clients_XXX section configurable

This commit makes the [clients_XXX] section in heat.conf configurable.
They will get set with the default values from [clients] section.

Closes-Bug: #1386125

Change-Id: I6d4d4a79e038f5533b46ce555f5838efb0c8f1c8
This commit is contained in:
jun xie 2014-11-03 14:42:05 +08:00
parent eeff4d73a0
commit 54bb483c5d
5 changed files with 281 additions and 2 deletions

View File

@ -14,6 +14,7 @@ This file is used to list changes made in each version of cookbook-openstack-orc
* Add cert_file, key_file, ca_file and insecure for clients so that they are configurable.
* Make 3 schemes configurable instead of being the hardcoded http
* Add misc options for heat.conf
* Add cert_file, key_file, ca_file and insecure for clients_XXX so that they are configurable.
## 9.2.0
* python_packages database client attributes have been migrated to

View File

@ -90,6 +90,55 @@ Clients configurations
* `openstack['orchestration']['clients']['key_file']` - Private key file to use for clients when verifying HTTPs connections.
* `openstack['orchestration']['clients']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients.
clients_ceilometer configurations
---------------------------------
* `openstack['orchestration']['clients_ceilometer']['ca_file']` - A PEM encoded Certificate Authority to use for clients_ceilometer when verifying HTTPs connections.
* `openstack['orchestration']['clients_ceilometer']['cert_file']` - Cert file to use for clients_ceilometer when verifying HTTPs connections.
* `openstack['orchestration']['clients_ceilometer']['key_file']` - Private key file to use for clients_ceilometer when verifying HTTPs connections.
* `openstack['orchestration']['clients_ceilometer']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_ceilometer.
clients_cinder configurations
-----------------------------
* `openstack['orchestration']['clients_cinder']['ca_file']` - A PEM encoded Certificate Authority to use for clients_cinder when verifying HTTPs connections.
* `openstack['orchestration']['clients_cinder']['cert_file']` - Cert file to use for clients_cinder when verifying HTTPs connections.
* `openstack['orchestration']['clients_cinder']['key_file']` - Private key file to use for clients_cinder when verifying HTTPs connections.
* `openstack['orchestration']['clients_cinder']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_cinder.
clients_glance configurations
-----------------------------
* `openstack['orchestration']['clients_glance']['ca_file']` - A PEM encoded Certificate Authority to use for clients_glance when verifying HTTPs connections.
* `openstack['orchestration']['clients_glance']['cert_file']` - Cert file to use for clients_glance when verifying HTTPs connections.
* `openstack['orchestration']['clients_glance']['key_file']` - Private key file to use for clients_glance when verifying HTTPs connections.
* `openstack['orchestration']['clients_glance']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_glance.
clients_heat configurations
---------------------------
* `openstack['orchestration']['clients_heat']['ca_file']` - A PEM encoded Certificate Authority to use for clients_heat when verifying HTTPs connections.
* `openstack['orchestration']['clients_heat']['cert_file']` - Cert file to use for clients_heat when verifying HTTPs connections.
* `openstack['orchestration']['clients_heat']['key_file']` - Private key file to use for clients_heat when verifying HTTPs connections.
* `openstack['orchestration']['clients_heat']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_heat.
clients_keystone configurations
-------------------------------
* `openstack['orchestration']['clients_keystone']['ca_file']` - A PEM encoded Certificate Authority to use for clients_keystone when verifying HTTPs connections.
* `openstack['orchestration']['clients_keystone']['cert_file']` - Cert file to use for clients_keystone when verifying HTTPs connections.
* `openstack['orchestration']['clients_keystone']['key_file']` - Private key file to use for clients_keystone when verifying HTTPs connections.
* `openstack['orchestration']['clients_keystone']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_keystone.
clients_neutron configurations
------------------------------
* `openstack['orchestration']['clients_neutron']['ca_file']` - A PEM encoded Certificate Authority to use for clients_neutron when verifying HTTPs connections.
* `openstack['orchestration']['clients_neutron']['cert_file']` - Cert file to use for clients_neutron when verifying HTTPs connections.
* `openstack['orchestration']['clients_neutron']['key_file']` - Private key file to use for clients_neutron when verifying HTTPs connections.
* `openstack['orchestration']['clients_neutron']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_neutron.
clients_nova configurations
---------------------------------
* `openstack['orchestration']['clients_nova']['ca_file']` - A PEM encoded Certificate Authority to use for clients_nova when verifying HTTPs connections.
* `openstack['orchestration']['clients_nova']['cert_file']` - Cert file to use for clients_nova when verifying HTTPs connections.
* `openstack['orchestration']['clients_nova']['key_file']` - Private key file to use for clients_nova when verifying HTTPs connections.
* `openstack['orchestration']['clients_nova']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_nova.
Notification definitions
------------------------
* `openstack['orchestration']['notification_driver']` - driver

