Stop managing infracloud things
Infracloud is sadly deceased. The upside is we can delete a lot of code we don't need anymore. This patch removes infracloud nodes from site.pp so that the puppet-apply test no longer bothers to validate them, removes the infracloud modules from modules.env so that we don't bother to install those modules in puppet-apply and puppet functional tests, and removes the infracloud-specific data from the public hiera. Additionally stop the puppetmaster from trying to run the infracloud ansible playbook and finally remove the chocolate region from nodepool's clouds.yaml (vanilla was already done). This patch leaves the run_infracloud.sh script and the infracloud-specific ansible playbooks as well as the infracloud manifests in the openstack_project puppet module. It's possible those tools could come in handy in the future if we ever have another infracloud, and leaving those tools in place doesn't add confusion about which hosts are actually active nor does it leave cruft that gets unnecessarily tested. Change-Id: Ic760cc55f8e17fa7f39f2dd0433f5560aa8e2d65
This commit is contained in:
parent
d00464016a
commit
ac9a031e32
@ -502,8 +502,6 @@ cacti_hosts:
|
|||||||
- mirror02.dfw.rax.openstack.org
|
- mirror02.dfw.rax.openstack.org
|
||||||
- mirror01.ord.rax.openstack.org
|
- mirror01.ord.rax.openstack.org
|
||||||
- mirror01.iad.rax.openstack.org
|
- mirror01.iad.rax.openstack.org
|
||||||
- mirror01.regionone.infracloud-chocolate.openstack.org
|
|
||||||
- mirror01.regionone.infracloud-vanilla.openstack.org
|
|
||||||
- mirror01.regionone.limestone.openstack.org
|
- mirror01.regionone.limestone.openstack.org
|
||||||
- mirror01.kna1.citycloud.openstack.org
|
- mirror01.kna1.citycloud.openstack.org
|
||||||
- mirror01.sto2.citycloud.openstack.org
|
- mirror01.sto2.citycloud.openstack.org
|
||||||
@ -548,72 +546,6 @@ cacti_hosts:
|
|||||||
- zm07.openstack.org
|
- zm07.openstack.org
|
||||||
- zm08.openstack.org
|
- zm08.openstack.org
|
||||||
- zuul01.openstack.org
|
- zuul01.openstack.org
|
||||||
infracloud_hpuseast_ssl_cert_file_contents: |
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIEijCCAvICCQDZLTPao6k1yjANBgkqhkiG9w0BAQsFADCBhjELMAkGA1UEBhMC
|
|
||||||
VVMxDDAKBgNVBAgMA04vQTEYMBYGA1UECgwPT3BlblN0YWNrIEluZnJhMR4wHAYD
|
|
||||||
VQQLDBVPcGVuU3RhY2sgSW5mcmEgQ2xvdWQxLzAtBgNVBAMMJmNvbnRyb2xsZXIw
|
|
||||||
MC5ocHVzZWFzdC5pYy5vcGVuc3RhY2sub3JnMB4XDTE2MDIxNTExMjczM1oXDTE3
|
|
||||||
MDIxNDExMjczM1owgYYxCzAJBgNVBAYTAlVTMQwwCgYDVQQIDANOL0ExGDAWBgNV
|
|
||||||
BAoMD09wZW5TdGFjayBJbmZyYTEeMBwGA1UECwwVT3BlblN0YWNrIEluZnJhIENs
|
|
||||||
b3VkMS8wLQYDVQQDDCZjb250cm9sbGVyMDAuaHB1c2Vhc3QuaWMub3BlbnN0YWNr
|
|
||||||
Lm9yZzCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAKhAxy3ags3KaCN2
|
|
||||||
Qn8qCqRPrQGkVrDGt21R0tlMVUxHKTRKCOoQNBMSB+YfaNmFbZ9FgnXwjr0epuH4
|
|
||||||
t+x0mk3TKW3YH8VPgn1FRlTyRv+X/pGW1afja5+QuQyF2JnzqpV6mLYHXNxk5RT3
|
|
||||||
GgLm2fC9NfGDe53l0Fs8y4DXavJfBXoCqb5qcb58yXdDR4DFc33G2RvUZ5a1Bsz6
|
|
||||||
382yXDeIoV1L8lkkXWO6HwQVJJSpxhc3jFtghTTEy5a7xCrX7If5FHjCj1x5yihk
|
|
||||||
XJ+JiyltVm8dqdSzAIoDwZDfHGYDsPJxab+Sv01EcdLJc7Y7YkR/1aCluM0SIAMk
|
|
||||||
p+mm7R+c9pnx0pvEMjv5iPX9sUG5x0uOa7enZX5uSKQLlXUyXKBkGMcHOPUK6hql
|
|
||||||
E6mo4qydoMvyDiNWMreriHUpELUWYJlTe23EfSPdiLyvmmMRaBgOgcOF2yEHvvf/
|
|
||||||
fZOiDBhWVOEUrdDolbBlK/DlBfZ8xogamLfFDK3vggGpVdbcMQIDAQABMA0GCSqG
|
|
||||||
SIb3DQEBCwUAA4IBgQBBImCLV0xDydVvos2lMk3mgkAuVDPxMborJZW0euSTM0id
|
|
||||||
TEJMBgc8+xrmGSQRzWe9JHyAkMtuEOjvu6LdwPcdq24ppf3nyBIF+hSr+ZTI5QWc
|
|
||||||
RDW37rObFjBdK0kuvkA3h4Atmc83iu/GRadDCLL/Ca9CUwYw5lVmcFWrhCWJFYEJ
|
|
||||||
9l0/3WExumOPZnOzbTg4N7kzXmkXFOw42Low5UXtKdSwAbeeMbc2KGLWoF+iwaAF
|
|
||||||
yXyt2+w8wAC/v2RSk7Jc9bu6r/DheTKNJMxtDWzkE8h5iwDzwR/KNEbFwbExPjiW
|
|
||||||
dKYnVC+vch3ix5HF+zLnFe4FVxAwOJB1sJ0fMDLXI94dYVf6yMR8joVM+BNGCkyc
|
|
||||||
OJqPGjxm99356TcXBpVP9bXhLR3XrTVAHGIar74eP76E8bNOZc/k1mw0qn6Pfkbe
|
|
||||||
waHu4jUcpr+TPgFGlaQB7es/E48KpPG/A93QoBiGgqYn7BbtmmVqEQosYhsw9dM1
|
|
||||||
it1KkeR3ySIc6zXTpBM=
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
infracloud_vanilla_ssl_cert_file_contents: |
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIC8DCCAdigAwIBAgIJAKnLfUr0fN5bMA0GCSqGSIb3DQEBCwUAMDAxLjAsBgNV
|
|
||||||
BAMTJWNvbnRyb2xsZXIwMC52YW5pbGxhLmljLm9wZW5zdGFjay5vcmcwHhcNMTYw
|
|
||||||
ODIzMDg0MTMzWhcNMjYwODIxMDg0MTMzWjAwMS4wLAYDVQQDEyVjb250cm9sbGVy
|
|
||||||
MDAudmFuaWxsYS5pYy5vcGVuc3RhY2sub3JnMIIBIjANBgkqhkiG9w0BAQEFAAOC
|
|
||||||
AQ8AMIIBCgKCAQEA14C9pRprywQM3USXg+doOJOXXSNZzHAEnZ12qQ5kWV150EY1
|
