Jeremy Stanley 7c18d43632 Private embargoed vulnerability announcement list
Add an embargo-notice@lists.openstack.org mailing list for private
advance notification of embargoed security vulnerabilities to
downstream stakeholders. Subscribers will be manually added by the
OpenStack Vulnerability Management Team, and all posts to this list
from non-VMT members will be moderated by the VMT. This is intended
as a very low-volume ML for announcements only, and followup replies
will be directed to use comments in corresponding private bugs
instead of the embargo-notice list.

Change-Id: I9a31fd5151e45644c9fb2209b69250b108b04889
2016-06-13 15:41:02 +00:00
2016-06-09 10:48:49 -07:00
2016-04-29 22:16:52 +02:00
2016-05-06 19:43:35 -07:00
2015-09-02 22:44:56 -04:00
2016-06-02 10:47:36 +03:00
2016-05-02 18:48:38 -07:00
2014-09-30 12:40:59 -07:00
2013-09-23 18:29:18 +00:00
2015-12-28 19:43:23 +01:00

Puppet Modules

These are a set of puppet manifests and modules that are currently being used to manage the OpenStack Project infrastructure.

The main entry point is in manifests/site.pp.

In general, most of the modules here are designed to be able to be run either in agent or apply mode.

These puppet modules require puppet 2.7 or greater. Additionally, the site.pp manifest assumes the existence of hiera.

See http://docs.openstack.org/infra/system-config for more information.

Documentation

The documentation presented at http://docs.openstack.org/infra/system-config comes from git://git.openstack.org/openstack-infra/system-config repo's docs/source. To build the documentation use

$ tox -evenv python setup.py build_sphinx

Description
System configuration for the OpenDev Collaboratory
Readme 152 MiB
Languages
Python 37.1%
Jinja 36.6%
Shell 13.6%
Dockerfile 3.8%
JavaScript 3%
Other 5.9%