Replace internal and external VIP CA with root CA

Replaced "kolla_external_fqdn_cacert" and "kolla_internal_fqdn_cacert" with
"kolla_admin_openrc_cacert". OS_CACERT is now set to the value of
"kolla_admin_openrc_cacert" in the generated admin-openrc.sh file.

Change-Id: If195d5402579cee9a14b91f63f5fde84eb84cccf
Partially-Implements: blueprint add-ssl-internal-network
Depends-On: https://review.opendev.org/#/c/731344/
This commit is contained in:
James Kirsch 2020-06-04 21:27:24 -07:00 committed by Mark Goddard
parent a982d3acbb
commit e3cd02eda4
6 changed files with 11 additions and 27 deletions

View File

@ -763,8 +763,7 @@ kolla_enable_tls_external: "{{ kolla_enable_tls_internal if kolla_same_external_
kolla_certificates_dir: "{{ node_config }}/certificates" kolla_certificates_dir: "{{ node_config }}/certificates"
kolla_external_fqdn_cert: "{{ kolla_certificates_dir }}/haproxy.pem" kolla_external_fqdn_cert: "{{ kolla_certificates_dir }}/haproxy.pem"
kolla_internal_fqdn_cert: "{{ kolla_certificates_dir }}/haproxy-internal.pem" kolla_internal_fqdn_cert: "{{ kolla_certificates_dir }}/haproxy-internal.pem"
kolla_external_fqdn_cacert: "{{ kolla_certificates_dir }}/ca/haproxy.crt" kolla_admin_openrc_cacert: ""
kolla_internal_fqdn_cacert: "{{ kolla_certificates_dir }}/ca/haproxy-internal.crt"
kolla_copy_ca_into_containers: "no" kolla_copy_ca_into_containers: "no"
kolla_verify_tls_backend: "yes" kolla_verify_tls_backend: "yes"
haproxy_backend_cacert: "{{ 'ca-certificates.crt' if kolla_base_distro in ['debian', 'ubuntu'] else 'ca-bundle.trust.crt' }}" haproxy_backend_cacert: "{{ 'ca-certificates.crt' if kolla_base_distro in ['debian', 'ubuntu'] else 'ca-bundle.trust.crt' }}"

View File

@ -64,12 +64,6 @@
src: "{{ external_dir }}" src: "{{ external_dir }}"
dest: "{{ kolla_external_fqdn_cert }}" dest: "{{ kolla_external_fqdn_cert }}"
mode: "0660" mode: "0660"
- name: Creating external CA Certificate File
copy:
src: "{{ root_dir }}/root.crt"
dest: "{{ kolla_external_fqdn_cacert }}"
mode: "0660"
when: when:
- kolla_enable_tls_external | bool - kolla_enable_tls_external | bool
@ -80,13 +74,6 @@
dest: "{{ kolla_internal_fqdn_cert }}" dest: "{{ kolla_internal_fqdn_cert }}"
remote_src: yes remote_src: yes
mode: "0660" mode: "0660"
- name: Copy the external CA Certificate file to be the internal when internal + external are same network
copy:
src: "{{ kolla_external_fqdn_cacert }}"
dest: "{{ kolla_internal_fqdn_cacert }}"
remote_src: yes
mode: "0660"
when: when:
- kolla_enable_tls_external | bool - kolla_enable_tls_external | bool
- kolla_enable_tls_internal | bool - kolla_enable_tls_internal | bool
@ -139,12 +126,6 @@
mode: "0660" mode: "0660"
state: file state: file
- name: Creating internal CA Certificate File
copy:
src: "{{ root_dir }}/root.crt"
dest: "{{ kolla_internal_fqdn_cacert }}"
mode: "0660"
- name: Creating internal Server PEM File - name: Creating internal Server PEM File
assemble: assemble:
regexp: '.*[crt|key]' regexp: '.*[crt|key]'

View File

@ -18,8 +18,6 @@ export OS_MISTRAL_ENDPOINT_TYPE=internalURL
export OS_IDENTITY_API_VERSION=3 export OS_IDENTITY_API_VERSION=3
export OS_REGION_NAME={{ openstack_region_name }} export OS_REGION_NAME={{ openstack_region_name }}
export OS_AUTH_PLUGIN=password export OS_AUTH_PLUGIN=password
{% if kolla_enable_tls_internal | bool and kolla_internal_fqdn_cacert %} {% if kolla_admin_openrc_cacert is not none and kolla_admin_openrc_cacert | length > 0 %}
export OS_CACERT={{ kolla_internal_fqdn_cacert }} export OS_CACERT={{ kolla_admin_openrc_cacert }}
{% elif kolla_enable_tls_external | bool and kolla_external_fqdn_cacert %}
export OS_CACERT={{ kolla_external_fqdn_cacert }}
{% endif %} {% endif %}

View File

@ -189,8 +189,7 @@
#kolla_certificates_dir: "{{ node_config }}/certificates" #kolla_certificates_dir: "{{ node_config }}/certificates"
#kolla_external_fqdn_cert: "{{ kolla_certificates_dir }}/haproxy.pem" #kolla_external_fqdn_cert: "{{ kolla_certificates_dir }}/haproxy.pem"
#kolla_internal_fqdn_cert: "{{ kolla_certificates_dir }}/haproxy-internal.pem" #kolla_internal_fqdn_cert: "{{ kolla_certificates_dir }}/haproxy-internal.pem"
#kolla_external_fqdn_cacert: "{{ kolla_certificates_dir }}/ca/haproxy.crt" #kolla_admin_openrc_cacert: ""
#kolla_internal_fqdn_cacert: "{{ kolla_certificates_dir }}/ca/haproxy-internal.crt"
#kolla_copy_ca_into_containers: "no" #kolla_copy_ca_into_containers: "no"
#kolla_verify_tls_backend: "yes" #kolla_verify_tls_backend: "yes"
#haproxy_backend_cacert: "{{ 'ca-certificates.crt' if kolla_base_distro in ['debian', 'ubuntu'] else 'ca-bundle.trust.crt' }}" #haproxy_backend_cacert: "{{ 'ca-certificates.crt' if kolla_base_distro in ['debian', 'ubuntu'] else 'ca-bundle.trust.crt' }}"

View File

@ -9,3 +9,9 @@ features:
certificates and signs them using the root CA. If backend TLS is enabled, certificates and signs them using the root CA. If backend TLS is enabled,
the command will generate the backend certificate and sign it with the the command will generate the backend certificate and sign it with the
root CA. root CA.
upgrade:
- |
Replaced ``kolla_external_fqdn_cacert`` and ``kolla_internal_fqdn_cacert``
with ``kolla_admin_openrc_cacert``, which by default is not set.
``OS_CACERT`` is now set to the value of ``kolla_admin_openrc_cacert`` in
the generated ``admin-openrc.sh`` file.

View File

@ -127,6 +127,7 @@ openstack_cacert: "/etc/ssl/certs/ca-certificates.crt"
{% if base_distro == "centos" %} {% if base_distro == "centos" %}
openstack_cacert: "/etc/pki/tls/certs/ca-bundle.crt" openstack_cacert: "/etc/pki/tls/certs/ca-bundle.crt"
{% endif %} {% endif %}
kolla_admin_openrc_cacert: "{% raw %}{{ kolla_certificates_dir }}{% endraw %}/ca/root.crt"
{% endif %} {% endif %}
{% if scenario == 'linuxbridge' %} {% if scenario == 'linuxbridge' %}