|
||||||
XO92qZ5GJDomuVjxxW4WcH3FWbj0+fUHw6uWefeHhhTCI5PgeH95qlxPxzfsfLpy
|
|
||||||
Fx6JBaDTpfAaxlnlKtPsr6D1QwuAt53Q9imrPolrwuwelKgJMouDodfm9uDMbobU
|
|
||||||
jRd/vvXcOdw8HUxQE5pwwHyjUrYC0J4zclg+oVt7/WrfQUxXtsdBwDsoE08iBbrA
|
|
||||||
zSuU6ZNB+T/KJXgKcRozDQzwQW1K1C2i2062ZSw4khreqOhYe7CqRdFZMU5hh/Ih
|
|
||||||
LlNzIaHATJc6K0RaRZ7SMG9yE9OgnI4oWeYCzwIDAQABow0wCzAJBgNVHRMEAjAA
|
|
||||||
MA0GCSqGSIb3DQEBCwUAA4IBAQB/q7qC9Giv5XbeLng01M3Pnbxj/ixRt5/YYA+m
|
|
||||||
6OuzxDYgZHaJf7+EIHspfL+Q7grGX/7wsbJPtqx0IYhMRfKcOWVF4x4i0bTyiX23
|
|
||||||
5lPl2aPhQjH4dhnkAB7KbLKyqTRoaTX7NOKbiHQ43R3AtuqMAFVc6M8R9pAPVq3n
|
|
||||||
+URMb2i9MYTmnobZCRR8Kdg3PFE06rYlYGSzWj6l7bzFXLVJPOvRoc2ONmofTJ4d
|
|
||||||
UnQw19SK7OyeYbWwUFT2yEXyG5NTe1ZxPTtEnCEXEuK19gDxnvOceUpRgJuWoyjL
|
|
||||||
b0KPvk0AyP+1Bb2f6UKo9539EvakMYTEqpuPlMDwyjq7olwr
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
infracloud_chocolate_ssl_cert_file_contents: |
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIC9DCCAdygAwIBAgIJAKj4cGAIm3KwMA0GCSqGSIb3DQEBCwUAMDIxMDAuBgNV
|
|
||||||
BAMTJ2NvbnRyb2xsZXIwMC5jaG9jb2xhdGUuaWMub3BlbnN0YWNrLm9yZzAeFw0x
|
|
||||||
NjA5MjExNDUwMzZaFw0yNjA5MTkxNDUwMzZaMDIxMDAuBgNVBAMTJ2NvbnRyb2xs
|
|
||||||
ZXIwMC5jaG9jb2xhdGUuaWMub3BlbnN0YWNrLm9yZzCCASIwDQYJKoZIhvcNAQEB
|
|
||||||
BQADggEPADCCAQoCggEBAOkbDJhI6kAX2sZi+YRVcU0ePZurpSS1aVJERDp9wVw5
|
|
||||||
NIESkPFilb5Ff7NlTkZs0NWSRG62hmf43ea16NpsJP3lbvIawx4iK58BFaFCJw3z
|
|
||||||
6J0A1On2oz6+qZ03NZ1CzwWCKlRWD0VpyDBtGXLwElwkS3QP9iFC1WPwBD2Hd1dC
|
|
||||||
YXZrN0l2wMrRRWHxiIZZaOvt9yntMA/GOGPG3MI3x82mxx3gZtXO8/LvvzN4Bqif
|
|
||||||
AmAKNdq1I5PQOMr4/j3Vs213MMIMEM9R4GjYoeYhNRQAV8OYvpzPLjdzqVx+5QZk
|
|
||||||
t3IHlApPjcefFJoGnqpAgUTbiLYqAAKljGF8/MuY848CAwEAAaMNMAswCQYDVR0T
|
|
||||||
BAIwADANBgkqhkiG9w0BAQsFAAOCAQEAVJo5q1LhVXngTOyqaAmXgrm0PU2Wb5Lr
|
|
||||||
keZ4JlQjLH9Y6M2JQ5i4ih37DuEOoyvRM48DrEFJ3uF4GCl/QgRd9NpWaqWH+VEu
|
|
||||||
nhdHkrVRdOVZiqcpPL4D661iUeN0ESxRnhmbGfr6UPFikNKdMuO9Q4n9oN9fm+gR
|
|
||||||
r9J0ZtHsyJva0C/ll/FXl3eQCx2PXDVRlrpf+0pCZxpSJJvksKFOhNMd8703lTaN
|
|
||||||
hSjXxXxM4KpXfGZQ8rdvB+TrladcBpRqsaFXN07BRU6OWZ59z6b1KFEV//XOkj8h
|
|
||||||
osIiNUq7LRJe9znYYeHvQVcp8vQhxBsfgv7IFW89gntNCpq7YITCVQ==
|
|
||||||
-----END CERTIFICATE-----
|
|
||||||
limestone_ssl_cert_file_contents: |
|
limestone_ssl_cert_file_contents: |
|
||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
MIIDzTCCArWgAwIBAgIJAMjKv/sJrt0JMA0GCSqGSIb3DQEBCwUAMH0xCzAJBgNV
|
MIIDzTCCArWgAwIBAgIJAMjKv/sJrt0JMA0GCSqGSIb3DQEBCwUAMH0xCzAJBgNV
|
||||||
|
@ -224,22 +224,6 @@ node 'puppetmaster.openstack.org' {
|
|||||||
mqtt_password => hiera('mqtt_service_user_password'),
|
mqtt_password => hiera('mqtt_service_user_password'),
|
||||||
mqtt_ca_cert_contents => hiera('mosquitto_tls_ca_file'),
|
mqtt_ca_cert_contents => hiera('mosquitto_tls_ca_file'),
|
||||||
}
|
}
|
||||||
file { '/etc/openstack/infracloud_vanilla_cacert.pem':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'root',
|
|
||||||
group => 'root',
|
|
||||||
mode => '0444',
|
|
||||||
content => hiera('infracloud_vanilla_ssl_cert_file_contents'),
|
|
||||||
require => Class['::openstack_project::puppetmaster'],
|
|
||||||
}
|
|
||||||
file { '/etc/openstack/infracloud_chocolate_cacert.pem':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'root',
|
|
||||||
group => 'root',
|
|
||||||
mode => '0444',
|
|
||||||
content => hiera('infracloud_chocolate_ssl_cert_file_contents'),
|
|
||||||
require => Class['::openstack_project::puppetmaster'],
|
|
||||||
}
|
|
||||||
file { '/etc/openstack/limestone_cacert.pem':
|
file { '/etc/openstack/limestone_cacert.pem':
|
||||||
ensure => present,
|
ensure => present,
|
||||||
owner => 'root',
|
owner => 'root',
|
||||||
@ -980,12 +964,6 @@ node 'nodepool.openstack.org' {
|
|||||||
$tripleo_username = hiera('nodepool_tripleo_username', 'username')
|
$tripleo_username = hiera('nodepool_tripleo_username', 'username')
|
||||||
$tripleo_password = hiera('nodepool_tripleo_password')
|
$tripleo_password = hiera('nodepool_tripleo_password')
|
||||||
$tripleo_project = hiera('nodepool_tripleo_project', 'project')
|
$tripleo_project = hiera('nodepool_tripleo_project', 'project')
|
||||||
$infracloud_vanilla_username = hiera('nodepool_infracloud_vanilla_username', 'username')
|
|
||||||
$infracloud_vanilla_password = hiera('nodepool_infracloud_vanilla_password')
|
|
||||||
$infracloud_vanilla_project = hiera('nodepool_infracloud_vanilla_project', 'project')
|
|
||||||
$infracloud_chocolate_username = hiera('nodepool_infracloud_chocolate_username', 'username')
