From 920a49cfa055733d575282973e23558c33087a4a Mon Sep 17 00:00:00 2001 From: RHE Date: Fri, 24 Nov 2017 13:54:26 +0100 Subject: remove keystone-moon Change-Id: I80d7c9b669f19d5f6607e162de8e0e55c2f80fdd Signed-off-by: RHE --- keystone-moon/etc/default_catalog.templates | 42 - keystone-moon/etc/keystone-paste.ini | 88 - keystone-moon/etc/keystone.conf.sample | 2127 -------------------- keystone-moon/etc/logging.conf.sample | 65 - .../etc/policies/policy_authz/assignment.json | 55 - .../etc/policies/policy_authz/metadata.json | 23 - .../etc/policies/policy_authz/metarule.json | 24 - .../etc/policies/policy_authz/perimeter.json | 21 - keystone-moon/etc/policies/policy_authz/rule.json | 25 - keystone-moon/etc/policies/policy_authz/scope.json | 49 - .../policies/policy_empty_admin/assignment.json | 7 - .../etc/policies/policy_empty_admin/metadata.json | 12 - .../etc/policies/policy_empty_admin/metarule.json | 12 - .../etc/policies/policy_empty_admin/perimeter.json | 39 - .../etc/policies/policy_empty_admin/rule.json | 3 - .../etc/policies/policy_empty_admin/scope.json | 7 - .../policies/policy_empty_authz/assignment.json | 7 - .../etc/policies/policy_empty_authz/metadata.json | 12 - .../etc/policies/policy_empty_authz/metarule.json | 12 - .../etc/policies/policy_empty_authz/perimeter.json | 5 - .../etc/policies/policy_empty_authz/rule.json | 3 - .../etc/policies/policy_empty_authz/scope.json | 7 - .../etc/policies/policy_mls_authz/assignment.json | 29 - .../etc/policies/policy_mls_authz/metadata.json | 18 - .../etc/policies/policy_mls_authz/metarule.json | 12 - .../etc/policies/policy_mls_authz/perimeter.json | 21 - .../etc/policies/policy_mls_authz/rule.json | 16 - .../etc/policies/policy_mls_authz/scope.json | 26 - .../etc/policies/policy_rbac_admin/assignment.json | 48 - .../etc/policies/policy_rbac_admin/metadata.json | 18 - .../etc/policies/policy_rbac_admin/metarule.json | 12 - .../etc/policies/policy_rbac_admin/perimeter.json | 42 - .../etc/policies/policy_rbac_admin/rule.json | 94 - .../etc/policies/policy_rbac_admin/scope.json | 48 - .../etc/policies/policy_root/assignment.json | 39 - .../etc/policies/policy_root/metadata.json | 18 - .../etc/policies/policy_root/metarule.json | 12 - .../etc/policies/policy_root/perimeter.json | 31 - keystone-moon/etc/policies/policy_root/rule.json | 44 - keystone-moon/etc/policies/policy_root/scope.json | 39 - keystone-moon/etc/policy.json | 198 -- keystone-moon/etc/policy.v3cloudsample.json | 223 -- keystone-moon/etc/sso_callback_template.html | 22 - 43 files changed, 3655 deletions(-) delete mode 100644 keystone-moon/etc/default_catalog.templates delete mode 100644 keystone-moon/etc/keystone-paste.ini delete mode 100644 keystone-moon/etc/keystone.conf.sample delete mode 100644 keystone-moon/etc/logging.conf.sample delete mode 100644 keystone-moon/etc/policies/policy_authz/assignment.json delete mode 100644 keystone-moon/etc/policies/policy_authz/metadata.json delete mode 100644 keystone-moon/etc/policies/policy_authz/metarule.json delete mode 100644 keystone-moon/etc/policies/policy_authz/perimeter.json delete mode 100644 keystone-moon/etc/policies/policy_authz/rule.json delete mode 100644 keystone-moon/etc/policies/policy_authz/scope.json delete mode 100644 keystone-moon/etc/policies/policy_empty_admin/assignment.json delete mode 100644 keystone-moon/etc/policies/policy_empty_admin/metadata.json delete mode 100644 keystone-moon/etc/policies/policy_empty_admin/metarule.json delete mode 100644 keystone-moon/etc/policies/policy_empty_admin/perimeter.json delete mode 100644 keystone-moon/etc/policies/policy_empty_admin/rule.json delete mode 100644 keystone-moon/etc/policies/policy_empty_admin/scope.json delete mode 100644 keystone-moon/etc/policies/policy_empty_authz/assignment.json delete mode 100644 keystone-moon/etc/policies/policy_empty_authz/metadata.json delete mode 100644 keystone-moon/etc/policies/policy_empty_authz/metarule.json delete mode 100644 keystone-moon/etc/policies/policy_empty_authz/perimeter.json delete mode 100644 keystone-moon/etc/policies/policy_empty_authz/rule.json delete mode 100644 keystone-moon/etc/policies/policy_empty_authz/scope.json delete mode 100644 keystone-moon/etc/policies/policy_mls_authz/assignment.json delete mode 100644 keystone-moon/etc/policies/policy_mls_authz/metadata.json delete mode 100644 keystone-moon/etc/policies/policy_mls_authz/metarule.json delete mode 100644 keystone-moon/etc/policies/policy_mls_authz/perimeter.json delete mode 100644 keystone-moon/etc/policies/policy_mls_authz/rule.json delete mode 100644 keystone-moon/etc/policies/policy_mls_authz/scope.json delete mode 100644 keystone-moon/etc/policies/policy_rbac_admin/assignment.json delete mode 100644 keystone-moon/etc/policies/policy_rbac_admin/metadata.json delete mode 100644 keystone-moon/etc/policies/policy_rbac_admin/metarule.json delete mode 100644 keystone-moon/etc/policies/policy_rbac_admin/perimeter.json delete mode 100644 keystone-moon/etc/policies/policy_rbac_admin/rule.json delete mode 100644 keystone-moon/etc/policies/policy_rbac_admin/scope.json delete mode 100644 keystone-moon/etc/policies/policy_root/assignment.json delete mode 100644 keystone-moon/etc/policies/policy_root/metadata.json delete mode 100644 keystone-moon/etc/policies/policy_root/metarule.json delete mode 100644 keystone-moon/etc/policies/policy_root/perimeter.json delete mode 100644 keystone-moon/etc/policies/policy_root/rule.json delete mode 100644 keystone-moon/etc/policies/policy_root/scope.json delete mode 100644 keystone-moon/etc/policy.json delete mode 100644 keystone-moon/etc/policy.v3cloudsample.json delete mode 100644 keystone-moon/etc/sso_callback_template.html (limited to 'keystone-moon/etc') diff --git a/keystone-moon/etc/default_catalog.templates b/keystone-moon/etc/default_catalog.templates deleted file mode 100644 index e885b52e..00000000 --- a/keystone-moon/etc/default_catalog.templates +++ /dev/null @@ -1,42 +0,0 @@ -# config for templated.Catalog, using camelCase because I don't want to do -# translations for keystone compat -catalog.RegionOne.identity.publicURL = http://localhost:$(public_port)s/v2.0 -catalog.RegionOne.identity.adminURL = http://localhost:$(admin_port)s/v2.0 -catalog.RegionOne.identity.internalURL = http://localhost:$(public_port)s/v2.0 -catalog.RegionOne.identity.name = Identity Service - -# fake compute service for now to help novaclient tests work -catalog.RegionOne.computev21.publicURL = http://localhost:8774/v2.1/$(tenant_id)s -catalog.RegionOne.computev21.adminURL = http://localhost:8774/v2.1/$(tenant_id)s -catalog.RegionOne.computev21.internalURL = http://localhost:8774/v2.1/$(tenant_id)s -catalog.RegionOne.computev21.name = Compute Service V2.1 - -catalog.RegionOne.volumev2.publicURL = http://localhost:8776/v2/$(tenant_id)s -catalog.RegionOne.volumev2.adminURL = http://localhost:8776/v2/$(tenant_id)s -catalog.RegionOne.volumev2.internalURL = http://localhost:8776/v2/$(tenant_id)s -catalog.RegionOne.volumev2.name = Volume Service V2 - -catalog.RegionOne.ec2.publicURL = http://localhost:8773/services/Cloud -catalog.RegionOne.ec2.adminURL = http://localhost:8773/services/Admin -catalog.RegionOne.ec2.internalURL = http://localhost:8773/services/Cloud -catalog.RegionOne.ec2.name = EC2 Service - -catalog.RegionOne.image.publicURL = http://localhost:9292 -catalog.RegionOne.image.adminURL = http://localhost:9292 -catalog.RegionOne.image.internalURL = http://localhost:9292 -catalog.RegionOne.image.name = Image Service - -catalog.RegionOne.network.publicURL = http://localhost:9696 -catalog.RegionOne.network.adminURL = http://localhost:9696 -catalog.RegionOne.network.internalURL = http://localhost:9696 -catalog.RegionOne.network.name = Network Service - -catalog.RegionOne.orchestration.publicURL = http://localhost:8004/v1/$(tenant_id)s -catalog.RegionOne.orchestration.adminURL = http://localhost:8004/v1/$(tenant_id)s -catalog.RegionOne.orchestration.internalURL = http://localhost:8004/v1/$(tenant_id)s -catalog.RegionOne.orchestration.name = Orchestration Service - -catalog.RegionOne.metering.publicURL = http://localhost:8777 -catalog.RegionOne.metering.adminURL = http://localhost:8777 -catalog.RegionOne.metering.internalURL = http://localhost:8777 -catalog.RegionOne.metering.name = Telemetry Service diff --git a/keystone-moon/etc/keystone-paste.ini b/keystone-moon/etc/keystone-paste.ini deleted file mode 100644 index 4f3b0a28..00000000 --- a/keystone-moon/etc/keystone-paste.ini +++ /dev/null @@ -1,88 +0,0 @@ -# Keystone PasteDeploy configuration file. - -[filter:debug] -use = egg:oslo.middleware#debug - -[filter:request_id] -use = egg:oslo.middleware#request_id - -[filter:build_auth_context] -use = egg:keystone#build_auth_context - -[filter:token_auth] -use = egg:keystone#token_auth - -[filter:admin_token_auth] -# This is deprecated in the M release and will be removed in the O release. -# Use `keystone-manage bootstrap` and remove this from the pipelines below. -use = egg:keystone#admin_token_auth - -[filter:json_body] -use = egg:keystone#json_body - -[filter:cors] -use = egg:oslo.middleware#cors -oslo_config_project = keystone - -[filter:ec2_extension] -use = egg:keystone#ec2_extension - -[filter:ec2_extension_v3] -use = egg:keystone#ec2_extension_v3 - -[filter:s3_extension] -use = egg:keystone#s3_extension - -[filter:url_normalize] -use = egg:keystone#url_normalize - -[filter:sizelimit] -use = egg:oslo.middleware#sizelimit - -[app:public_service] -use = egg:keystone#public_service - -[app:service_v3] -use = egg:keystone#service_v3 - -[app:admin_service] -use = egg:keystone#admin_service - -[pipeline:public_api] -# The last item in this pipeline must be public_service or an equivalent -# application. It cannot be a filter. -pipeline = cors sizelimit url_normalize request_id admin_token_auth build_auth_context token_auth json_body ec2_extension public_service - -[pipeline:admin_api] -# The last item in this pipeline must be admin_service or an equivalent -# application. It cannot be a filter. -pipeline = cors sizelimit url_normalize request_id admin_token_auth build_auth_context token_auth json_body ec2_extension s3_extension admin_service - -[pipeline:api_v3] -# The last item in this pipeline must be service_v3 or an equivalent -# application. It cannot be a filter. -pipeline = cors sizelimit url_normalize request_id admin_token_auth build_auth_context token_auth json_body ec2_extension_v3 s3_extension service_v3 - -[app:public_version_service] -use = egg:keystone#public_version_service - -[app:admin_version_service] -use = egg:keystone#admin_version_service - -[pipeline:public_version_api] -pipeline = cors sizelimit url_normalize public_version_service - -[pipeline:admin_version_api] -pipeline = cors sizelimit url_normalize admin_version_service - -[composite:main] -use = egg:Paste#urlmap -/v2.0 = public_api -/v3 = api_v3 -/ = public_version_api - -[composite:admin] -use = egg:Paste#urlmap -/v2.0 = admin_api -/v3 = api_v3 -/ = admin_version_api diff --git a/keystone-moon/etc/keystone.conf.sample b/keystone-moon/etc/keystone.conf.sample deleted file mode 100644 index 8a95d933..00000000 --- a/keystone-moon/etc/keystone.conf.sample +++ /dev/null @@ -1,2127 +0,0 @@ -[DEFAULT] - -# -# From keystone -# - -# A "shared secret" that can be used to bootstrap Keystone. This "token" does -# not represent a user, and carries no explicit