f7983d4bdf
The default value for the admin_token parameter was removed from the
sample config file in ea952bd2
, so the recommendation in the developer
documentation to use it without first setting it will result in an
error. This patch updates the developer documentation and the
sample_data.sh script to use the Identity v3 API and to follow the
latest recommendations for bootstrapping an admin user with which to
insert sample data.
Change-Id: I424ff6129d4ddcd63fb2bed4eabcbe910ab0153e
253 lines
9.1 KiB
Bash
Executable File
253 lines
9.1 KiB
Bash
Executable File
#!/usr/bin/env bash
|
|
|
|
# Copyright 2013 OpenStack Foundation
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
# Sample initial data for Keystone using python-openstackclient
|
|
#
|
|
# This script is based on the original DevStack keystone_data.sh script.
|
|
#
|
|
# It demonstrates how to bootstrap Keystone with an administrative user
|
|
# using the `keystone-manage bootstrap` command. It will get the admin_port
|
|
# from keystone.conf if available.
|
|
#
|
|
# Disable creation of endpoints by setting DISABLE_ENDPOINTS environment variable.
|
|
# Use this with the Catalog Templated backend.
|
|
#
|
|
# A EC2-compatible credential is created for the admin user and
|
|
# placed in etc/ec2rc.
|
|
#
|
|
# Tenant User Roles
|
|
# -------------------------------------------------------
|
|
# demo admin admin
|
|
# service glance service
|
|
# service nova service
|
|
# service ec2 service
|
|
# service swift service
|
|
# service neutron service
|
|
|
|
# By default, passwords used are those in the OpenStack Install and Deploy Manual.
|
|
# One can override these (publicly known, and hence, insecure) passwords by setting the appropriate
|
|
# environment variables. A common default password for all the services can be used by
|
|
# setting the "SERVICE_PASSWORD" environment variable.
|
|
|
|
# Test to verify that the openstackclient is installed, if not exit
|
|
type openstack >/dev/null 2>&1 || {
|
|
echo >&2 "openstackclient is not installed. Please install it to use this script. Aborting."
|
|
exit 1
|
|
}
|
|
|
|
ADMIN_PASSWORD=${ADMIN_PASSWORD:-secrete}
|
|
NOVA_PASSWORD=${NOVA_PASSWORD:-${SERVICE_PASSWORD:-nova}}
|
|
GLANCE_PASSWORD=${GLANCE_PASSWORD:-${SERVICE_PASSWORD:-glance}}
|
|
EC2_PASSWORD=${EC2_PASSWORD:-${SERVICE_PASSWORD:-ec2}}
|
|
SWIFT_PASSWORD=${SWIFT_PASSWORD:-${SERVICE_PASSWORD:-swiftpass}}
|
|
NEUTRON_PASSWORD=${NEUTRON_PASSWORD:-${SERVICE_PASSWORD:-neutron}}
|
|
|
|
CONTROLLER_PUBLIC_ADDRESS=${CONTROLLER_PUBLIC_ADDRESS:-localhost}
|
|
CONTROLLER_ADMIN_ADDRESS=${CONTROLLER_ADMIN_ADDRESS:-localhost}
|
|
CONTROLLER_INTERNAL_ADDRESS=${CONTROLLER_INTERNAL_ADDRESS:-localhost}
|
|
|
|
TOOLS_DIR=$(cd $(dirname "$0") && pwd)
|
|
KEYSTONE_CONF=${KEYSTONE_CONF:-/etc/keystone/keystone.conf}
|
|
if [[ -r "$KEYSTONE_CONF" ]]; then
|
|
EC2RC="$(dirname "$KEYSTONE_CONF")/ec2rc"
|
|
elif [[ -r "$TOOLS_DIR/../etc/keystone.conf" ]]; then
|
|
# assume git checkout
|
|
KEYSTONE_CONF="$TOOLS_DIR/../etc/keystone.conf"
|
|
EC2RC="$TOOLS_DIR/../etc/ec2rc"
|
|
else
|
|
