From 1b941f3a4ea1be4e4ac340e0048e9b2e1be8f892 Mon Sep 17 00:00:00 2001 From: Takashi Kajinami Date: Fri, 12 Jul 2019 11:16:59 +0900 Subject: [PATCH] Configure keystone_authtoken/service_token_roles This patch introduces a new hieradata to configure service_token_roles in keystone authtoken middleware configuration, so that we can use a customized role for user who uses service token feature. Change-Id: I99c8355a919c223a59f926fa80c5f83d39a52577 --- manifests/keystone/authtoken.pp | 12 ++++++++++++ ...thtoken-service_token_roles-342a535a433575e8.yaml | 6 ++++++ spec/classes/placement_keystone_authtoken_spec.rb | 3 +++ 3 files changed, 21 insertions(+) create mode 100644 releasenotes/notes/keystone_authtoken-service_token_roles-342a535a433575e8.yaml diff --git a/manifests/keystone/authtoken.pp b/manifests/keystone/authtoken.pp index 63fc706..8f16e03 100644 --- a/manifests/keystone/authtoken.pp +++ b/manifests/keystone/authtoken.pp @@ -161,6 +161,16 @@ # (in seconds). Set to -1 to disable caching completely. Integer value # Defaults to $::os_service_default. # +# [*service_token_roles*] +# (Optional) A choice of roles that must be present in a service token. +# Service tokens are allowed to request that an expired token +# can be used and so this check should tightly control that +# only actual services should be sending this token. Roles +# here are applied as an ANY check so any role in this list +# must be present. For backwards compatibility reasons this +# currently only affects the allow_expired check. (list value) +# Defaults to $::os_service_default. +# # [*service_token_roles_required*] # (optional) backwards compatibility to ensure that the service tokens are # compared against a list of possible roles for validity @@ -200,6 +210,7 @@ class placement::keystone::authtoken( $manage_memcache_package = false, $region_name = $::os_service_default, $token_cache_time = $::os_service_default, + $service_token_roles = $::os_service_default, $service_token_roles_required = $::os_service_default, ) { @@ -242,6 +253,7 @@ class placement::keystone::authtoken( manage_memcache_package => $manage_memcache_package, region_name => $region_name, token_cache_time => $token_cache_time, + service_token_roles => $service_token_roles, service_token_roles_required => $service_token_roles_required, } } diff --git a/releasenotes/notes/keystone_authtoken-service_token_roles-342a535a433575e8.yaml b/releasenotes/notes/keystone_authtoken-service_token_roles-342a535a433575e8.yaml new file mode 100644 index 0000000..82623db --- /dev/null +++ b/releasenotes/notes/keystone_authtoken-service_token_roles-342a535a433575e8.yaml @@ -0,0 +1,6 @@ +--- +features: + - | + New hieradata, placement::keystone::authtoken::service_token_roles, is + introduced so that specific role can be assigned to the service user + who can use service token feature. diff --git a/spec/classes/placement_keystone_authtoken_spec.rb b/spec/classes/placement_keystone_authtoken_spec.rb index 465c0ee..6e13c04 100644 --- a/spec/classes/placement_keystone_authtoken_spec.rb +++ b/spec/classes/placement_keystone_authtoken_spec.rb @@ -39,6 +39,7 @@ describe 'placement::keystone::authtoken' do is_expected.to contain_placement_config('keystone_authtoken/memcached_servers').with_value('') is_expected.to contain_placement_config('keystone_authtoken/region_name').with_value('') is_expected.to contain_placement_config('keystone_authtoken/token_cache_time').with_value('') + is_expected.to contain_placement_config('keystone_authtoken/service_token_roles').with_value('') is_expected.to contain_placement_config('keystone_authtoken/service_token_roles_required').with_value('') } end @@ -78,6 +79,7 @@ describe 'placement::keystone::authtoken' do :manage_memcache_package => true, :region_name => 'region2', :token_cache_time => '301', + :service_token_roles => ['service'], :service_token_roles_required => false, }) end @@ -114,6 +116,7 @@ describe 'placement::keystone::authtoken' do is_expected.to contain_placement_config('keystone_authtoken/memcached_servers').with_value('memcached01:11211,memcached02:11211') is_expected.to contain_placement_config('keystone_authtoken/region_name').with_value(params[:region_name]) is_expected.to contain_placement_config('keystone_authtoken/token_cache_time').with_value(params[:token_cache_time]) + is_expected.to contain_placement_config('keystone_authtoken/service_token_roles').with_value(params[:service_token_roles]) is_expected.to contain_placement_config('keystone_authtoken/service_token_roles_required').with_value(params[:service_token_roles_required]) }