dcc16da7e2
We use the same condition, which defines against what host some "service" tasks should run against, several times. It's hard to keep it the same across the role and ansible spending additional resources to evaluate it each time, so it's simpler and better for the maintenance to set a boolean variable which will say for all tasks, that we want to run only against signle host, if they should run or not now. Change-Id: Iac06d3f02b1c9ee5e3bfbd28043fbb70d8b1d328
256 lines
8.0 KiB
YAML
256 lines
8.0 KiB
YAML
---
|
|
# Copyright 2014, Rackspace US, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
- name: Fail if our required secrets are not present
|
|
fail:
|
|
msg: "Please set the {{ item }} variable prior to applying this role."
|
|
when: (item is undefined) or (item is none)
|
|
with_items: "{{ keystone_required_secrets }}"
|
|
tags:
|
|
- always
|
|
|
|
- name: Fail if service was deployed using a different installation method
|
|
fail:
|
|
msg: "Switching installation methods for OpenStack services is not supported"
|
|
when:
|
|
- ansible_local is defined
|
|
- ansible_local.openstack_ansible is defined
|
|
- ansible_local.openstack_ansible.keystone is defined
|
|
- ansible_local.openstack_ansible.keystone.install_method is defined
|
|
- ansible_local.openstack_ansible.keystone.install_method != keystone_install_method
|
|
|
|
- name: Gather variables for each operating system
|
|
include_vars: "{{ item }}"
|
|
with_first_found:
|
|
- "{{ ansible_distribution | lower }}-{{ ansible_distribution_version | lower }}.yml"
|
|
- "{{ ansible_distribution | lower }}-{{ ansible_distribution_major_version | lower }}.yml"
|
|
- "{{ ansible_os_family | lower }}-{{ ansible_distribution_major_version | lower }}.yml"
|
|
- "{{ ansible_distribution | lower }}.yml"
|
|
- "{{ ansible_os_family | lower }}-{{ ansible_distribution_version.split('.')[0] }}.yml"
|
|
- "{{ ansible_os_family | lower }}.yml"
|
|
tags:
|
|
- always
|
|
|
|
- name: Gather variables for installation method
|
|
include_vars: "{{ keystone_install_method }}_install.yml"
|
|
tags:
|
|
- always
|
|
|
|
- name: Fact for apache module shibboleth to be installed
|
|
set_fact:
|
|
keystone_sp_apache_mod_shib:
|
|
"{{ (keystone_sp != {} and
|
|
(keystone_sp.apache_mod is undefined or
|
|
(keystone_sp.apache_mod is defined and keystone_sp.apache_mod != 'mod_auth_openidc'))
|
|
) | ternary('true', 'false') }}"
|
|
|
|
- name: Fact for apache module mod_auth_openidc to be installed
|
|
set_fact:
|
|
keystone_sp_apache_mod_auth_openidc:
|
|
"{{ (keystone_sp != {} and
|
|
keystone_sp.apache_mod is defined and keystone_sp.apache_mod == 'mod_auth_openidc')
|
|
| ternary('true', 'false') }}"
|
|
|
|
- import_tasks: db_setup.yml
|
|
when:
|
|
- "_keystone_is_first_play_host"
|
|
vars:
|
|
_oslodb_setup_host: "{{ keystone_db_setup_host }}"
|
|
_oslodb_ansible_python_interpreter: "{{ keystone_db_setup_python_interpreter }}"
|
|
_oslodb_setup_endpoint: "{{ keystone_galera_address }}"
|
|
_oslodb_setup_port: "{{ keystone_galera_port }}"
|
|
_oslodb_databases:
|
|
- name: "{{ keystone_galera_database }}"
|
|
users:
|
|
- username: "{{ keystone_galera_user }}"
|
|
password: "{{ keystone_container_mysql_password }}"
|
|
tags:
|
|
- common-db
|
|
- keystone-config
|
|
|
|
- import_tasks: mq_setup.yml
|
|
when:
|
|
- "_keystone_is_first_play_host"
|
|
vars:
|
|
_oslomsg_rpc_setup_host: "{{ keystone_oslomsg_rpc_setup_host }}"
|
|
_oslomsg_rpc_userid: "{{ keystone_oslomsg_rpc_userid }}"
|
|
_oslomsg_rpc_password: "{{ keystone_oslomsg_rpc_password }}"
|
|
_oslomsg_rpc_vhost: "{{ keystone_oslomsg_rpc_vhost }}"
|
|
_oslomsg_rpc_transport: "{{ keystone_oslomsg_rpc_transport }}"
|
|
_oslomsg_notify_setup_host: "{{ keystone_oslomsg_notify_setup_host }}"
|
|
_oslomsg_notify_userid: "{{ keystone_oslomsg_notify_userid }}"
|
|
_oslomsg_notify_password: "{{ keystone_oslomsg_notify_password }}"
|
|
_oslomsg_notify_vhost: "{{ keystone_oslomsg_notify_vhost }}"
|
|
_oslomsg_notify_transport: "{{ keystone_oslomsg_notify_transport }}"
|
|
tags:
|
|
- common-mq
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_pre_install.yml
|
|
tags:
|
|
- keystone-install
|
|
