Execute service setup against a delegated host using Ansible built-in modules

In order to reduce the packages required to pip install on to the hosts,
we allow the service setup to be delegated to a specific host, defaulting
to the deploy host. We also switch as many tasks as possible to using the
built-in Ansible modules which make use of the shade library.

The openstack_openrc role is now executed once on the designated host, so
it is no longer necessary to execute it using include_role here.

The zun_requires_pip_packages variable is not used and is therefore removed.

Depends-On: https://review.openstack.org/579233
Depends-On: https://review.openstack.org/579959
Change-Id: I7108b43109136aac46bc87a0c59827a202f87be8
This commit is contained in:
Jesse Pretorius 2018-07-02 11:00:21 +01:00 committed by Jesse Pretorius (odyssey4me)
parent 8c431183b7
commit 9451adb165
5 changed files with 91 additions and 160 deletions

View File

@ -26,6 +26,11 @@ zun_ceilometer_enabled: False
## Verbosity Options ## Verbosity Options
debug: False debug: False
# Set the host which will execute the shade modules
# for the service setup. The host must already have
# clouds.yaml properly configured.
zun_service_setup_host: "{{ openstack_service_setup_host | default('localhost') }}"
# Set the package install state for distribution and pip packages # Set the package install state for distribution and pip packages
# Options are 'present' and 'latest' # Options are 'present' and 'latest'
zun_package_state: "latest" zun_package_state: "latest"
@ -224,7 +229,6 @@ zun_services:
execstarts: "{{ zun_bin }}/zun-wsproxy --config-dir /etc/zun" execstarts: "{{ zun_bin }}/zun-wsproxy --config-dir /etc/zun"
# Common pip packages # Common pip packages
zun_requires_pip_packages: []
zun_pip_packages: zun_pip_packages:
- kuryr-libnetwork - kuryr-libnetwork
- oslo_rootwrap - oslo_rootwrap

View File

@ -30,19 +30,6 @@
when: when:
- zun_developer_mode | bool - zun_developer_mode | bool
- name: Install required pip packages
pip:
name: "{{ zun_requires_pip_packages }}"
state: "{{ zun_pip_package_state }}"
extra_args: >-
{{ zun_developer_mode | ternary(pip_install_developer_constraints | default('--constraint /opt/developer-pip-constraints.txt'), '') }}
{{ (pip_install_upper_constraints is defined) | ternary('--constraint ' + pip_install_upper_constraints | default(''),'') }}
{{ pip_install_options | default('') }}
register: install_packages
until: install_packages|success
retries: 5
delay: 2
- name: Retrieve checksum for venv download - name: Retrieve checksum for venv download
uri: uri:
url: "{{ zun_venv_download_url | replace('tgz', 'checksum') }}" url: "{{ zun_venv_download_url | replace('tgz', 'checksum') }}"

