Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Custom modifications tracking #1148

Merged
merged 1 commit into from
Jan 12, 2024

Conversation

fernflower
Copy link
Member

@fernflower fernflower commented Nov 16, 2023

Please do NOT review until marked as ready.
All custom modifications ideas will be put there.

Report any customisations related to the upgrade process and the upgrade tooling:

  • modified configuration files
  • modified source code / files of the upgrade tooling
  • presence of custom / third party actors & content

The solution introduces CustomModification model which represents the result of the scan.

jira: RHEL-1774

@fernflower fernflower added the WIP Work In Progress label Nov 16, 2023
Copy link

Thank you for contributing to the Leapp project!

Please note that every PR needs to comply with the Leapp Guidelines and must pass all tests in order to be mergeable.
If you want to request a review or rebuild a package in copr, you can use following commands as a comment:

  • review please @oamg/developers to notify leapp developers of the review request
  • /packit copr-build to submit a public copr build using packit

Packit will automatically schedule regression tests for this PR's build and latest upstream leapp build. If you need a different version of leapp from PR#42, use /packit test oamg/leapp#42

It is possible to schedule specific on-demand tests as well. Currently 2 test sets are supported, beaker-minimal and kernel-rt, both can be used to be run on all upgrade paths or just a couple of specific ones.
To launch on-demand tests with packit:

  • /packit test --labels kernel-rt to schedule kernel-rt tests set for all upgrade paths
  • /packit test --labels beaker-minimal-8.9to9.3,kernel-rt-8.9to9.3 to schedule kernel-rt and beaker-minimal test sets for 8.9->9.3 upgrade path

[Deprecated] To launch on-demand regression testing public members of oamg organization can leave the following comment:

  • /rerun to schedule basic regression tests using this pr build and latest upstream leapp build as artifacts
  • /rerun 42 to schedule basic regression tests using this pr build and leapp*PR42* as artifacts
  • /rerun-sst to schedule sst tests using this pr build and latest upstream leapp build as artifacts
  • /rerun-sst 42 to schedule sst tests using this pr build and leapp*PR42* as artifacts

Please open ticket in case you experience technical problem with the CI. (RH internal only)

Note: In case there are problems with tests not being triggered automatically on new PR/commit or pending for a long time, please contact leapp-infra.

@fernflower fernflower marked this pull request as draft November 16, 2023 12:19
@fernflower fernflower force-pushed the customcodechangeswarning branch 5 times, most recently from 6802b63 to 3339e3d Compare November 21, 2023 14:38
@fernflower fernflower changed the title [WIP] [DEBUG] POC of custom modifications tracking POC of custom modifications tracking Nov 21, 2023
@fernflower fernflower force-pushed the customcodechangeswarning branch 13 times, most recently from 7ab5fd0 to ad42184 Compare November 22, 2023 22:44
@fernflower fernflower force-pushed the customcodechangeswarning branch 7 times, most recently from 2dcf86c to 1dc9922 Compare December 4, 2023 13:08
@fernflower
Copy link
Member Author

So on a pristine vm with leapp-from-this-pr upon leapp preupgrade --no-rhsm with a new file dropped-in and another actor opened&saved one would get:


HIGH and MEDIUM severity reports:
    1. Packages available in excluded repositories will not be installed
    2. Packages not signed by Red Hat found on the system
    3. Remote root logins globally allowed using password
    4. GRUB2 core will be automatically updated during the upgrade
    5. Custom files were discovered on your system in leapp directories
    6. Modified files were discovered on your system in leapp directories

leapp-report.txt

----------------------------------------
Risk Factor: high 
Title: Custom files were discovered on your system in leapp directories
Summary: Apparently some custom files have been found in leapp installation directories.
Please consult the list of discovered files for more information:
- /usr/share/leapp-repository/repositories/system_upgrade/common/actors/unexpecteddir/nonactorfile
Key: e87b6e8611e851b8447d262f3a1618f6ef0af170
----------------------------------------
Risk Factor: high 
Title: Modified files were discovered on your system in leapp directories
Summary: Apparently some modified files have been found in leapp installation directories.
Please consult the list of discovered files for more information:
- /usr/share/leapp-repository/repositories/system_upgrade/common/actors/checkcustommodifications/__pycache__/actor.cpython-36.pyc
- /usr/share/leapp-repository/repositories/system_upgrade/common/actors/checkcustommodifications/actor.py (CheckCustomModificationsActor Actor)
Key: b291e663e6859bdaf5cefc92e7b6f65eb977283b
----------------------------------------

