clients_XXX section configurable
This commit makes the [clients_XXX] section in heat.conf configurable. They will get set with the default values from [clients] section. Closes-Bug: #1386125 Change-Id: I6d4d4a79e038f5533b46ce555f5838efb0c8f1c8
This commit is contained in:
parent
eeff4d73a0
commit
54bb483c5d
|
@ -14,6 +14,7 @@ This file is used to list changes made in each version of cookbook-openstack-orc
|
|||
* Add cert_file, key_file, ca_file and insecure for clients so that they are configurable.
|
||||
* Make 3 schemes configurable instead of being the hardcoded http
|
||||
* Add misc options for heat.conf
|
||||
* Add cert_file, key_file, ca_file and insecure for clients_XXX so that they are configurable.
|
||||
|
||||
## 9.2.0
|
||||
* python_packages database client attributes have been migrated to
|
||||
|
|
49
README.md
49
README.md
|
@ -90,6 +90,55 @@ Clients configurations
|
|||
* `openstack['orchestration']['clients']['key_file']` - Private key file to use for clients when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients.
|
||||
|
||||
clients_ceilometer configurations
|
||||
---------------------------------
|
||||
* `openstack['orchestration']['clients_ceilometer']['ca_file']` - A PEM encoded Certificate Authority to use for clients_ceilometer when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_ceilometer']['cert_file']` - Cert file to use for clients_ceilometer when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_ceilometer']['key_file']` - Private key file to use for clients_ceilometer when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_ceilometer']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_ceilometer.
|
||||
|
||||
clients_cinder configurations
|
||||
-----------------------------
|
||||
* `openstack['orchestration']['clients_cinder']['ca_file']` - A PEM encoded Certificate Authority to use for clients_cinder when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_cinder']['cert_file']` - Cert file to use for clients_cinder when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_cinder']['key_file']` - Private key file to use for clients_cinder when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_cinder']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_cinder.
|
||||
|
||||
clients_glance configurations
|
||||
-----------------------------
|
||||
* `openstack['orchestration']['clients_glance']['ca_file']` - A PEM encoded Certificate Authority to use for clients_glance when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_glance']['cert_file']` - Cert file to use for clients_glance when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_glance']['key_file']` - Private key file to use for clients_glance when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_glance']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_glance.
|
||||
|
||||
clients_heat configurations
|
||||
---------------------------
|
||||
* `openstack['orchestration']['clients_heat']['ca_file']` - A PEM encoded Certificate Authority to use for clients_heat when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_heat']['cert_file']` - Cert file to use for clients_heat when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_heat']['key_file']` - Private key file to use for clients_heat when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_heat']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_heat.
|
||||
|
||||
clients_keystone configurations
|
||||
-------------------------------
|
||||
* `openstack['orchestration']['clients_keystone']['ca_file']` - A PEM encoded Certificate Authority to use for clients_keystone when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_keystone']['cert_file']` - Cert file to use for clients_keystone when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_keystone']['key_file']` - Private key file to use for clients_keystone when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_keystone']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_keystone.
|
||||
|
||||
clients_neutron configurations
|
||||
------------------------------
|
||||
* `openstack['orchestration']['clients_neutron']['ca_file']` - A PEM encoded Certificate Authority to use for clients_neutron when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_neutron']['cert_file']` - Cert file to use for clients_neutron when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_neutron']['key_file']` - Private key file to use for clients_neutron when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_neutron']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_neutron.
|
||||
|
||||
clients_nova configurations
|
||||
---------------------------------
|
||||
* `openstack['orchestration']['clients_nova']['ca_file']` - A PEM encoded Certificate Authority to use for clients_nova when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_nova']['cert_file']` - Cert file to use for clients_nova when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_nova']['key_file']` - Private key file to use for clients_nova when verifying HTTPs connections.
|
||||
* `openstack['orchestration']['clients_nova']['insecure']` - Whether to allow insecure SSL (https) requests when calling clients_nova.
