Skip to content

Commit

Permalink
Use HashiCorp Vault for Skyline deployment
Browse files Browse the repository at this point in the history
This commit will consume the secrets from HashiCorp Vault using
vault-secretes-operator for the Skyline deployment.
  • Loading branch information
pratik705 committed Mar 27, 2024
1 parent d6e56ef commit c6f604d
Show file tree
Hide file tree
Showing 5 changed files with 137 additions and 17 deletions.
93 changes: 76 additions & 17 deletions docs/openstack-skyline.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,33 +4,92 @@

Skyline is an alternative Web UI for OpenStack. If you deploy horizon there's no need for Skyline.

## Create secrets
## Pre-requsites

- Vault should be installed by following the instructions in [vault documentation](https://docs.rackspacecloud.com/vault/)
- User has access to `osh/skyline/` path in the Vault

## Create secrets in the vault

### Login to the vault

``` shell
kubectl exec -it vault-0 -n vault -- \
vault login -method userpass username=skyline
```

### List the existing secrets from `osh/skyline/`

``` shell
kubectl exec --stdin=true --tty=true vault-0 -n vault -- \
vault kv list osh/skyline
```

### Create the secrets

Skyline is a little different because there's no helm integration. Given this difference the deployment is far simpler, and all secrets can be managed in one object.

- Skyline-apiserver-secrets:

``` shell
kubectl exec --stdin=true --tty=true vault-0 -n vault -- \
vault kv put -mount=osh/skyline skyline-apiserver-secrets \
service-username=skyline \
service-password=$(< /dev/urandom tr -dc _A-Za-z0-9 | head -c${1:-32};echo;) \
service-domain=service \
service-project=service \
service-project-domain=service \
db-endpoint=maxscale-galera.openstack.svc.cluster.local \
db-name=skyline \
db-username=skyline \
db-password=$(< /dev/urandom tr -dc _A-Za-z0-9 | head -c${1:-32};echo;) \
secret-key=$(< /dev/urandom tr -dc _A-Za-z0-9 | head -c${1:-32};echo;) \
keystone-endpoint=http://keystone-api.openstack.svc.cluster.local:5000 \
default-region=RegionOne
```

### Validate the secrets

``` shell
kubectl exec --stdin=true --tty=true vault-0 -n vault -- \
vault kv list osh/skyline
kubectl exec --stdin=true --tty=true vault-0 -n vault -- \
vault kv get -mount=osh/skyline skyline-apiserver-secrets
```

## Install Skyline

- Ensure that the `vault-ca-secret` Kubernetes Secret exists in the OpenStack namespace containing the Vault CA certificate:

```shell
kubectl get secret vault-ca-secret -o yaml -n openstack
```

- If it is absent, create one using the following command:

``` shell
kubectl create secret generic vault-ca-secret \
--from-literal=ca.crt="$(kubectl get secret vault-tls-secret \
-o jsonpath='{.data.ca\.crt}' -n vault | base64 -d -)" -n openstack
```

- Deploy the necessary Vault resources to create Kubernetes secrets required by the Skyline installation:

``` shell
kubectl apply -k /opt/genestack/kustomize/skyline/base/vault/
```

- Validate whether the required Kubernetes secrets from Vault are populated:

``` shell
kubectl --namespace openstack \
create secret generic skyline-apiserver-secrets \
--type Opaque \
--from-literal=service-username="skyline" \
--from-literal=service-password="$(< /dev/urandom tr -dc _A-Za-z0-9 | head -c${1:-32};echo;)" \
--from-literal=service-domain="service" \
--from-literal=service-project="service" \
--from-literal=service-project-domain="service" \
--from-literal=db-endpoint="maxscale-galera.openstack.svc.cluster.local" \
--from-literal=db-name="skyline" \
--from-literal=db-username="skyline" \
--from-literal=db-password="$(< /dev/urandom tr -dc _A-Za-z0-9 | head -c${1:-32};echo;)" \
--from-literal=secret-key="$(< /dev/urandom tr -dc _A-Za-z0-9 | head -c${1:-32};echo;)" \
--from-literal=keystone-endpoint="http://keystone-api.openstack.svc.cluster.local:5000" \
--from-literal=default-region="RegionOne"
kubectl get secrets -n openstack
```

!!! note

All the configuration is in this one secret, so be sure to set your entries accordingly.

## Run the deployment
### Deploy Skyline

!!! tip

Expand Down
5 changes: 5 additions & 0 deletions kustomize/skyline/base/vault/kustomization.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
namespace: openstack
resources:
- vaultauth.yaml
- vaultconnection.yaml
- skyline-apiserver-secrets.yaml
24 changes: 24 additions & 0 deletions kustomize/skyline/base/vault/skyline-apiserver-secrets.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
apiVersion: secrets.hashicorp.com/v1beta1
kind: VaultStaticSecret
metadata:
name: skyline-apiserver-secrets
namespace: openstack
spec:
type: kv-v2

# mount path
mount: 'osh/skyline'

# path of the secret
path: skyline-apiserver-secrets

# dest k8s secret
destination:
name: skyline-apiserver-secrets
create: true

# static secret refresh interval
refreshAfter: 30s

# Name of the CRD to authenticate to Vault
vaultAuthRef: vault-auth
14 changes: 14 additions & 0 deletions kustomize/skyline/base/vault/vaultauth.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
apiVersion: secrets.hashicorp.com/v1beta1
kind: VaultAuth
metadata:
name: vault-auth
namespace: openstack
spec:
method: kubernetes
mount: genestack
kubernetes:
role: osh
serviceAccount: default
audiences:
- vault
vaultConnectionRef: vault-connection
18 changes: 18 additions & 0 deletions kustomize/skyline/base/vault/vaultconnection.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
apiVersion: secrets.hashicorp.com/v1beta1
kind: VaultConnection
metadata:
namespace: openstack
name: vault-connection
spec:
# required configuration
# address to the Vault server.
address: https://vault.vault.svc.cluster.local:8200
# optional configuration
# HTTP headers to be included in all Vault requests.
# headers: []
# TLS server name to use as the SNI host for TLS connections.
# tlsServerName: ""
# skip TLS verification for TLS connections to Vault.
skipTLSVerify: false
# the trusted PEM encoded CA certificate chain stored in a Kubernetes Secret
caCertSecretRef: "vault-ca-secret"

0 comments on commit c6f604d

Please sign in to comment.