View File

@ -13,150 +13,91 @@
# See the License for the specific language governing permissions and # See the License for the specific language governing permissions and
# limitations under the License. # limitations under the License.
- name: Run the openstack openrc role # We set the python interpreter to the ansible runtime venv if
include_role: # the delegation is to localhost so that we get access to the
name: openstack_openrc # appropriate python libraries in that venv. If the delegation
private: true # is to another host, we assume that it is accessible by the
# system python instead.
- name: Setup the service
delegate_to: "{{ zun_service_setup_host }}"
vars:
ansible_python_interpreter: >-
{{ (zun_service_setup_host == 'localhost') | ternary(ansible_playbook_python, ansible_python['executable']) }}
block:
- name: Add service to the keystone service catalog
os_keystone_service:
cloud: default
state: present
name: "{{ zun_service_name }}"
service_type: "{{ zun_service_type }}"
description: "{{ zun_service_description }}"
endpoint_type: admin
verify: "{{ not keystone_service_adminuri_insecure }}"
register: add_service
until: add_service is success
retries: 5
delay: 10
# Create a service - name: Add service user
- name: Ensure zun service os_user:
keystone: cloud: default
command: "ensure_service" state: present
endpoint: "{{ keystone_service_adminurl }}" name: "{{ item.name }}"
login_user: "{{ keystone_admin_user_name }}" password: "{{ item.password }}"
login_password: "{{ keystone_auth_admin_password }}" domain: default
login_project_name: "{{ keystone_admin_tenant_name }}" default_project: "{{ zun_service_project_name }}"
service_name: "{{ zun_service_name }}" endpoint_type: admin
service_type: "{{ zun_service_type }}" verify: "{{ not keystone_service_adminuri_insecure }}"
description: "{{ zun_service_description }}" register: add_service
insecure: "{{ keystone_service_adminuri_insecure }}" when: not zun_service_in_ldap | bool
register: add_service until: add_service is success
until: add_service | success retries: 5
retries: 5 delay: 10
delay: 2 no_log: True
no_log: True with_items:
tags: - name: "{{ zun_service_user_name }}"
- zun-api-setup password: "{{ zun_service_password }}"
- zun-service-add - name: "{{ zun_kuryr_service_username }}"
- zun-setup password: "{{ zun_kuryr_service_password }}"
loop_control:
label: "{{ item.name }}"
# Create an admin user - name: Add service user to admin role
- name: Ensure zun user os_user_role:
keystone: cloud: default
command: "ensure_user" state: present
endpoint: "{{ keystone_service_adminurl }}" user: "{{ item }}"
login_user: "{{ keystone_admin_user_name }}" role: "{{ zun_service_role_name }}"
login_password: "{{ keystone_auth_admin_password }}" project: "{{ zun_service_project_name }}"
login_project_name: "{{ keystone_admin_tenant_name }}" endpoint_type: admin
user_name: "{{ zun_service_user_name }}" verify: "{{ not keystone_service_adminuri_insecure }}"
tenant_name: "{{ zun_service_project_name }}" register: add_service
password: "{{ zun_service_password }}" when: not zun_service_in_ldap | bool
insecure: "{{ keystone_service_adminuri_insecure }}" until: add_service is success
register: add_service retries: 5
when: delay: 10
- not zun_service_in_ldap | bool with_items:
until: add_service | success - "{{ zun_service_user_name }}"
retries: 5 - "{{ zun_kuryr_service_username }}"
delay: 10
no_log: True
tags:
- zun-api-setup
- zun-service-add
- zun-setup
# Add a role to the user - name: Add endpoints to keystone endpoint catalog
- name: Ensure zun user to admin role os_keystone_endpoint:
keystone: cloud: default
command: "ensure_user_role" state: present
endpoint: "{{ keystone_service_adminurl }}" service: "{{ zun_service_name }}"
login_user: "{{ keystone_admin_user_name }}" endpoint_interface: "{{ item.interface }}"
login_password: "{{ keystone_auth_admin_password }}" url: "{{ item.url }}"
login_project_name: "{{ keystone_admin_tenant_name }}" region: "{{ zun_service_region }}"
user_name: "{{ zun_service_user_name }}" endpoint_type: admin
tenant_name: "{{ zun_service_project_name }}" verify: "{{ not keystone_service_adminuri_insecure }}"
role_name: "{{ zun_service_role_name }}" register: add_service
insecure: "{{ keystone_service_adminuri_insecure }}" until: add_service is success
register: add_service retries: 5
when: delay: 10
- not zun_service_in_ldap | bool with_items:
until: add_service | success - interface: "public"
retries: 5 url: "{{ zun_service_publicurl }}"
delay: 10 - interface: "internal"
no_log: True url: "{{ zun_service_internalurl }}"
tags: - interface: "admin"
- zun-api-setup url: "{{ zun_service_adminurl }}"
- zun-service-add
- zun-setup
# Create an endpoint
- name: Ensure zun endpoint
keystone:
command: "ensure_endpoint"
endpoint: "{{ keystone_service_adminurl }}"
login_user: "{{ keystone_admin_user_name }}"
login_password: "{{ keystone_auth_admin_password }}"
login_project_name: "{{ keystone_admin_tenant_name }}"
region_name: "{{ zun_service_region }}"
service_name: "{{ zun_service_name }}"
service_type: "{{ zun_service_type }}"
insecure: "{{ keystone_service_adminuri_insecure }}"
endpoint_list:
- url: "{{ zun_service_publicurl }}"
interface: "public"
- url: "{{ zun_service_internalurl }}"
interface: "internal"
- url: "{{ zun_service_adminurl }}"
interface: "admin"
register: add_service
until: add_service | success
retries: 5
delay: 10
no_log: True
tags:
- zun-api-setup
- zun-service-add
- zun-setup
# Create an admin user
- name: Ensure zun kuryr user
keystone:
command: "ensure_user"
endpoint: "{{ keystone_service_adminurl }}"
login_user: "{{ keystone_admin_user_name }}"
login_password: "{{ keystone_auth_admin_password }}"
login_project_name: "{{ keystone_admin_tenant_name }}"
user_name: "{{ zun_kuryr_service_username }}"
tenant_name: "{{ zun_service_project_name }}"
password: "{{ zun_kuryr_service_password }}"
insecure: "{{ keystone_service_adminuri_insecure }}"
register: add_service
when: not zun_service_in_ldap | bool
until: add_service | success
retries: 5
delay: 10
no_log: True
tags:
- zun-api-setup
- zun-service-add
# Add a role to the user
- name: Ensure zun kuryr user to admin role
keystone:
command: "ensure_user_role"
endpoint: "{{ keystone_service_adminurl }}"
login_user: "{{ keystone_admin_user_name }}"
login_password: "{{ keystone_auth_admin_password }}"
login_project_name: "{{ keystone_admin_tenant_name }}"
user_name: "{{ zun_kuryr_service_username }}"
tenant_name: "{{ zun_service_project_name }}"
role_name: "{{ zun_service_role_name }}"
insecure: "{{ keystone_service_adminuri_insecure }}"
register: add_service
when: not zun_service_in_ldap | bool
until: add_service | success
retries: 5
delay: 10
no_log: True
tags:
- zun-api-setup
- zun-service-add

View File

@ -14,7 +14,6 @@
# limitations under the License. # limitations under the License.
ansible_host: 10.1.1.1 ansible_host: 10.1.1.1
ansible_python_interpreter: "/usr/bin/python2"
neutron_provider_networks: neutron_provider_networks:
network_types: "vxlan,flat" network_types: "vxlan,flat"

View File

@ -15,7 +15,7 @@
- name: Installation and setup of Zun - name: Installation and setup of Zun
hosts: zun_all hosts: zun_all
become: true remote_user: root
roles: roles:
- role: "os_zun" - role: "os_zun"
zun_rabbitmq_password: secrete zun_rabbitmq_password: secrete