|
||||
|
||||
Notification definitions
|
||||
------------------------
|
||||
* `openstack['orchestration']['notification_driver']` - driver
|
||||
|
|
|
@ -51,6 +51,69 @@ default['openstack']['orchestration']['clients']['key_file'] = nil
|
|||
# Whether to allow insecure SSL (https) requests when calling clients.
|
||||
default['openstack']['orchestration']['clients']['insecure'] = false
|
||||
|
||||
# A PEM encoded Certificate Authority to use for clients_ceilometer when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_ceilometer']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
|
||||
# Cert file to use for clients_ceilometer when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_ceilometer']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
|
||||
# Private key file to use for clients_ceilometer when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_ceilometer']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
|
||||
# Whether to allow insecure SSL (https) requests when calling clients_ceilometer.
|
||||
default['openstack']['orchestration']['clients_ceilometer']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
|
||||
|
||||
# A PEM encoded Certificate Authority to use for clients_cinder when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_cinder']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
|
||||
# Cert file to use for clients_cinder when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_cinder']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
|
||||
# Private key file to use for clients_cinder when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_cinder']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
|
||||
# Whether to allow insecure SSL (https) requests when calling clients_cinder.
|
||||
default['openstack']['orchestration']['clients_cinder']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
|
||||
|
||||
# A PEM encoded Certificate Authority to use for clients_glance when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_glance']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
|
||||
# Cert file to use for clients_glance when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_glance']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
|
||||
# Private key file to use for clients_glance when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_glance']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
|
||||
# Whether to allow insecure SSL (https) requests when calling clients_glance.
|
||||
default['openstack']['orchestration']['clients_glance']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
|
||||
|
||||
# A PEM encoded Certificate Authority to use for clients_heat when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_heat']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
|
||||
# Cert file to use for clients_heat when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_heat']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
|
||||
# Private key file to use for clients_heat when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_heat']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
|
||||
# Whether to allow insecure SSL (https) requests when calling clients_heat.
|
||||
default['openstack']['orchestration']['clients_heat']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
|
||||
|
||||
# A PEM encoded Certificate Authority to use for clients_keystone when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_keystone']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
|
||||
# Cert file to use for clients_keystone when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_keystone']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
|
||||
# Private key file to use for clients_keystone when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_keystone']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
|
||||
# Whether to allow insecure SSL (https) requests when calling clients_keystone.
|
||||
default['openstack']['orchestration']['clients_keystone']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
|
||||
|
||||
# A PEM encoded Certificate Authority to use for clients_neutron when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_neutron']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
|
||||
# Cert file to use for clients_neutron when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_neutron']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
|
||||
# Private key file to use for clients_neutron when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_neutron']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
|
||||
# Whether to allow insecure SSL (https) requests when calling clients_neutron.
|
||||
default['openstack']['orchestration']['clients_neutron']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
|
||||
|
||||
# A PEM encoded Certificate Authority to use for clients_nova when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_nova']['ca_file'] = node['openstack']['orchestration']['clients']['ca_file']
|
||||
# Cert file to use for clients_nova when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_nova']['cert_file'] = node['openstack']['orchestration']['clients']['cert_file']
|
||||
# Private key file to use for clients_nova when verifying HTTPs connections.
|
||||
default['openstack']['orchestration']['clients_nova']['key_file'] = node['openstack']['orchestration']['clients']['key_file']
|
||||
# Whether to allow insecure SSL (https) requests when calling clients_nova.
|
||||
default['openstack']['orchestration']['clients_nova']['insecure'] = node['openstack']['orchestration']['clients']['insecure']
|
||||
|
||||
# A list of memcached server(s) for caching
|
||||
default['openstack']['orchestration']['api']['auth']['memcached_servers'] = nil
|
||||
|
||||
|
|
|
@ -213,6 +213,83 @@ shared_examples 'expects to create heat conf' do
|
|||
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
|
||||
end
|
||||
|
||||
it 'sets clients_ceilometer ca_file cert_file key_file insecure' do
|
||||
node.set['openstack']['orchestration']['clients_ceilometer']['ca_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_ceilometer']['cert_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_ceilometer']['key_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_ceilometer']['insecure'] = true
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
|
||||
end
|
||||
|
||||
it 'sets clients_cinder ca_file cert_file key_file insecure' do
|
||||
node.set['openstack']['orchestration']['clients_cinder']['ca_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_cinder']['cert_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_cinder']['key_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_cinder']['insecure'] = true
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
|
||||
