Commit Graph

80 Commits (master)

Author SHA1 Message Date
Tae Park f7a37e6ad9 Removing default injector anti-affinity rules
Adding a null override over default anti-affinity rules for vault injectors. The default rule only allow one vault injector pod at a time. This is a problem because helm-override and application apply will try to schedule a new pod first before completely removing the old pod.
This change lets a new vault agent injector pod to be scheduled without issue.

 - Test for AIO-SX
 - Update helm-override so that vault-injector has a different image tag than default
 - apply the new helm-override
 - There should be no FailedScheduling error in the vault pods
 - Sanity test for both AIO-SX and AIO-DX + 1 worker

Closes-bug: 2030901

Change-Id: I9814f502558ab1cbecad48cf37341639c964258f
Signed-off-by: Tae Park <>
2023-08-15 18:23:35 +00:00
Tae Park 896008fb73 vault-manager wait for one server only when initialized
Modifying the vault-manager initialization logic so that it only waits
for pod number equal to the replica value to be active
if the raft is not yet initialized.

 - In a 2 controller, 1 worker setup,
 - Upload and apply vault
 - Lock the host that vault-manager is running on
 - Vault manager should restart
 - Within the logs, there should not be a repetition of " Waiting for sva-vault statefulset running pods..."
 - Vault Sanity test in AIO-SX
 - Bashate of rendered

Closes-bug: 2029375

Signed-off-by: Tae Park <>
Change-Id: I41990b87395a5d5364ef91c048f740d0f0675d6b
2023-08-08 15:31:29 -04:00
Tae Park ad3f7808ea Disable Vault Web UI
Changes the setting under vault overrides to disable Vault web UI.

Test Plan:
PASS Port 8200 is unreachable from vault kubernetes pod
  -  kubectl port-forward --address= -n vault pod/sva-vault-0 23443:8200
PASS vault kubernetes pod settings show ui = false
  -  kubectl get configmaps -n vault sva-vault-config -o yaml

Story: 2010393
Task: 48381
Change-Id: Ib7915f3071c663b1375e80f04104f1f4fb872a1e
Signed-off-by: Tae Park <>
2023-07-13 17:28:28 +00:00
Alan Bandeira 08305a2286 Add label core affinity labels to each vault pod
This commit adds the support to core affinity labels for
vault. The label '' identifies
to k8s to rather run the application pods by 'platform'
or 'application' cores.

The default value for '' label
is 'platform', but the label accept the values
'application' and 'platform'. The override has to be
performed when vault is in the uploaded state, after
application remove or before the first apply. This
behavior is required to ensure that no vault pod is
restarted in an improper manner.

Test plan:

PASS: In a AIO-SX system upload and apply the vault app. When apply
      is finished, run "kubectl -n vault describe po sva | grep
      platform" and the output should be three instances of
      "", indicating that the
      default configuration is applied ofr each pod.

PASS: In a AIO-SX, where the vault app is in the applied state, run
      "system application-remove vault" and override
      '' label with 'application' value by
      helm api. After the override, apply vault and verify
      '' label is 'application' on the
      pods describe output, similar to the previous test.

PASS: In a AIO-SX, where the vault app is in the applied state, run
      "system application-remove vault" and override
      '' label with any value rather
      than 'platform' or 'application' and after the apply check if
      the default value of 'platform' was used for the pod labels.

PASS: In a Standard configuration with one worker node, upload and
      apply the vault app. When apply is finished, run 'kubectl -n
      vault describe po sva | grep -b3 ""'
      and check the output for the ''
      label is the default value of 'platform' for each pod, with
      every vault server pod having the label.

PASS: In a Standard configuration with one worker node, remove vault
      and override '' label with any value,
      valid or not, and after the override, apply vault. With vault
      in the applied state, verify the replica count override is kept
      and check the pods in a similar way to the previous test to
      validate that the HA configuration is maintained. The number
      of pods replicas should reflect the configuration.

