Skip to content
Snippets Groups Projects
  1. Aug 13, 2020
  2. Jun 05, 2020
    • Michal Arbet's avatar
      Fix STATIC_ROOT for Debian, Ubuntu · f9c814a1
      Michal Arbet authored
      STATIC_ROOT in local_settings.py should be configured
      to path which is also configured in apache's config.
      
      For debian, ubuntu binary setup it is
      /var/lib/openstack-dashboard/static.
      
      Reason why it is "accidentaly" working is:
      
      For debian package:
      Package is overriding STATIC_ROOT in
      /etc/openstack-dashboard/local_settings.d/_0003_debian_static_root.py.
      But this is going to be removed from settings in
      https://review.opendev.org/733607.
      
      For ubuntu package:
      Ubuntu package is adding patch to package which is including
      PYTHON_PATH do /usr/share/openstack-dashboard/
      And also they are creating several dirty symlinks to get it working.
      
      This patch is fixing this behaviour more clearly.
      
      Change-Id: I9862ac7ab462ca9018b684d63f26458ddda9f73a
      f9c814a1
  3. Oct 16, 2019
    • Radosław Piliszek's avatar
      Implement IPv6 support in the control plane · bc053c09
      Radosław Piliszek authored
      Introduce kolla_address filter.
      Introduce put_address_in_context filter.
      
      Add AF config to vars.
      
      Address contexts:
      - raw (default): <ADDR>
      - memcache: inet6:[<ADDR>]
      - url: [<ADDR>]
      
      Other changes:
      
      globals.yml - mention just IP in comment
      
      prechecks/port_checks (api_intf) - kolla_address handles validation
      
      3x interface conditional (swift configs: replication/storage)
      
      2x interface variable definition with hostname
      (haproxy listens; api intf)
      
      1x interface variable definition with hostname with bifrost exclusion
      (baremetal pre-install /etc/hosts; api intf)
      
      neutron's ml2 'overlay_ip_version' set to 6 for IPv6 on tunnel network
      
      basic multinode source CI job for IPv6
      
      prechecks for rabbitmq and qdrouterd use proper NSS database now
      
      MariaDB Galera Cluster WSREP SST mariabackup workaround
      (socat and IPv6)
      
      Ceph naming workaround in CI
      TODO: probably needs documenting
      
      RabbitMQ IPv6-only proto_dist
      
      Ceph ms switch to IPv6 mode
      
      Remove neutron-server ml2_type_vxlan/vxlan_group setting
      as it is not used (let's avoid any confusion)
      and could break setups without proper multicast routing
      if it started working (also IPv4-only)
      
      haproxy upgrade checks for slaves based on ipv6 addresses
      
      TODO:
      
      ovs-dpdk grabs ipv4 network address (w/ prefix len / submask)
      not supported, invalid by default because neutron_external has no address
      No idea whether ovs-dpdk works at all atm.
      
      ml2 for xenapi
      Xen is not supported too well.
      This would require working with XenAPI facts.
      
      rp_filter setting
      This would require meddling with ip6tables (there is no sysctl param).
      By default nothing is dropped.
      Unlikely we really need it.
      
      ironic dnsmasq is configured IPv4-only
      dnsmasq needs DHCPv6 options and testing in vivo.
      
      KNOWN ISSUES (beyond us):
      
      One cannot use IPv6 address to reference the image for docker like we
      currently do, see: https://github.com/moby/moby/issues/39033
      (docker_registry; docker API 400 - invalid reference format)
      workaround: use hostname/FQDN
      
      RabbitMQ may fail to bind to IPv6 if hostname resolves also to IPv4.
      This is due to old RabbitMQ versions available in images.
      IPv4 is preferred by default and may fail in the IPv6-only scenario.
      This should be no problem in real life as IPv6-only is indeed IPv6-only.
      Also, when new RabbitMQ (3.7.16/3.8+) makes it into images, this will
      no longer be relevant as we supply all the necessary config.
      See: https://github.com/rabbitmq/rabbitmq-server/pull/1982
      
      For reliable runs, at least Ansible 2.8 is required (2.8.5 confirmed
      to work well). Older Ansible versions are known to miss IPv6 addresses
      in interface facts. This may affect redeploys, reconfigures and
      upgrades which run after VIP address is assigned.
      See: https://github.com/ansible/ansible/issues/63227
      
