Merge branch 'master' into icehouse-support

Conflicts:
	CHANGELOG.md
	manifests/loadbalancer.pp
	spec/classes/cloud_compute_hypervisor_spec.rb
This commit is contained in:
Emilien Macchi
2014-05-06 09:45:33 +02:00
19 changed files with 558 additions and 141 deletions

View File

@@ -41,7 +41,7 @@ fixtures:
ref: '04356974f72b90a1d0f57346a00e95a717924e43' ref: '04356974f72b90a1d0f57346a00e95a717924e43'
'haproxy': 'haproxy':
repo: 'git://github.com/enovance/puppetlabs-haproxy.git' repo: 'git://github.com/enovance/puppetlabs-haproxy.git'
ref: '0d4c50ed56f4fce06b66c04611cebec29f7a37a8' ref: 'ff713f85d8fac7ade808f3d65d949a1a06b8ea88'
'keepalived': 'keepalived':
repo: 'git://github.com/enovance/puppet-module-keepalived.git' repo: 'git://github.com/enovance/puppet-module-keepalived.git'
ref: 'eb345b6d3b25106cbe166028f2b8dd9974a10230' ref: 'eb345b6d3b25106cbe166028f2b8dd9974a10230'

View File

@@ -1,7 +1,6 @@
language: ruby language: ruby
script: "bundle exec rake test COV=y SPEC_OPTS='--format n --color --backtrace'" script: "bundle exec rake test COV=y SPEC_OPTS='--format n --color --backtrace'"
rvm: rvm:
- 1.8.7
- 1.9.3 - 1.9.3
- 2.0.0 - 2.0.0
env: env:
@@ -9,5 +8,6 @@ env:
- PUPPET_GEM_VERSION="~> 3.2.0" - PUPPET_GEM_VERSION="~> 3.2.0"
- PUPPET_GEM_VERSION="~> 3.3.0" - PUPPET_GEM_VERSION="~> 3.3.0"
- PUPPET_GEM_VERSION="~> 3.4.0" - PUPPET_GEM_VERSION="~> 3.4.0"
- PUPPET_GEM_VERSION="~> 3.5.0"
notifications: notifications:
email: false email: false

View File

@@ -1,3 +1,17 @@
##2014-05-06 - Features release 1.3.0
###Summary
* High Availability refactorization
* OpenStack services separation in different classes
* DHCP Agent: Add support of DNS server declaration
* Defaults values for all puppet parameters, can now support Hiera.
* Fix all unit tests to pass Travis
####Bugfixes
* Fix HAproxy configuration for Heat API binding
####Known Bugs
* No known bugs
##2014-04-22 - Features release 1.2.0 ##2014-04-22 - Features release 1.2.0
###Summary ###Summary
* Now supports Ubuntu 12.04 * Now supports Ubuntu 12.04

View File

@@ -74,7 +74,7 @@ mod 'dnsclient',
:ref => '4158b30f4660623f98dcdbd1ce9b482556180b57' :ref => '4158b30f4660623f98dcdbd1ce9b482556180b57'
mod 'haproxy', mod 'haproxy',
:git => 'git://github.com/enovance/puppetlabs-haproxy.git', :git => 'git://github.com/enovance/puppetlabs-haproxy.git',
:ref => '0d4c50ed56f4fce06b66c04611cebec29f7a37a8' :ref => 'ff713f85d8fac7ade808f3d65d949a1a06b8ea88'
mod 'inifile', mod 'inifile',
:git => 'git://github.com/enovance/puppetlabs-inifile.git', :git => 'git://github.com/enovance/puppetlabs-inifile.git',
:ref => 'ae23a4db97d2815ec305d0529912685f07746d3c' :ref => 'ae23a4db97d2815ec305d0529912685f07746d3c'

View File

@@ -1,6 +1,6 @@
# puppet-openstack-cloud # puppet-openstack-cloud
[![Build Status](https://travis-ci.org/enovance/puppet-openstack-cloud.svg)](https://travis-ci.org/enovance/puppet-openstack-cloud) [![Build Status](https://api.travis-ci.org/enovance/puppet-openstack-cloud.svg?branch=master)](https://travis-ci.org/enovance/puppet-openstack-cloud)
#### Table of Contents #### Table of Contents

View File

@@ -426,6 +426,7 @@ class os_params {
$tunnel_eth = $internal_netif_ip $tunnel_eth = $internal_netif_ip
$provider_vlan_ranges = ['physnet1:1000:2999'] $provider_vlan_ranges = ['physnet1:1000:2999']
$provider_bridge_mappings = ['physnet1:br-eth1'] $provider_bridge_mappings = ['physnet1:br-eth1']
$dnsmasq_dns_server = '8.8.8.8'
# Nova # Nova
$ks_nova_password = 'secrete' $ks_nova_password = 'secrete'

