Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Label package branches #29

Closed
wants to merge 38 commits into from
Closed

Label package branches #29

wants to merge 38 commits into from

Commits on Aug 15, 2024

  1. tests: fix test_ca_certs.py for gcp (canonical#5621)

    Avoid exclusive expectations that cloud-init is the only agent
    registering certificates in a system to
    /etc/ssl/certs/ca-certificates.crt.
    
    On Google Cloud Platform, Google Guest Agent does setup root certs
    which makes performing a checksum of ca-certificates.crt incorrect due
    to extra certs present in ca-certificates.crt.
    
    Adapt test to assert that cloud-init's cert is contained in
    ca-certificates.crt but not exclusive content of the file.
    
    Fixes canonicalGH-5609
    blackboxsw authored Aug 15, 2024
    Configuration menu
    Copy the full SHA
    2e4c39b View commit details
    Browse the repository at this point in the history
  2. feat: collect-logs improvements (canonical#5619)

    * Collect sensitive data by default since we ask for it more often
      than not
    * Output warning that we're collecting sensitive data
    * Glob most of /run/cloud-init, /etc/cloud, and /var/lib/cloud
    * Stop creating empty directories in the tarball
    * Require running as root given that the logs are root read-only
    * Update apport accordingly
    
    Fixes canonicalGH-5297
    TheRealFalcon authored Aug 15, 2024
    Configuration menu
    Copy the full SHA
    c28092f View commit details
    Browse the repository at this point in the history

Commits on Aug 16, 2024

  1. fix(wsl): Properly assemble multipart data (canonical#5538)

    In the case of Pro, if either agent or user data is not cloud-config user-data,
    combine the parse in `self.userdata_raw` as a #include file so
    cloud-init transforms that internally into a multipart data.
    
    Avoid passing strings and lists directly, which confused the processor due the
    lack of a mime type.
    
    Being explicit about only loading text/cloud-config parts also allow other
    composition of cloud-init features to just work, like jinja templates.
    
    This error was surfaced when testing with empty Landscape
    data, but any non-text/cloud-config content type would trigger the same behavior.
    
    Add merge_agent_landscape_data to process agent.yaml or Landscape data and
    ignore any empty  files present in .ubuntupro/.cloud-init/
    CarlosNihelton authored Aug 16, 2024
    Configuration menu
    Copy the full SHA
    56aa706 View commit details
    Browse the repository at this point in the history

Commits on Aug 19, 2024

  1. Configuration menu
    Copy the full SHA
    0a8bf72 View commit details
    Browse the repository at this point in the history
  2. fix(doc): object type check if patternProperties or properties (canon…

    …ical#5562)
    
    Without this fix, rendered module documentation was not rendering the
    following text for some objects:
    
    Each object in **<key_name>** list supports the following keys:
    
    See Rsyslog Config schema tab.
    blackboxsw committed Aug 19, 2024
    Configuration menu
    Copy the full SHA
    24cdaa7 View commit details
    Browse the repository at this point in the history
  3. fix(doc): doc of nested objects under JSON schema items.oneOf (canoni…

    …cal#5562)
    
    Document any keys of objects in a list which allows for objects as one
    of the alternative types allowed as a list item.
    
    Also, when documenting properties, ensure we skip documentation of
    either 'properties' or 'patternProperties' if those properties are
    declared in the hidden key.
    
    Fixes canonicalGH-5514
    blackboxsw committed Aug 19, 2024
    Configuration menu
    Copy the full SHA
    e14ce3d View commit details
    Browse the repository at this point in the history
  4. feat(doc): add env vars to debug config module doc builds (canonical#…

    …5562)
    
    When running tox -e doc the following environment variables are
    supported:
      CLOUD_INIT_DEBUG_MODULE_DOC=cc_<module_id>
      CLOUD_INIT_DEBUG_MODULE_DOC_FILE=<file_path>
    
    The env var CLOUD_INIT_DEBUG_MODULE_DOC can be set to either
    a specific module id, such as cc_rsyslog, or 'all'.
    
    When set the rendered module documentation RST format is printed
    inline to stdout to allow for quick analysis of rendered content.
    
    Optionally, if CLOUD_INIT_DEBUG_MODULE_DOC_FILE is set to a writable
    file path, the output of the rendered content is written to that file
    instead.
    
