1
0
mirror of https://github.com/openshift/installer.git synced 2026-02-05 15:47:14 +01:00
Commit Graph

2931 Commits

Author SHA1 Message Date
Tiago Bueno
28db292894 OCPBUGS-66358: Update the RHCOS 4.19 bootimage metadata to 9.6.20260112-0
The changes done here will update the RHCOS 4.19 bootimage metadata and
address the following issues:

OCPBUGS-64612: [4.19] coreos-boot-disk link not working with multipath on early boot
OCPBUGS-67202: [4.19] Cannot use auto-forward kargs (like ip=) with coreos-installer (iso|pxe) customize
OCPBUGS-68357: [4.19] Using multipath on the sysroot will fail to boot if less than 2 paths are present
OCPBUGS-69838: [4.19] Ignition fails with crypto/ecdh: invalid random source in FIPS 140-only mode

This change was generated using:

plume cosa2stream \
    --target data/data/coreos/rhcos.json \
    --distro rhcos \
    --no-signatures \
    --name rhel-9.6 \
    --url https://rhcos.mirror.openshift.com/art/storage/prod/streams \
    x86_64=9.6.20260112-0        \
    aarch64=9.6.20260112-0       \
    s390x=9.6.20260112-0         \
    ppc64le=9.6.20260112-0

Signed-off-by: Tiago Bueno <tiago.bueno@gmail.com>
2026-01-22 19:27:04 -03:00
Zane Bitter
8e2c34cdc2 Log peak ramdisk usage of node-image-pull 2025-12-09 07:27:40 +00:00
Zane Bitter
841b7fc0e2 OCPBUGS-62790: Use separate fs for ostree checkout on live ISO
Installations using ABI/assisted with 16GiB of RAM on the bootstrap node
were failing with "no space left on device" during bootstrapping. The
live ISO environment uses a tmpfs mounted at /var that is sized at 50%
of available RAM. On systems with 16GiB of RAM, this provides only 8GiB
of tmpfs space.

At the beginning of the bootstrap process, node-image-pull.sh creates an
ostree checkout underneath /var/ostree-container. When this is added to
the regular disk space usage of the later parts of the bootstrap, the
peak tmpfs usage hits around 9.4GiB.

This fix creates a separate 4GiB tmpfs for /var/ostree-container, so
that it is not subject to the limits on the size of /var.
2025-12-09 07:27:40 +00:00
Zane Bitter
15aff53e69 Report file system space usage in agent-gather 2025-12-09 07:27:40 +00:00
Tiago Bueno
de60ef6ca8 Revert "OCPBUGS-65587: Update the RHCOS 4.19 bootimage metadata to 9.6.20251113-0" 2025-11-17 12:32:05 -03:00
Tiago Bueno
21a3277556 OCPBUGS-65587: Update the RHCOS 4.19 bootimage metadata to 9.6.20251113-0
The changes done here will update the RHCOS 4.19 bootimage metadata and
  address the following issues:

OCPBUGS-64612: [4.19] [OCP 4.18] coreos-boot-disk link not working with
  multipath on early boot

This change was generated using:

plume cosa2stream \
    --target data/data/coreos/rhcos.json \
    --distro rhcos \
    --no-signatures \
    --name rhel-9.6 \
    --url https://rhcos.mirror.openshift.com/art/storage/prod/streams \
    x86_64=9.6.20251113-0        \
    aarch64=9.6.20251113-0       \
    s390x=9.6.20251113-0         \
    ppc64le=9.6.20251113-0

Signed-off-by: Tiago Bueno <tiago.bueno@gmail.com>
2025-11-14 16:13:00 -03:00
Michael Nguyen
1d34dd1283 Update the RHCOS 4.19 bootimage metadata to 9.6.20251023-0
The changes done here will update the RHCOS 4.19 bootimage metadata and
address the following issues:

OCPBUGS-62699: Revert inclusion of AWS ECR credential provider in RHEL layer

This change was generated using:

```
plume cosa2stream --target data/data/coreos/rhcos.json \
    --distro rhcos --no-signatures --name rhel-9.6 \
    --url https://rhcos.mirror.openshift.com/art/storage/prod/streams \
    x86_64=9.6.20251023-0        \
    aarch64=9.6.20251023-0       \
    s390x=9.6.20251023-0         \
    ppc64le=9.6.20251023-0
```
2025-10-28 19:24:34 -04:00
Michael Armijo
a4fce7a091 OCPBUGS-62159: Update the RHCOS 4.19 bootimage metadata
The changes done here will update the RHCOS 4.19 bootimage metadata and
address the following issues:

COS-3042: GA ROSA-HCP support Windows LI for CNV

This change was generated using:

```
plume cosa2stream --target data/data/coreos/rhcos.json  \
    --distro rhcos --no-signatures --name rhel-9.6 \
    --url https://rhcos.mirror.openshift.com/art/storage/prod/streams \
    x86_64=9.6.20251015-1        \
    aarch64=9.6.20251015-1       \
    s390x=9.6.20251015-1         \
    ppc64le=9.6.20251015-1
```
2025-10-15 23:12:12 -06:00
Bob Fournier
2e66a9ad14 OCPBUGS-57021: Use less permissive access for /var/lib/etcd for SNO
With multi-node installations the settings for /var/lib/etcd are
0700. This should be the same from SNO but the bootstrap-in-place
ignition is setting it to 0755.
2025-09-05 14:00:46 +00:00
Aashish Radhakrishnan
da7a1aa8ca OCPBUGS-60925: Update the RHCOS 4.19 bootimage metadata
The changes done here will update the RHCOS 4.19 bootimage metadata and
address the following issues:

OCPBUGS-60664 - [4.19] linux-firmware updates required for GNR-D hardware

This change was generated using:

```
plume cosa2stream --target data/data/coreos/rhcos.json                     \
    --distro rhcos --no-signatures --name rhel-9.6 \
    --url https://rhcos.mirror.openshift.com/art/storage/prod/streams                                               \
    x86_64=9.6.20250826-1                                    \
    aarch64=9.6.20250826-1                                   \
    s390x=9.6.20250826-1                                     \
    ppc64le=9.6.20250826-1
```
2025-08-27 00:48:26 -04:00
Jonathan Lebon
be73d89aaa Revert "Update RHCOS 4.19 bootimage metadata to 9.6.20250811-0"
This reverts commit 702c738be0.

The live ISO in that bootimage set contains a change to the volume ID
which would break the Assisted Image Service:
https://github.com/openshift/assisted-image-service/pull/477

We're working on pushing out new ISOs with the reverted volume ID in:
https://github.com/coreos/coreos-assembler/pull/4276

But for now revert this to ensure it doesn't slip into the next z-stream
release.
2025-08-20 16:32:26 -04:00
Tiago Bueno
702c738be0 Update RHCOS 4.19 bootimage metadata to 9.6.20250811-0
The changes done here will update the RHCOS 4.19 bootimage metadata.
Notable changes in the boot image are:

- COS-3381: Add support for Taipei (ap-east-2) in AWS

This change was generated using:
```
plume cosa2stream --target data/data/coreos/rhcos.json \
    --distro rhcos --no-signatures --name rhel-9.6 \
    --url https://rhcos.mirror.openshift.com/art/storage/prod/streams \
    x86_64=9.6.20250811-0 \
    aarch64=9.6.20250811-0 \
    s390x=9.6.20250811-0 \
    ppc64le=9.6.20250811-0
```

Signed-off-by: Tiago Bueno <tiago.bueno@gmail.com>
2025-08-14 16:08:54 -03:00
OpenShift Cherrypick Robot
8ea36c539a [release-4.19] OCPBUGS-57796: add MCO operator manifest for boot image management (#9797)
* pkg/asset/manifests: add MCO operator manifest

Adds manifest generation for MCO configuration.
Currently the manifest is only generated when
custom boot images are specified, in order
to disable MCO management of those boot images.

The manifest generation uses a golang template
as testing revealed that API server validation
would not permit the manifests generated from
serializing the golang structs, which would
be more consistent with how we generate manifests
for other openshift operators. As golang will
populate the zero value for any non-pointer struct
this triggered validation, where the API server
expected certain required fields for these zero-value
structs. Using a template allows us to bypass this
problem.

