137 Commits

Author SHA1 Message Date
okozachenko
500f0a8565 Fix container_infra api version in horizon
The latest one is 1.10.

Change-Id: I8af9727d55b8ceee650dcc18563f6adc615483cf
2023-01-14 03:53:01 +11:00
josebb
51b6cf4664 Support SSL identity endpoint in horizon
Change-Id: I14c99d6966f3610425c5430d40f28d7bce7d2750
2022-08-13 12:06:22 +03:00
Brian Haley
ced30abead Support image registries with authentication
Based on spec
support-OCI-image-registry-with-authentication-turned-on.rst

Each Helm chart can configure an OCI image registry and
credentials to use. A Kubernetes secret is then created with this
info. Service Accounts then specify an imagePullSecret specifying
the Secret with creds for the registry. Then any pod using one
of these ServiceAccounts may pull images from an authenticated
container registry.

Related OSH-infra change:
https://review.opendev.org/c/openstack/openstack-helm-infra/+/848142

Change-Id: I54540f14fed29622bc5af8d18939afd06d65e2d8
2022-08-11 00:18:37 +00:00
josebb
1ac8b99f7e Add helm hook annotations in horizon db-init and db-sync jobs
Change-Id: I5e4b86cdf16e11d30142819e496f0d46ebdfae0d
2022-04-22 19:57:50 +03:00
okozachenko
ff119481e8 Add SHOW_OPENRC_FILE value in horizon
Change-Id: I633c89346f3b717b1f984491ff1c3abc34e0b997
2022-04-18 17:33:24 +10:00
Thiago Brito
6af83764f0 Enable taint toleration for horizon
This changes use the helm-toolkit template for toleration
in openstack services

Signed-off-by: Lucas Cavalcante <lucasmedeiros.cavalcante@windriver.com>
Story: 2009276
Task: 43531
Depends-On: I168837f962465d1c89acc511b7bf4064ac4b546c
Change-Id: Ic4bcea7fdbfe600343a42d801b3257aab593bd26
2022-03-23 17:42:46 -03:00
okozachenko
cff52b9ff6 Add custom logo
Change-Id: Iaa1a023f19e40c96b35757f7e13c2cfbaebc6f22
2022-01-24 23:36:50 +11:00
xuxant02@gmail.com
4f8208e371 Fix OPENSTACK_API_VERSION
Fix container_infra api version value to container-infra.

Change-Id: I6c0bb2efc0ec9a4c227e48ed14f0d5bad526e76f
2022-01-17 16:18:29 +05:45
root
85f2ced17f Add local_settings.d
Change-Id: Ibf64d80a10e1bbe46bdeb931340e3f7e2c3003db
2022-01-10 19:48:04 +11:00
okozachenko
3f89267bb3 Add OPENSTACK_ENDPOINT_TYPE value in horizon
Change-Id: Ic0c6996e4af31dc5e293f83b1089c48810ccab34
2021-12-07 14:54:11 +01:00
xuxant02@gmail.com
39781a7d3d Added container_infra api version in values file to render in template
Horizon complains about not defined the container_infra version in OPENSTACK_API_VERSIONS when using the magnum dashboard in horizon. Additional of the api version of the container_infra solves the issue.

Change-Id: I99faeffc82d9d0e50e01f17f3fbf2ca0d19c161b
2021-11-29 20:07:41 +05:45
xuxant02@gmail.com
fac3c74fdb Removed default policy from horizon chart
The policy document and policy documents in the code are conflicting and creating strange issue. As the policy for nova, neutron, keystone, glance and cinder are available in horizon code, they have been removed from the chart values file.

Change-Id: I78b487c11d3d018b18ce823ffd9d8b8940dfa575
2021-09-27 17:36:43 +05:45
root
764affd1eb Fix enable password retrieve config value
Now OPENSTACK_ENABLE_PASSWORD_RETRIEVE value is string so always
get true regardless of the config value.

