
That patch allows a developer to remotely run a pydev debugger and have the keystone-all process connect back to it. Two command line options are introduced: --pydev-debug-host <host> --pydev-debug-port <port> both of the above options are required to enable this behavior. This patch only enables this behavior when the service is started with keystone-all. In the future parts of this patch can be used to enable this behavior when running in Apache. Change-Id: I92f99fa34112336a96e42e8261b7313f23ee994e
233 lines
8.6 KiB
Python
233 lines
8.6 KiB
Python
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
|
|
|
# Copyright 2012 OpenStack LLC
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import gettext
|
|
import os
|
|
import sys
|
|
|
|
from keystone.common import logging
|
|
from keystone.openstack.common import cfg
|
|
|
|
|
|
gettext.install('keystone', unicode=1)
|
|
|
|
|
|
CONF = cfg.CONF
|
|
|
|
|
|
def setup_logging(conf):
|
|
"""
|
|
Sets up the logging options for a log with supplied name
|
|
|
|
:param conf: a cfg.ConfOpts object
|
|
"""
|
|
|
|
if conf.log_config:
|
|
# Use a logging configuration file for all settings...
|
|
if os.path.exists(conf.log_config):
|
|
logging.config.fileConfig(conf.log_config)
|
|
return
|
|
else:
|
|
raise RuntimeError(_('Unable to locate specified logging '
|
|
'config file: %s') % conf.log_config)
|
|
|
|
root_logger = logging.root
|
|
if conf.debug:
|
|
root_logger.setLevel(logging.DEBUG)
|
|
elif conf.verbose:
|
|
root_logger.setLevel(logging.INFO)
|
|
else:
|
|
root_logger.setLevel(logging.WARNING)
|
|
|
|
formatter = logging.Formatter(conf.log_format, conf.log_date_format)
|
|
|
|
if conf.use_syslog:
|
|
try:
|
|
facility = getattr(logging.SysLogHandler,
|
|
conf.syslog_log_facility)
|
|
except AttributeError:
|
|
raise ValueError(_('Invalid syslog facility'))
|
|
|
|
handler = logging.SysLogHandler(address='/dev/log',
|
|
facility=facility)
|
|
elif conf.log_file:
|
|
logfile = conf.log_file
|
|
if conf.log_dir:
|
|
logfile = os.path.join(conf.log_dir, logfile)
|
|
handler = logging.WatchedFileHandler(logfile)
|
|
else:
|
|
handler = logging.StreamHandler(sys.stdout)
|
|
|
|
handler.setFormatter(formatter)
|
|
root_logger.addHandler(handler)
|
|
|
|
|
|
def register_str(*args, **kw):
|
|
conf = kw.pop('conf', CONF)
|
|
group = kw.pop('group', None)
|
|
return conf.register_opt(cfg.StrOpt(*args, **kw), group=group)
|
|
|
|
|
|
def register_cli_str(*args, **kw):
|
|
conf = kw.pop('conf', CONF)
|
|
group = kw.pop('group', None)
|
|
return conf.register_cli_opt(cfg.StrOpt(*args, **kw), group=group)
|
|
|
|
|
|
def register_list(*args, **kw):
|
|
conf = kw.pop('conf', CONF)
|
|
group = kw.pop('group', None)
|
|
return conf.register_opt(cfg.ListOpt(*args, **kw), group=group)
|
|
|
|
|
|
def register_cli_list(*args, **kw):
|
|
conf = kw.pop('conf', CONF)
|
|
group = kw.pop('group', None)
|
|
return conf.register_cli_opt(cfg.ListOpt(*args, **kw), group=group)
|
|
|
|
|
|
def register_bool(*args, **kw):
|
|
conf = kw.pop('conf', CONF)
|
|
group = kw.pop('group', None)
|
|
return conf.register_opt(cfg.BoolOpt(*args, **kw), group=group)
|
|
|
|
|
|
def register_cli_bool(*args, **kw):
|
|
conf = kw.pop('conf', CONF)
|
|
group = kw.pop('group', None)
|
|
return conf.register_cli_opt(cfg.BoolOpt(*args, **kw), group=group)
|
|
|
|
|
|
def register_int(*args, **kw):
|
|
conf = kw.pop('conf', CONF)
|
|
group = kw.pop('group', None)
|
|
return conf.register_opt(cfg.IntOpt(*args, **kw), group=group)
|
|
|
|
|
|
def register_cli_int(*args, **kw):
|
|
conf = kw.pop('conf', CONF)
|
|
group = kw.pop('group', None)
|
|
return conf.register_cli_opt(cfg.IntOpt(*args, **kw), group=group)
|
|
|
|
|
|
register_cli_bool('standard-threads', default=False)
|
|
|
|
register_cli_str('pydev-debug-host', default=None)
|
|
register_cli_int('pydev-debug-port', default=None)
|
|
|
|
register_str('admin_token', default='ADMIN')
|
|
register_str('bind_host', default='0.0.0.0')
|
|
register_str('compute_port', default=8774)
|
|
register_str('admin_port', default=35357)
|
|
register_str('public_port', default=5000)
|
|
register_str('onready')
|
|
register_str('auth_admin_prefix', default='')
|
|
register_str('policy_file', default='policy.json')
|
|
register_str('policy_default_rule', default=None)
|
|
|
|
#ssl options
|
|
register_bool('enable', group='ssl', default=False)
|
|
register_str('certfile', group='ssl', default=None)
|
|
register_str('keyfile', group='ssl', default=None)
|
|
register_str('ca_certs', group='ssl', default=None)
|
|