|
|
- import_tasks: keystone_install.yml
|
|
tags:
|
|
- keystone-install
|
|
|
|
- name: refresh local facts
|
|
setup:
|
|
filter: ansible_local
|
|
gather_subset: "!all"
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_post_install.yml
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_key_setup.yml
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_fernet.yml
|
|
when:
|
|
- "'fernet' in keystone_token_provider"
|
|
- keystone_service_setup | bool
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_db_sync.yml
|
|
when:
|
|
- "keystone_database_enabled | bool"
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_credential.yml
|
|
when: keystone_service_setup | bool
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_federation_sp_shib_setup.yml
|
|
when:
|
|
- keystone_sp_apache_mod_shib
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_ssl.yml
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: "keystone_{{ keystone_web_server }}.yml"
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_uwsgi.yml
|
|
tags:
|
|
- keystone-config
|
|
|
|
- name: Flush handlers
|
|
meta: flush_handlers
|
|
|
|
- import_tasks: keystone_service_bootstrap.yml
|
|
when:
|
|
- "_keystone_is_first_play_host"
|
|
- "keystone_service_setup | bool"
|
|
tags:
|
|
- keystone-config
|
|
|
|
# Note(odyssey4me):
|
|
# This set of tasks specifically runs against the last keystone
|
|
# node in the cluster to ensure that the modules have access to
|
|
# the endpoints which were bootstrapped in keystone_service_bootstrap.
|
|
- name: Wait for services to be up
|
|
delegate_to: "{{ keystone_service_setup_host }}"
|
|
uri:
|
|
url: "{{ item.url }}"
|
|
validate_certs: "{{ item.validate_certs }}"
|
|
method: "HEAD"
|
|
status_code: 300
|
|
with_items:
|
|
- url: "{{ keystone_service_adminuri }}"
|
|
validate_certs: "{{ not keystone_service_adminuri_insecure }}"
|
|
- url: "{{ keystone_service_internaluri }}"
|
|
validate_certs: "{{ not keystone_service_internaluri_insecure }}"
|
|
register: _wait_check
|
|
when:
|
|
- "_keystone_is_last_play_host"
|
|
until: _wait_check is success
|
|
retries: 12
|
|
delay: 5
|
|
|
|
- import_tasks: service_setup.yml
|
|
vars:
|
|
_service_adminuri_insecure: "{{ keystone_service_adminuri_insecure }}"
|
|
_service_in_ldap: "{{ keystone_service_in_ldap }}"
|
|
_service_setup_host: "{{ keystone_service_setup_host }}"
|
|
_service_setup_host_python_interpreter: "{{ keystone_service_setup_host_python_interpreter }}"
|
|
_project_name: "{{ keystone_service_tenant_name }}"
|
|
_project_description: "{{ keystone_service_description }}"
|
|
_role_name: "{{ keystone_default_role_name }}"
|
|
_service_region: "{{ keystone_service_region }}"
|
|
_service_catalog:
|
|
- name: "{{ keystone_service_name }}"
|
|
type: "{{ keystone_service_type }}"
|
|
description: "{{ keystone_service_description }}"
|
|
_service_endpoints:
|
|
- interface: "public"
|
|
url: "{{ keystone_service_publicuri }}"
|
|
service: "{{ keystone_service_name }}"
|
|
- interface: "internal"
|
|
url: "{{ keystone_service_internaluri }}"
|
|
service: "{{ keystone_service_name }}"
|
|
- interface: "admin"
|
|
url: "{{ keystone_service_adminuri }}"
|
|
service: "{{ keystone_service_name }}"
|
|
when:
|
|
- "_keystone_is_last_play_host"
|
|
- "keystone_service_setup | bool"
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_ldap_setup.yml
|
|
when:
|
|
- keystone_service_setup | bool
|
|
- keystone_ldap != {}
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_federation_sp_idp_setup.yml
|
|
when:
|
|
- keystone_service_setup | bool
|
|
- keystone_sp != {}
|
|
run_once: yes
|
|
tags:
|
|
- keystone-config
|
|
|
|
- name: Flush handlers
|
|
meta: flush_handlers
|
|
|
|
- import_tasks: keystone_idp_setup.yml
|
|
when: keystone_idp != {}
|
|
tags:
|
|
- keystone-config
|
|
|
|
- name: Diagnose common problems with keystone deployments
|
|
command: "{{ keystone_bin }}/keystone-manage doctor"
|
|
become: yes
|
|
become_user: "{{ keystone_system_user_name }}"
|
|
register: keystone_doctor
|
|
failed_when: not debug and keystone_doctor.rc != 0
|
|
changed_when: false
|
|
run_once: yes
|
|
tags:
|
|
- keystone-config
|