|
|
||||||
$infracloud_chocolate_password = hiera('nodepool_infracloud_chocolate_password')
|
|
||||||
$infracloud_chocolate_project = hiera('nodepool_infracloud_chocolate_project', 'project')
|
|
||||||
$vexxhost_username = hiera('nodepool_vexxhost_username', 'username')
|
$vexxhost_username = hiera('nodepool_vexxhost_username', 'username')
|
||||||
$vexxhost_password = hiera('nodepool_vexxhost_password')
|
$vexxhost_password = hiera('nodepool_vexxhost_password')
|
||||||
$vexxhost_project = hiera('nodepool_vexxhost_project', 'project')
|
$vexxhost_project = hiera('nodepool_vexxhost_project', 'project')
|
||||||
@ -1044,22 +1022,6 @@ node 'nodepool.openstack.org' {
|
|||||||
jenkins_masters => [],
|
jenkins_masters => [],
|
||||||
split_daemon => true,
|
split_daemon => true,
|
||||||
}
|
}
|
||||||
file { '/home/nodepool/.config/openstack/infracloud_vanilla_cacert.pem':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'nodepool',
|
|
||||||
group => 'nodepool',
|
|
||||||
mode => '0600',
|
|
||||||
content => hiera('infracloud_vanilla_ssl_cert_file_contents'),
|
|
||||||
require => Class['::openstackci::nodepool'],
|
|
||||||
}
|
|
||||||
file { '/home/nodepool/.config/openstack/infracloud_chocolate_cacert.pem':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'nodepool',
|
|
||||||
group => 'nodepool',
|
|
||||||
mode => '0600',
|
|
||||||
content => hiera('infracloud_chocolate_ssl_cert_file_contents'),
|
|
||||||
require => Class['::openstackci::nodepool'],
|
|
||||||
}
|
|
||||||
file { '/home/nodepool/.config/openstack/limestone_cacert.pem':
|
file { '/home/nodepool/.config/openstack/limestone_cacert.pem':
|
||||||
ensure => present,
|
ensure => present,
|
||||||
owner => 'nodepool',
|
owner => 'nodepool',
|
||||||
@ -1100,12 +1062,6 @@ node /^nl\d+\.openstack\.org$/ {
|
|||||||
$tripleo_username = hiera('nodepool_tripleo_username', 'username')
|
$tripleo_username = hiera('nodepool_tripleo_username', 'username')
|
||||||
$tripleo_password = hiera('nodepool_tripleo_password')
|
$tripleo_password = hiera('nodepool_tripleo_password')
|
||||||
$tripleo_project = hiera('nodepool_tripleo_project', 'project')
|
$tripleo_project = hiera('nodepool_tripleo_project', 'project')
|
||||||
$infracloud_vanilla_username = hiera('nodepool_infracloud_vanilla_username', 'username')
|
|
||||||
$infracloud_vanilla_password = hiera('nodepool_infracloud_vanilla_password')
|
|
||||||
$infracloud_vanilla_project = hiera('nodepool_infracloud_vanilla_project', 'project')
|
|
||||||
$infracloud_chocolate_username = hiera('nodepool_infracloud_chocolate_username', 'username')
|
|
||||||
$infracloud_chocolate_password = hiera('nodepool_infracloud_chocolate_password')
|
|
||||||
$infracloud_chocolate_project = hiera('nodepool_infracloud_chocolate_project', 'project')
|
|
||||||
$vexxhost_username = hiera('nodepool_vexxhost_username', 'username')
|
$vexxhost_username = hiera('nodepool_vexxhost_username', 'username')
|
||||||
$vexxhost_password = hiera('nodepool_vexxhost_password')
|
$vexxhost_password = hiera('nodepool_vexxhost_password')
|
||||||
$vexxhost_project = hiera('nodepool_vexxhost_project', 'project')
|
$vexxhost_project = hiera('nodepool_vexxhost_project', 'project')
|
||||||
@ -1136,22 +1092,6 @@ node /^nl\d+\.openstack\.org$/ {
|
|||||||
enable_webapp => true,
|
enable_webapp => true,
|
||||||
}
|
}
|
||||||
|
|
||||||
file { '/home/nodepool/.config/openstack/infracloud_vanilla_cacert.pem':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'nodepool',
|
|
||||||
group => 'nodepool',
|
|
||||||
mode => '0600',
|
|
||||||
content => hiera('infracloud_vanilla_ssl_cert_file_contents'),
|
|
||||||
require => Class['::openstackci::nodepool_launcher'],
|
|
||||||
}
|
|
||||||
file { '/home/nodepool/.config/openstack/infracloud_chocolate_cacert.pem':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'nodepool',
|
|
||||||
group => 'nodepool',
|
|
||||||
mode => '0600',
|
|
||||||
content => hiera('infracloud_chocolate_ssl_cert_file_contents'),
|
|
||||||
require => Class['::openstackci::nodepool_launcher'],
|
|
||||||
}
|
|
||||||
file { '/home/nodepool/.config/openstack/limestone_cacert.pem':
|
file { '/home/nodepool/.config/openstack/limestone_cacert.pem':
|
||||||
ensure => present,
|
ensure => present,
|
||||||
owner => 'nodepool',
|
owner => 'nodepool',
|
||||||
@ -1182,12 +1122,6 @@ node /^nb\d+\.openstack\.org$/ {
|
|||||||
$tripleo_username = hiera('nodepool_tripleo_username', 'username')
|
$tripleo_username = hiera('nodepool_tripleo_username', 'username')