Story: 2010612
Task: 48252

Change-Id: If729ab8bb8fecddf54824f5aa59326960b66942a
Signed-off-by: Alan Bandeira <>
2023-06-20 16:45:27 -03:00
Michel Thebeau e2dd8a281f adjust server readiness probe
It is observed that vault pods consistently show readiness probe warning
when applying the application or when a pod is recovering.  The probe
runs "vault status" which returns failure when the vault is sealed.  The
probe failure is not impactful, but since there is a certain delay
before unseal is completed, adjust initialDelaySeconds to 25 to account
for the time required to unseal vault pods.  This commit should usually
omit readiness probe warning for a single recovering vault pod.

During testing it is observed that:
  Setting initialDelaySeconds to 15: a recovering pod shows readiness
probe warning.
  Setting initialDelaySeconds to 18, a recovering pod omits readiness
probe warning.
  On application-apply, the first pod to be unsealed _may_ show readiness
probe warning when initialDelaySeconds is 25.  Other pods will be
unsealed serially and will show readiness probe warning.

Test Plan:
  PASS  Standard controller storage 2+2
  PASS  HA tests, log inspection
  PASS  Inspection of kubectl describe of pods with various values for

Story: 2010393
Task: 48237


Change-Id: I9ea6cca2b591c40bfe70737c0fb390b18b69f796
Signed-off-by: Michel Thebeau <>
2023-06-15 09:34:00 -04:00
Michel Thebeau a49584d4f9 remove vault-manager unseal delay
Options for vault-manager were introduced to delay unsealing of
recovering vault server pods until the active vault server pod would
start sending heartbeats to the recovering pod.  The behavior of vault
server that prompted the change to vault-manager is no longer
observed with vault server version 1.13.1.

Remove the unsealWaitIntervals so that vault manager will unseal the
recovering server immediately.

Test Plan:
  PASS  HA tests, review pods logs, election status
  PASS  active server remains active when a pod recovers
  PASS  no evidence of election attempts in vault server logs
  PASS  tested also with statusCheckRate=.1 to minimize delay
        (default 5s gives a random-ish delay of 0-5 seconds)

Story: 2010393
Task: 48236


Change-Id: Ifd73970658d6ef7a0e0ca5844b2db81d94bdde9f
Signed-off-by: Michel Thebeau <>
2023-06-15 09:33:27 -04:00
Michel Thebeau 82478326fe update vault helm chart to 0.24.1
Replace references of 0.19.0 with 0.24.1.  Refresh the patches for
vault-manager and agent image reference. Update the image tags to match
new vault chart.

Test plan:
 PASS AIO-sx and Standard 2+2
 PASS vault aware and un-aware applications
 PASS HA tests
 PASS test image pulls from private registry with external network

 Story: 2010393
 Task: 48109

Change-Id: Ib6b4d0a6f7d3a54676563c59f60d93d129c81c1c
Signed-off-by: Michel Thebeau <>
2023-06-14 15:05:32 -04:00
Michel Thebeau 363529d1fc delete old chart build files
These have not been needed for a while and do not impact the build of
this application.

The Makefile remains as the necessary component of the build.

Test plan:
  PASS  compare chart files before/after to ensure no changes
  PASS  compare all of stx-vault-helm package before/after

Story: 2010393
Task: 47164

Change-Id: I97025ceee2875a6fc588d72436b55e7f5ac59062
Signed-off-by: Michel Thebeau <>
2023-06-07 12:45:45 +00:00
Michel Thebeau 27f4742d8d remove extra vault-manager patch
This patch was part of the CentOS build, which was removed with
commit 20167fc54f

Whereas the patch was copied for debian here:
commit d96e143a34

Test Plan:
PASS: debian build unaffected (there is no CentOS build)

Story: 2010393
Task: 47232

Change-Id: If90017b58f6220bca82e554e2fb50bd655d240ec
Signed-off-by: Michel Thebeau <>
2023-05-26 13:19:35 +00:00
Michel Thebeau 198f4e5164 set images to pull from configured registries
Add yaml to the fluxcd manifest which is compatible with the platform's
image pull and service parameter registry override handling.  The
platform will pull the image and populate registry.local, and the vault
injector agent will pull from registry.local.

