Logan V b3425781ec Rebuild credential-key repo during keystone[0] rebuild
When the first Keystone container is rebult in an existing environment,
the credential key repository is overwritten with new keys and the
existing keys are overwritten on the other infrastructure hosts without
any migration taking place. This results in an irrevocable loss of
the keys used to encrypt the credentials.

Now we will collect keys from any existing credential keys on the other
containers and use them to rebuild the credential-key repo on the primary
container before performing a key migration and rotation.

If no keys are found on the other containers, we will perform a
credential_setup on the primary container and sync the keys, just
as we would have before.

Closes-Bug: #1667960
Change-Id: Ic616d397574573629273838fbf68ea3f6bdb0468
2017-03-04 02:46:39 +00:00
2017-02-23 05:15:53 -05:00
2015-10-14 13:59:47 -05:00
2017-02-07 21:01:09 -06:00
2017-01-11 13:58:31 -05:00
2017-02-09 14:00:27 +00:00
2016-02-26 14:13:43 -06:00
2016-09-28 08:56:33 +01:00
2016-11-25 16:13:03 +01:00
2016-09-20 14:21:45 +05:30
2017-03-02 11:51:52 +00:00

Team and repository tags

image

OpenStack-Ansible keystone

Ansible role that installs and configures OpenStack Keystone. Keystone is installed behind the Apache webserver listening on port 5000 and port 35357 by default.

Documentation for the project can be found at: http://docs.openstack.org/developer/openstack-ansible-os_keystone/ The project home is at: http://launchpad.net/openstack-ansible

Description
Role os_keystone for OpenStack-Ansible
Readme 11 MiB
Languages
Jinja 69.4%
Python 22%
Shell 8.6%