Merge "Allow deployments to run when selinux is disabled"

This commit is contained in:
Zuul 2022-02-17 01:49:56 +00:00 committed by Gerrit Code Review
commit 3b0ffcd9d6
21 changed files with 64 additions and 1 deletions

View File

@ -803,6 +803,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
scale_tasks:
if:
- {get_param: BarbicanPkcs11CryptoLunasaEnabled}

View File

@ -139,3 +139,6 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"

View File

@ -220,6 +220,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
external_upgrade_tasks:
- when:
- step|int == 1

View File

@ -282,6 +282,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
deploy_steps_tasks:
- name: Clean up when switching cinder-backup from pcmk to active-active
when:

View File

@ -163,6 +163,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
external_upgrade_tasks:
- when:
- step|int == 1

View File

@ -925,6 +925,9 @@ outputs:
name: os_enable_vtpm
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
metadata_settings:
list_concat:
- if:

View File

@ -305,6 +305,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
upgrade_tasks: []
external_upgrade_tasks:
- when:

View File

@ -113,6 +113,9 @@ outputs:
name: logrotate_read_inside_containers
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
deploy_steps_tasks:
- name: configure tmpwatch on the host
when: step|int == 2

View File

@ -128,6 +128,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
upgrade_tasks: []
external_upgrade_tasks:
- when:

View File

@ -428,6 +428,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
- name: set conditions
set_fact:
dnsmasq_wrapper_enabled: {get_param: NeutronEnableDnsmasqDockerWrapper}

View File

@ -355,6 +355,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
- name: set conditions
set_fact:
keepalived_wrapper_enabled: {get_param: NeutronEnableKeepalivedWrapper}

View File

@ -211,4 +211,7 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
upgrade_tasks: []

View File

@ -418,6 +418,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
update_tasks:
# puppetlabs-firewall manages security rules via Puppet but make the rules
# consistent by default. Since Neutron also creates some rules, we don't

View File

@ -202,6 +202,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
- if:
- derive_pci_whitelist_enabled
- - name: "creating directory"

View File

@ -1532,6 +1532,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
- name: install Instance HA recovery script
when: instance_ha_enabled|bool
block:

View File

@ -242,6 +242,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
external_upgrade_tasks:
- when: step|int == 1
block: &nova_online_db_migration

View File

@ -230,6 +230,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
external_post_deploy_tasks: {get_attr: [NovaComputeCommon, nova_compute_common_deploy_steps_tasks]}
external_upgrade_tasks:
- when:

View File

@ -963,6 +963,9 @@ outputs:
name: os_enable_vtpm
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
metadata_settings:
list_concat:
- if:

View File

@ -323,6 +323,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
external_upgrade_tasks:
- when:
- step|int == 1

View File

@ -179,6 +179,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
update_tasks: {get_attr: [OctaviaBase, role_data, update_tasks]}
upgrade_tasks: {get_attr: [OctaviaBase, role_data, upgrade_tasks]}
external_upgrade_tasks:

View File

@ -277,7 +277,7 @@ outputs:
- 'ssl'
vswitch::ovs::vlan_limit:
if:
- {get_param: EnableVLANTransparency}
- {get_param: EnableVLANTransparency}
- 0
service_config_settings: {}
# BEGIN DOCKER SETTINGS
@ -426,6 +426,9 @@ outputs:
name: virt_sandbox_use_netlink
persistent: true
state: true
when:
- ansible_facts.selinux is defined
- ansible_facts.selinux.status == "enabled"
- name: Copy in cleanup script
copy:
content: {get_file: ../neutron/neutron-cleanup}