|
||||||
$tripleo_password = hiera('nodepool_tripleo_password')
|
$tripleo_password = hiera('nodepool_tripleo_password')
|
||||||
$tripleo_project = hiera('nodepool_tripleo_project', 'project')
|
$tripleo_project = hiera('nodepool_tripleo_project', 'project')
|
||||||
$infracloud_vanilla_username = hiera('nodepool_infracloud_vanilla_username', 'username')
|
|
||||||
$infracloud_vanilla_password = hiera('nodepool_infracloud_vanilla_password')
|
|
||||||
$infracloud_vanilla_project = hiera('nodepool_infracloud_vanilla_project', 'project')
|
|
||||||
$infracloud_chocolate_username = hiera('nodepool_infracloud_chocolate_username', 'username')
|
|
||||||
$infracloud_chocolate_password = hiera('nodepool_infracloud_chocolate_password')
|
|
||||||
$infracloud_chocolate_project = hiera('nodepool_infracloud_chocolate_project', 'project')
|
|
||||||
$vexxhost_username = hiera('nodepool_vexxhost_username', 'username')
|
$vexxhost_username = hiera('nodepool_vexxhost_username', 'username')
|
||||||
$vexxhost_password = hiera('nodepool_vexxhost_password')
|
$vexxhost_password = hiera('nodepool_vexxhost_password')
|
||||||
$vexxhost_project = hiera('nodepool_vexxhost_project', 'project')
|
$vexxhost_project = hiera('nodepool_vexxhost_project', 'project')
|
||||||
@ -1222,23 +1156,6 @@ node /^nb\d+\.openstack\.org$/ {
|
|||||||
zuulv3 => true,
|
zuulv3 => true,
|
||||||
}
|
}
|
||||||
|
|
||||||
file { '/home/nodepool/.config/openstack/infracloud_vanilla_cacert.pem':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'nodepool',
|
|
||||||
group => 'nodepool',
|
|
||||||
mode => '0600',
|
|
||||||
content => hiera('infracloud_vanilla_ssl_cert_file_contents'),
|
|
||||||
require => Class['::openstackci::nodepool_builder'],
|
|
||||||
}
|
|
||||||
|
|
||||||
file { '/home/nodepool/.config/openstack/infracloud_chocolate_cacert.pem':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'nodepool',
|
|
||||||
group => 'nodepool',
|
|
||||||
mode => '0600',
|
|
||||||
content => hiera('infracloud_chocolate_ssl_cert_file_contents'),
|
|
||||||
require => Class['::openstackci::nodepool_builder'],
|
|
||||||
}
|
|
||||||
file { '/home/nodepool/.config/openstack/limestone_cacert.pem':
|
file { '/home/nodepool/.config/openstack/limestone_cacert.pem':
|
||||||
ensure => present,
|
ensure => present,
|
||||||
owner => 'nodepool',
|
owner => 'nodepool',
|
||||||
@ -1780,145 +1697,4 @@ node /^codesearch\d*\.openstack\.org$/ {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# Node-OS: trusty
|
|
||||||
node 'controller00.vanilla.ic.openstack.org' {
|
|
||||||
$group = 'infracloud'
|
|
||||||
class { '::openstack_project::server':
|
|
||||||
iptables_public_tcp_ports => [80,5000,5671,8774,9292,9696,35357], # logs,keystone,rabbit,nova,glance,neutron,keystone
|
|
||||||
sysadmins => hiera('sysadmins', []),
|
|
||||||
enable_unbound => false,
|
|
||||||
purge_apt_sources => false,
|
|
||||||
}
|
|
||||||
class { '::openstack_project::infracloud::controller':
|
|
||||||
keystone_rabbit_password => hiera('keystone_rabbit_password'),
|
|
||||||
neutron_rabbit_password => hiera('neutron_rabbit_password'),
|
|
||||||
nova_rabbit_password => hiera('nova_rabbit_password'),
|
|
||||||
root_mysql_password => hiera('infracloud_mysql_password'),
|
|
||||||
keystone_mysql_password => hiera('keystone_mysql_password'),
|
|
||||||
glance_mysql_password => hiera('glance_mysql_password'),
|
|
||||||
neutron_mysql_password => hiera('neutron_mysql_password'),
|
|
||||||
nova_mysql_password => hiera('nova_mysql_password'),
|
|
||||||
keystone_admin_password => hiera('keystone_admin_password'),
|
|
||||||
glance_admin_password => hiera('glance_admin_password'),
|
|
||||||
neutron_admin_password => hiera('neutron_admin_password'),
|
|
||||||
nova_admin_password => hiera('nova_admin_password'),
|
|
||||||
keystone_admin_token => hiera('keystone_admin_token'),
|
|
||||||
ssl_key_file_contents => hiera('ssl_key_file_contents'),
|
|
||||||
ssl_cert_file_contents => hiera('infracloud_vanilla_ssl_cert_file_contents'),
|
|
||||||
br_name => hiera('bridge_name'),
|
|
||||||
controller_public_address => $::fqdn,
|
|
||||||
neutron_subnet_cidr => '15.184.64.0/19',
|
|
||||||
neutron_subnet_gateway => '15.184.64.1',
|
|
||||||
neutron_subnet_allocation_pools => [
|
|
||||||
'start=15.184.65.2,end=15.184.65.254',
|
|
||||||
'start=15.184.66.2,end=15.184.66.254',
|
|
||||||
'start=15.184.67.2,end=15.184.67.254'
|
|
||||||
],
|
|
||||||
mysql_max_connections => hiera('mysql_max_connections'),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
