Configure services to use Certificate Authority

Include a reference to the globally configured Certificate Authority to
all services. Services use the CA to verify HTTPs connections.

Change-Id: I38da931cdd7ff46cce1994763b5c713652b096cc
Partially-Implements: blueprint support-trusted-ca-certificate-file
This commit is contained in:
James Kirsch 2019-12-16 15:50:19 -08:00
parent 1a3bf97843
commit c15dc20341
50 changed files with 97 additions and 5 deletions

View File

@ -25,6 +25,7 @@ username = {{ aodh_keystone_user }}
password = {{ aodh_keystone_password }}
auth_url = {{ keystone_admin_url }}
auth_type = password
cafile = {{ openstack_cacert | default(omit) }}
[oslo_middleware]
enable_proxy_headers_parsing = True
@ -44,6 +45,7 @@ project_domain_id = {{ default_project_domain_id }}
user_domain_id = {{ default_user_domain_id }}
auth_type = password
interface = internal
cafile = {{ openstack_cacert | default(omit) }}
[oslo_messaging_notifications]
transport_url = {{ notify_transport_url }}

View File

@ -59,6 +59,7 @@ username = {{ barbican_keystone_user }}
password = {{ barbican_keystone_password }}
auth_url = {{ keystone_admin_url }}
auth_type = password
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -32,6 +32,7 @@ project_name = service
username = {{ blazar_keystone_user }}
password = {{ blazar_keystone_password }}
service_token_roles_required = True
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -21,6 +21,7 @@ project_domain_id = {{ default_project_domain_id }}
user_domain_id = {{ default_user_domain_id }}
auth_type = password
interface = internal
cafile = {{ openstack_cacert | default(omit) }}
{% if nova_compute_virt_type == 'vmware' %}
[vmware]

View File

@ -86,6 +86,7 @@ region_name = {{ openstack_region_name }}
project_name = service
username = {{ nova_keystone_user }}
password = {{ nova_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
[database]
connection = mysql+pymysql://{{ cinder_database_user }}:{{ cinder_database_password }}@{{ cinder_database_address }}/{{ cinder_database_name }}
@ -100,6 +101,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ cinder_keystone_user }}
password = {{ cinder_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -24,6 +24,7 @@ project_name = service
username = {{ cloudkitty_keystone_user }}
password = {{ cloudkitty_keystone_password }}
region_name = {{ openstack_region_name }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -37,6 +37,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ congress_keystone_user }}
password = {{ congress_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -25,6 +25,7 @@ username = {{ cyborg_keystone_user }}
password = {{ cyborg_keystone_password }}
auth_url = {{ admin_protocol }}://{{ kolla_internal_fqdn | put_address_in_context('url') }}:{{ keystone_admin_port }}
auth_type = password
cafile = {{ openstack_cacert | default(omit) }}
{% if cyborg_policy_file is defined %}
[oslo_policy]

View File

@ -29,6 +29,7 @@ username = {{ designate_keystone_user }}
password = {{ designate_keystone_password }}
http_connect_timeout = 60
service_token_roles_required = True
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -30,6 +30,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ freezer_keystone_user }}
password = {{ freezer_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -35,6 +35,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ glance_keystone_user }}
password = {{ glance_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -5,3 +5,4 @@ user = service:{{ glance_keystone_user }}
key = {{ glance_keystone_password }}
project_domain_id = default
user_domain_id = default
cafile = {{ openstack_cacert | default(omit) }}

View File

@ -50,6 +50,7 @@ username = {{ gnocchi_keystone_user }}
password = {{ gnocchi_keystone_password }}
auth_url = {{ keystone_admin_url }}
auth_type = password
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -17,6 +17,7 @@
OS_PASSWORD: "{{ openstack_auth.password }}"
OS_PROJECT_NAME: "{{ openstack_auth.project_name }}"
OS_REGION_NAME: "{{ openstack_region_name }}"
OS_CACERT: "{{ openstack_cacert | default(omit) }}"
HEAT_DOMAIN_ADMIN_PASSWORD: "{{ heat_domain_admin_password }}"
image: "{{ heat_api.image }}"
labels:

View File

@ -49,6 +49,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ heat_keystone_user }}
password = {{ heat_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -22,6 +22,7 @@ project_name = service
username = {{ ironic_inspector_keystone_user }}
password = {{ ironic_inspector_keystone_password }}
os_endpoint_type = internalURL
cafile = {{ openstack_cacert | default(omit) }}
{% else %}
auth_type = none
endpoint_override = {{ ironic_internal_endpoint }}
@ -37,6 +38,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ ironic_inspector_keystone_user }}
password = {{ ironic_inspector_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -63,6 +63,7 @@ username = {{ ironic_keystone_user }}
password = {{ ironic_keystone_password }}
region_name = {{ openstack_region_name }}
valid_interfaces = internal
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}
@ -80,6 +81,7 @@ username = {{ ironic_keystone_user }}
password = {{ ironic_keystone_password }}
region_name = {{ openstack_region_name }}
valid_interfaces = internal
cafile = {{ openstack_cacert | default(omit) }}
{% endif %}
{% if enable_glance | bool %}
@ -93,6 +95,7 @@ username = {{ ironic_keystone_user }}
password = {{ ironic_keystone_password }}
region_name = {{ openstack_region_name }}
valid_interfaces = internal
cafile = {{ openstack_cacert | default(omit) }}
{% endif %}
{% if enable_neutron | bool %}
@ -107,6 +110,7 @@ password = {{ ironic_keystone_password }}
region_name = {{ openstack_region_name }}
valid_interfaces = internal
cleaning_network = {{ ironic_cleaning_network }}
cafile = {{ openstack_cacert | default(omit) }}
{% endif %}
{% if enable_nova | bool %}
@ -120,6 +124,7 @@ username = {{ ironic_keystone_user }}
password = {{ ironic_keystone_password }}
region_name = {{ openstack_region_name }}
valid_interfaces = internal
cafile = {{ openstack_cacert | default(omit) }}
{% endif %}
[inspector]
@ -133,6 +138,7 @@ username = {{ ironic_keystone_user }}
password = {{ ironic_keystone_password }}
region_name = {{ openstack_region_name }}
valid_interfaces = internal
cafile = {{ openstack_cacert | default(omit) }}
{% else %}
auth_type = none
endpoint_override = {{ ironic_inspector_internal_endpoint }}
@ -149,6 +155,7 @@ username = {{ ironic_keystone_user }}
password = {{ ironic_keystone_password }}
region_name = {{ openstack_region_name }}
valid_interfaces = internal
cafile = {{ openstack_cacert | default(omit) }}
{% else %}
auth_type = none
endpoint_override = {{ internal_protocol }}://{{ ironic_internal_fqdn | put_address_in_context('url') }}:{{ ironic_api_port }}

View File

@ -19,6 +19,7 @@ username = {{ karbor_keystone_user }}
password = {{ karbor_keystone_password }}
auth_url = {{ keystone_admin_url }}
auth_type = password
cafile = {{ openstack_cacert | default(omit) }}
[clients_keystone]
auth_uri = {{ keystone_internal_url }}
@ -39,6 +40,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ karbor_keystone_user }}
password = {{ karbor_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -6,3 +6,4 @@ elasticsearch.url: "{{ internal_protocol }}://{{ kolla_internal_vip_address | pu
elasticsearch.requestTimeout: {{ kibana_elasticsearch_request_timeout }}
elasticsearch.shardTimeout: {{ kibana_elasticsearch_shard_timeout }}
elasticsearch.ssl.verificationMode: "{{ 'full' if kibana_elasticsearch_ssl_verify | bool else 'none' }}"
elasticsearch.ssl.certificateAuthorities: {{ openstack_cacert | default(omit) }}

View File

@ -21,6 +21,7 @@ project_domain_id = {{ default_project_domain_id }}
user_domain_id = {{ default_user_domain_id }}
password = {{ kuryr_keystone_password }}
username = {{ kuryr_keystone_user }}
cafile = {{ openstack_cacert | default(omit) }}
{% if kuryr_policy_file is defined %}
[oslo_policy]

View File

@ -65,6 +65,7 @@ user_domain_name = {{ default_user_domain_name }}
project_name = service
username = {{ magnum_keystone_user }}
password = {{ magnum_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -16,6 +16,7 @@ endpoint_type = internalURL
project_name = service
username = cinder
password = {{ cinder_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}
@ -32,6 +33,7 @@ endpoint_type = internalURL
project_name = service
username = {{ nova_keystone_user }}
password = {{ nova_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}
@ -49,6 +51,7 @@ endpoint_type = internalURL
project_name = service
username = {{ neutron_keystone_user }}
password = {{ neutron_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -37,6 +37,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ manila_keystone_user }}
password = {{ manila_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -10,6 +10,7 @@ project_name = service
project_domain_id = {{ default_project_domain_id }}
username = {{ masakari_keystone_user }}
password = {{ masakari_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
[libvirt]
connection_uri = "qemu+tcp://{{ migration_interface_address | put_address_in_context('url') }}/system"

