE-2019-11478)-
Kernel: tcp: excessive resource consumption while processing
SACK blocks allows remote denial of service.

(CVE-2019-11479)-
Kernel: tcp: excessive resource consumption for TCP connections
with low MSS allows remote denial of service.

Details:
https://access.redhat.com/errata/RHSA-2019:1481
https://access.redhat.com/errata/RHSA-2019:1486
https://nvd.nist.gov/vuln/detail/

Closes-Bug: 1836685
Change-Id: If42765222e641218c2e2282bf7264f3a7f7b863c
Signed-off-by: zhao.shuai <zhaos@neusoft.com>
2019-07-17 15:14:13 +08:00
Zuul 3d0bb7d0f8 Merge "Upgrade kernel patch to CentOS7.6 3.10.0-957.12.2" 2019-06-12 01:02:33 +00:00
Alex Kozyrev b6896898fc Update Docker to 18.09.6 in StarlingX
kmem accounting feature was backported by RedHat and seems to be
incomplete and prone to memory leaks (and possible deadlocks).
This issue is triggered by Docker container runtime that activates
the kmem accounting feature for any cgroup by default. As a result
kmem accounting in runc is disabled on RHEL/CentOS starting 18.19.1
Updating Docker version to 18.09.6 in StarlingX to fix the issue.

Note that the client and container runtime are in separate packages
in Docker Engine 18.09. So, adding containerd.io and docker-cli to
fulfill the depenndencies for Docker Engine.


Change-Id: Ib229eb7ac4db45dbdf1260c6505242147e06838f
Closes-bug: 1831485
Signed-off-by: Alex Kozyrev <alex.kozyrev@windriver.com>
2019-06-10 20:25:42 +00:00
zhiguo.zhang ecf223e163 Upgrade kernel patch to CentOS7.6 3.10.0-957.12.2
New set of CVEs was reported against Intel CPUs: CVE-2018-12126,
CVE-2018-12127, CVE-2018-12130 and CVE-2019-11091.
For these CVEs there are RH and CentOS updates available.

CVE-2018-12126:
Microarchitectural Store Buffer Data Sampling (MSBDS):
Store buffers on some microprocessors utilizing speculative
execution may allow an authenticated user to potentially
enable information disclosure via a side channel with local access.
A list of impacted products can be found here:
https://www.intel.com/content/dam/www/public/us/en/documents/
corporate-information/SA00233-microcode-update-guidance_05132019.pdf

CVE-2018-12127:
Microarchitectural Load Port Data Sampling (MLPDS):
Load ports on some microprocessors utilizing speculative execution
may allow an authenticated user to potentially enable information
disclosure via a side channel with local access. A list of impacted
products can be found here:
https://www.intel.com/content/dam/www/public/us/en/documents/
corporate-information/SA00233-microcode-update-guidance_05132019.pdf

CVE-2018-12130:
Microarchitectural Fill Buffer Data Sampling (MFBDS):
Fill buffers on some microprocessors utilizing speculative execution
may allow an authenticated user to potentially enable information
disclosure via a side channel with local access. A list of impacted
products can be found here:
https://www.intel.com/content/dam/www/public/us/en/documents/
corporate-information/SA00233-microcode-update-guidance_05132019.pdf

CVE-2019-11091:
Microarchitectural Data Sampling Uncacheable Memory(MDSUM):
Uncacheable memory on some microprocessors utilizing speculative
execution may allow an authenticated user to potentially enable
information disclosure via a side channel with local access.
A list of impacted products can be found here:
https://www.intel.com/content/dam/www/public/us/en/documents/
corporate-information/SA00233-microcode-update-guidance_05132019.pdf

These are from the http://cve.mitre.org website.
These are the MDS security CVEs.

Closes-Bug: 1830487
Change-Id: I9c69ca78dc046128521d2a46b520f9c242fe6e56
Signed-off-by: zhiguo.zhang <zhiguox.zhang@intel.com>
2019-06-08 09:34:13 +08:00
Scott Little 78258f737f remove repo blizoo.mk
Cengn builds periodically fail when an upstream rpm repo in anavailable.
By far the top offender is epel.blizoo.mk that seems to go offline
roughly monthly.

The only rpm that we currently use from that repo is
python-pyngus-2.2.1-1.el7.noarch.rpm, referenced from
rpms_centos3rdparties.lst.

However that rpm is eclipsed by the newer
python2-pyngus-2.2.4-1.el7.noarch.rpm which we reference from
rpms_centos.lst.