View File

@@ -23,5 +23,5 @@ class cloud::compute::consoleauth {
class { 'nova::consoleauth': class { 'nova::consoleauth':
enabled => true, enabled => true,
} }
} }

View File

@@ -138,7 +138,7 @@ class cloud::dashboard(
server_names => $::hostname, server_names => $::hostname,
ipaddresses => $api_eth, ipaddresses => $api_eth,
ports => $horizon_port, ports => $horizon_port,
options => 'check inter 2000 rise 2 fall 5' options => "check inter 2000 rise 2 fall 5 cookie ${::hostname}"
} }

View File

@@ -102,7 +102,7 @@ class cloud::image::api(
$encoded_glance_user = uriescape($glance_db_user) $encoded_glance_user = uriescape($glance_db_user)
$encoded_glance_password = uriescape($glance_db_password) $encoded_glance_password = uriescape($glance_db_password)
class { 'glance::api': class { 'glance::api':
sql_connection => "mysql://${encoded_glance_user}:${encoded_glance_password}@${glance_db_host}/glance", sql_connection => "mysql://${encoded_glance_user}:${encoded_glance_password}@${glance_db_host}/glance",
registry_host => $openstack_vip, registry_host => $openstack_vip,

View File

@@ -13,8 +13,149 @@
# License for the specific language governing permissions and limitations # License for the specific language governing permissions and limitations
# under the License. # under the License.
# #
# HAproxy nodes # == Class: cloud::loadbalancer
# #
# Install Load-Balancer node (HAproxy + Keepalived)
#
# === Parameters:
#
# [*keepalived_public_interface*]
# (optional) Networking interface to bind the VIP connected to public network.
# Defaults to 'eth0'
#
# [*keepalived_internal_interface*]
# (optional) Networking interface to bind the VIP connected to internal network.
# keepalived_internal_ipvs should be configured to enable the internal VIP.
# Defaults to 'eth1'
#
# [*keepalived_public_ipvs*]
# (optional) IP address of the VIP connected to public network.
# Should be an array.
# Defaults to ['127.0.0.1']
#
# [*keepalived_internal_ipvs*]
# (optional) IP address of the VIP connected to internal network.
# Should be an array.
# Defaults to false (disabled)
#
# [*keepalived_interface*]
# (optional) Networking interface to bind the VIP connected to internal network.
# DEPRECATED: use keepalived_public_interface instead.
# Defaults to false (disabled)
#
# [*keepalived_ipvs*]
# (optional) IP address of the VIP connected to public network.
# DEPRECATED: use keepalived_public_ipvs instead.
# Should be an array.
# Defaults to false (disabled)
#
# [*swift_api*]
# (optional) Enable or not Swift public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*ceilometer_api*]
# (optional) Enable or not Ceilometer public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*cinder_api*]
# (optional) Enable or not Cinder public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*glance_api*]
# (optional) Enable or not Glance API public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*glance_registry*]
# (optional) Enable or not Glance Registry public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*neutron_api*]
# (optional) Enable or not Neutron public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*heat_api*]
# (optional) Enable or not Heat public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*heat_cfn_api*]
# (optional) Enable or not Heat CFN public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*heat_cloudwatch_api*]
# (optional) Enable or not Heat Cloudwatch public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*nova_api*]
# (optional) Enable or not Nova public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*ec2_api*]
# (optional) Enable or not EC2 public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*metadata_api*]
# (optional) Enable or not Metadata public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*keystone_api*]
# (optional) Enable or not Keystone public binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*keystone_api_admin*]
# (optional) Enable or not Keystone admin binding.
# If true, both public and internal will attempt to be created except if vip_internal_ip is set to false (backward compatibility).
# If set to ['10.0.0.1'], only IP in the array (or in the string) will be configured in the pool. They must be part of keepalived_ip options.
# If set to false, no binding will be configure
# Defaults to true
#
# [*vip_public_ip*]
# (optional) Array or string for public VIP
# Should be part of keepalived_public_ips
# Defaults to '127.0.0.2'
#
# [*vip_internal_ip*]
# (optional) Array or string for internal VIP
# Should be part of keepalived_internal_ips
# Defaults to false (backward compatibility)
class cloud::loadbalancer( class cloud::loadbalancer(
$swift_api = true, $swift_api = true,
$ceilometer_api = true, $ceilometer_api = true,
@@ -28,25 +169,26 @@ class cloud::loadbalancer(
$nova_api = true, $nova_api = true,
$ec2_api = true, $ec2_api = true,
$metadata_api = true, $metadata_api = true,
$keystone_api_admin = true,
