blob: a1875e183b08984a39eda3f0f4430a2d991170e9 [file] [log] [blame]
Jesse Andrews73e27b82011-09-12 17:55:00 -07001#!/bin/bash
Dean Troyerb7d1fbb2012-03-02 08:43:09 -06002#
3# Initial data for Keystone using python-keystoneclient
4#
Doug Hellmann4a2b1c62012-11-01 16:23:52 -04005# Tenant User Roles
Chmouel Boudjnah77b0e1d2012-02-29 16:55:43 +00006# ------------------------------------------------------------------
Doug Hellmann4a2b1c62012-11-01 16:23:52 -04007# service glance admin
Joe Gordon1216b9f2013-06-04 18:55:06 +00008# service swift service # if enabled
9# service heat service # if enabled
10# service ceilometer service # if enabled
Jay Pipesb297d2d2012-05-10 11:21:22 -040011# Tempest Only:
12# alt_demo alt_demo Member
Dean Troyerb7d1fbb2012-03-02 08:43:09 -060013#
14# Variables set before calling this script:
15# SERVICE_TOKEN - aka admin_token in keystone.conf
16# SERVICE_ENDPOINT - local Keystone admin endpoint
17# SERVICE_TENANT_NAME - name of tenant containing service accounts
Dean Troyer3f7c06f2012-04-03 17:19:36 -050018# SERVICE_HOST - host used for endpoint creation
Dean Troyerb7d1fbb2012-03-02 08:43:09 -060019# ENABLED_SERVICES - stack.sh's list of services to start
20# DEVSTACK_DIR - Top-level DevStack directory
Dean Troyer3f7c06f2012-04-03 17:19:36 -050021# KEYSTONE_CATALOG_BACKEND - used to determine service catalog creation
22
23# Defaults
24# --------
Dean Troyerb7d1fbb2012-03-02 08:43:09 -060025
26ADMIN_PASSWORD=${ADMIN_PASSWORD:-secrete}
27SERVICE_PASSWORD=${SERVICE_PASSWORD:-$ADMIN_PASSWORD}
Vishvananda Ishayad1f52432012-02-09 03:50:57 +000028export SERVICE_TOKEN=$SERVICE_TOKEN
29export SERVICE_ENDPOINT=$SERVICE_ENDPOINT
Dean Troyerb7d1fbb2012-03-02 08:43:09 -060030SERVICE_TENANT_NAME=${SERVICE_TENANT_NAME:-service}
Vishvananda Ishayad1f52432012-02-09 03:50:57 +000031
32function get_id () {
Dean Troyer3f7c06f2012-04-03 17:19:36 -050033 echo `"$@" | awk '/ id / { print $4 }'`
Vishvananda Ishayad1f52432012-02-09 03:50:57 +000034}
35
Dean Troyerd835de82012-11-29 17:11:35 -060036# Lookups
37SERVICE_TENANT=$(keystone tenant-list | awk "/ $SERVICE_TENANT_NAME / { print \$2 }")
38ADMIN_ROLE=$(keystone role-list | awk "/ admin / { print \$2 }")
Dean Troyer671c16e2012-12-13 16:22:38 -060039MEMBER_ROLE=$(keystone role-list | awk "/ Member / { print \$2 }")
Jesse Andrews73e27b82011-09-12 17:55:00 -070040
Dean Troyer0bd24102012-03-08 00:33:54 -060041
Jesse Andrews73e27b82011-09-12 17:55:00 -070042# Roles
Dean Troyer3f7c06f2012-04-03 17:19:36 -050043# -----
44
guillaume pernot901eed72012-11-29 08:44:58 +010045# The ResellerAdmin role is used by Nova and Ceilometer so we need to keep it.
46# The admin role in swift allows a user to act as an admin for their tenant,
47# but ResellerAdmin is needed for a user to act as any tenant. The name of this
48# role is also configurable in swift-proxy.conf
49RESELLER_ROLE=$(get_id keystone role-create --name=ResellerAdmin)
Joe Gordon1216b9f2013-06-04 18:55:06 +000050# Service role, so service users do not have to be admins
51SERVICE_ROLE=$(get_id keystone role-create --name=service)
Jesse Andrews73e27b82011-09-12 17:55:00 -070052
Dean Troyer671c16e2012-12-13 16:22:38 -060053
Dean Troyer3f7c06f2012-04-03 17:19:36 -050054# Services
55# --------
termiea96a4182012-01-09 22:13:29 -080056
Chmouel Boudjnah0c3a5582013-03-06 10:58:33 +010057if [[ "$ENABLED_SERVICES" =~ "n-api" ]] && [[ "$ENABLED_SERVICES" =~ "s-proxy" || "$ENABLED_SERVICES" =~ "swift" ]]; then
Dean Troyera0dce262012-12-11 16:52:37 -060058 NOVA_USER=$(keystone user-list | awk "/ nova / { print \$2 }")
Chmouel Boudjnah77b0e1d2012-02-29 16:55:43 +000059 # Nova needs ResellerAdmin role to download images when accessing
guillaume pernot901eed72012-11-29 08:44:58 +010060 # swift through the s3 api.