@pirat89 pirat89 added this to the 8.10/9.4 milestone Jan 10, 2024
@fernflower fernflower force-pushed the customcodechangeswarning branch 2 times, most recently from c1cbdb6 to 18c4f9b Compare January 11, 2024 12:24
Copy link
Member

@Rezney Rezney left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am ok with the current state but I did not test it. Can we get the "POC" out of the PR title?

@pirat89 pirat89 changed the title POC of custom modifications tracking Custom modifications tracking Jan 11, 2024
@pirat89 pirat89 added the report Any reports have been added / removed / changed in the PR label Jan 11, 2024
@fernflower fernflower force-pushed the customcodechangeswarning branch from 18c4f9b to f4a43e1 Compare January 11, 2024 14:53
@fernflower
Copy link
Member Author

@mreznik squashed commits, removed POC

@pirat89
Copy link
Member

pirat89 commented Jan 11, 2024

Output from manual testing:

----------------------------------------
Risk Factor: high
Title: Custom files were discovered on the system in leapp directories
Summary: Apparently some custom files have been found in leapp installation directories.
Please consult the list of discovered files for more information:
    - /usr/share/leapp-repository/custom-repositories/supplements/.leapp/info
    - /usr/share/leapp-repository/custom-repositories/supplements/.leapp/leapp.conf
    - /usr/share/leapp-repository/custom-repositories/supplements/actors/checkreboothygiene/actor.py (check_reboot_hygiene Actor)
    - /usr/share/leapp-repository/custom-repositories/supplements/actors/checkreboothygiene/libraries/checkreboothygiene.py (check_reboot_hygiene Actor)
    - /usr/share/leapp-repository/custom-repositories/supplements/actors/checkreboothygiene/tests/unit_test_checkreboothygiene.py
    - /usr/share/leapp-repository/repositories/system_upgrade/el7toel8/tools/foobar
Key: 782e5c876139f00a5434b76f04e51d3f0aea031a
----------------------------------------
Risk Factor: high
Title: Modified files were discovered on the system in leapp repository directories
Summary: Apparently some modified files have been found in leapp repository installation directories.
Please consult the list of discovered files for more information:
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels/actor.py
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels/actor.pyo
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels/libraries
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels/libraries/checkinstalledkernels.py
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels/libraries/checkinstalledkernels.pyo
    - /usr/share/leapp-repository/repositories/system_upgrade/el7toel8/actors/quaggatofrr/libraries/quaggatofrr.py (quagga_to_frr Actor)
Key: 16c67599f6a7d53eb59c965955145c8578395598
----------------------------------------
Risk Factor: high
Title: Modified files were discovered on the system in leapp configuration directories
Summary: Apparently some modified files have been found in leapp configuration installation directories.
Please consult the list of discovered files for more information:
    - /etc/leapp/files/repomap.json
Key: 4b383112150a261cfa132c94ef7ec006e6bf3759
----------------------------------------

Which reflects all changes I made on the system. Tested on RHEL 7. In case of RHEL 8, I'm blocked on very rare bug that's most likely unrelated to this PR (reported in the passed already) and for which we do not have reproducer. So keeping that precious machine preserved now for another investigation later.


filename = fields.String()
actor_name = fields.String()
type = fields.StringEnum(choices=['custom', 'modified'])
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@fernflower I am sorry, I completely overlooked this. the type is keyword in python hence we suggest to use different names to not overshadow it. It's not big issue as in this context it has not functional impact, but what about change_type or event_type?

@pirat89
Copy link
Member

pirat89 commented Jan 11, 2024

@fernflower I am not blocking the current PR, but I think that current report msgs could be improved as current msg has potential to unexpectedly create additional pressure on support teams. User reading these msgs will not have answers on questions like

  • what does it mean?
  • what should I do?

