Use interface instead of endpoint_type
The endpoint_type argument is not correct for the newer os_* modules, so we switch to using the interface arument instead. Change-Id: I932d27bfffd93665feb00d13f30aaf9daacfaace
This commit is contained in:
parent
54c58ef5f8
commit
456268568d
@ -48,7 +48,7 @@
|
||||
cloud: default
|
||||
region_name: "{{ octavia_service_region }}"
|
||||
image: amphora-x64-haproxy
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
when:
|
||||
- octavia_download_result | changed
|
||||
@ -75,7 +75,7 @@
|
||||
state: absent
|
||||
region_name: "{{ octavia_service_region }}"
|
||||
id: "{{ openstack.id }}"
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
when:
|
||||
- openstack is defined # result from os_image_facts
|
||||
|
@ -79,7 +79,7 @@
|
||||
cloud: default
|
||||
region_name: "{{ octavia_service_region }}"
|
||||
name: "{{ octavia_neutron_management_network_name }}"
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
register: get_net_facts
|
||||
until: get_net_facts is success
|
||||
|
@ -36,7 +36,7 @@
|
||||
state: present
|
||||
name: "{{ octavia_security_group_name }}"
|
||||
description: "security group for octavia amphora"
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
|
||||
- name: Create security group rule for agent
|
||||
@ -54,7 +54,7 @@
|
||||
port_range_max: "{{ octavia_agent_port }}"
|
||||
remote_ip_prefix: "{{ octavia_security_group_rule_cidr }}"
|
||||
security_group: "{{ octavia_security_group_name }}"
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
|
||||
- name: Create security group rule for ssh
|
||||
@ -72,7 +72,7 @@
|
||||
port_range_min: 22
|
||||
port_range_max: 22
|
||||
remote_ip_prefix: "{{ octavia_security_group_rule_cidr }}"
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
when:
|
||||
- octavia_ssh_enabled | bool
|
||||
@ -90,7 +90,7 @@
|
||||
security_group: "{{ octavia_security_group_name }}"
|
||||
protocol: icmp
|
||||
remote_ip_prefix: "{{ octavia_security_group_rule_cidr }}"
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
when:
|
||||
- debug | bool
|
||||
|
@ -31,7 +31,7 @@
|
||||
name: "{{ octavia_service_name }}"
|
||||
service_type: "{{ octavia_service_type }}"
|
||||
description: "{{ octavia_service_description }}"
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
register: add_service
|
||||
until: add_service is success
|
||||
@ -46,7 +46,7 @@
|
||||
password: "{{ octavia_service_password }}"
|
||||
domain: default
|
||||
default_project: "{{ octavia_service_project_name }}"
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
register: add_service
|
||||
when: not octavia_service_in_ldap | bool
|
||||
@ -62,7 +62,7 @@
|
||||
user: "{{ octavia_service_user_name }}"
|
||||
role: "{{ octavia_service_role_name }}"
|
||||
project: "{{ octavia_service_project_name }}"
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
register: add_service
|
||||
when: not octavia_service_in_ldap | bool
|
||||
@ -78,7 +78,7 @@
|
||||
endpoint_interface: "{{ item.interface }}"
|
||||
url: "{{ item.url }}"
|
||||
region: "{{ octavia_service_region }}"
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
register: add_service
|
||||
until: add_service is success
|
||||
@ -98,7 +98,7 @@
|
||||
cloud: default
|
||||
state: present
|
||||
name: "{{ item }}"
|
||||
endpoint_type: admin
|
||||
interface: admin
|
||||
verify: "{{ not keystone_service_adminuri_insecure }}"
|
||||
register: add_roles
|
||||
until: add_roles is success
|
||||
|
Loading…
x
Reference in New Issue
Block a user