node /^compute\d{3}\.vanilla\.ic\.openstack\.org$/ {
|
|
||||||
$group = 'infracloud'
|
|
||||||
class { '::openstack_project::server':
|
|
||||||
sysadmins => hiera('sysadmins', []),
|
|
||||||
enable_unbound => false,
|
|
||||||
purge_apt_sources => false,
|
|
||||||
}
|
|
||||||
class { '::openstack_project::infracloud::compute':
|
|
||||||
nova_rabbit_password => hiera('nova_rabbit_password'),
|
|
||||||
neutron_rabbit_password => hiera('neutron_rabbit_password'),
|
|
||||||
neutron_admin_password => hiera('neutron_admin_password'),
|
|
||||||
ssl_key_file_contents => hiera('ssl_key_file_contents'),
|
|
||||||
ssl_cert_file_contents => hiera('infracloud_vanilla_ssl_cert_file_contents'),
|
|
||||||
br_name => hiera('bridge_name'),
|
|
||||||
controller_public_address => 'controller00.vanilla.ic.openstack.org',
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
# Node-OS: trusty
|
|
||||||
node 'controller00.chocolate.ic.openstack.org' {
|
|
||||||
$group = 'infracloud'
|
|
||||||
class { '::openstack_project::server':
|
|
||||||
iptables_public_tcp_ports => [80,5000,5671,8774,9292,9696,35357], # logs,keystone,rabbit,nova,glance,neutron,keystone
|
|
||||||
sysadmins => hiera('sysadmins', []),
|
|
||||||
enable_unbound => false,
|
|
||||||
purge_apt_sources => false,
|
|
||||||
}
|
|
||||||
class { '::openstack_project::infracloud::controller':
|
|
||||||
keystone_rabbit_password => hiera('keystone_rabbit_password'),
|
|
||||||
neutron_rabbit_password => hiera('neutron_rabbit_password'),
|
|
||||||
nova_rabbit_password => hiera('nova_rabbit_password'),
|
|
||||||
root_mysql_password => hiera('infracloud_mysql_password'),
|
|
||||||
keystone_mysql_password => hiera('keystone_mysql_password'),
|
|
||||||
glance_mysql_password => hiera('glance_mysql_password'),
|
|
||||||
neutron_mysql_password => hiera('neutron_mysql_password'),
|
|
||||||
nova_mysql_password => hiera('nova_mysql_password'),
|
|
||||||
keystone_admin_password => hiera('keystone_admin_password'),
|
|
||||||
glance_admin_password => hiera('glance_admin_password'),
|
|
||||||
neutron_admin_password => hiera('neutron_admin_password'),
|
|
||||||
nova_admin_password => hiera('nova_admin_password'),
|
|
||||||
keystone_admin_token => hiera('keystone_admin_token'),
|
|
||||||
ssl_key_file_contents => hiera('infracloud_chocolate_ssl_key_file_contents'),
|
|
||||||
ssl_cert_file_contents => hiera('infracloud_chocolate_ssl_cert_file_contents'),
|
|
||||||
br_name => 'br-vlan2551',
|
|
||||||
controller_public_address => $::fqdn,
|
|
||||||
neutron_subnet_cidr => '15.184.64.0/19',
|
|
||||||
neutron_subnet_gateway => '15.184.64.1',
|
|
||||||
neutron_subnet_allocation_pools => [
|
|
||||||
'start=15.184.68.2,end=15.184.68.254',
|
|
||||||
'start=15.184.69.2,end=15.184.69.254',
|
|
||||||
'start=15.184.70.2,end=15.184.70.254'
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
node /^compute\d{3}\.chocolate\.ic\.openstack\.org$/ {
|
|
||||||
$group = 'infracloud'
|
|
||||||
class { '::openstack_project::server':
|
|
||||||
sysadmins => hiera('sysadmins', []),
|
|
||||||
enable_unbound => false,
|
|
||||||
purge_apt_sources => false,
|
|
||||||
}
|
|
||||||
class { '::openstack_project::infracloud::compute':
|
|
||||||
nova_rabbit_password => hiera('nova_rabbit_password'),
|
|
||||||
neutron_rabbit_password => hiera('neutron_rabbit_password'),
|
|
||||||
neutron_admin_password => hiera('neutron_admin_password'),
|
|
||||||
ssl_key_file_contents => hiera('infracloud_chocolate_ssl_key_file_contents'),
|
|
||||||
ssl_cert_file_contents => hiera('infracloud_chocolate_ssl_cert_file_contents'),
|
|
||||||
br_name => 'br-vlan2551',
|
|
||||||
controller_public_address => 'controller00.chocolate.ic.openstack.org',
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
# Node-OS: trusty
|
|
||||||
# Upgrade-Modules
|
|
||||||
node /^baremetal\d{2}\.vanilla\.ic\.openstack\.org$/ {
|
|
||||||
$group = 'infracloud'
|
|
||||||
class { '::openstack_project::server':
|
|
||||||
iptables_public_udp_ports => [67,69],
|
|
||||||
sysadmins => hiera('sysadmins', []),
|
|
||||||
enable_unbound => false,
|
|
||||||
purge_apt_sources => false,
|
|
||||||
}
|
|
||||||
|
|
||||||
class { '::openstack_project::infracloud::baremetal':
|
|
||||||
ironic_inventory => hiera('ironic_inventory', {}),
|
|
||||||
ironic_db_password => hiera('ironic_db_password'),
|
|
||||||
mysql_password => hiera('bifrost_mysql_password'),
|
|
||||||
ipmi_passwords => hiera('ipmi_passwords'),
|
|