    This supports development of docs and quick comparison of docs
    generated before and after a changeset.
    blackboxsw committed Aug 19, 2024
    Configuration menu
    Copy the full SHA
    fdccc61 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    d85be37 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    a2193da View commit details
    Browse the repository at this point in the history

Commits on Aug 20, 2024

  1. test: fix ca_certs int test (canonical#5626)

    Remove additional \n which is not present if only one ca_cert is in the
    instance.
    aciba90 authored Aug 20, 2024
    Configuration menu
    Copy the full SHA
    79e5d31 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    0411057 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    ca9ffac View commit details
    Browse the repository at this point in the history

Commits on Aug 21, 2024

  1. test: fix test_honor_cloud_dir int test (canonical#5627)

    Align integration test with c28092f.
    aciba90 authored Aug 21, 2024
    Configuration menu
    Copy the full SHA
    c6ba0df View commit details
    Browse the repository at this point in the history
  2. test: fix cmd/test_schema int test (canonical#5629)

    Adapt to new annotation formating from
    a2193da.
    aciba90 authored Aug 21, 2024
    Configuration menu
    Copy the full SHA
    8f741da View commit details
    Browse the repository at this point in the history

Commits on Aug 26, 2024

  1. fix(tests): use instance.clean/restart instead of clean --reboot (can…

    …onical#5636)
    
    Directly calling execute("cloud-init clean --logs --reboot") on
    an integration instances also involves awaiting a new boot id upon
    next interaction with with instance to ensure a reboot has actually
    taken place already on this target machine.
    
    Slow responding test instances/platforms may not completed the shutdown
    restart sequence yet when trying to iteract with an immediate blocking
    call to execut("cloud-init status --wait") which may exit early if accessing
    the prior instance boot before the reboot occurred.
    
    It is preferable to use inspect /proc/sys/kernel/random/boot_id before
    issuing a reboot request and block until a delta is seen in boot_id.
    This blocking wait on reboot and new boot_id is encapsulated inside
    pycloudlib.BaseInstance.restart which will inspect
    /proc/sys/kernel/random/boot_id before restart and block until a delta
    in boot_id across the requested restart.
    
    Fix test_status_block_through_all_boot_status to call instance.clean()
    and restart() to ensure we do not beat the instance reboot race with
    our post-boot assertions.
    blackboxsw authored Aug 26, 2024
    Configuration menu
    Copy the full SHA
    6e4343e View commit details
    Browse the repository at this point in the history

Commits on Aug 27, 2024

  1. feat(azure): add PPS support for azure-proxy-agent (canonical#5601)

    Add PPS support for azure-proxy agent and improve error logging.
    KsenijaS authored Aug 27, 2024
    Configuration menu
    Copy the full SHA
    a38d6da View commit details
    Browse the repository at this point in the history
  2. fix(sources/wsl): no error with empty .cloud-init dir (SC-1862) (cano…

    …nical#5633)
    
    Do not treat the emptiness of .cloud-init/ as an error in the logs
    if agent.yaml is present.
    
    Fixes canonicalGH-5632
    aciba90 authored Aug 27, 2024
    Configuration menu
    Copy the full SHA
    bbdfe36 View commit details
    Browse the repository at this point in the history
  3. feat: add automation for ubuntu/* branches asserting quilt patches ap…

    …ply (canonical#5622)
    
    Perform the same steps that cloud-init daily recipe builds performs
    to assert any packaging branch updates will not break daily builds
    due to quilt patch apply issues.
    
    Steps of daily build recipe reflected in this workflow:
    - checkout main
    - merge packaging branch topmost commit
    - quilt push -a
    - run unittests (via tox -e py3)
    - quilt pop -a
    blackboxsw authored Aug 27, 2024
    Configuration menu
    Copy the full SHA
    8bc3e42 View commit details
    Browse the repository at this point in the history

Commits on Aug 29, 2024

  1. tests: assert cloud-init user-data cert is the only root cert (canoni…

    …cal#5641)
    
    Reintroduce strict assert that cloud-init's cert in userdata is the
    only root cert defined on the platform. Google guest agent was
    installed a secondary root cert in ca_certifications.crt for a period of
    time and this was determined to be less than ideal practice.
    
    Allow cloud-init's integration tests to remain strict validation of
    cert checksum to provide a signal if other platforms or agents
    attempt to extend or alter the system-wide CA.
    blackboxsw authored Aug 29, 2024
    Configuration menu
    Copy the full SHA
    fa042b8 View commit details
    Browse the repository at this point in the history
  2. fix: cc_user_groups incorrectly assumes "useradd" never locks passwor…

    …d field (canonical#5355)
    
    Currently cc_user_groups assumes that "useradd" never locks the password
    field of newly created users. This is an incorrect assumption.
    
    Change add_user (in both __init__.py and alpine.py) to
    explicitly call either lock_passwd or unlock_passwd at all times to
    achieve the desired final result.
    
    For existing users with empty or empty locked passwords, no
    password unlock will be performed and warnings will be issued.
    To support empty password validation, provide functionality to
    parse /etc/shadow and /var/lib/extrausers/shadow to assert
    existing users do not have empty passwords before unlocking.
    
    Additionally in this commit: 
    - add NetworkBSD.ifs property to avoid subp side-effect in ___init__
      which calls ifconfig -a at every instance initialization
    
    Useradd background:
    
    From the useradd manpage:
    
    '-p, --password PASSWORD
    The encrypted password, as returned by crypt(3). The default is to
    disable the password.'
    