Also hint with reinstalling the "leapp" package in case of the "framework" component could lead to the situation they

dnf reinstall leapp -y

which does not have to fix the problem, because they need to reinstall possibly python[23]-leapp, etc. I will create a commit/pr/.. with proposed improvement to save you a time.

@pirat89
Copy link
Member

pirat89 commented Jan 11, 2024

@fernflower @Rezney : added commit with the proposal of the new error msgs. Tests have been updated and fixed. Also the logic of the check actor is a little bit different to reflect better expectations. only 3 types of reports can be created now.

Adding changes as part of the squash commit to not interfere with existing commits. But pushing here directly to run all tests to see nothing is broken. In case it's ok, squash commit to one.

@pirat89
Copy link
Member

pirat89 commented Jan 12, 2024

Here is the new output from the updated version (I've realied a typo - missing space - so we should fix that one before the merge yet, but it's a nitpick.). In this case I've modified also a schema file from python2-leapp.

----------------------------------------
Risk Factor: high
Title: Detected custom leapp actors or files.
Summary: We have detected installed custom actors or files on the system. These can be provided e.g. by third party vendors, Red Hat consultants, or can be created by users to customize the upgrade (e.g. to migrate custom applications). This is allowed and appreciated. However Red Hat is not responsible for any issues caused by these custom leapp actors. Note that upgrade tooling is under agile development which could require more frequent update of custom actors.The list of custom leapp actors and files:
    - /usr/share/leapp-repository/custom-repositories/supplements/.leapp/info
    - /usr/share/leapp-repository/custom-repositories/supplements/.leapp/leapp.conf
    - /usr/share/leapp-repository/custom-repositories/supplements/actors/checkreboothygiene/actor.py (Actor: check_reboot_hygiene)
    - /usr/share/leapp-repository/custom-repositories/supplements/actors/checkreboothygiene/libraries/checkreboothygiene.py (Actor: check_reboot_hygiene)
    - /usr/share/leapp-repository/custom-repositories/supplements/actors/checkreboothygiene/tests/unit_test_checkreboothygiene.py
    - /usr/share/leapp-repository/repositories/system_upgrade/el7toel8/tools/foobar
Related links:
    - Customizing your Red Hat Enterprise Linux in-place upgrade: https://red.ht/customize-rhel-upgrade
Remediation: [hint] In case of any issues connected to custom or third party actors, contact vendor of such actors. Also we suggest to ensure the installed custom leapp actors are up to date, compatible with the installed packages.
Key: 2064870018370ce2bde3f977cf753ed8c59848d0
----------------------------------------
Risk Factor: high
Title: Detected modified configuration files in leapp configuration directories.
Summary: We have detected that some configuration files related to leapp or upgrade process have been modified. Some of these changes could be intended (e.g. modified repomap.json file in case of private cloud regions or customisations done on used Satellite server) so it is not always needed to worry about them. However they can impact the in-place upgrade and it is good to be aware of potential problems or unexpected results if they are not intended.
The list of modified configuration files:
    - /etc/leapp/files/repomap.json
Remediation: [hint] If some of changes in listed configuration files have not been intended, you can restore original files by following procedure:
1. Remove (or back up) modified files that you want to restore.
2. Reinstall packages which owns these files.
Key: 949e7060e875be8f50c3d3534d8124e473c65b2c
----------------------------------------
Risk Factor: high
Title: Detected modified files of the in-place upgrade tooling.
Summary: We have detected that some files of the tooling processing the in-place upgrade have been modified. Note that such modifications can be allowed only after consultation with Red Hat - e.g. when support suggests the change to resolve discovered problem. If these changes have not been approved by Red Hat, the in-place upgrade is unsupported.
Following files have been modified:
    - /usr/lib/python2.7/site-packages/leapp/utils/schemas.py
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/checkmemory/actor.py (Actor: checkmemory)
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels/actor.py
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels/actor.pyo
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels/libraries
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels/libraries/checkinstalledkernels.py
    - /usr/share/leapp-repository/repositories/system_upgrade/common/actors/kernel/checkinstalledkernels/libraries/checkinstalledkernels.pyo
Remediation: [hint] To restore original files reinstall related packages.
Key: 5532a4fe27dc0b05de1e9e77bda407ea47ad6971
----------------------------------------

This commit introduces two actors:
* the scanner that that scans leapp files and
  produces messages with actor name/filepath mapping in case
  any unexpected custom files or modified files were discovered.
* the checker that processes CustomModification messages and
  produces report entries.