Fixes OCPBUGS-57348

* fixup! pkg/asset/manifests: add MCO operator manifest

* fixup! pkg/asset/manifests: add MCO operator manifest

---------

Co-authored-by: Patrick Dillon <padillon@redhat.com>
2025-06-24 15:49:10 +00:00
Michael Nguyen
905afac264 Update RHCOS 4.19 bootimage metadata to 9.6.20250523-0
The changes done here will update the RHCOS 4.19 bootimage metadata.
Notable changes in the boot image are:

- OCPBUGS-56600: The toolbox package built in rhcos-9.6.20250514-0 can't work

This change was generated using:
```
plume cosa2stream --target data/data/coreos/rhcos.json                \
    --distro rhcos --no-signatures --name rhel-9.6                    \
    --url https://rhcos.mirror.openshift.com/art/storage/prod/streams \
    x86_64=9.6.20250523-0                                     \
    aarch64=9.6.20250523-0                                     \
    s390x=9.6.20250523-0                                       \
    ppc64le=9.6.20250523-0
```
2025-05-25 08:29:16 -04:00
Patrick Dillon
8bcc596b1e pkg/types/azure: cleanup identity godocs
For the Azure identity API, the installer makes use directly of the
CAPZ API, but we do add validation to not support SystemAssigned
identities.

SystemAssigned identities were removed in
11f006d
but I missed updating the godoc text which is pulled in from CAPZ.

This PR updates the godoc text and kubebuilder annotations so that the
explain command will not show SystemAssigned identities as a valid choice.

Also the godoc text indicated identity was for control-plane only; fixed
to include compute.
2025-05-21 16:59:39 -04:00
Patrick Dillon
96b1bf111b OCPBUGS-56008: default to create VM Identity
https://github.com/openshift/installer/pull/9538 switched the installer
to not create user-assigned identities for VMs, and exposed an API
for users to bring-their-own identities and attach them to nodes.

OCPBUGS-56008 shows that the kubelet still depends on the node
identity to pull images from Azure Container Registry (ACR). To
resolve this issue, this commit sets the default back to using
an installer-generated identity attached to the node. The API is
still exposed in the install config, so users who do not utilize
ACR can set the identity type to None and install with less privileged
credentials.

When upstream work lands to allow these credentials to be managed
via credentialsrequests, we can go set the default identity to None
and remove the logic for creating identities. The upstream work
is tracked here and looks like it should be available in the next
release:

https://github.com/kubernetes/enhancements/issues/4412
2025-05-21 11:58:51 -04:00
Michael Nguyen
1a8f7ccfa6 Update RHCOS 4.19 bootimage metadata to 9.6.20250513-0
The changes done here will update the RHCOS 4.19 bootimage metadata.
Notable changes in the boot image are:

- Update to RHEL 9.6 GA Content
- OCPBUGS-55460 - [4.19] Enable RHCOS IBM Secure Execution installation on IBM Z17

This change was generated using:
```
plume cosa2stream --target data/data/coreos/rhcos.json                \
    --distro rhcos --no-signatures --name rhel-9.6                    \
    --url https://rhcos.mirror.openshift.com/art/storage/prod/streams \
    x86_64=9.6.20250513-0                                     \
    aarch64=9.6.20250513-0                                     \
    s390x=9.6.20250513-0                                       \
    ppc64le=9.6.20250513-0
```
2025-05-16 13:31:20 -04:00
Prashanth684
6bde34da15 Update SCOS 4.19 bootimage metadata to 9.0.20250510-0
Pulls in this fix: https://github.com/coreos/coreos-assembler/pull/4100
to update the live media.
2025-05-14 09:37:51 -07:00
Sandhya Dasu
806f81775d Fixes to get shellcheck to pass 2025-05-12 17:49:23 +00:00
openshift-merge-bot[bot]
a4cb9989a0 Merge pull request #9657 from Prashanth684/okd-scos-json
NO-JIRA: Update SCOS 4.19 bootimage metadata to 9.0.20250411-0
2025-04-18 07:17:19 +00:00
openshift-merge-bot[bot]
8af70eef16 Merge pull request #9666 from patrickdillon/revert-capzash-revert
CORS-3959, CORS-3864: CAPI AzureStack Support, Take II
2025-04-17 20:40:12 +00:00
Patrick Dillon
6e834b3a42 Revert "Merge pull request #9665 from patrickdillon/revert-azurestack-ipi"
This reverts commit 2d3f2c5763, reversing
changes made to 63e0c358e0.
2025-04-16 10:06:31 -04:00
Patrick Dillon
dfabdf1f8a Revert "Merge pull request #9645 from patrickdillon/azurestack-mark-iii"
This reverts commit 63e0c358e0, reversing
changes made to d9c19b4517.
2025-04-16 07:50:56 -04:00
openshift-merge-bot[bot]
63e0c358e0 Merge pull request #9645 from patrickdillon/azurestack-mark-iii
CORS-3959, CORS-3864: CAPI-based AzureStack Installs
2025-04-15 20:31:57 +00:00
Patrick Dillon
c8c968fcf3 CAPZASH Fork: add CRDs 2025-04-15 11:12:13 -04:00
Jeremy Poulin
1a19befc65 OCPEDGE-1749: [TNF] Updated bare-metal init sequence to detach control-plane nodes in Two Node OpenShift.
Two Node OpenShift (TNF) is DevPreview in 4.19. In order to ensure that ironic doesn't try to manage
the power state of the nodes, we add a check for the DualReplica topology after the control-plane nodes
are provisioned during bootstrapping and detach them from ironic.