authorization. If set to -# `None`, the value is ignored and the `admin_token` log in mechanism is -# effectively disabled. To completely disable `admin_token` in production -# (highly recommended), remove AdminTokenAuthMiddleware from your paste -# application pipelines (for example, in keystone-paste.ini). (string value) -#admin_token = - -# The base public endpoint URL for Keystone that is advertised to clients -# (NOTE: this does NOT affect how Keystone listens for connections). Defaults -# to the base host URL of the request. E.g. a request to -# http://server:5000/v3/users will default to http://server:5000. You should -# only need to set this value if the base URL contains a path (e.g. /prefix/v3) -# or the endpoint should be found on a different server. (string value) -#public_endpoint = - -# The base admin endpoint URL for Keystone that is advertised to clients (NOTE: -# this does NOT affect how Keystone listens for connections). Defaults to the -# base host URL of the request. E.g. a request to http://server:35357/v3/users -# will default to http://server:35357. You should only need to set this value -# if the base URL contains a path (e.g. /prefix/v3) or the endpoint should be -# found on a different server. (string value) -#admin_endpoint = - -# Maximum depth of the project hierarchy, excluding the project acting as a -# domain at the top of the hierarchy. WARNING: setting it to a large value may -# adversely impact performance. (integer value) -#max_project_tree_depth = 5 - -# Limit the sizes of user & project ID/names. (integer value) -#max_param_size = 64 - -# Similar to max_param_size, but provides an exception for token values. -# (integer value) -#max_token_size = 8192 - -# Similar to the member_role_name option, this represents the default role ID -# used to associate users with their default projects in the v2 API. This will -# be used as the explicit role where one is not specified by the v2 API. -# (string value) -#member_role_id = 9fe2ff9ee4384b1894a90878d3e92bab - -# This is the role name used in combination with the member_role_id option; see -# that option for more detail. (string value) -#member_role_name = _member_ - -# The value passed as the keyword "rounds" to passlib's encrypt method. -# (integer value) -# Minimum value: 1000 -# Maximum value: 100000 -#crypt_strength = 10000 - -# The maximum number of entities that will be returned in a collection, with no -# limit set by default. This global limit may be then overridden for a specific -# driver, by specifying a list_limit in the appropriate section (e.g. -# [assignment]). (integer value) -#list_limit = - -# Set this to false if you want to enable the ability for user, group and -# project entities to be moved between domains by updating their domain_id. -# Allowing such movement is not recommended if the scope of a domain admin is -# being restricted by use of an appropriate policy file (see -# policy.v3cloudsample as an example). This ability is deprecated and will be -# removed in a future release. (boolean value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#domain_id_immutable = true - -# If set to true, strict password length checking is performed for password -# manipulation. If a password exceeds the maximum length, the operation will -# fail with an HTTP 403 Forbidden error. If set to false, passwords are -# automatically truncated to the maximum length. (boolean value) -#strict_password_check = false - -# The HTTP header used to determine the scheme for the original request, even -# if it was removed by an SSL terminating proxy. (string value) -#secure_proxy_ssl_header = HTTP_X_FORWARDED_PROTO - -# If set to true the server will return information in the response that may -# allow an unauthenticated or authenticated user to get more information than -# normal, such as why authentication failed. This may be useful for debugging -# but is insecure. (boolean value) -#insecure_debug = false - -# -# From keystone.notifications -# - -# Default publisher_id for outgoing notifications (string value) -#default_publisher_id = - -# Define the notification format for Identity Service events. A "basic" -# notification has information about the resource being operated on. A "cadf" -# notification has the same information, as well as information about the -# initiator of the event. (string value) -# Allowed values: basic, cadf -#notification_format = basic - -# Define the notification options to opt-out from. The value expected is: -# identity... This field can be set multiple times in -# order to add more notifications to opt-out from. For example: -# notification_opt_out=identity.user.created -# notification_opt_out=identity.authenticate.success (multi valued) -#notification_opt_out = - -# -# From oslo.log -# - -# If set to true, the logging level will be set to DEBUG instead of the default -# INFO level. (boolean value) -#debug = false - -# If set to false, the logging level will be set to WARNING instead of the -# default INFO level. (boolean value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#verbose = true - -# The name of a logging configuration file. This file is appended to any -# existing logging configuration files. For details about logging configuration -# files, see the Python logging module documentation. Note that when logging -# configuration files are used then all logging configuration is set in the -# configuration file and other logging configuration options are ignored (for -# example, logging_context_format_string). (string value) -# Deprecated group/name - [DEFAULT]/log_config -#log_config_append = - -# Defines the format string for %%(asctime)s in log records. Default: -# %(default)s . This