214 Commits

Author SHA1 Message Date
jinyuan
30bd8643e4 Update rbac api version for glance
When using a helm3 to deploy , it fails
Helm3 no more support rbac.authorization.k8s.io/v1beta1 , but v1 can
support helm2 and helm3.

This change optimized deployment.

Change-Id: I107d6e965ca00a6d8b766e91573be2c9aeb4f782
2021-02-18 07:40:20 +00:00
PrateekDodda
16b2c8dcc4 Implement missing security context for nginx container
This change adds security context template at pod/container level

Change-Id: I2fbff7b3325f4b6dd98d9299b0daf9e230ece9ae
2020-09-09 19:38:50 +00:00
diwakar thyagaraj
56772fdbaa [FIX] Remove nginx Container name for apparmor in Glance-registry
Ref PS : https://review.opendev.org/#/c/749985/

Change-Id: I52e42500b2573324cec2b6d43d67cda39dad8a31
Signed-off-by: diwakar thyagaraj <diwakar.chitoor.thyagaraj@att.com>
2020-09-08 11:00:57 +00:00
Gupta, Sangeet (sg774j)
7b52b915d7 Glance: Remove nginx side car from registery
Glance-registry does not need nginx sidecar

Change-Id: I3fbc414821f16aeaad4ea01039eb832496480348
2020-09-04 15:09:56 +00:00
diwakar thyagaraj
9c39f2e328 Add Apparmor for Missing containers for glance and neutron pods
1)Fixed nginx container in glance.
2)Fixed rpc server in neutron.
3)Enabled Certificates for creating pods.

Change-Id: Ida510ee22808b818e256f93b11d2e1ed36f63a19
Signed-off-by: diwakar thyagaraj <diwakar.chitoor.thyagaraj@att.com>
2020-08-27 21:27:36 +00:00
Andrii Ostapenko
f40d07060a Add tls support to glance test pod
Change-Id: I1ca01dd52d78a7eacc348439808bb12a65ce4680
Signed-off-by: Andrii Ostapenko <andrii.ostapenko@att.com>
2020-08-11 16:06:56 +00:00
Andrii Ostapenko
0a1fa6c7b0 Make glance nginx.sh POSIX compatible
'function' keyword is a bash extension and not recognizable by sh.

Change-Id: I96205e337a28e12f3e3d06ca99e5f04e0f9a38f4
Signed-off-by: Andrii Ostapenko <andrii.ostapenko@att.com>
2020-08-11 01:30:09 -05:00
Gupta, Sangeet (sg774j)
5e16918fe8 feat(tls): Add CA cert to glance storage init
This patch set add CA certificate to glance storage init and also
converts the nginx.sh script to shell script.

Change-Id: If3e0cd194af7ed3e15668df799b2b9026e0135d8
2020-07-30 14:24:54 +00:00
Tin Lam
9d1c46c67d fix(registry): corrects glance registry ingress
This corrects an issue with glance registry ingress failing due to a
name mismatch. This also provides a proper glance registry public secret that was
missing.

Change-Id: Ibe3d5ca774365b7f4df01940884953fc0181394f
Signed-off-by: Tin Lam <tin@irrational.io>
2020-07-29 23:51:22 -05:00
Gupta, Sangeet (sg774j)
7b720184e3 feat(tls): Make openstack services compatible with mariadb with TLS
Change database scerets.

Change-Id: I068dfcb23d596d4b9bcde1944fb4def010490452
2020-07-24 23:02:09 +00:00
PrateekDodda
b850fa0d0c Add missing security context to Glance pods/containers
This updates the Glance chart to include the pod
security context on the pod template.

This also adds the container security context to set
readOnlyRootFilesystem flag to true

Change-Id: I0a164ed48dd11780b4fdbb8be6b492fb45efe0aa
2020-07-24 16:09:55 +00:00
Zuul
794ee5e90d Merge "Fix security context for glance rally tests" 2020-07-15 21:19:57 +00:00
Andrii Ostapenko
f305793243 Fix security context for glance rally tests
Also enable glance helm tests for gates.
Temporary replaces cirros url to mirror due to [0]

