config/sysinv/sysinv/sysinv
Karla Felix a26b4b4050 Check for cert alarms in health-query-upgrade
This task will adapt existing implementation to run full certificate
expiration audit in "health-query-upgrade" and return fail in
_check_alarms in case of existence of any cert alarm in the system.
Both "expiring soon" and "expired" alarms will block upgrades, but
can be skipped with the use of the force flag. This change will also
add a information about certificate expiration alarms to the line
related to existing alarms of the output in "health-query-upgrade".

Note: Now that 'keystone_opt_group' is used for both cert_alarm and
      health.py, the variable 'keystone_authtoken' had to be changed
      to 'KEYSTONE_AUTHTOKEN' to match with the key that is used by
      the CONF object from health.py which is configured as
      uppercase in line 118 of openstack.py.

Test Plan:

PASS: Run "health-query-upgrade" with one or more 'expiring soon'or
      'expired' alarms and verify that a message is show in
      'health-query-upgrade' output saying that there is certificate
      expiration alarms.
PASS: Run 'health-query-upgrade' with no active certificate alarm and
      verify that no certificate alarms were shown in the output of
      'health-query-upgrade'.
PASS: Run 'system upgrade-start' with the --force flag with one or more
      certificate alarms and verify that the upgrade can be started
      normally.
PASS: Add a new certificate with expiry date of less than 30 days
      and run 'health-query-upgrade' before the scheduled full audit
      runs and check if the alarm was created and detected by
      'health-query-upgrade'.
PASS: Delete secret from a certificate that is monitored by cert-mon
      and check if cert-mon was able to reinstall the secret to the
      filesystem.

Task: 47478
Story: 2009303
Signed-off-by: Karla Felix <karla.karolinenogueirafelix@windriver.com>
Change-Id: Iaba585b6ecd7f63e0ed186f87c7274c4b9778889
2023-03-07 14:06:17 -03:00
..
.eggs StarlingX open source release updates 2018-05-31 07:35:52 -07:00
contrib StarlingX open source release updates 2018-05-31 07:35:52 -07:00
doc/source Change openstack-dev to openstack-discuss 2018-12-04 23:37:31 -05:00
etc/sysinv Deprecate old policy engine and restrict access 2022-08-10 11:18:38 -03:00
scripts Refactor inventory items for multipath support 2023-02-13 17:14:32 +00:00
sysinv Check for cert alarms in health-query-upgrade 2023-03-07 14:06:17 -03:00
tools Deprecate sysinv.openstack.common.db in favor of oslo_db 2020-02-07 11:55:49 -06:00
.coveragerc StarlingX open source release updates 2018-05-31 07:35:52 -07:00
.gitignore Update sysinv to not invoke ceph during unit testing 2018-10-02 13:19:43 -05:00
.stestr.conf Cleanup sysinv tox py27 warnings 2019-05-31 08:35:50 -05:00
CONTRIBUTING.rst Update CONTRIBUTING.rst and add HACKING.rst 2019-09-27 09:00:29 -05:00
HACKING.rst Update CONTRIBUTING.rst and add HACKING.rst 2019-09-27 09:00:29 -05:00
LICENSE StarlingX open source release updates 2018-05-31 07:35:52 -07:00
MANIFEST.in Deprecate old policy engine and restrict access 2022-08-10 11:18:38 -03:00
README.rst StarlingX open source release updates 2018-05-31 07:35:52 -07:00
babel.cfg StarlingX open source release updates 2018-05-31 07:35:52 -07:00
openstack-common.conf Remove sysinv.openstack.common.loopingcall 2021-08-13 16:30:11 +00:00
pylint.rc Update sysinv tox for python3.9 2023-02-07 15:18:42 +00:00
requirements.txt Add ZeroMQ RPC backend 2022-11-24 13:28:01 -03:00
setup.cfg Merge sysinv_fpga_agent with sysinv_agent 2022-10-03 14:12:28 -04:00
setup.py Add a zuul job for sysinv tox unittest 2018-08-13 16:34:06 +08:00
test-requirements.txt Update sysinv tox for python3.9 2023-02-07 15:18:42 +00:00
tox.ini Update sysinv tox for python3.9 2023-02-07 15:18:42 +00:00
upper-constraints.txt Update tox.ini files to use stein constraints 2019-06-25 14:45:54 -04:00

README.rst

Placeholder to allow setup.py to work. Removing this requires modifying the setup.py manifest.