Story: 2010393
Task: 47927

Test Plan:
PASS: sysinv.log shows that agentImage image is pulled when vault
      server image is hardcoded differently
PASS: agent image pulls when public network is blocked
PASS: agent image pulls when it is different than vault server image
PASS: vault app test, including vault un-aware application

Change-Id: Idd1215744bb31881127a6be23cf570166c79fad8
Signed-off-by: Michel Thebeau <>
2023-05-05 18:56:31 -04:00
Michel Thebeau 1dab2dbf8f update vault-manager image tag
The new image has updated packages for CVE fixes, no other changes.

Test Plan:
PASS - apply vault application (inspect vault-manager pod)

Story: 2010710
Task: 47905

Change-Id: I83848d12baf0558edc0a2e4cd9a964f781edec56
Signed-off-by: Michel Thebeau <>
2023-05-03 16:53:59 -04:00
Davlet Panech 809632ce2c Fix github mirroring for this repo
Updating the rsa ssh host key based on:

Note: In the future, StarlingX should have a zuul job and
secret setup for all repos so we do not need to do this
for every repo.

Needed to rename the secret, because zuul fails if like-named
secrets have diffent values in different branches of the same

Partial-Bug: #2015246
Change-Id: Ie65c51aabfa4b303b89634eb9e5c566669f5f5d9
Signed-off-by: Davlet Panech <>
2023-04-28 12:38:53 -04:00
Michel Thebeau 82d5d9abdc update vault-manager statefulset
Update the statefulset to prompt update strategy.  The config map is
updated in previous commits, for which we want vault-manager to restart.

Test Plan:
PASS - sw-patch upload/apply/install/remove
PASS - manual revert to original tarball (system application-update)

Story: 2010393
Task: 47731

Change-Id: Ib52d019170763d066c730d679067b91ed4d59bb5
Signed-off-by: Michel Thebeau <>
2023-03-31 10:31:46 -04:00
Michel Thebeau 796ad2846a add auto_update to app metadata.yaml
Instruct the platform to automatically apply the application when

Test Plan:
PASS - sw-patch upload/apply/install/remove
PASS - manual revert to original tarball (system application-update)

Story: 2010393
Task: 47731

Change-Id: I478995b70bffd9c3568c9eb2a4861b9b90bd32da
Signed-off-by: Michel Thebeau <>
2023-03-31 10:30:18 -04:00
Fabricio Henrique Ramos 1490adbe75 Remove armada

Test Plan:
PASS: App operations still work fine

Story: 2010560
Task: 47610

Signed-off-by: Fabricio Henrique Ramos <>
Change-Id: Ibbbaf51a6b58c70aa915976530217301c31fa721
2023-03-27 11:49:09 -03:00
Zuul 7bc0bbfe01 Merge "add health query timeout for HA" 2023-03-24 19:27:50 +00:00
Zuul 3d8ae226e6 Merge "fix bashate reports in vault-manager" 2023-03-24 19:27:46 +00:00
Zuul 0f855499a1 Merge "add option to delay server unseal" 2023-03-24 18:19:26 +00:00
Zuul 65666949f9 Merge "Remove psp-rolebinding from vault-aramda-app" 2023-03-24 17:27:48 +00:00
Rahul Roshan Kachchap 49e22fe952 Remove psp-rolebinding from vault-aramda-app
Removed the psp-rolebinding helm chart from being
packaged as part of vault-armada-app.