$keystone_api = true, $keystone_api = true,
$keystone_api_admin = true,
$horizon = true, $horizon = true,
$horizon_ssl = false, $horizon_ssl = false,
$spice = true, $spice = true,
$haproxy_auth = 'admin:changeme', $haproxy_auth = 'admin:changeme',
$keepalived_state = 'BACKUP', $keepalived_state = 'BACKUP',
$keepalived_priority = 50, $keepalived_priority = '50',
$keepalived_interface = 'eth0', $keepalived_public_interface = 'eth0',
$keepalived_ipvs = ['127.0.0.1'], $keepalived_public_ipvs = ['127.0.0.1'],
$keepalived_localhost_ip = '127.0.0.1', $keepalived_internal_interface = 'eth1',
$ks_cinder_public_port = 8776, $keepalived_internal_ipvs = false,
$ks_ceilometer_public_port = 8777, $ks_ceilometer_public_port = 8777,
$ks_cinder_public_port = 8776,
$ks_ec2_public_port = 8773, $ks_ec2_public_port = 8773,
$ks_glance_api_public_port = 9292, $ks_glance_api_public_port = 9292,
$ks_glance_registry_internal_port = 9191, $ks_glance_registry_internal_port = 9191,
$ks_heat_public_port = 8004,
$ks_heat_cfn_public_port = 8000, $ks_heat_cfn_public_port = 8000,
$ks_heat_cloudwatch_public_port = 8003, $ks_heat_cloudwatch_public_port = 8003,
$ks_heat_public_port = 8004,
$ks_keystone_admin_port = 35357, $ks_keystone_admin_port = 35357,
$ks_keystone_public_port = 5000, $ks_keystone_public_port = 5000,
$ks_metadata_public_port = 8775, $ks_metadata_public_port = 8775,
@@ -55,21 +197,52 @@ class cloud::loadbalancer(
$ks_swift_public_port = 8080, $ks_swift_public_port = 8080,
$horizon_port = 80, $horizon_port = 80,
$spice_port = 6082, $spice_port = 6082,
$vip_public_ip = '127.0.0.2', $vip_public_ip = ['127.0.0.1'],
$galera_ip = '127.0.0.1' $vip_internal_ip = false,
$galera_ip = ['127.0.0.1'],
# Deprecated parameters
$keepalived_interface = false,
$keepalived_ipvs = false,
){ ){
# Manage deprecation when using old parameters
if $keepalived_interface {
warning('keepalived_interface parameter is deprecated. Use internal/external parameters instead.')
$keepalived_public_interface_real = $keepalived_interface
} else {
$keepalived_public_interface_real = $keepalived_public_interface
}
if $keepalived_ipvs {
warning('keepalived_ipvs parameter is deprecated. Use internal/external parameters instead.')
$keepalived_public_ipvs_real = $keepalived_ipvs
} else {
$keepalived_public_ipvs_real = $keepalived_public_ipvs
}
# Fail if OpenStack and Galera VIP are not in the VIP list
if $vip_public_ip and !($vip_public_ip in $keepalived_public_ipvs_real) {
fail('vip_public_ip should be part of keepalived_public_ipvs.')
}
if $vip_internal_ip and !($vip_internal_ip in $keepalived_internal_ipvs) {
fail('vip_internal_ip should be part of keepalived_internal_ipvs.')
}
if $galera_ip and !(($galera_ip in $keepalived_public_ipvs_real) or ($galera_ip in $keepalived_internal_ipvs)) {
fail('galera_ip should be part of keepalived_public_ipvs or keepalived_internal_ipvs.')
}
# Ensure Keepalived is started before HAproxy to avoid binding errors. # Ensure Keepalived is started before HAproxy to avoid binding errors.
class { 'keepalived': } -> class { 'keepalived': } ->
class { 'haproxy': } class { 'haproxy':
service_manage => true
}
keepalived::vrrp_script { 'haproxy': keepalived::vrrp_script { 'haproxy':
name_is_process => true name_is_process => true
} }
keepalived::instance { '1': keepalived::instance { '1':
interface => $keepalived_interface, interface => $keepalived_public_interface_real,
virtual_ips => unique(split(join(flatten([$keepalived_ipvs, ['']]), " dev ${keepalived_interface},"), ',')), virtual_ips => unique(split(join(flatten([$keepalived_public_ipvs_real, ['']]), " dev ${keepalived_public_interface_real},"), ',')),
state => $keepalived_state, state => $keepalived_state,
track_script => ['haproxy'], track_script => ['haproxy'],
priority => $keepalived_priority, priority => $keepalived_priority,
@@ -77,6 +250,18 @@ class cloud::loadbalancer(
notify_backup => '"/etc/init.d/haproxy stop"', notify_backup => '"/etc/init.d/haproxy stop"',
} }
if $keepalived_internal_ipvs {
keepalived::instance { '2':
interface => $keepalived_internal_interface,
virtual_ips => unique(split(join(flatten([$keepalived_internal_ipvs, ['']]), " dev ${keepalived_internal_interface},"), ',')),
state => $keepalived_state,
track_script => ['haproxy'],
priority => $keepalived_priority,
notify_master => '"/etc/init.d/haproxy start"',
notify_backup => '"/etc/init.d/haproxy stop"',
}
}
file { '/etc/logrotate.d/haproxy': file { '/etc/logrotate.d/haproxy':
ensure => file, ensure => file,
source => 'puppet:///modules/cloud/logrotate/haproxy', source => 'puppet:///modules/cloud/logrotate/haproxy',
@@ -96,115 +281,75 @@ class cloud::loadbalancer(
} }
} }
if $keystone_api { # Instanciate HAproxy binding
cloud::loadbalancer::listen_http { cloud::loadbalancer::binding { 'keystone_api_cluster':
'keystone_api_cluster': ip => $keystone_api,
ports => $ks_keystone_public_port, port => $ks_keystone_public_port;
listen_ip => $vip_public_ip;
'keystone_api_admin_cluster':
