Skip to content
Snippets Groups Projects
  1. Aug 24, 2020
  2. Aug 22, 2020
  3. Aug 21, 2020
  4. Aug 20, 2020
  5. Aug 19, 2020
    • Zuul's avatar
      393888a1
    • Pierre Riteau's avatar
      Add workaround for keystonemiddleware/neutron memcached issue · 5a52d8e4
      Pierre Riteau authored
      There is an issue where keystonemiddleware connections to memcached from
      neutron-server grow beyond configured values [1], eventually reaching
      the maximum number of connections accepted by memcached servers. Other
      services do not appear to be affected by this issue.
      
      A workaround is to use the advanced memcached pool. Despite its
      documentation claiming to only work with Python 2, it appears to work
      fine on Python 3.
      
      [1] https://bugs.launchpad.net/keystonemiddleware/+bug/1883659
      
      Change-Id: Ifbbc2022839cbc575848d830600241c61603c80b
      Closes-Bug: #1892210
      5a52d8e4
    • Zuul's avatar
      Merge "CI: enable Ansible SSH pipelining" · db6a9d61
      Zuul authored
      db6a9d61
    • Jegor van Opdorp's avatar
      Add cinder auth config to nova-cell nova.conf.j2 · de16013b
      Jegor van Opdorp authored
      Fixes an issue during deleting evacuated instances with encrypted block
      devices.
      
      Change-Id: I9b9b689ef7e1e41b597e2c5f6b96f3ed011193c5
      Closes-Bug: 1891462
      Related-Bug: 1850279
      de16013b
    • likui's avatar
      Fix ownership and permissions of admin-openrc.sh · 16f97867
      likui authored
      
      Previously the post-deploy.yml playbook was executed with become: true,
      and the admin-openrc.sh file templated without an owner or mode
      specified. This resulted in admin-openrc.sh being owned by root with 644
      permissions.
      
      This change creates the file without become: true, and explicitly sets
      the owner to the user executing Ansible, and the mode to 600.
      
      Co-Authored-By: default avatarMark Goddard <mark@stackhpc.com>
      
      Closes-Bug: #1891704
      
      Change-Id: Iadf43383a7f2bf377d4666a55a38d92bd70711aa
      16f97867
    • Rafael Weingärtner's avatar
      Standardize use and construction of endpoint URLs · f425c067
      Rafael Weingärtner authored
      
      The goal for this push request is to normalize the construction and use
       of internal, external, and admin URLs. While extending Kolla-ansible
       to enable a more flexible method to manage external URLs, we noticed
       that the same URL was constructed multiple times in different parts
       of the code. This can make it difficult for people that want to work
       with these URLs and create inconsistencies in a large code base with
       time. Therefore, we are proposing here the use of
       "single Kolla-ansible variable" per endpoint URL, which facilitates
       for people that are interested in overriding/extending these URLs.
      
      As an example, we extended Kolla-ansible to facilitate the "override"
      of public (external) URLs with the following standard
      "<component/serviceName>.<companyBaseUrl>".
      Therefore, the "NAT/redirect" in the SSL termination system (HAproxy,
      HTTPD or some other) is done via the service name, and not by the port.
      This allows operators to easily and automatically create more friendly
       URL names. To develop this feature, we first applied this patch that
       we are sending now to the community. We did that to reduce the surface
        of changes in Kolla-ansible.
      
      Another example is the integration of Kolla-ansible and Consul, which
      we also implemented internally, and also requires URLs changes.
      Therefore, this PR is essential to reduce code duplicity, and to
      facility users/developers to work/customize the services URLs.
      
      Change-Id: I73d483e01476e779a5155b2e18dd5ea25f514e93
      Signed-off-by: default avatarRafael Weingärtner <rafael@apache.org>
      f425c067
    • Radosław Piliszek's avatar
      Skip broken ansible-lint · a90aa3e4
      Radosław Piliszek authored
      See [1].
      
      [1] https://github.com/ansible/ansible-lint/issues/969
      
      Change-Id: I5ac8f20a2157d880b63a4c70bf6c782d06014f41
      a90aa3e4
  6. Aug 17, 2020
  7. Aug 16, 2020
  8. Aug 15, 2020
    • Zuul's avatar
      Merge "Add missing mistral services log files" · a4aab1b5
      Zuul authored
      a4aab1b5
    • James Kirsch's avatar
      Add support for encrypting Nova API · d6251506
      James Kirsch authored
      This patch introduces an optional backend encryption for the Nova API
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Nova service.
      
      Change-Id: I48e1540b973016079d5686b328e82239dcffacfd
      Partially-Implements: blueprint add-ssl-internal-network
      d6251506
  9. Aug 13, 2020
    • Bharat Kunwar's avatar
      Deploy neutron-mlnx-agent and neutron-eswitchd containers · 4809462f
      Bharat Kunwar authored
      Change-Id: I173669bdf92b1f2ea98907ba16808ca3c914944c
      4809462f
    • Zuul's avatar
      Merge "Add Keep Alive Timeout for httpd" · d1e5de21
      Zuul authored
      d1e5de21
    • Mark Goddard's avatar
      Prevent overwriting existing Keystone Fernet keys · 8389140f
      Mark Goddard authored
      Steps to reproduce:
      
      * Deploy a cloud
      * Add another controller to the inventory
      * Deploy to the new controller using --limit:
      
      kolla-ansible deploy --limit new-controller
      
      Expected results:
      
      The new controller uses the cluster's existing fernet keys.
      
      Actual results:
      
      New fernet keys are generated on the new controller, and pushed out to
      the existing controllers. This invalidates tokens created from those
      keys.
      
      This change prevents the above scenario from happening, by failing the
      deployment if there are no hosts with existing Ferney keys to
      distribute, and not all Keystone hosts are in the target host list.
      
      Closes-Bug: #1891364
      
      Change-Id: If0c0e038b77fc010a3a017f9841a674d53b16457
      8389140f
    • James Kirsch's avatar
      Add Keep Alive Timeout for httpd · 19b028e6
      James Kirsch authored
      This patch introduces a global keep alive timeout value for services
      that leverage httpd + wsgi to handle http/https requests. The default
      value is one minute.
      
      Change-Id: Icf7cb0baf86b428a60a7e9bbed642999711865cd
      Partially-Implements: blueprint add-ssl-internal-network
      19b028e6
    • Mark Goddard's avatar
      CI: enable Ansible SSH pipelining · 9fac359b
      Mark Goddard authored
      This should improve performance of CI jobs.
      
      Change-Id: I729862b89b4fe65cbb7f852fac06741b636e4939
      9fac359b
  10. Aug 12, 2020
Loading