Jesse Andrews | 73e27b8 | 2011-09-12 17:55:00 -0700 | [diff] [blame] | 1 | #!/bin/bash |
Dean Troyer | b7d1fbb | 2012-03-02 08:43:09 -0600 | [diff] [blame] | 2 | # |
| 3 | # Initial data for Keystone using python-keystoneclient |
| 4 | # |
Doug Hellmann | 4a2b1c6 | 2012-11-01 16:23:52 -0400 | [diff] [blame] | 5 | # Tenant User Roles |
Chmouel Boudjnah | 77b0e1d | 2012-02-29 16:55:43 +0000 | [diff] [blame] | 6 | # ------------------------------------------------------------------ |
Doug Hellmann | 4a2b1c6 | 2012-11-01 16:23:52 -0400 | [diff] [blame] | 7 | # service glance admin |
Joe Gordon | 1216b9f | 2013-06-04 18:55:06 +0000 | [diff] [blame] | 8 | # service heat service # if enabled |
Eoghan Glynn | e3d3cb7 | 2013-06-20 15:05:54 +0000 | [diff] [blame] | 9 | # service ceilometer admin # if enabled |
Jay Pipes | b297d2d | 2012-05-10 11:21:22 -0400 | [diff] [blame] | 10 | # Tempest Only: |
| 11 | # alt_demo alt_demo Member |
Dean Troyer | b7d1fbb | 2012-03-02 08:43:09 -0600 | [diff] [blame] | 12 | # |
| 13 | # Variables set before calling this script: |
| 14 | # SERVICE_TOKEN - aka admin_token in keystone.conf |
| 15 | # SERVICE_ENDPOINT - local Keystone admin endpoint |
| 16 | # SERVICE_TENANT_NAME - name of tenant containing service accounts |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 17 | # SERVICE_HOST - host used for endpoint creation |
Dean Troyer | b7d1fbb | 2012-03-02 08:43:09 -0600 | [diff] [blame] | 18 | # ENABLED_SERVICES - stack.sh's list of services to start |
| 19 | # DEVSTACK_DIR - Top-level DevStack directory |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 20 | # KEYSTONE_CATALOG_BACKEND - used to determine service catalog creation |
| 21 | |
| 22 | # Defaults |
| 23 | # -------- |
Dean Troyer | b7d1fbb | 2012-03-02 08:43:09 -0600 | [diff] [blame] | 24 | |
| 25 | ADMIN_PASSWORD=${ADMIN_PASSWORD:-secrete} |
| 26 | SERVICE_PASSWORD=${SERVICE_PASSWORD:-$ADMIN_PASSWORD} |
Vishvananda Ishaya | d1f5243 | 2012-02-09 03:50:57 +0000 | [diff] [blame] | 27 | export SERVICE_TOKEN=$SERVICE_TOKEN |
| 28 | export SERVICE_ENDPOINT=$SERVICE_ENDPOINT |
Dean Troyer | b7d1fbb | 2012-03-02 08:43:09 -0600 | [diff] [blame] | 29 | SERVICE_TENANT_NAME=${SERVICE_TENANT_NAME:-service} |
Vishvananda Ishaya | d1f5243 | 2012-02-09 03:50:57 +0000 | [diff] [blame] | 30 | |
| 31 | function get_id () { |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 32 | echo `"$@" | awk '/ id / { print $4 }'` |
Vishvananda Ishaya | d1f5243 | 2012-02-09 03:50:57 +0000 | [diff] [blame] | 33 | } |
| 34 | |
Dean Troyer | d835de8 | 2012-11-29 17:11:35 -0600 | [diff] [blame] | 35 | # Lookups |
| 36 | SERVICE_TENANT=$(keystone tenant-list | awk "/ $SERVICE_TENANT_NAME / { print \$2 }") |
| 37 | ADMIN_ROLE=$(keystone role-list | awk "/ admin / { print \$2 }") |
Dean Troyer | 671c16e | 2012-12-13 16:22:38 -0600 | [diff] [blame] | 38 | MEMBER_ROLE=$(keystone role-list | awk "/ Member / { print \$2 }") |
Jesse Andrews | 73e27b8 | 2011-09-12 17:55:00 -0700 | [diff] [blame] | 39 | |
Dean Troyer | 0bd2410 | 2012-03-08 00:33:54 -0600 | [diff] [blame] | 40 | |
Jesse Andrews | 73e27b8 | 2011-09-12 17:55:00 -0700 | [diff] [blame] | 41 | # Roles |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 42 | # ----- |
