baf6eee501
Makes it possible to resolve network subnets within a service template; the data is transported into a new property ServiceData wired into every service which hopefully is generic enough to be extended in the future and transport more data. Data can be consumed in service templates to set config values which need to know what is the subnet where a deamon operates (for example the Ceph Public vs Cluster network). Change-Id: I28e21c46f1ef609517175f7e7ee19e28d1c0cba2
79 lines
2.5 KiB
YAML
79 lines
2.5 KiB
YAML
heat_template_version: pike
|
|
|
|
description: >
|
|
HAProxy deployment with TLS enabled, powered by certmonger
|
|
|
|
parameters:
|
|
ServiceData:
|
|
default: {}
|
|
description: Dictionary packing service data
|
|
type: json
|
|
ServiceNetMap:
|
|
default: {}
|
|
description: Mapping of service_name -> network name. Typically set
|
|
via parameter_defaults in the resource registry. This
|
|
mapping overrides those in ServiceNetMapDefaults.
|
|
type: json
|
|
DefaultPasswords:
|
|
default: {}
|
|
type: json
|
|
RoleName:
|
|
default: ''
|
|
description: Role name on which the service is applied
|
|
type: string
|
|
RoleParameters:
|
|
default: {}
|
|
description: Parameters specific to the role
|
|
type: json
|
|
EndpointMap:
|
|
default: {}
|
|
description: Mapping of service endpoint -> protocol. Typically set
|
|
via parameter_defaults in the resource registry.
|
|
type: json
|
|
|
|
resources:
|
|
|
|
HAProxyNetworks:
|
|
type: OS::Heat::Value
|
|
properties:
|
|
value:
|
|
# NOTE(jaosorior) Get unique network names to create
|
|
# certificates for those. We skip the tenant network since
|
|
# we don't need a certificate for that, and the external
|
|
# network will be handled in another template.
|
|
yaql:
|
|
expression: list($.data.map.items().map($1[1])).distinct().where($ != external and $ != tenant)
|
|
data:
|
|
map:
|
|
get_param: ServiceNetMap
|
|
|
|
outputs:
|
|
role_data:
|
|
description: Role data for the HAProxy internal TLS via certmonger role.
|
|
value:
|
|
service_name: haproxy_internal_tls_certmonger
|
|
config_settings:
|
|
generate_service_certificates: true
|
|
tripleo::haproxy::use_internal_certificates: true
|
|
certificates_specs:
|
|
map_merge:
|
|
repeat:
|
|
template:
|
|
haproxy-NETWORK:
|
|
service_pem: '/etc/pki/tls/certs/overcloud-haproxy-NETWORK.pem'
|
|
service_certificate: '/etc/pki/tls/certs/overcloud-haproxy-NETWORK.crt'
|
|
service_key: '/etc/pki/tls/private/overcloud-haproxy-NETWORK.key'
|
|
hostname: "%{hiera('cloud_name_NETWORK')}"
|
|
postsave_cmd: "" # TODO
|
|
principal: "haproxy/%{hiera('cloud_name_NETWORK')}"
|
|
for_each:
|
|
NETWORK: {get_attr: [HAProxyNetworks, value]}
|
|
metadata_settings:
|
|
repeat:
|
|
template:
|
|
- service: haproxy
|
|
network: $NETWORK
|
|
type: vip
|
|
for_each:
|
|
$NETWORK: {get_attr: [HAProxyNetworks, value]}
|