Restrict nova migration ssh tunnel
authorOliver Walsh <owalsh@redhat.com>
Wed, 19 Apr 2017 13:39:42 +0000 (14:39 +0100)
committerAlex Schultz <aschultz@redhat.com>
Thu, 1 Jun 2017 18:33:46 +0000 (18:33 +0000)
commitfd20b306b0bb4be2f5b251b45daeda5d215fb618
tree290a5e86ebe9752c66d083783c3df02f5fc48e1d
parente4a293695eca090950675d809828cfaa8cc4072a
Restrict nova migration ssh tunnel

This change enhances the security of the migration ssh tunnel:
- The ssh authorized_keys file is only writeable by root.
- Creates a new user for migration instead of using root/nova.
- Disables SSH forwarding for this user.
- Optionally restricts the networks that this user can connect from.
- Uses an ssh wrapper command to whitelist the commands that this user can run
  over ssh.

Requires the openstack-nova-migration package from
https://review.rdoproject.org/r/6327

bp tripleo-cold-migration

Change-Id: Idb56acd1e1ecb5a5fd4d942969be428cc9cbe293
(cherry picked from commit f8ca94a5b7c7658631f5b0a9b010251ebbcff65e)
manifests/profile/base/nova.pp
releasenotes/notes/cold_migration_security-1543136408c76459.yaml [new file with mode: 0644]
spec/classes/tripleo_profile_base_nova_spec.rb
spec/fixtures/hieradata/default.yaml