Skip to content

Commit e75e656

Browse files
authored
Merge pull request #826 from stackhpc/upstream/master-2025-12-03
Synchronise master with upstream
2 parents 758ff45 + ce6ab28 commit e75e656

File tree

5 files changed

+6
-14
lines changed

5 files changed

+6
-14
lines changed

ansible/roles/designate/tasks/config.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@
9292
mode: "0660"
9393
become: true
9494
when:
95-
- designate_backend == 'bind9' and designate_backend_external == 'no'
95+
- designate_backend == 'bind9' and not designate_backend_external | bool
9696
- item.key in [ "designate-backend-bind9", "designate-worker" ]
9797
with_dict: "{{ designate_services | select_services_enabled_and_mapped_to_host }}"
9898

@@ -103,7 +103,7 @@
103103
mode: "0660"
104104
become: true
105105
when:
106-
- designate_backend == 'bind9' and designate_backend_external == 'no'
106+
- designate_backend == 'bind9' and not designate_backend_external | bool
107107
- item.key in [ "designate-backend-bind9", "designate-worker" ]
108108
with_dict: "{{ designate_services | select_services_enabled_and_mapped_to_host }}"
109109

ansible/roles/haproxy-config/templates/haproxy_single_service_split.cfg.j2

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -138,10 +138,10 @@ backend {{ service_name }}_back
138138
{% set host_group = haproxy_service.host_group|default(service.group) %}
139139
{# Additional options can be defined in config, and are additive to the global extras #}
140140
{% set frontend_tcp_extra = haproxy_service.frontend_tcp_extra|default([]) + haproxy_frontend_tcp_extra %}
141-
{% set backend_tcp_extra = haproxy_service.backend_tcp_extra|default([]) %}
141+
{% set backend_tcp_extra = haproxy_service.backend_tcp_extra|default([]) + haproxy_backend_tcp_extra %}
142142
{% set frontend_http_extra = haproxy_service.frontend_http_extra|default([]) + haproxy_frontend_http_extra %}
143143
{% set frontend_redirect_extra = haproxy_service.frontend_redirect_extra|default([]) + haproxy_frontend_redirect_extra %}
144-
{% set backend_http_extra = haproxy_service.backend_http_extra|default([]) %}
144+
{% set backend_http_extra = haproxy_service.backend_http_extra|default([]) + haproxy_backend_http_extra %}
145145
{% set tls_backend = haproxy_service.tls_backend|default(false) %}
146146
{# Allow for basic auth #}
147147
{% set auth_user = haproxy_service.auth_user|default() %}

ansible/roles/loadbalancer/defaults/main.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ keepalived_track_script_enabled: true
192192
# Default backend for single external frontend (for missing mappings)
193193
haproxy_external_single_frontend_default_backend: "horizon_external_back"
194194

195-
haproxy_external_single_frontend_public_port: "443"
195+
haproxy_single_external_frontend_public_port: "443"
196196

197197
haproxy_external_single_frontend_options:
198198
- option httplog

ansible/roles/loadbalancer/templates/haproxy/haproxy_external_frontend.cfg.j2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,6 @@ frontend external_frontend
77
{{ http_option }}
88
{% endfor %}
99
http-request set-header X-Forwarded-Proto https if { ssl_fc }
10-
bind {{ kolla_external_vip_address }}:{{ haproxy_external_single_frontend_public_port }} {{ external_tls_bind_info }}
10+
bind {{ kolla_external_vip_address }}:{{ haproxy_single_external_frontend_public_port }} {{ external_tls_bind_info }}
1111
use_backend %[req.hdr(host),lower,map_dom(/etc/haproxy/external-frontend-map,{{ haproxy_external_single_frontend_default_backend }})]
1212
http-request deny if { path -i -m beg /server-status }

tests/templates/globals-default.j2

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -297,13 +297,5 @@ enable_valkey: "yes"
297297
enable_keystone_federation: true
298298
{% endif %}
299299

300-
{% if scenario == "federation" %}
301-
enable_keystone_federation: true
302-
{% endif %}
303-
304-
{% if scenario == "federation" %}
305-
enable_keystone_federation: true
306-
{% endif %}
307-
308300
mariadb_monitor_read_only_interval: "30000"
309301
mariadb_monitor_galera_healthcheck_timeout: "30000"

0 commit comments

Comments
 (0)