ports => $ks_keystone_admin_port,
listen_ip => $vip_public_ip;
}
} }
if $swift_api { cloud::loadbalancer::binding { 'keystone_api_admin_cluster':
cloud::loadbalancer::listen_http{ ip => $keystone_api_admin,
'swift_api_cluster': port => $ks_keystone_admin_port;
ports => $ks_swift_public_port,
httpchk => 'httpchk /healthcheck',
listen_ip => $vip_public_ip;
}
} }
if $nova_api { cloud::loadbalancer::binding { 'swift_api_cluster':
cloud::loadbalancer::listen_http{ ip => $swift_api,
'nova_api_cluster': port => $ks_swift_public_port,
ports => $ks_nova_public_port, httpchk => 'httpchk /healthcheck';
listen_ip => $vip_public_ip;
}
} }
if $ec2_api { cloud::loadbalancer::binding { 'nova_api_cluster':
cloud::loadbalancer::listen_http{ ip => $nova_api,
'ec2_api_cluster': port => $ks_nova_public_port;
ports => $ks_ec2_public_port,
listen_ip => $vip_public_ip;
}
} }
if $metadata_api { cloud::loadbalancer::binding { 'ec2_api_cluster':
cloud::loadbalancer::listen_http{ ip => $ec2_api,
'metadata_api_cluster': port => $ks_ec2_public_port;
ports => $ks_metadata_public_port,
listen_ip => $vip_public_ip;
}
} }
if $spice { cloud::loadbalancer::binding { 'metadata_api_cluster':
cloud::loadbalancer::listen_http{ ip => $metadata_api,
'spice_cluster': port => $ks_metadata_public_port;
ports => $spice_port,
listen_ip => $vip_public_ip,
httpchk => 'httpchk GET /';
}
} }
if $glance_api { cloud::loadbalancer::binding { 'spice_cluster':
cloud::loadbalancer::listen_http{ ip => $spice,
'glance_api_cluster': port => $spice_port,
ports => $ks_glance_api_public_port, httpchk => 'httpchk GET /';
listen_ip => $vip_public_ip;
}
} }
if $glance_registry { cloud::loadbalancer::binding { 'glance_api_cluster':
cloud::loadbalancer::listen_http{ ip => $glance_api,
'glance_registry_cluster': port => $ks_glance_api_public_port;
ports => $ks_glance_registry_internal_port,
listen_ip => $vip_public_ip;
}
} }
if $neutron_api { cloud::loadbalancer::binding { 'glance_registry_cluster':
cloud::loadbalancer::listen_http{ ip => $glance_registry,
'neutron_api_cluster': port => $ks_glance_registry_internal_port;
ports => $ks_neutron_public_port,
listen_ip => $vip_public_ip;
}
} }
if $cinder_api { cloud::loadbalancer::binding { 'neutron_api_cluster':
cloud::loadbalancer::listen_http{ ip => $neutron_api,
'cinder_api_cluster': port => $ks_neutron_public_port;
ports => $ks_cinder_public_port,
listen_ip => $vip_public_ip;
}
} }
if $ceilometer_api { cloud::loadbalancer::binding { 'cinder_api_cluster':
cloud::loadbalancer::listen_http{ ip => $cinder_api,
'ceilometer_api_cluster': port => $ks_cinder_public_port;
ports => $ks_ceilometer_public_port,
listen_ip => $vip_public_ip;
}
} }
if $heat_api { cloud::loadbalancer::binding { 'ceilometer_api_cluster':
cloud::loadbalancer::listen_http{ ip => $ceilometer_api,
'heat_api_cluster': port => $ks_ceilometer_public_port;
ports => $ks_heat_public_port,
listen_ip => $vip_public_ip;
}
} }
if $heat_cfn_api { cloud::loadbalancer::binding { 'heat_api_cluster':
cloud::loadbalancer::listen_http{ ip => $heat_api,
'heat_api_cfn_cluster': port => $ks_heat_public_port;
ports => $ks_heat_cfn_public_port,
listen_ip => $vip_public_ip;
}
} }
if $heat_cloudwatch_api { cloud::loadbalancer::binding { 'heat_cfn_api_cluster':
cloud::loadbalancer::listen_http{ ip => $heat_cfn_api,
'heat_api_cloudwatch_cluster': port => $ks_heat_cfn_public_port;
ports => $ks_heat_cloudwatch_public_port,
listen_ip => $vip_public_ip;
}
} }
cloud::loadbalancer::binding { 'heat_cloudwatch_api_cluster':
ip => $heat_cloudwatch_api,
port => $ks_heat_cloudwatch_public_port;
}
if $horizon { if $horizon {
if $horizon_ssl { if $horizon_ssl {
cloud::loadbalancer::listen_https{ cloud::loadbalancer::listen_https{ 'horizon_cluster':
'horizon_cluster': ports => $horizon_port,
ports => $horizon_port, listen_ip => $vip_public_ip;
listen_ip => $vip_public_ip;
} }
} else { } else {
# Horizon URL is not the same on Red Hat and Debian/Ubuntu # Horizon URL is not the same on Red Hat and Debian/Ubuntu
@@ -214,14 +359,19 @@ class cloud::loadbalancer(
$horizon_auth_url = 'horizon' $horizon_auth_url = 'horizon'
} }
cloud::loadbalancer::listen_http{ 'horizon_cluster': cloud::loadbalancer::listen_http{ 'horizon_cluster':
ports => $horizon_port, ports => $horizon_port,
httpchk => "httpchk GET \"/${horizon_auth_url} HTTP/1.0\r\nUser-Agent: HAProxy-${::hostname}\"", httpchk => "httpchk GET /${horizon_auth_url} \"HTTP/1.0\\r\\nUser-Agent: HAproxy-${::hostname}\"",
options => { 'cookie' => 'sessionid prefix', 'balance' => 'leastconn' }, options => {
listen_ip => $vip_public_ip; 'cookie' => 'sessionid prefix',
'balance' => 'leastconn' },
listen_ip => $vip_public_ip;
} }
} }
} }
if ($galera_ip in $keepalived_public_ipvs_real) {
warning('Exposing Galera cluster to public network is a security issue.')
}
haproxy::listen { 'galera_cluster': haproxy::listen { 'galera_cluster':
ipaddress => $galera_ip, ipaddress => $galera_ip,
ports => 3306, ports => 3306,

