Ian Wienand 7c74729c53 AFS: Allow for remote vos release with localauth
We constantly have problems with various timeouts on the release of
our mirror volumes creating locked volumes or stuck transactions; this
then requires significant manual intervention.  This has been
discussed multiple times, but this short exchange from #openafs
probably sums it up best:

 Sep 11 13:32:35 <auristor> The timeout problem is due to the fact
  that UV_ReleaseVolume performs multiple RPCs.  vos acquires a token
  from the cache manager when it starts.  it has no method of acquiring
  a new token if it expired during an RPC.  Therefore, if the token did
  expire the remaining RPCs are performed unauthenticated.  Without
  appropriate permissions the cleanup of the volservers, writing the
  updating VL entry will fail.

 Sep 11 13:33:59 <auristor> A frequent solution is to deploy a remctld
  service which has access to issue vos commands as -localauth and then
  use remctld ACLs to restrict the identities of the processes that are
  permitted to request the volume release.

 Sep 11 14:37:28 <kaduk> Yeah, the -localauth tokens are pretty key
 for long-running stuff, at the moment.

Indeed remctl [1] has been written to be the kerberos-based remote
control AFS wrapper.  However, it is complex to setup, uses a lot of
Perl and it is unlikely to be familiar to very many people (making the
footprint of people who can help us admin it low).  Getting it wrong
seems to be a pretty good vector for remote exploits.  It does not
seem to be a good fit.

However, we can take a simpler approach.  We can use Ansible to setup
our afs server to allow a particular key to run a release script that
wraps the "vos release -localauth" for us.  With this in place, we can
update the scripts that run on mirror-update to ssh remotely and call
this, rather than call "vos release" directly.

This implements this basic support for the remote script.  A new key
will be generated on mirror-update.opendev.org and it will be allowed
to run the vos_release.sh script remotely; which filters the command
to just do "vos release -localauth".

After we have tested this, we can start using it in scripts.  I think
time will tell if we need locking or other features; this seems like
the KISS place to start.

[1] https://www.eyrie.org/~eagle/software/remctl/remctl.html

Change-Id: I6c96f89c6f113362e6085febca70d58176f678e7
2019-10-29 21:28:01 +11:00
2019-10-26 09:24:04 +09:00
2019-10-24 11:00:05 +11:00
2019-10-24 11:00:05 +11:00
2016-07-15 12:04:48 -07:00
2019-04-19 19:26:05 +00:00
2018-11-02 08:19:53 +11:00
2019-04-20 09:31:14 -07:00
2019-05-24 14:56:50 -05:00
2019-04-20 09:31:14 -07:00
2019-08-09 16:43:55 +10:00
2014-09-30 12:40:59 -07:00
2019-04-20 09:31:14 -07:00
2018-06-25 11:19:43 +10:00

Puppet Modules

These are a set of puppet manifests and modules that are currently being used to manage the OpenStack Project infrastructure.

The main entry point is in manifests/site.pp.

In general, most of the modules here are designed to be able to be run either in agent or apply mode.

These puppet modules require puppet 2.7 or greater. Additionally, the site.pp manifest assumes the existence of hiera.

See http://docs.openstack.org/infra/system-config for more information.

Documentation

The documentation presented at http://docs.openstack.org/infra/system-config comes from https://opendev.org/opendev/system-config repo's docs/source. To build the documentation use

tox -evenv python setup.py build_sphinx
Description
System configuration for the OpenDev Collaboratory
Readme 154 MiB
Languages
Jinja 36.9%
Python 36.8%
Shell 13.6%
Dockerfile 3.8%
JavaScript 3%
Other 5.9%