Implement X.509 auth between Rabbitmq and Nova
Change-Id: I2481c2cb06c529633a6e944e5fb212b01e98a279
Related-Prod: PROD-22766
diff --git a/nova/_ssl/rabbitmq.sls b/nova/_ssl/rabbitmq.sls
new file mode 100644
index 0000000..e3e2ec0
--- /dev/null
+++ b/nova/_ssl/rabbitmq.sls
@@ -0,0 +1,77 @@
+{% from "nova/map.jinja" import controller, compute with context %}
+
+nova_ssl_rabbitmq:
+ test.show_notification:
+ - text: "Running nova._ssl.rabbitmq"
+
+{%- if controller.message_queue.get('x509',{}).get('enabled',False) %}
+
+ {%- set ca_file=controller.message_queue.x509.ca_file %}
+ {%- set key_file=controller.message_queue.x509.key_file %}
+ {%- set cert_file=controller.message_queue.x509.cert_file %}
+
+rabbitmq_nova_ssl_x509_ca:
+ {%- if controller.message_queue.x509.cacert is defined %}
+ file.managed:
+ - name: {{ ca_file }}
+ - contents_pillar: nova:controller:message_queue:x509:cacert
+ - mode: 444
+ - user: nova
+ - group: nova
+ - makedirs: true
+ {%- else %}
+ file.exists:
+ - name: {{ ca_file }}
+ {%- endif %}
+
+rabbitmq_nova_client_ssl_cert:
+ {%- if controller.message_queue.x509.cert is defined %}
+ file.managed:
+ - name: {{ cert_file }}
+ - contents_pillar: nova:controller:message_queue:x509:cert
+ - mode: 440
+ - user: nova
+ - group: nova
+ - makedirs: true
+ {%- else %}
+ file.exists:
+ - name: {{ cert_file }}
+ {%- endif %}
+
+rabbitmq_nova_client_ssl_private_key:
+ {%- if controller.message_queue.x509.key is defined %}
+ file.managed:
+ - name: {{ key_file }}
+ - contents_pillar: nova:controller:message_queue:x509:key
+ - mode: 400
+ - user: nova
+ - group: nova
+ - makedirs: true
+ {%- else %}
+ file.exists:
+ - name: {{ key_file }}
+ {%- endif %}
+
+rabbitmq_nova_ssl_x509_set_user_and_group:
+ file.managed:
+ - names:
+ - {{ ca_file }}
+ - {{ cert_file }}
+ - {{ key_file }}
+ - user: nova
+ - group: nova
+
+ {% elif controller.message_queue.get('ssl',{}).get('enabled',False) %}
+rabbitmq_ca_nova_client_controller:
+ {%- if controller.message_queue.ssl.cacert is defined %}
+ file.managed:
+ - name: {{ controller.message_queue.ssl.cacert_file }}
+ - contents_pillar: nova:controller:message_queue:ssl:cacert
+ - mode: 0444
+ - makedirs: true
+ {%- else %}
+ file.exists:
+ - name: {{ controller.message_queue.ssl.get('cacert_file', controller.cacert_file) }}
+ {%- endif %}
+
+{%- endif %}
diff --git a/nova/controller.sls b/nova/controller.sls
index 2b5d515..9052c62 100644
--- a/nova/controller.sls
+++ b/nova/controller.sls
@@ -11,7 +11,7 @@
# Move to appropriate upgrade phase
- nova.db.online_sync
- nova._ssl.mysql
-
+ - nova._ssl.rabbitmq
{%- if grains.os_family == 'Debian' %}
debconf-set-prerequisite:
pkg.installed:
@@ -61,6 +61,7 @@
- require_in:
- pkg: nova_controller_packages
- sls: nova._ssl.mysql
+ - sls: nova._ssl.rabbitmq
{%- if controller.version not in ["juno", "kilo", "liberty", "mitaka", "newton"] %}
- pkg: nova_placement_package
{%- endif %}
@@ -171,6 +172,7 @@
- require:
- pkg: nova_controller_packages
- sls: nova._ssl.mysql
+ - sls: nova._ssl.rabbitmq
- require_in:
- sls: nova.db.offline_sync
- sls: nova.db.online_sync
@@ -450,6 +452,7 @@
- require:
- sls: nova.db.offline_sync
- sls: nova._ssl.mysql
+ - sls: nova._ssl.rabbitmq
- require_in:
- sls: nova.db.online_sync
- watch:
diff --git a/nova/files/pike/nova-controller.conf.Debian b/nova/files/pike/nova-controller.conf.Debian
index 34451c2..3137168 100644
--- a/nova/files/pike/nova-controller.conf.Debian
+++ b/nova/files/pike/nova-controller.conf.Debian
@@ -8007,6 +8007,12 @@
kombu_ssl_ca_certs = {{ controller.message_queue.ssl.get('cacert_file', controller.cacert_file) }}
{%- endif %}
+{%- if controller.message_queue.get('x509',{}).get('enabled', False) %}
+kombu_ssl_keyfile = {{ controller.message_queue.x509.key_file}}
+
+kombu_ssl_certfile = {{ controller.message_queue.x509.cert_file}}
+{%- endif %}
+
[oslo_messaging_zmq]
#