Skip to content
Snippets Groups Projects
  1. Oct 06, 2023
  2. Sep 18, 2023
  3. Jun 28, 2023
  4. Feb 14, 2023
    • Mark Goddard's avatar
      Fix deploy/genconfig in check mode · 572ff2f8
      Mark Goddard authored
      Previously, when running one of the following commands:
      
        kolla-ansible deploy --check
        kolla-ansible genconfig --check
      
      deployment or configuration generation fails for various reasons.
      
      MariaDB fails to lookup the existing cluster.
      
      Keystone fails to generate cron config.
      
      Nova-cell fails to get the cell settings.
      
      Closes-Bug: #2002661
      Change-Id: I5e765f498ae86d213d0a4379ca5d473db1499962
      572ff2f8
  5. Jan 31, 2023
    • Michal Arbet's avatar
      Trivial: Add connection: local for keystone-fernet cron generate task · 78cf9585
      Michal Arbet authored
      This patch add connection local for above mentioned task as
      kolla-ansible can be executed in docker container as in
      my case.
      
      When there is no connection: local, ansible is trying to connect
      to localhost via ssh where specified python script is not available.
      
      After connection: local everything is working as expected as file
      is found inside container
      
      Closes-Bug: #2004224
      
      Change-Id: I219a958b4f101efb71a2935e6d910dae5c65f0be
      78cf9585
  6. Jan 26, 2023
  7. Jan 13, 2023
    • Matt Crees's avatar
      Add a flag to handle RabbitMQ high availability · 09df6fc1
      Matt Crees authored
      A combination of durable queues and classic queue mirroring can be used
      to provide high availability of RabbitMQ. However, these options should
      only be used together, otherwise the system will become unstable. Using
      the flag ``om_enable_rabbitmq_high_availability`` will either enable
      both options at once, or neither of them.
      
      There are some queues that should not be mirrored:
      * ``reply`` queues (these have a single consumer and TTL policy)
      * ``fanout`` queues (these have a TTL policy)
      * ``amq`` queues (these are auto-delete queues, with a single consumer)
      An exclusionary pattern is used in the classic mirroring policy. This
      pattern is ``^(?!(amq\\.)|(.*_fanout_)|(reply_)).*``
      
      Change-Id: I51c8023b260eb40b2eaa91bd276b46890c215c25
      09df6fc1
  8. Jan 12, 2023
    • Mark Goddard's avatar
      Fix prechecks in check mode · 46aeb984
      Mark Goddard authored
      When running in check mode, some prechecks previously failed because
      they use the command module which is silently not run in check mode.
      Other prechecks were not running correctly in check mode due to e.g.
      looking for a string in empty command output or not querying which
      containers are running.
      
      This change fixes these issues.
      
      Closes-Bug: #2002657
      Change-Id: I5219cb42c48d5444943a2d48106dc338aa08fa7c
      46aeb984
  9. Jan 05, 2023
  10. Dec 21, 2022
    • Matt Crees's avatar
      Integrate oslo-config-validator · 6c2aace8
      Matt Crees authored
      Regularly, we experience issues in Kolla Ansible deployments because we
      use wrong options in OpenStack configuration files. This is because
      OpenStack services ignore unknown options. We also need to keep on top
      of deprecated options that may be removed in the future. Integrating
      oslo-config-validator into Kolla Ansible will greatly help.
      
      Adds a shared role to run oslo-config-validator on each service. Takes
      into account that services have multiple containers, and these may also
      use multiple config files. Service roles are extended to use this shared
      role. Executed with the new command ``kolla-ansible validate-config``.
      
      Change-Id: Ic10b410fc115646d96d2ce39d9618e7c46cb3fbc
      6c2aace8
  11. Nov 04, 2022
  12. Nov 02, 2022
  13. Oct 28, 2022
  14. Oct 03, 2022
    • Jakub Darmach's avatar
      Keystone OIDC JWKS fix · 98929761
      Jakub Darmach authored
      JWT failed to validate on auth-oidc endpoint used by openstack cli
      with "could not find key with kid: XX" error. To fix this we need
      to use jwks provided in "jwks_uri" by OIDC metadata endpoint.
      
      Missing "ServerName" directive from vhost config causes redirection
      to fail in some cases when external tls is enabled.
      
        - added "keystone_federation_oidc_jwks_uri" variable
        - added "OIDCOAuthVerifyJwksUri" to keystone vhost config
        - added "ServerName" to keystone vhost config
        - jinja templating additional whitespace trimmed to
          correct end result indentation and empty newlines
      
      Closes-bug: 1990375
      Change-Id: I4f5c1bd8be8e23cf6299ca4bdfd79e9d98c9a9eb
      Unverified
      98929761
  15. Sep 28, 2022
  16. Sep 26, 2022
  17. Sep 21, 2022
  18. Aug 29, 2022
    • LinPeiWen's avatar
      keystone: Remove redundant 'when' · aa80f81d
      LinPeiWen authored
      In a multi-controller node, the presence of "run_once: True"
      and "when: inventory_hostname == groups['keystone'][-1]"
      will cause the task to be skipped
      
      Closes-Bug: #1987982
      
      Change-Id: I6a8f4ca285cda0675711b631aeed7ae4c992d879
      aa80f81d
  19. Aug 09, 2022
  20. Jul 25, 2022
    • Michal Nasiadka's avatar
      Fix var-spacing · dcf5a8b6
      Michal Nasiadka authored
      ansible-lint introduced var-spacing - let's fix our code.
      
