114 Commits

Author SHA1 Message Date
Thiago Brito
8ab6013409 Changing all policies to yaml format
In the Victoria cycle oslo.policy decided to change all default policies
to yaml format. Today on openstack-helm we have a mix of json and yaml
on projects and, after having a bad time debugging policies that should
have beeing mounted somewhere but was being mounted elsewhere, I'm
proposing this change so we can unify the delivery method for all
policies across components on yaml (that is supported for quite some
time). This will also avoid having problems in the future as the
services move from json to yaml.

[1] https://specs.openstack.org/openstack/oslo-specs/specs/victoria/policy-json-to-yaml.html

Signed-off-by: Thiago Brito <thiago.brito@windriver.com>
Change-Id: Id170bf184e44fd77cd53929d474582022a5b6d4f
2021-05-26 18:15:41 -03:00
Tin
dd55414d05 fix(pep8): makes python script pep8 compliant
Fixes horizon python script so it is pep8 compliant.

Change-Id: I704d3e83b0ee62173207559379e22d04aa96fcbf
Signed-off-by: Tin <tin@irrational.io>
2021-05-24 07:33:11 +00:00
okozachenko
49559f1a6d To avoid wrong version check for mysqlclient
- Seems horizon reqests mysqlclient binary version against the pymysql
- Plus, wsgi.py needs executable permission

Change-Id: Ibd5e6246804761085c9f43955cab2bff335c4245
2020-12-03 20:34:12 +02:00
Tin Lam
7956310ead fix(horizon and neutron): adds tls to test pod
This patch set puts in the missing certificates to the test-pod.
It also corrects the path of sriov_agent.ini file

Change-Id: Ice2124f92a36d545726243fff60db25fbb2ea9c0
2020-08-04 20:56:26 +00:00
Zuul
1fd839139d Merge "Add missing security context to Horizon test pods/containers" 2020-07-16 18:53:46 +00:00
DODDA, PRATEEK REDDY (pd2839)
e61f88465a Add missing security context to Horizon test pods/containers
This updates the horizon chart to include the pod
security context on the pod template.

This also adds the container security context to set
readOnlyRootFilesystem flag to true

Change-Id: I2ccd920fa26aca2955afef8b71d56e55d1ae26e8
2020-07-15 22:26:41 +00:00
sgupta
702c17eb78 feat(tls): Make openstack services compatible with mariadb with TLS
Depends-on: https://review.opendev.org/#/c/741037/
Change-Id: I21f4ede3bd18c0af8da1eba60cd0b7b932a31410
2020-07-14 23:32:03 +00:00
Zuul
8a5b087c13 Merge "Add horizon internationalization for extra panels" 2020-07-13 15:30:25 +00:00
Tin Lam
918a307427 feat(tls): add tls support to openstack services
This patch set enables TLS for the following OpenStack services: keystone,
horizon, glance, cinder, heat, nova, placement and neutron for s- (stein)
and t- (train) release. This serves as a consolidation and clean up patch
for the following patches:

[0] https://review.opendev.org/#/c/733291
[1] https://review.opendev.org/#/c/735202
[2] https://review.opendev.org/#/c/733962
[3] https://review.opendev.org/#/c/733404
[4] https://review.opendev.org/#/c/734896

This also addresses comments mentioned in previous patches.

Co-authored-by: Gage Hugo <gagehugo@gmail.com>
Co-authored-by: sgupta <sg774j@att.com>

Depends-on: https://review.opendev.org/#/c/737194/

Change-Id: Id34ace54298660b4b151522916e929a29f5731be
Signed-off-by: Tin Lam <tin@irrational.io>
2020-07-10 09:36:31 -05:00
limin0801
80994a360c Add horizon internationalization for extra panels
When introduces extra panels in horizon, eg. ironic-ui, it could
not achieve internationalization. This commit hope to achieve
internationalization.

