Skip to content
Snippets Groups Projects
  1. May 10, 2018
  2. Jan 04, 2018
  3. Nov 27, 2017
  4. Nov 14, 2017
  5. Nov 12, 2017
  6. Nov 09, 2017
  7. Nov 08, 2017
    • David Ames's avatar
      Ensure HTTPS configuration completes · 7c065062
      David Ames authored
      There was a race where the https apache2 site,
      openstack_https_frontend.conf, would be rendered in one hook, then
      subsequently the config-changed hook would run and enable that site.
      However, the subsequent config-changed hook would see the template as
      having not changed and therefore it would fail to restart apache2.
      This lead to apache2 failing to listen on the correct ports.
      
      This was due to CONFIGS.write_all() being called but a2ensite not
      being called. This change fixes this race and adds a call to
      configure_https() to ensure the configuration completes and apache2
      is restarted.
      
      Change-Id: I229d25c707a0630c9d609fd20a962a0de2e42c77
      Closes-Bug: #1723892
      7c065062
  8. Nov 07, 2017
  9. Nov 06, 2017
  10. Nov 05, 2017
  11. Nov 04, 2017
  12. Nov 03, 2017
  13. Nov 02, 2017
  14. Nov 01, 2017
    • Alex Barchiesi's avatar
      Fixed OIDC. · 10f32442
      Alex Barchiesi authored
      10f32442
    • Nobuto Murata's avatar
      Make ssl_ca optional if ssl_cert+ssl_key provided · 9a0563bf
      Nobuto Murata authored
      ssl_ca is not necessary when ssl_cert is signed by
      a trusted CA, such as GeoTrust, because a trusted
      cert chain is in the system already. Users can just
      provide ssl_cert and ssl_key to enable SSL endpoint
      in that case.
      
      Closes-Bug: #1711354
      Change-Id: I4a34df1a2c2bf5705e02b713d968a22f4bbf57cf
      9a0563bf
  15. Oct 30, 2017
  16. Oct 26, 2017
  17. Oct 25, 2017
  18. Oct 22, 2017
  19. Oct 17, 2017
    • Liam Young's avatar
      Add memcache backend · 4b00281b
      Liam Young authored
      Install and configure memcached on the keystone units and configure
      keystone to use the cache. This should speed up token access for
      existing tokens.
      
      Change-Id: I26af0a97660e5bbe293a32e6b9e3d209338f905a
      Closes-Bug: #1722541
      4b00281b
  20. Oct 11, 2017
    • Edward Hope-Morley's avatar
      Do relation consistency sweep on leader change · 9953530f
      Edward Hope-Morley authored
      The current charm design is to perform a sweep of all units
      related on the identity-service interface to ensure that
      they have all the correct setting values applied. If the
      leader unit is deleted and a new one is elected this will
      not happen until some event e.g. config-changed occurs. This
      can result in remote units malfunctioning since they think they
      are not configured. We resolve this by always doing a sweep when
      the leader-elected hook fires.
      
      Also fixes infinite loop edge case when ssl-cert-master switches
      as a result of leader switch.
      
      Also includes cherry-pick of commit:
      - ID: a59de539
      - Title: Fix issue with haproxy not restarted
      
      Change-Id: Icd68cc70d81d7d518c918e831056f686dbc7db1e
      Closes-Bug: 1721269
      (cherry picked from commit 68a0c872)
      9953530f
  21. Oct 10, 2017
    • Edward Hope-Morley's avatar
      Fix issue with haproxy not restarted · a59de539
      Edward Hope-Morley authored
      We are currently seeing amulet test runs fail due
      to keystone ports not being open. This is a result
      of haproxy not being restarted once its config has
      been setup. This patch fixes this issue by catching
      more cases where haproxy config can be changed.
      
