-
Wed May 17 2023 Alex Burmashev <alexander.burmashev@oracle.com> - 0.18.0-1.0.4
- Drop unwanted upstream Insights functionality [Orabug: 35401379]
-
Tue May 16 2023 Alex Burmashev <alexander.burmashev@oracle.com> - 0.18.0-1.0.3
- Update upstream references
-
Tue May 16 2023 Alex Burmashev <alexander.burmashev@oracle.com> - 0.18.0-1.0.2
- Add data stream information to provided Oracle data sources
-
Tue May 16 2023 Alex Burmashev <alexander.burmashev@oracle.com> - 0.18.0-1.0.1
- Rebase Oracle patches on new source
- Add Oracle Patches
- Fix patch numbering
- 1000-Add-Oracle-Linux-Support.patch [Orabug: 32187416]
- 1001-Add-InstalledOracleSignedRPM-Message.patch [Orabug: 32076068]
- 1002-Add-UEK-Kernel-Support.patch [Orabug: 32187416]
- 1003-Rename-Upstream-Specific-Actors.patch [Orabug: 32076068]
- 1004-UEKR6-Overlayfs-fix.patch [Orabug: 32187481]
- 1005-Replace-Upstream-Bugzilla-URLs.patch [Orabug: 32076068]
- 1006-Replace-Upstream-Refs.patch [Orabug: 32076068]
- 1007-BTRFS-Support-UEK-only.patch [Orabug: 32187404]
- 1008-Remove-Upstream-SM.patch [Orabug: 32076068]
- 1009-Add-OL9-Upgrade-Repositories.patch [Orabug: 32214409]
- 1010-Fix-SCTP-crash-on-arm.patch [Orabug: 32248761]
- 1011-Keep-Default-Boot-Kernel.patch [Orabug: 32251187]
- 1012-Add-Oracle-DNF-Plugin.patch [Orabug: 32076068]
- 1013-BTRFS-RAID-Upgrade-Initramfs-fix.patch [Orabug: 32295600]
- 1014-Set-All-Installed-Kernel-Parameters.patch [Orabug: 32251187]
- 1015-Etc-Sysconfig-Kernel-fix.patch [Orabug: 32251187]
- 1016-BTRFS-RAID-inhibit.patch [Orabug: 32295600]
- 1017-Check-OSMS-Inhibit-Actor.patch [JIRA: OLDIS-3436]
- 1018-Fix-License-Reboot-Issue.patch [Orabug: 32612983]
- 1019-Support-OCI-Vars.patch [Orabug: 32826595]
- 1020-Fix-Cloud-Init-Cache-After-Upgrade.patch [Orabug: 32857588]
- 1021-Detect-and-Inhibit-OCI-BM-Shapes.patch [Orabug: 32858440]
- 1022-EFI-Grubenv-Fix.patch [Orabug: 32858036]
- 1023-Oracle-UEKR6-RDMA-Check.patch [Orabug: 33124455]
- 1024-Oracle-OLM-Check.patch [OraBug: 33252470]
- 1025-Post-Enable-Repos.patch [Orabug: 33210937]
- 1026-Oracle-KVM-Check.patch [OraBug: 33599932]
- 1027-KVM-Persistentnetnames-Fix.patch [Orabug: 33639916]
- 1028-Remove-Upstream-SM-Args.patch [Orabug: 32076068]
- 1039-Add-Oracle-Repos-parameters.patch [JIRA: OLDIS-5135]
- 1030-OCI-vars-substitution.patch [Orabug: 32826595].
