Implement X.509 auth for MySQL and Neutron
Related-PROD: PROD-22796
Change-Id: If944a1b0eb775fc0297239896c12dd2ca9864c8e
diff --git a/galera/server/database/ssl/neutron.yml b/galera/server/database/ssl/neutron.yml
new file mode 100644
index 0000000..c8f3761
--- /dev/null
+++ b/galera/server/database/ssl/neutron.yml
@@ -0,0 +1,4 @@
+parameters:
+ _param:
+ mysql_neutron_ssl_option:
+ - SSL: True
\ No newline at end of file
diff --git a/galera/server/database/x509/neutron.yml b/galera/server/database/x509/neutron.yml
new file mode 100644
index 0000000..2c07e05
--- /dev/null
+++ b/galera/server/database/x509/neutron.yml
@@ -0,0 +1,7 @@
+parameters:
+ _param:
+ mysql_neutron_client_ssl_x509_subject: '/C=cz/CN=mysql-neutron-client/L=Prague/O=Mirantis'
+ mysql_neutron_client_ssl_x509_issuer: '/C=cz/CN=Salt Master CA/L=Prague/O=Mirantis'
+ mysql_neutron_ssl_option:
+ - SUBJECT: ${_param:mysql_neutron_client_ssl_x509_subject}
+ - ISSUER: ${_param:mysql_neutron_client_ssl_x509_issuer}
\ No newline at end of file
diff --git a/neutron/control/cluster.yml b/neutron/control/cluster.yml
index 703f196..12baf43 100644
--- a/neutron/control/cluster.yml
+++ b/neutron/control/cluster.yml
@@ -4,9 +4,12 @@
- service.neutron.control.cluster
- system.haproxy.proxy.listen.openstack.neutron
- system.galera.server.database.neutron
+- system.salt.minion.cert.mysql.clients.openstack.neutron
parameters:
_param:
cluster_internal_protocol: 'http'
+ openstack_mysql_x509_enabled: False
+ galera_ssl_enabled: False
linux:
system:
package:
@@ -37,6 +40,14 @@
params: check inter 10s fastinter 2s downinter 3s rise 3 fall 3
neutron:
server:
+ database:
+ x509:
+ enabled: ${_param:openstack_mysql_x509_enabled}
+ ca_file: ${_param:mysql_neutron_ssl_ca_file}
+ key_file: ${_param:mysql_neutron_client_ssl_key_file}
+ cert_file: ${_param:mysql_neutron_client_ssl_cert_file}
+ ssl:
+ enabled: ${_param:galera_ssl_enabled}
role: ${_param:openstack_node_role}
plugin: contrail
identity:
diff --git a/neutron/control/single.yml b/neutron/control/single.yml
index 6196c0a..6ced2f1 100644
--- a/neutron/control/single.yml
+++ b/neutron/control/single.yml
@@ -1,9 +1,12 @@
classes:
- service.neutron.control.single
- system.galera.server.database.neutron
+- system.salt.minion.cert.mysql.clients.openstack.neutron
parameters:
_param:
internal_protocol: 'http'
+ openstack_mysql_x509_enabled: False
+ galera_ssl_enabled: False
linux:
system:
package:
@@ -15,5 +18,12 @@
role: ${_param:openstack_node_role}
database:
host: ${_param:single_address}
+ x509:
+ enabled: ${_param:openstack_mysql_x509_enabled}
+ ca_file: ${_param:mysql_neutron_ssl_ca_file}
+ key_file: ${_param:mysql_neutron_client_ssl_key_file}
+ cert_file: ${_param:mysql_neutron_client_ssl_cert_file}
+ ssl:
+ enabled: ${_param:galera_ssl_enabled}
identity:
protocol: ${_param:internal_protocol}
diff --git a/salt/minion/cert/mysql/clients/openstack/neutron.yml b/salt/minion/cert/mysql/clients/openstack/neutron.yml
new file mode 100644
index 0000000..d5b1cd8
--- /dev/null
+++ b/salt/minion/cert/mysql/clients/openstack/neutron.yml
@@ -0,0 +1,27 @@
+parameters:
+ _param:
+ salt_minion_ca_host: cfg01.${_param:cluster_domain}
+ salt_minion_ca_authority: salt_master_ca
+ mysql_neutron_client_ssl_key_file: /etc/neutron/ssl/mysql/client-key.pem
+ mysql_neutron_client_ssl_cert_file: /etc/neutron/ssl/mysql/client-cert.pem
+ mysql_neutron_ssl_ca_file: /etc/neutron/ssl/mysql/ca-cert.pem
+ salt:
+ minion:
+ cert:
+ mysql-neutron-client:
+ host: ${_param:salt_minion_ca_host}
+ authority: ${_param:salt_minion_ca_authority}
+ common_name: mysql-neutron-client
+ signing_policy: cert_client
+ alternative_names: >
+ IP:${_param:cluster_local_address},
+ DNS:${_param:cluster_local_address},
+ DNS:${linux:system:name},
+ DNS:${linux:network:fqdn}
+ key_usage: "digitalSignature,nonRepudiation,keyEncipherment"
+ key_file: ${_param:mysql_neutron_client_ssl_key_file}
+ cert_file: ${_param:mysql_neutron_client_ssl_cert_file}
+ ca_file: ${_param:mysql_neutron_ssl_ca_file}
+ user: neutron
+ group: neutron
+ mode: 640