      Bifrost Train does not support IPv6 deployments.
      See: https://storyboard.openstack.org/#!/story/2006689
      
      
      
      Change-Id: Ia34e6916ea4f99e9522cd2ddde03a0a4776f7e2c
      Implements: blueprint ipv6-control-plane
      Signed-off-by: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      bc053c09
  4. Sep 14, 2019
  5. Aug 22, 2019
    • Krzysztof Klimonda's avatar
      Implement TLS encryption for internal endpoints · b0ecd8b6
      Krzysztof Klimonda authored
      This review is the first one in a series of patches and it introduces an
      optional encryption for internal openstack endpoints, implementing part
      of the add-ssl-internal-network spec.
      
      Change-Id: I6589751626486279bf24725f22e71da8cd7f0a43
      b0ecd8b6
  6. Aug 20, 2019
  7. Aug 16, 2019
    • Scott Solkhon's avatar
      Support configuration of trusted CA certificate file · 09e02ef8
      Scott Solkhon authored
      This commit adds the functionality for an operator to specify
      their own trusted CA certificate file for interacting with the
      Keystone API.
      
      Implements: blueprint support-trusted-ca-certificate-file
      Change-Id: I84f9897cc8e107658701fb309ec318c0f805883b
      09e02ef8
  8. Apr 23, 2019
  9. Mar 06, 2019
    • Jim Rollenhagen's avatar
      Use keystone_*_url var in all configs · 2e4e6050
      Jim Rollenhagen authored
      We're duplicating code to build the keystone URLs in nearly every
      config, where we've already done it in group_vars. Replace the
      redundancy with a variable that does the same thing.
      
      Change-Id: I207d77870e2535c1cdcbc5eaf704f0448ac85a7a
      2e4e6050
  10. May 18, 2018
    • Jorge Niedbalski's avatar
      horizon: allow to configure by custom_local_settings.j2 · d516ad7d
      Jorge Niedbalski authored
      kolla-ansible should provide a mechanism to allow operators to overwrite
      the default (or not exposed through configuration) options for the
      local_settings.
      
      local_settings.j2 may be good place to configure horizon but requires
      operator to sync it every release.
      
      custom_local_settings.j2 can be used to overwrite things from
      local_settings.j2 without a need of syncing it first.
      
      This patch also adds a release note and a documentation section
      under the advanced configuration page.
      
      Partial-Bug: #1769970
      Depends-On: https://review.openstack.org/#/c/567006/
      Change-Id: I84b54ba737276114e512d4577ac4b9010682bb98
      d516ad7d
  11. Apr 03, 2018
  12. Jan 18, 2018
  13. Nov 28, 2017
    • Pierre Hanselmann's avatar
      Add horizon domain dropdown · 27253723
      Pierre Hanselmann authored
      Added ``horizon_keystone_domain_choices`` hash. It can be used to set the
      available domains to choose from on the horizon login page. This feature
      was introduced in pike release.
      
      Change-Id: Ia7d2bc45e518848a04ce78e7833e1cf9a0ef21ce
      27253723
  14. Sep 25, 2017
    • Pierre Hanselmann's avatar
      Horizon multidomain flag · bd186a2e
      Pierre Hanselmann authored
      Added horizon_keystone_multidomain flag. It can be now overriden
      in globals.yml. Default set to False.
      
      Change-Id: I6f8f261cf4b9779e57c2443ac219cdddb1731f52
      bd186a2e
  15. Jul 25, 2017
  16. Jul 21, 2017
  17. Jul 18, 2017
  18. Mar 10, 2017
    • rcherrueau's avatar
      Multi-regions Support · dcdbe441
      rcherrueau authored
      Add support for basic multiple regions, that is to say, many OpenStack
      with a shared Keystone (same users) and Horizon. The shared Keystone
      and Horizon are deployed into one region, for instance RegionOne.
      Services of other regions have an access to this Keystone. This
      support assumes that the operator knows the name of all OpenStack
      regions in advance, and considers as many Kolla runs as there are
      regions.
      