It is python2-pyngus-2.2.4-1.el7.noarch.rpm that is used in our ISO
build. Pyngus is not used in our docker images.

This update will remove python-pyngus-2.2.1-1.el7.noarch.rpm
from rpms_centos3rdparties.lst, and remove the repo ...
'yum.repos.d/StarlingX_3rd_epel_blizoo_mk.repo' as it will
no longer be supplying rpms that are both unique and needed.

Testing:
docker build --tag stx-builder --file Dockerfile .
build-pkgs
build-iso
build-stx-base
build-stx-images

Change-Id: I817dae97282474a0c9b56941e4b227b6ff82d9aa
Closes-Bug: 1831113
Signed-off-by: Scott Little <scott.little@windriver.com>
2019-05-30 12:26:10 -04:00
Daniel Badea fa8f2238e9 Sort tarball-dl and rpms_centos3rdparties lists
Keep lists sorted to easily identify duplicate
packages and libraries.

Existing files were piped through:

sed 's/!\(.*\)/\1!/' \
| LC_COLLATE=en_US.UTF-8 sort --numeric-sort \
| sed 's/\(.*\)!$/!\1/'

Please use the same command pipe when adding new lines
to ensure proper ordering.

Story: 2003605
Task: 28856

Depends-on: If4533ff264af33b7dea78914fe43eb86c8c0b7c3
Change-Id: Ibc8b2f92b220a817e8189413d766da6dba0c4991
Signed-off-by: Daniel Badea <daniel.badea@windriver.com>
2019-05-02 11:02:26 -04:00
Changcheng Liu dcbe99fcf8 Ceph v13.2.2 Mimic: add required packages
1. add boost library
2. add ceph/v13.2.2 dependent packages
3. bump scl-utils package version

Story: 2003605
Task: 28856

Depends-On: Ibfbecf0a8beb38009b9d7192ca9455a841402040
Change-Id: I6220a7cd27ebbde54d1d353b52cba80293d891df
Signed-off-by: Scott Little <scott.little@windriver.com>
Signed-off-by: Dehao Shang <dehao.shang@intel.com>
Signed-off-by: Changcheng Liu <changcheng.liu@intel.com>
Signed-off-by: Daniel Badea <daniel.badea@windriver.com>
2019-05-02 10:55:09 -04:00
Zuul c265f2c02e Merge "Upgrade for systemd packages (CVE-2018-15688)" 2019-04-29 17:08:05 +00:00
Mawrer Ramirez 443cc0bb5f Upgrade for systemd packages (CVE-2018-15688)
New version of packages updated:
 systemd-219-62.el7_6.5.src.rpm
 systemd-219-62.el7_6.5.x86_64.rpm
 systemd-devel-221-62.el7_6.5.x86_64.rpm
 systemd-libs-219-62.el7_6.5.x86_64.rpm
 systemd-sysv-219-62.el7_6.5.x86_64.rpm

Change-Id: I3fd97d9dabe2350a7af887a0c7de26ec95f7a7d9
Closes-Bug: #1820756
Signed-off-by: Mawrer Ramirez <mawrer.a.ramirez.martinez@intel.com>
2019-04-09 02:53:25 -05:00
Al Bailey c7a1b07847 Upversion to kubernetes 1.13.5 plus associated packages
kubernetes 1.13.5
python-kubernetes 8.0.0
docker-ce 18.06
helm 2.13.1

Story: 2005198
Task: 30208
Change-Id: I8b6f7bf14afda36ee8c558175598f3e810506fe8
Signed-off-by: Al Bailey <Al.Bailey@windriver.com>
2019-04-01 10:15:12 -05:00
Martin, Chen 553a053915 Revert OVMF-20150414-2.gitc9e5618.el7.noarch.rpm for check UEFI failed
For openstack pike release, nove request to acces
/usr/share/OVMF/OVMF_CODE.fd in nova/nova/virt/libvirt/driver.py,
which is removed in upgraded OVMF-20180508-3.gitee3198e672e2.el7.noarch.rpm
Rollback to previous OVMF package

Closes-Bug: 1814335

Change-Id: I2376bc7e0bbc21c61be3ef8964c527ddc7fcf250
Signed-off-by: Martin, Chen <haochuan.z.chen@intel.com>
2019-02-04 06:52:50 +08:00
Shuicheng Lin 494dd3f78e Roll back device-mapper-multipath version to fix build-iso failure
new lvm2 rpm causes AIO duplex deploy failure, so lvm2 is kept with
old version currently. device-mapper-multipath should be kept with
old version also to avoid dependency failure.

