4096 Commits

Author SHA1 Message Date
josebb
52444cf3c8 Support TLS endpoints in barbican
This allows barbican to consume TLS openstack endpoints.
Jobs consume openstack endpoints, typically identity endpoints.
And barbican itself interact with other openstack services via
endpoints.

Change-Id: I890f909fc6466b696ee64aa7dfdd528934fccb2d
2022-09-02 18:30:21 +03:00
josebb
178e4ce313 Support TLS for ks jobs and oslo_db/oslo_message in deployment - barbican
Change-Id: I8bee4e7a075d8431e22941c4b88e31889bb6701c
2022-09-02 18:29:56 +03:00
Zuul
350d55baad Merge "Distinguish between port number of internal endpoint and binding port number in keystone" 2022-09-02 02:07:35 +00:00
okozachenko
f3ed56cc18 Use HTTP probe instead of TCP probe
Strictly speaking, open socket doesn't mean working API.
We experienced API stopped responding and the socket was still
open so API was unhealthy actually but kubernetes did not restart.

HTTP probe will fix this issue.

Change-Id: I95bb3ad3123d8a4a784d260477f037fa5506d290
2022-09-01 15:54:07 +10:00
josebb
94319bc926 Distinguish between port number of internal endpoint and binding
port number in keystone

Now binding ports of service and pod spec are configured using
internal endpoint values.
To support reverse proxy for internalUrl, need to distinguish
between binding ports and internal endpoint ports.

I added `service` section in endpoint items apart from admin,public
,internal and default.

Change-Id: I79b867a4e6771e07d1eebec89235352d7613e8eb
2022-08-30 17:33:05 +03:00
Zuul
e945ebcf61 Merge "Support TLS endpoints in nova metadata-api" 2022-08-29 23:38:31 +00:00
Zuul
779e1eb789 Merge "Distinguish between port number of internal endpoint and binding port number in glance" 2022-08-29 23:38:29 +00:00
Zuul
280230f194 Merge "Add configuration for heat-tempest-plugin" 2022-08-29 23:38:27 +00:00
josebb
f16ac05866 Support TLS endpoints in cinder
This allows cinder to consume TLS openstack endpoints.
Jobs consume openstack endpoints, typically identity endpoints.
And cinder itself interact with other openstack services via
endpoints.

Change-Id: Id5668f9dde1f63fe472fef639571936de831e217
2022-08-18 13:17:12 +03:00
josebb
d2be022999 Distinguish between port number of internal endpoint and binding
port number in cinder

Now binding ports of service and pod spec are configured using
internal endpoint values.
To support reverse proxy for internalUrl, need to distinguish
between binding ports and internal endpoint ports.

I added `service` section in endpoint items apart from admin,public
,internal and default.

Change-Id: I40c3fc822e8ea9ef0eca8c15afe0d12b8bc926ff
2022-08-18 11:02:24 +03:00
Zuul
026811c8a7 Merge "Fix volume list in cinder-volume deployment" 2022-08-17 17:01:54 +00:00
okozachenko
830755a3c3 Fix volume list in cinder-volume deployment
Volumes (pod-shared and cinder-conversion) should be created
regardless of ceph backend existence but those are created
conditionally.
This bug has been existing but never revealed because conditional
check for ceph backend was wrong before. After this change
https://review.opendev.org/c/openstack/openstack-helm/+/852809,
started happening.

Change-Id: Ifc90e40bc201245d3d9e2b472573948ff64e0c61
2022-08-17 17:09:16 +10:00
josebb
68822ee439 Support TLS endpoints in heat
This allows heat to consume TLS openstack endpoints.
Jobs consume openstack endpoints, typically identity endpoints.
And heat itself interact with other openstack services via
endpoints.

Change-Id: I7af6c52377db479b7f7e28ade23582dcc6f8f2f9
2022-08-17 09:44:01 +03:00
josebb
82065e3bb1 Add configuration for heat-tempest-plugin
Change-Id: I6402a18038f349225696ae0c23c30d55623766a7
2022-08-17 09:17:37 +03:00
josebb
3a91a50470 Distinguish between port number of internal endpoint and binding
port number in glance

Now binding ports of service and pod spec are configured using
internal endpoint values.
To support reverse proxy for internalUrl, need to distinguish
between binding ports and internal endpoint ports.

I added `service` section in endpoint items apart from admin,
public, internal and default.

Change-Id: I8fc8ea4e81648f3b98006491a7cb2aa9c0f479b6
2022-08-17 09:12:03 +03:00
josebb
b356cbe21f Support TLS endpoints in nova metadata-api
This allows nova metadata-api to consume TLS openstack endpoints,
typically identity endpoints.