In a future release, when fencing is enabled, it will be important to enforce that this remains an invariant
for the DualReplica control-plane topology. There is currently nothing preventing the annotation that detaches
these nodes from being removed.
2025-04-15 08:57:16 -04:00
Prashanth684
f15cea7e5f Update SCOS 4.19 bootimage metadata to 9.0.20250411-0
Update to a newer bootimage before we release OKD for 4.19
This change was generated using:

```
plume cosa2stream --target data/data/coreos/scos.json                \
    --distro rhcos --no-signatures --name c9s                        \
    --url https://rhcos.mirror.openshift.com/art/storage/prod/streams \
    x86_64=9.0.20250411-0                                     \
    aarch64=9.0.20250411-0                                     \
    s390x=9.0.20250411-0                                       \
    ppc64le=9.0.20250411-0
```
2025-04-13 12:20:22 +05:30
openshift-merge-bot[bot]
15ea83330e Merge pull request #9544 from bear-redhat/issue/CORS-3936
CORS-3936: Add support for public-only networking
2025-04-12 22:03:43 +00:00
openshift-merge-bot[bot]
f8e0265e6a Merge pull request #9125 from rna-afk/enable_boot_diagnostics
CORS-3854: Enable option to set boot diagnostics
2025-04-12 14:22:46 +00:00
bear
cd2991ec1a go mod 2025-04-11 14:32:59 -03:00
Thuan Vo
97fffacbe5 CORS-3867: fix CRD descriptor to mention required BootstrapNode role
In manual role selection, BootstrapNode role is required. This should be
reflected in the CRD descriptor (i.e. openshift-install explain).
2025-04-10 20:49:08 -07:00
openshift-merge-bot[bot]
ff0d333180 Merge pull request #9608 from prb112/OCPBUGS-54319
OCPBUGS-54319: oci-eval-user-data uses dmidecode which is not supported on ppc64le or s390x
2025-04-10 23:40:03 +00:00
Thuan Vo
bb806dfa48 OCPBUGS-53439: fix inconsistent subnet role name for bootstrap node
Previously, the installer supports role BootstrapNode but the CRD
descriptor says Bootstrap.
2025-04-09 16:04:59 -07:00
openshift-merge-bot[bot]
7867e67e84 Merge pull request #9639 from tthvo/CORS-3869-followup
NO-JIRA: fix the platform test assertions to check expected err message
2025-04-09 01:24:02 +00:00
rna-afk
fbedd14589 added changes to mock file and testing. Also modified yaml file
after rebasing.
2025-04-07 17:22:38 -04:00
rna-afk
578deb730b azure: Enable option to set boot diagnostics
Enabling the option for the users to set the type of boot
diagnostics for the bootstrap and control plane machines
for log collection.
2025-04-07 14:53:28 -04:00
Patrick Dillon
85d542c8cb CORS-3883: remove SystemAssigned ID (#9606)
* pkg/types/azure: remove SystemAssigned ID

SystemAssigned Identities are not supported in any capacity in MAPZ.
Due to that they were feature gated for future CAPZ->MAPZ transition.
The CAPZ Identity API creates further issues in that, the value to be
used for name/scope is unclear and when deleting clusters the
role assignment of the identity is leaked.

No users have asked for this functionality, so lets revert it to
reduce our complexity and load.