PASS: Build pkgs
PASS: system-application apply vault
PASS: application pkg doesn't consist psp-rolebinding
      helm chart

Story: 2010590
Task: 47711

Signed-off-by: Rahul Roshan Kachchap <>
Change-Id: I6d73bcb0d8e1e304f3b4fc16cc6bc8d2d6422de5
2023-03-24 15:26:55 +00:00
Michel Thebeau dc79220541 add health query timeout for HA
This change causes vault-manager to not pause for long periods when a
configured vault server is not responsive.

Use curl --connect-timeout for queries to vault server /sys/health.
During HA recovery it is known that the server is non-responsive, so
vault-manager should not wait the default time, which is 60s or 5m
depending on the google search result.

It is observed that vault-manager appears to hang for long periods
during HA recovery. Watching the $PVCDIR/pods.txt confirms that
vault-manager is inactive for minutes at a time.  This changes the
default behavior to timeout within 2 seconds during the HA recovery

In addition to not waiting, the vault-manager log will show the 'sealed'
status as empty string when the query times-out.

Test Plan:
PASS - vault ha 3 replicas
PASS - vault 1 replica
PASS - kubectl exec kill vault process
PASS - kubectl delete vault pod
PASS - short network downtime
PASS - long network downtime
PASS - rates including 1, 5
PASS - wait intervals including 0, 1, 3, 15
PASS - kubectl delete 2 vault pods
PASS - kubectl delete 3 (all) vault pods

Story: 2010393
Task: 47701

Change-Id: I4fd916033f6dd5210078126abb065393d25851cd
Signed-off-by: Michel Thebeau <>
2023-03-23 11:52:37 -04:00
Michel Thebeau 02184560c5 fix bashate reports in vault-manager
Run tox against the rendered from vault-init.yaml; fix most of
the reports except for some long lines from jsonpath templates.

Test Plan:
PASS - vault ha 3 replicas
PASS - vault 1 replica
PASS - kubectl exec kill vault process
PASS - kubectl delete vault pod
PASS - short network downtime
PASS - long network downtime

Story: 2010393
Task: 47700

Change-Id: I844c5de510e8a7a3724852d4e6500eec6c327aba
Signed-off-by: Michel Thebeau <>
2023-03-23 10:36:59 -04:00
Michel Thebeau a046dca09c add option to delay server unseal
This change delays unsealing recovering vault servers for 15 seconds.

vault-manager automatically unseals vault servers in a perpetual loop
after initial configuration.  This final loop is the HA recovery

It is observed that vault-manager will unseal a recovering vault server
when the active server has not started to send heartbeats to the new
pod.  The result is that the recovering server will timeout waiting for
heartbeats and start an election.  Although the active and standby
server will reject the election, there being a leader already, the
recovering vault will increment 'term' and restart election until
heartbeats are received, or until it wins election.

Although the raft algorithm is resilient to this, the procedure is not
appropriate.  It is better to unseal the vault server after the active
vault sends heartbeats to the new pod.

It is observed that the heartbeat interval reduces promptly from less
than 1 second per heartbeat to ~10-12 seconds for a failed vault server.
So it is reasonable for vault-manager to wait 12 seconds before
unsealing the recovering vault.  This also assumes the vault-manager and
active vault server would receive updated pod information at about the
same time and the latest heartbeat was issued immediately prior to the

The options are configurable in helm-overrides.  The defaults for
    statusCheckRate: 5
    unsealWaitIntervals: 3

statusCheckRate is the rate at which vault-manager will check pod
status, in seconds.  unsealWaitIntervals is the number of intervals to
wait before unsealing the server.

Default is 5 s/interval * 3 intervals == 15 seconds

When unsealWaitIntervals is set to 0 there is no delay in unsealing the
recovering vault servers.  This is equivalent to the existing behaviour
before this change when statusCheckRate is also set to 5, which is the
value hard-coded before this change.

