On 06/21/2016 02:42 PM, Juan Antonio Osorio wrote:
Adam, this is pretty much the proposal for TLS for the internal services (which you were added already as a reviewer for the spec) https://review.openstack.org/#/c/282307/ The services in the overcloud fetching their certificates via certmonger is actually work in progress, which you could review here: https://review.openstack.org/#/q/status:open+topic:bp/tls-via-certmonger Only thing is that currently this approach assumes FreeIPA, so the nodes need to be registered beforehand (and then trigger self-enrollment via some hooks). Also, the spec that I'm pointing to doesn't require the CA to be the in undercloud and it could be another node. But hey, if we could deploy Anchor on the Undercloud, then that could be used, so we wouldn't need another node for this means.


Yes, I was basing my proposal her around your work. I want there to be something guaranteed for Certmonger to talk to, and I realize that Heat can probably play that role.

Anchor might also be viable here, I just don't want to force it as a dependency. We are talking the selfsigned use case here, so it should be minimal overhead.

Anyway, in each of the service's profiles (the puppet manifests) I'm setting up the tracking of the certificates with the certmonger's puppet manifest.

BR

On Tue, Jun 21, 2016 at 5:39 PM, Adam Young <ayo...@redhat.com <mailto:ayo...@redhat.com>> wrote:

    When deploying the overcloud with TLS, the current "no additional
    technology" approach is to use opensssl and self signed. While
    this works for a Proof of concept, it does not make sense if the
    users need to access the resources from remote systems.

    It seems to me that the undercloud, as the system of record for
    deploying the overcloud, should be responsible for centralizing
    the signing of certificates.

    When deploying a service, the puppet module sure trigger a getcert
    call, which registers the cert with  Certmonger. Certmonger is
    responsible for making sure the CSR gets to the signing authority,
    and fetching the cert.

    Certmonger works via helper apps.  While there is currently a
    "self signed" helper, this does not do much if two or more systems
    need to have the same CA sign their certs.

    It would be fairly simple to write a certmonger helper program
    that sends a CSR from a controller or compute node to the
    undercloud, has the Heat instance on the undercloud validate the
    request, and then pass it on to the signing application.

    I'm not really too clear on how callbacks are  done from the
    os-collect-config processes to Heat, but I am guessing it is some
    form of Rest API that could be reused for this work flow?


    I would see this as the lowest level of deployment.  We can make
    use of Anchor or Dogtag helper apps already.  This might also
    prove a decent middleground for people that need an automated
    approach to tie in with a third party CA, where they need some
    confirmation from the deployment process that the data in the CSR
    is valid and should be signed.

    __________________________________________________________________________
    OpenStack Development Mailing List (not for usage questions)
    Unsubscribe:
    openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
    <http://openstack-dev-requ...@lists.openstack.org?subject:unsubscribe>
    http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev




--
Juan Antonio Osorio R.
e-mail: jaosor...@gmail.com <mailto:jaosor...@gmail.com>



__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to