Same idea with
https://review.opendev.org/c/openstack/openstack-helm/+/820212

Change-Id: I80e580badc96908f382fe8c6ddb2fae7caa957ed
2022-08-17 09:10:05 +03:00
Zuul
d1a7abeb0c Merge "Distinguish between port number of internal endpoint and binding port number in placement" 2022-08-16 23:07:05 +00:00
Zuul
b75c7ebf98 Merge "Distinguish between port number of internal endpoint and binding port number in nova" 2022-08-16 23:07:00 +00:00
Zuul
ed6ff4f8d0 Merge "Support SSL identity endpoint in horizon" 2022-08-16 23:06:57 +00:00
Zuul
778cf4af22 Merge "Support SSL openstack endpoints in tempest" 2022-08-16 23:04:28 +00:00
Zuul
d716814a1d Merge "Distinguish between port number of internal endpoint and binding port number in barbican" 2022-08-16 23:04:26 +00:00
Zuul
977328f10f Merge "Support TLS endpoints in glance" 2022-08-16 23:04:24 +00:00
Zuul
554cb9de12 Merge "Support TLS endpoints in keystone" 2022-08-16 22:28:29 +00:00
Zuul
8372db8a58 Merge "Support TLS endpoints in neutron" 2022-08-16 22:28:26 +00:00
Zuul
b602ae29cb Merge "Distinguish between port number of internal endpoint and binding port number in heat" 2022-08-16 22:28:24 +00:00
Zuul
08e62db1b7 Merge "Fix indentation of placement value overrides in compute-kit script" 2022-08-16 22:28:22 +00:00
Zuul
3d932a1999 Merge "Support TLS for identtiy endpoint in Rally" 2022-08-16 22:26:23 +00:00
josebb
d3dfb29e3e Support SSL openstack endpoints in tempest
Change-Id: Id396e2af5fa078395707ef4c5193d42857e63469
2022-08-13 12:17:51 +03:00
josebb
7f19de2ab7 Distinguish between port number of internal endpoint and binding
port number in placement

Now binding ports of service and pod spec are configured using
internal endpoint values.
To support reverse proxy for internalUrl, need to distinguish
between binding ports and internal endpoint ports.

I added `service` section in endpoint items apart from admin,public
,internal and default.

Change-Id: I0bfd05bd419dd55b986ab6c1f706a5fcfbe19bbe
2022-08-13 12:08:42 +03:00
josebb
51b6cf4664 Support SSL identity endpoint in horizon
Change-Id: I14c99d6966f3610425c5430d40f28d7bce7d2750
2022-08-13 12:06:22 +03:00
josebb
497f2bbfa8 Distinguish between port number of internal endpoint and binding
port number in barbican

Now binding ports of service and pod spec are configured using
internal endpoint values.
To support reverse proxy for internalUrl, need to distinguish
between binding ports and internal endpoint ports.

I added `service` section in endpoint items apart from admin,public
,internal and default.

Change-Id: I33dbc62338ef8e21fab774e3b91bc474efd6bf36
2022-08-13 12:03:26 +03:00
josebb
6882155faf Distinguish between port number of internal endpoint and binding
port number in nova

Now binding ports of service and pod spec are configured using
internal endpoint values.
To support reverse proxy for internalUrl, need to distinguish
between binding ports and internal endpoint ports.

I added `service` section in endpoint items apart from admin,public
,internal and default.

Change-Id: Id5ce67f65374382d103c8a0aec78cb43713ce4d2
2022-08-13 12:01:37 +03:00
josebb
85943e2433 Support TLS for identtiy endpoint in Rally
Change-Id: I37dddb76ef1b96fe0daf630d0d8a2c843de0a6a2
2022-08-12 21:38:05 +03:00
josebb
5e1e535dd8 Support TLS endpoints in keystone
This allows ks-bootstrap job to consume TLS endpoint.

Change-Id: I02c07878376934b27888dc643e42ebf1a4caf0ce
2022-08-12 21:34:59 +03:00
josebb
753e43072d Support TLS endpoints in neutron
This allows neutron to consume TLS openstack endpoints.
Jobs consume openstack endpoints, typically identity endpoints.
And neutron itself interact with other openstack services via
endpoints.

Change-Id: I204b8a1a5a1fb253ea4207f5f5d76d47fac41bef
2022-08-12 21:28:56 +03:00
josebb
1a2e660bc8 Support TLS endpoints in glance
This allows glance to consume TLS openstack endpoints.
Jobs consume openstack endpoints, typically identity endpoints.
And glance itself interact with other openstack services via
endpoints.