[0] https://bugs.launchpad.net/rally/+bug/1887705

Change-Id: I21ceba857c375c1de054e69cf84449e02881b0ce
Signed-off-by: Andrii Ostapenko <andrii.ostapenko@att.com>
2020-07-15 18:36:48 +00:00
sgupta
702c17eb78 feat(tls): Make openstack services compatible with mariadb with TLS
Depends-on: https://review.opendev.org/#/c/741037/
Change-Id: I21f4ede3bd18c0af8da1eba60cd0b7b932a31410
2020-07-14 23:32:03 +00:00
Zuul
d6022bc22e Merge "Add missing security context to Glance pods/containers" 2020-07-13 18:59:07 +00:00
Tin Lam
918a307427 feat(tls): add tls support to openstack services
This patch set enables TLS for the following OpenStack services: keystone,
horizon, glance, cinder, heat, nova, placement and neutron for s- (stein)
and t- (train) release. This serves as a consolidation and clean up patch
for the following patches:

[0] https://review.opendev.org/#/c/733291
[1] https://review.opendev.org/#/c/735202
[2] https://review.opendev.org/#/c/733962
[3] https://review.opendev.org/#/c/733404
[4] https://review.opendev.org/#/c/734896

This also addresses comments mentioned in previous patches.

Co-authored-by: Gage Hugo <gagehugo@gmail.com>
Co-authored-by: sgupta <sg774j@att.com>

Depends-on: https://review.opendev.org/#/c/737194/

Change-Id: Id34ace54298660b4b151522916e929a29f5731be
Signed-off-by: Tin Lam <tin@irrational.io>
2020-07-10 09:36:31 -05:00
DODDA, PRATEEK REDDY (PD2839)
e2ec1c6134 Add missing security context to Glance pods/containers
This updates the Glance chart to include the pod
security context on the pod template.

This also adds the container security context to set
readOnlyRootFilesystem flag to true

Change-Id: I49ac688fa9cb73ddbc215198c74fae26f503cb51
2020-07-07 01:41:16 +00:00
diwakar thyagaraj
477602f2e7 Enable Apparmor to osh test Pods
Change-Id: I0a67f66cc4ed8a1e3a5c3c458b7c1521f9169160
Signed-off-by: diwakar thyagaraj <diwakar.chitoor.thyagaraj@att.com>
2020-06-01 18:32:51 +00:00
dt241s@att.com
81b32c522e Enable Apparmor to Glance Completed pods
Change-Id: Ic8c655a570cfb4121ed1441a4583ce5c1220a8b2
2020-05-07 21:47:08 +00:00
Gage Hugo
db79e79788 Remove OSH Authors copyright
The current copyright refers to a non-existent group
"openstack helm authors" with often out-of-date references that
are confusing when adding a new file to the repo.

This change removes all references to this copyright by the
non-existent group and any blank lines underneath.

Change-Id: Ia035037e000f1bf95202fc07b8cd1ad0fc019094
2020-04-03 20:53:32 +00:00
dt241s@att.com
6e9cd82dc4 Enable Apparmor to Glance
Uncommented glance_registry apparmor

Change-Id: I5efaab70178a12c84bf63774aa31181746f7345c
2020-02-22 08:06:16 +00:00
Gage Hugo
f9dbba7043 Revert "Revert "Keystone Authtoken Cache: allow universal secret key to be set""
This reverts commit 90d070390d.

Change-Id: I017c6e9676b872e1aab21f9dc8aa2f93db58d49f
2020-02-21 11:16:55 -06:00
Vasyl Saienko
90d070390d Revert "Keystone Authtoken Cache: allow universal secret key to be set"
This reverts commit 1c85fdc390.

Do not use randomly generated strings in configmaps as this leads to
whole helm release redeployment even no values are changed. The random
items have to be generated outside of helm chart and provided via
values.
Also previous behaviour didn't allow to use cache during rolling upgrade
as new pods were spawned with new key.

Change-Id: I423611b18fca0d65e2e721a9c6a0c3d8df0813d2
2020-02-12 11:18:06 +00:00
Chinasubbareddy Mallavarapu
d03a8a1a22 Support the Nautilus release for Ceph
- Change all tests to support Nautilus,Mimic and Luminous releases
- Update ceph-config-helper image

Change-Id: I557b1efa12529d0ee51d4c5b9d4beb4abf1b0574
2019-12-17 16:23:15 +00:00
Vasyl Saienko
6571c9e208 [Glance] add job-metadefs-load
Glance provide default list of metadata definitions in /etc/glance/metadefs
directory. The patch adds job that will load those defaults definitions.
The job is enabled by default.

