Configure services to use Certificate Authority
Include a reference to the globally configured Certificate Authority to all services. Services use the CA to verify HTTPs connections. Change-Id: I38da931cdd7ff46cce1994763b5c713652b096cc Partially-Implements: blueprint support-trusted-ca-certificate-file
This commit is contained in:
parent
1a3bf97843
commit
c15dc20341
@ -25,6 +25,7 @@ username = {{ aodh_keystone_user }}
|
||||
password = {{ aodh_keystone_password }}
|
||||
auth_url = {{ keystone_admin_url }}
|
||||
auth_type = password
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[oslo_middleware]
|
||||
enable_proxy_headers_parsing = True
|
||||
@ -44,6 +45,7 @@ project_domain_id = {{ default_project_domain_id }}
|
||||
user_domain_id = {{ default_user_domain_id }}
|
||||
auth_type = password
|
||||
interface = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[oslo_messaging_notifications]
|
||||
transport_url = {{ notify_transport_url }}
|
||||
|
@ -59,6 +59,7 @@ username = {{ barbican_keystone_user }}
|
||||
password = {{ barbican_keystone_password }}
|
||||
auth_url = {{ keystone_admin_url }}
|
||||
auth_type = password
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -32,6 +32,7 @@ project_name = service
|
||||
username = {{ blazar_keystone_user }}
|
||||
password = {{ blazar_keystone_password }}
|
||||
service_token_roles_required = True
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -21,6 +21,7 @@ project_domain_id = {{ default_project_domain_id }}
|
||||
user_domain_id = {{ default_user_domain_id }}
|
||||
auth_type = password
|
||||
interface = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
{% if nova_compute_virt_type == 'vmware' %}
|
||||
[vmware]
|
||||
|
@ -86,6 +86,7 @@ region_name = {{ openstack_region_name }}
|
||||
project_name = service
|
||||
username = {{ nova_keystone_user }}
|
||||
password = {{ nova_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[database]
|
||||
connection = mysql+pymysql://{{ cinder_database_user }}:{{ cinder_database_password }}@{{ cinder_database_address }}/{{ cinder_database_name }}
|
||||
@ -100,6 +101,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ cinder_keystone_user }}
|
||||
password = {{ cinder_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -24,6 +24,7 @@ project_name = service
|
||||
username = {{ cloudkitty_keystone_user }}
|
||||
password = {{ cloudkitty_keystone_password }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -37,6 +37,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ congress_keystone_user }}
|
||||
password = {{ congress_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -25,6 +25,7 @@ username = {{ cyborg_keystone_user }}
|
||||
password = {{ cyborg_keystone_password }}
|
||||
auth_url = {{ admin_protocol }}://{{ kolla_internal_fqdn | put_address_in_context('url') }}:{{ keystone_admin_port }}
|
||||
auth_type = password
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
{% if cyborg_policy_file is defined %}
|
||||
[oslo_policy]
|
||||
|
@ -29,6 +29,7 @@ username = {{ designate_keystone_user }}
|
||||
password = {{ designate_keystone_password }}
|
||||
http_connect_timeout = 60
|
||||
service_token_roles_required = True
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -30,6 +30,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ freezer_keystone_user }}
|
||||
password = {{ freezer_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -35,6 +35,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ glance_keystone_user }}
|
||||
password = {{ glance_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -5,3 +5,4 @@ user = service:{{ glance_keystone_user }}
|
||||
key = {{ glance_keystone_password }}
|
||||
project_domain_id = default
|
||||
user_domain_id = default
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
@ -50,6 +50,7 @@ username = {{ gnocchi_keystone_user }}
|
||||
password = {{ gnocchi_keystone_password }}
|
||||
auth_url = {{ keystone_admin_url }}
|
||||
auth_type = password
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -17,6 +17,7 @@
|
||||
OS_PASSWORD: "{{ openstack_auth.password }}"