View File

@ -28,6 +28,7 @@ username = {{ masakari_keystone_user }}
password = {{ masakari_keystone_password }}
service_token_roles_required = True
region_name = {{ openstack_region_name }}
cafile = {{ openstack_cacert | default(omit) }}
{% if enable_memcached | bool %}
memcache_security_strategy = ENCRYPT

View File

@ -45,6 +45,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ mistral_keystone_user }}
password = {{ mistral_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -36,6 +36,7 @@ project_name = service
username = {{ monasca_keystone_user }}
password = {{ monasca_keystone_password }}
service_token_roles_required=True
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -36,6 +36,7 @@ project_name = service
username = {{ monasca_keystone_user }}
password = {{ monasca_keystone_password }}
service_token_roles_required=True
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -27,6 +27,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ murano_keystone_user }}
password = {{ murano_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}
@ -41,6 +42,7 @@ user_domain_name = {{ default_user_domain_name }}
project_name = service
username = {{ murano_keystone_user }}
password = {{ murano_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
[murano]
url = {{ internal_protocol }}://{{ kolla_internal_fqdn | put_address_in_context('url') }}:{{ murano_api_port }}
@ -78,17 +80,22 @@ auth_url = {{ keystone_internal_url }}/v3
username = {{ murano_keystone_user }}
password = {{ murano_keystone_password }}
user_domain_name = {{ default_project_domain_name }}
cafile = {{ openstack_cacert | default(omit) }}
{% endif %}
{% endif %}
[neutron]
endpoint_type = internalURL
cafile = {{ openstack_cacert | default(omit) }}
[heat]
endpoint_type = internalURL
cafile = {{ openstack_cacert | default(omit) }}
[glance]
endpoint_type = internalURL
cafile = {{ openstack_cacert | default(omit) }}
[mistral]
endpoint_type = internalURL
cafile = {{ openstack_cacert | default(omit) }}

View File

@ -84,6 +84,7 @@ project_name = service
username = {{ nova_keystone_user }}
password = {{ nova_keystone_password }}
endpoint_type = internal
cafile = {{ openstack_cacert | default(omit) }}
[oslo_middleware]
enable_proxy_headers_parsing = True
@ -107,6 +108,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ neutron_keystone_user }}
password = {{ neutron_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}
@ -149,6 +151,7 @@ password = {{ designate_keystone_password }}
allow_reverse_dns_lookup = True
ipv4_ptr_zone_prefix_size = 24
ipv6_ptr_zone_prefix_size = 116
cafile = {{ openstack_cacert | default(omit) }}
{% endif %}
{% if enable_osprofiler | bool %}
@ -169,6 +172,7 @@ project_name = service
project_domain_name = {{ default_project_domain_name }}
os_region_name = {{ openstack_region_name }}
os_interface = internal
cafile = {{ openstack_cacert | default(omit) }}
[privsep]
helper_command=sudo neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper

View File

@ -90,6 +90,7 @@ proxyclient_address = {{ api_interface_address }}
username = {{ ironic_keystone_user }}
password = {{ ironic_keystone_password }}
auth_url = {{ openstack_auth.auth_url }}/v3
cafile = {{ openstack_cacert | default(omit) }}
auth_type = password
project_name = service
user_domain_name = {{ default_user_domain_name }}
@ -103,12 +104,14 @@ lock_path = /var/lib/nova/tmp
[glance]
api_servers = {{ internal_protocol }}://{{ glance_internal_fqdn | put_address_in_context('url') }}:{{ glance_api_port }}
cafile = {{ openstack_cacert | default(omit) }}
num_retries = 3
{% if enable_cinder | bool %}
[cinder]
catalog_info = volumev3:cinderv3:internalURL
os_region_name = {{ openstack_region_name }}
cafile = {{ openstack_cacert | default(omit) }}
{% endif %}
[neutron]
@ -119,6 +122,7 @@ ovs_bridge = {{ ovs_bridge }}
{% endif %}
auth_url = {{ keystone_admin_url }}
auth_type = password
cafile = {{ openstack_cacert | default(omit) }}
project_domain_name = {{ default_project_domain_name }}
user_domain_id = {{ default_user_domain_id }}
project_name = service
@ -184,6 +188,7 @@ helper_command=sudo nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --confi
[glance]
debug = {{ nova_logging_debug }}
cafile = {{ openstack_cacert | default(omit) }}
[guestfs]
debug = {{ nova_logging_debug }}
@ -197,6 +202,7 @@ user_domain_name = {{ default_user_domain_name }}
project_name = service
project_domain_name = {{ default_project_domain_name }}
region_name = {{ openstack_region_name }}
cafile = {{ openstack_cacert | default(omit) }}
valid_interfaces = internal
[notifications]
@ -221,6 +227,7 @@ connection_string = {{ osprofiler_backend_connection_string }}
{% if enable_barbican | bool %}
[barbican]
auth_endpoint = {{ keystone_internal_url }}
cafile = {{ openstack_cacert | default(omit) }}
{% endif %}
{% if nova_compute_virt_type == "xenapi" %}