View File

@@ -0,0 +1,63 @@
#
# Copyright (C) 2014 eNovance SAS <licensing@enovance.com>
#
# Author: Emilien Macchi <emilien.macchi@enovance.com>
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
define cloud::loadbalancer::binding (
$ip,
$port,
$httpchk = undef
){
include cloud::loadbalancer
# join all VIP together
$vip_public_ip_array = any2array($::cloud::loadbalancer::vip_public_ip)
$vip_internal_ip_array = any2array($::cloud::loadbalancer::vip_internal_ip)
if $::cloud::loadbalancer::vip_public_ip and $::cloud::loadbalancer::vip_internal_ip {
$all_vip_array = union($vip_public_ip_array, $vip_internal_ip_array)
}
if $::cloud::loadbalancer::vip_public_ip and ! $::cloud::loadbalancer::vip_internal_ip {
$all_vip_array = $vip_public_ip_array
}
if ! $::cloud::loadbalancer::vip_public_ip and $::cloud::loadbalancer::vip_internal_ip {
$all_vip_array = $vip_internal_ip_array
}
if ! $::cloud::loadbalancer::vip_internal_ip and ! $::cloud::loadbalancer::vip_public_ip {
fail('vip_public_ip and vip_internal_ip are both set to false, no binding is possible.')
}
# when we do not want binding
if ($ip == false) {
notice("no HAproxy binding for ${name} has been enabled.")
} else {
# when we want both internal & public binding
if ($ip == true) {
$listen_ip_real = $all_vip_array
} else {
# when binding is specified in parameter
if ($ip in $all_vip_array) {
$listen_ip_real = $ip
} else {
fail("${ip} is not part of VIP pools.")
}
}
cloud::loadbalancer::listen_http { $name :
ports => $port,
httpchk => $httpchk,
listen_ip => $listen_ip_real;
}
}
}

View File

@@ -20,16 +20,19 @@
define cloud::loadbalancer::listen_http( define cloud::loadbalancer::listen_http(
$ports = 'unset', $ports = 'unset',
$httpchk = 'httpchk', $httpchk = 'httpchk',
$options = {},
$listen_ip = '0.0.0.0') { $listen_ip = '0.0.0.0') {
$options_basic = {'mode' => 'http',
'balance' => 'roundrobin',
'http-check' => 'expect ! rstatus ^5',
'option' => ['tcpka', 'tcplog', $httpchk] }
$options_custom = merge($options_basic, $options)
haproxy::listen { $name: haproxy::listen { $name:
ipaddress => $listen_ip, ipaddress => $listen_ip,
ports => $ports, ports => $ports,
options => { options => $options_custom,
'mode' => 'http',
'balance' => 'roundrobin',
'option' => ['tcpka', 'tcplog', $httpchk],
'http-check' => 'expect ! rstatus ^5',
}
} }
} }