|
||||
OS_PROJECT_NAME: "{{ openstack_auth.project_name }}"
|
||||
OS_REGION_NAME: "{{ openstack_region_name }}"
|
||||
OS_CACERT: "{{ openstack_cacert | default(omit) }}"
|
||||
HEAT_DOMAIN_ADMIN_PASSWORD: "{{ heat_domain_admin_password }}"
|
||||
image: "{{ heat_api.image }}"
|
||||
labels:
|
||||
|
@ -49,6 +49,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ heat_keystone_user }}
|
||||
password = {{ heat_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -22,6 +22,7 @@ project_name = service
|
||||
username = {{ ironic_inspector_keystone_user }}
|
||||
password = {{ ironic_inspector_keystone_password }}
|
||||
os_endpoint_type = internalURL
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% else %}
|
||||
auth_type = none
|
||||
endpoint_override = {{ ironic_internal_endpoint }}
|
||||
@ -37,6 +38,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ ironic_inspector_keystone_user }}
|
||||
password = {{ ironic_inspector_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -63,6 +63,7 @@ username = {{ ironic_keystone_user }}
|
||||
password = {{ ironic_keystone_password }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
valid_interfaces = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
@ -80,6 +81,7 @@ username = {{ ironic_keystone_user }}
|
||||
password = {{ ironic_keystone_password }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
valid_interfaces = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% endif %}
|
||||
|
||||
{% if enable_glance | bool %}
|
||||
@ -93,6 +95,7 @@ username = {{ ironic_keystone_user }}
|
||||
password = {{ ironic_keystone_password }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
valid_interfaces = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% endif %}
|
||||
|
||||
{% if enable_neutron | bool %}
|
||||
@ -107,6 +110,7 @@ password = {{ ironic_keystone_password }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
valid_interfaces = internal
|
||||
cleaning_network = {{ ironic_cleaning_network }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% endif %}
|
||||
|
||||
{% if enable_nova | bool %}
|
||||
@ -120,6 +124,7 @@ username = {{ ironic_keystone_user }}
|
||||
password = {{ ironic_keystone_password }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
valid_interfaces = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% endif %}
|
||||
|
||||
[inspector]
|
||||
@ -133,6 +138,7 @@ username = {{ ironic_keystone_user }}
|
||||
password = {{ ironic_keystone_password }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
valid_interfaces = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% else %}
|
||||
auth_type = none
|
||||
endpoint_override = {{ ironic_inspector_internal_endpoint }}
|
||||
@ -149,6 +155,7 @@ username = {{ ironic_keystone_user }}
|
||||
password = {{ ironic_keystone_password }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
valid_interfaces = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% else %}
|
||||
auth_type = none
|
||||
endpoint_override = {{ internal_protocol }}://{{ ironic_internal_fqdn | put_address_in_context('url') }}:{{ ironic_api_port }}
|
||||
|
@ -19,6 +19,7 @@ username = {{ karbor_keystone_user }}
|
||||
password = {{ karbor_keystone_password }}
|
||||
auth_url = {{ keystone_admin_url }}
|
||||
auth_type = password
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[clients_keystone]
|
||||
auth_uri = {{ keystone_internal_url }}
|
||||
@ -39,6 +40,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ karbor_keystone_user }}
|
||||
password = {{ karbor_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -6,3 +6,4 @@ elasticsearch.url: "{{ internal_protocol }}://{{ kolla_internal_vip_address | pu
|
||||
elasticsearch.requestTimeout: {{ kibana_elasticsearch_request_timeout }}
|
||||
elasticsearch.shardTimeout: {{ kibana_elasticsearch_shard_timeout }}
|
||||
elasticsearch.ssl.verificationMode: "{{ 'full' if kibana_elasticsearch_ssl_verify | bool else 'none' }}"
|
||||
elasticsearch.ssl.certificateAuthorities: {{ openstack_cacert | default(omit) }}
|
||||
|