Related bug: #1886396

Change-Id: Ic4b89d14ee27bb6c70e792193cbf23de1ae553a4
2020-07-08 14:33:38 +08:00
diwakar thyagaraj
477602f2e7 Enable Apparmor to osh test Pods
Change-Id: I0a67f66cc4ed8a1e3a5c3c458b7c1521f9169160
Signed-off-by: diwakar thyagaraj <diwakar.chitoor.thyagaraj@att.com>
2020-06-01 18:32:51 +00:00
Gage Hugo
db79e79788 Remove OSH Authors copyright
The current copyright refers to a non-existent group
"openstack helm authors" with often out-of-date references that
are confusing when adding a new file to the repo.

This change removes all references to this copyright by the
non-existent group and any blank lines underneath.

Change-Id: Ia035037e000f1bf95202fc07b8cd1ad0fc019094
2020-04-03 20:53:32 +00:00
dt241s@att.com
0c32a86733 Enable Apparmor to Horizon Components
Change-Id: I7b28eb5e7f571b050ee3ac5eeb2b6868f0d44f58
2020-02-27 18:33:13 +00:00
Prateek Dodda
c2bd947787 Adding missing readOnlyRootFilesystem flag for container security context
Change-Id: Id11292ec0a76dbf659e918833859b9109c07cc18
2019-11-26 20:33:02 +00:00
Steven Fitzpatrick
5c6811503f Update Horizon Helm test to use python3
This change updates the tests container image
to one which installs python3.

The selenium-test.py template file has been refactored
to match the structure of the selenium tests in
openstack-helm-infra/tools/gate/selenium

Change-Id: I568bea8d715ea28b8e750215d166ba1b04e4172d
2019-10-21 12:53:09 -05:00
Gupta, Sangeet (sg774j)
4f5a78351d Horizon: Expose additional security config params
Expose additional Horizon security params in accordance with the
OpenStack Security Guide [0]

- ALLOWED_HOSTS
- HORIZON_IMAGES_UPLOAD_MODE

[0] https://docs.openstack.org/security-guide/dashboard/domains-dashboard-upgrades-basic-web-server-configuration.html

Depends-On: https://review.opendev.org/#/c/635545

Change-Id: I071c8fbfc5ea9b41d3c35840e342d83349ae1613
2019-07-18 10:15:56 -05:00
Oleh Hryhorov
dfa4a53db9 Create ${APACHE_RUN_DIR} if libapache2-mod-wsgi-py3 module is installed
The aim of the patch is to creating directory from ${APACHE_RUN_DIR}
variable for:

* aodh
* ceilometer
* horizon
* panko

If an image is built with python3 therefore libapache2-mod-wsgi-py3 module
has to be installed accordingly but the module doesn't create /var/run/apache2
directory which is APACHE_RUN_DIR in apache configuration file so apache can't
start without it due to the fact that the directory is used to make there pid,
run, etc files.

Change-Id: Id511a07fca3eec9b5e80f2f9413628ab4d42d61b
2019-06-26 16:04:03 +03:00
Steve Wilkerson
0e1c296101 Horizon helm tests
This adds a helm test for Horizon, the helm test
runs a selenium webdriver check to verify the dashboard
is up

Change-Id: I3616c05596b2bd94931c39fb774333bf65453d52
Signed-off-by: Steve Wilkerson <sw5822@att.com>
2019-06-05 12:41:21 -05:00
clare cheng
5f9e2a1f66 Adding allowPrivilegeEscalation flag in horizon chart
Change-Id: Iff205444eb4c842a0f85d5999d063256106dbe75
2019-04-24 14:18:35 +08:00
Pete Birley
623c131292 OSH: Add emptydirs for tmp
This PS adds emptydirs backing the /tmp directory in pods, which
is required in most cases for full operation when using a read only
filesystem backing the container.

Additionally some yaml indent issues are resolved.

Change-Id: I9df8f70e913b911ff755600fa2f669d9c5dcb928
Signed-off-by: Pete Birley <pete@port.direct>
2019-04-20 08:55:44 -05:00
Itxaka
55f70be381 Add heat dashboard if available to horizon
Currently there is no enabling of the heat dashboard if its
installed on the horizon image.

This patch add an extra conf var that allows several dashboards
to be added and will try to find and enable them on start

If the panel dirs dont exists, it will do nothing

This patch add the extra heat_dashboard and includes the existing
neutron_taas_dashboard into the new config

Change-Id: Ibcc4da166d907f3cb842bfc45d842a650361a2d8
2019-04-15 07:13:18 +00:00
Itxaka
38fb90d528
Allow more generic overrides for horizon
With this patch we allow for a more easy way of overriding some
of the values that may be used in other distros while maintainting
the default values if those values are not overriden.

