cmart c15d491020 nova user can read kernel for libguestfs on Ubuntu
Problem: libvirt password/key injection uses libguestfs to mount the
guest filesystem. libguestfs uses a supermin appliance, and in order to
create this appliance, libguestfs (running as nova user) must read the
host's kernel. Unfortunately, Ubuntu sets file permissions which make
compressed kernels non-readable to non-root users, and this breaks
libvirt password/key injection on compute hosts running Ubuntu.

Solution: When compute hosts are running Ubuntu AND the deployer has
enabled libvirt password or SSH key injection, do the following:
- Run `dpkg-statoverride` to set file permissions on compressed
  kernel (/boot/vmlinuz-*), readable to group 'nova'
- Install a script which does same for each new kernel installed via
  system updates in the future

Related-Bug: #1507915
Change-Id: Ic96b69bb80ce11001b2ee5d63324a12b0f68456d
(cherry picked from commit 2bd15db036)
2017-04-07 08:05:53 +00:00
2017-02-14 10:45:29 +00:00
2016-09-29 14:47:06 -04:00
2016-09-30 12:44:34 +00:00
2016-08-18 17:18:12 +01:00
2016-07-19 21:12:37 +00:00
2016-10-20 12:54:37 +01:00
2016-08-19 15:40:40 -04:00

OpenStack-Ansible nova

Ansible role that installs and configures OpenStack nova and all of its corresponding services.

This role will install the following:
  • nova-api
  • nova-conductor
  • nova-scheduler
  • nova-console
  • nova-cert
  • nova-compute

Documentation for the project can be found at: http://docs.openstack.org/developer/openstack-ansible-os_nova/

The project home is at: http://launchpad.net/openstack-ansible

Description
Role os_nova for OpenStack-Ansible
Readme 16 MiB
Languages
Jinja 66.7%
Python 30.9%
Shell 2.4%