Test Plan:
PASS - vault ha 3 replicas
PASS - vault 1 replica
PASS - kubectl exec kill vault process
PASS - kubectl delete vault pod
PASS - short network downtime
PASS - long network downtime
PASS - rates including 1, 5
PASS - wait intervals including 0, 1, 3, 15
PASS - not reproduced with default values (many attempts)

Story: 2010393
Task: 47701

Change-Id: I763f6becee3e1a17e838a4f8ca59b2b0d33ba639
Signed-off-by: Michel Thebeau <>
2023-03-23 10:36:55 -04:00
Michel Thebeau 686cf0606f make vault-manager rate configurable
Add a chart override for the rate at which vault-manager checks vault
pod status.  Leave the default at previously hard-coded 5s.

Move all of the hard-coded sleep values to variables so they would be
more visible.

Test Plan:
PASS - vault ha 3 replicas
PASS - vault 1 replica
PASS - kubectl exec kill vault process
PASS - kubectl delete vault pod
PASS - short network downtime
PASS - long network downtime
PASS - rates including 1, 5

Story: 2010393
Task: 47701

Change-Id: I1de647760f6fe1806b0b1450c0e8f1117ad725ea
Signed-off-by: Michel Thebeau <>
2023-03-22 17:30:00 -04:00
Michel Thebeau f3e9831823 compress the vault-manager log
Track the seal status of vault server pods so that logs can be omitted
when there is no change.

The converted loop no longer ignores pods without IP addresses.  Add an
explicit test for empty IP address field coming from getVaultPods().

Test Plan:
PASS - vault ha 3 replicas
PASS - vault 1 replica
PASS - kubectl exec kill vault process
PASS - kubectl delete vault pod
PASS - short network downtime
PASS - long network downtime

Story: 2010393
Task: 47700

Change-Id: Ic75c397046a3e183faf5ecc5b37dc8abefc7af64
Signed-off-by: Michel Thebeau <>
2023-03-22 17:29:47 -04:00
Michel Thebeau e066354ade add timestamp to vault-manager logs
Enhance debugging with dated logs for vault-manager pod.  Allows
correlating the logs with other pods.

Test Plan:
PASS - vault ha 3 replicas
PASS - vault 1 replica
PASS - kubectl exec kill vault process
PASS - kubectl delete vault pod
PASS - short network downtime
PASS - long network downtime

Story: 2010393
Task: 47700

Change-Id: I4a877b8c0fc8ddc2626aaccc15196c30b6fb4b82
Signed-off-by: Michel Thebeau <>
2023-03-22 17:29:35 -04:00
Michel Thebeau 6b80a23f50 fix AND logic in log of vault-manager
This was probably supposed to be '&&' for AND logic and not an intention
to background the grep of pods.txt.  The symptom of this mistake is a
somewhat random log output - sometimes the output is printed before and
sometimes after the "Sealed status is".

Test Plan:
PASS - vault ha 3 replicas
PASS - vault 1 replica
PASS - kubectl exec kill vault process
PASS - kubectl delete vault pod
PASS - short network downtime
PASS - long network downtime

Story: 2010393
Task: 47700

Change-Id: Ia4358ca7ed7ca7af3b116934c4491a5887871853
Signed-off-by: Michel Thebeau <>
2023-03-22 17:27:30 -04:00
Zuul 6a3359bd91 Merge "Update debian packages for pkg-versioning" 2023-03-08 15:45:39 +00:00
Leonardo Fagundes Luz Serrano c2efd6972c Updated app tarball version
Currently, the debian build system produces a debian package version
with the format: "1.0-1.stx.<revision>"

The rules file then parses this deb pkg version at build time
to produce the app tarball version, which always comes up to
be "1.0-1" at this time [1]. This commit changes the app tarball
version calculation so that the resulting tarball version will
be "1.0-<revision>" [2].

This correction is necessary because the application framework
cannot update an app between instances with the same version.

This commit is part of a set of commits updating the app tarball
version calculation to all apps based off of [3].