@ -21,6 +21,7 @@ project_domain_id = {{ default_project_domain_id }}
|
||||
user_domain_id = {{ default_user_domain_id }}
|
||||
password = {{ kuryr_keystone_password }}
|
||||
username = {{ kuryr_keystone_user }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
{% if kuryr_policy_file is defined %}
|
||||
[oslo_policy]
|
||||
|
@ -65,6 +65,7 @@ user_domain_name = {{ default_user_domain_name }}
|
||||
project_name = service
|
||||
username = {{ magnum_keystone_user }}
|
||||
password = {{ magnum_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -16,6 +16,7 @@ endpoint_type = internalURL
|
||||
project_name = service
|
||||
username = cinder
|
||||
password = {{ cinder_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
@ -32,6 +33,7 @@ endpoint_type = internalURL
|
||||
project_name = service
|
||||
username = {{ nova_keystone_user }}
|
||||
password = {{ nova_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
@ -49,6 +51,7 @@ endpoint_type = internalURL
|
||||
project_name = service
|
||||
username = {{ neutron_keystone_user }}
|
||||
password = {{ neutron_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -37,6 +37,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ manila_keystone_user }}
|
||||
password = {{ manila_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -10,6 +10,7 @@ project_name = service
|
||||
project_domain_id = {{ default_project_domain_id }}
|
||||
username = {{ masakari_keystone_user }}
|
||||
password = {{ masakari_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[libvirt]
|
||||
connection_uri = "qemu+tcp://{{ migration_interface_address | put_address_in_context('url') }}/system"
|
||||
|
@ -28,6 +28,7 @@ username = {{ masakari_keystone_user }}
|
||||
password = {{ masakari_keystone_password }}
|
||||
service_token_roles_required = True
|
||||
region_name = {{ openstack_region_name }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
{% if enable_memcached | bool %}
|
||||
memcache_security_strategy = ENCRYPT
|
||||
|
@ -45,6 +45,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ mistral_keystone_user }}
|
||||
password = {{ mistral_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -36,6 +36,7 @@ project_name = service
|
||||
username = {{ monasca_keystone_user }}
|
||||
password = {{ monasca_keystone_password }}
|
||||
service_token_roles_required=True
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -36,6 +36,7 @@ project_name = service
|
||||
username = {{ monasca_keystone_user }}
|
||||
password = {{ monasca_keystone_password }}
|
||||
service_token_roles_required=True
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -27,6 +27,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ murano_keystone_user }}
|
||||
password = {{ murano_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
@ -41,6 +42,7 @@ user_domain_name = {{ default_user_domain_name }}
|
||||
project_name = service
|
||||
username = {{ murano_keystone_user }}
|
||||
password = {{ murano_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[murano]
|
||||
url = {{ internal_protocol }}://{{ kolla_internal_fqdn | put_address_in_context('url') }}:{{ murano_api_port }}
|
||||
@ -78,17 +80,22 @@ auth_url = {{ keystone_internal_url }}/v3
|
||||
username = {{ murano_keystone_user }}
|
||||
password = {{ murano_keystone_password }}
|
||||
user_domain_name = {{ default_project_domain_name }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
|
||||
[neutron]
|
||||
endpoint_type = internalURL
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[heat]
|
||||
endpoint_type = internalURL
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[glance]
|
||||
endpoint_type = internalURL
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[mistral]
|
||||
endpoint_type = internalURL
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
@ -84,6 +84,7 @@ project_name = service
|
||||
username = {{ nova_keystone_user }}
|
||||
password = {{ nova_keystone_password }}
|
||||
endpoint_type = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[oslo_middleware]
|
||||
enable_proxy_headers_parsing = True
|
||||
