2bd15db036
Problem: libvirt password/key injection uses libguestfs to mount the guest filesystem. libguestfs uses a supermin appliance, and in order to create this appliance, libguestfs (running as nova user) must read the host's kernel. Unfortunately, Ubuntu sets file permissions which make compressed kernels non-readable to non-root users, and this breaks libvirt password/key injection on compute hosts running Ubuntu. Solution: When compute hosts are running Ubuntu AND the deployer has enabled libvirt password or SSH key injection, do the following: - Run `dpkg-statoverride` to set file permissions on compressed kernel (/boot/vmlinuz-*), readable to group 'nova' - Install a script which does same for each new kernel installed via system updates in the future Related-Bug: #1507915 Change-Id: Ic96b69bb80ce11001b2ee5d63324a12b0f68456d
128 lines
3.0 KiB
YAML
128 lines
3.0 KiB
YAML
---
|
|
# Copyright 2014, Rackspace US, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
- include: nova_compute_kvm_install.yml
|
|
tags:
|
|
- nova-config
|
|
|
|
- name: Add nova user to libvirtd group
|
|
user:
|
|
name: "{{ nova_system_user_name }}"
|
|
groups: "{{ libvirt_group }}"
|
|
append: "yes"
|
|
tags:
|
|
- nova-install
|
|
- nova-libvirt
|
|
|
|
- name: Ensure kvm permissions
|
|
command: "udevadm trigger"
|
|
changed_when: false
|
|
tags:
|
|
- nova-config
|
|
- nova-kvm
|
|
|
|
- name: Set kernel permissions to enable libguestfs features (Ubuntu)
|
|
include: nova_kernel_permissions.yml
|
|
when:
|
|
- ansible_distribution == 'Ubuntu'
|
|
- nova_libvirt_inject_key | bool or nova_libvirt_inject_password | bool
|
|
|
|
- name: Set libvirtd config
|
|
template:
|
|
src: libvirtd.conf.j2
|
|
dest: /etc/libvirt/libvirtd.conf
|
|
owner: "root"
|
|
group: "root"
|
|
mode: 0644
|
|
notify: Restart libvirt-bin
|
|
tags:
|
|
- nova-config
|
|
- nova-kvm
|
|
- nova-libvirt
|
|
|
|
- name: Set qemu config
|
|
template:
|
|
src: "qemu.conf.j2"
|
|
dest: "/etc/libvirt/qemu.conf"
|
|
owner: "root"
|
|
group: "root"
|
|
mode: "0600"
|
|
when:
|
|
- qemu_conf_dict is defined
|
|
or nova_network_type == 'calico'
|
|
notify: Restart libvirt-bin
|
|
tags:
|
|
- nova-config
|
|
- nova-kvm
|
|
- nova-libvirt
|
|
|
|
- name: Set libvirt runtime options when listening on tcp (Ubuntu)
|
|
lineinfile:
|
|
dest: "/etc/default/libvirtd"
|
|
line: 'libvirtd_opts="-l"'
|
|
regexp: "^libvirtd_opts="
|
|
backup: "yes"
|
|
when:
|
|
- nova_libvirtd_listen_tcp == 1
|
|
- ansible_pkg_mgr == 'apt'
|
|
notify: Restart libvirt-bin
|
|
tags:
|
|
- nova-config
|
|
- nova-kvm
|
|
- nova-libvirt
|
|
|
|
- name: Set libvirt runtime options (CentOS)
|
|
lineinfile:
|
|
dest: "/etc/sysconfig/libvirtd"
|
|
line: 'LIBVIRTD_ARGS="-l"'
|
|
regexp: "^(#)?LIBVIRTD_ARGS=*"
|
|
backup: "yes"
|
|
when:
|
|
- nova_libvirtd_listen_tcp == 1
|
|
- ansible_pkg_mgr == 'yum'
|
|
notify: Restart libvirt-bin
|
|
tags:
|
|
- nova-config
|
|
- nova-kvm
|
|
- nova-libvirt
|
|
|
|
- name: Set libvirt runtime options (CentOS)
|
|
lineinfile:
|
|
dest: "/etc/sysconfig/libvirtd"
|
|
line: 'LIBVIRTD_ARGS=""'
|
|
regexp: "^(#)?LIBVIRTD_ARGS=*"
|
|
backup: "yes"
|
|
when:
|
|
- nova_libvirtd_listen_tcp == 0
|
|
- ansible_pkg_mgr == 'yum'
|
|
notify: Restart libvirt-bin
|
|
tags:
|
|
- nova-config
|
|
- nova-kvm
|
|
- nova-libvirt
|
|
|
|
- include: nova_disable_smt.yml
|
|
when:
|
|
- ansible_architecture == 'ppc64le'
|
|
tags:
|
|
- nova-config
|
|
|
|
- include: nova_compute_kvm_virsh_net_remove.yml
|
|
tags:
|
|
- nova-config
|
|
- nova-kvm
|
|
- nova-libvirt
|
|
- nova-kvm-virsh-net
|