KEYSTONE_CONF=""
|
|
EC2RC="ec2rc"
|
|
fi
|
|
|
|
# Extract some info from Keystone's configuration file
|
|
if [[ -r "$KEYSTONE_CONF" ]]; then
|
|
CONFIG_ADMIN_PORT=$(sed 's/[[:space:]]//g' $KEYSTONE_CONF | grep ^admin_port= | cut -d'=' -f2)
|
|
if [[ -z "${CONFIG_ADMIN_PORT}" ]]; then
|
|
# default config options are commented out, so lets try those
|
|
CONFIG_ADMIN_PORT=$(sed 's/[[:space:]]//g' $KEYSTONE_CONF | grep ^\#admin_port= | cut -d'=' -f2)
|
|
fi
|
|
fi
|
|
|
|
export OS_USERNAME=admin
|
|
export OS_PASSWORD=$ADMIN_PASSWORD
|
|
export OS_PROJECT_NAME=admin
|
|
export OS_USER_DOMAIN_ID=default
|
|
export OS_PROJECT_DOMAIN_ID=default
|
|
export OS_IDENTITY_API_VERSION=3
|
|
export OS_AUTH_URL=http://$CONTROLLER_PUBLIC_ADDRESS:${CONFIG_ADMIN_PORT:-35357}/v3
|
|
|
|
function get_id () {
|
|
echo `"$@" | grep ' id ' | awk '{print $4}'`
|
|
}
|
|
|
|
export OS_BOOTSTRAP_PASSWORD=$ADMIN_PASSWORD
|
|
export OS_BOOTSTRAP_REGION_ID=RegionOne
|
|
export OS_BOOTSTRAP_ADMIN_URL="http://$CONTROLLER_PUBLIC_ADDRESS:\$(public_port)s/v3"
|
|
export OS_BOOTSTRAP_PUBLIC_URL="http://$CONTROLLER_ADMIN_ADDRESS:\$(admin_port)s/v3"
|
|
export OS_BOOTSTRAP_INTERNAL_URL="http://$CONTROLLER_INTERNAL_ADDRESS:\$(public_port)s/v3"
|
|
keystone-manage bootstrap
|
|
|
|
#
|
|
# Default tenant
|
|
#
|
|
openstack project create demo \
|
|
--description "Default Tenant"
|
|
|
|
#
|
|
# Service tenant
|
|
#
|
|
openstack role create service
|
|
|
|
openstack project create service \
|
|
--description "Service Tenant"
|
|
|
|
openstack user create glance --project service\
|
|
--password "${GLANCE_PASSWORD}"
|
|
|
|
openstack role add --user glance \
|
|
--project service \
|
|
service
|
|
|
|
openstack user create nova --project service\
|
|
--password "${NOVA_PASSWORD}"
|
|
|
|
openstack role add --user nova \
|
|
--project service \
|
|
service
|
|
|
|
openstack user create ec2 --project service \
|
|
--password "${EC2_PASSWORD}"
|
|
|
|
openstack role add --user ec2 \
|
|
--project service \
|
|
service
|
|
|
|
openstack user create swift --project service \
|
|
--password "${SWIFT_PASSWORD}" \
|
|
|
|
openstack role add --user swift \
|
|
--project service \
|
|
service
|
|
|
|
openstack user create neutron --project service \
|
|
--password "${NEUTRON_PASSWORD}" \
|
|
|
|
openstack role add --user neutron \
|
|
--project service \
|
|
service
|
|
|
|
#
|
|
# Nova service
|
|
#
|
|
openstack service create --name=nova \
|
|
--description="Nova Compute Service" \
|
|
compute
|
|
if [[ -z "$DISABLE_ENDPOINTS" ]]; then
|
|
openstack endpoint create --region RegionOne \
|
|
compute public "http://$CONTROLLER_PUBLIC_ADDRESS:8774/v2/\$(tenant_id)s"
|
|
openstack endpoint create --region RegionOne \
|
|
compute admin "http://$CONTROLLER_ADMIN_ADDRESS:8774/v2/\$(tenant_id)s"
|
|
openstack endpoint create --region RegionOne \
|
|
compute internal "http://$CONTROLLER_INTERNAL_ADDRESS:8774/v2/\$(tenant_id)s"
|
|
fi
|
|
|
|
#
|
|
# Volume service
|
|
#
|
|
openstack service create --name=volume \
|
|
--description="Cinder Volume Service" \
|
|
volume
|
|