@ -107,6 +108,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ neutron_keystone_user }}
|
||||
password = {{ neutron_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
@ -149,6 +151,7 @@ password = {{ designate_keystone_password }}
|
||||
allow_reverse_dns_lookup = True
|
||||
ipv4_ptr_zone_prefix_size = 24
|
||||
ipv6_ptr_zone_prefix_size = 116
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% endif %}
|
||||
|
||||
{% if enable_osprofiler | bool %}
|
||||
@ -169,6 +172,7 @@ project_name = service
|
||||
project_domain_name = {{ default_project_domain_name }}
|
||||
os_region_name = {{ openstack_region_name }}
|
||||
os_interface = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[privsep]
|
||||
helper_command=sudo neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper
|
||||
|
@ -90,6 +90,7 @@ proxyclient_address = {{ api_interface_address }}
|
||||
username = {{ ironic_keystone_user }}
|
||||
password = {{ ironic_keystone_password }}
|
||||
auth_url = {{ openstack_auth.auth_url }}/v3
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
auth_type = password
|
||||
project_name = service
|
||||
user_domain_name = {{ default_user_domain_name }}
|
||||
@ -103,12 +104,14 @@ lock_path = /var/lib/nova/tmp
|
||||
|
||||
[glance]
|
||||
api_servers = {{ internal_protocol }}://{{ glance_internal_fqdn | put_address_in_context('url') }}:{{ glance_api_port }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
num_retries = 3
|
||||
|
||||
{% if enable_cinder | bool %}
|
||||
[cinder]
|
||||
catalog_info = volumev3:cinderv3:internalURL
|
||||
os_region_name = {{ openstack_region_name }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% endif %}
|
||||
|
||||
[neutron]
|
||||
@ -119,6 +122,7 @@ ovs_bridge = {{ ovs_bridge }}
|
||||
{% endif %}
|
||||
auth_url = {{ keystone_admin_url }}
|
||||
auth_type = password
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
project_domain_name = {{ default_project_domain_name }}
|
||||
user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
@ -184,6 +188,7 @@ helper_command=sudo nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --confi
|
||||
|
||||
[glance]
|
||||
debug = {{ nova_logging_debug }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[guestfs]
|
||||
debug = {{ nova_logging_debug }}
|
||||
@ -197,6 +202,7 @@ user_domain_name = {{ default_user_domain_name }}
|
||||
project_name = service
|
||||
project_domain_name = {{ default_project_domain_name }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
valid_interfaces = internal
|
||||
|
||||
[notifications]
|
||||
@ -221,6 +227,7 @@ connection_string = {{ osprofiler_backend_connection_string }}
|
||||
{% if enable_barbican | bool %}
|
||||
[barbican]
|
||||
auth_endpoint = {{ keystone_internal_url }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% endif %}
|
||||
|
||||
{% if nova_compute_virt_type == "xenapi" %}
|
||||
|
@ -29,9 +29,11 @@ password = {{ placement_keystone_password }}
|
||||
project_domain_name = {{ default_project_domain_name }}
|
||||
user_domain_name = {{ default_user_domain_name }}
|
||||
os_region_name = {{ openstack_region_name }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[glance]
|
||||
api_servers = {{ internal_protocol }}://{{ glance_internal_fqdn | put_address_in_context('url') }}:{{ glance_api_port }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
|
||||
[hyperv]
|
||||
@ -57,6 +59,7 @@ username = {{ neutron_keystone_user }}
|
||||
password = {{ neutron_keystone_password }}
|
||||
auth_url = {{ keystone_admin_url }}/v3
|
||||
auth_type = v3password
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[oslo_messaging_notifications]
|
||||
transport_url = {{ notify_transport_url }}
|
||||
|
@ -59,8 +59,9 @@ lock_path = /var/lib/nova/tmp
|
||||
|
||||
[glance]
|
||||
api_servers = {{ internal_protocol }}://{{ glance_internal_fqdn | put_address_in_context('url') }}:{{ glance_api_port }}
|
||||
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
num_retries = {{ groups['glance-api'] | length }}
|
||||
debug = {{ nova_logging_debug }}
|
||||
|
||||
