Skip to content

Commit 91b1c33

Browse files
committed
Support deploying Vault without HAProxy
In Antelope SKC since PR 1090 it is possible to deploy and use Vault without HAProxy. This simplifies the deployment process, and means we can avoid an initial deployment of HAProxy with TLS disabled. This change is backward compatible with the previous method. Needed-By: stackhpc/stackhpc-kayobe-config#1090
1 parent 073332d commit 91b1c33

File tree

1 file changed

+11
-6
lines changed

1 file changed

+11
-6
lines changed

templates/deploy-openstack.tpl

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -84,8 +84,11 @@ ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH
8484
ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/vault/seed-vault-keys.json
8585
ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/vault/*.key
8686

87-
# Skip os_capacity deployment since it requires admin-openrc.sh which doesn't exist yet.
88-
kayobe overcloud service deploy --skip-tags os_capacity -kt haproxy
87+
# NOTE: Previously it was necessary to first deploy HAProxy with TLS disabled.
88+
if [[ -f $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/globals-tls-config.yml ]]; then
89+
# Skip os_capacity deployment since it requires admin-openrc.sh which doesn't exist yet.
90+
kayobe overcloud service deploy --skip-tags os_capacity -kt haproxy
91+
fi
8992

9093
# Deploy hashicorp vault to the controllers
9194
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/vault-deploy-overcloud.yml
@@ -107,10 +110,12 @@ kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/vault-generate-backend-tls.yml
107110
ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/certificates/${ hostname }-key.pem
108111
%{ endfor ~}
109112

110-
# Set config to use tls
111-
sed -i 's/# kolla_enable_tls_external: true/kolla_enable_tls_external: true/g' $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla.yml
112-
sed -i 's/# kolla_enable_tls_internal: true/kolla_enable_tls_internal: true/g' $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla.yml
113-
cat $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/globals-tls-config.yml >> $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/globals.yml
113+
# NOTE: Previously it was necessary to first deploy HAProxy with TLS disabled.
114+
if [[ -f $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/globals-tls-config.yml ]]; then
115+
sed -i 's/# kolla_enable_tls_external: true/kolla_enable_tls_external: true/g' $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla.yml
116+
sed -i 's/# kolla_enable_tls_internal: true/kolla_enable_tls_internal: true/g' $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla.yml
117+
cat $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/globals-tls-config.yml >> $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/globals.yml
118+
fi
114119

115120
# Create vault configuration for barbican
116121
ansible-vault decrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/secrets.yml

0 commit comments

Comments
 (0)