blob: 3f3137cb149bce1d3bc7fe4a3a42e16565b4d965 [file] [log] [blame]
Jesse Andrews73e27b82011-09-12 17:55:00 -07001#!/bin/bash
Dean Troyerb7d1fbb2012-03-02 08:43:09 -06002#
3# Initial data for Keystone using python-keystoneclient
4#
Doug Hellmann4a2b1c62012-11-01 16:23:52 -04005# Tenant User Roles
Chmouel Boudjnah77b0e1d2012-02-29 16:55:43 +00006# ------------------------------------------------------------------
Doug Hellmann4a2b1c62012-11-01 16:23:52 -04007# service glance admin
Joe Gordon1216b9f2013-06-04 18:55:06 +00008# service heat service # if enabled
Eoghan Glynne3d3cb72013-06-20 15:05:54 +00009# service ceilometer admin # if enabled
Jay Pipesb297d2d2012-05-10 11:21:22 -040010# Tempest Only:
11# alt_demo alt_demo Member
Dean Troyerb7d1fbb2012-03-02 08:43:09 -060012#
13# Variables set before calling this script:
14# SERVICE_TOKEN - aka admin_token in keystone.conf
15# SERVICE_ENDPOINT - local Keystone admin endpoint
16# SERVICE_TENANT_NAME - name of tenant containing service accounts
Dean Troyer3f7c06f2012-04-03 17:19:36 -050017# SERVICE_HOST - host used for endpoint creation
Dean Troyerb7d1fbb2012-03-02 08:43:09 -060018# ENABLED_SERVICES - stack.sh's list of services to start
19# DEVSTACK_DIR - Top-level DevStack directory
Dean Troyer3f7c06f2012-04-03 17:19:36 -050020# KEYSTONE_CATALOG_BACKEND - used to determine service catalog creation
21
22# Defaults
23# --------
Dean Troyerb7d1fbb2012-03-02 08:43:09 -060024
25ADMIN_PASSWORD=${ADMIN_PASSWORD:-secrete}
26SERVICE_PASSWORD=${SERVICE_PASSWORD:-$ADMIN_PASSWORD}
Vishvananda Ishayad1f52432012-02-09 03:50:57 +000027export SERVICE_TOKEN=$SERVICE_TOKEN
28export SERVICE_ENDPOINT=$SERVICE_ENDPOINT
Dean Troyerb7d1fbb2012-03-02 08:43:09 -060029SERVICE_TENANT_NAME=${SERVICE_TENANT_NAME:-service}
Vishvananda Ishayad1f52432012-02-09 03:50:57 +000030
31function get_id () {
Dean Troyer3f7c06f2012-04-03 17:19:36 -050032 echo `"$@" | awk '/ id / { print $4 }'`
Vishvananda Ishayad1f52432012-02-09 03:50:57 +000033}
34
Dean Troyerd835de82012-11-29 17:11:35 -060035# Lookups
36SERVICE_TENANT=$(keystone tenant-list | awk "/ $SERVICE_TENANT_NAME / { print \$2 }")
37ADMIN_ROLE=$(keystone role-list | awk "/ admin / { print \$2 }")
Dean Troyer671c16e2012-12-13 16:22:38 -060038MEMBER_ROLE=$(keystone role-list | awk "/ Member / { print \$2 }")
Jesse Andrews73e27b82011-09-12 17:55:00 -070039
Dean Troyer0bd24102012-03-08 00:33:54 -060040
Jesse Andrews73e27b82011-09-12 17:55:00 -070041# Roles
Dean Troyer3f7c06f2012-04-03 17:19:36 -050042# -----
43
guillaume pernot901eed72012-11-29 08:44:58 +010044# The ResellerAdmin role is used by Nova and Ceilometer so we need to keep it.
45# The admin role in swift allows a user to act as an admin for their tenant,
46# but ResellerAdmin is needed for a user to act as any tenant. The name of this
47# role is also configurable in swift-proxy.conf
48RESELLER_ROLE=$(get_id keystone role-create --name=ResellerAdmin)
Joe Gordon1216b9f2013-06-04 18:55:06 +000049# Service role, so service users do not have to be admins
50SERVICE_ROLE=$(get_id keystone role-create --name=service)
Jesse Andrews73e27b82011-09-12 17:55:00 -070051
Dean Troyer671c16e2012-12-13 16:22:38 -060052
Dean Troyer3f7c06f2012-04-03 17:19:36 -050053# Services
54# --------
termiea96a4182012-01-09 22:13:29 -080055
Chmouel Boudjnah0c3a5582013-03-06 10:58:33 +010056if [[ "$ENABLED_SERVICES" =~ "n-api" ]] && [[ "$ENABLED_SERVICES" =~ "s-proxy" || "$ENABLED_SERVICES" =~ "swift" ]]; then
Dean Troyera0dce262012-12-11 16:52:37 -060057 NOVA_USER=$(keystone user-list | awk "/ nova / { print \$2 }")
Chmouel Boudjnah77b0e1d2012-02-29 16:55:43 +000058 # Nova needs ResellerAdmin role to download images when accessing
guillaume pernot901eed72012-11-29 08:44:58 +010059 # swift through the s3 api.