* uses rpms.get_leapp_packages function
* pstodulk: Updated report messages to provide more information to users

The purpose of this change is to help with the investigation
of reported issues as people harm themselves from time to time
and as this is not usually expected, it prolongs the solution
of the problem (people investigating such issues do not check
this possibility as the first thing, which is understandable).
This should help to identify possible root causes faster as
report msg should be always visible.

Jira: RHEL-1774

Co-authored-by: Petr Stodulka <[email protected]>
@pirat89 pirat89 force-pushed the customcodechangeswarning branch from a498340 to f4f3c96 Compare January 12, 2024 09:51
Copy link
Member

@pirat89 pirat89 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

discussed my changes with @fernflower, we are good to go \o/ Thanks! I will merge it once tests are finished.

@pirat89 pirat89 merged commit 7c6e0d8 into oamg:master Jan 12, 2024
22 of 38 checks passed
@pirat89 pirat89 added the changelog-checked The merger/reviewer checked the changelog draft document and updated it when relevant label Jan 12, 2024
pirat89 added a commit to pirat89/leapp-repository that referenced this pull request Feb 13, 2024
## Packaging
- Requires xfsprogs and e2fsprogs (oamg#1154)
- Bump leapp-repository-dependencies to 10 (oamg#1154)

## Upgrade handling
### Fixes
- Detect changes in openssl default configuration file and restore it to the default to the target default during the upgrade to reduce risk of potential issues (oamg#1131)
- Do not try to download data files anymore when missing as the service is obsoleted since the data is part of installed packages (oamg#1120)
- Drop the invalid `tuv` target channel (oamg#1130)
- Fix handling of symlinks under /etc/pki when managing certificates (oamg#1135, oamg#1160, oamg#1166)
- Fix semanage import issue (oamg#1164)
- Fix the issue of going out of bounds in the isccfg parser (oamg#1124)
- Fix traceback when saving the rhsm facts results and the /etc/rhsm/facts directory doesn’t exist yet (oamg#1132)
- Handle the upgrade better when a proxy is configured in YUM/DNF configutations (oamg#1143)
- Load all rpm repository substitutions that dnf knows about, not just releasever since repofiles may use the other substitutions too (oamg#1134)
- Minor updates of generated reports (oamg#1151)
- Print nice error msg when device and driver deprecation data is malformed (oamg#1168)
- Report information about required manual steps after the upgrade when openssl-ibmca is installed (oamg#1131)
- Update error messages and reports when installed upgrade data files are malformed or missing (oamg#1120)
- [IPU 7 -> 8] Fix the upgrade of the RH Satellite server when tomcat is installed (oamg#1150)
- [IPU 8 -> 9] Fix the upgrade from RHEL 8.9+ when the release is locked by subscription-manager (oamg#1136, oamg#1138)

### Enhancements
- Update upgrade paths: (oamg#1146, oamg#1147, oamg#1175)
  - RHEL 7.9  -> 8.10, 8.8 (default: 8.10)
  - RHEL with SAPAHA 7.9  -> 8.10, 8.8 (default: 8.8)
  - RHEL w/o SAP HANA 8.8  -> 9.2
  - RHEL w/o SAP HANA 8.10 -> 9.4
- Added possibility to define DNF configuration for the target system (oamg#1143)
- Code cleaning: drop redundant and invalid NFS checks (oamg#1127)
- Default to NO_RHSM mode when subscription-manager is not found (oamg#1133)
- Detect customized configuration of dynamic linker (oamg#1118)
- Detect possible unexpected RPM GPG keys has been installed during RPM transaction (oamg#1101)
- Drop obsoleted upgrade paths that relates to releases: 8.6, 8.9, 9.0, 9.3 (oamg#1175)
- Ignore Leapp related PES events (oamg#1153)
- Introduce generic transition of systemd services states during the IPU (oamg#1060, oamg#1174)
- Introduce possibility to upgrade with local repositories (oamg#1099)
- Introduced some changes getting us closer to possibility of IPU for Centos (Stream) systems (oamg#1140)
- Report the upgrade customisations and modifications of the upgrade tooling (oamg#1148)
- Simplify handling of upgrades on systems using RHUI, reducing the maintenance burden for cloud providers (oamg#1057)
- Update the leapp upgrade data files - bump data stream to "3.0" (oamg#1163, oamg#1165, oamg#1170)
- [IPU 8 -> 9] Enable upgrades RHEL 8 -> 9 using RHUI on Alibaba cloud (oamg#1137, oamg#1165, oamg#1172)