- 1031-Oracle-UEKR7-Check.patch [OraBug: 34211484]
- 1032-Check-vdo-fix.patch [Orabug: 34288152]
- 1033-Fix-Upgrade-Emergency-Shell-Issue.patch [Orabug: 34279930]
- 1034-OSWatcher-To-PCP-Actor.patch [Orabug: 34417308]
- 1035-bug34685865-remove-upstream-refs.patch [Orabug: 34685865]
- 1036-bug34498434-remove-upstream-refs.patch [Orabug: 34498434]
- 1037-bug34299313-update-remediation-example.patch [Orabug: 34299313]
- 1038-bug34685557-update-deprecated-tags-flags.patch [Orabug: 34685557]
- 1039-bug34746134-Add-OL9-UEKR7-aarch64-Repomap.patch [Orabug: 34746134]
- 1040-bug34817186-Remove-make-devel-Package.patch [Orabug: 34817186]
- 1041-bug34790352-Replace-Upstream-Refs.patch [Orabug: 34790352]
- Update package maps for gcc-toolset-11 [Orabug: 34730810]
- Fix wrong type usage: 1042-Fix-typo-in-pes_events_scanner.py.patch
- Ported Upgrading from ISO from Redhat to Oracle Linux:
- Added Oracle GPG keys and updated references in tests:
- 1044-Add-Oracle-GPG-Keys.patch [Orabug: 35300648]
- 1043-Replace-RHEL-ISO-Check-with-OL-ISO-Check.patch [Orabug: 35304571],[Orabug: 35304815]
- Replaced Redhat references with Oracle and removed hardcoding from repos:
- 1045-Updated-RH-References.patch [Orabug: 34939638], [Orabug: 35329169]
- 1046-Repomap-Hardcoding-Fix.patch [Orabug: 35342218]
-
Tue Feb 21 2023 Petr Stodulka <pstodulk@redhat.com> - 0.18.0-1
- Rebase to v0.18.0
- Introduce new upgrade path RHEL 8.8 -> 9.2
- Requires cpio
- Requires python3-gobject-base, NetworkManager-libnm
- Bump leapp-repository-dependencies to 9
- Add breadcrumbs results to RHSM facts
- Add leapp RHUI packages to an allowlist to drop confusing reports
- Added checks for RHEL SAP IPU 8.6 -> 9.0
- Check RPM signatures during the upgrade
- Check only mounted XFS partitions
- Check the validity and compatitibility of used leapp data
- Detect CIFS also when upgrading from RHEL8 to RHEL9 (PR1035)
- Detect RoCE on IBM Z machines and check the configuration is safe for the upgrade
- Detect a proxy configuration in YUM/DNF and adjust an error msg on issues caused by the configuration
- Detect and report systemd symlinks that are broken before the upgrade
- Detect the kernel-core RPM instead of kernel to prevent an error during post-upgrade phases
- Disable the amazon-id DNF plugin on AWS during the upgrade stage to omit confusing error messages
- Do not create new *pyc files when running leapp after the DNF upgrade transaction
- Drop obsoleted upgrade paths
- Enable upgrades of RHEL 8 for SAP HANA to RHEL 9 on ppc64le
- Enable upgrades on s390x when /boot is part of rootfs
- Extend the allow list of RHUI clients by azure-sap-apps to omit confusing report
- Filter out PES events unrelated for the used upgrade path and handle overlapping event
(fixes upgrades with quagga installed)
- Fix scan of ceph volumes on systems without ceph-osd or when ceph-osd container is not found
- Fix systemd symlinks that become incorrect during the IPU
- Fix the check of memory (RAM) limits and use human readable values in the report
- Fix the kernel detection during initramfs creation for new kernel on RHEL 9.2+
- Fix the upgrade of IBM Z machines configured with ZFCP
- Fix the upgrade on Azure using RHUI for SAP Apps images
- Ignore external accounts in /etc/passwd
- Improve remediation instructions for packages in unknown repositories
- Improve the error message to guide users when discovered more space is needed
- Improve the handling of blocklisted certificates
- Inhibit the upgrade when entries in /etc/fstab cause overshadowing during the upgrade
- Introduced an option to use an ISO file as a target RHEL version content source
- Introduced possibility to specify what systemd services should be enabled/disabled on the upgraded system
- Introduced the --nogpgcheck option to skip checking of RPM signatures
- Map the target repositories also based on the installed content
- Prevent re-run of leapp in the upgrade initramfs in case of previous failure
- Prevent the upgrade with RHSM when Baseos and Appstream target repositories are not discovered
