A configuration management service with support for secrets.
Go to file
Felipe Monteiro 6ff443de2d Deckhand Makefile for CICD
Add Makefile to Deckhand for building charts and running lint checks
against the code base (including charts).

Modeled after Shipyard's Makefile.

Change-Id: I23a9b746369f5765cf4d75e9cb0854b9f5f65972
2017-10-30 16:21:49 -04:00
charts/deckhand Update DeckHand Chart 2017-10-24 00:47:55 +00:00
deckhand Merge "Add expected errors decorator for more resiliency" 2017-10-26 15:45:31 -04:00
doc/source Update Deckhand README and testing documentation 2017-10-26 09:52:38 -04:00
etc/deckhand DECKHAND-80: Validations API Implementation 2017-10-21 23:09:16 -04:00
releasenotes DECKHAND-80: Validations API Implementation 2017-10-21 23:09:16 -04:00
tools Deckhand Makefile for CICD 2017-10-30 16:21:49 -04:00
.coveragerc Add Deckhand coverage job 2017-08-15 16:11:35 -04:00
.gitignore Deckhand Makefile for CICD 2017-10-30 16:21:49 -04:00
.gitreview Add gitreview file 2017-08-11 01:22:26 -05:00
.testr.conf [feat] DECKHAND-28: Document pre-validation logic and API integration 2017-08-08 18:52:44 +01:00
AUTHORS DECKHAND-66: Document substitution implementation 2017-10-13 15:16:27 -04:00
Dockerfile DeckHand Dockerfile 2017-09-14 16:50:06 +00:00
entrypoint.sh DeckHand Dockerfile 2017-09-14 16:50:06 +00:00
HACKING.rst Add sphinx job for auto-generating docs 2017-09-21 16:16:23 +01:00
LICENSE Initial commit 2017-06-16 08:29:03 -07:00
Makefile Deckhand Makefile for CICD 2017-10-30 16:21:49 -04:00
README.rst Update Deckhand README and testing documentation 2017-10-26 09:52:38 -04:00
requirements.txt Integrate Deckhand with keystone auth 2017-10-16 19:54:46 +01:00
setup.cfg Integrate Deckhand with keystone auth 2017-10-16 19:54:46 +01:00
setup.py Oslo config integration (#1) 2017-06-26 16:57:50 -07:00
test-requirements.txt HTML test report for Deckhand functional tests 2017-10-25 18:18:15 -04:00
tox.ini DECKHAND-61: oslo.policy integration 2017-10-07 18:43:28 +01:00
uwsgi.ini Add health resource for ucp-integration API convention 2017-10-23 17:34:03 +01:00

Deckhand

Deckhand is a document-based configuration storage service built with auditability and validation in mind.

Core Responsibilities

  • layering - helps reduce duplication in configuration while maintaining auditability across many sites
  • substitution - provides separation between secret data and other configuration data, while allowing a simple interface for clients
  • revision history - improves auditability and enables services to provide functional validation of a well-defined collection of documents that are meant to operate together
  • validation - allows services to implement and register different kinds of validations and report errors

Getting Started

To generate a configuration file automatically:

$ tox -e genconfig

Resulting deckhand.conf.sample file is output to :path:etc/deckhand/deckhand.conf.sample

Copy the config file to a directory discoverably by oslo.conf:

$ cp etc/deckhand/deckhand.conf.sample ~/deckhand.conf

To setup an in-memory database for testing:

[database]

#
# From oslo.db
#

# The SQLAlchemy connection string to use to connect to the database.
# (string value)
connection = sqlite:///:memory:

To run locally in a development environment:

$ sudo pip install uwsgi
$ virtualenv -p python3 /var/tmp/deckhand
$ . /var/tmp/deckhand/bin/activate
$ sudo pip install .
$ sudo python setup.py install
$ uwsgi --ini uwsgi.ini

Testing

Automated Testing

To run unit tests using sqlite, execute:

$ tox -epy27
$ tox -epy35

against a py27- or py35-backed environment, respectively. To run individual unit tests, run:

$ tox -e py27 -- deckhand.tests.unit.db.test_revisions

for example.

To run unit tests using postgresql, postgresql must be installed in your environment. Then execute:

$ tox -epy27-postgresql
$ tox -epy35-postgresql

To run functional tests:

$ tox -e functional

You can also run a subset of tests via a regex:

$ tox -e functional -- gabbi.suitemaker.test_gabbi_document-crud-success-multi-bucket

Intgration Points

Deckhand has the following integration points:

Though, being a low-level service, has many other UCP services that integrate with it, including:

  • Drydock is orchestrated by Shipyard to perform bare metal node provisioning.
  • Promenade is indirectly orchestrated by Shipyard to configure and join Kubernetes nodes.
  • Armada is orchestrated by Shipyard to deploy and test Kubernetes workloads.

Further Reading

Undercloud Platform (UCP).