[1]: /usr/local/share/applications/helm/<APPNAME>-1.0-1.tgz
[2]: /usr/local/share/applications/helm/<APPNAME>-1.0-<N>.tgz


Test Plan:
pass - build-pkg
pass - tarball version updated

Story: 2010542
Task: 47533

Signed-off-by: Leonardo Fagundes Luz Serrano <>
Change-Id: Ifcfeab7e3308fa5776ec45b25cf437d0a87f3019
2023-03-02 15:00:06 -03:00
Manoel Benedito Neto 45de5de069 Update debian packages for pkg-versioning
The Debian packaging meta_data file has been changed to reflect all the
latest git commits under the directory, pointed as usable, and to
improve pkg-versioning addressing the first commit as start point to
build packages.

This ensures that any new code submissions under those
directories will increment the versions.

Test Plan:
PASS: Verify package versions are updated as expected.
PASS: build-pkgs -c -p vault-helm,python3-k8sapp-vault,stx-vault-helm

Story: 2010550
Task: 47501

Signed-off-by: Manoel Benedito Neto <>
Change-Id: I999b1d96146fb1e2ac931641620621f445cbda71
2023-02-28 10:51:17 -03:00
Zuul 7d5cf513e0 Merge "Change version tracking to GITREVCOUNT" 2023-01-27 16:54:09 +00:00
Michel Thebeau 1a7c490264 Update vault to use new stx-vault-manager image
Test Plan:
PASS: Standard, dedicated storage, vault HA
PASS: Simplex
PASS: app sanity

Story: 2010393
Task: 47157


Change-Id: I844aaefb31e172c91134eb0b46d2911a88ba8508
Signed-off-by: Michel Thebeau <>
2023-01-25 17:26:50 -05:00
Leonardo Fagundes Luz Serrano 7887a37d81 Change version tracking to GITREVCOUNT
Using PKG_GITREVCOUNT combined with the plugin directory
being renamed resulted in the wheels version tracking being
reset to 1.0.1, which would result in future builds repeating
version numbers.

This commit fixes that by making it so that the version
tracks the repo, not individual directories.
As a bonus, plugin and tarball will have the same version number.

Test Plan:
PASS - Built pkgs have the fixed version

Story: 2010542
Task: 47195

Signed-off-by: Leonardo Fagundes Luz Serrano <>
Change-Id: Id9f051cc3f1dc6cc53baa541c236c9e00b8b2c1f
2023-01-20 15:31:26 +00:00
Michel Thebeau c9032e2e4c Add Debian based stx-vault-manager image
Restore the image build for stx-vault-manager. Reference the removal of
CentOS based image: commit 20167fc5.  It is effectively the same but for
Debian, a newer kubectl version, and the 'slim' image size.

Vault manager uses kubectl and miscellaneous tools including: curl, jq,
awk, bash, grep, sed and coreutils.

Test Plan:
PASS - Standard, dedicated storage 2+2+2
PASS - apply vault application with helm override to use the new image
PASS - observe pod logs, vault-manager operation
PASS - test vault HA, observe vault-manager operation
PASS - configure vault, configure secret, read secret
PASS - apply helloworld app, confirm read secret

Story: 2010393
Task: 46869

Change-Id: I9ca31d2f1047e704f961936ba8f04a7abdab56f5
Signed-off-by: Michel Thebeau <>
2023-01-18 13:37:01 -05:00
Leonardo Fagundes Luz Serrano 809cdf6206 Standardize app configs
Fixed versioning and adjusted some build files
to bring them as close to a standard as possible.

- Removed centos files
- Added version tracking via PKG_GITREVCOUNT
- Fixed mismatch in plugin name, set to python3-k8sapp-<app>
- Standardized plugin debian files (rules, *.install)
- Plugin wheels saved to /plugin instead of /plugin/<app>

Test Plan:
PASS - Build-pkgs -a
PASS - Build-image
PASS - Install, bootstrap, unlock
PASS - app tarball contains wheel file
PASS - wheel versioning updated properly
PASS - app applied (SX vm)

