- Aug 24, 2020
-
-
Radosław Piliszek authored
It was found to be useless in [1]. It is one of distro_python_version usages. Note Freezer and Horizon still use python_path (and hence distro_python_version) for different purposes. [1] https://review.opendev.org/675822 Change-Id: I6d6d9fdf4c28cb2b686d548955108c994b685bb1 Partially-Implements: blueprint drop-distro-python-version
-
- Aug 21, 2020
-
-
Zuul authored
-
Zuul authored
-
Zuul authored
-
Zuul authored
-
Zuul authored
-
zhoulinhui authored
refer to https://github.com/openstack/kolla-ansible/blob/master/ansible/inventory/multinode#L728 Change-Id: Ib6cd78cb2058a35f15b5affb98e0f63805b0edf3
-
Michal Arbet authored
Neutron's containers should use ENV from kolla_docker module's environment parameter (defined in roles/neutron/defaults/main.yml) after reconfigure, not only when deploying. Currently this is working only for deploy, not for reconfigure. How to test it ? - Deploy neutron with "neutron_legacy_iptables" set to yes/no. - Change value of "neutron_legacy_iptables" to opposite value as before. - Reconfigure neutron. Current result : - "KOLLA_LEGACY_IPTABLES" in container's ENV is not changed Expected result : - "KOLLA_LEGACY_IPTABLES:" in container's ENV should be changed This patch is fixing this behaviour by adding missing environment parameter to neutron's "Check neutron containers" task. Change-Id: Ibfbe2d4f49261fa766acbb6ff45da9994118bda8 Closes-Bug: #1853776
-
Radosław Piliszek authored
Change-Id: Ic58a27e517004768433a1e793d4d8e90e2c3383a
-
Michal Nasiadka authored
Change-Id: I3a31c74608b48919c1563bac88313a8c4219dedc Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
- Aug 20, 2020
-
-
likui authored
Change-Id: Iff699b6dd9417e2e72618263641cbfa6ccb6e585 Related-Bug: #1892341
-
- Aug 19, 2020
-
-
Zuul authored
-
Pierre Riteau authored
There is an issue where keystonemiddleware connections to memcached from neutron-server grow beyond configured values [1], eventually reaching the maximum number of connections accepted by memcached servers. Other services do not appear to be affected by this issue. A workaround is to use the advanced memcached pool. Despite its documentation claiming to only work with Python 2, it appears to work fine on Python 3. [1] https://bugs.launchpad.net/keystonemiddleware/+bug/1883659 Change-Id: Ifbbc2022839cbc575848d830600241c61603c80b Closes-Bug: #1892210
-
Zuul authored
-
Jegor van Opdorp authored
Fixes an issue during deleting evacuated instances with encrypted block devices. Change-Id: I9b9b689ef7e1e41b597e2c5f6b96f3ed011193c5 Closes-Bug: 1891462 Related-Bug: 1850279
-
likui authored
Previously the post-deploy.yml playbook was executed with become: true, and the admin-openrc.sh file templated without an owner or mode specified. This resulted in admin-openrc.sh being owned by root with 644 permissions. This change creates the file without become: true, and explicitly sets the owner to the user executing Ansible, and the mode to 600. Co-Authored-By:
Mark Goddard <mark@stackhpc.com> Closes-Bug: #1891704 Change-Id: Iadf43383a7f2bf377d4666a55a38d92bd70711aa
-
Rafael Weingärtner authored
The goal for this push request is to normalize the construction and use of internal, external, and admin URLs. While extending Kolla-ansible to enable a more flexible method to manage external URLs, we noticed that the same URL was constructed multiple times in different parts of the code. This can make it difficult for people that want to work with these URLs and create inconsistencies in a large code base with time. Therefore, we are proposing here the use of "single Kolla-ansible variable" per endpoint URL, which facilitates for people that are interested in overriding/extending these URLs. As an example, we extended Kolla-ansible to facilitate the "override" of public (external) URLs with the following standard "<component/serviceName>.<companyBaseUrl>". Therefore, the "NAT/redirect" in the SSL termination system (HAproxy, HTTPD or some other) is done via the service name, and not by the port. This allows operators to easily and automatically create more friendly URL names. To develop this feature, we first applied this patch that we are sending now to the community. We did that to reduce the surface of changes in Kolla-ansible. Another example is the integration of Kolla-ansible and Consul, which we also implemented internally, and also requires URLs changes. Therefore, this PR is essential to reduce code duplicity, and to facility users/developers to work/customize the services URLs. Change-Id: I73d483e01476e779a5155b2e18dd5ea25f514e93 Signed-off-by:
