Execute service setup against a delegated host using Ansible built-in modules

In order to reduce the packages required to pip install on to the hosts,
we allow the service setup to be delegated to a specific host, defaulting
to the deploy host. We also switch as many tasks as possible to using the
built-in Ansible modules which make use of the shade library.

The 'virtualenv' package is now installed appropriately by the openstack_hosts
role, so there's no need to install it any more. The 'httplib2' package is a
legacy Ansible requirement for the get_url/get_uri module which is no longer
needed. The keystone client library is not required any more now that we're
using the upstream modules. As there are no required packages left, the task
to install them is also removed.

Change-Id: I673a465863559d6fc72e4fdcd5da2ab788e561ab
This commit is contained in:
Jesse Pretorius 2018-07-12 18:03:14 +01:00
parent 327e7bab3f
commit 4b46ce34a7
7 changed files with 152 additions and 177 deletions

View File

@ -19,6 +19,11 @@
## Verbosity Options
debug: False
# Set the host which will execute the shade modules
# for the service setup. The host must already have
# clouds.yaml properly configured.
monasca_service_setup_host: "{{ openstack_service_setup_host | default('localhost') }}"
# Set the package install state for distribution and pip packages
# Options are 'present' and 'latest'
monasca_package_state: "latest"
@ -256,13 +261,6 @@ monasca_persister_workers: "{{ [[ansible_processor_vcpus|default(2) // 2, 1] | m
monasca_service_in_ldap: False
## Monasca packages that must be installed before anything else
monasca_requires_pip_packages:
- httplib2
- python-keystoneclient
- python-monascaclient
- virtualenv
monasca_pip_packages:
- cassandra-driver
- cryptography

View File

@ -37,7 +37,6 @@ galaxy_info:
dependencies:
- galera_client
- openstack_openrc
- role: apt_package_pinning
when:
- ansible_pkg_mgr == 'apt'

View File

@ -0,0 +1,17 @@
---
features:
- |
The service setup in keystone for monasca will now be executed
through delegation to the ``monasca_service_setup_host`` which,
by default, is ``localhost`` (the deploy host). Deployers can
opt to rather change this to the utility container by implementing
the following override in ``user_variables.yml``.
.. code-block:: yaml
monasca_service_setup_host: "{{ groups['utility_all'][0] }}"
deprecations:
- |
The variable ``monasca_requires_pip_packages`` is no longer required
and has therefore been removed.

View File

@ -37,19 +37,6 @@
when:
- monasca_developer_mode | bool
- name: Install requires pip packages
pip:
name: "{{ monasca_requires_pip_packages }}"
state: "{{ monasca_pip_package_state }}"
extra_args: >-
{{ monasca_developer_mode | ternary(pip_install_developer_constraints | default('--constraint /opt/developer-pip-constraints.txt'), '') }}
{{ (pip_install_upper_constraints is defined) | ternary('--constraint ' + pip_install_upper_constraints | default(''),'') }}
{{ pip_install_options | default('') }}
register: install_packages
until: install_packages|success
retries: 5
delay: 2
- name: Retrieve checksum for venv download
uri:
url: "{{ monasca_venv_download_url | replace('tgz', 'checksum') }}"