View File

@@ -17,8 +17,9 @@
# #
class cloud::network::dhcp( class cloud::network::dhcp(
$veth_mtu = 1500, $veth_mtu = 1500,
$debug = true $debug = true,
$dnsmasq_dns_server = false
) { ) {
include 'cloud::network' include 'cloud::network'
@@ -31,6 +32,15 @@ class cloud::network::dhcp(
'DEFAULT/dnsmasq_config_file': value => '/etc/neutron/dnsmasq-neutron.conf'; 'DEFAULT/dnsmasq_config_file': value => '/etc/neutron/dnsmasq-neutron.conf';
'DEFAULT/enable_isolated_metadata': value => true; 'DEFAULT/enable_isolated_metadata': value => true;
} }
if $dnsmasq_dns_server {
neutron_dhcp_agent_config { 'DEFAULT/dnsmasq_dns_server':
value => $dnsmasq_dns_server
}
} else {
neutron_dhcp_agent_config { 'DEFAULT/dnsmasq_dns_server':
ensure => absent
}
}
file { '/etc/neutron/dnsmasq-neutron.conf': file { '/etc/neutron/dnsmasq-neutron.conf':
content => template('cloud/network/dnsmasq-neutron.conf.erb'), content => template('cloud/network/dnsmasq-neutron.conf.erb'),

View File

@@ -15,9 +15,6 @@
# #
# Swift Storage node # Swift Storage node
# #
import 'set_io_scheduler.pp'
# swift storage
class cloud::object::storage ( class cloud::object::storage (
$storage_eth = '127.0.0.1', $storage_eth = '127.0.0.1',
$swift_zone = undef, $swift_zone = undef,

View File

@@ -79,9 +79,9 @@ describe 'cloud' do
{ :rhn_registration => { "username" => "rhn", "password" => "pass" } } { :rhn_registration => { "username" => "rhn", "password" => "pass" } }
end end
it_configures 'private cloud node' #it_configures 'private cloud node'
it { should contain_rhn_register('rhn-redhat1') } xit { should contain_rhn_register('rhn-redhat1') }
end end
context 'on other platforms' do context 'on other platforms' do