Move device-mapper packages to rpms_centos.lst since all packages
could be found in centos repo.

Story: 2004522
Task: 29099

Change-Id: I5cd4d434a629201934a48a551d4fb354f8d57318
Signed-off-by: Shuicheng Lin <shuicheng.lin@intel.com>
2019-01-25 20:02:22 +08:00
Shuicheng Lin 6f1506bc52 upgrade rpms to CentOS 7.6 version
A few more packages are added in order to pass build

Story: 2004522
Task: 28444

Change-Id: I04a4eff125fffab3e422ab7516699c36eccd763e
Signed-off-by: Shuicheng Lin <shuicheng.lin@intel.com>
2019-01-22 06:28:52 +08:00
Zuul 28814e0e9b Merge "upgrade std and rt kernel srpm to CentOS 7.6 957.1.3 version" into f/centos76 2019-01-17 01:05:14 +00:00
Zuul 6ee7810505 Merge "upgrade systemd to CentOS 7.6 version" into f/centos76 2019-01-15 16:35:21 +00:00
Martin, Chen af2ec71661 upgrade std and rt kernel srpm to CentOS 7.6 957.1.3 version
A few packages are upgraded also to pass ISO build

Depends-On: https://review.openstack.org/629483
Story: 2004521
Task: 28558

Change-Id: I3408015fe9a818db7f0ea6f1c0f46b5a116cf5f1
Signed-off-by: Martin, Chen <haochuan.z.chen@intel.com>
Signed-off-by: Shuicheng Lin <shuicheng.lin@intel.com>
2019-01-15 22:03:59 +08:00
Martin, Chen 5ab66f5712 upgrade systemd to CentOS 7.6 version
Depends-On: https://review.openstack.org/630044/

Story: 2004522
Task: 28397

Change-Id: I13f3fd41935a8d0ec2ecf982904230fc9664800d
Signed-off-by: Martin, Chen <haochuan.z.chen@intel.com>
2019-01-11 15:26:20 +08:00
Martin, Chen 819a39aac8 upgrade anaconda to CentOS 7.6 version
Story: 2004522
Task: 28413

Change-Id: I6ff86bc8fabb6af2a69b74e57b9f5de554832bba
Signed-off-by: Martin, Chen <haochuan.z.chen@intel.com>
2019-01-07 10:58:41 +08:00
Zuul fe173118d0 Merge "upgrade python-related packages to CentOS 7.6 version" into f/centos76 2018-12-21 19:09:44 +00:00
Zuul 25dd1c4a0d Merge "upgrade openldap to CentOS 7.6 version" into f/centos76 2018-12-21 19:08:58 +00:00
Zhe Hu 847a76093a upgrade python-related packages to CentOS 7.6 version
Story: 2004522
Task: 28396

Change-Id: I12f4759280b62cd38be9a718d655db0538c48d91
Signed-off-by: Zhe Hu <zhe.hu@intel.com>
2018-12-21 14:39:27 +08:00
Zhe Hu 1334264304 upgrade openldap to CentOS 7.6 version
Story: 2004522
Task: 28398

Change-Id: If9c5df70faa7abd635caba47fa3259a7e40692b1
Signed-off-by: Zhe Hu <zhe.hu@intel.com>
2018-12-20 15:42:25 +08:00
Zhe Hu 3bcd801078 upgrade python to CentOS 7.6 version
Story: 2004522
Task: 28396

Change-Id: Ia8ced8960169670350c05dde3c8836348f6783a9
Signed-off-by: Zhe Hu <zhe.hu@intel.com>
2018-12-19 10:12:05 +08:00
slin14 75385ee846 refactor audit
Package audit-config is created to config customized audit
config file. Since there is no other change for audit, we
could replace srpm with rpm directly.

Test:
Pass build and multi node deploy test.

Story: 2003768
Task: 27602

Change-Id: I96e9ca5c901c8caf9d226ad99a4e05369477d37e
Signed-off-by: slin14 <shuicheng.lin@intel.com>
2018-11-16 02:21:03 +00:00
slin14 d80c2f8e9d remove lshell from mirror list
lshell is removed from system for security reason.
And lshell dependency has been removed with below patch:
https://review.openstack.org/610761
https://review.openstack.org/610767
So we could remove lshell srpm from list here safely.