||||||
ssh_private_key => hiera('bifrost_vanilla_ssh_private_key'),
|
|
||||||
ssh_public_key => hiera('bifrost_vanilla_ssh_public_key'),
|
|
||||||
bridge_name => hiera('bridge_name'),
|
|
||||||
vlan => hiera('vlan'),
|
|
||||||
gateway_ip => hiera('gateway_ip'),
|
|
||||||
default_network_interface => hiera('default_network_interface'),
|
|
||||||
dhcp_pool_start => hiera('dhcp_pool_start'),
|
|
||||||
dhcp_pool_end => hiera('dhcp_pool_end'),
|
|
||||||
network_interface => hiera('network_interface'),
|
|
||||||
ipv4_nameserver => hiera('ipv4_nameserver'),
|
|
||||||
ipv4_subnet_mask => hiera('ipv4_subnet_mask'),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
# vim:sw=2:ts=2:expandtab:textwidth=79
|
# vim:sw=2:ts=2:expandtab:textwidth=79
|
||||||
|
11
modules.env
11
modules.env
@ -37,16 +37,6 @@
|
|||||||
|
|
||||||
OPENSTACK_GIT_ROOT=https://git.openstack.org
|
OPENSTACK_GIT_ROOT=https://git.openstack.org
|
||||||
|
|
||||||
# InfraCloud modules
|
|
||||||
SOURCE_MODULES["$OPENSTACK_GIT_ROOT/openstack/puppet-cinder"]="mitaka-eol"
|
|
||||||
SOURCE_MODULES["$OPENSTACK_GIT_ROOT/openstack/puppet-glance"]="mitaka-eol"
|
|
||||||
SOURCE_MODULES["$OPENSTACK_GIT_ROOT/openstack/puppet-ironic"]="mitaka-eol"
|
|
||||||
SOURCE_MODULES["$OPENSTACK_GIT_ROOT/openstack/puppet-keystone"]="mitaka-eol"
|
|
||||||
SOURCE_MODULES["$OPENSTACK_GIT_ROOT/openstack/puppet-neutron"]="mitaka-eol"
|
|
||||||
SOURCE_MODULES["$OPENSTACK_GIT_ROOT/openstack/puppet-nova"]="mitaka-eol"
|
|
||||||
SOURCE_MODULES["$OPENSTACK_GIT_ROOT/openstack/puppet-openstack_extras"]="mitaka-eol"
|
|
||||||
SOURCE_MODULES["$OPENSTACK_GIT_ROOT/openstack/puppet-openstacklib"]="mitaka-eol"
|
|
||||||
|
|
||||||
SOURCE_MODULES["https://git.drupal.org/project/puppet-drush"]="origin/1.0.x"
|
SOURCE_MODULES["https://git.drupal.org/project/puppet-drush"]="origin/1.0.x"
|
||||||
SOURCE_MODULES["https://git.openstack.org/openstack-infra/puppet-vcsrepo"]="0.0.8"
|
SOURCE_MODULES["https://git.openstack.org/openstack-infra/puppet-vcsrepo"]="0.0.8"
|
||||||
# NOTE(yolanda): please note that grafana depends on camptocamp-archive. This is a
|
# NOTE(yolanda): please note that grafana depends on camptocamp-archive. This is a
|
||||||
@ -114,7 +104,6 @@ INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-graphite"]="orig
|
|||||||
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-haveged"]="origin/master"
|
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-haveged"]="origin/master"
|
||||||
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-hound"]="origin/master"
|
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-hound"]="origin/master"
|
||||||
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-httpd"]="origin/master"
|
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-httpd"]="origin/master"
|
||||||
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-infracloud"]="origin/master"
|
|
||||||
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-iptables"]="origin/master"
|
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-iptables"]="origin/master"
|
||||||
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-jeepyb"]="origin/master"
|
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-jeepyb"]="origin/master"
|
||||||
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-jenkins"]="origin/master"
|
INTEGRATION_MODULES["$OPENSTACK_GIT_ROOT/openstack-infra/puppet-jenkins"]="origin/master"
|
||||||
|
@ -1,130 +0,0 @@
|
|||||||
[disabled:children]
|
|
||||||
|
|
||||||
[infracloud]
|
|
||||||
baremetal00.vanilla.ic.openstack.org
|
|
||||||
controller00.vanilla.ic.openstack.org
|
|
||||||
compute000.vanilla.ic.openstack.org
|
|
||||||
compute001.vanilla.ic.openstack.org
|
|
||||||
compute002.vanilla.ic.openstack.org
|
|
||||||
compute003.vanilla.ic.openstack.org
|
|
||||||
compute004.vanilla.ic.openstack.org
|
|
||||||
compute005.vanilla.ic.openstack.org
|
|
||||||
compute006.vanilla.ic.openstack.org
|
|
||||||
compute007.vanilla.ic.openstack.org
|
|
||||||
compute009.vanilla.ic.openstack.org
|
|
||||||
compute010.vanilla.ic.openstack.org
|
|
||||||
compute011.vanilla.ic.openstack.org
|
|
||||||
compute012.vanilla.ic.openstack.org
|
|
||||||
compute013.vanilla.ic.openstack.org
|
|
||||||
compute014.vanilla.ic.openstack.org
|
|
||||||
compute015.vanilla.ic.openstack.org
|
|
||||||
compute017.vanilla.ic.openstack.org
|
|
||||||
compute018.vanilla.ic.openstack.org
|
|
||||||
compute019.vanilla.ic.openstack.org
|
|
||||||
compute020.vanilla.ic.openstack.org
|
|
||||||