Rafael Weingärtner <rafael@apache.org>
-
Radosław Piliszek authored
See [1]. [1] https://github.com/ansible/ansible-lint/issues/969 Change-Id: I5ac8f20a2157d880b63a4c70bf6c782d06014f41
-
- Aug 17, 2020
-
-
Zuul authored
-
Zuul authored
-
Zuul authored
-
Bartosz Bezak authored
Change-Id: If90c2dfd32c8bc50671f6dd38e5a82b434c07151 Depends-On: https://review.opendev.org/#/c/720338
-
chenxing authored
The "kolla_internal_address" variable is not documented or defined anywhere. When "kolla_internal_vip_address" is undefined, the error message is about "kolla_internal_address", which will confuse operators. This change deprecates "kolla_internal_address", and adds a default value for "kolla_internal_vip_address" when "kolla_internal_address" is undefined. Change-Id: I09694b38420ea67896bb8cf4ffd7ce6f131af10e Closes-Bug: #1864206
-
- Aug 16, 2020
-
-
Zuul authored
-
- Aug 15, 2020
-
-
Zuul authored
-
James Kirsch authored
This patch introduces an optional backend encryption for the Nova API service. When used in conjunction with enabling TLS for service API endpoints, network communcation will be encrypted end to end, from client through HAProxy to the Nova service. Change-Id: I48e1540b973016079d5686b328e82239dcffacfd Partially-Implements: blueprint add-ssl-internal-network
-
- Aug 13, 2020
-
-
Bharat Kunwar authored
Change-Id: I173669bdf92b1f2ea98907ba16808ca3c914944c
-
Zuul authored
-
James Kirsch authored
This patch introduces a global keep alive timeout value for services that leverage httpd + wsgi to handle http/https requests. The default value is one minute. Change-Id: Icf7cb0baf86b428a60a7e9bbed642999711865cd Partially-Implements: blueprint add-ssl-internal-network
-
Mark Goddard authored
This should improve performance of CI jobs. Change-Id: I729862b89b4fe65cbb7f852fac06741b636e4939
-
- Aug 12, 2020
-
-
Zuul authored
-
wu.chunyang authored
we support ovn neutron plugin agent, but the comments miss it. Change-Id: I1ebfd8208172a1db5b10dfd682ac6192c9de99bf
-
Zuul authored
-
Radosław Piliszek authored
This fix was premature as it completely ignores the previously-respected umask. Let's discuss a proper fix and revert this one since CI is fixed elsewhere [1]. [1] https://review.opendev.org/743502 This reverts commit 87efdce2. Change-Id: If38adbf124e793574a21ae986f9ee146d587f820
-
- Aug 11, 2020
-
-
Zuul authored
-
Zuul authored
-
Radosław Piliszek authored
Ansible changed the default mode for files, even in stable releases. [1] This change restores the previous default (with the common umask). [1] https://github.com/ansible/ansible/pull/70221 Change-Id: I0f81214b4f95fe8a378844745ebc77f3c43027ab Closes-Bug: #1891145
-
Marcin Juszkiewicz authored
There is a time once every 2 years when ubuntu team releases new LTS release. And then UCA joins with binary packages for current OpenStack development cycle. It is this time for Ubuntu 20.04 'focal'. Includes CI fix to pass: [CI] Temporarily block new Ansible The proper fix [1] needs fixing older branches before newer. This one allows to fix CI first, in the usual order. To revert after [1] gets merged in all relevant branches. [1] https://review.opendev.org/745648 Old-Change-Id: Ifbd37d8addd4322773118e2e9d46494741a8ae66 Related-Bug: #1891145 Depends-on: https://review.opendev.org/#/c/738994/ Change-Id: Ib8b70ee40ec2d19509cc84c0f530612f81907721 Co-Authored-By:
Radosław Piliszek <radoslaw.piliszek@gmail.com>
-
- Aug 10, 2020