- Provide common information about systemd services
- RHUI(Azure) Handle correctly various SAP images
- Register subscribed systems automatically to Red Hat Insights unless --no-insights-register is used
- Remove obsoleted GPG keys provided by RH after the upgrade to prevent errors
- Rework the network configuration handling and parse the configuration data properly
- Set the system release lock after the upgrade also for premium channels
- Small improvements in various reports
- Resolves: rhbz#2088492, rhbz#2111691, rhbz#2127920, rhbz#2129716,rhbz#2139907, rhbz#2139907, rhbz#2141393, rhbz#2143372, rhbz#2155661
-
Wed Sep 07 2022 Petr Stodulka <pstodulk@redhat.com> - 0.17.0-3
- Adding back instruction to not install rubygem-irb during the in-place upgrade
to prevent conflict between files
- Resolves: rhbz#2090995
-
Wed Sep 07 2022 Petr Stodulka <pstodulk@redhat.com> - 0.17.0-2
- Update VDO checks to enable user to decide the system state on check failures
and undetermined block devices
- The VDO dialog and related VDO reports have been properly updated
- Resolves: rhbz#2096159
-
Wed Aug 24 2022 Petr Stodulka <pstodulk@redhat.com> - 0.17.0-1
- Rebase to v0.17.0
- Support upgrade path RHEL 8.7 -> 9.0 and RHEL SAP 8.6 -> 9.0
- Provide and require leapp-repository-dependencies 7
- Provide `leapp-command(<CMD>)` for each CLI command provided by leapp-repository
- Require dracut, kmod, procps-ng on RHEL 8+
- Require leapp-framework >= 3.1
- Add actors covering removal of NIS components on RHEL 9
- Add checks for obsolete .NET versions
- Allow specifying the report schema v1.2.0
- Check and handle upgrades with custom crypto policies
- Check and migrate OpenSSH configuration
- Check and migrate multipath configuration
- Check minimum memory requirements
- Do not create the upgrade bootloader entry when the dnf dry-run actor stops the upgrade
- Enable Base and SAP in-place upgrades on Azure
- Enable in-place upgrade in case LUKS volumes are Ceph OSDs
- Enable in-place upgrades in Azure RHEL 8 base images using RHUI
- Enable in-place upgrades on IBM z16 machines
- Enable the CRB repository for the upgrade only if enabled on the source system
- Fix cloud provider detection on AWS
- Fix detection of the latest kernel
- Fix issues caused by leapp artifacts from previous in-place upgrades
- Fix issues with false positive switch to emergency console during the upgrade
- Fix swap page size on aarch64
- Fix the VDO scanner to skip partitions unrelated to VDO and adjust error messages
- Fix the false positive NFS storage detection on NFS servers and improve the report msg
- Fix the issues on systems with the LANGUAGE environment variable
- Fix the root directory scan to deal with non-utf8 filenames
- Handle upgrades of SAP systems on AWS
- Inform about necessary migrations related to bacula-director when installed on the system
- Inhibit the upgrade when /var/lib/leapp being mounted in a non-persistent fashion to prevent failures
- Inhibit the upgrade when /var/lib/leapp mounted with the noexec option to prevent failures
- Inhibit upgrade when NVIDIA driver is detected
- Make the application of custom selinux rules more reliable and do not override changes done by RPM scriptlets
- Migrate the OpenSSL configuration
- PESEventScanner actor has been fully refactored
- Report changes around SCP and SFTP
- Skip comment lines when parsing the GRUB configuration file
- Stop propagating the “debug” and ”enforcing=0” kernel cmdline options into the target kernel cmdline options
- Mass refactoring to be compatible with leapp v0.15.0
- Resolves: rhbz#2090995, rhbz#2040470, rhbz#2092005, rhbz#2093220, rhbz#2095704, rhbz#2096159, rhbz#2100108, rhbz#2100110, rhbz#2103282, rhbz#2106904, rhbz#2110627
-
Wed Apr 27 2022 Petr Stodulka <pstodulk@redhat.com> - 0.16.0-6
- Skip comments in /etc/default/grub during the parsing
- Resolves: #1997076
-
Tue Apr 26 2022 Petr Stodulka <pstodulk@redhat.com> - 0.16.0-5
- Migrate blacklisted CA certificates during the upgrade
- Resolves: #1997076