- 22 Jan, 2024 40 commits
-
-
Jérome Perrin authored
-
Jérome Perrin authored
reapply xxx
-
Jérome Perrin authored
This reverts commit 453e811d6d384922e1c90919daca7f889364dea5.
-
Jérome Perrin authored
-
Jérome Perrin authored
this is now inline in the software
-
Jérome Perrin authored
-
Jérome Perrin authored
- merge software-common.cfg in software.cfg - use inline templates instead of a recipe for cloudooo.cfg
-
Jérome Perrin authored
-
Jérome Perrin authored
also reorganise the build to use latest golang
-
Jérome Perrin authored
-
Jérome Perrin authored
-
Jérome Perrin authored
-
Jérome Perrin authored
The later is not really supposed to be XML-RPC comptabible and it's anyway to use ZPythonScript_edit
-
Jérome Perrin authored
-
Jérome Perrin authored
-
Jérome Perrin authored
-
Jérome Perrin authored
testing strategy: - use an external method with a transaction manager which sleeps for 20 seconds during tpc_vote and tpc_commit - commit such a transaction - stop zope - check the stop happens after the tpc_commit
-
-
Jérome Perrin authored
-
Jérome Perrin authored
-
Jérome Perrin authored
For now this still have to be enabled with a config like this in a .conf file in srv/telegraf/extra-config/ : [[inputs.execd]] name_override = "slapos" # this needs sudo when using can not access supervisor socket, like when being installed in root slapos command = ["/usr/bin/sudo", "$SOFTWARE_DIR/go.work/bin/telegraf-input-slapos", "-config", "/path/to/slapos.conf"] /path/to/slapos.conf would contain something like this: [[inputs.slapos]] ## Folder where partitions are located instance_root = "/srv/slapgrid/" ## filepath.Glob pattern to look for recursive instances recursive_instance_glob_pattern = "*/srv/runner/inst*/" ## Path of supervisor socket, relative to instance root socket_name = "sv.sock"
-
Jérome Perrin authored
This version has a new sql input, that can be used to get metrics from sql queries.
-
Jérome Perrin authored
-
Jérome Perrin authored
This reverts commit 31eaaec1. This slows down business template by a factor of two and it seems we don't need it. I'm experimenting with hacks in ppml.py but maybe just creating the Unpickler with encoding='utf-8' in product/ERP5Type/XMLExportImport/__init__.py:267 is enough ?
-
Jérome Perrin authored
at this point they all fail after long timeouts, because neo does not support py3 yet
-
Jérome Perrin authored
Not sure why it was OK on python2 and not sure if this has to be done or the promise code needs to cast the results of getConfig()
-
Jérome Perrin authored
-
Arnaud Fontaine authored
Otherwise it fails with the following exception because of non-ASCII characters (`[A-Z&é@{]{3,7})`) (see unconvert()) below): => erp5_core/PathTemplateItem/portal_preferences/default_site_preference.xml File "zodbpickle-2.0.0-py3.7-linux-x86_64.egg/zodbpickle/pickle_3.py", line 844, in load dispatch[key[0]](self) File "zodbpickle-2.0.0-py3.7-linux-x86_64.egg/zodbpickle/pickle_3.py", line 1035, in load_short_binstring self.append(self.decode_string(data)) File "zodbpickle-2.0.0-py3.7-linux-x86_64.egg/zodbpickle/pickle_3.py", line 989, in decode_string return value.decode(self.encoding, self.errors) UnicodeDecodeError: 'ascii' codec can't decode byte 0xc3 in position 19: ordinal not in range(128)
-
Jérome Perrin authored
-
Bryton Lacquement authored
-
Kazuhiko Shiozaki authored
-
Kazuhiko Shiozaki authored
-
Jérome Perrin authored
-
Jérome Perrin authored
This reverts commit 6c399134.
-
Jérome Perrin authored
The strategy for compatibility is that: - haproxy still listen on the same port as before, without rewrite rule. This is called "legacy" port. - for each frontend from request parameters, we introduce an haproxy frontend with a rewrite for the corresponding `internal-path` parameter. - the shared frontend instance is updated to use this new frontend entry from haproxy. This will cause a small downtime until the shared frontend is updated to the new URL on ERP5, but since this feature was not used, it's OK. Technical details are that we: - split haproxy config to have frontends and backends. - introduce one frontend in haproxy for each frontend from request parameters. - routing-rule-list argument is still honored the same way, globally and after path from frontend. - change the shared frontend requests to use "" type, no longer "zope" type. - we don't do automatic detection of /VirtualHostRoot in URL but always add it, because it could be used to trick zope into thinking it serves requests for an arbitrary host and do open redirects - before using the request's host header in virtualhost path, we check that it does not contain /, to prevent injection of virutalhost path elements through the host header. - we don't use the "path" parameter from shared frontend, because we want the frontend to be simple, so we don't want it to rewrite the request path (which is also the reason why we deprecated "zope" type) - the tests have changed a lot, because they were using what's now the "legacy" URL types, so we updated it to use the new URL types with all the /VirtualHostRoot/../ in path and also because they use IPv6 URL, no longer IPv4
-
Jérome Perrin authored
-
Jérome Perrin authored
and save the already allocated ports in a state file, so that requesting new families does not change already allocated ports.
-
Jérome Perrin authored
This reverts commit 620c9332 (stack/erp5: stop using caucase managed certificate for balancer, 2020-11-10) with an updated design. We add a caucase service for balancer in the balancer partition. The caucase service from the root partition (that was not used) is removed. The underlying idea is that the default configuration should use multiple caucases with limited scope, here we have one caucase to manage the certificate used by haproxy server in the balancer partition, so we put one caucase to manage this certificate and the caucase is configured to auto-accept one certificate only. The plan is that when we will add a certificate for mariadb server, we'll add another caucase inside this mariadb server. For more advanced usage and also to support the cases where a new certificate needs to be re-emitted for some reason, users can request with an existing caucase URL. In that case, they will have to accept the certificate requests. Notable changes: balancer/ssl/caucase-url is no longer documented in parameters, this is an internal parameter, users can pass one global caucase service to manage all partition CAUCASE environment variable is no longer set when running zope. There was no identified use case and with this new approach of multiple caucases, the term "caucase" alone became ambiguous.
-
Jérome Perrin authored
This is not documented in schema and has no effect in erp5 (but this is still used for slapos-master)
-
Jérome Perrin authored
-