Partial-Bug: 1795451
Depends-On: https://review.openstack.org/610767

Change-Id: Iba78c7c015b0f1d3db50016d8e21eea53109f0db
Signed-off-by: slin14 <shuicheng.lin@intel.com>
2018-10-31 18:36:28 +08:00
Hayde Martinez 09fa280504 Updating python2-pysocks version and mirror for kernel-rt
Mirror for kernel-rt source rpm was not working so it was updated with a
working one, also updated rpms_centos3rdparties.lst with new version
of python2-pysocks.

Closes-Bug:1799729

Change-Id: Ifecf95dbc998f2f87e97ea5f3294e7c5b52ae318
Signed-off-by: Hayde Martinez <hayde.martinez.landa@intel.com>
2018-10-24 15:05:37 +00:00
Marcela Rosales f77a308309 Changing lshell from centos to centos3rdparty list
Right now lshell is looked for in StarlingX_3rd_epel_blizoo_mk.repo,
and it should be in centos3rdparties instead of centos list.

As it is now, there's a bug because right before centos list is
downloaded, the downwload_mirror.sh script removes yum 3rd parties config
files, and later the yumdownloader doesn't find the lshell package.

Closes-Bug: 1793615
Change-Id: I1eab20226fb92b4b2e05f50958112092bb643bc1
Signed-off-by: Marcela Rosales <marcela.a.rosales.jimenez@intel.com>
2018-10-01 14:50:27 -05:00
Zuul 88b32e68d4 Merge "Clean rpm from repo list which could be generated by src rpm" into f/centos75 2018-09-17 01:36:54 +00:00
slin14 9c016c3e49 Clean rpm from repo list which could be generated by src rpm
Story: 2003435
Task: 24631

below rpm is still kept due to build environment need it:
bash, python, systemd, rpm, centos-release, kernel-header,
openssh, openldap, libuuid, libmount, libblbkid, audit, pam,
shadow-utils, setup, nfs-utils, net-tools

Change-Id: I7439842feb9419492dd6a3adde79c5afe646f63d
Signed-off-by: slin14 <shuicheng.lin@intel.com>
2018-09-12 22:30:40 +08:00
slin14 1b1ba24895 upgrade kernel src rpm to CentOS7.5 3.10.0-862.11.6 version
Story: 2003596
Task: 24917

kernel version is upgraded from 862.6.3 to 862.11.6

Change-Id: If2efecc9510617cae5645ca07732620a40b2ebed
Signed-off-by: slin14 <shuicheng.lin@intel.com>
2018-09-11 22:51:19 +08:00
zhipengl 4a1e46ac2d upgrade lighttpd download lst to CentOS 7.5 version
Story: 2003389
Task: 24482

Change-Id: I5e2a84d3acf6a40fcb6ab5b8e8337feb899b52e1
Signed-off-by: zhipengl <zhipengs.liu@intel.com>
2018-09-10 22:26:43 +08:00
slin14 92fb291fa7 upgrade rpms from repo to CentOS7.5 version
Story: 2003389
Task: 24556

Some rpms are not upgraded for different reason:
1. libguestfs/python-libguestfs is not upgraded due to 7.5 version needs libvirt-daemon-kvm >= 3.9.0-1
2. puppet modules rpm is not upgraded due to openstack puppet has dependency check.
3. packages has higher version than CentOS7.5 is not changed.

Change-Id: I9e9dee9a51cdbed9d486dd802725b0956bfe4a3f
Signed-off-by: slin14 <shuicheng.lin@intel.com>
2018-09-06 17:18:20 +03:00
Dean Troyer 1f0d50e3cc Merge remote-tracking branch 'origin/master' into f/centos75-merge
Change-Id: I413bca255dc6513f2c8e412f4e789e96f7d8badf
2018-09-02 15:52:41 -05:00
Marcela Rosales 1a539ac2a5 Change lists names and downloading scripts
-By standardizing the list files name it's possible to eliminate
one parameter in the download function in dl_rpms and reduce complexity.
-Now the download function does not receive it as a parameter anymore,
and instead it gets it from the RPM name.
-Also the download function now decides if build a wget command or
a yumdownloader commnad based on the content of the list (by identifying
the # character) instead of using the name of the list.

I adapted download_mirror.sh.

Change-Id: I041fc9c704156215f06149e5b4c16cd92990e17c
Signed-off-by: Marcela Rosales <marcela.a.rosales.jimenez@intel.com>
2018-08-15 16:56:43 -05:00