      The new variable, multiple_regions_names, contains the name of
      regions. It is needed by the region that includes Keystone and
      Horizon. In register.yml, it specifies to create as many Keystone
      endpoints as there are regiones, so that services of other regions can
      connect to Keystone. In local_settings.j2, it changes the render to
      support multiple regions in Horizon. The multi-regions.rst explains
      how to perform a multiple regions deployment.
      
      Implements: blueprint multi-kolla-config
      Change-Id: Icab2aebfc4de0e3bc609950956e0af397705f403
      dcdbe441
  19. Jan 27, 2017
  20. Jan 21, 2017
    • Jeffrey Zhang's avatar
      Load murano dashboard dynamic · f3ea03d8
      Jeffrey Zhang authored
      * Add ENABLE_MURANO environment in horizon
      * Add murano related setting in local_settings.j2 file
      
      Change-Id: I172b6d07536210623b2e2066ba4f1cc768479e33
      Closes-Bug: #1640679
      f3ea03d8
  21. Dec 19, 2016
    • Vladislav Belogrudov's avatar
      Use default user group consistently · 25fcdfb9
      Vladislav Belogrudov authored
      Default user group should be set much earlier in deployment
      and should be used consistently accross all projects.
      
      Change-Id: Id399f9ddebc903bb9c3eeb5a0ff6f33ca6d6828c
      Closes-Bug: #1650501
      25fcdfb9
  22. Nov 20, 2016
  23. Nov 10, 2016
  24. Oct 15, 2016
    • Dave McCowan's avatar
      OpenStack Services Should Use keystone_internal_url for auth · cc2dde08
      Dave McCowan authored
      Horizon and Neutron mistakenly were using keystone_public_url
      for authentication.  This works without error in deployments
      when the internal services happen to have access to the
      public network, but it is still wrong.  This fails to work
      when the internal services can not access the public URLs,
      for example when TLS is enabled on the public endppoints.
      
      This patches corrects horizon and neutron to use
      keystone_internal_url for auth.
      
      Change-Id: I59b9094364bef375036028ba86a771dabf28c963
      Closes-bug: #1625648
      cc2dde08
  25. Oct 05, 2016
    • Paul Bourke's avatar
      Fix horizon to use cache · 792f16cc
      Paul Bourke authored
      Horizon was missing SESSION_ENGINE from it's conf which means it was not
      making use of memcached.
      
      Change-Id: I450aee05f59e344902f1e92d913f4c1ce9e8dcc6
      Closes-Bug: 1630509
      792f16cc
  26. Sep 12, 2016
  27. Sep 08, 2016
  28. Aug 20, 2016
  29. Aug 18, 2016
  30. Aug 14, 2016
  31. Aug 02, 2016
    • Ken Wronkiewicz's avatar
      Horizon interface address and memcached override · a6d89f44
      Ken Wronkiewicz authored
      Note: This should not result in any behavior changes in regular Kolla, just
      Kolla-Kubernetes and only when you've overridden stuff in globals.yml
      
      Allows override of interface address and memcached pools, so that Kubernetes
      can do the right thing.
      
      There are some significant architectural issues involved in memcached pooling
      in the Kolla-kubernetes world.  Avoiding them right now.
      
      Current working with this Kolla-Kubernetes globals.yml file:
      
      api_interface_address: "0.0.0.0"
      
      memcached_servers: "memcached"
      
      keystone_database_address: "mariadb"
      keystone_admin_url: "http://keystone-admin:35357/v3"
      keystone_internal_url: "http://keystone-public:5000/v3"
      keystone_public_url: "http://keystone-public:5000/v3
      
      "
      
      Three tings to note:
       * In Kolla-Kubernetes, the service is not using net=host, so a
         0.0.0.0 interface address is totally OK.  That patch has been merged.
       * In Kolla-Kubernetes, the global.yml file doesn't do var substitution
         so you have to be explicit about the URLs, otherwise Keystone will
         look like it was provisioned but it won't quite be provisioned right.
       * In order to not duplicate tons of code, moved the keystone_admin_url /
         keystone_internal_url / keystone_public_url to the common defaults
         from the keystone defaults.
      
