Skip to content
Snippets Groups Projects
  1. Mar 10, 2022
    • Mark Goddard's avatar
      libvirt: support SASL authentication · d2d4b53d
      Mark Goddard authored
      In Kolla Ansible OpenStack deployments, by default, libvirt is
      configured to allow read-write access via an unauthenticated,
      unencrypted TCP connection, using the internal API network.  This is to
      facilitate migration between hosts.
      
      By default, Kolla Ansible does not use encryption for services on the
      internal network (and did not support it until Ussuri). However, most
      other services on the internal network are at least authenticated
      (usually via passwords), ensuring that they cannot be used by anyone
      with access to the network, unless they have credentials.
      
      The main issue here is the lack of authentication. Any client with
      access to the internal network is able to connect to the libvirt TCP
      port and make arbitrary changes to the hypervisor. This could include
      starting a VM, modifying an existing VM, etc. Given the flexibility of
      the domain options, it could be seen as equivalent to having root access
      to the hypervisor.
      
      Kolla Ansible supports libvirt TLS [1] since the Train release, using
      client and server certificates for mutual authentication and encryption.
      However, this feature is not enabled by default, and requires
      certificates to be generated for each compute host.
      
      This change adds support for libvirt SASL authentication, and enables it
      by default. This provides base level of security. Deployments requiring
      further security should use libvirt TLS.
      
      [1] https://docs.openstack.org/kolla-ansible/latest/reference/compute/libvirt-guide.html#libvirt-tls
      
      Depends-On: https://review.opendev.org/c/openstack/kolla/+/833021
      Closes-Bug: #1964013
      Change-Id: Ia91ceeb609e4cdb144433122b443028c0278b71e
      d2d4b53d
    • Zuul's avatar
      Merge "Fix prechecks for "Ironic iPXE" container" · f26b9cd8
      Zuul authored
      f26b9cd8
  2. Mar 09, 2022
  3. Mar 08, 2022
  4. Mar 07, 2022
    • Zuul's avatar
      Merge "[CI] Remove an old override" · 19b169e1
      Zuul authored
      19b169e1
    • Mark Goddard's avatar
      Explicitly unset net.ipv4.ip_forward sysctl · caf33be5
      Mark Goddard authored
      While I8bb398e299aa68147004723a18d3a1ec459011e5 stopped setting
      the net.ipv4.ip_forward sysctl, this change explicitly removes the
      option from the Kolla sysctl config file. In the absence of another
      source for this sysctl, it should revert to the default of 0 after the
      next reboot.
      
      A deployer looking to more aggressively change the value may set
      neutron_l3_agent_host_ipv4_ip_forward to 0. Any deployments still
      relying on the previous value may set
      neutron_l3_agent_host_ipv4_ip_forward to 1.
      
      Related-Bug: #1945453
      
      Change-Id: I9b39307ad8d6c51e215fe3d3bc56aab998d218ec
      caf33be5
    • Radosław Piliszek's avatar
      [CI] Remove an old override · e818d312
      Radosław Piliszek authored
      Since [1] we are not running keepalived directly on CI network,
      and are therefore safeguarded against such collisions.
      
      [1] 8e406291
      
      Change-Id: Ie25b2d6d48f10c6b295795b3c82c1f8a213f2a8c
      e818d312
    • Radosław Piliszek's avatar
      [CI] Ironic: use ipmitool retries · a6145d67
      Radosław Piliszek authored
      In Ironic jobs with Tenks, we saw issues with IPMI commands
      failing, resuling in job failures:
      
        Error setting Chassis Boot Parameter 5
      
      A metal3.io commit [1] was found that fixes the issue by moving IPMI
      retries from ironic to ipmitool, which has a side-effect of increasing
      the timeout. This change applies the same configuration.
      
      This change has been adapted from an analogous change in
      kayobe-config-dev. [2]
      
      [1] https://github.com/metal3-io/ironic-image/commit/6bc1499d8bb04c2c859b970b3739c3a8ed66ae2a
      
      
      [2] Ib4fce74cebebe85c31049eafe2eeb6b28dfab041
      
      Co-Authored-By: default avatarMark Goddard <mark@stackhpc.com>
      Change-Id: I552417b9da03b8dfc9406e0ff644092579bc7122
      a6145d67
  5. Mar 05, 2022
  6. Mar 04, 2022
    • Radosław Piliszek's avatar
      [TrivialFix] Remove old comment · 833c45ea
      Radosław Piliszek authored
      Ironic is dropping default_boot_option and the new default has
      been around for quite a while now so let's remove this old
      scary comment.
      
      Change-Id: I80d645cb97251ac63e04d7ec1c87d4600d17d4ee
      833c45ea
    • Radosław Piliszek's avatar
      Fix prechecks for "Ironic iPXE" container · 19c5f2f0
      Radosław Piliszek authored
      Since I30c2ad2bf2957ac544942aefae8898cdc8a61ec6 this container
      is always enabled and thus the port should always be checked.
      
      Change-Id: I94a70d89123611899872061bd69593280d0a68c4
      19c5f2f0
  7. Mar 03, 2022
  8. Mar 02, 2022
  9. Feb 28, 2022
  10. Feb 25, 2022
    • Radosław Piliszek's avatar
      Enable Ironic iPXE support by default · baeca81a
      Radosław Piliszek authored
      Ironic has changed the default PXE to be iPXE (as opposed to plain
      PXE) in Yoga. Kolla Ansible supports either one or the other and
      we tend to stick to upstream defaults so this change enables
      iPXE instead of plain PXE - by default - the users are allowed
      to change back and they need to take one other action so it is
      good to remind them via upgrade notes either way.
      
      Change-Id: If14ec83670d2212906c6e22c7013c475f3c4748a
      baeca81a
  11. Feb 24, 2022
  12. Feb 23, 2022
  13. Feb 22, 2022
  14. Feb 21, 2022
  15. Feb 18, 2022
Loading