View File

@ -51,6 +51,69 @@ default['openstack']['orchestration']['clients']['key_file'] = nil
# Whether to allow insecure SSL (https) requests when calling clients.
default['openstack']['orchestration']['clients']['insecure'] = false
# A PEM encoded Certificate Authority to use for clients_ceilometer when verifying HTTPs connections.
default['openstack']['orchestration']['clients_ceilometer']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
# Cert file to use for clients_ceilometer when verifying HTTPs connections.
default['openstack']['orchestration']['clients_ceilometer']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
# Private key file to use for clients_ceilometer when verifying HTTPs connections.
default['openstack']['orchestration']['clients_ceilometer']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
# Whether to allow insecure SSL (https) requests when calling clients_ceilometer.
default['openstack']['orchestration']['clients_ceilometer']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
# A PEM encoded Certificate Authority to use for clients_cinder when verifying HTTPs connections.
default['openstack']['orchestration']['clients_cinder']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
# Cert file to use for clients_cinder when verifying HTTPs connections.
default['openstack']['orchestration']['clients_cinder']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
# Private key file to use for clients_cinder when verifying HTTPs connections.
default['openstack']['orchestration']['clients_cinder']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
# Whether to allow insecure SSL (https) requests when calling clients_cinder.
default['openstack']['orchestration']['clients_cinder']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
# A PEM encoded Certificate Authority to use for clients_glance when verifying HTTPs connections.
default['openstack']['orchestration']['clients_glance']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
# Cert file to use for clients_glance when verifying HTTPs connections.
default['openstack']['orchestration']['clients_glance']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
# Private key file to use for clients_glance when verifying HTTPs connections.
default['openstack']['orchestration']['clients_glance']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
# Whether to allow insecure SSL (https) requests when calling clients_glance.
default['openstack']['orchestration']['clients_glance']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
# A PEM encoded Certificate Authority to use for clients_heat when verifying HTTPs connections.
default['openstack']['orchestration']['clients_heat']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
# Cert file to use for clients_heat when verifying HTTPs connections.
default['openstack']['orchestration']['clients_heat']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
# Private key file to use for clients_heat when verifying HTTPs connections.
default['openstack']['orchestration']['clients_heat']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
# Whether to allow insecure SSL (https) requests when calling clients_heat.
default['openstack']['orchestration']['clients_heat']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
# A PEM encoded Certificate Authority to use for clients_keystone when verifying HTTPs connections.
default['openstack']['orchestration']['clients_keystone']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
# Cert file to use for clients_keystone when verifying HTTPs connections.
default['openstack']['orchestration']['clients_keystone']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
# Private key file to use for clients_keystone when verifying HTTPs connections.
default['openstack']['orchestration']['clients_keystone']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
# Whether to allow insecure SSL (https) requests when calling clients_keystone.
default['openstack']['orchestration']['clients_keystone']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
# A PEM encoded Certificate Authority to use for clients_neutron when verifying HTTPs connections.
default['openstack']['orchestration']['clients_neutron']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
# Cert file to use for clients_neutron when verifying HTTPs connections.
default['openstack']['orchestration']['clients_neutron']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
# Private key file to use for clients_neutron when verifying HTTPs connections.
default['openstack']['orchestration']['clients_neutron']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
# Whether to allow insecure SSL (https) requests when calling clients_neutron.
default['openstack']['orchestration']['clients_neutron']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
# A PEM encoded Certificate Authority to use for clients_nova when verifying HTTPs connections.
default['openstack']['orchestration']['clients_nova']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
# Cert file to use for clients_nova when verifying HTTPs connections.
default['openstack']['orchestration']['clients_nova']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
# Private key file to use for clients_nova when verifying HTTPs connections.
default['openstack']['orchestration']['clients_nova']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
# Whether to allow insecure SSL (https) requests when calling clients_nova.
default['openstack']['orchestration']['clients_nova']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
# A list of memcached server(s) for caching
default['openstack']['orchestration']['api']['auth']['memcached_servers'] = nil

