2757 Commits

Author SHA1 Message Date
Pete Birley
623c131292 OSH: Add emptydirs for tmp
This PS adds emptydirs backing the /tmp directory in pods, which
is required in most cases for full operation when using a read only
filesystem backing the container.

Additionally some yaml indent issues are resolved.

Change-Id: I9df8f70e913b911ff755600fa2f669d9c5dcb928
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-20 08:55:44 -05:00
Zuul
283f3a2d63 Merge "Remove remaining test pods before new test run" 2019-04-19 00:41:54 +00:00
Zuul
934b3d6c2b Merge "Neutron: Add pod/container security context" 2019-04-18 21:41:53 +00:00
Zuul
136d53d082 Merge "Change default of ironic.conductor.api_url from internal to public" 2019-04-18 21:41:52 +00:00
Zuul
c02a01bd65 Merge "Add credential delete hook to keystone chart" 2019-04-18 21:41:50 +00:00
pd2839
ed466d9caf Neutron: Add pod/container security context
removing readOnlyRootFilesystem flag since pods are running to
crashLoopBackOff state by implementing HTK functionality.

Change-Id: I221bdb54b1e94e4089fb079f161dcb4de4dd3571
2019-04-18 12:44:12 +00:00
Zuul
b8b7c0fa24 Merge "Fix configmap-etc values for tempest" 2019-04-18 06:44:59 +00:00
Zuul
3dfb927c2b Merge "Add an option to the health probe to test all pids" 2019-04-18 06:17:03 +00:00
Zuul
21668ddddf Merge "Add logging.conf to tempest" 2019-04-18 06:15:09 +00:00
Gage Hugo
3d6f3088a3 Add credential delete hook to keystone chart
This change creates a pre-delete hook to clean out all entries
in the credential table of the keystone database when the
keystone service is deleted. Note that these are not
the typical username/password.[0]

This fixes the issue of leftover credential blobs being saved
in the database that are unable to be decrypted since the
original encryption keys are removed upon deletion of the
keystone service

[0] https://specs.openstack.org/openstack/keystone-specs/specs/keystone/newton/credential-encryption.html

Change-Id: I8adf0878af2f3b880e9194a6cb8d97b58d6895a5
2019-04-17 20:10:48 +00:00
Zuul
db87cf6390 Merge "Add internal tenant id in conf" 2019-04-17 05:59:23 +00:00
Zuul
9928f5c819 Merge "Allow more generic overrides for nova placement-api" 2019-04-17 05:48:43 +00:00
jlego229-kim
65bd9a7a04 Change default of ironic.conductor.api_url from internal to public
Currently a pxe-client has to contact with ironic-api through
it's internal endpoint during lookup() period.

However, the pxe-client cannot access kube-dns by ifself,
so it needs additional dns server. (or Using NodePort)

With additional dns server, it will be safer for pxe-client
to contact with ironic-api through it's public endpoint(passing by ingress)
rather than internal endpoint directly becuase internal pod's IPs would be changed frequently.

Also, I refered to {Values.conf.ironic.glance.swift_endpoint_url}.
(swift is also accessed by the pxe-client and swift_url's default is public endpoint)

Change-Id: I0ad97f3ed608973d7e5a4a11d87595fe258a0db5
2019-04-17 13:08:32 +09:00
Zuul
f65c21de1e Merge "point to openstackhelm tempest image" 2019-04-17 00:17:03 +00:00
Liang Fang
d1c8e778a7 Add internal tenant id in conf
Cinder raw cache feature requires internal tenant id be set in
/etc/cinder/cinder.conf, something like:

cinder_internal_tenant_project_id = b7455b8974bb4064ad247c8f375eae6c
cinder_internal_tenant_user_id = f46924c112a14c80ab0a24a613d95eef

This patch get or create if not exist intenal user id and project id, and then
set in cinder.conf

reference: Cinder cache feature:
https://docs.openstack.org/cinder/latest/admin/blockstorage-image-volume-cache.html

