This repo is now testing only with Python 3, so let's make
a few cleanups:
- Remove python 2.7 stanza from setup.py
- Add requires on python >= 3.6 to setup.cfg so that pypi and pip
know about the requirement
- Remove obsolete sections from setup.cfg
- Update classifiers
- Switch to using sphinx-build
- Cleanup doc/source/conf.py to remove now obsolete content.
- Use newer openstackdocstheme version
- Move constraints into deps
- Increase warlock dependency, glanceclient blocks version 1.3.0
Change-Id: I8feb2e86281f2250bdc379b7868c5e738c1a19e6
This commit adds the functionality of karbor-status CLI for performing
upgrade checks as part of the Stein cycle upgrade-checkers goal.
It only includes a sample check which must be replaced by real checks in
future.
Change-Id: I8b75d516725c7cdf169d558b1c4b6f92a695ab2e
Story: 2003657
Task: 26134
Default configuration files like etc/karbor/karbor.conf and
etc/karbor/policy.json are not exist. api-paste.ini is under
'etc/' path. This patch fix it.
Change-Id: Ia42c434b612a005e8de3a1c975a7819c1877256d
In order to make it simpler to use the default
configuration files when deploying services
from source, the files are added to pbr's
data_files section so that the files are
included in the built wheels and therefore
deployed with the code. Packaging and deployment
tools can then more easily use the default files
if they wish to.
This pattern is already established with similar
files for neutron and the glance metadefs as has
been mentioned in the related bug report.
Change-Id: I81b5c00ace7b6d5fab4f982f403149a87b3afbd0
Closes-Bug: #1718356
This adds the basic framework for registering and using default policy
rules. Rules should be defined and returned from a module in
karbor/policies/, and then added to the list in
karbor/policies/__init__.py.
The sample file about default policy will be generated as yaml using
cmd 'tox -e genpolicy' in this patch.
A new context.can() method has been added for policy enforcement of
registered rules. It has the same parameters as the enforce() method
currently being used.
The patch add default policy in code for plan resource in karbor.
Partial-Implements: blueprint policy-in-code
Change-Id: I88ce31ee7cff9263055cfb51f6b5da5c333c50f2
Because of lots of special requirements(hardware, software, network,
performance, etc) and manual configurations, the environment of
the k8s running on the openstack(devstack) nova instance can not be
deployed on the jenkin job node automatically. So fullstack tests
about pod protection will not be added. I will add guide doc about how
to deploy k8s and protect pod with karbor in future.
Change-Id: Iedf7b15e5a87fcafd3ca61694a49d68f2a5c643a
Implements: blueprint kubernetes-pods-protection-plugin
It's hard to maintain karbor.conf by hand, let's switch to use
oslo-config-generator and follow OpenStack convention.
Change-Id: I0dd0a63267e14321ff723d32bd6d90db07cc5f95
This patch adds support to run karbor-api with mod-wsgi.
It provides wsgi app script files and an example Apache2
configuration file for using karbor API through mod_wsgi.
Closes-Bug: #1681500
Change-Id: I292894f59809b84dc1697767a5d3d59861faac84
Protection plugin now needs to implement methods for each operation
(protect, delete, restore). Each protection plugin is created in the
context of the flow, while each operation is created in the context of
the resource.
A protection plugin is responsible for returning an Operation class for
each operation. Such Operation class defines the behavior of the
protection plugin by implementing these optional hooks:
- on_prepare_begin hook is invoked before any hook of this resource and
dependent resources has begun
- on_prepare_finish hook is invoked after any prepare hooks of dependent
resources are complete.
- on_main hook is invoked after the resource prepare hooks are complete
- on_complete hook is invoked once the resource's main hook is
complete, and the dependent resources' on_complete hooks are complete
HeatTemplate is now created and supplied from a task instead of being
created and passed to resource tasks before the restore operation began.
Change-Id: I847eec6990b2d24a66a12542d242fbfb682272fe
Co-Authored-By: Saggi Mizrahi <saggi.mizrahi@huawei.com>
Implements: blueprint protection-plugin-is-design
Optimize time trigger in several aspects. This patch is the fourth
phase, which will use an instance of time format in time trigger
instead of class.
Change-Id: I9f7bff41d4b42a7f38e2d7dae17bbd3ba57dd736
Closes-Bug: #1611232
Now that there is a passing gate job, we can claim support for
Python 3.5 in the classifier. This patch also adds the
convenience py35 venv.
Change-Id: Ic507f0a53f618671f1515800147a5d0970849f1f