Skip to content
Snippets Groups Projects
  1. Jun 16, 2020
  2. Jun 15, 2020
    • James Kirsch's avatar
      Generate Root CA for Self-Signed Certificates · a982d3ac
      James Kirsch authored
      Update the certificate generation task to create a root CA for the
      self-signed certificates. The internal and external facing certificates
      are then generated using the root CA.
      
      Updated openstack_cacert to use system CA trust store in CI tests
      certificate by default.
      
      Change-Id: I6c2adff7d0128146cf086103ff6060b0dcefa37b
      Partially-Implements: blueprint add-ssl-internal-network
      a982d3ac
  3. Jun 04, 2020
  4. Jun 02, 2020
  5. May 28, 2020
  6. May 23, 2020
    • Doug Szumski's avatar
      Switch to Monasca API for logs · b39a0f80
      Doug Szumski authored
      The Monasca Log API has been removed and in this change we switch
      to using the unified API. If dedicated log APIs are required then
      this can be supported through configuration. Out of the box the
      Monasca API is used for both logs and metrics which is envisaged to
      work for most use cases.
      
      In order to use the unified API for logs, we need to disable the
      legacy Kafka client. We also rename the Monasca API config file
      to remove a warning about using the old style name.
      
      Depends-On: https://review.opendev.org/#/c/728638
      Change-Id: I9b6bf5b6690f4b4b3445e7d15a40e45dd42d2e84
      b39a0f80
    • xiaojueguan's avatar
      Remove post_config from the Kibana role · fbc47e60
      xiaojueguan authored
      
      Since at least Stein, there is no visible effect from these tasks.
      The Kibana dashboard seems to be working exactly the same,
      greeting user on the first use with "please configure my index".
      I tested on both Ubuntu and CentOS.
      In new E*K stack (Ussuri+, CentOS8+) it even causes play errors.
      
      Co-authored-by: default avatarRadosław Piliszek <radoslaw.piliszek@gmail.com>
      Change-Id: Iafc6986cce9cbaa0ea9e219ca85d7d01a61308cf
      Closes-Bug: #1799689
      fbc47e60
  7. May 21, 2020
  8. May 20, 2020
  9. May 18, 2020
  10. May 17, 2020
    • Michal Nasiadka's avatar
      CI: Add ansible-lint to tox · d8f31e0a
      Michal Nasiadka authored
      * Reworked tox pep8 into linters job, that runs:
        - pep8
        - bandit
        - bashate
        - doc8
        - yamllint
        - ansible-lint (validate-all-files.py + ansible-lint)
      
      * Skip E701 - missing galaxy_info in meta and E602 see [1].
      * Skip E301 and E503 - followup later in a separate change
      * Added ansible-role-jobs to zuul.d/project.yaml which will run
        openstack-tox-linters job in check queue
      * Fixed remaining style issue
      * Made tox and docs reference the new env for linters
      * Dropped pype environment (not supported)
      
      [1]: https://github.com/ansible/ansible-lint/issues/457
      
      Change-Id: I494b4b151804aac8173120e6c6e42bc2fdb00234
      d8f31e0a
    • xiaojueguan's avatar
      make murano work with endpoints with non-public CA · 1f3cb24a
      xiaojueguan authored
      Change-Id: Ic0d0543b6ad93743eae2a144e8a3b07de54e6d96
      Closes-Bug: #1878344
      1f3cb24a
  11. May 15, 2020
    • Will Szumski's avatar
      Improve fernet_token_expiry precheck · 810acea6
      Will Szumski authored
      The pre-check was broken, see bug report for details.
      
      Change-Id: I089f1e288bae6c093be66181c81a4373a6ef3de4
      Closes-Bug: #1856021
      810acea6
    • Michal Nasiadka's avatar
      Fix deprecation warnings in fluentd · 3611f053
      Michal Nasiadka authored
      Change-Id: I812665059783617d581d748e619b29426f89b353
      3611f053
    • Jeffrey Zhang's avatar
      Configure RabbitMQ user tags in nova-cell role · 869e3f21
      Jeffrey Zhang authored
      The RabbitMQ 'openstack' user has the 'administrator' tag assigned via
      the RabbitMQ definitions.json file.
      
      Since the Train release, the nova-cell role also configures the RabbitMQ
      user, but omits the tag. This causes the tag to be removed from the
      user, which prevents it from accessing the management UI and API.
      
      This change adds support for configuring user tags to the
      service-rabbitmq role, and sets the administrator tag by default.
      
      Change-Id: I7a5d6fe324dd133e0929804d431583e5b5c1853d
      Closes-Bug: #1875786
      869e3f21
    • Doug Szumski's avatar
      Fix registration of Monasca Grafana datasource · 776253c4
      Doug Szumski authored
      The refactor in change I500cc8800c412bc0e95edb15babad5c1189e6ee4
      broke the task `Enable Monasca Grafana datasource for control
      plane organisation`. This change fixes the brackets.
      
      Change-Id: I9167a312be107fbfddfd07740f67845c2eaafc3d
      Closes-Bug: 1878878
      776253c4
  12. May 14, 2020
  13. May 13, 2020
    • James Kirsch's avatar
      Add support for encrypting Barbican API · 2e08ffd6
      James Kirsch authored
      This patch introduces an optional backend encryption for the Barbican
      API service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Barbican service.
      