View File

@ -213,6 +213,83 @@ shared_examples 'expects to create heat conf' do
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
end
it 'sets clients_ceilometer ca_file cert_file key_file insecure' do
node.set['openstack']['orchestration']['clients_ceilometer']['ca_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_ceilometer']['cert_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_ceilometer']['key_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_ceilometer']['insecure'] = true
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
end
it 'sets clients_cinder ca_file cert_file key_file insecure' do
node.set['openstack']['orchestration']['clients_cinder']['ca_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_cinder']['cert_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_cinder']['key_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_cinder']['insecure'] = true
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
end
it 'sets clients_glance ca_file cert_file key_file insecure' do
node.set['openstack']['orchestration']['clients_glance']['ca_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_glance']['cert_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_glance']['key_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_glance']['insecure'] = true
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
end
it 'sets clients_heat ca_file cert_file key_file insecure' do
node.set['openstack']['orchestration']['clients_heat']['ca_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_heat']['cert_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_heat']['key_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_heat']['insecure'] = true
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
end
it 'sets clients_keystone ca_file cert_file key_file insecure' do
node.set['openstack']['orchestration']['clients_keystone']['ca_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_keystone']['cert_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_keystone']['key_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_keystone']['insecure'] = true
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
end
it 'sets clients_neutron ca_file cert_file key_file insecure' do
node.set['openstack']['orchestration']['clients_neutron']['ca_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_neutron']['cert_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_neutron']['key_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_neutron']['insecure'] = true
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
end
it 'sets clients_nova ca_file cert_file key_file insecure' do
node.set['openstack']['orchestration']['clients_nova']['ca_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_nova']['cert_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_nova']['key_file'] = 'dir/to/path'
node.set['openstack']['orchestration']['clients_nova']['insecure'] = true
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
end
end
describe 'default values' do