* fixup! pkg/types/azure: remove SystemAssigned ID
2025-04-05 03:56:57 +00:00
Thuan Vo
25b01075d7 crd: adjust wordings for no-untagged-subnets requirement
This ensures that the users understand the installer rejects BYO VPC
that has "other" untagged subnets, that are not provided in the
install-config.
2025-04-04 16:47:18 -07:00
Michael Nguyen
63e064d390 Update RHCOS 4.19 bootimage metadata to 9.6.20250402-0
The changes done here will update the RHCOS 4.19 bootimage metadata.
Notable changes in the boot image are:

- Add pkey_cca kernel module to detect CEX domain for LUKS encryption

This change was generated using:
```
plume cosa2stream --target data/data/coreos/rhcos.json                \
    --distro rhcos --no-signatures --name rhel-9.6                    \
    --url https://rhcos.mirror.openshift.com/art/storage/prod/streams \
    x86_64=9.6.20250402-0                                     \
    aarch64=9.6.20250402-0                                     \
    s390x=9.6.20250402-0                                       \
    ppc64le=9.6.20250402-0
```
2025-04-02 22:07:57 -04:00
openshift-merge-bot[bot]
0cb08d13c8 Merge pull request #9596 from sadasu/update-capz-version
OCPBUGS-42241: Update to cluster-api-provider-azure release-v1.17.5
2025-04-01 20:37:43 +00:00
openshift-merge-bot[bot]
97875b2469 Merge pull request #9395 from bgartzi/gcp-sev_snp
CORS-3923, CORS-3927: Support confidential cluster installation on SEV-SNP and TDX nodes on GCP
2025-04-01 04:52:31 +00:00
openshift-merge-bot[bot]
16eedbcab0 Merge pull request #9439 from vr4manta/SPLAT-2000
SPLAT-2000: Added vSphere provisioning mode support for data disks
2025-04-01 01:35:44 +00:00
openshift-merge-bot[bot]
f404808e18 Merge pull request #9546 from jaypoulz/OCPEDGE-1496-installer-gather-pcs-logs
OCPEDGE-1496: [TNF] Collect pacemaker, pcsd, and corosync logs and journals in installer-masters-gather.sh
2025-03-31 21:22:41 +00:00
openshift-merge-bot[bot]
e22c0fe0ad Merge pull request #9521 from mshitrit/fencing-config-platform-none
OCPEDGE-1505: Enhance Platform none with Fencing Credentials
2025-03-31 21:22:27 +00:00
vr4manta
bfd1200dca Added vSphere provisioning mode support for data disks 2025-03-31 11:37:23 -04:00
Paul Bastide
89cb408e81 OCPBUGS-54319: oci-eval-user-data uses dmidecode which is not supported on ppc64le or s390x
Signed-off-by: Paul Bastide <pbastide@redhat.com>
2025-03-27 14:23:29 -04:00
Sandhya Dasu
0765bdaec3 Update CAPZ infrastructure manifest
Update CAPI azure's infrastructure manifest accompanying the
version bump.
2025-03-26 10:54:43 -04:00
Stephen Finucane
6db3887732 openstack: Embed CA cert in root credential
If a CA cert is required to talk to your OpenStack then obviously all
services that talk to the cloud need to have both credentials and said
cert. Currently, these users can get their credentials via cloud
credential operator, but they need to source their CA cert from
elsewhere (typically by extracting it from the cloud controller
manager's configuration). This makes configuration of services more
complicated than necessary.

Continue the resolution of the issue by storing the CA cert, if any,
in the root secret on OpenStack. When coupled with the changes
introduced in openshift/cloud-credential-operator#780 [1], this allows
us to dole out the cert to anyone who asks for it via a
'CredentialsRequest'.

[1] https://github.com/openshift/cloud-credential-operator/pull/780

Signed-off-by: Stephen Finucane <stephenfin@redhat.com>
2025-03-26 11:02:35 +00:00
Stephen Finucane
d300fb953b openstack: Rename variables
We are storing a cloud configuration file, not a cloud credentials file.

Signed-off-by: Stephen Finucane <stephenfin@redhat.com>
2025-03-26 11:02:35 +00:00
Jeremy Poulin
6a4a5bfa3e OCPEDGE-1496: [TNF] Collect pacemaker, pcsd, and corosync logs and journals in installer-masters-gather.sh
Omitting the main pacemaker log in this initial implementation after discussion with pacemaker SME.
The `/var/log/pacemaker/pacemaker.log` has been shown to have the potential to contain sensitive
information. Since log collection happens regularly in CI, we will avoid collecting this log for the
time being. That said, I've left a comment explain how to pull it using `sos report` and have
also showed how to pull the log successfully (since it needs a permissions tweak) in the case that
these concerns are resolved at a later time.

This upstream issue can be used to follow progress on addressing security concerns in the pacemaker log.
https://projects.clusterlabs.org/T615
2025-03-25 19:28:12 -04:00