Skip to content
Snippets Groups Projects
  1. Nov 07, 2023
  2. Feb 03, 2022
    • Mark Goddard's avatar
      certificates: generate libvirt TLS certificates · 33e93ab3
      Mark Goddard authored
      Adds support to the 'kolla-ansible certificates' command for generating
      certificates for libvirt TLS, when libvirt_tls is true. The same
      certificate and key are used for the libvirt client and server.
      
      The certificates use the same root CA as the other generated
      certificates, and are written to
      {{ node_custom_config }}/nova/nova-libvirt/, ready to be picked up by
      nova-libvirt and nova-compute.
      
      Change-Id: I1bde9fa018f66037aec82dc74c61ad1f477a7c12
      33e93ab3
  3. Aug 24, 2021
  4. Oct 08, 2020
    • Radosław Piliszek's avatar
      Fix haproxy bundle generation · 3f9d30a2
      Radosław Piliszek authored
      This fixes the `certificates` command to not include CSRs in
      the haproxy bundle.
      The regex was wrong.
      
      Change-Id: If25a6d5dd40f507fea4470be01baeeb7c8a790b4
      3f9d30a2
  5. Sep 17, 2020
    • Mark Goddard's avatar
      Support TLS encryption of RabbitMQ client-server traffic · 761ea9a3
      Mark Goddard authored
      This change adds support for encryption of communication between
      OpenStack services and RabbitMQ. Server certificates are supported, but
      currently client certificates are not.
      
      The kolla-ansible certificates command has been updated to support
      generating certificates for RabbitMQ for development and testing.
      
      RabbitMQ TLS is enabled in the all-in-one source CI jobs, or when
      The Zuul 'tls_enabled' variable is true.
      
      Change-Id: I4f1d04150fb2b5af085b762890092f87ae6076b5
      Implements: blueprint message-queue-ssl-support
      761ea9a3
  6. Jun 16, 2020
  7. Jun 15, 2020
    • James Kirsch's avatar
      Generate Root CA for Self-Signed Certificates · a982d3ac
      James Kirsch authored
      Update the certificate generation task to create a root CA for the
      self-signed certificates. The internal and external facing certificates
      are then generated using the root CA.
      
      Updated openstack_cacert to use system CA trust store in CI tests
      certificate by default.
      
      Change-Id: I6c2adff7d0128146cf086103ff6060b0dcefa37b
      Partially-Implements: blueprint add-ssl-internal-network
      a982d3ac
  8. Apr 09, 2020
    • James Kirsch's avatar
      Add support for encrypting backend Keystone HAProxy traffic · b475643c
      James Kirsch authored
      This patch introduces an optional backend encryption for Keystone
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Keystone service.
      
      Change-Id: I6351147ddaff8b2ae629179a9bc3bae2ebac9519
      Partially-Implements: blueprint add-ssl-internal-network
      b475643c
  9. Jan 28, 2020
    • James Kirsch's avatar
      Generate self signed TLS certificates · d100904f
      James Kirsch authored
      Generate both internal and external self signed TLS certificates.
      Duplicate the certificate if internal and external VIPs are the same.
      
      Change-Id: I16b345c0b29ff13e042eed8798efe644e0ad2c74
      Partially-Implements: blueprint custom-cacerts
      d100904f
  10. Oct 17, 2019
    • Radosław Piliszek's avatar
      Fix OpenSSL template · 4443a53b
      Radosław Piliszek authored
      OpenSSL certificate should default to FQDN if possible.
      Using IP addresses is not recommended, complicates dual stack
      and limits addressing flexibility.
      
      IPv6 control plane implementation [1] follow-up.
      
      [1] Ia34e6916ea4f99e9522cd2ddde03a0a4776f7e2c
      
      Change-Id: Ibfc02f933ddcc170e9d616d401e294ba0ff5e981
      4443a53b
  11. Sep 11, 2019
  12. Mar 27, 2019
    • jamesbagwell's avatar
      Removing '/certificates' entry in generate.yml as this causes an · c0a3970e
      jamesbagwell authored
      incorrect path when generating certificates.
      
      The 'setting permissions on key' task fails because the task looks for
      the haproxy.key in an invalid path. The certificates_dir is defined as
      '{{ node_config }}/certificates' in the main.yml . The 'Setting
      permissions on Key' task has a path of '{{ certificates_dir
      }}/certificates/private/haproxy.key which is incorrect. Removing the
      'certificates' in the path corrects this problem and allows the user to
      successfully create certificates using 'kolla-ansible certificates'.
      