View File

@ -16,163 +16,139 @@
# (c) 2016 Donovan Francesco <donovan.francesco@is.co.za>
# (c) 2016 Paul Stevens <paul.stevens@is.co.za>
# Create a service
- name: Ensure monasca service
keystone:
command: "ensure_service"
endpoint: "{{ keystone_service_adminurl }}"
login_user: "{{ keystone_admin_user_name }}"
login_password: "{{ keystone_auth_admin_password }}"
login_project_name: "{{ keystone_admin_tenant_name }}"
service_name: "{{ monasca_service_name }}"
service_type: "{{ monasca_service_type }}"
description: "{{ monasca_service_description }}"
insecure: "{{ keystone_service_adminuri_insecure }}"
register: add_service
until: add_service|success
retries: 5
delay: 2
no_log: True
# We set the python interpreter to the ansible runtime venv if
# the delegation is to localhost so that we get access to the
# appropriate python libraries in that venv. If the delegation
# is to another host, we assume that it is accessible by the
# system python instead.
- name: Setup the service
delegate_to: "{{ monasca_service_setup_host }}"
vars:
ansible_python_interpreter: >-
{{ (monasca_service_setup_host == 'localhost') | ternary(ansible_playbook_python, ansible_python['executable']) }}
block:
- name: Add service to the keystone service catalog
os_keystone_service:
cloud: default
state: present
name: "{{ monasca_service_name }}"
service_type: "{{ monasca_service_type }}"
description: "{{ monasca_service_description }}"
endpoint_type: admin
verify: "{{ not keystone_service_adminuri_insecure }}"
register: add_service
until: add_service is success
retries: 5
delay: 10
# Create an admin user
- name: Ensure monasca user
keystone:
command: "ensure_user"
endpoint: "{{ keystone_service_adminurl }}"
login_user: "{{ keystone_admin_user_name }}"
login_password: "{{ keystone_auth_admin_password }}"
login_project_name: "{{ keystone_admin_tenant_name }}"
user_name: "{{ monasca_service_user_name }}"
tenant_name: "{{ monasca_service_project_name }}"
password: "{{ monasca_service_password }}"
insecure: "{{ keystone_service_adminuri_insecure }}"
register: add_user
when: not monasca_service_in_ldap | bool
until: add_user|success
retries: 5
delay: 10
no_log: True
- name: Add service users
os_user:
cloud: default
state: present
name: "{{ item.name }}"
password: "{{ item.password }}"
domain: default
default_project: "{{ item.default_project }}"
endpoint_type: admin
verify: "{{ not keystone_service_adminuri_insecure }}"
register: add_service
when: not monasca_service_in_ldap | bool
until: add_service is success
retries: 5
delay: 10
no_log: True
with_items:
- name: "{{ monasca_service_user_name }}"
password: "{{ monasca_service_password }}"
default_project: "{{ monasca_service_project_name }}"
- name: "{{ monasca_agent_user_name }}"
password: "{{ monasca_agent_password }}"
default_project: "{{ monasca_agent_project_name }}"
loop_control:
label: "{{ item.name }}"
# Add a role to the user
- name: Ensure monasca user to admin role
keystone:
command: "ensure_user_role"
endpoint: "{{ keystone_service_adminurl }}"
login_user: "{{ keystone_admin_user_name }}"
login_password: "{{ keystone_auth_admin_password }}"
login_project_name: "{{ keystone_admin_tenant_name }}"
user_name: "{{ monasca_service_user_name }}"
tenant_name: "{{ monasca_service_project_name }}"
role_name: "{{ monasca_role_name }}"
insecure: "{{ keystone_service_adminuri_insecure }}"
register: add_user_role
when: not monasca_service_in_ldap | bool
until: add_user_role|success
retries: 5
delay: 10
no_log: True
- name: Add monasca user, agent and read only roles
os_keystone_role:
cloud: default
state: present
name: "{{ item }}"
endpoint_type: admin
verify: "{{ not keystone_service_adminuri_insecure }}"
register: add_service
when: not monasca_service_in_ldap | bool
until: add_service is success
retries: 5
delay: 10
with_flattened:
- "{{ monasca_user_roles }}"
- "{{ monasca_agent_roles }}"
- "{{ monasca_read_only_user_roles }}"
# Create monasca roles
- name: Ensure monasca user, agent and read only roles
keystone:
command: "ensure_role"
endpoint: "{{ keystone_service_adminurl }}"
login_user: "{{ keystone_admin_user_name }}"
login_password: "{{ keystone_auth_admin_password }}"
login_project_name: "{{ keystone_admin_tenant_name }}"
role_name: "{{ item }}"
insecure: "{{ keystone_service_adminuri_insecure }}"
register: add_roles
when: not monasca_service_in_ldap | bool
until: add_roles|success
retries: 5
delay: 10
no_log: True
with_flattened:
- "{{ monasca_user_roles }}"
- "{{ monasca_agent_roles }}"
- "{{ monasca_read_only_user_roles }}"
- name: Add service user to admin role
os_user_role:
cloud: default
state: present
user: "{{ monasca_service_user_name }}"