    That is, if cloud-init runs 'useradd' but does not pass it the "-p"
    option (with an encrypted password) then the new user's password field
    will be locked by "useradd".
    
    cloud-init only passes the "-p" option when calling "useradd" when
    user-data specifies the "passwd" option for a new user. For user-data
    that specifies either the "hashed_passwd" or "plain_text_passwd"
    options instead then cloud-init calls "useradd" without the "-p" option
    and so the password field of such a user will be locked by "useradd".
    
    For user-data that specifies "hashed_passwd" for a new user then
    "useradd" is called with no "-p" option, so causing "useradd" to lock the
    password field, however then cloud-init calls "chpasswd -e" to set the
    encrypted password which also results in the password field being
    unlocked.
    
    For user-data that specifies either "plain_text_passwd" for a new user
    then "useradd" is called with no "-p" option, so causing "useradd" to
    lock the password. cloud-init then calls "chpasswd" to set the password
    which also results in the password field being unlocked.
    
    For user-data that specifies no password at all for a new user then
    "useradd" is called with no "-p" option, so causing "useradd" to lock
    the password. The password field is left locked.
    
    In all the above scenarios "passwd -l" may be called later by
    cloud-init to enforce "lock_passwd: true").
    
    Conversely where "lock_passwd: false" applies the above "usermod"
    situation (for "hash_passwd", "plain_text_passwd" or no
    password) means that newly created users may have password
    fields locked when they should be unlocked.
    
    For Alpine, "adduser" does not support any form of password being
    passed and it always locks the password field (the same point
    applies about password field being unlocked when/if "chpasswd" is
    called). Therefore in some situations (i.e. no password specified
    in user-data) the password needs to be unlocked if
    "lock_passwd: false".
    dermotbradley authored Aug 29, 2024
    Configuration menu
    Copy the full SHA
    6d644e6 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    93f30bb View commit details
    Browse the repository at this point in the history

Commits on Aug 30, 2024

  1. Configuration menu
    Copy the full SHA
    5ff1a4a View commit details
    Browse the repository at this point in the history
  2. Release 24.3 (canonical#5646)

    Bump the version in cloudinit/version.py to 24.3 and
    update ChangeLog.
    blackboxsw authored Aug 30, 2024
    Configuration menu
    Copy the full SHA
    9faafb0 View commit details
    Browse the repository at this point in the history

Commits on Sep 3, 2024

  1. fix(scaleway): Don't override IPv6 routes when IPv4 not primary (cano…

    …nical#5640)
    
    If an instance in _routed-ip_ mode uses both IPv4 **and** IPv6, but
    the IPv6 is listed (attached) first, the default IPv6 route may be
    absent from the final network configuration for systems that do not
    accept Router Advertisements.
    
    This change fixes the problem by making sure that routes are
    appended, not overwritten.
    NoSuchCommand authored Sep 3, 2024
    Configuration menu
    Copy the full SHA
    e30ce6b View commit details
    Browse the repository at this point in the history
  2. chore(azurelinux): update cloud.cfg.tmpl for azurelinux

    - Update upstream cloud-init config template for azurelinux distro
    - remove modules that not currently supported azurelinux
    
    Co-authored-by: minghe <rmhsawyer>
    rmhsawyer authored Sep 3, 2024
    Configuration menu
    Copy the full SHA
    5a74d19 View commit details
    Browse the repository at this point in the history

Commits on Sep 4, 2024

  1. Add Aeza.net datasource

    cofob committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    a865bb9 View commit details
    Browse the repository at this point in the history
  2. Add missing parameters to docs

    cofob committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    cabcedd View commit details
    Browse the repository at this point in the history
  3. Update link to Aeza docs

    cofob committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    58f5f89 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    9124231 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    d27c0dd View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    7bd7d57 View commit details
    Browse the repository at this point in the history
  7. Update doc/rtd/reference/datasources/aeza.rst

    Co-authored-by: Marat Budkevich <[email protected]>
    cofob and marat2509 committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    2deca90 View commit details
    Browse the repository at this point in the history
  8. Apply patch from blackboxsw

    Co-authored-by: Chad Smith <[email protected]>
    cofob and blackboxsw committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    7eb11ef View commit details
    Browse the repository at this point in the history
  9. Fix test_common

    cofob committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    b2b7175 View commit details
    Browse the repository at this point in the history
  10. Ignore network-config

    cofob committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    9f81320 View commit details
    Browse the repository at this point in the history
  11. Fix tests

    cofob committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    c622375 View commit details
    Browse the repository at this point in the history

Commits on Sep 6, 2024

  1. Configuration menu
    Copy the full SHA
    61f1301 View commit details
    Browse the repository at this point in the history

Commits on Sep 11, 2024

  1. Configuration menu
    Copy the full SHA
    8fb0810 View commit details
    Browse the repository at this point in the history