Skip to content

Commit 7e11de6

Browse files
authored
Merge pull request #49 from stackhpc/external-tls
Enable external TLS using Vault CA
2 parents b35ff26 + 1f14861 commit 7e11de6

File tree

1 file changed

+14
-2
lines changed

1 file changed

+14
-2
lines changed

templates/deploy-openstack.tpl

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,12 @@ kayobe overcloud service deploy --skip-tags os_capacity -kt haproxy
9191
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/vault-deploy-overcloud.yml
9292
ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/vault/overcloud-vault-keys.json
9393

94+
# Generate external tls certificates
95+
if [[ -f $KAYOBE_CONFIG_PATH/ansible/vault-generate-test-external-tls.yml ]]; then
96+
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/vault-generate-test-external-tls.yml
97+
ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/certificates/haproxy.pem
98+
fi
99+
94100
# Generate internal tls certificates
95101
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/vault-generate-internal-tls.yml
96102
ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/certificates/haproxy-internal.pem
@@ -102,6 +108,7 @@ ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH
102108
%{ endfor ~}
103109

104110
# Set config to use tls
111+
sed -i 's/# kolla_enable_tls_external: true/kolla_enable_tls_external: true/g' $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla.yml
105112
sed -i 's/# kolla_enable_tls_internal: true/kolla_enable_tls_internal: true/g' $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla.yml
106113
cat $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/globals-tls-config.yml >> $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/globals.yml
107114

@@ -121,7 +128,7 @@ kayobe overcloud service deploy
121128
%{ if deploy_wazuh }
122129
# Deploy Wazuh
123130
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-secrets.yml
124-
ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH/environments/ci-multinode/wazuh-secrets.yml
131+
ansible-vault encrypt --vault-password-file ~/vault.password $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/wazuh-secrets.yml
125132
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-manager.yml
126133
kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/wazuh-agent.yml
127134
%{ endif }
@@ -133,7 +140,12 @@ set +x
133140
source $${KOLLA_CONFIG_PATH}/public-openrc.sh
134141
set -x
135142

136-
~/src/openstack-config/tools/openstack-config -- -e ansible_user=${ ssh_user }
143+
# Add the Vault CA to the trust store on the seed.
144+
scp -oStrictHostKeyChecking=no $KAYOBE_CONFIG_PATH/environments/$KAYOBE_ENVIRONMENT/kolla/certificates/ca/vault.crt ${ ssh_user }@${ seed_addr }:
145+
ssh -oStrictHostKeyChecking=no ${ ssh_user }@${ seed_addr } sudo cp vault.crt /etc/pki/ca-trust/source/anchors/OS-TLS-ROOT.crt
146+
ssh -oStrictHostKeyChecking=no ${ ssh_user }@${ seed_addr } sudo update-ca-trust
147+
148+
~/src/openstack-config/tools/openstack-config
137149

138150
git -C $${config_directories[kayobe]} submodule init
139151
git -C $${config_directories[kayobe]} submodule update

0 commit comments

Comments
 (0)