{% if enable_cinder | bool %}
|
||||
[cinder]
|
||||
@ -73,6 +74,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ cinder_keystone_user }}
|
||||
password = {{ cinder_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% endif %}
|
||||
|
||||
[neutron]
|
||||
@ -90,6 +92,7 @@ username = {{ neutron_keystone_user }}
|
||||
password = {{ neutron_keystone_password }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
valid_interfaces = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[database]
|
||||
connection = mysql+pymysql://{{ nova_cell0_database_user }}:{{ nova_cell0_database_password }}@{{ nova_cell0_database_address }}/{{ nova_cell0_database_name }}
|
||||
@ -116,6 +119,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ nova_keystone_user }}
|
||||
password = {{ nova_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
@ -141,9 +145,6 @@ policy_file = {{ nova_policy_file }}
|
||||
[privsep_entrypoint]
|
||||
helper_command=sudo nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf
|
||||
|
||||
[glance]
|
||||
debug = {{ nova_logging_debug }}
|
||||
|
||||
[guestfs]
|
||||
debug = {{ nova_logging_debug }}
|
||||
|
||||
@ -169,6 +170,7 @@ user_domain_name = {{ default_user_domain_name }}
|
||||
project_name = service
|
||||
project_domain_name = {{ default_project_domain_name }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
valid_interfaces = internal
|
||||
|
||||
[notifications]
|
||||
@ -193,4 +195,5 @@ connection_string = {{ osprofiler_backend_connection_string }}
|
||||
{% if enable_barbican | bool %}
|
||||
[barbican]
|
||||
auth_endpoint = {{ keystone_internal_url }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
{% endif %}
|
||||
|
@ -44,6 +44,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ octavia_keystone_user }}
|
||||
password = {{ octavia_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
@ -83,11 +84,14 @@ policy_file = {{ octavia_policy_file }}
|
||||
[glance]
|
||||
region_name = {{ openstack_region_name }}
|
||||
endpoint_type = internal
|
||||
ca_certificates_file == {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[neutron]
|
||||
region_name = {{ openstack_region_name }}
|
||||
endpoint_type = internal
|
||||
ca_certificates_file == {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[nova]
|
||||
region_name = {{ openstack_region_name }}
|
||||
endpoint_type = internal
|
||||
ca_certificates_file == {{ openstack_cacert | default(omit) }}
|
||||
|
@ -25,6 +25,7 @@ username = {{ panko_keystone_user }}
|
||||
password = {{ panko_keystone_password }}
|
||||
auth_url = {{ keystone_admin_url }}
|
||||
auth_type = password
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -42,6 +42,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ placement_keystone_user }}
|
||||
password = {{ placement_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -28,6 +28,7 @@ project_name = service
|
||||
username = {{ qinling_keystone_user }}
|
||||
password = {{ qinling_keystone_password }}
|
||||
region_name = {{ openstack_region_name }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -21,6 +21,7 @@ project_name = service
|
||||
project_domain_name = {{ default_project_domain_name }}
|
||||
username = {{ sahara_keystone_user }}
|
||||
password = {{ sahara_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
@ -51,3 +52,4 @@ user_domain_name = {{ default_user_domain_name }}
|
||||
username = {{ sahara_keystone_user }}
|
||||
password = {{ sahara_keystone_password }}
|
||||
auth_url = {{ keystone_admin_url }}/v3
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
@ -29,6 +29,7 @@ user_domain_name = {{ default_user_domain_name }}
|
||||
username = {{ searchlight_keystone_user }}
|
||||
password = {{ searchlight_keystone_password }}
|
||||
auth_type = password
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
@ -60,6 +61,7 @@ username = {{ searchlight_keystone_user }}
|
||||
password = {{ searchlight_keystone_password }}
|
||||
auth_type = password
|
||||
auth_plugin = password
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -49,6 +49,7 @@ project_name = service