option is ignored if log_config_append is set. (string -# value) -#log_date_format = %Y-%m-%d %H:%M:%S - -# (Optional) Name of log file to send logging output to. If no default is set, -# logging will go to stderr as defined by use_stderr. This option is ignored if -# log_config_append is set. (string value) -# Deprecated group/name - [DEFAULT]/logfile -#log_file = - -# (Optional) The base directory used for relative log_file paths. This option -# is ignored if log_config_append is set. (string value) -# Deprecated group/name - [DEFAULT]/logdir -#log_dir = - -# Uses logging handler designed to watch file system. When log file is moved or -# removed this handler will open a new log file with specified path -# instantaneously. It makes sense only if log_file option is specified and -# Linux platform is used. This option is ignored if log_config_append is set. -# (boolean value) -#watch_log_file = false - -# Use syslog for logging. Existing syslog format is DEPRECATED and will be -# changed later to honor RFC5424. This option is ignored if log_config_append -# is set. (boolean value) -#use_syslog = false - -# Syslog facility to receive log lines. This option is ignored if -# log_config_append is set. (string value) -#syslog_log_facility = LOG_USER - -# Log output to standard error. This option is ignored if log_config_append is -# set. (boolean value) -#use_stderr = true - -# Format string to use for log messages with context. (string value) -#logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s - -# Format string to use for log messages when context is undefined. (string -# value) -#logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s - -# Additional data to append to log message when logging level for the message -# is DEBUG. (string value) -#logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d - -# Prefix each line of exception output with this format. (string value) -#logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d ERROR %(name)s %(instance)s - -# Defines the format string for %(user_identity)s that is used in -# logging_context_format_string. (string value) -#logging_user_identity_format = %(user)s %(tenant)s %(domain)s %(user_domain)s %(project_domain)s - -# List of package logging levels in logger=LEVEL pairs. This option is ignored -# if log_config_append is set. (list value) -#default_log_levels = amqp=WARN,amqplib=WARN,boto=WARN,qpid=WARN,sqlalchemy=WARN,suds=INFO,oslo.messaging=INFO,iso8601=WARN,requests.packages.urllib3.connectionpool=WARN,urllib3.connectionpool=WARN,websocket=WARN,requests.packages.urllib3.util.retry=WARN,urllib3.util.retry=WARN,keystonemiddleware=WARN,routes.middleware=WARN,stevedore=WARN,taskflow=WARN,keystoneauth=WARN,oslo.cache=INFO,dogpile.core.dogpile=INFO - -# Enables or disables publication of error events. (boolean value) -#publish_errors = false - -# The format for an instance that is passed with the log message. (string -# value) -#instance_format = "[instance: %(uuid)s] " - -# The format for an instance UUID that is passed with the log message. (string -# value) -#instance_uuid_format = "[instance: %(uuid)s] " - -# Enables or disables fatal status of deprecations. (boolean value) -#fatal_deprecations = false - -# -# From oslo.messaging -# - -# Size of RPC connection pool. (integer value) -# Deprecated group/name - [DEFAULT]/rpc_conn_pool_size -#rpc_conn_pool_size = 30 - -# ZeroMQ bind address. Should be a wildcard (*), an ethernet interface, or IP. -# The "host" option should point or resolve to this address. (string value) -#rpc_zmq_bind_address = * - -# MatchMaker driver. (string value) -# Allowed values: redis, dummy -#rpc_zmq_matchmaker = redis - -# Type of concurrency used. Either "native" or "eventlet" (string value) -#rpc_zmq_concurrency = eventlet - -# Number of ZeroMQ contexts, defaults to 1. (integer value) -#rpc_zmq_contexts = 1 - -# Maximum number of ingress messages to locally buffer per topic. Default is -# unlimited. (integer value) -#rpc_zmq_topic_backlog = - -# Directory for holding IPC sockets. (string value) -#rpc_zmq_ipc_dir = /var/run/openstack - -# Name of this node. Must be a valid hostname, FQDN, or IP address. Must match -# "host" option, if running Nova. (string value) -#rpc_zmq_host = localhost - -# Seconds to wait before a cast expires (TTL). The default value of -1 -# specifies an infinite linger period. The value of 0 specifies no linger -# period. Pending messages shall be discarded immediately when the socket is -# closed. Only supported by impl_zmq. (integer value) -#rpc_cast_timeout = -1 - -# The default number of seconds that poll should wait. Poll raises timeout -# exception when timeout expired. (integer value) -#rpc_poll_timeout = 1 - -# Expiration timeout in seconds of a name service record about existing target -# ( < 0 means no timeout). (integer value) -#zmq_target_expire = 120 - -# Use PUB/SUB pattern for fanout methods. PUB/SUB always uses proxy. (boolean -# value) -#use_pub_sub = true - -# Minimal port number for random ports range. (port value) -# Minimum value: 0 -# Maximum value: 65535 -#rpc_zmq_min_port = 49152 - -# Maximal port number for random ports range. (integer value) -# Minimum value: 1 -# Maximum value: 65536 -#rpc_zmq_max_port = 65536 - -# Number of retries to find free port number before fail with ZMQBindError. -# (integer value) -#rpc_zmq_bind_port_retries = 100 - -# Size of executor thread pool. (integer value) -# Deprecated group/name - [DEFAULT]/rpc_thread_pool_size -#executor_thread_pool_size = 64 - -# Seconds to wait for a response from a call. (integer value) -#rpc_response_timeout = 60 - -# A URL representing the messaging driver to use and its full configuration. If -# not