Fixes playbook runtime issues with ldap
When using an LDAP backend the plabooks fail when "ensuring.*" which is a keystone client action. The reason for the failure is related to how ldap backend, and is triggered when the service users are within the ldap and not SQL. To resolve the issue a boolean conditional was created on the various OS_.* roles to skip specific tasks when the service users have already been added into LDAP. Change-Id: I64a8d1e926c54b821f8bfb561a8b6f755bc1ed93 Closes-Bug: #1518351 Closes-Bug: #1519174 Signed-off-by: Kevin Carter <kevin.carter@rackspace.com>
This commit is contained in:
parent
42a259211b
commit
ec55b5a433
@ -165,6 +165,8 @@ glance_rbd_store_pool: images
|
||||
glance_rbd_store_user: '{{ glance_ceph_client }}'
|
||||
glance_rbd_store_chunk_size: 8
|
||||
|
||||
glance_service_in_ldap: false
|
||||
|
||||
# Common apt packages
|
||||
glance_apt_packages:
|
||||
- rpcbind
|
||||
|
@ -43,6 +43,7 @@
|
||||
password: "{{ glance_service_password }}"
|
||||
insecure: "{{ keystone_service_adminuri_insecure }}"
|
||||
register: add_service
|
||||
when: not glance_service_in_ldap | bool
|
||||
until: add_service|success
|
||||
retries: 5
|
||||
delay: 10
|
||||
@ -62,6 +63,7 @@
|
||||
role_name: "{{ glance_role_name }}"
|
||||
insecure: "{{ keystone_service_adminuri_insecure }}"
|
||||
register: add_service
|
||||
when: not glance_service_in_ldap | bool
|
||||
until: add_service|success
|
||||
retries: 5
|
||||
delay: 10
|
||||
|
Loading…
Reference in New Issue
Block a user