Story: 2004869
Task: 29121
Change-Id: I07954d2efa905a56ca8482d0ec147534c97d01ea
Signed-off-by: Liang Fang <liang.a.fang@intel.com>
2019-04-16 16:09:31 +00:00
Itxaka
10289c5566
Add logging.conf to tempest
Add a configurable logging.conf to the tempest chart.
Sets the default level to WARN as it currently its on INFO and
that results into the log being full of rest_client calls, which
makes it difficult to read the log and the actual tests running

Change-Id: I9deb016a4feee482c01e79a4209c001968b8ea12
2019-04-16 12:11:01 +02:00
Zuul
9318e0a057 Merge "Add heat to compute kit and apparmor jobs" 2019-04-15 20:28:56 +00:00
Itxaka
1c8cbe6be8
point to openstackhelm tempest image
we are pointing to a non-existant tempest image from kolla

point to our published image instead

Change-Id: Ia9acfdc90c2bed47c944bcc1420a2e9920b40a54
2019-04-15 17:34:13 +02:00
Itxaka
55f70be381 Add heat dashboard if available to horizon
Currently there is no enabling of the heat dashboard if its
installed on the horizon image.

This patch add an extra conf var that allows several dashboards
to be added and will try to find and enable them on start

If the panel dirs dont exists, it will do nothing

This patch add the extra heat_dashboard and includes the existing
neutron_taas_dashboard into the new config

Change-Id: Ibcc4da166d907f3cb842bfc45d842a650361a2d8
2019-04-15 07:13:18 +00:00
Zuul
a187084bdd Merge "Heat: Make it optional to use log_config_append option" 2019-04-14 18:34:46 +00:00
Zuul
f87025e2b8 Merge "Allow more generic overrides for ceilometer-api" 2019-04-13 14:25:12 +00:00
Zuul
603f8edb8b Merge "Enable audit pipeline for glance" 2019-04-13 14:25:10 +00:00
Zuul
a7d2654839 Merge "Enable audit pipeline for panko" 2019-04-13 14:16:16 +00:00
Zuul
55b0f8aa0f Merge "Enable audit pipeline for nova" 2019-04-13 01:33:47 +00:00
Zuul
7eaba77a83 Merge "Enable audit pipeline for heat" 2019-04-13 01:33:45 +00:00
Zuul
df6fe82407 Merge "Enable audit pipeline for neutron" 2019-04-13 01:28:36 +00:00
Zuul
4650530c4e Merge "Enable audit pipeline for cinder" 2019-04-13 01:28:04 +00:00
Pete Birley
3f83d6978c Heat: Make it optional to use log_config_append option
This PS enables the use of simple logging options if desired.

Change-Id: I0278cefeaa46a39a893ba1fdc9f4c4b633a8866b
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-12 15:37:36 -05:00
Zuul
ab5e0a82e2 Merge "Enable audit pipeline for ceilometer" 2019-04-12 19:52:10 +00:00
Itxaka
6d7a909447 Allow more generic overrides for nova placement-api
With this patch we allow for a more easy way of overriding some of
the values that may be used in other distros while maintainting the
default values if those values are not overriden

The following values are introduced to be overriden:

conf:
  security:
  software:
    apache2:
      conf_dir:
      site_dir:
      mods_dir
      binary:
      extra_flags:
      a2enmod:
      a2dismod:

On which:
 * conf_dir: directory where to drop the config files for apache vhosts
 * site_dir: directory where to drop the enabled virtualhosts
 * mods_dir: directory where to drop any mod configuration
 * binary: the binary to use for launching apache
 * extra_flags: any flags that will be passed to the apache binary call
 * a2enmod: mods to enable
 * a2dismod: mods to disable
 * security: security configuration for apache

Notice that if there is no overrides given, it should not affect anything
and the templates will not be changed as the default values are set
to what they used to be

Change-Id: I4fcfde78c5c8fa65956aeae55108ffa1f10e6972
2019-04-12 14:03:36 +02:00
Itxaka
229db2f155 Allow more generic overrides for keystone
With this patch we allow for a more easy way of overriding some
of the values that may be used in other distros while maintainting
the default values if those values are not overriden.