Dean Troyer3f7c06f2012-04-03 17:19:36 -050060 keystone user-role-add \
Jorge Valderrama Romerof39ee962013-09-02 17:18:40 +020061 --tenant-id $SERVICE_TENANT \
62 --user-id $NOVA_USER \
63 --role-id $RESELLER_ROLE
Jesse Andrews9c7c9082011-11-23 10:10:53 -080064fi
Dean Troyerb7d1fbb2012-03-02 08:43:09 -060065
Steve Bakerbfdad752012-08-18 09:00:42 +120066# Heat
67if [[ "$ENABLED_SERVICES" =~ "heat" ]]; then
68 HEAT_USER=$(get_id keystone user-create --name=heat \
69 --pass="$SERVICE_PASSWORD" \
70 --tenant_id $SERVICE_TENANT \
71 --email=heat@example.com)
Jorge Valderrama Romerof39ee962013-09-02 17:18:40 +020072 keystone user-role-add --tenant-id $SERVICE_TENANT \
73 --user-id $HEAT_USER \
74 --role-id $SERVICE_ROLE
Steve Baker053a5f82012-12-11 17:08:48 +130075 # heat_stack_user role is for users created by Heat
76 keystone role-create --name heat_stack_user
Steve Bakerbfdad752012-08-18 09:00:42 +120077 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
Steve Baker36cf7ee2012-09-17 16:49:24 +120078 HEAT_CFN_SERVICE=$(get_id keystone service-create \
Steve Bakerbb421be2012-10-10 13:19:10 +130079 --name=heat-cfn \
80 --type=cloudformation \
81 --description="Heat CloudFormation Service")
Steve Bakerbfdad752012-08-18 09:00:42 +120082 keystone endpoint-create \
83 --region RegionOne \
Angus Salkelde2790212012-09-11 11:24:09 +100084 --service_id $HEAT_CFN_SERVICE \
85 --publicurl "http://$SERVICE_HOST:$HEAT_API_CFN_PORT/v1" \
86 --adminurl "http://$SERVICE_HOST:$HEAT_API_CFN_PORT/v1" \
87 --internalurl "http://$SERVICE_HOST:$HEAT_API_CFN_PORT/v1"
Steve Bakerbb421be2012-10-10 13:19:10 +130088 HEAT_SERVICE=$(get_id keystone service-create \
89 --name=heat \
90 --type=orchestration \
91 --description="Heat Service")
92 keystone endpoint-create \
93 --region RegionOne \
94 --service_id $HEAT_SERVICE \
95 --publicurl "http://$SERVICE_HOST:$HEAT_API_PORT/v1/\$(tenant_id)s" \
96 --adminurl "http://$SERVICE_HOST:$HEAT_API_PORT/v1/\$(tenant_id)s" \
97 --internalurl "http://$SERVICE_HOST:$HEAT_API_PORT/v1/\$(tenant_id)s"
Steve Bakerbfdad752012-08-18 09:00:42 +120098 fi
99fi
100
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500101# Glance
102if [[ "$ENABLED_SERVICES" =~ "g-api" ]]; then
103 GLANCE_USER=$(get_id keystone user-create \
104 --name=glance \
105 --pass="$SERVICE_PASSWORD" \
106 --tenant_id $SERVICE_TENANT \
107 --email=glance@example.com)
108 keystone user-role-add \
Jorge Valderrama Romerof39ee962013-09-02 17:18:40 +0200109 --tenant-id $SERVICE_TENANT \
110 --user-id $GLANCE_USER \
111 --role-id $ADMIN_ROLE
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500112 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
113 GLANCE_SERVICE=$(get_id keystone service-create \
114 --name=glance \
115 --type=image \
116 --description="Glance Image Service")
117 keystone endpoint-create \
118 --region RegionOne \
119 --service_id $GLANCE_SERVICE \
Steve Baker8d6c9bc2012-09-11 10:05:14 +1200120 --publicurl "http://$SERVICE_HOST:9292" \
121 --adminurl "http://$SERVICE_HOST:9292" \
122 --internalurl "http://$SERVICE_HOST:9292"
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500123 fi
124fi
125
Chmouel Boudjnahba313052013-07-10 21:03:43 +0200126# Ceilometer
Doug Hellmann4a2b1c62012-11-01 16:23:52 -0400127if [[ "$ENABLED_SERVICES" =~ "ceilometer" ]]; then
128 CEILOMETER_USER=$(get_id keystone user-create --name=ceilometer \
129 --pass="$SERVICE_PASSWORD" \
130 --tenant_id $SERVICE_TENANT \
131 --email=ceilometer@example.com)
Jorge Valderrama Romerof39ee962013-09-02 17:18:40 +0200132 keystone user-role-add --tenant-id $SERVICE_TENANT \
133 --user-id $CEILOMETER_USER \
134 --role-id $ADMIN_ROLE
guillaume pernot901eed72012-11-29 08:44:58 +0100135 # Ceilometer needs ResellerAdmin role to access swift account stats.