The following values are introduced to be overriden:
conf:
  software:
    apache2:
      conf_dir:
      site_dir:
      mods_dir:
      binary:
      start_flags:
      a2enmod:
      a2dismod:

On which:
 * conf_dir: directory where to drop the config files
 * site_dir: directory where to drop the enabled virtualhosts
 * mods_dir: directory where to drop any mod configuration
 * binary: the binary to use for launching apache
 * start_flags: any flags that will be passed to the apache binary call
 * a2enmod: mods to enable
 * a2dismod: mods to disable

Notice that if there is no overrides given, it should not affect anything
and the templates will not be changed as the default values are set to what
they used to be as to not disrupt existing deployments.

Change-Id: If0fb9ab03aacfcd7087e753698880505571d0233
2019-04-02 12:29:35 +02:00
Itxaka
23697867d7 Move adding extra dashboard to the proper place
Adding any dashboards shouldbe done before compiling and compressing
as they can enable additional files that need to be compiled and
compressed, so firs we should enabled them if needed and then
compile+compress

Change-Id: Ib2fb44f5829269aa974d467ea57d9add2b9e0141
2019-03-23 21:48:13 +00:00
pd2839
b5063695b0 Implement Security Context for Horizon
Implement container security context for the following Horizon resources:
 - Horizon server deployment

Change-Id: I8202cd011f4c4f73d778c5f0ad2648440e259e5d
2019-03-22 21:33:08 +00:00
pd2839
2fefd6c56a readOnlyFilesystem: true for horizon chart
Fix for adding readOnlyFilesystem flag at pod level

Change-Id: I9ec373816987a4c91cb4aeab5ab0b2433215f136
2019-03-05 22:17:57 +00:00
Steve Wilkerson
f4c01d2461 Add release-uuid annotation to pod spec
This adds the release-uuid annotation to the pod spec for all
replication controller templates in the openstack-helm charts

Change-Id: I0159f2741c27277fd173208e7169ff657bb33e57
2019-02-12 12:31:59 -06:00
Dmitrii Kabanov
1173ef79a1 [Horizon] Hide OS and Apache version in error messages
This PS allows to customize (and disable) information about OS and
Apache version displayed on pages with error messages.

Change-Id: Ic4d19bcc90dadf5cf26faa5c8fb39de00a6f3212
2019-01-21 00:41:49 +00:00
Dmitrii Kabanov
6de134f600 [Horizon] Disable server-status page
This PS disables the server status page of Apache.
On the page provided information which can aid the
malicious user in finding vulnerabilities in the system.

Change-Id: I11104b10359808dc78a214ebb531d710ec353f60
2019-01-18 21:13:04 +00:00
Tin Lam
a60cdbf310 Enable runAsUser in pod level
This patchset enables and moves the securityContext: runAsUser to the pod
level, and uses a non-root user (UID != 0) wherever applicable.

Depends-On: I95264c933b51e2a8e38f63faa1e239bb3c1ebfda
Change-Id: I81f6e11fe31ab7333a3805399b2e5326ec1e06a7
Signed-off-by: Tin Lam <tin@irrational.io>
2018-12-25 05:33:54 +00:00
Huang,Sophie(sh879n)
3061ae3896 Implemented livenessProbe for different OpenStack api containers
LivenessProbe is added to the below deployments:
  glance-api
  glance-registry
  heat-api
  heat-cfn
  horizon
  keystone-api
  nova-api-metadata
  nova-api-osapi
  nova-placement-api

Change-Id: I76b8cafa437855eeb42b77e88da6e3c514a3ac90
Signed-off-by: Huang,Sophie(sh879n) <sh879n@att.com>
2018-12-14 09:52:50 -06:00
Tang, Roy (rt7380)
dcf530a6de Add TaaS panel to Horizon dashboard
This will enable the TaaS GUI to the horizon dashbboard.
TaaS dashboard will need to be installed as part of the image,
else it will not try to add the panel.