Change-Id: I35ab5d1bbaa20bfc73d0dc7af2710ca1d14b0627
2022-08-12 21:25:16 +03:00
josebb
35c23a2324 Distinguish between port number of internal endpoint and binding
port number in heat

Now binding ports of service and pod spec are configured using
internal endpoint values.
To support reverse proxy for internalUrl, need to distinguish
between binding ports and internal endpoint ports.

I added `service` section in endpoint items apart from admin,public
,internal and default.

Change-Id: If393517aeb983e0cef7f370376f2bf4d12f65f4f
2022-08-12 21:17:13 +03:00
okozachenko
93bad61c4e Fix conditional check for ceph backend
Current check uses cinder.utils.has_ceph_backend template which
returns bool-like string values("true" or "false"), and consider it
as bool type. So it is always true regardless of whether there is
ceph backend or not.

To fix this, this change uses string comparision.

Change-Id: Ie2e54c00d536874562eb93e70a2836cac102c992
2022-08-12 00:21:02 +10:00
josebb
41cf532623 Fix indentation of placement value overrides in compute-kit script
Change-Id: Icc58b4399c45400bbc9ad6553ece43c9600e351a
2022-08-11 13:17:09 +00:00
Brian Haley
ced30abead Support image registries with authentication
Based on spec
support-OCI-image-registry-with-authentication-turned-on.rst

Each Helm chart can configure an OCI image registry and
credentials to use. A Kubernetes secret is then created with this
info. Service Accounts then specify an imagePullSecret specifying
the Secret with creds for the registry. Then any pod using one
of these ServiceAccounts may pull images from an authenticated
container registry.

Related OSH-infra change:
https://review.opendev.org/c/openstack/openstack-helm-infra/+/848142

Change-Id: I54540f14fed29622bc5af8d18939afd06d65e2d8
2022-08-11 00:18:37 +00:00
Brian Haley
f22ca90d75 Revert "Remove links in openstack/charts/"
This reverts commit 24e98899d2066a72abaa08e1fb082e335311db2b.

Reason for revert: Seems to have broken lint in a subsequent
change in this repository, revert to fix gate.

Change-Id: I5d19abb172a45126438f7179f80bdb0a64bc098c
2022-08-10 10:21:48 -04:00
Brian Haley
24e98899d2 Remove links in openstack/charts/
These were added to pass the lint tests but don't seem to
be required any more.

Change-Id: I77153501ecdbf3ef25b8297b806aeaa3d96b5393
2022-08-03 17:38:23 -04:00
Gage Hugo
0af17cfa2b Disable Xena and Yoga jobs temporarily
The Xena and Yoga jobs have been unstable lately, the compute-kit
job does not run reliable in Zuul. While we diagnose and fix the
issue, this change comments out both X & Y release jobs to reduce
the number of blocked developers and wasted rechecks.

Change-Id: I53f1a9cd8c24939cf73729c5c2a8bb674403fdd6
2022-07-28 22:37:41 +00:00
Zuul
ffc9c3788d Merge "make 170-setup-gateway idempotent" 2022-07-25 15:32:53 +00:00
Zuul
f812938564 Merge "Add neutron_netns_cleanup_cron release image override" 2022-07-22 20:49:40 +00:00
Zuul
2a558fd536 Merge "Dont create openstack objects if they exist" 2022-07-22 16:53:16 +00:00
Dustin Specker
1aadb948aa make 170-setup-gateway idempotent
Before if we tried to add an address that was already added to the
br-ex device the script would error out. Now, use replace which is
idempotent.

Change-Id: I34bbb361c4fa2f347431629f79753f75b458926f
2022-07-22 11:02:11 -05:00
Zuul
c4101e3323 Merge "Use LOG.warning instead of deprecated LOG.warn" 2022-07-21 05:30:51 +00:00
Takashi Kajinami
95df1344e7 Use LOG.warning instead of deprecated LOG.warn
The LOG.warn method is deprecated[1] and the LOG.warning method should
be used instead.

[1] https://docs.python.org/3/library/logging.html#logging.warning

Change-Id: I455bb6662b3ccc36b856e923e7220e357e8ef48f
2022-07-20 17:14:30 -04:00
Robel Herarso
0933141334 Add neutron_netns_cleanup_cron release image override
This will add a value override for neutron_netns_cleanup_cron release image so that we don't use stein release images by default in the respective Openstack release jobs.

Change-Id: Ie856090ac3ed2f8c60afeacc2ed729c36b7d3372
2022-07-19 15:02:27 -07:00