Commit Graph

16 Commits

Author SHA1 Message Date
Zuul c5df5f8c47 Merge "Fix wrong facility for swift logs" 2023-02-10 19:34:08 +00:00
Takashi Kajinami 406b3a2afc Fix wrong facility for swift logs
Now we use local2 instead of local1 by default for all swift logs.

Change-Id: I8828832df118778fff7390e01e47bf6e7ec1a057
2023-02-08 05:52:21 +00:00
Takashi Kajinami 1892225794 Sync rsyslog config file from swift
This pulls the latest example file from the swift repo, which contains
the comment lines for a few additional services.

Change-Id: I162516b3f3535a10072245dd466ba4cf045d8836
2023-02-08 14:51:58 +09:00
Takashi Kajinami 8f2bc1aa61 Enable Octavia in scenario004
This change enables Octavia in scenario004 integration job so that we
can validate deployment of Octavia by puppet-octavia.
Because of limited resource in CI, noop driver is used and all of
backend operations like amphora instance management are disabled. This
is the same method as is used in a CI job in Octavia itself.

Depends-on: https://review.opendev.org/828063
Change-Id: I627872dd81d5ca576ea33ecf4755bf8de43df76a
2022-02-08 22:57:51 +09:00
Takashi Kajinami eda1d55cf3 CentOS: Install gpg keys from repository
... instead of maintaining copies in our own repo.

Change-Id: Ie965151027dba330fb867c6ef28a36132e755d91
2021-01-23 23:43:32 +09:00
Takashi Kajinami 3f3da39c68 CentOS: Install new gpg key for puppet packages
This change ensures that the new gpg key for puppet packages[1] are
install before installing puppet-agent, so that we can install any
package signed with the new gpg key.

[1] https://puppet.com/blog/updated-puppet-gpg-signing-key-2020-edition/

Closes-Bug: #1912871
Change-Id: I015770275192d9834e38593e249b472f56d7ccd4
2021-01-23 23:43:25 +09:00
Thomas Goirand ca8fd0d8b8 Add GPG-KEY-ceph
At first, I thought this would go in puppet-ceph, but in fact,
every compute node needs a librados dependency which is in the
Ceph repo. So at then end, all nodes need GPG-KEY-ceph, so it
is a good idea to install the repository key there.

Change-Id: Ia33718a8350a60c69ce9632eddb6156f9b43c745
2018-04-11 22:24:00 +02:00
Thomas Goirand 7a25b04990 Fixed puppet repo & key in Debian
It appears that the puppetlabs Debian repository is set to always
install a repository for Xenial (instead of using lsb_release to
find the OS), and that the Puppetlabs repo GPG key is outdated. This
patch fixes that.

Change-Id: I35231cdf7503d129bb408bc5d29a2cfe95c4e08e
2018-04-03 14:48:56 +02:00
Alfredo Moralejo e40e6d934b Fix ipv6 certificate to make it compliant with IDNA
Currently we are setting "DNS.0 = ::1", but ::1 is not a valid
A-Label for IDNA so the certificate is not correct.

Additionally, we are setting wrong value for DNS.0 = 127.0.0.1
in the ipv4 certificate.

Finally, removing issuerAltName from both ipv4 and ipv6 certificates
as they are not needed for the jobs.

New versions of python-cryptography are more strict to check
certificates content and does not allow to have not compliant
DNS names so we need to fix the certificate to bump python-cryptography.

Note that horizont tempest plugin does not support ipaddress SANs based
certificate validation so I'm disablint certificate validation for
dashboard in this patch.

Depends-On: Iea7a4b85ac64572fac0f0ad871649a79fbc1c0f5

Change-Id: Ib519d222e07e26d3683b24359e2f67728cdd8029
2018-03-20 22:38:03 +01:00
Emilien Macchi 83e2127db8 Use mirrors to deploy Puppet from Puppetlabs
Change-Id: Ia832c1f8dd27bd1ec919f9156df38a67b4d51cc1
2018-01-30 04:33:41 +00:00
Alfredo Moralejo 8df7e460e7 New SSL certificates
Current SSL certificates have expired. This patch contain new ones
valid for 10 years and i've updated the ssl-ipv*.conf with the command
to create certificates with this expiration time.

Change-Id: Iaf4164149e3e28de8cf0367bc98e3e649bd10f87
2016-10-29 18:13:34 -04:00
David Moreau-Simard 61ba93a2b0 Update SSL certificates with SubjectAltNames
A recent update to urllib tightened some checks around SSL [1].
This prompted an update to Devstack in order to work properly [2].

Jobs running into this problem without having a SubjectAltName
provided will see an error that looks like:

    SSLError: hostname '127.0.0.1' doesn't match either of
    '127.0.0.1', 'localhost'

Let's also update the certificates to provide the SubjectAltName
and provide a way to easily update the certificates if required
in the future.

[1]: df9d503a8e/CHANGES.rst (118-2016-09-26)
[2]: https://git.openstack.org/cgit/openstack-dev/devstack/commit/?id=69e3c0aac99981f17c76c22111e5c397824b8428

Change-Id: I94a586b333ba6a99ef831c853a19ab127b502d6f
2016-09-29 00:20:08 -04:00
David Moreau-Simard 927f0a0a74 Setup logging to rsyslog for swift
This makes it so Swift logs will be sent to /var/log/swift
instead of staying in journal/syslog

Change-Id: Iee7d5eac496a49b3776d0ded756159dfd821d9e9
2016-08-05 10:39:01 -04:00
Emilien Macchi e645272ef3 Generate Self-Signed Cert with SubjectAltNames
A new version of python urllib send us ugly warnings because our SSL
certificates don't have SubjectAltNames.

I re-generated some SSL certs with it, for both ipv4 & ipv6 deployments.

Change-Id: Ibed9f23869de9d2871c3d25e9bd24df809aa4c16
2016-04-13 08:24:20 -04:00
Emilien Macchi 3874255b9f scenario002: switch Keystone/Glance/Ironic/Nova to SSL
* Deploy Self-Signed Certificates for both IPv6 & IPv4 deployments.
* Disable IPv6 for RabbitMQ now, for SSL reasons, will be enabled again
  later in a next iteration.
* Deploy Ironic API under WSGI instead of eventlet.
* Switch Glance API, Ironic API and Keystone to SSL.
* Configure Tempest with SSL endpoints when needed.
* Reduce the Ironic tests because of [1].

[1] https://bugs.launchpad.net/ironic/+bug/1554237

Note #1: puppet-swift, and puppet-cinder will require some work to support SSL, so it's not
implemented in this patch.
Note #2: we don't enable SSL for Neutron because of
https://bugs.launchpad.net/neutron/+bug/1514424

Change-Id: Ib2b5289b6f5e82f43cf60dee3152b2c2ddd5a014
2016-03-14 16:34:29 -04:00
Emilien Macchi 2be3e3f9d2 scenario002: deploy RabbitMQ with SSL
* Manage Puppet OpenStack CI CA and create a common certificate,
  auto-signed.
* Configure RabbitMQ to activate SSL on scenario002
* Configure OpenStack services that run on scenario002 to connect to
  RabbitMQ using SSL protocol.

Change-Id: Ic435078472ba4e0e0eaf04a64e5bcb7aabba7b3d
2016-02-29 14:37:56 -05:00