Change-Id: I0fb1203f22ddd6e707eeb80f72a3685c3b9c350f
2021-08-19 16:17:42 +02:00
Mohammed Naser
947aac114f Fix multidomain support selector
At the moment, the multidomain support selector is broken because
it always puts the value of a boolean inside a string which always
evaluates to true, which means setting it to false does nothing.

This patch drops the quotes around the templated configuration,
that way, it is taken for the literal boolean value.

Change-Id: I02c0a0ece680ecb55e83f3da5a992398c3ab6390
2021-06-25 13:16:31 -04:00
okozachenko
6cd9a2339d Add openstack_enable_password_retrieve variable
in horizon value

Change-Id: Icc33228e06ecc71717aad39309f37986be3b46f2
2021-06-07 18:25:43 +03:00
Thiago Brito
8ab6013409 Changing all policies to yaml format
In the Victoria cycle oslo.policy decided to change all default policies
to yaml format. Today on openstack-helm we have a mix of json and yaml
on projects and, after having a bad time debugging policies that should
have beeing mounted somewhere but was being mounted elsewhere, I'm
proposing this change so we can unify the delivery method for all
policies across components on yaml (that is supported for quite some
time). This will also avoid having problems in the future as the
services move from json to yaml.

[1] https://specs.openstack.org/openstack/oslo-specs/specs/victoria/policy-json-to-yaml.html

Signed-off-by: Thiago Brito <thiago.brito@windriver.com>
Change-Id: Id170bf184e44fd77cd53929d474582022a5b6d4f
2021-05-26 18:15:41 -03:00
Gayathri Devi Kathiri
64cf176bef Implement "CSRF_COOKIE_HTTPONLY" option support in horizon
The HTTP only flag protects the session cookies from
cross-site scripting.

Change-Id: Iec07b3b447051726ce218e5f31c8bf583731a90c
2021-04-09 15:51:51 +00:00
guilhermesteinmuller
8f38a1c45f Update glance default policy values
Currently, when users try to navigate through horizon
panels or use the command-line interface that contains
calls to /api/glance/metadefs it will pop up insufficient
permission errors due to the fact we are disabling [1]
the metadef APIs in glance addressing OSSN-0088 [2].

As a side effect on how we address the OSSN, all API calls
to metadefs will be forbidden for any user, which is not recommended
in production environments. However, we have the current
recommendation of the OSSN which allows CRUD of metadef to
admin only and provide read access to all users.

[1] aab5ee7711
[2] https://wiki.openstack.org/wiki/OSSN/OSSN-0088

Story: 2008761
Task: 42128
Change-Id: Ib1415cadbbfab874a8d44ac6b5c6fba3c7502242
2021-03-25 19:32:08 -03:00
Gayathri Devi Kathiri
b65988fa5c Modify Password validator related settings in Horizon
Add "enable_pwd_validator" variable to apply password
validator settings when enabled in horizon values.

Modify "PASSWORD_VALIDATOR" so as to enforce password
requirements i.e., password must be at least eight
characters in length and must include characters from
at least two of these groupings: alpha, numeric, and
special characters when "enable_pwd_validator" is enabled.

Change-Id: Ia866feb875490d0bb40e820c6c32ee2cb6aa4c29
2021-01-04 02:25:53 +00:00
Vasyl Saienko
d0bd3dbb50 [horizon] Allow to pass any setting to horizon local_settings.py
Change-Id: I164f3bb0af5d07af17490bd3d275c7b0fbadb0b9
2020-08-13 17:21:14 +00:00
Shuicheng Lin
67eefcf381 Correct limits and os-availability-zone's policy setting
In nova latest code, limits and os-availability-zone have been
updated to could be listed as any user by below patches:
limits: 4d37ffc111ae8bb43bd33fe995bc3686b065131b
os-availability-zone: b8c2de86ed46caf7768027e82519c2418989c36b
And target project id is set to {}. So user cannot be matched as
"owner", and lead to API access failure.
Update policy to be the same as latest nova code to avoid the error.