Signed-off-by: Leonardo Fagundes Luz Serrano <>
Change-Id: I9f5e8b1afc65de3b7d7ee05744ad39f5acc834de
2023-01-18 14:20:36 +00:00
Al Bailey 07a1f13b5e Update tox.ini to work with tox 4
This change will allow this repo to pass zuul now
that this has merged:

Tox 4 deprecated whitelist_externals.
Replace whitelist_externals with allowlist_externals

Partial-Bug: #2000399

Signed-off-by: Al Bailey <>
Change-Id: I017d1b9c379ce60fa75b13609465f4256efc15df
2022-12-27 01:33:59 +00:00
Leonardo Fagundes Luz Serrano be5c4c258c appfwk: set flux reconciliation interval to 1m
Set reconciliation interval for all flux helm resources to 1m
to allow it to manage resources by itself in a reasonable time

Test Plan (tested as part of [1]):
PASS: bootstrap
PASS: unlocked enabled available
PASS: apps applied
PASS: inspect flux pod logs for errors
PASS: re-test known trigger for 1996747 and 1995748
PASS: re-test known trigger 1997368


Partial-Bug: 1999032

Signed-off-by: Leonardo Fagundes Luz Serrano <>
Change-Id: I1c95ca1d90e38a9f6c672e4dc28823b964cad334
2022-12-07 19:30:06 +00:00
Yue Tao 412af945a2 vault-armada-app: update
Move the packages of "vault-armada-app" from stx-std.lst

A subsequent commit will be sent to clean up stx-std.lst.

Test Plan:

Pass: build-pkgs -c -a
Pass: build-image
Pass: boot

Story: 2008862
Task: 46938

Signed-off-by: Yue Tao <>
Change-Id: I2c979a18c6aeadec696b828b8caf59fd97977190
2022-11-24 11:47:30 +08:00
Michel Thebeau 20167fc54f remove CentOS build of vault
Disables the packages for CentOS build, as well as the vault manager
image.  Conversion of docker image to Debian will happen at a later
date (task 46869).

Test Plan:
PASS: centos build
PASS: debian build

Story: 2010393
Task: 46868

Change-Id: I827352122460976b07b436fb022741f7d89e5548
Signed-off-by: Michel Thebeau <>
2022-11-17 19:11:32 +00:00
Zuul 03235cce70 Merge "Upversioning VAULT to v0.19.0 in order to support k8s v1.22 and higher." 2022-11-14 15:17:44 +00:00
Greg Waines 428454dc96 Upversioning VAULT to v0.19.0 in order to support k8s v1.22 and higher.
Story: 2010393
Task: 46786
Vault image default 1.9.2
Vault K8s image default 0.14.2
Vault CSI Provider image default 0.4.0

- built vault application in Deb build environment
- on nov 6 nightly build
    * system application-upload ./vault-1.0-1.tgz
    * system application-apply vault
    * configured vault with
    * system application-remove vault
    * system application-delete vault

Signed-off-by: Greg Waines <>
Change-Id: I75f4bdc93e3a8dc630f3ade45f53d150a3945f37
2022-11-14 12:48:48 +00:00
Zuul 4cd2f6d7d8 Merge "Fix zuul failures during setup" 2022-11-10 19:48:12 +00:00
Al Bailey c61ae111be Fix zuul failures during setup
The ubuntu-jammy nodeset gets selected by default
and is causing problems during setup.

Collecting cffi>=1.1
Failed to build cffi

ubuntu-bionic works if using stein upper-constraints.
ubuntu-focal works if using the debian upper-constraints.

Need to update a file that is monitored by zuul
in order to trigger the failing zuul jobs.

Partial-Bug: 1994843

Signed-off-by: Al Bailey <>
Change-Id: Idd435815d995c8ed7b9d538d7abb7bd79066af20
2022-10-28 19:46:27 +00:00
Saba Touheed Mujawar 94a9cd1022 switch to use new K8s control-plane label
Upstream has deprecated ''
to use '' in k8s 1.24.