set, we fall back to the rpc_backend option and driver specific -# configuration. (string value) -#transport_url = - -# The messaging driver to use, defaults to rabbit. Other drivers include amqp -# and zmq. (string value) -#rpc_backend = rabbit - -# The default exchange under which topics are scoped. May be overridden by an -# exchange name specified in the transport_url option. (string value) -#control_exchange = keystone - -# -# From oslo.service.service -# - -# Enable eventlet backdoor. Acceptable values are 0, , and -# :, where 0 results in listening on a random tcp port number; -# results in listening on the specified port number (and not enabling -# backdoor if that port is in use); and : results in listening on -# the smallest unused port number within the specified range of port numbers. -# The chosen port is displayed in the service's log file. (string value) -#backdoor_port = - -# Enable eventlet backdoor, using the provided path as a unix socket that can -# receive connections. This option is mutually exclusive with 'backdoor_port' -# in that only one should be provided. If both are provided then the existence -# of this option overrides the usage of that option. (string value) -#backdoor_socket = - -# Enables or disables logging values of all registered options when starting a -# service (at DEBUG level). (boolean value) -#log_options = true - -# Specify a timeout after which a gracefully shutdown server will exit. Zero -# value means endless wait. (integer value) -#graceful_shutdown_timeout = 60 - - -[assignment] - -# -# From keystone -# - -# Entrypoint for the assignment backend driver in the keystone.assignment -# namespace. Only an SQL driver is supplied. If an assignment driver is not -# specified, the identity driver will choose the assignment driver (driver -# selection based on `[identity]/driver` option is deprecated and will be -# removed in the "O" release). (string value) -#driver = - -# A list of role names which are prohibited from being an implied role. (list -# value) -#prohibited_implied_role = admin - - -[auth] - -# -# From keystone -# - -# Allowed authentication methods. (list value) -#methods = external,password,token,oauth1 - -# Entrypoint for the password auth plugin module in the keystone.auth.password -# namespace. (string value) -#password = - -# Entrypoint for the token auth plugin module in the keystone.auth.token -# namespace. (string value) -#token = - -# Entrypoint for the external (REMOTE_USER) auth plugin module in the -# keystone.auth.external namespace. Supplied drivers are DefaultDomain and -# Domain. The default driver is DefaultDomain. (string value) -#external = - -# Entrypoint for the oAuth1.0 auth plugin module in the keystone.auth.oauth1 -# namespace. (string value) -#oauth1 = - - -[cache] - -# -# From oslo.cache -# - -# Prefix for building the configuration dictionary for the cache region. This -# should not need to be changed unless there is another dogpile.cache region -# with the same configuration name. (string value) -#config_prefix = cache.oslo - -# Default TTL, in seconds, for any cached item in the dogpile.cache region. -# This applies to any cached method that doesn't have an explicit cache -# expiration time defined for it. (integer value) -#expiration_time = 600 - -# Dogpile.cache backend module. It is recommended that Memcache with pooling -# (oslo_cache.memcache_pool) or Redis (dogpile.cache.redis) be used in -# production deployments. Small workloads (single process) like devstack can -# use the dogpile.cache.memory backend. (string value) -#backend = dogpile.cache.null - -# Arguments supplied to the backend module. Specify this option once per -# argument to be passed to the dogpile.cache backend. Example format: -# ":". (multi valued) -#backend_argument = - -# Proxy classes to import that will affect the way the dogpile.cache backend -# functions. See the dogpile.cache documentation on changing-backend-behavior. -# (list value) -#proxies = - -# Global toggle for caching. (boolean value) -#enabled = false - -# Extra debugging from the cache backend (cache keys, get/set/delete/etc -# calls). This is only really useful if you need to see the specific cache- -# backend get/set/delete calls with the keys/values. Typically this should be -# left set to false. (boolean value) -#debug_cache_backend = false - -# Memcache servers in the format of "host:port". (dogpile.cache.memcache and -# oslo_cache.memcache_pool backends only). (list value) -#memcache_servers = localhost:11211 - -# Number of seconds memcached server is considered dead before it is tried -# again. (dogpile.cache.memcache and oslo_cache.memcache_pool backends only). -# (integer value) -#memcache_dead_retry = 300 - -# Timeout in seconds for every call to a server. (dogpile.cache.memcache and -# oslo_cache.memcache_pool backends only). (integer value) -#memcache_socket_timeout = 3 - -# Max total number of open connections to every memcached server. -# (oslo_cache.memcache_pool backend only). (integer value) -#memcache_pool_maxsize = 10 - -# Number of seconds a connection to memcached is held unused in the pool before -# it is closed. (oslo_cache.memcache_pool backend only). (integer value) -#memcache_pool_unused_timeout = 60 - -# Number of seconds that an operation will wait to get a memcache client -# connection. (integer value) -#memcache_pool_connection_get_timeout = 10 - - -[catalog] - -# -# From keystone -# - -# Catalog template file name for use with the template catalog backend. (string -# value) -#template_file = default_catalog.templates - -# Entrypoint for the catalog backend driver in the keystone.catalog namespace. -# Supplied drivers are kvs, sql, templated, and