      Change-Id: I37b10b994b05d955b6f67c908df1472231a91160
      Closes-Bug: 1821805
      c0a3970e
  13. Nov 19, 2018
    • caoyuan's avatar
      Use correct variable for default certificate paths · 9223deee
      caoyuan authored
      The variable {{ node_config_directory }} is used for the configuration
      directory on the remote hosts, and should not be used for paths on the
      deploy host (localhost).
      
      This changes the default value of the TLS certificate and CA file to
      reference {{ CONFIG_DIR }}, in line with the directory used for
      admin-openrc.sh (as of I0709482ead4b7a67e82796e17f85bde151e71bc0).
      
      This change also introduces a variable, {{ node_config }}, that
      references {{ CONFIG_DIR | default('/etc/kolla') }}, to remove
      duplication.
      
      Change-Id: Ibd82ac78630ebfff5824c329d7399e1e900c0ee0
      Closes-Bug: #1804025
      9223deee
  14. Jul 25, 2018
  15. May 09, 2018
    • Mark Giles's avatar
      Make generated private key files not world readable · 3991ebcd
      Mark Giles authored
      The kolla-ansible certificates command creates a self-signed
      certificate and corresponding private key.  This change sets the
      file mode on the files that contain the private key so that they
      are not world readable.
      
      Change-Id: I7bfba5975af8d230e5d00c2ce801a914fbbf2d4e
      3991ebcd
  16. Sep 25, 2017
    • Duong Ha-Quang's avatar
      Specify 'become' to necessary tasks (general roles) · 26b2c2d9
      Duong Ha-Quang authored
      Add config_owner_user and config_owner_group to group_vars/all,
      which is user and group of Kolla configuration files in /etc/kolla.
      
      Add become to post-deploy playbook.
      
      Add become to only neccesary tasks in roles:
      - certificate
      - common
      - destroy
      - haproxy
      - mariadb
      - memcached
      - rabbitmq
      
      Change-Id: I2aba745a6e3928c52642f64551470fd08cbfd058
      Partial-Implements: blueprint ansible-specific-task-become
      26b2c2d9
  17. Mar 09, 2017
    • Paul Bourke's avatar
      Enable sanity checks from kolla-ansible · 5418ada1
      Paul Bourke authored
      Add a new subcommand 'check' to kolla-ansible, used to run the
      smoke/sanity checks.
      
      Add stub files to all services that don't currently have checks.
      
      Change-Id: I9f661c5fc51fd5b9b266f23f6c524884613dee48
      Partially-implements: blueprint sanity-check-container
      5418ada1
  18. Jan 10, 2017
  19. Nov 03, 2016
    • Jeffrey Zhang's avatar
      Move precheck into its own role · fa458019
      Jeffrey Zhang authored
      * Merge prechecks.yml and site.yml playbook
      * Create empty precheck.yml into all roles.
      
      Change-Id: I8a138558a26c0a2a66c5fd48ed37be657c99c1dd
      Implements: blueprint condition-pre-check
      fa458019
  20. Mar 03, 2016
    • Dave McCowan's avatar
      Add TLS protection on external API endpoints · 3daded62
      Dave McCowan authored
      TLS can be used to encrypt and authenticate the connection with
      OpenStack endpoints.  This patch provides the necessary
      parameters and changes the resulting service configurations to
      enable TLS for the Kolla deployed OpenStack cloud.
      
      The new input parameters are:
      
      kolla_enable_tls_external: "yes" or "no" (default is "no")
      kolla_external_fqdn_cert: "/etc/kolla/certificates/haproxy.pem"
      kolla_external_fqdn_cacert: "/etc/kolla/certificates/haproxy-ca.crt"
      
      Implements: blueprint kolla-ssl
      
      Change-Id: I48ef8a781c3035d58817f9bf6f36d59a488bab41
      3daded62
  21. Feb 26, 2016
    • Dave McCowan's avatar
      Add Ansible scripts to generate TLS certificates for testing · fd280872
      Dave McCowan authored
      Working towards the blueprint that will add TLS protection
      for the external endpoints, kolla needs certificates.
      
      When kolla deploys OpenStack, the external VIP will need
      a server side certifcate.  Clients that access those endpoints will
      need the public CA certificate that signed that certificate.
      
      This ansible script will create these two certificates to make
      it easy to use TLS in a test environment.  The generated
      certificate files are:
      
      /etc/kolla/certificates/haproxy.pem  (server side certificate)
      /etc/kolla/certificates/haproxy-ca.pem (CA certificate)
      
      The generated certificates are not suitable for use in a
      production environment, but will be useful for testing and
      verifying operations.
      
      Partially-implements: blueprint ssl-kolla
      
      Change-Id: I208777f9e5eee3bfb06810c7b18a2727beda234d
      fd280872
Loading