## Additional changes interesting for devels
- Introduced new functions returning a list of packages related to upgrade - see the rpms library (oamg#1156)
- Make detection of installed signed packages distribution agnostic - covers RHEL & CentOS (oamg#876)
- Model InstalledRedHatSignedRPM is deprecated, replaced by DistributionSignedRPM (oamg#876)
pirat89 added a commit to pirat89/leapp-repository that referenced this pull request Feb 13, 2024
## Packaging
- Requires xfsprogs and e2fsprogs (oamg#1154)
- Bump leapp-repository-dependencies to 10 (oamg#1154)

## Upgrade handling
### Fixes
- Detect changes in openssl default configuration file and restore it to the default to the target default during the upgrade to reduce risk of potential issues (oamg#1131)
- Do not try to download data files anymore when missing as the service is obsoleted since the data is part of installed packages (oamg#1120)
- Drop the invalid `tuv` target channel (oamg#1130)
- Fix handling of symlinks under /etc/pki when managing certificates (oamg#1135, oamg#1160, oamg#1166)
- Fix semanage import issue (oamg#1164)
- Fix the issue of going out of bounds in the isccfg parser (oamg#1124)
- Fix traceback when saving the rhsm facts results and the /etc/rhsm/facts directory doesn’t exist yet (oamg#1132)
- Handle the upgrade better when a proxy is configured in YUM/DNF configutations (oamg#1143)
- Load all rpm repository substitutions that dnf knows about, not just releasever since repofiles may use the other substitutions too (oamg#1134)
- Minor updates of generated reports (oamg#1151)
- Print nice error msg when device and driver deprecation data is malformed (oamg#1168)
- Report information about required manual steps after the upgrade when openssl-ibmca is installed (oamg#1131)
- Update error messages and reports when installed upgrade data files are malformed or missing (oamg#1120)
- [IPU 7 -> 8] Fix the upgrade of the RH Satellite server when tomcat is installed (oamg#1150)
- [IPU 8 -> 9] Fix the upgrade from RHEL 8.9+ when the release is locked by subscription-manager (oamg#1136, oamg#1138)

### Enhancements
- Update upgrade paths: (oamg#1146, oamg#1147, oamg#1175)
  - RHEL 7.9  -> 8.10, 8.8 (default: 8.10)
  - RHEL with SAPAHA 7.9  -> 8.10, 8.8 (default: 8.8)
  - RHEL w/o SAP HANA 8.8  -> 9.2
  - RHEL w/o SAP HANA 8.10 -> 9.4
- Added possibility to define DNF configuration for the target system (oamg#1143)
- Code cleaning: drop redundant and invalid NFS checks (oamg#1127)
- Default to NO_RHSM mode when subscription-manager is not found (oamg#1133)
- Detect customized configuration of dynamic linker (oamg#1118)
- Detect possible unexpected RPM GPG keys has been installed during RPM transaction (oamg#1101)
- Drop obsoleted upgrade paths that relates to releases: 8.6, 8.9, 9.0, 9.3 (oamg#1175)
- Ignore Leapp related PES events (oamg#1153)
- Introduce generic transition of systemd services states during the IPU (oamg#1060, oamg#1174)
- Introduce possibility to upgrade with local repositories (oamg#1099)
- Introduced some changes getting us closer to possibility of IPU for Centos (Stream) systems (oamg#1140)
- Report the upgrade customisations and modifications of the upgrade tooling (oamg#1148)
- Simplify handling of upgrades on systems using RHUI, reducing the maintenance burden for cloud providers (oamg#1057)
- Update the leapp upgrade data files - bump data stream to "3.0" (oamg#1163, oamg#1165, oamg#1170)
- [IPU 8 -> 9] Enable upgrades RHEL 8 -> 9 using RHUI on Alibaba cloud (oamg#1137, oamg#1165, oamg#1172)