endpoint_filter.sql (string -# value) -#driver = sql - -# Toggle for catalog caching. This has no effect unless global caching is -# enabled. (boolean value) -#caching = true - -# Time to cache catalog data (in seconds). This has no effect unless global and -# catalog caching are enabled. (integer value) -#cache_time = - -# Maximum number of entities that will be returned in a catalog collection. -# (integer value) -#list_limit = - - -[cors] - -# -# From oslo.middleware -# - -# Indicate whether this resource may be shared with the domain received in the -# requests "origin" header. (list value) -#allowed_origin = - -# Indicate that the actual request can include user credentials (boolean value) -#allow_credentials = true - -# Indicate which headers are safe to expose to the API. Defaults to HTTP Simple -# Headers. (list value) -#expose_headers = X-Auth-Token,X-Openstack-Request-Id,X-Subject-Token - -# Maximum cache age of CORS preflight requests. (integer value) -#max_age = 3600 - -# Indicate which methods can be used during the actual request. (list value) -#allow_methods = GET,PUT,POST,DELETE,PATCH - -# Indicate which header field names may be used during the actual request. -# (list value) -#allow_headers = X-Auth-Token,X-Openstack-Request-Id,X-Subject-Token,X-Project-Id,X-Project-Name,X-Project-Domain-Id,X-Project-Domain-Name,X-Domain-Id,X-Domain-Name - - -[cors.subdomain] - -# -# From oslo.middleware -# - -# Indicate whether this resource may be shared with the domain received in the -# requests "origin" header. (list value) -#allowed_origin = - -# Indicate that the actual request can include user credentials (boolean value) -#allow_credentials = true - -# Indicate which headers are safe to expose to the API. Defaults to HTTP Simple -# Headers. (list value) -#expose_headers = X-Auth-Token,X-Openstack-Request-Id,X-Subject-Token - -# Maximum cache age of CORS preflight requests. (integer value) -#max_age = 3600 - -# Indicate which methods can be used during the actual request. (list value) -#allow_methods = GET,PUT,POST,DELETE,PATCH - -# Indicate which header field names may be used during the actual request. -# (list value) -#allow_headers = X-Auth-Token,X-Openstack-Request-Id,X-Subject-Token,X-Project-Id,X-Project-Name,X-Project-Domain-Id,X-Project-Domain-Name,X-Domain-Id,X-Domain-Name - - -[credential] - -# -# From keystone -# - -# Entrypoint for the credential backend driver in the keystone.credential -# namespace. (string value) -#driver = sql - - -[database] - -# -# From oslo.db -# - -# The file name to use with SQLite. (string value) -# Deprecated group/name - [DEFAULT]/sqlite_db -#sqlite_db = oslo.sqlite - -# If True, SQLite uses synchronous mode. (boolean value) -# Deprecated group/name - [DEFAULT]/sqlite_synchronous -#sqlite_synchronous = true - -# The back end to use for the database. (string value) -# Deprecated group/name - [DEFAULT]/db_backend -#backend = sqlalchemy - -# The SQLAlchemy connection string to use to connect to the database. (string -# value) -# Deprecated group/name - [DEFAULT]/sql_connection -# Deprecated group/name - [DATABASE]/sql_connection -# Deprecated group/name - [sql]/connection -#connection = - -# The SQLAlchemy connection string to use to connect to the slave database. -# (string value) -#slave_connection = - -# The SQL mode to be used for MySQL sessions. This option, including the -# default, overrides any server-set SQL mode. To use whatever SQL mode is set -# by the server configuration, set this to no value. Example: mysql_sql_mode= -# (string value) -#mysql_sql_mode = TRADITIONAL - -# Timeout before idle SQL connections are reaped. (integer value) -# Deprecated group/name - [DEFAULT]/sql_idle_timeout -# Deprecated group/name - [DATABASE]/sql_idle_timeout -# Deprecated group/name - [sql]/idle_timeout -#idle_timeout = 3600 - -# Minimum number of SQL connections to keep open in a pool. (integer value) -# Deprecated group/name - [DEFAULT]/sql_min_pool_size -# Deprecated group/name - [DATABASE]/sql_min_pool_size -#min_pool_size = 1 - -# Maximum number of SQL connections to keep open in a pool. (integer value) -# Deprecated group/name - [DEFAULT]/sql_max_pool_size -# Deprecated group/name - [DATABASE]/sql_max_pool_size -#max_pool_size = - -# Maximum number of database connection retries during startup. Set to -1 to -# specify an infinite retry count. (integer value) -# Deprecated group/name - [DEFAULT]/sql_max_retries -# Deprecated group/name - [DATABASE]/sql_max_retries -#max_retries = 10 - -# Interval between retries of opening a SQL connection. (integer value) -# Deprecated group/name - [DEFAULT]/sql_retry_interval -# Deprecated group/name - [DATABASE]/reconnect_interval -#retry_interval = 10 - -# If set, use this value for max_overflow with SQLAlchemy. (integer value) -# Deprecated group/name - [DEFAULT]/sql_max_overflow -# Deprecated group/name - [DATABASE]/sqlalchemy_max_overflow -#max_overflow = 50 - -# Verbosity of SQL debugging information: 0=None, 100=Everything. (integer -# value) -# Deprecated group/name - [DEFAULT]/sql_connection_debug -#connection_debug = 0 - -# Add Python stack traces to SQL as comment strings. (boolean value) -# Deprecated group/name - [DEFAULT]/sql_connection_trace -#connection_trace = false - -# If set, use this value for pool_timeout with SQLAlchemy. (integer value) -# Deprecated group/name - [DATABASE]/sqlalchemy_pool_timeout -#pool_timeout = - -# Enable the experimental use of database reconnect on connection lost. -# (boolean value) -#use_db_reconnect = false - -# Seconds between retries of a database transaction. (integer value) -#db_retry_interval = 1 - -# If True, increases the interval between retries of a database