20824c70d5
This enables usage of service user token for interaction with nova and barbican to avoid failure caused by token expiration during operations. This also enables service_token_roles_required option in authtoken middleware to allow only users with the service role to use this feature. Change-Id: Id6b0aad7aa24af2b6d03d484ada23357828c4325
157 lines
5.5 KiB
Puppet
157 lines
5.5 KiB
Puppet
# Configure the Glance service
|
|
#
|
|
# [*backend*]
|
|
# (optional) Glance backend to use.
|
|
# Can be 'file', 'swift', 'rbd' or 'cinder'.
|
|
# Defaults to 'file'.
|
|
#
|
|
# [*image_encryption*]
|
|
# (optional) Boolean to configure or not image encryption
|
|
# Defaults to false.
|
|
#
|
|
class openstack_integration::glance (
|
|
$backend = 'file',
|
|
$image_encryption = false,
|
|
) {
|
|
|
|
include openstack_integration::config
|
|
include openstack_integration::params
|
|
|
|
# TODO(tkajinam): Glance no longer supports native ssl since Ussuri release,
|
|
# so these parameters are unused now.
|
|
if $::openstack_integration::config::ssl {
|
|
openstack_integration::ssl_key { 'glance':
|
|
}
|
|
$key_file = undef
|
|
$crt_file = undef
|
|
} else {
|
|
$key_file = undef
|
|
$crt_file = undef
|
|
}
|
|
|
|
openstack_integration::mq_user { 'glance':
|
|
password => 'an_even_bigger_secret',
|
|
before => Anchor['glance::service::begin'],
|
|
}
|
|
|
|
class { 'glance::db::mysql':
|
|
charset => $::openstack_integration::params::mysql_charset,
|
|
collate => $::openstack_integration::params::mysql_collate,
|
|
password => 'glance',
|
|
host => $::openstack_integration::config::host,
|
|
}
|
|
include glance
|
|
include glance::client
|
|
class { 'glance::keystone::auth':
|
|
public_url => "http://${::openstack_integration::config::ip_for_url}:9292",
|
|
internal_url => "http://${::openstack_integration::config::ip_for_url}:9292",
|
|
admin_url => "http://${::openstack_integration::config::ip_for_url}:9292",
|
|
roles => ['admin', 'service'],
|
|
password => 'a_big_secret',
|
|
}
|
|
class { 'glance::api::authtoken':
|
|
password => 'a_big_secret',
|
|
user_domain_name => 'Default',
|
|
project_domain_name => 'Default',
|
|
auth_url => $::openstack_integration::config::keystone_admin_uri,
|
|
www_authenticate_uri => $::openstack_integration::config::keystone_auth_uri,
|
|
memcached_servers => $::openstack_integration::config::memcached_servers,
|
|
service_token_roles_required => true,
|
|
}
|
|
case $backend {
|
|
'file': {
|
|
glance::backend::multistore::file { 'file1': }
|
|
$default_backend = 'file1'
|
|
}
|
|
'rbd': {
|
|
glance::backend::multistore::rbd { 'rbd1':
|
|
rbd_store_user => 'openstack',
|
|
rbd_store_pool => 'glance',
|
|
}
|
|
# make sure ceph pool exists before running Glance API
|
|
Exec['create-glance'] -> Service['glance-api']
|
|
$default_backend = 'rbd1'
|
|
}
|
|
'swift': {
|
|
glance::backend::multistore::swift { 'swift1':
|
|
swift_store_user => 'services:glance',
|
|
swift_store_key => 'a_big_secret',
|
|
swift_store_create_container_on_put => 'True',
|
|
swift_store_auth_address => "${::openstack_integration::config::keystone_auth_uri}/v3",
|
|
swift_store_auth_version => '3',
|
|
}
|
|
$default_backend = 'swift1'
|
|
}
|
|
'cinder': {
|
|
glance::backend::multistore::cinder { 'cinder1':
|
|
cinder_store_auth_address => "${::openstack_integration::config::keystone_auth_uri}/v3",
|
|
cinder_store_project_name => 'services',
|
|
cinder_store_user_name => 'glance',
|
|
cinder_store_password => 'a_big_secret',
|
|
}
|
|
$default_backend = 'cinder1'
|
|
}
|
|
default: {
|
|
fail("Unsupported backend (${backend})")
|
|
}
|
|
}
|
|
|
|
$enabled_backends = ["${default_backend}:${backend}"]
|
|
|
|
class { 'glance::api::logging':
|
|
debug => true,
|
|
}
|
|
class { 'glance::api::db':
|
|
database_connection => os_database_connection({
|
|
'dialect' => 'mysql+pymysql',
|
|
'host' => $::openstack_integration::config::ip_for_url,
|
|
'username' => 'glance',
|
|
'password' => 'glance',
|
|
'database' => 'glance',
|
|
'charset' => 'utf8',
|
|
'extra' => $::openstack_integration::config::db_extra,
|
|
}),
|
|
}
|
|
class { 'glance::api':
|
|
workers => 2,
|
|
enabled_backends => $enabled_backends,
|
|
default_backend => $default_backend,
|
|
bind_host => $::openstack_integration::config::host,
|
|
}
|
|
class { 'glance::cron::db_purge': }
|
|
class { 'glance::notify::rabbitmq':
|
|
default_transport_url => os_transport_url({
|
|
'transport' => $::openstack_integration::config::messaging_default_proto,
|
|
'host' => $::openstack_integration::config::host,
|
|
'port' => $::openstack_integration::config::messaging_default_port,
|
|
'username' => 'glance',
|
|
'password' => 'an_even_bigger_secret',
|
|
}),
|
|
notification_transport_url => os_transport_url({
|
|
'transport' => $::openstack_integration::config::messaging_notify_proto,
|
|
'host' => $::openstack_integration::config::host,
|
|
'port' => $::openstack_integration::config::messaging_notify_port,
|
|
'username' => 'glance',
|
|
'password' => 'an_even_bigger_secret',
|
|
}),
|
|
notification_driver => 'messagingv2',
|
|
rabbit_use_ssl => $::openstack_integration::config::ssl,
|
|
}
|
|
|
|
if $image_encryption {
|
|
class { 'glance::key_manager':
|
|
backend => 'castellan.key_manager.barbican_key_manager.BarbicanKeyManager'
|
|
}
|
|
class { 'glance::key_manager::barbican':
|
|
barbican_endpoint => "${::openstack_integration::config::base_url}:9311",
|
|
auth_endpoint => "${::openstack_integration::config::keystone_auth_uri}/v3"
|
|
}
|
|
class { 'glance::key_manager::barbican::service_user':
|
|
password => 'a_big_secret',
|
|
user_domain_name => 'Default',
|
|
project_domain_name => 'Default',
|
|
auth_url => $::openstack_integration::config::keystone_admin_uri,
|
|
}
|
|
}
|
|
}
|