|
||||
username = {{ senlin_keystone_user }}
|
||||
password = {{ senlin_keystone_password }}
|
||||
service_token_roles_required = False
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -51,6 +51,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ solum_keystone_user }}
|
||||
password = {{ solum_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -44,6 +44,7 @@ project_name = service
|
||||
username = {{ swift_keystone_user }}
|
||||
password = {{ swift_keystone_password }}
|
||||
delay_auth_decision = {{ swift_delay_auth_decision }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -38,6 +38,7 @@ user_domain_name = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ tacker_keystone_user }}
|
||||
password = {{ tacker_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -19,6 +19,7 @@
|
||||
retention_policy = "autogen"
|
||||
write_consistency = "any"
|
||||
timeout = "5s"
|
||||
tls_ca = {{ openstack_cacert | default(omit) }}
|
||||
{% endfor %}
|
||||
{% endif %}
|
||||
[[inputs.cpu]]
|
||||
|
@ -10,7 +10,6 @@ admin_password = {{ keystone_admin_password }}
|
||||
admin_project_name = {{ openstack_auth.project_name }}
|
||||
admin_domain_name = {{ openstack_auth.domain_name }}
|
||||
|
||||
|
||||
[dashboard]
|
||||
dashboard_url = {{ internal_protocol }}://{{ kolla_internal_fqdn }}
|
||||
login_url = {{ internal_protocol }}://{{ kolla_internal_fqdn }}/auth/login/
|
||||
@ -42,6 +41,7 @@ region = {{ openstack_region_name }}
|
||||
auth_version = v3
|
||||
uri = {{ keystone_admin_url }}/v2.0
|
||||
uri_v3 = {{ keystone_admin_url }}/v3
|
||||
ca_certificates_file = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[image]
|
||||
region = {{ openstack_region_name }}
|
||||
|
@ -39,6 +39,7 @@ username = {{ trove_keystone_user }}
|
||||
password = {{ trove_keystone_password }}
|
||||
auth_url = {{ keystone_admin_url }}
|
||||
auth_type = password
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[oslo_messaging_notifications]
|
||||
transport_url = {{ notify_transport_url }}
|
||||
|
@ -39,6 +39,7 @@ project_name = service
|
||||
username = {{ vitrage_keystone_user }}
|
||||
password = {{ vitrage_keystone_password }}
|
||||
service_token_roles_required = True
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
@ -54,6 +55,7 @@ project_name = admin
|
||||
password = {{ vitrage_keystone_password }}
|
||||
username = {{ vitrage_keystone_user }}
|
||||
interface = internal
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
|
@ -26,6 +26,7 @@ project_name = service
|
||||
username = {{ watcher_keystone_user }}
|
||||
password = {{ watcher_keystone_password }}
|
||||
service_token_roles_required = True
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
memcache_security_strategy = ENCRYPT
|
||||
memcache_secret_key = {{ memcache_secret_key }}
|
||||
@ -40,6 +41,7 @@ user_domain_id = {{ default_user_domain_id }}
|
||||
project_name = service
|
||||
username = {{ watcher_keystone_user }}
|
||||
password = {{ watcher_keystone_password }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
[oslo_concurrency]
|
||||
lock_path = /var/lib/watcher/tmp
|
||||
|
@ -38,6 +38,7 @@ username = {{ zun_keystone_user }}
|
||||
password = {{ zun_keystone_password }}
|
||||
service_token_roles_required = True
|
||||
region_name = {{ openstack_region_name }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
{% if enable_memcached | bool %}
|
||||
memcache_security_strategy = ENCRYPT
|
||||
@ -59,6 +60,7 @@ username = {{ zun_keystone_user }}
|
||||
password = {{ zun_keystone_password }}
|
||||
service_token_roles_required = True
|
||||
region_name = {{ openstack_region_name }}
|
||||
cafile = {{ openstack_cacert | default(omit) }}
|
||||
|
||||
{% if enable_memcached | bool %}
|
||||
memcache_security_strategy = ENCRYPT
|
||||
|
@ -0,0 +1,5 @@
|
||||
---
|
||||
features:
|
||||
- Configure all openstack services to use the globally defined Certificate
|
||||
Authority to verify HTTPs connections. The global CA is configured by the
|
||||
'openstack_cacert' parameter.
|
Loading…
Reference in New Issue
Block a user