Dean Troyer3f7c06f2012-04-03 17:19:36 -050061 keystone user-role-add \
62 --tenant_id $SERVICE_TENANT \
63 --user_id $NOVA_USER \
64 --role_id $RESELLER_ROLE
Jesse Andrews9c7c9082011-11-23 10:10:53 -080065fi
Dean Troyerb7d1fbb2012-03-02 08:43:09 -060066
Steve Bakerbfdad752012-08-18 09:00:42 +120067# Heat
68if [[ "$ENABLED_SERVICES" =~ "heat" ]]; then
69 HEAT_USER=$(get_id keystone user-create --name=heat \
70 --pass="$SERVICE_PASSWORD" \
71 --tenant_id $SERVICE_TENANT \
72 --email=heat@example.com)
73 keystone user-role-add --tenant_id $SERVICE_TENANT \
74 --user_id $HEAT_USER \
Joe Gordon1216b9f2013-06-04 18:55:06 +000075 --role_id $SERVICE_ROLE
Steve Baker053a5f82012-12-11 17:08:48 +130076 # heat_stack_user role is for users created by Heat
77 keystone role-create --name heat_stack_user
Steve Bakerbfdad752012-08-18 09:00:42 +120078 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
Steve Baker36cf7ee2012-09-17 16:49:24 +120079 HEAT_CFN_SERVICE=$(get_id keystone service-create \
Steve Bakerbb421be2012-10-10 13:19:10 +130080 --name=heat-cfn \
81 --type=cloudformation \
82 --description="Heat CloudFormation Service")
Steve Bakerbfdad752012-08-18 09:00:42 +120083 keystone endpoint-create \
84 --region RegionOne \
Angus Salkelde2790212012-09-11 11:24:09 +100085 --service_id $HEAT_CFN_SERVICE \
86 --publicurl "http://$SERVICE_HOST:$HEAT_API_CFN_PORT/v1" \
87 --adminurl "http://$SERVICE_HOST:$HEAT_API_CFN_PORT/v1" \
88 --internalurl "http://$SERVICE_HOST:$HEAT_API_CFN_PORT/v1"
Steve Bakerbb421be2012-10-10 13:19:10 +130089 HEAT_SERVICE=$(get_id keystone service-create \
90 --name=heat \
91 --type=orchestration \
92 --description="Heat Service")
93 keystone endpoint-create \
94 --region RegionOne \
95 --service_id $HEAT_SERVICE \
96 --publicurl "http://$SERVICE_HOST:$HEAT_API_PORT/v1/\$(tenant_id)s" \
97 --adminurl "http://$SERVICE_HOST:$HEAT_API_PORT/v1/\$(tenant_id)s" \
98 --internalurl "http://$SERVICE_HOST:$HEAT_API_PORT/v1/\$(tenant_id)s"
Steve Bakerbfdad752012-08-18 09:00:42 +120099 fi
100fi
101
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500102# Glance
103if [[ "$ENABLED_SERVICES" =~ "g-api" ]]; then
104 GLANCE_USER=$(get_id keystone user-create \
105 --name=glance \
106 --pass="$SERVICE_PASSWORD" \
107 --tenant_id $SERVICE_TENANT \
108 --email=glance@example.com)
109 keystone user-role-add \
110 --tenant_id $SERVICE_TENANT \
111 --user_id $GLANCE_USER \
112 --role_id $ADMIN_ROLE
113 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
114 GLANCE_SERVICE=$(get_id keystone service-create \
115 --name=glance \
116 --type=image \
117 --description="Glance Image Service")
118 keystone endpoint-create \
119 --region RegionOne \
120 --service_id $GLANCE_SERVICE \
Steve Baker8d6c9bc2012-09-11 10:05:14 +1200121 --publicurl "http://$SERVICE_HOST:9292" \
122 --adminurl "http://$SERVICE_HOST:9292" \
123 --internalurl "http://$SERVICE_HOST:9292"
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500124 fi
125fi
126
127# Swift
Chmouel Boudjnah0c3a5582013-03-06 10:58:33 +0100128
129if [[ "$ENABLED_SERVICES" =~ "swift" || "$ENABLED_SERVICES" =~ "s-proxy" ]]; then
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500130 SWIFT_USER=$(get_id keystone user-create \
131 --name=swift \
132 --pass="$SERVICE_PASSWORD" \
133 --tenant_id $SERVICE_TENANT \
134 --email=swift@example.com)
135 keystone user-role-add \
136 --tenant_id $SERVICE_TENANT \
137 --user_id $SWIFT_USER \
Joe Gordon1216b9f2013-06-04 18:55:06 +0000138 --role_id $SERVICE_ROLE
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500139 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
140 SWIFT_SERVICE=$(get_id keystone service-create \