end
|
||||
|
||||
it 'sets clients_glance ca_file cert_file key_file insecure' do
|
||||
node.set['openstack']['orchestration']['clients_glance']['ca_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_glance']['cert_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_glance']['key_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_glance']['insecure'] = true
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
|
||||
end
|
||||
|
||||
it 'sets clients_heat ca_file cert_file key_file insecure' do
|
||||
node.set['openstack']['orchestration']['clients_heat']['ca_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_heat']['cert_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_heat']['key_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_heat']['insecure'] = true
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
|
||||
end
|
||||
|
||||
it 'sets clients_keystone ca_file cert_file key_file insecure' do
|
||||
node.set['openstack']['orchestration']['clients_keystone']['ca_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_keystone']['cert_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_keystone']['key_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_keystone']['insecure'] = true
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
|
||||
end
|
||||
|
||||
it 'sets clients_neutron ca_file cert_file key_file insecure' do
|
||||
node.set['openstack']['orchestration']['clients_neutron']['ca_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_neutron']['cert_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_neutron']['key_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_neutron']['insecure'] = true
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
|
||||
end
|
||||
|
||||
it 'sets clients_nova ca_file cert_file key_file insecure' do
|
||||
node.set['openstack']['orchestration']['clients_nova']['ca_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_nova']['cert_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_nova']['key_file'] = 'dir/to/path'
|
||||
node.set['openstack']['orchestration']['clients_nova']['insecure'] = true
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^ca_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^cert_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(%r{^key_file=dir/to/path$})
|
||||
expect(chef_run).to render_file(file.name).with_content(/^insecure=true$/)
|
||||
end
|
||||
end
|
||||
|
||||
describe 'default values' do
|
||||
|
|
|
@ -649,19 +649,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
|
|||
|
||||
# Optional CA cert file to use in SSL connections. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_ceilometer']['ca_file'] -%>
|
||||
ca_file=<%= node['openstack']['orchestration']['clients_ceilometer']['ca_file'] %>
|
||||
<% else -%>
|
||||
#ca_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted certificate chain file. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_ceilometer']['cert_file'] -%>
|
||||
cert_file=<%= node['openstack']['orchestration']['clients_ceilometer']['cert_file'] %>
|
||||
<% else -%>
|
||||
#cert_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted file that contains the private key.
|
||||
# (string value)
|
||||
<% if node['openstack']['orchestration']['clients_ceilometer']['key_file'] -%>
|
||||
key_file=<%= node['openstack']['orchestration']['clients_ceilometer']['key_file'] %>
|
||||
<% else -%>
|
||||
#key_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# If set, then the server's certificate will not be verified.
|
||||
# (boolean value)
|
||||
#insecure=false
|
||||
insecure=<%= node['openstack']['orchestration']['clients_ceilometer']['insecure'] %>
|
||||
|
||||
|
||||
[clients_cinder]
|
||||
|
@ -676,19 +689,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
|
|||
|
||||
# Optional CA cert file to use in SSL connections. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_cinder']['ca_file'] -%>
|
||||
ca_file=<%= node['openstack']['orchestration']['clients_cinder']['ca_file'] %>
|
||||
<% else -%>
|
||||
#ca_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted certificate chain file. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_cinder']['cert_file'] -%>
|
||||
cert_file=<%= node['openstack']['orchestration']['clients_cinder']['cert_file'] %>
|
||||
<% else -%>
|
||||
#cert_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted file that contains the private key.
|
||||
# (string value)
|
||||
<% if node['openstack']['orchestration']['clients_cinder']['key_file'] -%>
|
||||
key_file=<%= node['openstack']['orchestration']['clients_cinder']['key_file'] %>
|
||||
<% else -%>
|
||||
#key_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# If set, then the server's certificate will not be verified.
|
||||
# (boolean value)
|
||||
#insecure=false
|
||||
insecure=<%= node['openstack']['orchestration']['clients_cinder']['insecure'] %>
|
||||
|
||||
|
||||
[clients_glance]
|
||||
|
@ -703,19 +729,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
|
|||
|
||||
# Optional CA cert file to use in SSL connections. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_glance']['ca_file'] -%>
|
||||
ca_file=<%= node['openstack']['orchestration']['clients_glance']['ca_file'] %>
|
||||
<% else -%>
|
||||
#ca_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted certificate chain file. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_glance']['cert_file'] -%>
|
||||
cert_file=<%= node['openstack']['orchestration']['clients_glance']['cert_file'] %>
|
||||
<% else -%>
|
||||
#cert_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted file that contains the private key.
|
||||
# (string value)
|
||||
<% if node['openstack']['orchestration']['clients_glance']['key_file'] -%>
|
||||
key_file=<%= node['openstack']['orchestration']['clients_glance']['key_file'] %>
|
||||
<% else -%>
|
||||
#key_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# If set, then the server's certificate will not be verified.
|
||||
# (boolean value)
|
||||
#insecure=false
|
||||
insecure=<%= node['openstack']['orchestration']['clients_glance']['insecure'] %>
|
||||
|
||||
|
||||
[clients_heat]
|
||||
|
@ -730,20 +769,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
|
|||
|
||||
# Optional CA cert file to use in SSL connections. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_heat']['ca_file'] -%>
|
||||
ca_file=<%= node['openstack']['orchestration']['clients_heat']['ca_file'] %>
|
||||
<% else -%>
|
||||
#ca_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted certificate chain file. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_heat']['cert_file'] -%>
|
||||
cert_file=<%= node['openstack']['orchestration']['clients_heat']['cert_file'] %>
|
||||
<% else -%>
|
||||
#cert_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted file that contains the private key.