Change-Id: Ib3ab20a9a7f73b568b029b06101cf4e5e2473716
2019-09-26 15:48:02 +00:00
Oleh Hryhorov
266d7b41c5 Set glance.conf.cors.allowed_origin variable
The patch sets allowed_origin in cors section to have ability to
operate along with CSRF operations and direct upload in horizon dashboard.

Change-Id: Icdd9aa97d24c5bf3cc42d3cd1dfd5b2f7adbefc9
2019-08-21 18:05:43 +03:00
Vasyl Saienko
1005769100 Honor manifests:ingress_registry flag
The patch fixes issue when ingress for glance registry is created
when manifests:ingress_registry is set to false.

Change-Id: I8e54c73b3924ea292e18aa1e837d0e10b51e3876
2019-08-15 10:45:02 +00:00
pd2839
9d72b805d0 Using htk for glance security policies
Overriding the values in values.yaml

Change-Id: I52dd8b5513062242ad4f2c89bb4cc998dc5ef9c5
2019-07-02 13:10:52 -05:00
Jiří Suchomel
2d754adf21 Fixed wrong path to the value
Apparently there was a copy & paste bug introduced in https://review.opendev.org/#/c/665750/

Change-Id: I359fcc239610df9e78ed0d490706673f37034936
2019-06-19 09:31:48 +02:00
Pete Birley
9bcf0df94c Messaging: use htk function to directly hit RabbitMQ servers
This PS updates the charts to use the htk function recently introduced
to allow oslo.messaging clients ans servers to directly hit their
backends rather than using either DNS or K8S svc based routing.

Depends-On: I5150a64bd29fa062e30496c1f2127de138322863

Change-Id: I458b4313c57fc50c8181cedeca9919670487926a
Signed-off-by: Pete Birley <pete@port.direct>
2019-06-18 21:47:45 +00:00
Zuul
cd460f12c2 Merge "Rafactoring volume mount variables in db sync job" 2019-06-18 18:24:18 +00:00
Pete Birley
31bd9c832d Logs: Make it optional to use log_config_append option
This PS enables the use of simple logging options if desired.

Change-Id: If6ea420c6ed595b3b6b6eedf99a0bf26a20b6abf
Signed-off-by: Pete Birley <pete@port.direct>
2019-06-17 13:51:21 -05:00
Itxaka
d1e5fb3f92 glance: allow configuring the rbd app name
Instead of hardcoding it, let us override it with
values

Change-Id: Ifb8e5050d9fbcd7e5b40b2a5dcb4a2ce384ca195
2019-05-28 14:32:08 +02:00
John Haan
0ea9be7ade Rafactoring volume mount variables in db sync job
This patch make the db sync job template follows the same pattern
that other templates utilize the variables to make in a predictable
pattern.

Change-Id: Idbedd046c6b4fd001cf63004ffac792173a5778b
Story: 2005754
Task: 33457
2019-05-22 17:47:03 +09:00
Pete Birley
623c131292 OSH: Add emptydirs for tmp
This PS adds emptydirs backing the /tmp directory in pods, which
is required in most cases for full operation when using a read only
filesystem backing the container.

Additionally some yaml indent issues are resolved.

Change-Id: I9df8f70e913b911ff755600fa2f669d9c5dcb928
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-20 08:55:44 -05:00
Gage Hugo
4e4a4c389c Enable audit pipeline for glance
This change adds the keystonemiddleware audit paste filter[0]
and enables it for the glance-api and glance-registry services.
This provides the ability to audit API requests for glance.

[0] https://docs.openstack.org/keystonemiddleware/latest/audit.html

Change-Id: I3b42717dbc11257c21b27e7c68dedc3283e1bd34
2019-04-11 10:38:33 -05:00
pd2839
1d0e21e370 Implement Security Context for Glance
Implement container security context for the following Glance resources:
 - Glance server deployment

Change-Id: I32b63226f5f2bcfff09f0b6760f5475ef7d1b5b5
2019-03-22 21:32:57 +00:00
Cliff Parsons
d0a93d3370 Fix placement of privilege escalation in Glance.
In a previous patch set (https://review.openstack.org/#/c/629300/),
the "allowPrivilegeEscalation" flag was set to false for one of the
init containers, but it was intended to be used for the glance-api
container.