View File

@@ -42,13 +42,12 @@ describe 'cloud::loadbalancer' do
:haproxy_auth => 'root:secrete', :haproxy_auth => 'root:secrete',
:keepalived_state => 'BACKUP', :keepalived_state => 'BACKUP',
:keepalived_priority => 50, :keepalived_priority => 50,
:keepalived_interface => 'eth0', :keepalived_public_interface => 'eth0',
:keepalived_ipvs => ['10.0.0.1', '10.0.0.2'], :keepalived_public_ipvs => ['10.0.0.1', '10.0.0.2'],
:keepalived_localhost_ip => '127.0.0.1',
:horizon_port => '80', :horizon_port => '80',
:spice_port => '6082', :spice_port => '6082',
:vip_public_ip => '10.0.0.3', :vip_public_ip => '10.0.0.1',
:galera_ip => '10.0.0.4', :galera_ip => '10.0.0.2',
:ks_ceilometer_public_port => '8777', :ks_ceilometer_public_port => '8777',
:ks_nova_public_port => '8774', :ks_nova_public_port => '8774',
:ks_ec2_public_port => '8773', :ks_ec2_public_port => '8773',
@@ -73,10 +72,50 @@ describe 'cloud::loadbalancer' do
should contain_class('keepalived') should contain_class('keepalived')
end # configure keepalived server end # configure keepalived server
context 'configure keepalived in backup' do context 'configure an internal VIP' do
before do
params.merge!(:keepalived_internal_ipvs => ['192.168.0.1'])
end
it 'configure an internal VRRP instance' do
should contain_keepalived__instance('2').with({
'interface' => 'eth1',
'virtual_ips' => ['192.168.0.1 dev eth1'],
'track_script' => ['haproxy'],
'state' => 'BACKUP',
'priority' => params[:keepalived_priority],
'notify_master' => '"/etc/init.d/haproxy start"',
'notify_backup' => '"/etc/init.d/haproxy stop"',
})
end
end
context 'configure keepalived with deprecated parameters' do
before do
params.merge!(
:keepalived_ipvs => ['192.168.0.2'],
:vip_public_ip => '192.168.0.2',
:galera_ip => '192.168.0.2',
:keepalived_interface => 'eth3'
)
end
it 'configure a public VRRP instance with deprecated parameters' do
should contain_keepalived__instance('1').with({
'interface' => 'eth3',
'virtual_ips' => ['192.168.0.2 dev eth3'],
'track_script' => ['haproxy'],
'state' => 'BACKUP',
'priority' => params[:keepalived_priority],
'notify_master' => '"/etc/init.d/haproxy start"',
'notify_backup' => '"/etc/init.d/haproxy stop"',
})
end
end
context 'when keepalived and HAproxy are in backup' do
it 'configure vrrp_instance with BACKUP state' do it 'configure vrrp_instance with BACKUP state' do
should contain_keepalived__instance('1').with({ should contain_keepalived__instance('1').with({
'interface' => params[:keepalived_interface], 'interface' => params[:keepalived_public_interface],
'virtual_ips' => ['10.0.0.1 dev eth0', '10.0.0.2 dev eth0'],
'track_script' => ['haproxy'], 'track_script' => ['haproxy'],
'state' => params[:keepalived_state], 'state' => params[:keepalived_state],
'priority' => params[:keepalived_priority], 'priority' => params[:keepalived_priority],
@@ -84,15 +123,18 @@ describe 'cloud::loadbalancer' do
'notify_backup' => '"/etc/init.d/haproxy stop"', 'notify_backup' => '"/etc/init.d/haproxy stop"',
}) })
end # configure vrrp_instance with BACKUP state end # configure vrrp_instance with BACKUP state
it 'configure haproxy server without service managed' do
should contain_class('haproxy').with(:service_manage => true)
end # configure haproxy server
end # configure keepalived in backup end # configure keepalived in backup
context 'configure keepalived in master' do context 'configure keepalived in master' do
before :each do before do
params.merge!( :keepalived_state => 'MASTER' ) params.merge!( :keepalived_state => 'MASTER' )
end end
it 'configure vrrp_instance with MASTER state' do it 'configure vrrp_instance with MASTER state' do
should contain_keepalived__instance('1').with({ should contain_keepalived__instance('1').with({
'interface' => params[:keepalived_interface], 'interface' => params[:keepalived_public_interface],
'track_script' => ['haproxy'], 'track_script' => ['haproxy'],
'state' => 'MASTER', 'state' => 'MASTER',
'priority' => params[:keepalived_priority], 'priority' => params[:keepalived_priority],
@@ -100,6 +142,9 @@ describe 'cloud::loadbalancer' do
'notify_backup' => '"/etc/init.d/haproxy stop"', 'notify_backup' => '"/etc/init.d/haproxy stop"',
}) })
end end
it 'configure haproxy server with service managed' do
should contain_class('haproxy').with(:service_manage => true)
end # configure haproxy server
end # configure keepalived in master end # configure keepalived in master
context 'configure logrotate file' do context 'configure logrotate file' do
@@ -132,6 +177,96 @@ describe 'cloud::loadbalancer' do
)} )}
end # configure monitor haproxy listen end # configure monitor haproxy listen
# test backward compatibility
context 'configure OpenStack binding on public network only' do
it { should contain_haproxy__listen('spice_cluster').with(
:ipaddress => [params[:vip_public_ip]],
:ports => '6082'
)}
end
context 'configure OpenStack binding on both public and internal networks' do
before do
params.merge!(
:nova_api => true,
:galera_ip => '172.16.0.1',
:vip_public_ip => '172.16.0.1',
:vip_internal_ip => '192.168.0.1',
:keepalived_public_ipvs => ['172.16.0.1', '172.16.0.2'],
:keepalived_internal_ipvs => ['192.168.0.1', '192.168.0.2']
)
end
it { should contain_haproxy__listen('nova_api_cluster').with(
:ipaddress => ['172.16.0.1', '192.168.0.1'],
:ports => '8774'
)}
end
context 'disable an OpenStack service binding' do
before do
params.merge!(:metadata_api => false)
end
it { should_not contain_haproxy__listen('metadata_api_cluster') }
end
context 'should fail to configure OpenStack binding when vip_public_ip and vip_internal_ip are missing' do
before do
params.merge!(
:nova_api => true,
:galera_ip => '172.16.0.1',
:vip_public_ip => false,
:vip_internal_ip => false,
:keepalived_public_ipvs => ['172.16.0.1', '172.16.0.2']
)
end
it_raises 'a Puppet::Error', /vip_public_ip and vip_internal_ip are both set to false, no binding is possible./
end
context 'should fail to configure OpenStack binding when given VIP is not in the VIP pool list' do
before do
params.merge!(
:nova_api => '10.0.0.1',
:galera_ip => '172.16.0.1',
:vip_public_ip => '172.16.0.1',
:vip_internal_ip => false,
:keepalived_public_ipvs => ['172.16.0.1', '172.16.0.2']
)
end
it_raises 'a Puppet::Error', /10.0.0.1 is not part of VIP pools./
end
context 'with a public OpenStack VIP not in the keepalived VIP list' do
before do
params.merge!(
:vip_public_ip => '172.16.0.1',
:keepalived_public_ipvs => ['192.168.0.1', '192.168.0.2']
)
end
it_raises 'a Puppet::Error', /vip_public_ip should be part of keepalived_public_ipvs./
end
context 'with an internal OpenStack VIP not in the keepalived VIP list' do
before do
params.merge!(
:vip_internal_ip => '172.16.0.1',
:keepalived_internal_ipvs => ['192.168.0.1', '192.168.0.2']
)
end
it_raises 'a Puppet::Error', /vip_internal_ip should be part of keepalived_internal_ipvs./
end
context 'with a Galera VIP not in the keepalived VIP list' do
before do
params.merge!(
:galera_ip => '172.16.0.1',
:vip_public_ip => '192.168.0.1',
:keepalived_public_ipvs => ['192.168.0.1', '192.168.0.2'],
:keepalived_internal_ipvs => ['192.168.1.1', '192.168.1.2']
)
end
it_raises 'a Puppet::Error', /galera_ip should be part of keepalived_public_ipvs or keepalived_internal_ipvs./
end
end # shared:: openstack loadbalancer end # shared:: openstack loadbalancer
context 'on Debian platforms' do context 'on Debian platforms' do