Change-Id: I3621be0fa42388180a7ac3e4bc7f7683a0c15b68
Signed-off-by: Shuicheng Lin <shuicheng.lin@intel.com>
2020-08-03 13:48:58 +08:00
Zuul
1fd839139d Merge "Add missing security context to Horizon test pods/containers" 2020-07-16 18:53:46 +00:00
DODDA, PRATEEK REDDY (pd2839)
e61f88465a Add missing security context to Horizon test pods/containers
This updates the horizon chart to include the pod
security context on the pod template.

This also adds the container security context to set
readOnlyRootFilesystem flag to true

Change-Id: I2ccd920fa26aca2955afef8b71d56e55d1ae26e8
2020-07-15 22:26:41 +00:00
sgupta
702c17eb78 feat(tls): Make openstack services compatible with mariadb with TLS
Depends-on: https://review.opendev.org/#/c/741037/
Change-Id: I21f4ede3bd18c0af8da1eba60cd0b7b932a31410
2020-07-14 23:32:03 +00:00
Tin Lam
918a307427 feat(tls): add tls support to openstack services
This patch set enables TLS for the following OpenStack services: keystone,
horizon, glance, cinder, heat, nova, placement and neutron for s- (stein)
and t- (train) release. This serves as a consolidation and clean up patch
for the following patches:

[0] https://review.opendev.org/#/c/733291
[1] https://review.opendev.org/#/c/735202
[2] https://review.opendev.org/#/c/733962
[3] https://review.opendev.org/#/c/733404
[4] https://review.opendev.org/#/c/734896

This also addresses comments mentioned in previous patches.

Co-authored-by: Gage Hugo <gagehugo@gmail.com>
Co-authored-by: sgupta <sg774j@att.com>

Depends-on: https://review.opendev.org/#/c/737194/

Change-Id: Id34ace54298660b4b151522916e929a29f5731be
Signed-off-by: Tin Lam <tin@irrational.io>
2020-07-10 09:36:31 -05:00
Tin Lam
d122223214 fix(security): update horizon setting
This patch set updates some default horizon settings to be more secured.

Change-Id: I7849cb0e9819d9e5cf4e149634e2bebee75a1c7f
Signed-off-by: Tin Lam <tin@irrational.io>
2020-06-05 12:25:53 -05:00
Andrii Ostapenko
8cfa2aa390 Enable yamllint checks
- brackets
- braces
- colon
- commas
- comments
- document-end
- document-start
- empty-lines
- hyphens
- indentation
- new-line-at-end-of-file
- new-lines
- octal-values
- trailing-spaces

with corresponding code adjustment.

Also add yamllint.conf under the check.

Change-Id: Ie6251c9063c9c99ebe7c6db54c65d45d6ee7a1d4
2020-05-27 19:16:34 -05:00
Roman Gorshunov
32c7a6cdd4 Add Project Specific Contributor and PTL Docs
This patch amends contributor guidelines for the Ussuri goals.

Change-Id: I9207d02a386e1250963b378bd9fd2188d78a613e
Task: 38545
Story: 2007236
2020-04-24 20:57:28 +02:00
Gage Hugo
db79e79788 Remove OSH Authors copyright
The current copyright refers to a non-existent group
"openstack helm authors" with often out-of-date references that
are confusing when adding a new file to the repo.

This change removes all references to this copyright by the
non-existent group and any blank lines underneath.

Change-Id: Ia035037e000f1bf95202fc07b8cd1ad0fc019094
2020-04-03 20:53:32 +00:00
Tin Lam
12bee1bb97 Migrate default release to Stein
This patch set updates the default job to use OpenStack Stein release.
The previously default Ocata release will be place in separate job.

