
Currently idempotency in Ubuntu is broken because of the below change detected in collate in MySQL. ``` /Stage[main]/Keystone::Db::Mysql/Openstacklib::Db::Mysql[keystone]/ Mysql_database[keystone]/collate: collate changed 'utf8mb3_general_ci' to 'utf8_general_ci' ``` Similarly to what we observed in the past about charset[1], it seems MySQL in Ubuntu is automatically converting the collate value and that is causing the "unexpected" change detected in the 2nd puppet run. This fixes the idempotency by using utf8mb3_general_ci in Ubuntu to avoid the mismatch caused by internal translation. [1] 085d3569021441810c1dff7c8f4396003c690805 Change-Id: I56f31397669d3d7b08aa2e9808947141e003ab0b
92 lines
3.2 KiB
Puppet
92 lines
3.2 KiB
Puppet
class openstack_integration::murano {
|
|
|
|
include openstack_integration::config
|
|
include openstack_integration::params
|
|
|
|
rabbitmq_user { ['murano', 'murano_private']:
|
|
admin => true,
|
|
password => 'an_even_bigger_secret',
|
|
provider => 'rabbitmqctl',
|
|
require => Class['rabbitmq'],
|
|
}
|
|
|
|
rabbitmq_vhost { '/murano':
|
|
provider => 'rabbitmqctl',
|
|
require => Class['rabbitmq'],
|
|
}
|
|
|
|
rabbitmq_user_permissions { ['murano@/', 'murano_private@/murano']:
|
|
configure_permission => '.*',
|
|
write_permission => '.*',
|
|
read_permission => '.*',
|
|
provider => 'rabbitmqctl',
|
|
require => [ Class['rabbitmq'], Rabbitmq_vhost['/murano'] ],
|
|
}
|
|
|
|
if $::openstack_integration::config::messaging_default_proto == 'amqp' {
|
|
qdr_user { 'murano':
|
|
password => 'an_even_bigger_secret',
|
|
provider => 'sasl',
|
|
require => Class['qdr'],
|
|
}
|
|
}
|
|
|
|
if $::openstack_integration::config::ssl {
|
|
openstack_integration::ssl_key { 'murano':
|
|
notify => Service['murano-api'],
|
|
require => Package['murano-common'],
|
|
}
|
|
Exec['update-ca-certificates'] ~> Service['murano-api']
|
|
}
|
|
|
|
class { 'murano::db::mysql':
|
|
charset => $::openstack_integration::params::mysql_charset,
|
|
collate => $::openstack_integration::params::mysql_collate,
|
|
password => 'a_big_secret',
|
|
}
|
|
class { 'murano::logging':
|
|
debug => true,
|
|
}
|
|
class { 'murano::db':
|
|
database_connection => 'mysql+pymysql://murano:a_big_secret@127.0.0.1/murano?charset=utf8',
|
|
}
|
|
class { 'murano::keystone::authtoken':
|
|
auth_url => $::openstack_integration::config::keystone_admin_uri,
|
|
www_authenticate_uri => $::openstack_integration::config::keystone_auth_uri,
|
|
password => 'a_big_secret'
|
|
}
|
|
class { 'murano':
|
|
default_transport_url => os_transport_url({
|
|
'transport' => $::openstack_integration::config::messaging_default_proto,
|
|
'host' => $::openstack_integration::config::host,
|
|
'port' => $::openstack_integration::config::messaging_default_port,
|
|
'username' => 'murano',
|
|
'password' => 'an_even_bigger_secret',
|
|
}),
|
|
rabbit_os_use_ssl => $::openstack_integration::config::ssl,
|
|
rabbit_own_user => 'murano_private',
|
|
rabbit_own_password => 'an_even_bigger_secret',
|
|
rabbit_own_vhost => '/murano',
|
|
rabbit_own_host => $::openstack_integration::config::host,
|
|
rabbit_own_port => $::openstack_integration::config::rabbit_port,
|
|
rabbit_own_use_ssl => $::openstack_integration::config::ssl,
|
|
use_ssl => $::openstack_integration::config::ssl,
|
|
service_host => $::openstack_integration::config::ip_for_url,
|
|
cert_file => $::openstack_integration::params::cert_path,
|
|
key_file => "/etc/murano/ssl/private/${::fqdn}.pem",
|
|
}
|
|
class { 'murano::api':
|
|
host => $::openstack_integration::config::host,
|
|
}
|
|
|
|
class { 'murano::engine': }
|
|
|
|
class { 'murano::keystone::auth':
|
|
password => 'a_big_secret',
|
|
public_url => "${::openstack_integration::config::base_url}:8082",
|
|
internal_url => "${::openstack_integration::config::base_url}:8082",
|
|
admin_url => "${::openstack_integration::config::base_url}:8082",
|
|
}
|
|
-> murano::application { 'io.murano': }
|
|
}
|