|
||||
# (string value)
|
||||
<% if node['openstack']['orchestration']['clients_heat']['key_file'] -%>
|
||||
key_file=<%= node['openstack']['orchestration']['clients_heat']['key_file'] %>
|
||||
<% else -%>
|
||||
#key_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# If set, then the server's certificate will not be verified.
|
||||
# (boolean value)
|
||||
#insecure=false
|
||||
|
||||
insecure=<%= node['openstack']['orchestration']['clients_heat']['insecure'] %>
|
||||
|
||||
#
|
||||
# Options defined in heat.common.config
|
||||
|
@ -766,19 +817,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
|
|||
|
||||
# Optional CA cert file to use in SSL connections. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_keystone']['ca_file'] -%>
|
||||
ca_file=<%= node['openstack']['orchestration']['clients_keystone']['ca_file'] %>
|
||||
<% else -%>
|
||||
#ca_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted certificate chain file. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_keystone']['cert_file'] -%>
|
||||
cert_file=<%= node['openstack']['orchestration']['clients_keystone']['cert_file'] %>
|
||||
<% else -%>
|
||||
#cert_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted file that contains the private key.
|
||||
# (string value)
|
||||
<% if node['openstack']['orchestration']['clients_keystone']['key_file'] -%>
|
||||
key_file=<%= node['openstack']['orchestration']['clients_keystone']['key_file'] %>
|
||||
<% else -%>
|
||||
#key_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# If set, then the server's certificate will not be verified.
|
||||
# (boolean value)
|
||||
#insecure=false
|
||||
insecure=<%= node['openstack']['orchestration']['clients_keystone']['insecure'] %>
|
||||
|
||||
|
||||
[clients_neutron]
|
||||
|
@ -793,19 +857,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
|
|||
|
||||
# Optional CA cert file to use in SSL connections. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_neutron']['ca_file'] -%>
|
||||
ca_file=<%= node['openstack']['orchestration']['clients_neutron']['ca_file'] %>
|
||||
<% else -%>
|
||||
#ca_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted certificate chain file. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_neutron']['cert_file'] -%>
|
||||
cert_file=<%= node['openstack']['orchestration']['clients_neutron']['cert_file'] %>
|
||||
<% else -%>
|
||||
#cert_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted file that contains the private key.
|
||||
# (string value)
|
||||
<% if node['openstack']['orchestration']['clients_neutron']['key_file'] -%>
|
||||
key_file=<%= node['openstack']['orchestration']['clients_neutron']['key_file'] %>
|
||||
<% else -%>
|
||||
#key_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# If set, then the server's certificate will not be verified.
|
||||
# (boolean value)
|
||||
#insecure=false
|
||||
insecure=<%= node['openstack']['orchestration']['clients_neutron']['insecure'] %>
|
||||
|
||||
|
||||
[clients_nova]
|
||||
|
@ -820,20 +897,32 @@ insecure=<%= node['openstack']['orchestration']['clients']['insecure'] %>
|
|||
|
||||
# Optional CA cert file to use in SSL connections. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_nova']['ca_file'] -%>
|
||||
ca_file=<%= node['openstack']['orchestration']['clients_nova']['ca_file'] %>
|
||||
<% else -%>
|
||||
#ca_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted certificate chain file. (string
|
||||
# value)
|
||||
<% if node['openstack']['orchestration']['clients_nova']['cert_file'] -%>
|
||||
cert_file=<%= node['openstack']['orchestration']['clients_nova']['cert_file'] %>
|
||||
<% else -%>
|
||||
#cert_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# Optional PEM-formatted file that contains the private key.
|
||||
# (string value)
|
||||
<% if node['openstack']['orchestration']['clients_nova']['key_file'] -%>
|
||||
key_file=<%= node['openstack']['orchestration']['clients_nova']['key_file'] %>
|
||||
<% else -%>
|
||||
#key_file=<None>
|
||||
<% end -%>
|
||||
|
||||
# If set, then the server's certificate will not be verified.
|
||||
# (boolean value)
|
||||
#insecure=false
|
||||
|
||||
insecure=<%= node['openstack']['orchestration']['clients_nova']['insecure'] %>
|
||||
|
||||
#
|
||||
# Options defined in heat.common.config
|
||||
|
|
Loading…
Reference in New Issue