compute021.vanilla.ic.openstack.org
|
|
||||||
compute022.vanilla.ic.openstack.org
|
|
||||||
compute023.vanilla.ic.openstack.org
|
|
||||||
compute024.vanilla.ic.openstack.org
|
|
||||||
compute026.vanilla.ic.openstack.org
|
|
||||||
compute027.vanilla.ic.openstack.org
|
|
||||||
compute028.vanilla.ic.openstack.org
|
|
||||||
compute030.vanilla.ic.openstack.org
|
|
||||||
compute031.vanilla.ic.openstack.org
|
|
||||||
compute032.vanilla.ic.openstack.org
|
|
||||||
compute033.vanilla.ic.openstack.org
|
|
||||||
compute034.vanilla.ic.openstack.org
|
|
||||||
compute035.vanilla.ic.openstack.org
|
|
||||||
compute036.vanilla.ic.openstack.org
|
|
||||||
compute037.vanilla.ic.openstack.org
|
|
||||||
compute039.vanilla.ic.openstack.org
|
|
||||||
compute040.vanilla.ic.openstack.org
|
|
||||||
compute041.vanilla.ic.openstack.org
|
|
||||||
compute042.vanilla.ic.openstack.org
|
|
||||||
compute043.vanilla.ic.openstack.org
|
|
||||||
compute044.vanilla.ic.openstack.org
|
|
||||||
compute045.vanilla.ic.openstack.org
|
|
||||||
controller00.chocolate.ic.openstack.org
|
|
||||||
compute000.chocolate.ic.openstack.org
|
|
||||||
compute001.chocolate.ic.openstack.org
|
|
||||||
compute002.chocolate.ic.openstack.org
|
|
||||||
compute003.chocolate.ic.openstack.org
|
|
||||||
compute004.chocolate.ic.openstack.org
|
|
||||||
compute005.chocolate.ic.openstack.org
|
|
||||||
compute006.chocolate.ic.openstack.org
|
|
||||||
compute007.chocolate.ic.openstack.org
|
|
||||||
compute008.chocolate.ic.openstack.org
|
|
||||||
compute009.chocolate.ic.openstack.org
|
|
||||||
compute010.chocolate.ic.openstack.org
|
|
||||||
compute011.chocolate.ic.openstack.org
|
|
||||||
compute012.chocolate.ic.openstack.org
|
|
||||||
compute013.chocolate.ic.openstack.org
|
|
||||||
compute014.chocolate.ic.openstack.org
|
|
||||||
compute015.chocolate.ic.openstack.org
|
|
||||||
compute016.chocolate.ic.openstack.org
|
|
||||||
compute017.chocolate.ic.openstack.org
|
|
||||||
compute018.chocolate.ic.openstack.org
|
|
||||||
compute019.chocolate.ic.openstack.org
|
|
||||||
compute021.chocolate.ic.openstack.org
|
|
||||||
compute022.chocolate.ic.openstack.org
|
|
||||||
compute023.chocolate.ic.openstack.org
|
|
||||||
compute024.chocolate.ic.openstack.org
|
|
||||||
compute025.chocolate.ic.openstack.org
|
|
||||||
compute026.chocolate.ic.openstack.org
|
|
||||||
compute028.chocolate.ic.openstack.org
|
|
||||||
compute029.chocolate.ic.openstack.org
|
|
||||||
compute030.chocolate.ic.openstack.org
|
|
||||||
compute031.chocolate.ic.openstack.org
|
|
||||||
compute032.chocolate.ic.openstack.org
|
|
||||||
compute033.chocolate.ic.openstack.org
|
|
||||||
compute034.chocolate.ic.openstack.org
|
|
||||||
compute035.chocolate.ic.openstack.org
|
|
||||||
compute036.chocolate.ic.openstack.org
|
|
||||||
compute037.chocolate.ic.openstack.org
|
|
||||||
compute038.chocolate.ic.openstack.org
|
|
||||||
compute039.chocolate.ic.openstack.org
|
|
||||||
compute040.chocolate.ic.openstack.org
|
|
||||||
compute041.chocolate.ic.openstack.org
|
|
||||||
compute042.chocolate.ic.openstack.org
|
|
||||||
compute043.chocolate.ic.openstack.org
|
|
||||||
compute044.chocolate.ic.openstack.org
|
|
||||||
compute045.chocolate.ic.openstack.org
|
|
||||||
compute046.chocolate.ic.openstack.org
|
|
||||||
compute047.chocolate.ic.openstack.org
|
|
||||||
compute048.chocolate.ic.openstack.org
|
|
||||||
compute049.chocolate.ic.openstack.org
|
|
||||||
compute050.chocolate.ic.openstack.org
|
|
||||||
compute051.chocolate.ic.openstack.org
|
|
||||||
compute052.chocolate.ic.openstack.org
|
|
||||||
compute053.chocolate.ic.openstack.org
|
|
||||||
compute054.chocolate.ic.openstack.org
|
|
||||||
compute055.chocolate.ic.openstack.org
|
|
||||||
compute056.chocolate.ic.openstack.org
|
|
||||||
compute057.chocolate.ic.openstack.org
|
|
||||||
compute058.chocolate.ic.openstack.org
|
|
||||||
compute059.chocolate.ic.openstack.org
|
|
||||||
compute060.chocolate.ic.openstack.org
|
|
||||||
compute061.chocolate.ic.openstack.org
|
|
||||||
compute062.chocolate.ic.openstack.org
|
|
||||||
compute063.chocolate.ic.openstack.org
|
|
||||||
compute064.chocolate.ic.openstack.org
|
|
||||||
compute065.chocolate.ic.openstack.org
|
|
||||||
compute066.chocolate.ic.openstack.org
|
|
||||||
compute067.chocolate.ic.openstack.org
|
|
||||||
compute068.chocolate.ic.openstack.org
|
|
||||||
compute069.chocolate.ic.openstack.org
|
|
||||||
compute070.chocolate.ic.openstack.org
|
|
||||||
compute071.chocolate.ic.openstack.org
|
|
||||||
compute082.chocolate.ic.openstack.org