Change-Id: If2d83d82a720d7a1a39729bbf3bddc226af3ba20
2019-03-15 04:52:50 +00:00
Irina Mihai
92b54f8352 Support rbd pool replication and crush ruleset for glance
- pass new pool replication&crush ruleset parameter to the
  storage init script
- set images pool replication&crush ruleset in the storage init script

Change-Id: Idd883d4348a292c0de54c7ee47da98f11f36306f
Story: 2004921
Task: 29282
Signed-off-by: Irina Mihai <irina.mihai@windriver.com>
2019-03-06 06:58:46 +00:00
Steve Wilkerson
f4c01d2461 Add release-uuid annotation to pod spec
This adds the release-uuid annotation to the pod spec for all
replication controller templates in the openstack-helm charts

Change-Id: I0159f2741c27277fd173208e7169ff657bb33e57
2019-02-12 12:31:59 -06:00
Rahul Khiyani
1e85edddfc Fix for adding allowPrivilegeEscalation flag in container
securityContext in the charts whereever needed

Change-Id: I97f17ce0631051be33038449a21efee26c572613
2019-01-09 02:39:54 +00:00
Matthew Heler
4b7f8f0091 Support the Mimic release for Ceph
- Change all tests to support Mimic and Luminous releases
- Update ceph-config-helper dockerfile to use Mimic Ceph binaries

Change-Id: I06a545c1964eaa5b983c58db48b6ad4ccaaa3b8b
2019-01-03 16:26:40 -06:00
Zuul
c5b21ee177 Merge "[cinder,glance] don't randomize job names" 2018-12-28 04:52:51 +00:00
Tin Lam
a60cdbf310 Enable runAsUser in pod level
This patchset enables and moves the securityContext: runAsUser to the pod
level, and uses a non-root user (UID != 0) wherever applicable.

Depends-On: I95264c933b51e2a8e38f63faa1e239bb3c1ebfda
Change-Id: I81f6e11fe31ab7333a3805399b2e5326ec1e06a7
Signed-off-by: Tin Lam <tin@irrational.io>
2018-12-25 05:33:54 +00:00
Chris Wedgwood
938d0a1390 [cinder,glance] don't randomize job names
Random job names mean `helm upgrade` or indeed anything looks for
changes from rendered templates will see changes when there are none
causing churn and restarts.

Change-Id: I44331e00c288b517fccf69a4b60435efa2e13d61
2018-12-14 18:26:11 +00:00
Huang,Sophie(sh879n)
3061ae3896 Implemented livenessProbe for different OpenStack api containers
LivenessProbe is added to the below deployments:
  glance-api
  glance-registry
  heat-api
  heat-cfn
  horizon
  keystone-api
  nova-api-metadata
  nova-api-osapi
  nova-placement-api

Change-Id: I76b8cafa437855eeb42b77e88da6e3c514a3ac90
Signed-off-by: Huang,Sophie(sh879n) <sh879n@att.com>
2018-12-14 09:52:50 -06:00
Jean-Charles Lopez
e40d114d80 Cephx caps update for new and post deployments
The update makes sure the Openstack service's cephx
user capabilities match best practices in terms of
security permissions after a site or software update.

Change-Id: I70e7f620accb186da2013ba95472777c25739cc1
2018-12-04 19:03:54 +00:00
Jean-Charles Lopez
1cb646e7d1 Restrict Cinder, Glance and libvirt Ceph access scope.
Depends-On: I78bffe6764e9cbb16b2a615be766c910ba5d4e48
Change-Id: I112f2d9137f00ab2d0c246b6c0b52e4a546d648a
2018-10-29 15:53:36 +00:00
Tin Lam
29f32a07ac Enable network policy enforcement
This patch set updates the gate to by default uses network policy
for all components and enforces them in Openstack-helm.

Change-Id: I70c90b5808075797f02670f21481a4f968205325
Depends-On: I78e87ef3276e948ae4dd2eb462b4b8012251c8c8
Co-Authored-By: Mike Pham <tp6510@att.com>
Signed-off-by: Tin Lam <tin@irrational.io>
2018-10-23 14:58:13 +00:00
Pete Birley
3ae745a10e Add release uuid to pods and rc objects
This PS adds the ability to attach a release uuid to pods and rc
objects as desired. A follow up ps will add the ability to add arbitary
annotations to the same objects.

Depends-On: Iceedba457a03387f6fc44eb763a00fd57f9d84a5
Change-Id: I324680f10263c1aefca2be9056e70d0ff22fcaf0
Signed-off-by: Pete Birley <pete@port.direct>
2018-09-13 06:29:14 -05:00