      Change-Id: I0d8aaf3c522a5a6a5495032f6dbed8a2be0251f0
      dcf5a8b6
  21. Jul 12, 2022
    • Michal Arbet's avatar
      Add api_workers for each service to defaults · 3e8db91a
      Michal Arbet authored
      Render {{ openstack_service_workers }} for workers
      of each openstack service is not enough. There are
      several services which has to have more workers because
      there are more requests sent to them.
      
      This patch is just adding default value for workers for
      each service and sets {{ openstack_service_workers }} as
      default, so value can be overrided in hostvars per server.
      Nothing changed for normal user.
      
      Change-Id: Ifa5863f8ec865bbf8e39c9b2add42c92abe40616
      3e8db91a
  22. May 28, 2022
    • Radosław Piliszek's avatar
      Do not use keystone_admin_url et al · 7ca9349b
      Radosław Piliszek authored
      Following up on [1].
      The 3 variables are only introducing noise after we removed
      the reliance on Keystone's admin port.
      
      [1] I5099b08953789b280c915a6b7a22bdd4e3404076
      
      Change-Id: I3f9dab93042799eda9174257e604fd1844684c1c
      7ca9349b
  23. May 26, 2022
  24. May 23, 2022
  25. May 17, 2022
  26. May 13, 2022
  27. May 06, 2022
  28. Apr 20, 2022
  29. Apr 05, 2022
  30. Mar 22, 2022
  31. Feb 23, 2022
  32. Feb 02, 2022
  33. Jan 25, 2022
    • Kevin Rasmussen's avatar
      Fix bad openstack command while registering IDP · f955383b
      Kevin Rasmussen authored
      This fixes a bug in registering identity providers
      
      The bug was caused by a missing `=` in the openstack command
      
      Add the missing `=` after `--os-user-domain-name`
      
      Closes-Bug: #1959022
      Change-Id: I73f80cd2c81a3944de0933e60f5768956a1a3b70
      f955383b
  34. Jan 09, 2022
    • Stig Telfer's avatar
      OpenID Connect certifiate file is optional · 78f29fdc
      Stig Telfer authored
      Some ID provider configurations do not require a certificate file.
      Change the logic to allow this, and update documentation accordingly.
      
      Change-Id: I2c34a6b5894402bbebeb3fb96768789bc3c7fe84
      78f29fdc
  35. Dec 31, 2021
    • Pierre Riteau's avatar
      Move project_name and kolla_role_name to role vars · 56fc74f2
      Pierre Riteau authored
      Role vars have a higher precedence than role defaults. This allows to
      import default vars from another role via vars_files without overriding
      project_name (see related bug for details).
      
      Change-Id: I3d919736e53d6f3e1a70d1267cf42c8d2c0ad221
      Related-Bug: #1951785
      56fc74f2
  36. Oct 07, 2021
  37. Sep 28, 2021
    • Niklas Hagman's avatar
      Transition Keystone admin user to system scope · 2e933dce
      Niklas Hagman authored
      A system-scoped token implies the user has authorization to act on the
      deployment system. These tokens are useful for interacting with
      resources that affect the deployment as a whole, or exposes resources
      that may otherwise violate project or domain isolation.
      
      Since Queens, the keystone-manage bootstrap command assigns the admin
      role to the admin user with system scope, as well as in the admin
      project. This patch transitions the Keystone admin user from
      authenticating using project scoped tokens to system scoped tokens.
      This is a necessary step towards being able to enable the updated oslo
      policies in services that allow finer grained access to system-level
      resources and APIs.
      
      An etherpad with discussion about the transition to the new oslo
      service policies is:
      
      https://etherpad.opendev.org/p/enabling-system-scope-in-kolla-ansible
      
      
      
      Change-Id: Ib631e2211682862296cce9ea179f2661c90fa585
      Signed-off-by: default avatarNiklas Hagman <ubuntu@post.blinkiz.com>
      2e933dce
  38. Aug 17, 2021
    • Michal Arbet's avatar
      Use Docker healthchecks for keystone-fernet container · 90fd9152
      Michal Arbet authored
      This change enables the use of Docker healthchecks for
      keystone-fernet container. It checks if "key 0" has
      right permissions, and if rsync is able to distribute
      keys to other keystones.
      
      Implements: blueprint container-health-check
      Change-Id: I17bea723d4109e869cd05d211f6f8e4653f46e17
      90fd9152
  39. Aug 10, 2021
    • Radosław Piliszek's avatar
      Refactor and optimise image pulling · 9ff2ecb0
      Radosław Piliszek authored
      We get a nice optimisation by using a filtered loop instead
      of task skipping per service with 'when'.
      
      Partially-Implements: blueprint performance-improvements
      Change-Id: I8f68100870ab90cb2d6b68a66a4c97df9ea4ff52
      9ff2ecb0
Loading