9dae245d0d
* Added new tenant/project: services * Added two new users with admin roles to 'services' project: ostf and nailgun * Use generated passwords for ostf and nailgun keystone users and remove admin_token * OSTF and nailgun will use their users to validate keystone tokens instead of admin_token * Added new services and endpoints for keystone, ostf, nailgun. Now it's possible to use keystone service catalog to discover their URLs DocImpact Implements: blueprint access-control-master-node-improvments Depends: Ibe3844da784656f02673c32c2f98cb67bbdb3e89 Change-Id: I9860257b1b392be31de8ff9e09b95e9a3c6ba3f7
20 lines
561 B
Plaintext
20 lines
561 B
Plaintext
[adapter]
|
|
server_host = <%= @host %>
|
|
server_port = <%= @port %>
|
|
dbpath = <%= @dbengine %>://<%= @dbuser %>:<%= @dbpass %>@<%= @dbhost %>/<%= @dbname %>
|
|
lock_dir = /var/lock
|
|
nailgun_host = <%= @nailgun_host %>
|
|
nailgun_port = <%= @nailgun_port %>
|
|
log_file = <%= @logfile %>
|
|
after_init_hook = False
|
|
auth_enable = <%= @auth_enable %>
|
|
|
|
[keystone_authtoken]
|
|
auth_protocol=http
|
|
auth_port=<%= @keystone_port %>
|
|
auth_host=<%= @keystone_host %>
|
|
auth_version=v2.0
|
|
admin_user=<%= @keystone_ostf_user %>
|
|
admin_password=<%= @keystone_ostf_pass %>
|
|
admin_tenant_name=services
|