      Co-Authored-By: default avatarRyan Hallisey <rhallise@redhat.com>
      Change-Id: I586ce1c6c3300254c4e2a398ff46645df576aeb0
      Partially-implements: blueprint api-interface-bind-address-override
      a6d89f44
  32. Jul 08, 2016
  33. Mar 22, 2016
    • SamYaple's avatar
      Enable horizon domain logins · 1ef3dd1d
      SamYaple authored
      The horizon default is to prevent multidomain login. While allowing
      multidomain login wont prevent default domain login. Overhead is we
      must type in domain to login even if its default domain.
      
      Change-Id: I965c3612eb584e88071c619037e1f42b3f4c7cd0
      Closes-Bug: #1560683
      1ef3dd1d
  34. Mar 03, 2016
    • Dave McCowan's avatar
      Add TLS protection on external API endpoints · 3daded62
      Dave McCowan authored
      TLS can be used to encrypt and authenticate the connection with
      OpenStack endpoints.  This patch provides the necessary
      parameters and changes the resulting service configurations to
      enable TLS for the Kolla deployed OpenStack cloud.
      
      The new input parameters are:
      
      kolla_enable_tls_external: "yes" or "no" (default is "no")
      kolla_external_fqdn_cert: "/etc/kolla/certificates/haproxy.pem"
      kolla_external_fqdn_cacert: "/etc/kolla/certificates/haproxy-ca.crt"
      
      Implements: blueprint kolla-ssl
      
      Change-Id: I48ef8a781c3035d58817f9bf6f36d59a488bab41
      3daded62
  35. Feb 26, 2016
    • SamYaple's avatar
      Change kolla_internal_address variable · d3cfb205
      SamYaple authored
      Due to poor planning on our variable names we have a situation where
      we have "internal_address" which must be a VIP, but "external_address"
      which should be a DNS name. Now with two vips "external_vip_address"
      is a new variable.
      
      This corrects that issue by deprecating kolla_internal_address and
      replacing it with 4 nicely named variables.
      
      kolla_internal_vip_address
      kolla_internal_fqdn
      kolla_external_vip_address
      kolla_external_fqdn
      
      The default behaviour will remain the same, and the way the variable
      inheritance is setup the kolla_internal_address variable can still be
      set in globals.yml and propogate out to these 4 new variables like it
      normally would, but all reference to kolla_internal_address has been
      completely removed.
      
      Change-Id: I4556dcdbf4d91a8d2751981ef9c64bad44a719e5
      Partially-Implements: blueprint ssl-kolla
      d3cfb205
  36. Feb 15, 2016
    • Dave McCowan's avatar
      Use variables to specify http or https when constructing URLs · 1cedf77f
      Dave McCowan authored
      To allow for TLS to protect the service endpoints, the protocol
      in the URLs for the endpoints will be either http or https.
      
      This patch removes the hardcoded values of http and replaces them
      with variables that can be adjusted accordingly in future patches.
      
      Change-Id: Ibca6f8aac09c65115d1ac9957410e7f81ac7671e
      Partially-implements: blueprint ssl-kolla
      1cedf77f
  37. Dec 16, 2015
    • OTSUKA, Yuanying's avatar
      Fix retrieving api_interface · 903c7d4c
      OTSUKA, Yuanying authored
      In heterogeneous environment, api_interfaces are different each other.
      So we should specify it from hostvars.
      
      Implements: bp configure-network-interface
      Change-Id: Id15d70bfb9ebb62a64a3847a6b77407efb171dbe
      903c7d4c
  38. Oct 15, 2015
    • Sam Yaple's avatar
      Use memcache for consoleauth and horizon · 2ea87ebd
      Sam Yaple authored
      Unfortunately there was no was to avoid memcache for consoleauth, so
      we might as well take advantage of it for Horizon as well.
      
      Change-Id: Idd338a025b031f6b50fe0c9f03c2c8d862f9d4c0
      Closes-Bug: #1504606
      Closes-Bug: #1504800
      2ea87ebd
    • Sam Yaple's avatar
      Enable COMPRESS_OFFLINE for Horizon · 718ed431
      Sam Yaple authored
      Without this set the CSS is messed up again
      
      TrivialFix
      backport: liberty
      
      Change-Id: I9e4cfc53d9791f75d4fdd52abe562c58035b0979
      718ed431
Loading