The following values are introduced to be overriden:
conf:
  security:
  software:
    apache2:
      conf_dir:
      site_dir:
      mods_dir:
      binary:
      start_flags:
      a2enmod:
      a2dismod:

On which:
 * conf_dir: directory where to drop the config files
 * site_dir: directory where to drop the enabled virtualhosts
 * mods_dir: directory where to drop any mod configuration
 * binary: the binary to use for launching apache
 * start_flags: any flags that will be passed to the apache binary call
 * a2enmod: mods to enable
 * a2dismod: mods to disable
 * security: security configuration for apache

Notice that if there is no overrides given, it should not affect anything
and the templates will not be changed as the default values are set to what
they used to be as to not disrupt existing deployments.

Change-Id: I7622325cf23e5afb26a5f5e887458fd58af2fab8
2019-04-12 04:16:48 +00:00
Zuul
3d681fe7bb Merge "Fix volumemounts indent issue" 2019-04-12 00:14:27 +00:00
Zuul
2aae584b7d Merge "Add log level variable to Horizon log configuration" 2019-04-11 21:38:57 +00:00
Steve Wilkerson
0e1dec39d1 Add heat to compute kit and apparmor jobs
This adds the deployment of heat to the compute kit and apparmor
job in order to provide a simple mechanism for booting vms to
validate a functional cloud deployment

Change-Id: I1a0b0fd4fd708a045e82781cfe3990e23d2af581
2019-04-11 20:46:10 +00:00
Gage Hugo
ced3780967 Enable audit pipeline for panko
This change adds the keystonemiddleware audit paste filter[0]
and enables it for the panko-api service.
This provides the ability to audit API requests for panko.

[0] https://docs.openstack.org/keystonemiddleware/latest/audit.html

Change-Id: I5c0e3c61317483d36fcb05ebff8b377941675c27
2019-04-11 14:59:01 -05:00
Gage Hugo
2f46c057a4 Enable audit pipeline for cinder
This change adds the keystonemiddleware audit paste filter[0]
and enables it for the cinder-api and cinder-scheduler services.
This provides the ability to audit API requests for cinder.

[0] https://docs.openstack.org/keystonemiddleware/latest/audit.html

Change-Id: If81b88a4003bc4394ef4a378626cf5d6edb9c4ae
2019-04-11 18:57:18 +00:00
Gage Hugo
4fea33dd64 Enable audit pipeline for ceilometer
This change adds the keystonemiddleware audit paste filter[0]
and enables it for the ceilometer-api service. This provides
the ability to audit API requests for ceilometer.

[0] https://docs.openstack.org/keystonemiddleware/latest/audit.html

Change-Id: I9d49769bc04f9623ecf5ba4276665dc3b5bebd07
2019-04-11 13:50:29 -05:00
Gage Hugo
9049ac752a Enable audit pipeline for nova
This change adds the keystonemiddleware audit paste filter[0]
and enables it for the nova-api services.

This provides the ability to audit API requests for nova.

[0] https://docs.openstack.org/keystonemiddleware/latest/audit.html

Change-Id: Ic6df044d83f4dee581c9cc0405f61d926e45bcab
2019-04-11 13:29:33 -05:00
Gage Hugo
6398d97d5a Enable audit pipeline for neutron
This change adds the keystonemiddleware audit paste filter[0]
and enables it for the neutron-server service.
This provides the ability to audit API requests for neutron.

[0] https://docs.openstack.org/keystonemiddleware/latest/audit.html

Change-Id: I86b4df1436ae59bc9a151c28337af7c06c83e45f
2019-04-11 13:06:50 -05:00
Gage Hugo
9c13e80492 Enable audit pipeline for heat
This change adds the keystonemiddleware audit paste filter[0]
and enables it for the heat-api, heat-cfn, and heat-cloudwatch
services. This provides the ability to audit API requests
for heat.

