caa9733788468886c6ac50cd2fde00a4f8a58321
This patch adds the option to provide an SSL certificate for the
Keystone service (either self-signed or user provided) and to
configure the endpoints and Keystone service appropriately.
* A new boolean variable called 'keystone_ssl' enables/disables
the configuration of SSL for the Keystone service.
* The server key/certificate (and optionally a CA cert) are
distributed to all keystone containers and used for the setup
of SSL endpoints if the appropriate protocol is set.
* The internal/public and the admin endpoints can be set to be
served via http or https seperately via the
'keystone_service_*_proto' variables.
* The logic to determine the appropriate load balancing
configuration based on the Keystone endpoint protocol has
been implemented in the haproxy vars.
* Two new variables have been implemented for a user-provided
server key and certificate:
- keystone_user_ssl_cert: <path to cert on deployment host>
- keystone_user_ssl_key: <path to cert on deployment host>
If either of these is not defined, but a Keystone endpoint
has been configured for SSL, then the missing cert/key
will be self generated on the first Keystone container and
distributed to the other containers.
* A new variable has been implemented for a user-provided CA
certificate:
- keystone_user_ssl_ca_cert: <path to cert on deployment host>
* A new variable called 'keystone_ssl_self_signed_subject' has
been implemented to allow the user to override the certificate
properties, such as the CN and subjectAltName.
Upgrade notes:
* The SSL-based client authentication configuration in Apache
has been removed as it appears to be unused.
* The minimum Ansible version for the os_keystone and
haproxy_server roles have been increased to v1.9.0 as it's
the minimum version that supports ternary filters.
* The boolean 'keystone_ssl_enabled' has been renamed to
'keystone_ssl'. This maintains a pattern set in the haproxy
role for enablement of ssl offloading in the load balancer.
* The Apache configuration appropriately implements the
'SSLCACertificateFile' instead of the 'SSLCACertificatePath'
directive in order to ensure that the appropriate signing
certificate is provided to the browser.
* The 'keystone_self_signed_regen' variable has been renamed
to 'keystone_ssl_self_signed_regen'.
* The default names for the deployed keys/certificates have been
changed:
- /etc/ssl/certs/apache.cert > /etc/ssl/certs/keystone.pem
- /etc/ssl/private/apache.key > /etc/ssl/private/keystone.key
DocImpact
Partial-Bug: #1466827
Implements: blueprint keystone-federation
Change-Id: I4c5ea7b6bfc3d7d7230a7440fa501241826c9dee
Co-Authored-By: Miguel Grinberg <miguelgrinberg50@gmail.com>
(cherry picked from commit 4b35b3e929)
OpenStack Ansible Deployment
- date
-
2015-02-02 22:00
- tags
-
lxc, openstack, cloud, ansible
- category
-
*nix
Playbooks
There are several playbooks within that will setup hosts for use in OpenStack Cloud. The playbooks will enable LXC on hosts and provides the ability to deploy LXC containers for use within openstack.
- Plays:
-
setup-hosts.ymlPerforms host setup for use with LXC in the OpenStack hosts.setup-infrastructure.ymlPerforms all of the setup for all infrastructure components.setup-openstack.ymlPerforms all of the setup for all of the OpenStack components.
- If you dont want to run plays individually you can simply run
setup-everything.ymlwhich will perform all of the setup and installation for you.
- Basic Setup:
-
- If you have any roles that you'd like to have pulled in that are
outside the scope and or replace modules within this repository please
add them to the
ansible-role-requirements.ymlfile. In this file you will want to fill in the details for the role you want to pull in using standard ansible galaxy format.
- Run the
./scripts/bootstrap-ansible.shscript, which will install, pip, ansible 1.9.x, all of the required python packages, and bring in any third party ansible roles that you may want to add to the deployment. - Copy the
etc/openstack_deploydirectory to/etc/openstack_deploy. - Fill in your
openstack_deploy/openstack_user_config.yml,openstack_deploy/user_secrets.ymlandopenstack_deploy/user_variables.ymlfiles which you've just copied to your/etc/directory. - Generate all of your random passwords executing
scripts/pw-token-gen.py --file /etc/openstack_deploy/user_secrets.yml. - Accomplish all of the host networking that you want to use within
the deployment. See the
etc/networkdirectory in this repository for an example network setup. - When ready change to the
playbooks/directory and execute your desired plays. IE:
- If you have any roles that you'd like to have pulled in that are
outside the scope and or replace modules within this repository please
add them to the
Notes
- If you run the
./scripts/bootstrap-ansible.shscript a wrapper script will be added to your system that wraps the ansible-playbook command to simplify the arguments required to run openstack ansible plays. The name of the wrapper script is openstack-ansible. - The lxc network is created within the lxcbr0 interface.
This supports both NAT networks as well as more traditional networking.
If NAT is enabled (default) the IPtables rules will be created along
with the interface as a post-up processes. If you ever need to recreate
the rules and or restart the dnsmask process you can bounce the
interface IE:
ifdown lxcb0; ifup lxcbr0or you can use thelxc-system-managecommand. - The tool
lxc-system-manageis available on all lxc hosts and can assist in recreating parts of the LXC system whenever its needed. - Inventory is generated by executing the
playbooks/inventory/dynamic_inventory.pyscript. This is configured in theplaybooks/ansible.cfgfile. - If you don't use the pw-token-gen.py script you will want to ensure
the permissions on /etc/openstack_deploy/user_secrets.yml are more
secure.
chmod 0600 /etc/openstack_deploy/user_secrets.yml
Bugs and Blueprints
Everything we do is in launchpad and gerrit. If you'd like to raise a bug, feature request, or are looking for ways to contribute please go to "https://launchpad.net/openstack-ansible".
Documentation
To build the docs make sure that you have installed the python
requirements as found within the dev-requirements.txt file
and then run the following command from within the doc
directory.
Description
Languages
Python
66.2%
Shell
20.4%
Jinja
13.3%
Smarty
0.1%