Change-Id: I226d9d6e46f5b556a7baa88fcd06de8e571bcdff
2018-11-19 19:58:51 +00:00
Tin Lam
29f32a07ac Enable network policy enforcement
This patch set updates the gate to by default uses network policy
for all components and enforces them in Openstack-helm.

Change-Id: I70c90b5808075797f02670f21481a4f968205325
Depends-On: I78e87ef3276e948ae4dd2eb462b4b8012251c8c8
Co-Authored-By: Mike Pham <tp6510@att.com>
Signed-off-by: Tin Lam <tin@irrational.io>
2018-10-23 14:58:13 +00:00
Dmitrii Kabanov
b8eb8b3581 Horizon: HTTP Verb Tampering vulnerability fix
The patch fixes the HTTP verb tampering issue. The idea is to disable
unnecessary HTTP methods for the Horizon. You can find a link to
the description [0] and a link to the White Paper [1] below:

CAPEC-274: HTTP Verb Tampering
[0] https://capec.mitre.org/data/definitions/274.html

Bypassing Web Authentication and Authorization with HTTP Verb Tampering
(Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf)
[1] https://dl.packetstormsecurity.net/papers/web/Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf

Change-Id: I98169973410bc1dce779ac1e870256b9a45d2cc8
2018-09-28 12:12:41 -07:00
Pete Birley
3ae745a10e Add release uuid to pods and rc objects
This PS adds the ability to attach a release uuid to pods and rc
objects as desired. A follow up ps will add the ability to add arbitary
annotations to the same objects.

Depends-On: Iceedba457a03387f6fc44eb763a00fd57f9d84a5
Change-Id: I324680f10263c1aefca2be9056e70d0ff22fcaf0
Signed-off-by: Pete Birley <pete@port.direct>
2018-09-13 06:29:14 -05:00
Jean-Philippe Evrard
05d0e2b4b8 Revert "Update OSH Author copyrights to OSF"
This reverts commit b1755c399341388627a668ab9fd6f43b7416f65a.

Change-Id: I215a172f2ff4220340292b95f5323847944baeb7
2018-08-28 17:25:13 +00:00
Matt McEuen
b1755c3993 Update OSH Author copyrights to OSF
This PS updates the "Openstack-Helm Authors" copyright attribution
to be the "OpenStack Foundation", as decided in the 2018-03-20
team meeting:
http://eavesdrop.openstack.org/meetings/openstack_helm/2018/openstack_helm.2018-03-20-15.00.log.html

No other copyright attributions were changed.

Change-Id: I167ceedab8fadee28c19514fad6f125d0a521caf
2018-08-26 17:17:41 -05:00
Pete Birley
83b91e6e1b Openstack: Use k8s secret to store config
This PS moves openstack components in OSH to use secrets to store
potentially sensitive config information.

Depends-On: https://review.openstack.org/#/c/593732

Change-Id: I9bab586c03597effea0e48a58c69efff3f980a92
Signed-off-by: Pete Birley <pete@port.direct>
2018-08-22 20:39:52 -05:00
Pete Birley
e19be77f08 Ingress: Add initial TLS Support for core service public endpoints
This PS adds support for TLS on over-ridden fqdn's for public
endpoints for core OpenStack Services. Currently this implementation
is limited, in that it does not provide support for dynamicly loading
CAs into the containers, or specifying them manually via configuration.
As a result only well known or CA's added manually to containers will
be recognised.

Change-Id: I8f1b699af29cbed2d83ad91bb6840dccce8c5146
Depends-On: I535f38a8d92c01280d79926a1f0acd06984aabbf
Signed-off-by: Tin Lam <tin@irrational.io>
Signed-off-by: Pete Birley <pete@port.direct>
2018-06-26 07:15:24 +00:00
Pete Birley
67aed694c4 Deployments: Use current kubernetes deployment version
This PS moves to use the current ga version for kubernetes deployments.

Story: 2002205
Task: 21735
Depends-On: Icb4e7aa2392da6867427a58926be2da6f424bd56

Change-Id: I062a8a29dff70427ee9bcf09f595011b3611b0b1
Signed-off-by: Pete Birley <pete@port.direct>
2018-06-13 21:29:59 -05:00
Pete Birley
460675bf7f Add image management function to manifests
When removing helm-toolkit from OSH and swithcing to use the
toolkit from OSH-Infra, the image declaration function was missed.