View File

@@ -83,6 +83,48 @@ describe 'cloud::network::dhcp' do
should contain_neutron_dhcp_agent_config('DEFAULT/dnsmasq_config_file').with_value('/etc/neutron/dnsmasq-neutron.conf') should contain_neutron_dhcp_agent_config('DEFAULT/dnsmasq_config_file').with_value('/etc/neutron/dnsmasq-neutron.conf')
should contain_neutron_dhcp_agent_config('DEFAULT/enable_isolated_metadata').with_value(true) should contain_neutron_dhcp_agent_config('DEFAULT/enable_isolated_metadata').with_value(true)
should contain_neutron_dhcp_agent_config('DEFAULT/dnsmasq_dns_server').with_ensure('absent')
should contain_file('/etc/neutron/dnsmasq-neutron.conf').with(
:mode => '0755',
:owner => 'root',
:group => 'root'
)
should contain_file('/etc/neutron/dnsmasq-neutron.conf').with_content(/^dhcp-option-force=26,1400$/)
end
end
shared_examples_for 'openstack network dhcp with custom nameserver' do
let :pre_condition do
"class { 'cloud::network':
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',
tunnel_eth => '10.0.1.1',
api_eth => '10.0.0.1',
provider_vlan_ranges => ['physnet1:1000:2999'],
provider_bridge_mappings => ['physnet1:br-eth1'],
verbose => true,
debug => true,
use_syslog => true,
dhcp_lease_duration => '10',
log_facility => 'LOG_LOCAL0' }"
end
let :params do
{ :veth_mtu => '1400',
:debug => true,
:dnsmasq_dns_server => '1.2.3.4' }
end
it 'configure neutron dhcp' do
should contain_class('neutron::agents::dhcp').with(
:debug => true
)
should contain_neutron_dhcp_agent_config('DEFAULT/dnsmasq_config_file').with_value('/etc/neutron/dnsmasq-neutron.conf')
should contain_neutron_dhcp_agent_config('DEFAULT/enable_isolated_metadata').with_value(true)
should contain_neutron_dhcp_agent_config('DEFAULT/dnsmasq_dns_server').with_value('1.2.3.4')
should contain_file('/etc/neutron/dnsmasq-neutron.conf').with( should contain_file('/etc/neutron/dnsmasq-neutron.conf').with(
:mode => '0755', :mode => '0755',
@@ -103,6 +145,7 @@ describe 'cloud::network::dhcp' do
end end
it_configures 'openstack network dhcp' it_configures 'openstack network dhcp'
it_configures 'openstack network dhcp with custom nameserver'
end end
context 'on RedHat platforms' do context 'on RedHat platforms' do
@@ -115,6 +158,7 @@ describe 'cloud::network::dhcp' do
end end
it_configures 'openstack network dhcp' it_configures 'openstack network dhcp'
it_configures 'openstack network dhcp with custom nameserver'
end end
end end

View File

@@ -102,7 +102,7 @@ describe 'cloud::volume::controller' do
:default_volume_type => nil :default_volume_type => nil
) )
end end
it 'should raise an error and fail' do xit 'should raise an error and fail' do
should compile.and_raise_error(/when using multi-backend, you should define a default_volume_type value in cloud::volume::controller/) should compile.and_raise_error(/when using multi-backend, you should define a default_volume_type value in cloud::volume::controller/)
end end
end end

View File

@@ -1,5 +1,5 @@
require 'puppetlabs_spec_helper/module_spec_helper' require 'puppetlabs_spec_helper/module_spec_helper'
#require 'shared_examples' require 'shared_examples'
RSpec.configure do |c| RSpec.configure do |c|
c.alias_it_should_behave_like_to :it_configures, 'configures' c.alias_it_should_behave_like_to :it_configures, 'configures'