register_bool('cert_required', group='ssl', default=False)
|
|
#signing options
|
|
register_str('token_format', group='signing',
|
|
default="PKI")
|
|
register_str('certfile', group='signing',
|
|
default="/etc/keystone/ssl/certs/signing_cert.pem")
|
|
register_str('keyfile', group='signing',
|
|
default="/etc/keystone/ssl/private/signing_key.pem")
|
|
register_str('ca_certs', group='signing',
|
|
default="/etc/keystone/ssl/certs/ca.pem")
|
|
register_int('key_size', group='signing', default=1024)
|
|
register_int('valid_days', group='signing', default=3650)
|
|
register_str('ca_password', group='signing', default=None)
|
|
|
|
|
|
# sql options
|
|
register_str('connection', group='sql', default='sqlite:///keystone.db')
|
|
register_int('idle_timeout', group='sql', default=200)
|
|
|
|
|
|
register_str('driver', group='catalog',
|
|
default='keystone.catalog.backends.sql.Catalog')
|
|
register_str('driver', group='identity',
|
|
default='keystone.identity.backends.sql.Identity')
|
|
register_str('driver', group='policy',
|
|
default='keystone.policy.backends.sql.Policy')
|
|
register_str('driver', group='token',
|
|
default='keystone.token.backends.kvs.Token')
|
|
register_str('driver', group='ec2',
|
|
default='keystone.contrib.ec2.backends.kvs.Ec2')
|
|
register_str('driver', group='stats',
|
|
default='keystone.contrib.stats.backends.kvs.Stats')
|
|
|
|
|
|
#ldap
|
|
register_str('url', group='ldap', default='ldap://localhost')
|
|
register_str('user', group='ldap', default='dc=Manager,dc=example,dc=com')
|
|
register_str('password', group='ldap', default='freeipa4all')
|
|
register_str('suffix', group='ldap', default='cn=example,cn=com')
|
|
register_bool('use_dumb_member', group='ldap', default=False)
|
|
register_str('dumb_member', group='ldap', default='cn=dumb,dc=nonexistent')
|
|
register_bool('allow_subtree_delete', group='ldap', default=False)
|
|
|
|
register_str('user_tree_dn', group='ldap', default=None)
|
|
register_str('user_filter', group='ldap', default=None)
|
|
register_str('user_objectclass', group='ldap', default='inetOrgPerson')
|
|
register_str('user_id_attribute', group='ldap', default='cn')
|
|
register_str('user_name_attribute', group='ldap', default='sn')
|
|
register_str('user_mail_attribute', group='ldap', default='email')
|
|
register_str('user_pass_attribute', group='ldap', default='userPassword')
|
|
register_str('user_enabled_attribute', group='ldap', default='enabled')
|
|
register_int('user_enabled_mask', group='ldap', default=0)
|
|
register_str('user_enabled_default', group='ldap', default='True')
|
|
register_list('user_attribute_ignore', group='ldap',
|
|
default='tenant_id,tenants')
|
|
register_bool('user_allow_create', group='ldap', default=True)
|
|
register_bool('user_allow_update', group='ldap', default=True)
|
|
register_bool('user_allow_delete', group='ldap', default=True)
|
|
|
|
register_str('tenant_tree_dn', group='ldap', default=None)
|
|
register_str('tenant_filter', group='ldap', default=None)
|
|
register_str('tenant_objectclass', group='ldap', default='groupOfNames')
|
|
register_str('tenant_id_attribute', group='ldap', default='cn')
|
|
register_str('tenant_member_attribute', group='ldap', default='member')
|
|
register_str('tenant_name_attribute', group='ldap', default='ou')
|
|
register_str('tenant_desc_attribute', group='ldap', default='desc')
|
|
register_str('tenant_enabled_attribute', group='ldap', default='enabled')
|
|
register_list('tenant_attribute_ignore', group='ldap', default='')
|
|
register_bool('tenant_allow_create', group='ldap', default=True)
|
|
register_bool('tenant_allow_update', group='ldap', default=True)
|
|
register_bool('tenant_allow_delete', group='ldap', default=True)
|
|
|
|
register_str('role_tree_dn', group='ldap', default=None)
|
|
register_str('role_filter', group='ldap', default=None)
|
|
register_str('role_objectclass', group='ldap', default='organizationalRole')
|
|
register_str('role_id_attribute', group='ldap', default='cn')
|
|
register_str('role_name_attribute', group='ldap', default='ou')
|
|
register_str('role_member_attribute', group='ldap', default='roleOccupant')
|
|
register_list('role_attribute_ignore', group='ldap', default='')
|
|
register_bool('role_allow_create', group='ldap', default=True)
|
|
register_bool('role_allow_update', group='ldap', default=True)
|
|
register_bool('role_allow_delete', group='ldap', default=True)
|
|
|
|
#pam
|
|
register_str('url', group='pam', default=None)
|
|
register_str('userid', group='pam', default=None)
|
|
register_str('password', group='pam', default=None)
|