Depends-On: I2f2012590d81ffcb159d49d8a76eedd4441744cd
Change-Id: I0f1118bb748f3fe1b6bb73acfc00e77c5cca9c7d
Signed-off-by: Pete Birley <pete@port.direct>
2018-05-20 10:10:16 -05:00
Pete Birley
7e27910228 Horizon: Add support for performing message compilation
This PS adds support for message compilation, if the image supports
it.

Change-Id: Ie15a1a437ff516af697a5bb65c5c7831de872c30
Signed-off-by: Pete Birley <pete@port.direct>
2018-05-15 18:04:53 +00:00
Steve Wilkerson
354b311ec5 Add local-registry image managment to OSH from OSH-Infra
This PS adds the local registry image managment to OSH from OSH-Infra.
With this the delta between helm-toolkits in the Repo's is removed,
allowing the toolkit from OSH-Infra to be used and the one from OSH
to be depreciated.

Change-Id: If5e218cf7df17261fe5ef249d281f9d9637e2f6a
Co-Authored-By: Pete Birley <pete@port.direct>
2018-05-12 14:35:48 +00:00
portdirect
ff9f84d900 Horizon: Move all config to be directly values driven.
This PS moves all the config files to be directly values driven,
both simplifying over-ride and allowing configs to be targeted
to pods in future work.

Change-Id: I7e16585c9ef49275327d19a48f00bad192dc4923
2018-03-28 13:21:02 -04:00
Pete Birley
c7a89be23b Horizon enable v3 keystone support.
This PS enables v3 kesytone support in horizon.

Change-Id: If176617d37efc19925c2dc5a65d992086442fd70
2018-03-20 17:01:20 -05:00
Zuul
32a468178b Merge "Ingress controller service: consolidate to helm-toolkit" 2018-03-14 02:14:22 +00:00
Pete Birley
507600e898 Ingress controller service: consolidate to helm-toolkit
This PS consolidates the Ingress controller service, that is used
to resolve internal requests to public endpoints correctly, to
helm-toolkit.

Change-Id: If7c7deca1b8289a32709f7dc7c936883469aadfe
2018-03-12 13:48:39 +00:00
Pete Birley
6e4bcebcf5 DB-Drop-Jobs: consolidate to helm-toolkit
This PS consolidates the DB-Drop Job to helm-toolkit.

Change-Id: Ia2b035d730bf612086a9fd9b5d14aba494f56dc7
2018-03-09 14:25:15 +00:00
portdirect
3ee532e0ce Horizon: use endpoints section and lookups to set port
This PS moves horizon to use the endpoints section and lookups to
set the port it serves on.

Change-Id: Id413f05c3ab49d592d030916d7cffcdf256519fd
2018-03-04 17:42:14 -05:00
Marcus
b129837eaa Allows the configuration of SSO choices for horizon
This change allows enabling the WEBSSO login screen on horizon,
which allows to choose from one or more configured SSO providers.

Example configuration

 local_settings:
  auth:
    sso:
      enable: true
      initial_choice: "acme_oidc"
    idp_mapping:
      - name: "acme_oidc"
        label: "Acme Corporation - OpenID Connect"
        idp: "myidp1"
        protocol: "oidc"
      - name: "acme_saml2"
        label: "Acme Corporation - SAML2"
        idp: "myidp2"
        protocol: "saml2"

The initial_choice defaults to "credentials" which is the default
Keystone Credential authentication.

The values for idp: and protocol: will be used to construct the redirect
URL for keystone, which will look like:

 /v3/OS-FEDERATION/identity_providers/<idp>/protocols/<protocol>/auth

Change-Id: I44e11880292176114753274f965bcd0c2cd01302
2018-02-28 00:29:59 +01:00
Pete Birley
f57972b5b6 dependencies: move static dependencies under a 'static' key
This PS moves static dependencies under a 'static' key to allow
expansion to cover dynamic dependencies.

Change-Id: I38990b93aa79fa1f70af6f2c78e5e5c61c63f32c
2018-02-23 12:31:15 -08:00