Change-Id: I489324f762a179a2cab5499a6d8e57e97c81297f
Signed-off-by: Tin Lam <tin@irrational.io>
2020-01-09 10:00:31 -06:00
Prateek Dodda
c2bd947787 Adding missing readOnlyRootFilesystem flag for container security context
Change-Id: Id11292ec0a76dbf659e918833859b9109c07cc18
2019-11-26 20:33:02 +00:00
Tin Lam
a25eccb7cb Implements egress network policy
This patch set adds in the egress policy for core OpenStack Services.

Depends-On: https://review.opendev.org/#/c/679853/

Change-Id: I585ddabcbd640db784520c913af8eddecaee3843
Signed-off-by: Tin Lam <tlam@omegaprime.dev>
2019-11-22 01:16:49 +00:00
Steven Fitzpatrick
5c6811503f Update Horizon Helm test to use python3
This change updates the tests container image
to one which installs python3.

The selenium-test.py template file has been refactored
to match the structure of the selenium tests in
openstack-helm-infra/tools/gate/selenium

Change-Id: I568bea8d715ea28b8e750215d166ba1b04e4172d
2019-10-21 12:53:09 -05:00
Steve Wilkerson
9736f5f544 Update kubernetes-entrypoint image reference
This updates the kubernetes-entrypoint image reference to consume
the publicly available kubernetes-entrypoint image that is built
and maintained under the airshipit namespace, as the stackanetes
image is no longer actively maintainedy

Depends-On: https://review.opendev.org/688435

Change-Id: I8e76cdcc9d4db8975b330e97169754a2a407341f
Signed-off-by: Steve Wilkerson <sw5822@att.com>
2019-10-21 13:58:22 +00:00
NarlaSandeepNarlaSaibaba
243f74f10d Horizon – API Handling – HTTP Security Headers Not Present
Added new X-Content-Type-Options: nosniff header to make sure the browser
does not try to detect a different Content-Type than what is actually
sent (can lead to XSS)

Added new Header and set X-Permitted-Cross-Domain-Policies: "none"

Change-Id: I6f89ffb44ad805039c4074889a7c15fbef6fc95e
2019-10-18 15:31:14 +00:00
Chris Wedgwood
be3a4f65de [horizon] enable the Apache "Header" module by default
Some configuration when enable will explicitly set headers, for this
to work the header module should be enabled.

Change-Id: If549d4c6924c990d1a48bca193935ed9a2ed6864
2019-10-16 21:45:35 +00:00
Gage Hugo
c3e085b800 Add network policy nonvoting checks
This change adds two network policy zuul checks, one for the compute-kit,
and one for cinder/ceph, to test network policy for each OpenStack
service. These checks will be non-voting initially.

The network policy rules for each service will initially allow all
traffic. These ingress/egress rules will be defined in future changes
to only explicitly allow traffic between services that are explicitly
allowed to communicate, other traffic will be denied.

Depends-On: https://review.opendev.org/#/c/685130/

Change-Id: Ide2998ebb2af2832f24ca7abc398a82e4a6d70e3
2019-09-26 11:57:15 -05:00
zhouyao
058769c49c Add 'PATCH' to request method in order to enable 'PATCH' method in Horizon
Change-Id: I2e5f08cdde91c842c574d5318b8ae3113dd6fa80
Closes-Bug: #1821213
2019-07-30 16:25:22 +08:00
Gupta, Sangeet (sg774j)
4f5a78351d Horizon: Expose additional security config params
Expose additional Horizon security params in accordance with the
OpenStack Security Guide [0]

- ALLOWED_HOSTS
- HORIZON_IMAGES_UPLOAD_MODE

[0] https://docs.openstack.org/security-guide/dashboard/domains-dashboard-upgrades-basic-web-server-configuration.html

Depends-On: https://review.opendev.org/#/c/635545

Change-Id: I071c8fbfc5ea9b41d3c35840e342d83349ae1613
2019-07-18 10:15:56 -05:00
Zuul
fb49cd9903 Merge "Horizon: Set SECURE_PROXY_ADDR_HEADER" 2019-06-26 13:40:51 +00:00
Steve Wilkerson
0e1c296101 Horizon helm tests
This adds a helm test for Horizon, the helm test
runs a selenium webdriver check to verify the dashboard
is up