operation up to -# db_max_retry_interval. (boolean value) -#db_inc_retry_interval = true - -# If db_inc_retry_interval is set, the maximum seconds between retries of a -# database operation. (integer value) -#db_max_retry_interval = 10 - -# Maximum retries in case of connection error or deadlock error before error is -# raised. Set to -1 to specify an infinite retry count. (integer value) -#db_max_retries = 20 - - -[domain_config] - -# -# From keystone -# - -# Entrypoint for the domain config backend driver in the -# keystone.resource.domain_config namespace. (string value) -#driver = sql - -# Toggle for domain config caching. This has no effect unless global caching is -# enabled. (boolean value) -#caching = true - -# TTL (in seconds) to cache domain config data. This has no effect unless -# domain config caching is enabled. (integer value) -#cache_time = 300 - - -[endpoint_filter] - -# -# From keystone -# - -# Entrypoint for the endpoint filter backend driver in the -# keystone.endpoint_filter namespace. (string value) -#driver = sql - -# Toggle to return all active endpoints if no filter exists. (boolean value) -#return_all_endpoints_if_no_filter = true - - -[endpoint_policy] - -# -# From keystone -# - -# Enable endpoint_policy functionality. (boolean value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: The option to enable the OS-ENDPOINT-POLICY extension has been -# deprecated in the M release and will be removed in the O release. The OS- -# ENDPOINT-POLICY extension will be enabled by default. -#enabled = true - -# Entrypoint for the endpoint policy backend driver in the -# keystone.endpoint_policy namespace. (string value) -#driver = sql - - -[eventlet_server] - -# -# From keystone -# - -# The number of worker processes to serve the public eventlet application. -# Defaults to number of CPUs (minimum of 2). (integer value) -# Deprecated group/name - [DEFAULT]/public_workers -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#public_workers = - -# The number of worker processes to serve the admin eventlet application. -# Defaults to number of CPUs (minimum of 2). (integer value) -# Deprecated group/name - [DEFAULT]/admin_workers -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#admin_workers = - -# The IP address of the network interface for the public service to listen on. -# (string value) -# Deprecated group/name - [DEFAULT]/bind_host -# Deprecated group/name - [DEFAULT]/public_bind_host -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#public_bind_host = 0.0.0.0 - -# The port number which the public service listens on. (port value) -# Minimum value: 0 -# Maximum value: 65535 -# Deprecated group/name - [DEFAULT]/public_port -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#public_port = 5000 - -# The IP address of the network interface for the admin service to listen on. -# (string value) -# Deprecated group/name - [DEFAULT]/bind_host -# Deprecated group/name - [DEFAULT]/admin_bind_host -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#admin_bind_host = 0.0.0.0 - -# The port number which the admin service listens on. (port value) -# Minimum value: 0 -# Maximum value: 65535 -# Deprecated group/name - [DEFAULT]/admin_port -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#admin_port = 35357 - -# If set to false, disables keepalives on the server; all connections will be -# closed after serving one request. (boolean value) -#wsgi_keep_alive = true - -# Timeout for socket operations on a client connection. If an incoming -# connection is idle for this number of seconds it will be closed. A value of -# "0" means wait forever. (integer value) -#client_socket_timeout = 900 - -# Set this to true if you want to enable TCP_KEEPALIVE on server sockets, i.e. -# sockets used by the Keystone wsgi server for client connections. (boolean -# value) -# Deprecated group/name - [DEFAULT]/tcp_keepalive -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#tcp_keepalive = false - -# Sets the value of TCP_KEEPIDLE in seconds for each server socket. Only -# applies if tcp_keepalive is true. Ignored if system does not support it. -# (integer value) -# Deprecated group/name - [DEFAULT]/tcp_keepidle -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#tcp_keepidle = 600 - - -[eventlet_server_ssl] - -# -# From keystone -# - -# Toggle for SSL support on the Keystone eventlet servers. (boolean value) -# Deprecated group/name - [ssl]/enable -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#enable = false - -# Path of the certfile for SSL. For non-production environments, you may be -# interested in using `keystone-manage ssl_setup` to generate self-signed -# certificates. (string value) -# Deprecated group/name - [ssl]/certfile -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#certfile = /etc/keystone/ssl/certs/keystone.pem - -# Path of the keyfile for SSL. (string value) -# Deprecated group/name - [ssl]/keyfile -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#keyfile = /etc/keystone/ssl/private/keystonekey.pem - -# Path of the CA cert file for SSL. (string value) -# Deprecated group/name - [ssl]/ca_certs -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#ca_certs = /etc/keystone/ssl/certs/ca.pem - -# Require client certificate. (boolean value) -# Deprecated group/name - [ssl]/cert_required -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#cert_required = false - - -[federation] - -# -# From keystone -# - -# Entrypoint for the federation backend driver in the keystone.federation -# namespace. (string value) -#driver = sql - -# Value to be used when filtering assertion parameters from the environment. -# (string value) -#assertion_prefix = - -# Value to be used