      Change-Id: I62a43b36ebe4a03230bf944980b45e4b6938871b
      Partially-Implements: blueprint add-ssl-internal-network
      2e08ffd6
  14. May 12, 2020
  15. May 11, 2020
  16. May 08, 2020
  17. May 06, 2020
    • Radosław Piliszek's avatar
      Make nova perms consistent between applications · 93c9ad89
      Radosław Piliszek authored
      Nova cells support introduced a slight regression that triggers
      odd behaviour when we tried switching to Apache (httpd) [1].
      Bootstrap no longer applied permissions recursively to all log
      files, creating a discrepancy between normal and bootstrap runs
      and also Nova and other services such as Cinder (regarding
      bootstrap logging).
      
      This patch fixes it.
      
      Backport to Train.
      
      Not creating reno nor a bug record because it does not affect
      any current standard usage in any currently known way.
      
      Note this only really hides (standardizes?) the global issue that
      we don't control file permissions on newly created files too well.
      
      [1] https://review.opendev.org/724793
      
      Change-Id: I35e9924ccede5edd2e1307043379aba944725143
      Needed-By: https://review.opendev.org/724793
      93c9ad89
  18. May 05, 2020
    • generalfuzz's avatar
      Use FQDN to communicate with Kibana and Elasticsearch · f165b81e
      generalfuzz authored
      Switch URL composition from using VIP to FQDN to connect with Kibana and
      Elasticsearch services.
      
      Change-Id: I5d559ead1d6d5e928e76bb685e0f730868fd7b89
      Closes-Bug: #1862419
      f165b81e
    • Mark Goddard's avatar
      Use FQDN for elasticsearch · a87780cb
      Mark Goddard authored
      This was addressed in I21689e22870c2f6206e37c60a3c33e19140f77ff but
      accidentally reverted in I4f74bfe07d4b7ca18953b11e767cf0bb94dfd67e.
      
      Change-Id: Id5fc458b0ca54bddfe9a43cb315dbcfeb2142395
      a87780cb
  19. May 01, 2020
    • Radosław Piliszek's avatar
      OVN IPv6 · 7d73246f
      Radosław Piliszek authored
      Fixes:
      - SB/NB DB address format (single host) for SB/NB DB daemon
      - SB/NB DB address format (all hosts) for Neutron / northd /
        ovn-ovs bootstrap
      - OVN tests
      
      Change-Id: I539773c48f89b731d068280c228ce11782bf5788
      Closes-Bug: #1875222
      7d73246f
  20. Apr 30, 2020
    • James Kirsch's avatar
      Add support for encrypting Horizon and Placement API · e3d5a91a
      James Kirsch authored
      This patch introduces an optional backend encryption for Horizon and
      Placement services. When used in conjunction with enabling TLS for
      service API endpoints, network communcation will be encrypted end to
      end, from client through HAProxy to the Horizon and Placement services.
      
      Change-Id: I9cb274141c95aea20e733baa623da071b30acf2d
      Partially-Implements: blueprint add-ssl-internal-network
      e3d5a91a
    • James Kirsch's avatar
      Add support for encrypting Glance api · f87814f7
      James Kirsch authored
      Add TLS support for Glance api using HAProxy to perform TLS termination.
      
      Change-Id: I77051baaeb5d3f7dd9002262534e7d35f3926809
      Partially-Implements: blueprint add-ssl-internal-network
      f87814f7
    • Hongbin Lu's avatar
      Zun: Add zun-cni-daemon to compute node · 91678f67
      Hongbin Lu authored
      Zun has a new component "zun-cni-daemon" which should be
      deployed in every compute nodes. It is basically an implementation
      of CNI (Container Network Interface) that performs the neutron
      port binding.
      
      If users is using the capsule (pod) API, the recommended deployment
      option is using "cri" as capsule driver. This is basically to use
      a CRI runtime (i.e. CRI plugin for containerd) for supporting
      capsules (pods). A CRI runtime needs a CNI plugin which is what
      the "zun-cni-daemon" provides.
      
      The configuration is based on the Zun installation guide [1].
      It consits of the following steps:
      * Configure the containerd daemon in the host. The "zun-compute"
        container will use grpc to communicate with this service.
      * Install the "zun-cni" binary at host. The containerd process
        will invoke this binary to call the CNI plugin.
      * Run a "zun-cni-daemon" container. The "zun-cni" binary will
        communicate with this container via HTTP.
      
      Relevant patches:
      Blueprint: https://blueprints.launchpad.net/zun/+spec/add-support-cri-runtime
      Install guide: https://review.opendev.org/#/c/707948/
      Devstack plugin: https://review.opendev.org/#/c/705338/
      Kolla image: https://review.opendev.org/#/c/708273/
      
      [1] https://docs.openstack.org/zun/latest/install/index.html
      
      Depends-On: https://review.opendev.org/#/c/721044/
      Change-Id: I9c361a99b355af27907cf80f5c88d97191193495
      91678f67
  21. Apr 29, 2020
  22. Apr 28, 2020
  23. Apr 27, 2020
  24. Apr 26, 2020
    • Radosław Piliszek's avatar
      Fix haproxy restarting twice per Ansible run · 04effaa9
      Radosław Piliszek authored
      Since haproxy is orchestrated via site.yml in a single play,
      it does not need flushing handlers as handlers run will
      happen at the end of this play.
      
      Change-Id: Ia3743575da707325be93c39b4a2bcae9211cacb2
      Related-Bug: #1864810
      Closes-Bug: #1875228
      04effaa9
Loading