| 43 | |
guillaume pernot | 901eed7 | 2012-11-29 08:44:58 +0100 | [diff] [blame] | 44 | # The ResellerAdmin role is used by Nova and Ceilometer so we need to keep it. |
| 45 | # The admin role in swift allows a user to act as an admin for their tenant, |
| 46 | # but ResellerAdmin is needed for a user to act as any tenant. The name of this |
| 47 | # role is also configurable in swift-proxy.conf |
| 48 | RESELLER_ROLE=$(get_id keystone role-create --name=ResellerAdmin) |
Joe Gordon | 1216b9f | 2013-06-04 18:55:06 +0000 | [diff] [blame] | 49 | # Service role, so service users do not have to be admins |
| 50 | SERVICE_ROLE=$(get_id keystone role-create --name=service) |
Jesse Andrews | 73e27b8 | 2011-09-12 17:55:00 -0700 | [diff] [blame] | 51 | |
Dean Troyer | 671c16e | 2012-12-13 16:22:38 -0600 | [diff] [blame] | 52 | |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 53 | # Services |
| 54 | # -------- |
termie | a96a418 | 2012-01-09 22:13:29 -0800 | [diff] [blame] | 55 | |
Chmouel Boudjnah | 0c3a558 | 2013-03-06 10:58:33 +0100 | [diff] [blame] | 56 | if [[ "$ENABLED_SERVICES" =~ "n-api" ]] && [[ "$ENABLED_SERVICES" =~ "s-proxy" || "$ENABLED_SERVICES" =~ "swift" ]]; then |
Dean Troyer | a0dce26 | 2012-12-11 16:52:37 -0600 | [diff] [blame] | 57 | NOVA_USER=$(keystone user-list | awk "/ nova / { print \$2 }") |
Chmouel Boudjnah | 77b0e1d | 2012-02-29 16:55:43 +0000 | [diff] [blame] | 58 | # Nova needs ResellerAdmin role to download images when accessing |
guillaume pernot | 901eed7 | 2012-11-29 08:44:58 +0100 | [diff] [blame] | 59 | # swift through the s3 api. |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 60 | keystone user-role-add \ |
Jorge Valderrama Romero | f39ee96 | 2013-09-02 17:18:40 +0200 | [diff] [blame] | 61 | --tenant-id $SERVICE_TENANT \ |
| 62 | --user-id $NOVA_USER \ |
| 63 | --role-id $RESELLER_ROLE |
Jesse Andrews | 9c7c908 | 2011-11-23 10:10:53 -0800 | [diff] [blame] | 64 | fi |
Dean Troyer | b7d1fbb | 2012-03-02 08:43:09 -0600 | [diff] [blame] | 65 | |
Steve Baker | bfdad75 | 2012-08-18 09:00:42 +1200 | [diff] [blame] | 66 | # Heat |
| 67 | if [[ "$ENABLED_SERVICES" =~ "heat" ]]; then |
| 68 | HEAT_USER=$(get_id keystone user-create --name=heat \ |
| 69 | --pass="$SERVICE_PASSWORD" \ |
| 70 | --tenant_id $SERVICE_TENANT \ |
| 71 | --email=heat@example.com) |
Jorge Valderrama Romero | f39ee96 | 2013-09-02 17:18:40 +0200 | [diff] [blame] | 72 | keystone user-role-add --tenant-id $SERVICE_TENANT \ |
| 73 | --user-id $HEAT_USER \ |
| 74 | --role-id $SERVICE_ROLE |
Steve Baker | 053a5f8 | 2012-12-11 17:08:48 +1300 | [diff] [blame] | 75 | # heat_stack_user role is for users created by Heat |
| 76 | keystone role-create --name heat_stack_user |
Steve Baker | bfdad75 | 2012-08-18 09:00:42 +1200 | [diff] [blame] | 77 | if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then |
Steve Baker | 36cf7ee | 2012-09-17 16:49:24 +1200 | [diff] [blame] | 78 | HEAT_CFN_SERVICE=$(get_id keystone service-create \ |
Steve Baker | bb421be | 2012-10-10 13:19:10 +1300 | [diff] [blame] | 79 | --name=heat-cfn \ |
| 80 | --type=cloudformation \ |
| 81 | --description="Heat CloudFormation Service") |