Change-Id: I3616c05596b2bd94931c39fb774333bf65453d52
Signed-off-by: Steve Wilkerson <sw5822@att.com>
2019-06-05 12:41:21 -05:00
sg774j
0d1e01ee3d Horizon: Set SECURE_PROXY_ADDR_HEADER
Setting this to HTTP_X_FORWARDED_FOR will display the IP in
X-Forwarded-For header instead of REMOTE_ADDR. This is to display
client's IP.

Change-Id: Ifab508f2c3e39de69e3b1423b6aab57e333fc37e
2019-05-20 14:20:53 -05:00
Zuul
f8adab245b Merge "Point to OSH-images images" 2019-05-18 19:12:58 +00:00
Jean-Philippe Evrard
1d335146fa Point to OSH-images images
We now have a process for OSH-images image building,
using Zuul, so we should point the images by default to those
images, instead of pointing to stale images.

Without this, the osh-images build process is completely not
in use, and updating the osh-images process or patching its
code has no impact on OSH.

This should fix it.

Change-Id: I672b8755bf9e182b15eff067479b662529a13477
2019-05-13 10:58:02 +02:00
Roy Tang (rt7380)
5df6fa3789 Expose Anti-Affinity Weight Setting.
Add weight default setting to anti-affinity.

Depends-on: Id8eb303674764ef8b0664f62040723aaf77e0a54
Change-Id: I09f96522cddf3a77dae73daca4557877eda5df50
2019-05-10 22:05:24 -05:00
sg774j
8b8e568d21 Horizon: Corrected mounted file name.
Horizon dashboard was not being displayed correctly due to incorrect
config file names.

Change-Id: I43b34cd7d7711e01b8a95d0b45e10d7ee57051e9
2019-04-26 14:34:07 +00:00
Itxaka
55f70be381 Add heat dashboard if available to horizon
Currently there is no enabling of the heat dashboard if its
installed on the horizon image.

This patch add an extra conf var that allows several dashboards
to be added and will try to find and enable them on start

If the panel dirs dont exists, it will do nothing

This patch add the extra heat_dashboard and includes the existing
neutron_taas_dashboard into the new config

Change-Id: Ibcc4da166d907f3cb842bfc45d842a650361a2d8
2019-04-15 07:13:18 +00:00
Huang,Sophie
f92bfd7f6a Add log level variable to Horizon log configuration
log_level variable is added to Horizon configuration. This
will enable the overwriting of the log levels in a
customized manifest.

Change-Id: I15381add9ee1e880e73004131b329ac02972755b
Signed-off-by: Huang,Sophie <sh879n@att.com>
2019-04-11 10:56:32 -05:00
Zuul
5c9dd146b8 Merge "Remove overlapping Listen directives on apache >= 2.4" 2019-04-06 04:37:01 +00:00
Itxaka
38fb90d528
Allow more generic overrides for horizon
With this patch we allow for a more easy way of overriding some
of the values that may be used in other distros while maintainting
the default values if those values are not overriden.

The following values are introduced to be overriden:
conf:
  software:
    apache2:
      conf_dir:
      site_dir:
      mods_dir:
      binary:
      start_flags:
      a2enmod:
      a2dismod:

On which:
 * conf_dir: directory where to drop the config files
 * site_dir: directory where to drop the enabled virtualhosts
 * mods_dir: directory where to drop any mod configuration
 * binary: the binary to use for launching apache
 * start_flags: any flags that will be passed to the apache binary call
 * a2enmod: mods to enable
 * a2dismod: mods to disable

Notice that if there is no overrides given, it should not affect anything
and the templates will not be changed as the default values are set to what
they used to be as to not disrupt existing deployments.

Change-Id: If0fb9ab03aacfcd7087e753698880505571d0233
2019-04-02 12:29:35 +02:00