openstack-ansible-os_nova/tasks/nova_compute_kvm.yml
cmart 2bd15db036 nova user can read kernel for libguestfs on Ubuntu
Problem: libvirt password/key injection uses libguestfs to mount the
guest filesystem. libguestfs uses a supermin appliance, and in order to
create this appliance, libguestfs (running as nova user) must read the
host's kernel. Unfortunately, Ubuntu sets file permissions which make
compressed kernels non-readable to non-root users, and this breaks
libvirt password/key injection on compute hosts running Ubuntu.

Solution: When compute hosts are running Ubuntu AND the deployer has
enabled libvirt password or SSH key injection, do the following:
- Run `dpkg-statoverride` to set file permissions on compressed
  kernel (/boot/vmlinuz-*), readable to group 'nova'
- Install a script which does same for each new kernel installed via
  system updates in the future

Related-Bug: #1507915
Change-Id: Ic96b69bb80ce11001b2ee5d63324a12b0f68456d
2017-03-31 10:25:06 -07:00

128 lines
3.0 KiB
YAML

---
# Copyright 2014, Rackspace US, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
- include: nova_compute_kvm_install.yml
tags:
- nova-config
- name: Add nova user to libvirtd group
user:
name: "{{ nova_system_user_name }}"
groups: "{{ libvirt_group }}"
append: "yes"
tags:
- nova-install
- nova-libvirt
- name: Ensure kvm permissions
command: "udevadm trigger"
changed_when: false
tags:
- nova-config
- nova-kvm
- name: Set kernel permissions to enable libguestfs features (Ubuntu)
include: nova_kernel_permissions.yml
when:
- ansible_distribution == 'Ubuntu'
- nova_libvirt_inject_key | bool or nova_libvirt_inject_password | bool
- name: Set libvirtd config
template:
src: libvirtd.conf.j2
dest: /etc/libvirt/libvirtd.conf
owner: "root"
group: "root"
mode: 0644
notify: Restart libvirt-bin
tags:
- nova-config
- nova-kvm
- nova-libvirt
- name: Set qemu config
template:
src: "qemu.conf.j2"
dest: "/etc/libvirt/qemu.conf"
owner: "root"
group: "root"
mode: "0600"
when:
- qemu_conf_dict is defined
or nova_network_type == 'calico'
notify: Restart libvirt-bin
tags:
- nova-config
- nova-kvm
- nova-libvirt
- name: Set libvirt runtime options when listening on tcp (Ubuntu)
lineinfile:
dest: "/etc/default/libvirtd"
line: 'libvirtd_opts="-l"'
regexp: "^libvirtd_opts="
backup: "yes"
when:
- nova_libvirtd_listen_tcp == 1
- ansible_pkg_mgr == 'apt'
notify: Restart libvirt-bin
tags:
- nova-config
- nova-kvm
- nova-libvirt
- name: Set libvirt runtime options (CentOS)
lineinfile:
dest: "/etc/sysconfig/libvirtd"
line: 'LIBVIRTD_ARGS="-l"'
regexp: "^(#)?LIBVIRTD_ARGS=*"
backup: "yes"
when:
- nova_libvirtd_listen_tcp == 1
- ansible_pkg_mgr == 'yum'
notify: Restart libvirt-bin
tags:
- nova-config
- nova-kvm
- nova-libvirt
- name: Set libvirt runtime options (CentOS)
lineinfile:
dest: "/etc/sysconfig/libvirtd"
line: 'LIBVIRTD_ARGS=""'
regexp: "^(#)?LIBVIRTD_ARGS=*"
backup: "yes"
when:
- nova_libvirtd_listen_tcp == 0
- ansible_pkg_mgr == 'yum'
notify: Restart libvirt-bin
tags:
- nova-config
- nova-kvm
- nova-libvirt
- include: nova_disable_smt.yml
when:
- ansible_architecture == 'ppc64le'
tags:
- nova-config
- include: nova_compute_kvm_virsh_net_remove.yml
tags:
- nova-config
- nova-kvm
- nova-libvirt
- nova-kvm-virsh-net