role: "{{ monasca_role_name }}"
project: "{{ monasca_service_project_name }}"
endpoint_type: admin
verify: "{{ not keystone_service_adminuri_insecure }}"
register: add_service
when: not monasca_service_in_ldap | bool
until: add_service is success
retries: 5
delay: 10
# Create an monasca-agent user
- name: Ensure monasca-agent user
keystone:
command: "ensure_user"
endpoint: "{{ keystone_service_adminurl }}"
login_user: "{{ keystone_admin_user_name }}"
login_password: "{{ keystone_auth_admin_password }}"
login_project_name: "{{ keystone_admin_tenant_name }}"
user_name: "{{ monasca_agent_user_name }}"
tenant_name: "{{ monasca_agent_project_name }}"
password: "{{ monasca_agent_password }}"
insecure: "{{ keystone_service_adminuri_insecure }}"
register: add_user
when: not monasca_service_in_ldap | bool
until: add_user|success
retries: 5
delay: 10
no_log: True
- name: Add agent user to agent roles
os_user_role:
cloud: default
state: present
user: "{{ monasca_agent_user_name }}"
role: "{{ item }}"
project: "{{ monasca_agent_project_name }}"
endpoint_type: admin
verify: "{{ not keystone_service_adminuri_insecure }}"
register: add_service
when: not monasca_service_in_ldap | bool
until: add_service is success
retries: 5
delay: 10
with_items: "{{ monasca_agent_roles }}"
# Add a role to the user
- name: Ensure monasca-agent user to monasca-agent roles
keystone:
command: "ensure_user_role"
endpoint: "{{ keystone_service_adminurl }}"
login_user: "{{ keystone_admin_user_name }}"
login_password: "{{ keystone_auth_admin_password }}"
login_project_name: "{{ keystone_admin_tenant_name }}"
user_name: "{{ monasca_agent_user_name }}"
tenant_name: "{{ monasca_agent_project_name }}"
role_name: "{{ item }}"
insecure: "{{ keystone_service_adminuri_insecure }}"
register: add_user_role
when: not monasca_service_in_ldap | bool
until: add_user_role|success
retries: 5
delay: 10
no_log: True
with_items: "{{ monasca_agent_roles }}"
- name: Add admin user to user roles
os_user_role:
cloud: default
state: present
user: "{{ keystone_admin_user_name }}"
role: "{{ item }}"
project: "{{ keystone_admin_tenant_name }}"
endpoint_type: admin
verify: "{{ not keystone_service_adminuri_insecure }}"
register: add_service
when: not monasca_service_in_ldap | bool
until: add_service is success
retries: 5
delay: 10
with_items: "{{ monasca_user_roles }}"
# Add a role to the user
- name: Ensure admin user to monasca-user roles
keystone:
command: "ensure_user_role"
endpoint: "{{ keystone_service_adminurl }}"
login_user: "{{ keystone_admin_user_name }}"
login_password: "{{ keystone_auth_admin_password }}"
login_project_name: "{{ keystone_admin_tenant_name }}"
user_name: "{{ keystone_admin_user_name }}"
tenant_name: "{{ keystone_admin_tenant_name }}"
role_name: "{{ item }}"
insecure: "{{ keystone_service_adminuri_insecure }}"
register: add_user_role
when: not monasca_service_in_ldap | bool
until: add_user_role|success
retries: 5
delay: 10
no_log: True
with_items: "{{ monasca_user_roles }}"
# Create an endpoint
- name: Ensure monasca endpoint
keystone:
command: "ensure_endpoint"
endpoint: "{{ keystone_service_adminurl }}"
login_user: "{{ keystone_admin_user_name }}"
login_password: "{{ keystone_auth_admin_password }}"
login_project_name: "{{ keystone_admin_tenant_name }}"
region_name: "{{ monasca_service_region }}"
service_name: "{{ monasca_service_name }}"
service_type: "{{ monasca_service_type }}"
insecure: "{{ keystone_service_adminuri_insecure }}"
endpoint_list:
- url: "{{ monasca_service_publicurl }}"
interface: "public"
- url: "{{ monasca_service_internalurl }}"
interface: "internal"
- url: "{{ monasca_service_adminurl }}"
interface: "admin"
register: add_endpoint
until: add_endpoint|success
retries: 5
delay: 10
no_log: True
- name: Add endpoints to keystone endpoint catalog
os_keystone_endpoint:
cloud: default
state: present
service: "{{ monasca_service_name }}"
endpoint_interface: "{{ item.interface }}"
url: "{{ item.url }}"
region: "{{ monasca_service_region }}"
endpoint_type: admin
verify: "{{ not keystone_service_adminuri_insecure }}"
register: add_service
until: add_service is success
retries: 5
delay: 10
with_items:
- interface: "public"
url: "{{ monasca_service_publicurl }}"
- interface: "internal"
url: "{{ monasca_service_internalurl }}"
- interface: "admin"
url: "{{ monasca_service_adminurl }}"

View File

@ -14,7 +14,6 @@
# limitations under the License.
ansible_host: 127.0.0.1
ansible_python_interpreter: "/usr/bin/python2"
bridges:
- name: "br-mgmt"
ip_addr: "10.1.1.1"

View File

@ -19,7 +19,6 @@
- name: Install monasca server
hosts: monasca_all
remote_user: root
become: true
gather_facts: true
roles:
- role: "os_monasca"