cmart b715834259 nova user can read kernel for libguestfs on Ubuntu
Problem: libvirt password/key injection uses libguestfs to mount the
guest filesystem. libguestfs uses a supermin appliance, and in order to
create this appliance, libguestfs (running as nova user) must read the
host's kernel. Unfortunately, Ubuntu sets file permissions which make
compressed kernels non-readable to non-root users, and this breaks
libvirt password/key injection on compute hosts running Ubuntu.

Solution: When compute hosts are running Ubuntu AND the deployer has
enabled libvirt password or SSH key injection, do the following:
- Run `dpkg-statoverride` to set file permissions on compressed
  kernel (/boot/vmlinuz-*), readable to group 'nova'
- Install a script which does same for each new kernel installed via
  system updates in the future

Related-Bug: #1507915
Change-Id: Ic96b69bb80ce11001b2ee5d63324a12b0f68456d
(cherry picked from commit 2bd15db036)
2017-04-07 08:05:15 +00:00
2017-03-22 10:48:49 +00:00
2017-03-22 17:43:34 +00:00
2017-02-03 18:58:38 +00:00
2016-09-28 10:27:39 +01:00
2016-11-25 16:15:31 +01:00
2017-01-06 16:52:24 +00:00
2016-07-19 21:12:37 +00:00

Team and repository tags

image

OpenStack-Ansible nova

Ansible role that installs and configures OpenStack nova and all of its corresponding services.

This role will install the following:
  • nova-api
  • nova-conductor
  • nova-scheduler
  • nova-console
  • nova-compute

Documentation for the project can be found at: http://docs.openstack.org/developer/openstack-ansible-os_nova/

The project home is at: http://launchpad.net/openstack-ansible

Description
Role os_nova for OpenStack-Ansible
Readme 16 MiB
Languages
Jinja 66.7%
Python 30.9%
Shell 2.4%