Steve Baker | bfdad75 | 2012-08-18 09:00:42 +1200 | [diff] [blame] | 82 | keystone endpoint-create \ |
| 83 | --region RegionOne \ |
Angus Salkeld | e279021 | 2012-09-11 11:24:09 +1000 | [diff] [blame] | 84 | --service_id $HEAT_CFN_SERVICE \ |
| 85 | --publicurl "http://$SERVICE_HOST:$HEAT_API_CFN_PORT/v1" \ |
| 86 | --adminurl "http://$SERVICE_HOST:$HEAT_API_CFN_PORT/v1" \ |
| 87 | --internalurl "http://$SERVICE_HOST:$HEAT_API_CFN_PORT/v1" |
Steve Baker | bb421be | 2012-10-10 13:19:10 +1300 | [diff] [blame] | 88 | HEAT_SERVICE=$(get_id keystone service-create \ |
| 89 | --name=heat \ |
| 90 | --type=orchestration \ |
| 91 | --description="Heat Service") |
| 92 | keystone endpoint-create \ |
| 93 | --region RegionOne \ |
| 94 | --service_id $HEAT_SERVICE \ |
| 95 | --publicurl "http://$SERVICE_HOST:$HEAT_API_PORT/v1/\$(tenant_id)s" \ |
| 96 | --adminurl "http://$SERVICE_HOST:$HEAT_API_PORT/v1/\$(tenant_id)s" \ |
| 97 | --internalurl "http://$SERVICE_HOST:$HEAT_API_PORT/v1/\$(tenant_id)s" |
Steve Baker | bfdad75 | 2012-08-18 09:00:42 +1200 | [diff] [blame] | 98 | fi |
| 99 | fi |
| 100 | |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 101 | # Glance |
| 102 | if [[ "$ENABLED_SERVICES" =~ "g-api" ]]; then |
| 103 | GLANCE_USER=$(get_id keystone user-create \ |
| 104 | --name=glance \ |
| 105 | --pass="$SERVICE_PASSWORD" \ |
| 106 | --tenant_id $SERVICE_TENANT \ |
| 107 | --email=glance@example.com) |
| 108 | keystone user-role-add \ |
Jorge Valderrama Romero | f39ee96 | 2013-09-02 17:18:40 +0200 | [diff] [blame] | 109 | --tenant-id $SERVICE_TENANT \ |
| 110 | --user-id $GLANCE_USER \ |
| 111 | --role-id $ADMIN_ROLE |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 112 | if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then |
| 113 | GLANCE_SERVICE=$(get_id keystone service-create \ |
| 114 | --name=glance \ |
| 115 | --type=image \ |
| 116 | --description="Glance Image Service") |
| 117 | keystone endpoint-create \ |
| 118 | --region RegionOne \ |
| 119 | --service_id $GLANCE_SERVICE \ |
Steve Baker | 8d6c9bc | 2012-09-11 10:05:14 +1200 | [diff] [blame] | 120 | --publicurl "http://$SERVICE_HOST:9292" \ |
| 121 | --adminurl "http://$SERVICE_HOST:9292" \ |
| 122 | --internalurl "http://$SERVICE_HOST:9292" |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 123 | fi |
| 124 | fi |
| 125 | |
Chmouel Boudjnah | ba31305 | 2013-07-10 21:03:43 +0200 | [diff] [blame] | 126 | # Ceilometer |
Doug Hellmann | 4a2b1c6 | 2012-11-01 16:23:52 -0400 | [diff] [blame] | 127 | if [[ "$ENABLED_SERVICES" =~ "ceilometer" ]]; then |
| 128 | CEILOMETER_USER=$(get_id keystone user-create --name=ceilometer \ |
| 129 | --pass="$SERVICE_PASSWORD" \ |
| 130 | --tenant_id $SERVICE_TENANT \ |
| 131 | --email=ceilometer@example.com) |
Jorge Valderrama Romero | f39ee96 | 2013-09-02 17:18:40 +0200 | [diff] [blame] | 132 | keystone user-role-add --tenant-id $SERVICE_TENANT \ |
| 133 | --user-id $CEILOMETER_USER \ |
| 134 | --role-id $ADMIN_ROLE |
guillaume pernot | 901eed7 | 2012-11-29 08:44:58 +0100 | [diff] [blame] | 135 | # Ceilometer needs ResellerAdmin role to access swift account stats. |
Jorge Valderrama Romero | f39ee96 | 2013-09-02 17:18:40 +0200 | [diff] [blame] | 136 | keystone user-role-add --tenant-id $SERVICE_TENANT \ |
