Georgina 47fe909d54 Federated openid support using auth_mod_openidc
This patch adds support for using mod_auth_openidc instead of shibboleth for
supporting users who have a preference to use oidc for federation. A new
variable called apache_mod is added to keystone_sp allowing the auth library
to be selected. If left undefined shibboleth auth module will continue to be
installed by default maintaining backward compatibility.

This patch does not support simultaneous use of shibboleth and mod_auth_openidc
primarily because shib2 depends on libcurl3 but mod_auth_openidc depends on
libcurl4 which cannot coexist on Ubuntu. This can be resolved when there is a
shib3 package available in a future release of Ubuntu.

Change-Id: I80031f7d3f0fcc2029cd6861dcb6687e8a9f0a2e
2020-01-31 11:28:38 +00:00

254 lines
8.3 KiB
YAML

---
# Copyright 2014, Rackspace US, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
- name: Fail if our required secrets are not present
fail:
msg: "Please set the {{ item }} variable prior to applying this role."
when: (item is undefined) or (item is none)
with_items: "{{ keystone_required_secrets }}"
tags:
- always
- name: Fail if service was deployed using a different installation method
fail:
msg: "Switching installation methods for OpenStack services is not supported"
when:
- ansible_local is defined
- ansible_local.openstack_ansible is defined
- ansible_local.openstack_ansible.keystone is defined
- ansible_local.openstack_ansible.keystone.install_method is defined
- ansible_local.openstack_ansible.keystone.install_method != keystone_install_method
- name: Gather variables for each operating system
include_vars: "{{ item }}"
with_first_found:
- "{{ ansible_distribution | lower }}-{{ ansible_distribution_version | lower }}.yml"
- "{{ ansible_distribution | lower }}-{{ ansible_distribution_major_version | lower }}.yml"
- "{{ ansible_os_family | lower }}-{{ ansible_distribution_major_version | lower }}.yml"
- "{{ ansible_distribution | lower }}.yml"
- "{{ ansible_os_family | lower }}-{{ ansible_distribution_version.split('.')[0] }}.yml"
- "{{ ansible_os_family | lower }}.yml"
tags:
- always
- name: Gather variables for installation method
include_vars: "{{ keystone_install_method }}_install.yml"
tags:
- always
- name: Fact for apache module shibboleth to be installed
set_fact:
keystone_sp_apache_mod_shib:
"{{ (keystone_sp != {} and
(keystone_sp.apache_mod is undefined or
(keystone_sp.apache_mod is defined and keystone_sp.apache_mod != 'mod_auth_openidc'))
) | ternary('true', 'false') }}"
- name: Fact for apache module mod_auth_openidc to be installed
set_fact:
keystone_sp_apache_mod_auth_openidc:
"{{ (keystone_sp != {} and
keystone_sp.apache_mod is defined and keystone_sp.apache_mod == 'mod_auth_openidc')
| ternary('true', 'false') }}"
- import_tasks: db_setup.yml
when:
- "keystone_services['keystone-wsgi-public']['group'] in group_names"
- "inventory_hostname == ((groups[keystone_services['keystone-wsgi-public']['group']] | intersect(ansible_play_hosts)) | list)[0]"
vars:
_oslodb_setup_host: "{{ keystone_db_setup_host }}"
_oslodb_databases:
- name: "{{ keystone_galera_database }}"
users:
- username: "{{ keystone_galera_user }}"
password: "{{ keystone_container_mysql_password }}"
tags:
- common-db
- keystone-config
- import_tasks: mq_setup.yml
when:
- "keystone_services['keystone-wsgi-public']['group'] in group_names"
- "inventory_hostname == ((groups[keystone_services['keystone-wsgi-public']['group']] | intersect(ansible_play_hosts)) | list)[0]"
vars:
_oslomsg_rpc_setup_host: "{{ keystone_oslomsg_rpc_setup_host }}"
_oslomsg_rpc_userid: "{{ keystone_oslomsg_rpc_userid }}"
_oslomsg_rpc_password: "{{ keystone_oslomsg_rpc_password }}"
_oslomsg_rpc_vhost: "{{ keystone_oslomsg_rpc_vhost }}"
_oslomsg_rpc_transport: "{{ keystone_oslomsg_rpc_transport }}"
_oslomsg_notify_setup_host: "{{ keystone_oslomsg_notify_setup_host }}"
_oslomsg_notify_userid: "{{ keystone_oslomsg_notify_userid }}"
_oslomsg_notify_password: "{{ keystone_oslomsg_notify_password }}"
