
This patch adds support for using mod_auth_openidc instead of shibboleth for supporting users who have a preference to use oidc for federation. A new variable called apache_mod is added to keystone_sp allowing the auth library to be selected. If left undefined shibboleth auth module will continue to be installed by default maintaining backward compatibility. This patch does not support simultaneous use of shibboleth and mod_auth_openidc primarily because shib2 depends on libcurl3 but mod_auth_openidc depends on libcurl4 which cannot coexist on Ubuntu. This can be resolved when there is a shib3 package available in a future release of Ubuntu. Change-Id: I80031f7d3f0fcc2029cd6861dcb6687e8a9f0a2e
254 lines
8.3 KiB
YAML
254 lines
8.3 KiB
YAML
---
|
|
# Copyright 2014, Rackspace US, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
- name: Fail if our required secrets are not present
|
|
fail:
|
|
msg: "Please set the {{ item }} variable prior to applying this role."
|
|
when: (item is undefined) or (item is none)
|
|
with_items: "{{ keystone_required_secrets }}"
|
|
tags:
|
|
- always
|
|
|
|
- name: Fail if service was deployed using a different installation method
|
|
fail:
|
|
msg: "Switching installation methods for OpenStack services is not supported"
|
|
when:
|
|
- ansible_local is defined
|
|
- ansible_local.openstack_ansible is defined
|
|
- ansible_local.openstack_ansible.keystone is defined
|
|
- ansible_local.openstack_ansible.keystone.install_method is defined
|
|
- ansible_local.openstack_ansible.keystone.install_method != keystone_install_method
|
|
|
|
- name: Gather variables for each operating system
|
|
include_vars: "{{ item }}"
|
|
with_first_found:
|
|
- "{{ ansible_distribution | lower }}-{{ ansible_distribution_version | lower }}.yml"
|
|
- "{{ ansible_distribution | lower }}-{{ ansible_distribution_major_version | lower }}.yml"
|
|
- "{{ ansible_os_family | lower }}-{{ ansible_distribution_major_version | lower }}.yml"
|
|
- "{{ ansible_distribution | lower }}.yml"
|
|
- "{{ ansible_os_family | lower }}-{{ ansible_distribution_version.split('.')[0] }}.yml"
|
|
- "{{ ansible_os_family | lower }}.yml"
|
|
tags:
|
|
- always
|
|
|
|
- name: Gather variables for installation method
|
|
include_vars: "{{ keystone_install_method }}_install.yml"
|
|
tags:
|
|
- always
|
|
|
|
- name: Fact for apache module shibboleth to be installed
|
|
set_fact:
|
|
keystone_sp_apache_mod_shib:
|
|
"{{ (keystone_sp != {} and
|
|
(keystone_sp.apache_mod is undefined or
|
|
(keystone_sp.apache_mod is defined and keystone_sp.apache_mod != 'mod_auth_openidc'))
|
|
) | ternary('true', 'false') }}"
|
|
|
|
- name: Fact for apache module mod_auth_openidc to be installed
|
|
set_fact:
|
|
keystone_sp_apache_mod_auth_openidc:
|
|
"{{ (keystone_sp != {} and
|
|
keystone_sp.apache_mod is defined and keystone_sp.apache_mod == 'mod_auth_openidc')
|
|
| ternary('true', 'false') }}"
|
|
|
|
- import_tasks: db_setup.yml
|
|
when:
|
|
- "keystone_services['keystone-wsgi-public']['group'] in group_names"
|
|
- "inventory_hostname == ((groups[keystone_services['keystone-wsgi-public']['group']] | intersect(ansible_play_hosts)) | list)[0]"
|
|
vars:
|
|
_oslodb_setup_host: "{{ keystone_db_setup_host }}"
|
|
_oslodb_databases:
|
|
- name: "{{ keystone_galera_database }}"
|
|
users:
|
|
- username: "{{ keystone_galera_user }}"
|
|
password: "{{ keystone_container_mysql_password }}"
|
|
tags:
|
|
- common-db
|
|
- keystone-config
|
|
|
|
- import_tasks: mq_setup.yml
|
|
when:
|
|
- "keystone_services['keystone-wsgi-public']['group'] in group_names"
|
|
- "inventory_hostname == ((groups[keystone_services['keystone-wsgi-public']['group']] | intersect(ansible_play_hosts)) | list)[0]"
|
|
vars:
|
|
_oslomsg_rpc_setup_host: "{{ keystone_oslomsg_rpc_setup_host }}"
|
|
_oslomsg_rpc_userid: "{{ keystone_oslomsg_rpc_userid }}"
|
|
_oslomsg_rpc_password: "{{ keystone_oslomsg_rpc_password }}"
|
|
_oslomsg_rpc_vhost: "{{ keystone_oslomsg_rpc_vhost }}"
|
|
_oslomsg_rpc_transport: "{{ keystone_oslomsg_rpc_transport }}"
|
|
_oslomsg_notify_setup_host: "{{ keystone_oslomsg_notify_setup_host }}"
|
|
_oslomsg_notify_userid: "{{ keystone_oslomsg_notify_userid }}"
|
|
_oslomsg_notify_password: "{{ keystone_oslomsg_notify_password }}"
|
|
_oslomsg_notify_vhost: "{{ keystone_oslomsg_notify_vhost }}"
|
|
_oslomsg_notify_transport: "{{ keystone_oslomsg_notify_transport }}"
|
|
tags:
|
|
- common-mq
