Skip to content

Releases: gprocunier/calabi

Calabi v1.2.1

18 Apr 18:19

Choose a tag to compare

Calabi v1.2.1 (2026-04-18)

This maintenance release hardens bootstrap sequencing after v1.2.0, with the
most important fixes centered on authoritative DNS bring-up and the new
on-prem staged runner flow.

What Changed

DNS Bootstrap Reliability

  • Taught the hypervisor uplink bootstrap to prefer authoritative IdM DNS as
    soon as it is reachable, instead of hard-coding a single transition target.
  • Taught bastion host-side provisioning and bastion guest bootstrap to derive
    DNS servers from the current bootstrap stage, preserving fallback behavior
    until IdM DNS is actually available.
  • Reduced early bootstrap failures where bastion or hypervisor work could race
    ahead of authoritative DNS availability.

Bastion And Guest Staging Hardening

  • Added more robust bastion guest RHSM registration handling for both
    activation-key and username/password paths.
  • Improved host-side bastion disk reseed handling by resolving the real block
    device path and tolerating benign partition reread behavior.
  • Tightened supporting guest and host bootstrap tasks around staged package and
    service preparation.

On-Prem Runner Flow

  • Fixed on-prem bastion-stage inventory/runtime issues that could break
    wrapper-driven site-bootstrap runs.
  • Added on-prem runner scripts for tracked workstation, bastion, and remote
    bastion execution:
    • on-prem-openshift-demo/scripts/run_local_playbook.sh
    • on-prem-openshift-demo/scripts/run_bastion_playbook.sh
    • on-prem-openshift-demo/scripts/run_remote_bastion_playbook.sh
  • Added on-prem-openshift-demo/scripts/lab-dashboard.sh support for tracked
    runner state and operator visibility.

Docs And Publish Tree

  • Updated AWS and on-prem docs to use tracked runner wrappers as the operator
    entrypoints for the automation flow.
  • Published sanitized inventory defaults in the release tree so GitHub-facing
    content does not carry local operator addresses or lab credentials.
  • Kept the validated AWS deployment path intact while documenting the on-prem
    path as the alternate staged target.

Release Status

  • Release tag: v1.2.1
  • Current validated release for the sanitized publish tree
  • Includes bootstrap DNS reliability fixes and on-prem staged-flow hardening

Key Entry Points

  • Main lab entry: aws-metal-openshift-demo/README.md
  • Main docs map: aws-metal-openshift-demo/docs/README.md
  • On-prem docs map: on-prem-openshift-demo/docs/README.md
  • AWS bootstrap wrapper: aws-metal-openshift-demo/scripts/run_local_playbook.sh
  • On-prem bootstrap wrapper: on-prem-openshift-demo/scripts/run_local_playbook.sh

Notes

  • v1.2.1 supersedes v1.2.0 as the current release tag.
  • The GitHub Pages docs workflow remains functional on this release line.

Calabi v1.2.0

09 Apr 07:49

Choose a tag to compare

Calabi v1.2.0 (2026-04-09)

This release adds an experimental on-prem deployment mode while keeping the
validated AWS-target path intact.

What Changed

Experimental On-Prem Deployment Mode

  • Added a new on-prem subtree:
    • on-prem-openshift-demo/
  • Added on-prem entrypoints for:
    • playbooks/site-bootstrap.yml
    • playbooks/site-lab.yml
  • Added an on-prem host bootstrap path that assumes:
    • a preinstalled RHEL hypervisor
    • an operator-provided LVM volume group for guest storage
  • Added on-prem guest disk provisioning that:
    • validates volume-group existence
    • validates free space before lvcreate
    • creates the expected guest logical volumes
    • publishes /dev/ebs/* compatibility symlinks

AWS-Safe Isolation

  • Reworked the on-prem implementation so the validated AWS codepath stays
    pristine.
  • Kept all on-prem-specific behavior in local wrappers and on-prem-local
    playbooks instead of modifying aws-metal-openshift-demo/.
  • Added an explicit on-prem bastion-to-hypervisor handoff model with:
    • on_prem_bastion_hypervisor_host
    • on_prem_bastion_hypervisor_user
  • Removed the runtime requirement for ec2-user on the on-prem hypervisor.

On-Prem Docs

  • Added an on-prem docs set under:
    • on-prem-openshift-demo/docs/
  • Covered the early steps that differ materially from AWS:
    • prerequisites
    • automation flow
    • manual process
    • host sizing and resource policy
    • portability and gap analysis
  • Marked the on-prem path as experimental in the source docs.
  • Added explicit handoff points back to the main AWS docs once bastion staging
    is complete.
  • Tightened the on-prem prose so it reads like operator guidance rather than an
    analysis memo.

GitHub Pages

  • Added the on-prem docs to the rendered site as first-class Pages routes.
  • Added an experimental on-prem entry from the main site flow while keeping the
    primary top-level navigation unchanged:
    • OPEN THE LAB
    • DOCS MAP
  • Surfaced the on-prem path from:
    • the repo root landing page
    • the docs map
  • Added a Pages-side experimental treatment for the on-prem subtree and kept
    the docs handoff back to the main AWS docs clear.