View File

@ -649,19 +649,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
# Optional CA cert file to use in SSL connections. (string
# value)
<% if node['openstack']['orchestration']['clients_ceilometer']['ca_file'] -%>
ca_file=<%= node['openstack']['orchestration']['clients_ceilometer']['ca_file'] %>
<% else -%>
#ca_file=<None>
<% end -%>
# Optional PEM-formatted certificate chain file. (string
# value)
<% if node['openstack']['orchestration']['clients_ceilometer']['cert_file'] -%>
cert_file=<%= node['openstack']['orchestration']['clients_ceilometer']['cert_file'] %>
<% else -%>
#cert_file=<None>
<% end -%>
# Optional PEM-formatted file that contains the private key.
# (string value)
<% if node['openstack']['orchestration']['clients_ceilometer']['key_file'] -%>
key_file=<%= node['openstack']['orchestration']['clients_ceilometer']['key_file'] %>
<% else -%>
#key_file=<None>
<% end -%>
# If set, then the server's certificate will not be verified.
# (boolean value)
#insecure=false
insecure=<%= node['openstack']['orchestration']['clients_ceilometer']['insecure'] %>
[clients_cinder]
@ -676,19 +689,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
# Optional CA cert file to use in SSL connections. (string
# value)
<% if node['openstack']['orchestration']['clients_cinder']['ca_file'] -%>
ca_file=<%= node['openstack']['orchestration']['clients_cinder']['ca_file'] %>
<% else -%>
#ca_file=<None>
<% end -%>
# Optional PEM-formatted certificate chain file. (string
# value)
<% if node['openstack']['orchestration']['clients_cinder']['cert_file'] -%>
cert_file=<%= node['openstack']['orchestration']['clients_cinder']['cert_file'] %>
<% else -%>
#cert_file=<None>
<% end -%>
# Optional PEM-formatted file that contains the private key.
# (string value)
<% if node['openstack']['orchestration']['clients_cinder']['key_file'] -%>
key_file=<%= node['openstack']['orchestration']['clients_cinder']['key_file'] %>
<% else -%>
#key_file=<None>
<% end -%>
# If set, then the server's certificate will not be verified.
# (boolean value)
#insecure=false
insecure=<%= node['openstack']['orchestration']['clients_cinder']['insecure'] %>
[clients_glance]
@ -703,19 +729,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
# Optional CA cert file to use in SSL connections. (string
# value)
<% if node['openstack']['orchestration']['clients_glance']['ca_file'] -%>
ca_file=<%= node['openstack']['orchestration']['clients_glance']['ca_file'] %>
<% else -%>
#ca_file=<None>
<% end -%>
# Optional PEM-formatted certificate chain file. (string
# value)
<% if node['openstack']['orchestration']['clients_glance']['cert_file'] -%>
cert_file=<%= node['openstack']['orchestration']['clients_glance']['cert_file'] %>
<% else -%>
#cert_file=<None>
<% end -%>
# Optional PEM-formatted file that contains the private key.
# (string value)
<% if node['openstack']['orchestration']['clients_glance']['key_file'] -%>
key_file=<%= node['openstack']['orchestration']['clients_glance']['key_file'] %>
<% else -%>
#key_file=<None>
<% end -%>
# If set, then the server's certificate will not be verified.
# (boolean value)
#insecure=false
insecure=<%= node['openstack']['orchestration']['clients_glance']['insecure'] %>
[clients_heat]
@ -730,20 +769,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
# Optional CA cert file to use in SSL connections. (string
# value)
<% if node['openstack']['orchestration']['clients_heat']['ca_file'] -%>
ca_file=<%= node['openstack']['orchestration']['clients_heat']['ca_file'] %>
<% else -%>
#ca_file=<None>
<% end -%>
# Optional PEM-formatted certificate chain file. (string
# value)
<% if node['openstack']['orchestration']['clients_heat']['cert_file'] -%>
cert_file=<%= node['openstack']['orchestration']['clients_heat']['cert_file'] %>
<% else -%>
#cert_file=<None>
<% end -%>
# Optional PEM-formatted file that contains the private key.
# (string value)
<% if node['openstack']['orchestration']['clients_heat']['key_file'] -%>
key_file=<%= node['openstack']['orchestration']['clients_heat']['key_file'] %>
<% else -%>
#key_file=<None>
<% end -%>
# If set, then the server's certificate will not be verified.
# (boolean value)
#insecure=false
insecure=<%= node['openstack']['orchestration']['clients_heat']['insecure'] %>
#
# Options defined in heat.common.config
@ -766,19 +817,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
# Optional CA cert file to use in SSL connections. (string
# value)
<% if node['openstack']['orchestration']['clients_keystone']['ca_file'] -%>
ca_file=<%= node['openstack']['orchestration']['clients_keystone']['ca_file'] %>
<% else -%>
#ca_file=<None>
<% end -%>
# Optional PEM-formatted certificate chain file. (string
# value)
<% if node['openstack']['orchestration']['clients_keystone']['cert_file'] -%>
cert_file=<%= node['openstack']['orchestration']['clients_keystone']['cert_file'] %>
<% else -%>
#cert_file=<None>
<% end -%>
# Optional PEM-formatted file that contains the private key.
# (string value)
<% if node['openstack']['orchestration']['clients_keystone']['key_file'] -%>
key_file=<%= node['openstack']['orchestration']['clients_keystone']['key_file'] %>
<% else -%>
#key_file=<None>
<% end -%>
# If set, then the server's certificate will not be verified.
# (boolean value)
#insecure=false
insecure=<%= node['openstack']['orchestration']['clients_keystone']['insecure'] %>
[clients_neutron]
@ -793,19 +857,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
# Optional CA cert file to use in SSL connections. (string
# value)
<% if node['openstack']['orchestration']['clients_neutron']['ca_file'] -%>
ca_file=<%= node['openstack']['orchestration']['clients_neutron']['ca_file'] %>
<% else -%>
#ca_file=<None>
<% end -%>
# Optional PEM-formatted certificate chain file. (string
# value)
<% if node['openstack']['orchestration']['clients_neutron']['cert_file'] -%>
cert_file=<%= node['openstack']['orchestration']['clients_neutron']['cert_file'] %>
<% else -%>
#cert_file=<None>
<% end -%>
# Optional PEM-formatted file that contains the private key.
# (string value)
<% if node['openstack']['orchestration']['clients_neutron']['key_file'] -%>
key_file=<%= node['openstack']['orchestration']['clients_neutron']['key_file'] %>
<% else -%>
#key_file=<None>
<% end -%>
# If set, then the server's certificate will not be verified.
# (boolean value)
#insecure=false
insecure=<%= node['openstack']['orchestration']['clients_neutron']['insecure'] %>
[clients_nova]
@ -820,20 +897,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
# Optional CA cert file to use in SSL connections. (string
# value)
<% if node['openstack']['orchestration']['clients_nova']['ca_file'] -%>
ca_file=<%= node['openstack']['orchestration']['clients_nova']['ca_file'] %>
<% else -%>
#ca_file=<None>
<% end -%>
# Optional PEM-formatted certificate chain file. (string
# value)
<% if node['openstack']['orchestration']['clients_nova']['cert_file'] -%>
cert_file=<%= node['openstack']['orchestration']['clients_nova']['cert_file'] %>
<% else -%>
#cert_file=<None>
<% end -%>
# Optional PEM-formatted file that contains the private key.
# (string value)
<% if node['openstack']['orchestration']['clients_nova']['key_file'] -%>
key_file=<%= node['openstack']['orchestration']['clients_nova']['key_file'] %>
<% else -%>
#key_file=<None>
<% end -%>
# If set, then the server's certificate will not be verified.
# (boolean value)
#insecure=false
insecure=<%= node['openstack']['orchestration']['clients_nova']['insecure'] %>
#
# Options defined in heat.common.config