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_pre_install.yml
|
|
tags:
|
|
- keystone-install
|
|
|
|
- import_tasks: keystone_install.yml
|
|
tags:
|
|
- keystone-install
|
|
|
|
- name: refresh local facts
|
|
setup:
|
|
filter: ansible_local
|
|
gather_subset: "!all"
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_post_install.yml
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_key_setup.yml
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_fernet.yml
|
|
when:
|
|
- "'fernet' in keystone_token_provider"
|
|
- keystone_service_setup | bool
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_db_sync.yml
|
|
when:
|
|
- "keystone_database_enabled | bool"
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_credential.yml
|
|
when: keystone_service_setup | bool
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_federation_sp_shib_setup.yml
|
|
when:
|
|
- keystone_sp_apache_mod_shib
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_ssl.yml
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: "keystone_{{ keystone_web_server }}.yml"
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_uwsgi.yml
|
|
tags:
|
|
- keystone-config
|
|
|
|
- name: Flush handlers
|
|
meta: flush_handlers
|
|
|
|
- import_tasks: keystone_service_bootstrap.yml
|
|
when:
|
|
- "inventory_hostname == ((groups['keystone_all'] | intersect(ansible_play_hosts)) | list)[0]"
|
|
- "keystone_service_setup | bool"
|
|
tags:
|
|
- keystone-config
|
|
|
|
# Note(odyssey4me):
|
|
# This set of tasks specifically runs against the last keystone
|
|
# node in the cluster to ensure that the modules have access to
|
|
# the endpoints which were bootstrapped in keystone_service_bootstrap.
|
|
- name: Wait for services to be up
|
|
delegate_to: "{{ keystone_service_setup_host }}"
|
|
uri:
|
|
url: "{{ item.url }}"
|
|
validate_certs: "{{ item.validate_certs }}"
|
|
method: "HEAD"
|
|
status_code: 300
|
|
with_items:
|
|
- url: "{{ keystone_service_adminuri }}"
|
|
validate_certs: "{{ not keystone_service_adminuri_insecure }}"
|
|
- url: "{{ keystone_service_internaluri }}"
|
|
validate_certs: "{{ not keystone_service_internaluri_insecure }}"
|
|
register: _wait_check
|
|
when: "inventory_hostname == ((groups['keystone_all'] | intersect(ansible_play_hosts)) | list)[-1]"
|
|
until: _wait_check is success
|
|
retries: 12
|
|
delay: 5
|
|
|
|
- import_tasks: service_setup.yml
|
|
vars:
|
|
_service_adminuri_insecure: "{{ keystone_service_adminuri_insecure }}"
|
|
_service_in_ldap: "{{ keystone_service_in_ldap }}"
|
|
_service_setup_host: "{{ keystone_service_setup_host }}"
|
|
_service_setup_host_python_interpreter: "{{ keystone_service_setup_host_python_interpreter }}"
|
|
_project_name: "{{ keystone_service_tenant_name }}"
|
|
_project_description: "{{ keystone_service_description }}"
|
|
_role_name: "{{ keystone_default_role_name }}"
|
|
_service_region: "{{ keystone_service_region }}"
|
|
_service_catalog:
|
|
- name: "{{ keystone_service_name }}"
|
|
type: "{{ keystone_service_type }}"
|
|
description: "{{ keystone_service_description }}"
|
|
_service_endpoints:
|
|
- interface: "public"
|
|
url: "{{ keystone_service_publicuri }}"
|
|
service: "{{ keystone_service_name }}"
|
|
- interface: "internal"
|
|
url: "{{ keystone_service_internaluri }}"
|
|
service: "{{ keystone_service_name }}"
|
|
- interface: "admin"
|
|
url: "{{ keystone_service_adminuri }}"
|
|
service: "{{ keystone_service_name }}"
|
|
when:
|
|
- "inventory_hostname == ((groups['keystone_all'] | intersect(ansible_play_hosts)) | list)[-1]"
|
|
- "keystone_service_setup | bool"
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_ldap_setup.yml
|
|
when:
|
|
- keystone_service_setup | bool
|
|
- keystone_ldap != {}
|
|
tags:
|
|
- keystone-config
|
|
|
|
- import_tasks: keystone_federation_sp_idp_setup.yml
|
|
when:
|
|
- keystone_service_setup | bool
|
|
- keystone_sp != {}
|
|
run_once: yes
|
|
tags:
|
|
- keystone-config
|
|
|
|
- name: Flush handlers
|
|
meta: flush_handlers
|
|
|
|
- import_tasks: keystone_idp_setup.yml
|
|
when: keystone_idp != {}
|
|
tags:
|
|
- keystone-config
|
|
|
|
- name: Diagnose common problems with keystone deployments
|
|
command: "{{ keystone_bin }}/keystone-manage doctor"
|
|
become: yes
|
|
become_user: "{{ keystone_system_user_name }}"
|
|
register: keystone_doctor
|
|
failed_when: not debug and keystone_doctor.rc != 0
|
|
changed_when: false
|
|
run_once: yes
|
|
tags:
|
|
- keystone-config
|