[0] https://docs.openstack.org/keystonemiddleware/latest/audit.html

Change-Id: Ib5a7dfd882416553ff6f43aa009e3e67871d7f4c
2019-04-11 12:38:06 -05:00
Huang,Sophie
f92bfd7f6a Add log level variable to Horizon log configuration
log_level variable is added to Horizon configuration. This
will enable the overwriting of the log levels in a
customized manifest.

Change-Id: I15381add9ee1e880e73004131b329ac02972755b
Signed-off-by: Huang,Sophie <sh879n@att.com>
2019-04-11 10:56:32 -05:00
Zuul
d544a556db Merge "Add nonvoting apparmor check job to openstack-helm" 2019-04-11 15:39:29 +00:00
Gage Hugo
4e4a4c389c Enable audit pipeline for glance
This change adds the keystonemiddleware audit paste filter[0]
and enables it for the glance-api and glance-registry services.
This provides the ability to audit API requests for glance.

[0] https://docs.openstack.org/keystonemiddleware/latest/audit.html

Change-Id: I3b42717dbc11257c21b27e7c68dedc3283e1bd34
2019-04-11 10:38:33 -05:00
Itxaka
98c34b5b41
Allow more generic overrides for ceilometer-api
With this patch we allow for a more easy way of overriding some
of the values that may be used in other distros while maintainting
the default values if those values are not overriden.

The following values are introduced to be overriden:
conf:
  security:
  software:
    apache2:
      conf_dir:
      site_dir:
      mods_dir:
      binary:
      start_flags:
      a2enmod:
      a2dismod:

On which:
 * conf_dir: directory where to drop the config files
 * site_dir: directory where to drop the enabled virtualhosts
 * mods_dir: directory where to drop any mod configuration
 * binary: the binary to use for launching apache
 * start_flags: any flags that will be passed to the apache binary call
 * a2enmod: mods to enable
 * a2dismod: mods to disable
 * security: security configuration for apache

Notice that if there is no overrides given, it should not affect anything
and the templates will not be changed as the default values are set to what
they used to be as to not disrupt existing deployments.

Change-Id: Ibb7e3bec0f6561bccc6a1aea907a2f3e4e1bfb73
2019-04-10 12:23:58 +02:00
Itxaka
715f4bcfff
Fix volumemounts indent issue
Using {{- if for the volume mounts caused them to be added inline with
the previous line.

Removing the - from the if expression makes them be properly aligned on
the next line

Change-Id: Ia5e28366fb1f2ae7420b7f5217c10cbb94bc48ab
2019-04-10 11:56:26 +02:00
Zuul
94ac3569f5 Merge "Fix ssh config in nova to support cold migrations" 2019-04-09 23:44:34 +00:00
Zuul
27f667066f Merge "Add Aodh Chart" 2019-04-09 23:01:52 +00:00
Gerry Kopec
5a7c6581ad Fix ssh config in nova to support cold migrations
- Fix .ssh/config file mapping
- Move private key from nova-compute-ssh container to nova-compute
  container.
- Map private and public keys to configmap-ssh which will default to
  the appropriate file permissions.
- Add additional config to /etc/ssh/sshd_config to allow passwordless
  root logins over appropriate subnet passed in from overrides.
- Remove chmods from sshd bash script as they are failing.

Depends on helm-toolkit supporting multiple containers per daemonset
pod.

Story: 2003463
Task: 24723
Change-Id: Idd2e802c293f1e14991ee787ade9a4936fb373ff
Signed-off-by: Gerry Kopec <Gerry.Kopec@windriver.com>
2019-04-09 22:24:46 +00:00
Zuul
72829f71fa Merge "Add network policy ingress rule to mariadb" 2019-04-08 17:37:26 +00:00
Itxaka
96aa69d131
Fix configmap-etc values for tempest
we are using the None value for some of the values that should be filled
by the configmap-etc template but as that template checks for empty values
and None is not counted, we are filling the tempest.conf with the wrong
values for auth and others

Instead use the null value for those so they get properly filled by the
template system into the appropiate values

Change-Id: I30528b1944722e9ce2e227b1b4dacae7635167ec
2019-04-08 18:01:31 +02:00