_oslomsg_notify_vhost: "{{ keystone_oslomsg_notify_vhost }}"
_oslomsg_notify_transport: "{{ keystone_oslomsg_notify_transport }}"
tags:
- common-mq
- keystone-config
- import_tasks: keystone_pre_install.yml
tags:
- keystone-install
- import_tasks: keystone_install.yml
tags:
- keystone-install
- name: refresh local facts
setup:
filter: ansible_local
gather_subset: "!all"
tags:
- keystone-config
- import_tasks: keystone_post_install.yml
tags:
- keystone-config
- import_tasks: keystone_key_setup.yml
tags:
- keystone-config
- import_tasks: keystone_fernet.yml
when:
- "'fernet' in keystone_token_provider"
- keystone_service_setup | bool
tags:
- keystone-config
- import_tasks: keystone_db_sync.yml
when:
- "keystone_database_enabled | bool"
tags:
- keystone-config
- import_tasks: keystone_credential.yml
when: keystone_service_setup | bool
tags:
- keystone-config
- import_tasks: keystone_federation_sp_shib_setup.yml
when:
- keystone_sp_apache_mod_shib
tags:
- keystone-config
- import_tasks: keystone_ssl.yml
tags:
- keystone-config
- import_tasks: "keystone_{{ keystone_web_server }}.yml"
tags:
- keystone-config
- import_tasks: keystone_uwsgi.yml
tags:
- keystone-config
- name: Flush handlers
meta: flush_handlers
- import_tasks: keystone_service_bootstrap.yml
when:
- "inventory_hostname == ((groups['keystone_all'] | intersect(ansible_play_hosts)) | list)[0]"
- "keystone_service_setup | bool"
tags:
- keystone-config
# Note(odyssey4me):
# This set of tasks specifically runs against the last keystone
# node in the cluster to ensure that the modules have access to
# the endpoints which were bootstrapped in keystone_service_bootstrap.
- name: Wait for services to be up
delegate_to: "{{ keystone_service_setup_host }}"
uri:
url: "{{ item.url }}"
validate_certs: "{{ item.validate_certs }}"
method: "HEAD"
status_code: 300
with_items:
- url: "{{ keystone_service_adminuri }}"
validate_certs: "{{ not keystone_service_adminuri_insecure }}"
- url: "{{ keystone_service_internaluri }}"
validate_certs: "{{ not keystone_service_internaluri_insecure }}"
register: _wait_check
when: "inventory_hostname == ((groups['keystone_all'] | intersect(ansible_play_hosts)) | list)[-1]"
until: _wait_check is success
retries: 12
delay: 5
- import_tasks: service_setup.yml
vars:
_service_adminuri_insecure: "{{ keystone_service_adminuri_insecure }}"
_service_in_ldap: "{{ keystone_service_in_ldap }}"
_service_setup_host: "{{ keystone_service_setup_host }}"
_service_setup_host_python_interpreter: "{{ keystone_service_setup_host_python_interpreter }}"
_project_name: "{{ keystone_service_tenant_name }}"
_project_description: "{{ keystone_service_description }}"
_role_name: "{{ keystone_default_role_name }}"
_service_region: "{{ keystone_service_region }}"
_service_catalog:
- name: "{{ keystone_service_name }}"
type: "{{ keystone_service_type }}"
description: "{{ keystone_service_description }}"
_service_endpoints:
- interface: "public"
url: "{{ keystone_service_publicuri }}"
service: "{{ keystone_service_name }}"
- interface: "internal"
url: "{{ keystone_service_internaluri }}"
service: "{{ keystone_service_name }}"
- interface: "admin"
url: "{{ keystone_service_adminuri }}"
service: "{{ keystone_service_name }}"
when:
- "inventory_hostname == ((groups['keystone_all'] | intersect(ansible_play_hosts)) | list)[-1]"
- "keystone_service_setup | bool"
tags:
- keystone-config
- import_tasks: keystone_ldap_setup.yml
when:
- keystone_service_setup | bool
- keystone_ldap != {}
tags:
- keystone-config
- import_tasks: keystone_federation_sp_idp_setup.yml
when:
- keystone_service_setup | bool
- keystone_sp != {}
run_once: yes
tags:
- keystone-config
- name: Flush handlers
meta: flush_handlers
- import_tasks: keystone_idp_setup.yml
when: keystone_idp != {}
tags:
- keystone-config
- name: Diagnose common problems with keystone deployments
command: "{{ keystone_bin }}/keystone-manage doctor"
become: yes
become_user: "{{ keystone_system_user_name }}"
register: keystone_doctor
failed_when: not debug and keystone_doctor.rc != 0
changed_when: false
run_once: yes
tags:
- keystone-config