Platform and applications need to be updated to use 'control-plane'
with nodeSelector/Tolerations so we may upgrade from 'master'.

This updates pod nodeSelector to use
'' instead of

This updates pod Tolerations to support both:
- ''
- ''

Note: The vault app stopped applying properly when stx moved to k8s 1.22
      1.23 due to the use of deprecated APIs:
      The changes will still be merged to ensure that the files are
      updated when updating vault to a new version which is compatible
      w/ k8s 1.24+

Story: 2010301
Task: 46667

Signed-off-by: Saba Touheed Mujawar <>
Change-Id: I01e031a94755be01cd3e5d942e96d1b42c977329
2022-10-27 02:26:00 -04:00
Lucas Cavalcante 12b115d1a2 Remove stx-vault-armada from CentOS ISO
Removal of armada app package causes build-iso step to fail
due to package still being listed in

PASS: CentOS build-iso success

Closes-bug: 1987535
Signed-off-by: Lucas Cavalcante <>
Change-Id: I01fb53d119912eb5625d16743497e9a131b207bf
2022-08-24 11:56:42 -03:00
Lucas Cavalcante 906f3ee374 Remove vault armada app build
As part of Armada deprecation we need to remove all Armada application
builds for all applications that have been migrated to FluxCD.

This patch removes the armada app build from centos and debian.

PASS: Build centos
PASS: Build debian
PASS: deb package does not have armada tarball
PASS: rpm package does not have armada tarball
PASS: FluxCD tarball is unchanged

Story: 2009138
Task: 46047

Signed-off-by: Lucas Cavalcante <>
Change-Id: I7ca4347c0918e6e46330b7c2e13ed1e5f8cf7d57
2022-08-23 15:52:24 -03:00
Karla Felix fc80ae3738 Remove --use-deprecated legacy-resolver flag
The pip team is planning to depreciate the
'--use-deprecated legacy-resolver'install option.
While a firm date has yet to be set, We need to be
ready for the change.

Test Plan*:

PASS: Verified that tox runs without issues
PASS: Generate Vault package.
PASS: Upload and apply Vault package and check if pod
      is running.

Note(*): Tested on kubernetes 1.21.8


Signed-off-by: Karla Felix <>
Change-Id: I582378ff198430c182fd9197976e9041f2910680
2022-07-06 15:28:55 -04:00
Rei Oliveira eade3934a2 Debian: Add fluxcd app for vault
Add the fluxcd app for vault to the debian build.

Test Cases:

PASS: Check deb install and application upload + apply on debian
PASS: Check application remove and delete on debian
PASS: Simple functional test by creating and retrieving a secret


Story: 2009138
Task: 44486
Signed-off-by: Rei Oliveira <>
Change-Id: I814219a52b44c082ec337db60fb62c31eb68d269
2022-05-20 16:26:53 -03:00
Thiago Brito af1bc235fe Use fluxcd app by default for vault
This commit switches vault to use the fluxcd app by default and also
preserves the armada app on the build for future tests.

PASS Build iso and verify apps
PASS Upload
PASS Apply
PASS Verify resources
PASS Remove
PASS Delete


Story: 2009138
Task: 45346

Signed-off-by: Thiago Brito <>
Change-Id: If898fd914ef85c6ca049c1eb1e0266cd6e85d58b
2022-05-13 14:36:20 +00:00
Thiago Brito b04ebb5b79 Fix vault-app to use upversioned cert-manager
On [1] and [2] cert-manager was migrated to fluxcd and upversioned
to version 1.7.1, but the vault helm-charts are still creating
CRs with apiVersion v1beta2. This commit fixes it.


PASS build vault-fluxcd app
PASS Upload
PASS Apply (verified created resources)
PASS Remove
PASS Delete


Story: 2009837
Task: 45363

Signed-off-by: Thiago Brito <>
Change-Id: I4d61f65f453cdd55f514e8bd45c2c43ce5e45cc3
2022-05-13 11:13:55 -03:00