Skip to content
Snippets Groups Projects
  1. Jun 16, 2020
    • Xing Zhang's avatar
      Switch octavia to use service project in service_auth · c2037885
      Xing Zhang authored
      Recently a patch [1] was merged to stop adding the octavia user to the
      admin project, and remove it on upgrade. However, the octavia
      configuration was not updated to use the service project, causing load
      balancer creation to fail.
      
      There is also an issue for existing deployments in simply switching to
      the service project. While existing load balancers appear to continue to
      work, creating new load balancers fails due to the security group
      belonging to the admin project. At a minimum, the deployer needs to
      create a security group in the service project, and update
      'octavia_amp_secgroup_list' to match its ID. Ideally the flavor and
      network would also be recreated in the service project, although this
      does not seem to impact operation and will result in downtime for
      existing Amphorae.
      
      This change adds a new variable, 'octavia_service_auth_project', that
      can be used to set the project. The default in Ussuri is 'service',
      switching to the new behaviour. For backports of this patch it should be
      switched to 'admin' to maintain compatibility.
      
      If a deployer sets 'octavia_service_auth_project' to 'admin', the
      octavia user will be assigned the admin role in the admin project, as
      was done previously.
      
      Closes-Bug: #1882643
      Related-Bug: #1873176
      
      [1] https://review.opendev.org/720243/
      
      
      
      Co-Authored-By: default avatarMark Goddard <mark@stackhpc.com>
      
      Change-Id: I1efd0154ebaee69373ae5bccd391ee9c68d09b30
      c2037885
  2. May 11, 2020
  3. May 07, 2020
  4. May 06, 2020
    • Radosław Piliszek's avatar
      Make nova perms consistent between applications · 93c9ad89
      Radosław Piliszek authored
      Nova cells support introduced a slight regression that triggers
      odd behaviour when we tried switching to Apache (httpd) [1].
      Bootstrap no longer applied permissions recursively to all log
      files, creating a discrepancy between normal and bootstrap runs
      and also Nova and other services such as Cinder (regarding
      bootstrap logging).
      
      This patch fixes it.
      
      Backport to Train.
      
      Not creating reno nor a bug record because it does not affect
      any current standard usage in any currently known way.
      
      Note this only really hides (standardizes?) the global issue that
      we don't control file permissions on newly created files too well.
      
      [1] https://review.opendev.org/724793
      
      Change-Id: I35e9924ccede5edd2e1307043379aba944725143
      Needed-By: https://review.opendev.org/724793
      93c9ad89
  5. May 05, 2020
  6. May 01, 2020
  7. Apr 30, 2020
  8. Apr 29, 2020
  9. Apr 28, 2020
  10. Apr 27, 2020
  11. Apr 26, 2020
Loading