|
|
||||||
compute083.chocolate.ic.openstack.org
|
|
||||||
compute084.chocolate.ic.openstack.org
|
|
||||||
compute085.chocolate.ic.openstack.org
|
|
||||||
compute086.chocolate.ic.openstack.org
|
|
||||||
compute087.chocolate.ic.openstack.org
|
|
||||||
compute088.chocolate.ic.openstack.org
|
|
||||||
compute089.chocolate.ic.openstack.org
|
|
||||||
compute090.chocolate.ic.openstack.org
|
|
||||||
compute091.chocolate.ic.openstack.org
|
|
||||||
compute092.chocolate.ic.openstack.org
|
|
||||||
compute093.chocolate.ic.openstack.org
|
|
||||||
compute094.chocolate.ic.openstack.org
|
|
@ -82,17 +82,6 @@ class openstack_project::puppetmaster (
|
|||||||
environment => 'PATH=/var/lib/gems/1.8/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin',
|
environment => 'PATH=/var/lib/gems/1.8/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin',
|
||||||
}
|
}
|
||||||
|
|
||||||
cron { 'updateinfracloud':
|
|
||||||
user => 'root',
|
|
||||||
minute => $puppetmaster_update_cron_interval[min],
|
|
||||||
hour => $puppetmaster_update_cron_interval[hour],
|
|
||||||
monthday => $puppetmaster_update_cron_interval[day],
|
|
||||||
month => $puppetmaster_update_cron_interval[month],
|
|
||||||
weekday => $puppetmaster_update_cron_interval[weekday],
|
|
||||||
command => 'flock -n /var/run/puppet/puppet_run_infracloud.lock bash /opt/system-config/production/run_infracloud.sh >> /var/log/puppet_run_infracloud_cron.log 2>&1',
|
|
||||||
environment => 'PATH=/var/lib/gems/1.8/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin',
|
|
||||||
}
|
|
||||||
|
|
||||||
logrotate::file { 'updatepuppetmaster':
|
logrotate::file { 'updatepuppetmaster':
|
||||||
ensure => present,
|
ensure => present,
|
||||||
log => '/var/log/puppet_run_all.log',
|
log => '/var/log/puppet_run_all.log',
|
||||||
@ -121,34 +110,6 @@ class openstack_project::puppetmaster (
|
|||||||
require => Cron['updatepuppetmaster'],
|
require => Cron['updatepuppetmaster'],
|
||||||
}
|
}
|
||||||
|
|
||||||
logrotate::file { 'updateinfracloud':
|
|
||||||
ensure => present,
|
|
||||||
log => '/var/log/puppet_run_all_infracloud.log',
|
|
||||||
options => ['compress',
|
|
||||||
'copytruncate',
|
|
||||||
'delaycompress',
|
|
||||||
'missingok',
|
|
||||||
'rotate 7',
|
|
||||||
'daily',
|
|
||||||
'notifempty',
|
|
||||||
],
|
|
||||||
require => Cron['updateinfracloud'],
|
|
||||||
}
|
|
||||||
|
|
||||||
logrotate::file { 'updateinfracloudcron':
|
|
||||||
ensure => present,
|
|
||||||
log => '/var/log/puppet_run_infracloud_cron.log',
|
|
||||||
options => ['compress',
|
|
||||||
'copytruncate',
|
|
||||||
'delaycompress',
|
|
||||||
'missingok',
|
|
||||||
'rotate 7',
|
|
||||||
'daily',
|
|
||||||
'notifempty',
|
|
||||||
],
|
|
||||||
require => Cron['updateinfracloud'],
|
|
||||||
}
|
|
||||||
|
|
||||||
cron { 'deleteoldreports':
|
cron { 'deleteoldreports':
|
||||||
user => 'root',
|
user => 'root',
|
||||||
hour => '3',
|
hour => '3',
|
||||||
@ -343,14 +304,6 @@ class openstack_project::puppetmaster (
|
|||||||
mode => '0664',
|
mode => '0664',
|
||||||
}
|
}
|
||||||
|
|
||||||
file { '/etc/ansible/hosts/infracloud':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'root',
|
|
||||||
group => 'root',
|
|
||||||
mode => '0644',
|
|
||||||
source => 'puppet:///modules/openstack_project/puppetmaster/infracloud',
|
|
||||||
}
|
|
||||||
|
|
||||||
file { '/etc/ansible/groups.txt':
|
file { '/etc/ansible/groups.txt':
|
||||||
owner => 'root',
|
owner => 'root',
|
||||||
group => 'root',
|
group => 'root',
|
||||||
|
@ -51,18 +51,6 @@ clouds:
|
|||||||
password: '<%= @vexxhost_password %>'
|
password: '<%= @vexxhost_password %>'
|
||||||
project_name: '<%= @vexxhost_project %>'
|
project_name: '<%= @vexxhost_project %>'
|
||||||
image_format: 'raw'
|
image_format: 'raw'
|
||||||
infracloud-chocolate:
|
|
||||||
api_timeout: 60
|
|
||||||
auth:
|
|
||||||
auth_url: https://controller00.chocolate.ic.openstack.org:5000
|
|
||||||
username: '<%= @infracloud_chocolate_username %>'
|
|
||||||
password: '<%= @infracloud_chocolate_password %>'
|
|
||||||
project_name: '<%= @infracloud_chocolate_project %>'
|
|
||||||
project_domain_name: default
|
|
||||||
user_domain_name: default
|
|
||||||
identity_api_version: '3'
|
|
||||||
floating_ip_source: None
|
|
||||||
cacert: /home/nodepool/.config/openstack/infracloud_chocolate_cacert.pem
|
|
||||||
citycloud:
|
citycloud:
|
||||||
regions:
|
regions:
|
||||||
- Lon1
|
- Lon1
|
||||||
|
Loading…
x
Reference in New Issue
Block a user