## Additional changes interesting for devels
- Introduced new functions returning a list of packages related to upgrade - see the rpms library (oamg#1156)
- Make detection of installed signed packages distribution agnostic - covers RHEL & CentOS (oamg#876)
- Model InstalledRedHatSignedRPM is deprecated, replaced by DistributionSignedRPM (oamg#876)
@pirat89 pirat89 mentioned this pull request Feb 13, 2024
pirat89 added a commit to pirat89/leapp-repository that referenced this pull request Feb 13, 2024
## Packaging
- Requires xfsprogs and e2fsprogs (oamg#1154)
- Bump leapp-repository-dependencies to 10 (oamg#1154)

## Upgrade handling
### Fixes
- Detect changes in openssl default configuration file and restore it to the default to the target default during the upgrade to reduce risk of potential issues (oamg#1131)
- Do not try to download data files anymore when missing as the service is obsoleted since the data is part of installed packages (oamg#1120)
- Drop the invalid `tuv` target channel (oamg#1130)
- Fix handling of symlinks under /etc/pki when managing certificates (oamg#1135, oamg#1160, oamg#1166)
- Fix semanage import issue (oamg#1164)
- Fix the issue of going out of bounds in the isccfg parser (oamg#1124)
- Fix traceback when saving the rhsm facts results and the /etc/rhsm/facts directory doesn’t exist yet (oamg#1132)
- Handle the upgrade better when a proxy is configured in YUM/DNF configutations (oamg#1143)
- Load all rpm repository substitutions that dnf knows about, not just releasever since repofiles may use the other substitutions too (oamg#1134)
- Minor updates of generated reports (oamg#1151)
- Print nice error msg when device and driver deprecation data is malformed (oamg#1168)
- Report information about required manual steps after the upgrade when openssl-ibmca is installed (oamg#1131)
- Update error messages and reports when installed upgrade data files are malformed or missing (oamg#1120)
- [IPU 7 -> 8] Fix the upgrade of the RH Satellite server when tomcat is installed (oamg#1150)
- [IPU 8 -> 9] Fix the upgrade from RHEL 8.9+ when the release is locked by subscription-manager (oamg#1136, oamg#1138)

### Enhancements
- Update upgrade paths: (oamg#1146, oamg#1147, oamg#1175)
  - RHEL 7.9  -> 8.10, 8.8 (default: 8.10)
  - RHEL with SAPAHA 7.9  -> 8.10, 8.8 (default: 8.8)
  - RHEL w/o SAP HANA 8.8  -> 9.2
  - RHEL w/o SAP HANA 8.10 -> 9.4
- Added possibility to define DNF configuration for the target system (oamg#1143)
- Code cleaning: drop redundant and invalid NFS checks (oamg#1127)
- Default to NO_RHSM mode when subscription-manager is not found (oamg#1133)
- Detect customized configuration of dynamic linker (oamg#1118)
- Detect possible unexpected RPM GPG keys has been installed during RPM transaction (oamg#1101)
- Drop obsoleted upgrade paths that relates to releases: 8.6, 8.9, 9.0, 9.3 (oamg#1175)
- Ignore Leapp related PES events (oamg#1153)
- Introduce generic transition of systemd services states during the IPU (oamg#1060, oamg#1174)
- Introduce possibility to upgrade with local repositories (oamg#1099)
- Introduced some changes getting us closer to possibility of IPU for Centos (Stream) systems (oamg#1140)
- Report the upgrade customisations and modifications of the upgrade tooling (oamg#1148)
- Simplify handling of upgrades on systems using RHUI, reducing the maintenance burden for cloud providers (oamg#1057)
- Update the leapp upgrade data files - bump data stream to "3.0" (oamg#1163, oamg#1165, oamg#1170)
- [IPU 8 -> 9] Enable upgrades RHEL 8 -> 9 using RHUI on Alibaba cloud (oamg#1137, oamg#1165, oamg#1172)
- Unify breakpoints inside the upgrade initramfs for the easier troubleshooting (oamg#1157)

