Bug 1170455 Change-Id: Id2fc4f14d0c880160c2b6ef6c9922e23fb1cb8a6
3.5 KiB
Running Keystone in HTTPD
SSL
To run Keystone in HTTPD, first enable SSL support. This is optional, but highly recommended.
Install mod_nss according to your distribution, then apply the following patch and restart HTTPD:
--- /etc/httpd/conf.d/nss.conf.orig 2012-03-29 12:59:06.319470425 -0400
+++ /etc/httpd/conf.d/nss.conf 2012-03-29 12:19:38.862721465 -0400
@@ -17,7 +17,7 @@
# Note: Configurations that use IPv6 but not IPv4-mapped addresses need two
# Listen directives: "Listen [::]:8443" and "Listen 0.0.0.0:443"
#
-Listen 8443
+Listen 443
##
## SSL Global Context
@@ -81,7 +81,7 @@
## SSL Virtual Host Context
##
-<virtualhost _default_:8443="">
+<virtualhost _default_:443="">
# General setup for the virtual host
#DocumentRoot "/etc/httpd/htdocs"
</virtualhost></virtualhost>
Firewall
Add the following rule to IPTables in order to ensure the SSL traffic can pass your firewall:
-A INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT
it goes right before:
-A INPUT -j REJECT --reject-with icmp-host-prohibited
Files
Copy the file httpd/wsgi-keystone.conf to the appropriate location for your apache server, most likely:
/etc/httpd/conf.d/wsgi-keystone.conf
Create the directory /var/www/cgi-bin/keystone/
. You can
either hardlink or softlink the files main
and
admin
to the file keystone.py
in this
directory. For a distribution appropriate place, it should probably be
copied to:
/usr/share/openstack/keystone/httpd/keystone.py
Keystone's primary configuration file
(etc/keystone.conf
) and the PasteDeploy configuration file
(etc/keystone-paste.ini
) must be readable to HTTPD in one
of the default locations described in configuration
.
SELinux
If you are running with SELinux enabled (and you should be) make sure that the file has the appropriate SELinux context to access the linked file. If you have the file in /var/www/cgi-bin, you can do this by running:
sudo restorecon /var/www/cgi-bin
Putting it somewhere else requires you set up your SELinux policy accordingly.
Keystone Configuration
Make sure you use either the SQL
or the
memcached
driver for tokens
, otherwise the
tokens will not be shared between the processes of the Apache HTTPD
server.
For SQL,
in /etc/keystone/keystone.conf
make sure you have set:
[token]
driver = keystone.token.backends.sql.Token
For memcache,
in
/etc/keystone/keystone.conf
make sure you have set:
[token]
driver = keystone.token.backends.memcache.Token
In both cases, all servers that are storing tokens need a shared backend. This means either that both point to the same database server, or both point to a common memcached instance.