View File

@ -29,9 +29,11 @@ password = {{ placement_keystone_password }}
project_domain_name = {{ default_project_domain_name }}
user_domain_name = {{ default_user_domain_name }}
os_region_name = {{ openstack_region_name }}
cafile = {{ openstack_cacert | default(omit) }}
[glance]
api_servers = {{ internal_protocol }}://{{ glance_internal_fqdn | put_address_in_context('url') }}:{{ glance_api_port }}
cafile = {{ openstack_cacert | default(omit) }}
[hyperv]
@ -57,6 +59,7 @@ username = {{ neutron_keystone_user }}
password = {{ neutron_keystone_password }}
auth_url = {{ keystone_admin_url }}/v3
auth_type = v3password
cafile = {{ openstack_cacert | default(omit) }}
[oslo_messaging_notifications]
transport_url = {{ notify_transport_url }}

View File

@ -59,8 +59,9 @@ lock_path = /var/lib/nova/tmp
[glance]
api_servers = {{ internal_protocol }}://{{ glance_internal_fqdn | put_address_in_context('url') }}:{{ glance_api_port }}
cafile = {{ openstack_cacert | default(omit) }}
num_retries = {{ groups['glance-api'] | length }}
debug = {{ nova_logging_debug }}
{% if enable_cinder | bool %}
[cinder]
@ -73,6 +74,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ cinder_keystone_user }}
password = {{ cinder_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
{% endif %}
[neutron]
@ -90,6 +92,7 @@ username = {{ neutron_keystone_user }}
password = {{ neutron_keystone_password }}
region_name = {{ openstack_region_name }}
valid_interfaces = internal
cafile = {{ openstack_cacert | default(omit) }}
[database]
connection = mysql+pymysql://{{ nova_cell0_database_user }}:{{ nova_cell0_database_password }}@{{ nova_cell0_database_address }}/{{ nova_cell0_database_name }}
@ -116,6 +119,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ nova_keystone_user }}
password = {{ nova_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}
@ -141,9 +145,6 @@ policy_file = {{ nova_policy_file }}
[privsep_entrypoint]
helper_command=sudo nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf
[glance]
debug = {{ nova_logging_debug }}
[guestfs]
debug = {{ nova_logging_debug }}
@ -169,6 +170,7 @@ user_domain_name = {{ default_user_domain_name }}
project_name = service
project_domain_name = {{ default_project_domain_name }}
region_name = {{ openstack_region_name }}
cafile = {{ openstack_cacert | default(omit) }}
valid_interfaces = internal
[notifications]
@ -193,4 +195,5 @@ connection_string = {{ osprofiler_backend_connection_string }}
{% if enable_barbican | bool %}
[barbican]
auth_endpoint = {{ keystone_internal_url }}
cafile = {{ openstack_cacert | default(omit) }}
{% endif %}

View File

@ -44,6 +44,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ octavia_keystone_user }}
password = {{ octavia_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}
@ -83,11 +84,14 @@ policy_file = {{ octavia_policy_file }}
[glance]
region_name = {{ openstack_region_name }}
endpoint_type = internal
ca_certificates_file == {{ openstack_cacert | default(omit) }}
[neutron]
region_name = {{ openstack_region_name }}
endpoint_type = internal
ca_certificates_file == {{ openstack_cacert | default(omit) }}
[nova]
region_name = {{ openstack_region_name }}
endpoint_type = internal
ca_certificates_file == {{ openstack_cacert | default(omit) }}

View File

@ -25,6 +25,7 @@ username = {{ panko_keystone_user }}
password = {{ panko_keystone_password }}
auth_url = {{ keystone_admin_url }}
auth_type = password
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -42,6 +42,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ placement_keystone_user }}
password = {{ placement_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -28,6 +28,7 @@ project_name = service
username = {{ qinling_keystone_user }}
password = {{ qinling_keystone_password }}
region_name = {{ openstack_region_name }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -21,6 +21,7 @@ project_name = service
project_domain_name = {{ default_project_domain_name }}
username = {{ sahara_keystone_user }}
password = {{ sahara_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}
@ -51,3 +52,4 @@ user_domain_name = {{ default_user_domain_name }}
username = {{ sahara_keystone_user }}
password = {{ sahara_keystone_password }}
auth_url = {{ keystone_admin_url }}/v3
cafile = {{ openstack_cacert | default(omit) }}

View File

@ -29,6 +29,7 @@ user_domain_name = {{ default_user_domain_name }}
username = {{ searchlight_keystone_user }}
password = {{ searchlight_keystone_password }}
auth_type = password
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}
@ -60,6 +61,7 @@ username = {{ searchlight_keystone_user }}
password = {{ searchlight_keystone_password }}
auth_type = password
auth_plugin = password
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -49,6 +49,7 @@ project_name = service
username = {{ senlin_keystone_user }}
password = {{ senlin_keystone_password }}
service_token_roles_required = False
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -51,6 +51,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ solum_keystone_user }}
password = {{ solum_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -44,6 +44,7 @@ project_name = service
username = {{ swift_keystone_user }}
password = {{ swift_keystone_password }}
delay_auth_decision = {{ swift_delay_auth_decision }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -38,6 +38,7 @@ user_domain_name = {{ default_user_domain_id }}
project_name = service
username = {{ tacker_keystone_user }}
password = {{ tacker_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -19,6 +19,7 @@
retention_policy = "autogen"
write_consistency = "any"
timeout = "5s"
tls_ca = {{ openstack_cacert | default(omit) }}
{% endfor %}
{% endif %}
[[inputs.cpu]]

View File

@ -10,7 +10,6 @@ admin_password = {{ keystone_admin_password }}
admin_project_name = {{ openstack_auth.project_name }}
admin_domain_name = {{ openstack_auth.domain_name }}
[dashboard]
dashboard_url = {{ internal_protocol }}://{{ kolla_internal_fqdn }}
login_url = {{ internal_protocol }}://{{ kolla_internal_fqdn }}/auth/login/
@ -42,6 +41,7 @@ region = {{ openstack_region_name }}
auth_version = v3
uri = {{ keystone_admin_url }}/v2.0
uri_v3 = {{ keystone_admin_url }}/v3
ca_certificates_file = {{ openstack_cacert | default(omit) }}
[image]
region = {{ openstack_region_name }}

View File

@ -39,6 +39,7 @@ username = {{ trove_keystone_user }}
password = {{ trove_keystone_password }}
auth_url = {{ keystone_admin_url }}
auth_type = password
cafile = {{ openstack_cacert | default(omit) }}
[oslo_messaging_notifications]
transport_url = {{ notify_transport_url }}

View File

@ -39,6 +39,7 @@ project_name = service
username = {{ vitrage_keystone_user }}
password = {{ vitrage_keystone_password }}
service_token_roles_required = True
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}
@ -54,6 +55,7 @@ project_name = admin
password = {{ vitrage_keystone_password }}
username = {{ vitrage_keystone_user }}
interface = internal
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}

View File

@ -26,6 +26,7 @@ project_name = service
username = {{ watcher_keystone_user }}
password = {{ watcher_keystone_password }}
service_token_roles_required = True
cafile = {{ openstack_cacert | default(omit) }}
memcache_security_strategy = ENCRYPT
memcache_secret_key = {{ memcache_secret_key }}
@ -40,6 +41,7 @@ user_domain_id = {{ default_user_domain_id }}
project_name = service
username = {{ watcher_keystone_user }}
password = {{ watcher_keystone_password }}
cafile = {{ openstack_cacert | default(omit) }}
[oslo_concurrency]
lock_path = /var/lib/watcher/tmp

View File

@ -38,6 +38,7 @@ username = {{ zun_keystone_user }}
password = {{ zun_keystone_password }}
service_token_roles_required = True
region_name = {{ openstack_region_name }}
cafile = {{ openstack_cacert | default(omit) }}
{% if enable_memcached | bool %}
memcache_security_strategy = ENCRYPT
@ -59,6 +60,7 @@ username = {{ zun_keystone_user }}
password = {{ zun_keystone_password }}
service_token_roles_required = True
region_name = {{ openstack_region_name }}
cafile = {{ openstack_cacert | default(omit) }}
{% if enable_memcached | bool %}
memcache_security_strategy = ENCRYPT

View File

@ -0,0 +1,5 @@
---
features:
- Configure all openstack services to use the globally defined Certificate
Authority to verify HTTPs connections. The global CA is configured by the
'openstack_cacert' parameter.