| 137 | --user-id $CEILOMETER_USER \ |
| 138 | --role-id $RESELLER_ROLE |
Julien Danjou | f36afe5 | 2012-10-04 18:00:10 +0200 | [diff] [blame] | 139 | if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then |
| 140 | CEILOMETER_SERVICE=$(get_id keystone service-create \ |
| 141 | --name=ceilometer \ |
| 142 | --type=metering \ |
| 143 | --description="Ceilometer Service") |
| 144 | keystone endpoint-create \ |
| 145 | --region RegionOne \ |
| 146 | --service_id $CEILOMETER_SERVICE \ |
Eoghan Glynn | 21ddaac | 2013-03-05 12:40:59 +0000 | [diff] [blame] | 147 | --publicurl "http://$SERVICE_HOST:8777" \ |
| 148 | --adminurl "http://$SERVICE_HOST:8777" \ |
| 149 | --internalurl "http://$SERVICE_HOST:8777" |
Julien Danjou | f36afe5 | 2012-10-04 18:00:10 +0200 | [diff] [blame] | 150 | fi |
| 151 | fi |
| 152 | |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 153 | # EC2 |
| 154 | if [[ "$ENABLED_SERVICES" =~ "n-api" ]]; then |
| 155 | if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then |
| 156 | EC2_SERVICE=$(get_id keystone service-create \ |
| 157 | --name=ec2 \ |
| 158 | --type=ec2 \ |
| 159 | --description="EC2 Compatibility Layer") |
| 160 | keystone endpoint-create \ |
| 161 | --region RegionOne \ |
| 162 | --service_id $EC2_SERVICE \ |
| 163 | --publicurl "http://$SERVICE_HOST:8773/services/Cloud" \ |
| 164 | --adminurl "http://$SERVICE_HOST:8773/services/Admin" \ |
| 165 | --internalurl "http://$SERVICE_HOST:8773/services/Cloud" |
| 166 | fi |
| 167 | fi |
| 168 | |
| 169 | # S3 |
Chmouel Boudjnah | 0c3a558 | 2013-03-06 10:58:33 +0100 | [diff] [blame] | 170 | if [[ "$ENABLED_SERVICES" =~ "n-obj" || "$ENABLED_SERVICES" =~ "swift3" ]]; then |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 171 | if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then |
| 172 | S3_SERVICE=$(get_id keystone service-create \ |
| 173 | --name=s3 \ |
| 174 | --type=s3 \ |
| 175 | --description="S3") |
| 176 | keystone endpoint-create \ |
| 177 | --region RegionOne \ |
| 178 | --service_id $S3_SERVICE \ |
| 179 | --publicurl "http://$SERVICE_HOST:$S3_SERVICE_PORT" \ |
| 180 | --adminurl "http://$SERVICE_HOST:$S3_SERVICE_PORT" \ |
| 181 | --internalurl "http://$SERVICE_HOST:$S3_SERVICE_PORT" |
| 182 | fi |
Gabriel Hurley | a3a496f | 2012-02-13 12:29:23 -0800 | [diff] [blame] | 183 | fi |
Jay Pipes | b297d2d | 2012-05-10 11:21:22 -0400 | [diff] [blame] | 184 | |
| 185 | if [[ "$ENABLED_SERVICES" =~ "tempest" ]]; then |
| 186 | # Tempest has some tests that validate various authorization checks |
| 187 | # between two regular users in separate tenants |
Dean Troyer | 3f7c06f | 2012-04-03 17:19:36 -0500 | [diff] [blame] | 188 | ALT_DEMO_TENANT=$(get_id keystone tenant-create \ |
| 189 | --name=alt_demo) |
| 190 | ALT_DEMO_USER=$(get_id keystone user-create \ |
| 191 | --name=alt_demo \ |
| 192 | --pass="$ADMIN_PASSWORD" \ |
| 193 | --email=alt_demo@example.com) |
| 194 | keystone user-role-add \ |
Jorge Valderrama Romero | f39ee96 | 2013-09-02 17:18:40 +0200 | [diff] [blame] | 195 | --tenant-id $ALT_DEMO_TENANT \ |
| 196 | --user-id $ALT_DEMO_USER \ |
| 197 | --role-id $MEMBER_ROLE |
Jay Pipes | b297d2d | 2012-05-10 11:21:22 -0400 | [diff] [blame] | 198 | fi |