11 Commits

Author SHA1 Message Date
Matthew J. Black
8ba0d32d5b fix ldap packages for keystone backend
When puppet runs it will try to install python-ldap and
python-ldappool. Each run will install one or the other
due to the other package settings telling the package
manager to uninstall it.

Change-Id: I13a0af479dcac45ff77685f5eccfb865f7dab0f5
Closes-Bug: #1709519
2017-08-09 17:07:01 -04:00
LarsErikP
e7840bfbef Adds support for configuring group_ad_nesting in keystone LDAP backend
Change-Id: I43dbfbec4f3caadc821a2e07716bdb258e8ca984
Closes-Bug: #1700070
2017-06-27 22:18:54 +02:00
Juan Antonio Osorio Robles
d7bc6907d3 Enable creating the domain for LDAP backends
this enables the creation of the actual keystone domain if the
configuration is created (via the ldap_backend resource). This is done
with the flag create_domain_entry which is false by default.

Change-Id: Ib6c633b6a975e4b760c10a2aef3c252885b05e28
2017-04-06 19:17:17 +03:00
Christopher Brown
2e32ee5ced Implement chase referrals parameter
python-ldap follows/chases referrals with anonymous access but
this is disabled by default in Active Directory. There is an
argument to set this to default to disabled but for the moment
just present an option for the user to choose.

For further information see:
https://access.redhat.com/solutions/2309891

Change-Id: I83ff3186ecced663a30a028e153f9259427fa13d
Signed-off-by: Christopher Brown <snecklifter@gmail.com>
2016-09-20 13:51:29 -06:00
Emilien Macchi
8497b7573b Revert "Fix ldap_backend and puppet 4.6"
Puppet 4.6.1 has been released and we should not need this workaround
anymore.

This reverts commit 2f76f68fadd76b6d52ed7eeca19c032308419bd9.

Change-Id: Ieaf3d2a86046e178c36fc4bf5f8a69e161910902
2016-08-23 23:19:36 -04:00
Sofer Athlan-Guyot
2f76f68fad Fix ldap_backend and puppet 4.6
On xenial after update from puppet-agent 1.5 to 1.6, which include an
upgrade from 4.5 to 4.6 of puppet this code stopped working.

The ensure_resource in the keystone/init.pp manifest was not evaluated.
Adding this include seems to make it work again and we see that is the
log:

```
     Debug: Resource keystone_config[identity/domain_specific_drivers_enabled] was not determined to be defined
     Debug: Create new resource keystone_config[identity/domain_specific_drivers_enabled] with params {"value"=>true}
```

while without the include ::keystone, it's not there.

Puppet guru needed as to the why.

Change-Id: Ief78d70b8fe114ddf40d98fab93374862d3c23cb
2016-08-16 13:53:50 +02:00
Matthew J Black
8594336d74 domain backend drivers set in domain config
When using the ldap_backend define, it will set the global
keystone configuration to use that driver too. This causes
an issue where default domain might be sql for openstack
service accounts and ldap for user accounts. The class
keystone::ldap handles setting the drivers in the global
keystone config file.

Change-Id: I768c5130a6fc23ec0a0bc7686f76cc859b4c8022
Closes-Bug: 1563261
2016-03-29 08:55:10 -04:00
Jenkins
2f4319089e Merge "use stevedore names when possible and cleanup ldap testing" 2016-02-29 20:18:46 +00:00
Emilien Macchi
1f051ca9b7 use stevedore names when possible and cleanup ldap testing
Instead of using long backend/drivers name, use short name and stevedore
will load plugins for us.

It will prevent this kind of message in logs:
Failed to load 'keystone.catalog.backends.sql.Catalog' using stevedore:
No 'keystone.catalog' driver found,

Also cleanup unit and functional tests that were setting wrong
credential & assignment drivers.

Change-Id: Id3b8ed63ef9a821eba5374af7ed0fd1c8d755e09
2016-02-29 09:26:13 -05:00
Matt Fischer
3899798cb1 Remove deprecated tenant_ LDAP parameters
This cleans up a ton of useless code.

Change-Id: Ibd827dc2ad7c747714bd64a114e7374218789546
2016-02-25 22:39:29 +00:00
Sofer Athlan-Guyot
cf3d5e1ba7 Support for multiple ldap backend.
This enable the user to inject multiple ldap backend configurations into
keystone.

Currently the ldap configuration is modeled through a class and injected
inside keystone.conf.  In a multiple domains environment, this prevents
the user to create a ldap configuration by domain.

A deprecation warning is added to the current ldap class.  This class is
not using the define as doing so would automatically trigger a restart
of the keystone server.  This would be unexpected by the openstack
operator and would certainly be seen as a bug.  This imply a lot of code
duplication but is required to make a smooth transition.

Change-Id: I75307d4a04510d8ba1a24663b1724849ea5b48f5
2016-01-06 16:30:51 +00:00