141 --name=swift \
142 --type="object-store" \
143 --description="Swift Service")
144 keystone endpoint-create \
145 --region RegionOne \
146 --service_id $SWIFT_SERVICE \
147 --publicurl "http://$SERVICE_HOST:8080/v1/AUTH_\$(tenant_id)s" \
Steve Baker8d6c9bc2012-09-11 10:05:14 +1200148 --adminurl "http://$SERVICE_HOST:8080" \
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500149 --internalurl "http://$SERVICE_HOST:8080/v1/AUTH_\$(tenant_id)s"
150 fi
151fi
152
Doug Hellmann4a2b1c62012-11-01 16:23:52 -0400153if [[ "$ENABLED_SERVICES" =~ "ceilometer" ]]; then
154 CEILOMETER_USER=$(get_id keystone user-create --name=ceilometer \
155 --pass="$SERVICE_PASSWORD" \
156 --tenant_id $SERVICE_TENANT \
157 --email=ceilometer@example.com)
158 keystone user-role-add --tenant_id $SERVICE_TENANT \
159 --user_id $CEILOMETER_USER \
Joe Gordon1216b9f2013-06-04 18:55:06 +0000160 --role_id $SERVICE_ROLE
guillaume pernot901eed72012-11-29 08:44:58 +0100161 # Ceilometer needs ResellerAdmin role to access swift account stats.
162 keystone user-role-add --tenant_id $SERVICE_TENANT \
163 --user_id $CEILOMETER_USER \
164 --role_id $RESELLER_ROLE
Julien Danjouf36afe52012-10-04 18:00:10 +0200165 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
166 CEILOMETER_SERVICE=$(get_id keystone service-create \
167 --name=ceilometer \
168 --type=metering \
169 --description="Ceilometer Service")
170 keystone endpoint-create \
171 --region RegionOne \
172 --service_id $CEILOMETER_SERVICE \
Eoghan Glynn21ddaac2013-03-05 12:40:59 +0000173 --publicurl "http://$SERVICE_HOST:8777" \
174 --adminurl "http://$SERVICE_HOST:8777" \
175 --internalurl "http://$SERVICE_HOST:8777"
Julien Danjouf36afe52012-10-04 18:00:10 +0200176 fi
177fi
178
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500179# EC2
180if [[ "$ENABLED_SERVICES" =~ "n-api" ]]; then
181 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
182 EC2_SERVICE=$(get_id keystone service-create \
183 --name=ec2 \
184 --type=ec2 \
185 --description="EC2 Compatibility Layer")
186 keystone endpoint-create \
187 --region RegionOne \
188 --service_id $EC2_SERVICE \
189 --publicurl "http://$SERVICE_HOST:8773/services/Cloud" \
190 --adminurl "http://$SERVICE_HOST:8773/services/Admin" \
191 --internalurl "http://$SERVICE_HOST:8773/services/Cloud"
192 fi
193fi
194
195# S3
Chmouel Boudjnah0c3a5582013-03-06 10:58:33 +0100196if [[ "$ENABLED_SERVICES" =~ "n-obj" || "$ENABLED_SERVICES" =~ "swift3" ]]; then
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500197 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
198 S3_SERVICE=$(get_id keystone service-create \
199 --name=s3 \
200 --type=s3 \
201 --description="S3")
202 keystone endpoint-create \
203 --region RegionOne \
204 --service_id $S3_SERVICE \
205 --publicurl "http://$SERVICE_HOST:$S3_SERVICE_PORT" \
206 --adminurl "http://$SERVICE_HOST:$S3_SERVICE_PORT" \
207 --internalurl "http://$SERVICE_HOST:$S3_SERVICE_PORT"
208 fi
Gabriel Hurleya3a496f2012-02-13 12:29:23 -0800209fi
Jay Pipesb297d2d2012-05-10 11:21:22 -0400210
211if [[ "$ENABLED_SERVICES" =~ "tempest" ]]; then
212 # Tempest has some tests that validate various authorization checks
213 # between two regular users in separate tenants
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500214 ALT_DEMO_TENANT=$(get_id keystone tenant-create \
215 --name=alt_demo)
216 ALT_DEMO_USER=$(get_id keystone user-create \
217 --name=alt_demo \
218 --pass="$ADMIN_PASSWORD" \
219 --email=alt_demo@example.com)
220 keystone user-role-add \
221 --tenant_id $ALT_DEMO_TENANT \
222 --user_id $ALT_DEMO_USER \
223 --role_id $MEMBER_ROLE
Jay Pipesb297d2d2012-05-10 11:21:22 -0400224fi