)]}'
{"ansible/group_vars/all.yml":[{"author":{"_account_id":14826,"name":"Mark Goddard","email":"markgoddard86@gmail.com","username":"mgoddard"},"change_message_id":"cf3f350b9164d9556e0b388f3ef9d4aff3091ee7","unresolved":false,"context_lines":[{"line_number":266,"context_line":""},{"line_number":267,"context_line":"etcd_client_port: \"2379\""},{"line_number":268,"context_line":"etcd_peer_port: \"2380\""},{"line_number":269,"context_line":"etcd_protocol: \"{{ \u0027https\u0027 if kolla_enable_tls_backend | bool else \u0027http\u0027 }}\""},{"line_number":270,"context_line":""},{"line_number":271,"context_line":"fluentd_syslog_port: \"5140\""},{"line_number":272,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":1,"id":"bf51134e_a1ca446b","line":269,"range":{"start_line":269,"start_character":30,"end_line":269,"end_character":54},"updated":"2020-06-30 07:51:33.000000000","message":"etcd_enable_tls","commit_id":"4d08cdd7535787effb7114528fa19184e31fecae"}],"ansible/roles/etcd/tasks/copy-certs.yml":[{"author":{"_account_id":14826,"name":"Mark Goddard","email":"markgoddard86@gmail.com","username":"mgoddard"},"change_message_id":"cf3f350b9164d9556e0b388f3ef9d4aff3091ee7","unresolved":false,"context_lines":[{"line_number":11,"context_line":"  notify:"},{"line_number":12,"context_line":"    - \"Restart {{ item.key }} container\""},{"line_number":13,"context_line":""},{"line_number":14,"context_line":"- name: \"{{ project_name }} | Copying over backend internal TLS certificate\""},{"line_number":15,"context_line":"  vars:"},{"line_number":16,"context_line":"    certs:"},{"line_number":17,"context_line":"      - \"{{ kolla_certificates_dir }}/{{ inventory_hostname }}/{{ project_name }}-cert.pem\""}],"source_content_type":"text/x-yaml","patch_set":1,"id":"bf51134e_419fe864","line":14,"range":{"start_line":14,"start_character":43,"end_line":14,"end_character":59},"updated":"2020-06-30 07:51:33.000000000","message":"etcd","commit_id":"4d08cdd7535787effb7114528fa19184e31fecae"}],"releasenotes/notes/encrypt-backend-haproxy-fb96285d74fb464c.yaml":[{"author":{"_account_id":14826,"name":"Mark Goddard","email":"markgoddard86@gmail.com","username":"mgoddard"},"change_message_id":"cf3f350b9164d9556e0b388f3ef9d4aff3091ee7","unresolved":false,"context_lines":[{"line_number":5,"context_line":"    to the Keystone, Glance, Heat, Placement, Horizon, Barbican, Etcd, and"},{"line_number":6,"context_line":"    Cinder services. When used in conjunction with enabling TLS for service API"},{"line_number":7,"context_line":"    endpoints, network communcation will be encrypted end to end, from client"},{"line_number":8,"context_line":"    through HAProxy to the backend service."}],"source_content_type":"text/x-yaml","patch_set":1,"id":"bf51134e_81a90092","line":8,"updated":"2020-06-30 07:51:33.000000000","message":"New release, new release note. Plus etcd is separate from backends IMO.","commit_id":"4d08cdd7535787effb7114528fa19184e31fecae"}]}