Release Status

  • Release tag: v1.2.0
  • Current validated clean-deploy release
  • The validated AWS-target deployment path remains the primary release path
  • The on-prem mode is included as an experimental alternate target

Key Entry Points

  • Main lab entry: aws-metal-openshift-demo/README.md
  • Main docs map: aws-metal-openshift-demo/docs/README.md
  • On-prem docs map: on-prem-openshift-demo/docs/README.md
  • On-prem bootstrap: on-prem-openshift-demo/playbooks/site-bootstrap.yml
  • On-prem lab entry: on-prem-openshift-demo/playbooks/site-lab.yml

Notes

  • v1.2.0 supersedes v1.1.0 as the current release tag.
  • The AWS-target path remains the validated baseline.
  • The GitHub Pages workflow is functional, but the stock Actions dependencies
    still emit a Node 20 deprecation advisory that should be cleaned up in a
    future maintenance change.

Calabi v1.1.0

09 Apr 05:13

Choose a tag to compare

Calabi v1.1.0 (2026-04-09)

This release captures the merge of the calabi-ad-services feature branch into
main, plus the validation and documentation work needed to cut a clean
release from it.

What Changed

AD Services And Trust Flow

  • Added the AD support-service path to the orchestration flow.
  • Formalized the support-service order around:
    • AD server
    • IdM
    • IdM/AD trust
    • bastion join
  • Codified the AD/IdM bridge data and the trust-side group mapping model that
    feeds downstream auth consumers.

Authentication Model

  • Kept OpenShift on the validated auth baseline of:
    • HTPasswd breakglass
    • Keycloak OIDC
    • group-based RBAC
  • Replaced AAP direct LDAP auth with Keycloak OIDC as the clean-build path.
  • Validated AD-backed user login to AAP on:
    • the repaired in-place deployment path
    • a clean AAP teardown and redeploy

Orchestration Hardening

  • Hardened bastion-local generated workspace ownership handling for:
    • generated/ocp
    • generated/tools
  • Fixed stale tool-path and helper-path assumptions in post-install validation
    and installer-binary publication.
  • Added bounded recovery to day-2 roles where a single bad pod or daemonset
    member could strand a long deployment, including:
    • NMState
    • Web Terminal
    • AAP
    • virtualization handler rollout
  • Fixed multiple fresh-deploy defects discovered during validation runs, such as:
    • missing mirror-registry Podman drop-in directory creation
    • install-wait assumptions about rendezvous metadata
    • post-install variable ordering and fact-default issues

Documentation And Pages

  • Refreshed the runbooks and architecture docs to match the current validated
    deployment shape.
  • Reworked manual-process.md to reflect the real support-service order,
    trust checkpointing, clean-redeploy guidance, and the current auth baseline.
  • Published the GitHub Pages site for the docs set.
  • Tightened the Pages structure around the repo’s authored reading flow:
    • repo root README as the site entrypoint
    • OPEN THE LAB
    • DOCS MAP
  • Fixed Mermaid rendering, linked inline repo paths back to source, and
    cleaned up oversized or noisy rendered diagrams.

Release Status

  • Release tag: v1.1.0
  • Current validated clean-deploy release
  • Clean deployment confirmed on the current codebase

Key Entry Points

  • Lab entry point: aws-metal-openshift-demo/README.md
  • Docs map: aws-metal-openshift-demo/docs/README.md
  • Build/rebuild order: aws-metal-openshift-demo/docs/automation-flow.md
  • Manual runbook: aws-metal-openshift-demo/docs/manual-process.md
  • Auth model: aws-metal-openshift-demo/docs/authentication-model.md

Notes

  • v1.1.0 supersedes v1.0.0 as the current validated release.
  • The GitHub Pages workflow is functional, but the stock Actions dependencies
    still emit a Node 20 deprecation advisory that should be cleaned up in a
    future maintenance change.

Calabi v1.0.0

05 Apr 21:06

Choose a tag to compare

Calabi v1.0.0 (2026-04-05)

This is the first tagged release of Calabi.

Calabi is an Ansible-driven, single-host, fully disconnected OpenShift 4 lab
built on nested KVM. It is designed to let you demonstrate and iterate on
production-patterned installer and day-2 workflows while keeping the
infrastructure shape realistic.

What’s Included

  • aws-metal-openshift-demo/: the main lab implementation (AWS scaffolding,
    hypervisor bootstrap, support guests, disconnected OpenShift install, day-2).
  • cockpit/calabi-observer/: Cockpit plugin providing real-time observability
    for the host resource management system on virt-01 (RPM spec included).
  • Documentation map and deep-dive guides under aws-metal-openshift-demo/docs/.

Default Guest Sizing (Current)

  • OpenShift 4.20.15
  • 3 masters: 8 vCPU / 24 GiB
  • 3 infra: 16 vCPU / 64 GiB
  • 3 workers: 12 vCPU / 16 GiB

These values come from aws-metal-openshift-demo/vars/guests/openshift_cluster_vm.yml
and are discussed in aws-metal-openshift-demo/docs/host-resource-management.md.

See aws-metal-openshift-demo/docs/prerequisites.md for controller and input
expectations (including ansible-core 2.18 and a RHEL 10.1 guest image source).

Getting Started

  • Entry point: aws-metal-openshift-demo/README.md
  • Docs map: aws-metal-openshift-demo/docs/README.md
  • Build/rebuild run order: aws-metal-openshift-demo/docs/automation-flow.md

Security And Secrets

Calabi intentionally references secret inputs by path and keeps live credential
material out of Git. Start with:

  • aws-metal-openshift-demo/docs/secrets-and-sanitization.md

Notes

  • This is an inaugural release; there are no prior version tags to upgrade
    from. Future releases should add new entries to CHANGELOG.md.