Jorge Valderrama Romerof39ee962013-09-02 17:18:40 +0200136 keystone user-role-add --tenant-id $SERVICE_TENANT \
137 --user-id $CEILOMETER_USER \
138 --role-id $RESELLER_ROLE
Julien Danjouf36afe52012-10-04 18:00:10 +0200139 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
140 CEILOMETER_SERVICE=$(get_id keystone service-create \
141 --name=ceilometer \
142 --type=metering \
143 --description="Ceilometer Service")
144 keystone endpoint-create \
145 --region RegionOne \
146 --service_id $CEILOMETER_SERVICE \
Eoghan Glynn21ddaac2013-03-05 12:40:59 +0000147 --publicurl "http://$SERVICE_HOST:8777" \
148 --adminurl "http://$SERVICE_HOST:8777" \
149 --internalurl "http://$SERVICE_HOST:8777"
Julien Danjouf36afe52012-10-04 18:00:10 +0200150 fi
151fi
152
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500153# EC2
154if [[ "$ENABLED_SERVICES" =~ "n-api" ]]; then
155 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
156 EC2_SERVICE=$(get_id keystone service-create \
157 --name=ec2 \
158 --type=ec2 \
159 --description="EC2 Compatibility Layer")
160 keystone endpoint-create \
161 --region RegionOne \
162 --service_id $EC2_SERVICE \
163 --publicurl "http://$SERVICE_HOST:8773/services/Cloud" \
164 --adminurl "http://$SERVICE_HOST:8773/services/Admin" \
165 --internalurl "http://$SERVICE_HOST:8773/services/Cloud"
166 fi
167fi
168
169# S3
Chmouel Boudjnah0c3a5582013-03-06 10:58:33 +0100170if [[ "$ENABLED_SERVICES" =~ "n-obj" || "$ENABLED_SERVICES" =~ "swift3" ]]; then
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500171 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
172 S3_SERVICE=$(get_id keystone service-create \
173 --name=s3 \
174 --type=s3 \
175 --description="S3")
176 keystone endpoint-create \
177 --region RegionOne \
178 --service_id $S3_SERVICE \
179 --publicurl "http://$SERVICE_HOST:$S3_SERVICE_PORT" \
180 --adminurl "http://$SERVICE_HOST:$S3_SERVICE_PORT" \
181 --internalurl "http://$SERVICE_HOST:$S3_SERVICE_PORT"
182 fi
Gabriel Hurleya3a496f2012-02-13 12:29:23 -0800183fi
Jay Pipesb297d2d2012-05-10 11:21:22 -0400184
185if [[ "$ENABLED_SERVICES" =~ "tempest" ]]; then
186 # Tempest has some tests that validate various authorization checks
187 # between two regular users in separate tenants
Dean Troyer3f7c06f2012-04-03 17:19:36 -0500188 ALT_DEMO_TENANT=$(get_id keystone tenant-create \
189 --name=alt_demo)
190 ALT_DEMO_USER=$(get_id keystone user-create \
191 --name=alt_demo \
192 --pass="$ADMIN_PASSWORD" \
193 --email=alt_demo@example.com)
194 keystone user-role-add \
Jorge Valderrama Romerof39ee962013-09-02 17:18:40 +0200195 --tenant-id $ALT_DEMO_TENANT \
196 --user-id $ALT_DEMO_USER \
197 --role-id $MEMBER_ROLE
Jay Pipesb297d2d2012-05-10 11:21:22 -0400198fi