## Additional changes interesting for devels
- Introduced new functions returning a list of packages related to upgrade - see the rpms library (oamg#1156)
- Make detection of installed signed packages distribution agnostic - covers RHEL & CentOS (oamg#876)
- Model InstalledRedHatSignedRPM is deprecated, replaced by DistributionSignedRPM (oamg#876)
pirat89 added a commit that referenced this pull request Feb 13, 2024
## Packaging
- Requires xfsprogs and e2fsprogs (#1154)
- Bump leapp-repository-dependencies to 10 (#1154)

## Upgrade handling
### Fixes
- Detect changes in openssl default configuration file and restore it to the default to the target default during the upgrade to reduce risk of potential issues (#1131)
- Do not try to download data files anymore when missing as the service is obsoleted since the data is part of installed packages (#1120)
- Drop the invalid `tuv` target channel (#1130)
- Fix handling of symlinks under /etc/pki when managing certificates (#1135, #1160, #1166)
- Fix semanage import issue (#1164)
- Fix the issue of going out of bounds in the isccfg parser (#1124)
- Fix traceback when saving the rhsm facts results and the /etc/rhsm/facts directory doesn’t exist yet (#1132)
- Handle the upgrade better when a proxy is configured in YUM/DNF configutations (#1143)
- Load all rpm repository substitutions that dnf knows about, not just releasever since repofiles may use the other substitutions too (#1134)
- Minor updates of generated reports (#1151)
- Print nice error msg when device and driver deprecation data is malformed (#1168)
- Report information about required manual steps after the upgrade when openssl-ibmca is installed (#1131)
- Update error messages and reports when installed upgrade data files are malformed or missing (#1120)
- [IPU 7 -> 8] Fix the upgrade of the RH Satellite server when tomcat is installed (#1150)
- [IPU 8 -> 9] Fix the upgrade from RHEL 8.9+ when the release is locked by subscription-manager (#1136, #1138)

### Enhancements
- Update upgrade paths: (#1146, #1147, #1175)
  - RHEL 7.9  -> 8.10, 8.8 (default: 8.10)
  - RHEL with SAPAHA 7.9  -> 8.10, 8.8 (default: 8.8)
  - RHEL w/o SAP HANA 8.8  -> 9.2
  - RHEL w/o SAP HANA 8.10 -> 9.4
- Added possibility to define DNF configuration for the target system (#1143)
- Code cleaning: drop redundant and invalid NFS checks (#1127)
- Default to NO_RHSM mode when subscription-manager is not found (#1133)
- Detect customized configuration of dynamic linker (#1118)
- Detect possible unexpected RPM GPG keys has been installed during RPM transaction (#1101)
- Drop obsoleted upgrade paths that relates to releases: 8.6, 8.9, 9.0, 9.3 (#1175)
- Ignore Leapp related PES events (#1153)
- Introduce generic transition of systemd services states during the IPU (#1060, #1174)
- Introduce possibility to upgrade with local repositories (#1099)
- Introduced some changes getting us closer to possibility of IPU for Centos (Stream) systems (#1140)
- Report the upgrade customisations and modifications of the upgrade tooling (#1148)
- Simplify handling of upgrades on systems using RHUI, reducing the maintenance burden for cloud providers (#1057)
- Update the leapp upgrade data files - bump data stream to "3.0" (#1163, #1165, #1170)
- [IPU 8 -> 9] Enable upgrades RHEL 8 -> 9 using RHUI on Alibaba cloud (#1137, #1165, #1172)
- Unify breakpoints inside the upgrade initramfs for the easier troubleshooting (#1157)

## Additional changes interesting for devels
- Introduced new functions returning a list of packages related to upgrade - see the rpms library (#1156)
- Make detection of installed signed packages distribution agnostic - covers RHEL & CentOS (#876)
- Model InstalledRedHatSignedRPM is deprecated, replaced by DistributionSignedRPM (#876)
yuravk pushed a commit to yuravk/leapp-repository that referenced this pull request Aug 9, 2024
## Packaging
- Requires xfsprogs and e2fsprogs (oamg#1154)
- Bump leapp-repository-dependencies to 10 (oamg#1154)

