Stabilize support for updating IPMI credentials
Continuation of https:/
First:
* Switch to HTTP arguments set_ipmi_username (default to driver_
* Keep this feature disabled via configuration
* Update client to accept set_ipmi_
* Store credentials in Ironic after returning to the ramdisk
* Skip supporting iLO and DRAC for now, file a bug
* Limit accepted passwords for now: a-zA-Z0-9, 20 symbols max
Then:
* Mark feature as stable and supported, update README
* Apply required changes to D-I-B element
* Update and land functional test https:/
Blueprint information
- Status:
- Complete
- Approver:
- None
- Priority:
- High
- Drafter:
- Dmitry Tantsur
- Direction:
- Approved
- Assignee:
- Dmitry Tantsur
- Definition:
- Approved
- Series goal:
- Accepted for kilo
- Implementation:
- Implemented
- Milestone target:
- 1.1.0
- Started by
- Dmitry Tantsur
- Completed by
- Dmitry Tantsur
Related branches
Related bugs
Sprints
Whiteboard
Gerrit topic: https:/
Addressed by: https:/
Revamp support for setting IPMI credentials
Addressed by: https:/
Client and doc update for setting IPMI credentials
Addressed by: https:/
Documentation and strings update
https:/
Addressed by: https:/
Require maintenance mode for setting IPMI credentials
Addressed by: https:/
Functional test for setting IPMI credentials
Addressed by: https:/
Don't wait for too long for IPMI credentials update
Addressed by: https:/
Also set IPMI address if it's not set already
Work Items
Dependency tree
* Blueprints in grey have been implemented.