if [[ -z "$DISABLE_ENDPOINTS" ]]; then
|
|
openstack endpoint create --region RegionOne \
|
|
volume public "http://$CONTROLLER_PUBLIC_ADDRESS:8776/v1/\$(tenant_id)s"
|
|
openstack endpoint create --region RegionOne \
|
|
volume admin "http://$CONTROLLER_ADMIN_ADDRESS:8776/v1/\$(tenant_id)s"
|
|
openstack endpoint create --region RegionOne \
|
|
volume internal "http://$CONTROLLER_INTERNAL_ADDRESS:8776/v1/\$(tenant_id)s"
|
|
fi
|
|
|
|
#
|
|
# Image service
|
|
#
|
|
openstack service create --name=glance \
|
|
--description="Glance Image Service" \
|
|
image
|
|
if [[ -z "$DISABLE_ENDPOINTS" ]]; then
|
|
openstack endpoint create --region RegionOne \
|
|
image public "http://$CONTROLLER_PUBLIC_ADDRESS:9292"
|
|
openstack endpoint create --region RegionOne \
|
|
image admin "http://$CONTROLLER_ADMIN_ADDRESS:9292"
|
|
openstack endpoint create --region RegionOne \
|
|
image internal "http://$CONTROLLER_INTERNAL_ADDRESS:9292"
|
|
fi
|
|
|
|
#
|
|
# EC2 service
|
|
#
|
|
openstack service create --name=ec2 \
|
|
--description="EC2 Compatibility Layer" \
|
|
ec2
|
|
if [[ -z "$DISABLE_ENDPOINTS" ]]; then
|
|
openstack endpoint create --region RegionOne \
|
|
ec2 public "http://$CONTROLLER_PUBLIC_ADDRESS:8773/services/Cloud"
|
|
openstack endpoint create --region RegionOne \
|
|
ec2 admin "http://$CONTROLLER_ADMIN_ADDRESS:8773/services/Admin"
|
|
openstack endpoint create --region RegionOne \
|
|
ec2 internal "http://$CONTROLLER_INTERNAL_ADDRESS:8773/services/Cloud"
|
|
fi
|
|
|
|
#
|
|
# Swift service
|
|
#
|
|
openstack service create --name=swift \
|
|
--description="Swift Object Storage Service" \
|
|
object-store
|
|
if [[ -z "$DISABLE_ENDPOINTS" ]]; then
|
|
openstack endpoint create --region RegionOne \
|
|
object-store public "http://$CONTROLLER_PUBLIC_ADDRESS:8080/v1/AUTH_\$(tenant_id)s"
|
|
openstack endpoint create --region RegionOne \
|
|
object-store admin "http://$CONTROLLER_ADMIN_ADDRESS:8080/v1"
|
|
openstack endpoint create --region RegionOne \
|
|
object-store internal "http://$CONTROLLER_INTERNAL_ADDRESS:8080/v1/AUTH_\$(tenant_id)s"
|
|
fi
|
|
|
|
#
|
|
# Neutron service
|
|
#
|
|
openstack service create --name=neutron \
|
|
--description="Neutron Network Service" \
|
|
network
|
|
if [[ -z "$DISABLE_ENDPOINTS" ]]; then
|
|
openstack endpoint create --region RegionOne \
|
|
network public "http://$CONTROLLER_PUBLIC_ADDRESS:9696"
|
|
openstack endpoint create --region RegionOne \
|
|
network admin "http://$CONTROLLER_ADMIN_ADDRESS:9696"
|
|
openstack endpoint create --region RegionOne \
|
|
network internal "http://$CONTROLLER_INTERNAL_ADDRESS:9696"
|
|
fi
|
|
|
|
# create ec2 creds and parse the secret and access key returned
|
|
ADMIN_USER=$(get_id openstack user show admin)
|
|
RESULT=$(openstack ec2 credentials create --project service --user $ADMIN_USER)
|
|
ADMIN_ACCESS=`echo "$RESULT" | grep access | awk '{print $4}'`
|
|
ADMIN_SECRET=`echo "$RESULT" | grep secret | awk '{print $4}'`
|
|
|
|
# write the secret and access to ec2rc
|
|
cat > $EC2RC <<EOF
|
|
ADMIN_ACCESS=$ADMIN_ACCESS
|
|
ADMIN_SECRET=$ADMIN_SECRET
|
|
EOF
|