## Upgrade handling
### Fixes
- Detect changes in openssl default configuration file and restore it to the default to the target default during the upgrade to reduce risk of potential issues (oamg#1131)
- Do not try to download data files anymore when missing as the service is obsoleted since the data is part of installed packages (oamg#1120)
- Drop the invalid `tuv` target channel (oamg#1130)
- Fix handling of symlinks under /etc/pki when managing certificates (oamg#1135, oamg#1160, oamg#1166)
- Fix semanage import issue (oamg#1164)
- Fix the issue of going out of bounds in the isccfg parser (oamg#1124)
- Fix traceback when saving the rhsm facts results and the /etc/rhsm/facts directory doesn’t exist yet (oamg#1132)
- Handle the upgrade better when a proxy is configured in YUM/DNF configutations (oamg#1143)
- Load all rpm repository substitutions that dnf knows about, not just releasever since repofiles may use the other substitutions too (oamg#1134)
- Minor updates of generated reports (oamg#1151)
- Print nice error msg when device and driver deprecation data is malformed (oamg#1168)
- Report information about required manual steps after the upgrade when openssl-ibmca is installed (oamg#1131)
- Update error messages and reports when installed upgrade data files are malformed or missing (oamg#1120)
- [IPU 7 -> 8] Fix the upgrade of the RH Satellite server when tomcat is installed (oamg#1150)
- [IPU 8 -> 9] Fix the upgrade from RHEL 8.9+ when the release is locked by subscription-manager (oamg#1136, oamg#1138)

### Enhancements
- Update upgrade paths: (oamg#1146, oamg#1147, oamg#1175)
  - RHEL 7.9  -> 8.10, 8.8 (default: 8.10)
  - RHEL with SAPAHA 7.9  -> 8.10, 8.8 (default: 8.8)
  - RHEL w/o SAP HANA 8.8  -> 9.2
  - RHEL w/o SAP HANA 8.10 -> 9.4
- Added possibility to define DNF configuration for the target system (oamg#1143)
- Code cleaning: drop redundant and invalid NFS checks (oamg#1127)
- Default to NO_RHSM mode when subscription-manager is not found (oamg#1133)
- Detect customized configuration of dynamic linker (oamg#1118)
- Detect possible unexpected RPM GPG keys has been installed during RPM transaction (oamg#1101)
- Drop obsoleted upgrade paths that relates to releases: 8.6, 8.9, 9.0, 9.3 (oamg#1175)
- Ignore Leapp related PES events (oamg#1153)
- Introduce generic transition of systemd services states during the IPU (oamg#1060, oamg#1174)
- Introduce possibility to upgrade with local repositories (oamg#1099)
- Introduced some changes getting us closer to possibility of IPU for Centos (Stream) systems (oamg#1140)
- Report the upgrade customisations and modifications of the upgrade tooling (oamg#1148)
- Simplify handling of upgrades on systems using RHUI, reducing the maintenance burden for cloud providers (oamg#1057)
- Update the leapp upgrade data files - bump data stream to "3.0" (oamg#1163, oamg#1165, oamg#1170)
- [IPU 8 -> 9] Enable upgrades RHEL 8 -> 9 using RHUI on Alibaba cloud (oamg#1137, oamg#1165, oamg#1172)
- Unify breakpoints inside the upgrade initramfs for the easier troubleshooting (oamg#1157)

## Additional changes interesting for devels
- Introduced new functions returning a list of packages related to upgrade - see the rpms library (oamg#1156)
- Make detection of installed signed packages distribution agnostic - covers RHEL & CentOS (oamg#876)
- Model InstalledRedHatSignedRPM is deprecated, replaced by DistributionSignedRPM (oamg#876)

(cherry picked from commit 6421225)
@pirat89 pirat89 added the shortened-urls PR is introducing new shortened red.ht URLs label Aug 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
changelog-checked The merger/reviewer checked the changelog draft document and updated it when relevant report Any reports have been added / removed / changed in the PR shortened-urls PR is introducing new shortened red.ht URLs
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants