61a762d2cf
Now ,we actually use admin_token to set keystone password for the admin user, but admin_token will be removed in a later release, so add admin_password parameter setting. Change-Id: I33999503d42fd0405fddc5dce906f1518ac1e732 Closes-Bug: #1644158
126 lines
4.5 KiB
Puppet
126 lines
4.5 KiB
Puppet
# Configure the Keystone service
|
|
#
|
|
# [*default_domain*]
|
|
# (optional) Define the default domain id.
|
|
# Set to 'undef' for 'Default' domain.
|
|
# Default to undef.
|
|
#
|
|
# [*using_domain_config*]
|
|
# (optional) Eases the use of the keystone_domain_config resource type.
|
|
# It ensures that a directory for holding the domain configuration is present
|
|
# and the associated configuration in keystone.conf is set up right.
|
|
# Defaults to false
|
|
#
|
|
# [*token_provider*]
|
|
# (optional) Define the token provider to use.
|
|
# Default to 'uuid'.
|
|
#
|
|
class openstack_integration::keystone (
|
|
$default_domain = undef,
|
|
$using_domain_config = false,
|
|
$token_provider = 'uuid',
|
|
) {
|
|
|
|
include ::openstack_integration::config
|
|
include ::openstack_integration::params
|
|
|
|
if $::openstack_integration::config::ssl {
|
|
openstack_integration::ssl_key { 'keystone':
|
|
notify => Service['httpd'],
|
|
require => Package['keystone'],
|
|
}
|
|
Exec['update-ca-certificates'] ~> Service['httpd']
|
|
}
|
|
|
|
if $token_provider == 'fernet' {
|
|
$enable_fernet_setup = true
|
|
} else {
|
|
$enable_fernet_setup = false
|
|
}
|
|
|
|
# Keystone credential setup is not packaged in UCA yet.
|
|
# It should be done when Newton is released.
|
|
if $::osfamily == 'RedHat' {
|
|
$enable_credential_setup = true
|
|
} else {
|
|
$enable_credential_setup = false
|
|
}
|
|
|
|
class { '::keystone::client': }
|
|
class { '::keystone::cron::token_flush': }
|
|
class { '::keystone::db::mysql':
|
|
password => 'keystone',
|
|
}
|
|
class { '::keystone':
|
|
debug => true,
|
|
database_connection => 'mysql+pymysql://keystone:keystone@127.0.0.1/keystone',
|
|
admin_token => 'a_big_token',
|
|
admin_password => 'a_big_secret',
|
|
enabled => true,
|
|
service_name => 'httpd',
|
|
default_domain => $default_domain,
|
|
using_domain_config => $using_domain_config,
|
|
enable_ssl => $::openstack_integration::config::ssl,
|
|
public_bind_host => $::openstack_integration::config::host,
|
|
admin_bind_host => $::openstack_integration::config::host,
|
|
manage_policyrcd => true,
|
|
token_provider => $token_provider,
|
|
enable_fernet_setup => $enable_fernet_setup,
|
|
enable_credential_setup => $enable_credential_setup,
|
|
}
|
|
include ::apache
|
|
class { '::keystone::wsgi::apache':
|
|
bind_host => $::openstack_integration::config::ip_for_url,
|
|
admin_bind_host => $::openstack_integration::config::ip_for_url,
|
|
ssl => $::openstack_integration::config::ssl,
|
|
ssl_key => "/etc/keystone/ssl/private/${::fqdn}.pem",
|
|
ssl_cert => $::openstack_integration::params::cert_path,
|
|
workers => 2,
|
|
}
|
|
# Workaround to purge Keystone vhost that is provided & activated by default with running
|
|
# Canonical packaging (called 'keystone').
|
|
if ($::operatingsystem == 'Ubuntu') and (versioncmp($::operatingsystemmajrelease, '16') >= 0) {
|
|
ensure_resource('file', '/etc/apache2/sites-available/keystone.conf', {
|
|
'ensure' => 'absent',
|
|
})
|
|
ensure_resource('file', '/etc/apache2/sites-enabled/keystone.conf', {
|
|
'ensure' => 'absent',
|
|
})
|
|
|
|
Package['keystone'] -> File['/etc/apache2/sites-available/keystone.conf']
|
|
-> File['/etc/apache2/sites-enabled/keystone.conf'] ~> Anchor['keystone::install::end']
|
|
}
|
|
class { '::keystone::roles::admin':
|
|
email => 'test@example.tld',
|
|
password => 'a_big_secret',
|
|
}
|
|
class { '::keystone::endpoint':
|
|
default_domain => $default_domain,
|
|
public_url => $::openstack_integration::config::keystone_auth_uri,
|
|
admin_url => $::openstack_integration::config::keystone_admin_uri,
|
|
}
|
|
class { '::keystone::disable_admin_token_auth': }
|
|
|
|
class { '::openstack_extras::auth_file':
|
|
password => 'a_big_secret',
|
|
project_domain => 'default',
|
|
user_domain => 'default',
|
|
auth_url => "${::openstack_integration::config::keystone_auth_uri}/v3/",
|
|
}
|
|
|
|
# We need tempest users to have the creator role to be able to store
|
|
# secrets in barbican. We do this by adding the creator role to the
|
|
# tempest_roles list in tempest.conf.
|
|
# We also need the Member role for some swift container tests.
|
|
# Ordinarily tempest code in dynamic_creds.py would create
|
|
# this role and assign users to it. This code is not executed, however,
|
|
# when tempest_roles is defined. Therefore we need to make sure this
|
|
# role is created here, and added to tempest_roles.
|
|
keystone_role { 'creator':
|
|
ensure => present,
|
|
}
|
|
keystone_role { 'Member':
|
|
ensure => present,
|
|
}
|
|
}
|