
Originally, Blazar was using its service user to manage objects for physical host reservation, e.g. host aggregates, which by default requires admin rights. Commit 16d5f67ba7020701edbbf09a747f5683b0840c21 started using a dedicated account configured with values climate_username, climate_password, and climate_tenant_name. Commit c9b7307cf3c97d3b48878aca6eda5b7fbc4dcfa7 removed this dedicated account and started using trusts instead, so that operations were performed on behalf of the user creating the lease (with the trustee being the blazar service user). While this works well if users creating leases are admins, non-admin users will get errors because the default Nova policy prevents them from running required operations associated with aggregates and hypervisors. Since it is not clear why a dedicated account for admin operations was required, this patch brings back the approach used before commit 16d5f67ba7020701edbbf09a747f5683b0840c21, which was to use the service account for admin operations. This allows non-admin users to create Blazar leases. The nova client setup is updated to authenticate against Keystone v3. Change-Id: Iad86bb549aec13edd662965d2f91b68c856ae06c Closes-Bug: #1663204
629 B
629 B
Blazar
Overview
OpenStack Reservation Service
Prerequisites
- Keystone v3 API endpoint
- Service account
Configuration
Create identityv3 endpoint
For adding new endpoint for Keystone V3, use the following instructions: 1) keystone service-create --name keystonev3 --type identytiv3 --description "Keystone Identity Service v3" 2) keystone endpoint-create --region <region> --service keystonev3 --publicurl "<auth_protocol>://<auth_host>:5000/v3" --adminurl "<auth_protocol>://<auth_host>:35357/v3" --internalurl "<auth_protocol>://<auth_host>:5000/v3"