commit b6c8ed850c48ec0595374135b486607723f676e4
Author: Kevin Carter <email address hidden>
Date: Mon Nov 23 14:35:16 2015 -0600
Fixes playbook runtime issues with ldap
When using an LDAP backend the plabooks fail when "ensuring.*"
which is a keystone client action. The reason for the failure is
related to how ldap backend, and is triggered when the service
users are within the ldap and not SQL. To resolve the issue a boolean
conditional was created on the various OS_.* roles to skip specific
tasks when the service users have already been added into LDAP.
Change-Id: I64a8d1e926c54b821f8bfb561a8b6f755bc1ed93
Closes-Bug: #1518351
Closes-Bug: #1519174
Signed-off-by: Kevin Carter <email address hidden>
(cherry picked from commit 2559ed4f13cd242c9f02cd023a7242db56650b0d)
Reviewed: https:/ /review. openstack. org/255204 /git.openstack. org/cgit/ openstack/ openstack- ansible/ commit/ ?id=b6c8ed850c4 8ec0595374135b4 86607723f676e4
Committed: https:/
Submitter: Jenkins
Branch: liberty
commit b6c8ed850c48ec0 595374135b48660 7723f676e4
Author: Kevin Carter <email address hidden>
Date: Mon Nov 23 14:35:16 2015 -0600
Fixes playbook runtime issues with ldap
When using an LDAP backend the plabooks fail when "ensuring.*"
which is a keystone client action. The reason for the failure is
related to how ldap backend, and is triggered when the service
users are within the ldap and not SQL. To resolve the issue a boolean
conditional was created on the various OS_.* roles to skip specific
tasks when the service users have already been added into LDAP.
Change-Id: I64a8d1e926c54b 821f8bfb561a8b6 f755bc1ed93 c9f02cd023a7242 db56650b0d)
Closes-Bug: #1518351
Closes-Bug: #1519174
Signed-off-by: Kevin Carter <email address hidden>
(cherry picked from commit 2559ed4f13cd242