James Gibson
2b8d5a0b88
Enable TLS for VNC from novncproxy to compute hosts
To secure communications from the proxy server to the compute nodes using VeNCrypt authentication scheme. In a previous patch a TLS server certificate was deployed to compute nodes, this patch makes use of this same server cert for securing VNC sessions on compute nodes. It is recommended that this certificate be issued by a dedicated certificate authority solely for the VNC service, as libvirt does not currently have a mechanism to restrict what certificates can be presented by the proxy server. This has not been implemented to reduce complexity. In addition the noVNC proxy needs to present a client certificate so only approved VNC proxy servers can connect to the Compute nodes. The PKI role has been used to create a client certificate for the nova console nodes. Related Nova docs: https://docs.openstack.org/nova/latest/admin/remote-console-access.html To help with the transition from from unencrypted VNC to VeNCrypt, initially compute nodes auth scheme allows for both encrypted and unencrypted sessions using the variable `nova_vencrypt_auth_scheme`, this will be removed in future releases. Change-Id: Iafb788f80fd401c6ce6e4576bafd06c92431bd65
Team and repository tags
OpenStack-Ansible nova
Ansible role that installs and configures OpenStack nova and all of its corresponding services.
- This role will install the following:
-
- nova-api
- nova-conductor
- nova-scheduler
- nova-console
- nova-compute
Documentation for the project can be found at: https://docs.openstack.org/openstack-ansible-os_nova/latest/
Release notes for the project can be found at: https://docs.openstack.org/releasenotes/openstack-ansible-os_nova/
The project source code repository is located at: https://opendev.org/openstack/openstack-ansible-os_nova/
The project home is at: https://launchpad.net/openstack-ansible
The project bug tracker is located at: https://bugs.launchpad.net/openstack-ansible
Description
Languages
Jinja
58.9%
Python
27.9%
Shell
13.2%