      Change-Id: I1d6aa20ba0415cb8bf37b07fd1b128f20a0f8720
      a59de539
  22. Oct 05, 2017
    • Edward Hope-Morley's avatar
      Do relation consistency sweep on leader change · 68a0c872
      Edward Hope-Morley authored
      The current charm design is to perform a sweep of all units
      related on the identity-service interface to ensure that
      they have all the correct setting values applied. If the
      leader unit is deleted and a new one is elected this will
      not happen until some event e.g. config-changed occurs. This
      can result in remote units malfunctioning since they think they
      are not configured. We resolve this by always doing a sweep when
      the leader-elected hook fires.
      
      Also fixes infinite loop edge case when ssl-cert-master switches
      as a result of leader switch.
      
      Change-Id: Icd68cc70d81d7d518c918e831056f686dbc7db1e
      Closes-Bug: 1721269
      68a0c872
  23. Sep 28, 2017
    • David Ames's avatar
      Snap install OpenStack in Charms · 8da85834
      David Ames authored
      Install OpenStack using snaps. By setting openstack-origin to
      snap:track/channel or snap:track the charm will use snaps to
      install rather than debs. If channel is left off it defaults to
      stable. For example: snap:ocata/edge will install the edge version of
      Ocata and snap:pike will install the stable version of Pike.
      
      Charm helpers sync for snap related helpers.
      
      Change-Id: I6e3540e4ffe081540404f91061e5c9b7039b3eac
      8da85834
  24. Sep 26, 2017
    • Xav Paice's avatar
      Add domain info to relation data · cc54352d
      Xav Paice authored
      When using Keystone v3, the relation data set by
      add_credentials_to_keystone now includes a 'domain'.
      
      Change-Id: I2a4ff4d7c20d4f274479dfe0615dd00940e64d8b
      Closes-Bug: 1719751
      cc54352d
  25. Sep 07, 2017
    • James Page's avatar
      Ensure os_release is reset during upgrades · 7fb7ff90
      James Page authored
      Reset the os_release cache during the OpenStack upgrade process,
      ensuring that any post dist-upgrade operations are made in the
      context of the new OpenStack release, not the old one.
      
      Change-Id: I3d3584dd8e97f85e16c38e1143f627b03fa63bd0
      Closes-Bug: 1715624
      7fb7ff90
  26. Aug 25, 2017
    • Billy Olsen's avatar
      Remove cluster-change-departed hook · 97861e9c
      Billy Olsen authored
      The cluster-change-departed hook is tied to the cluster-changed
      hook. In the cluster changed hook, there is logic to ensure the
      initial admin exists which makes calls to the keystone service.
      If the remote database has already been removed (as seen in recent
      CI runs), then this will cause the hook to fail execution.
      
      This is safe to remove as the primary purpose of the cluster-changed
      hook is to sync the SSL keys and update identity relation units.
      There should be no need to sync the keys when a unit is departing
      the cluster relation. Likewise, the update of the identity relations
      are not needed either as the VIP is used for access to the keystone
      services by remote units and the access credentials won't change.
      
      Change-Id: Id8fed284557f67f5676189ec8951b778cf506c97
      Closes-Bug: #1713108
      97861e9c
  27. Aug 21, 2017
    • Frode Nordahl's avatar
      Make sure haproxy runs post-install · 01816c84
      Frode Nordahl authored
      Unconfigured keystone service listening on ports destined for haproxy
      race with start of haproxy service.
      
      Change-Id: I9f601344e72bd67738429f82151f9683f5ecf8e4
      Closes-Bug: #1648396
      01816c84
  28. Aug 18, 2017
    • Alex Kavanagh's avatar
      Fix dangling file open() commands with no corresponding close · b3a6fdf5
      Alex Kavanagh authored
      The code relies on a undocumented (and probably unstable) feature
      of CPython to close a file when the reference is GCed.  However,
      it's pretty poor practice to do so, so this patchset replaces them
      with "with ..." statements to ensure that the files are closed
      when no longer being used.
      
      Change-Id: I6f24bc042a820ddd0147247267ee159753cfc1fb
      b3a6fdf5
Loading