to obtain the entity ID of the Identity Provider from the -# environment (e.g. if using the mod_shib plugin this value is `Shib-Identity- -# Provider`). (string value) -#remote_id_attribute = - -# A domain name that is reserved to allow federated ephemeral users to have a -# domain concept. Note that an admin will not be able to create a domain with -# this name or update an existing domain to this name. You are not advised to -# change this value unless you really have to. (string value) -#federated_domain_name = Federated - -# A list of trusted dashboard hosts. Before accepting a Single Sign-On request -# to return a token, the origin host must be a member of the trusted_dashboard -# list. This configuration option may be repeated for multiple values. For -# example: trusted_dashboard=http://acme.com/auth/websso -# trusted_dashboard=http://beta.com/auth/websso (multi valued) -#trusted_dashboard = - -# Location of Single Sign-On callback handler, will return a token to a trusted -# dashboard host. (string value) -#sso_callback_template = /etc/keystone/sso_callback_template.html - - -[fernet_tokens] - -# -# From keystone -# - -# Directory containing Fernet token keys. (string value) -#key_repository = /etc/keystone/fernet-keys/ - -# This controls how many keys are held in rotation by keystone-manage -# fernet_rotate before they are discarded. The default value of 3 means that -# keystone will maintain one staged key, one primary key, and one secondary -# key. Increasing this value means that additional secondary keys will be kept -# in the rotation. (integer value) -#max_active_keys = 3 - - -[identity] - -# -# From keystone -# - -# This references the domain to use for all Identity API v2 requests (which are -# not aware of domains). A domain with this ID will be created for you by -# keystone-manage db_sync in migration 008. The domain referenced by this ID -# cannot be deleted on the v3 API, to prevent accidentally breaking the v2 API. -# There is nothing special about this domain, other than the fact that it must -# exist to order to maintain support for your v2 clients. (string value) -#default_domain_id = default - -# A subset (or all) of domains can have their own identity driver, each with -# their own partial configuration options, stored in either the resource -# backend or in a file in a domain configuration directory (depending on the -# setting of domain_configurations_from_database). Only values specific to the -# domain need to be specified in this manner. This feature is disabled by -# default; set to true to enable. (boolean value) -#domain_specific_drivers_enabled = false - -# Extract the domain specific configuration options from the resource backend -# where they have been stored with the domain data. This feature is disabled by -# default (in which case the domain specific options will be loaded from files -# in the domain configuration directory); set to true to enable. (boolean -# value) -#domain_configurations_from_database = false - -# Path for Keystone to locate the domain specific identity configuration files -# if domain_specific_drivers_enabled is set to true. (string value) -#domain_config_dir = /etc/keystone/domains - -# Entrypoint for the identity backend driver in the keystone.identity -# namespace. Supplied drivers are ldap and sql. (string value) -#driver = sql - -# Toggle for identity caching. This has no effect unless global caching is -# enabled. (boolean value) -#caching = true - -# Time to cache identity data (in seconds). This has no effect unless global -# and identity caching are enabled. (integer value) -#cache_time = 600 - -# Maximum supported length for user passwords; decrease to improve performance. -# (integer value) -# Maximum value: 4096 -#max_password_length = 4096 - -# Maximum number of entities that will be returned in an identity collection. -# (integer value) -#list_limit = - - -[identity_mapping] - -# -# From keystone -# - -# Entrypoint for the identity mapping backend driver in the -# keystone.identity.id_mapping namespace. (string value) -#driver = sql - -# Entrypoint for the public ID generator for user and group entities in the -# keystone.identity.id_generator namespace. The Keystone identity mapper only -# supports generators that produce no more than 64 characters. (string value) -#generator = sha256 - -# The format of user and group IDs changed in Juno for backends that do not -# generate UUIDs (e.g. LDAP), with keystone providing a hash mapping to the -# underlying attribute in LDAP. By default this mapping is disabled, which -# ensures that existing IDs will not change. Even when the mapping is enabled -# by using domain specific drivers, any users and groups from the default -# domain being handled by LDAP will still not be mapped to ensure their IDs -# remain backward compatible. Setting this value to False will enable the -# mapping for even the default LDAP driver. It is only safe to do this if you -# do not already have assignments for users and groups from the default LDAP -# domain, and it is acceptable for Keystone to provide the different IDs to -# clients than it did previously. Typically this means that the only time you -# can set this value to False is when configuring a fresh installation. -# (boolean value) -#backward_compatible_ids = true - - -[kvs] - -# -# From keystone -# - -# Extra dogpile.cache backend modules to register with the dogpile.cache -# library. (list value) -#backends = - -# Prefix for building the configuration dictionary for the KVS region. This -# should not need to be changed unless there is another dogpile.cache region -# with the same configuration name. (string value) -#config_prefix = keystone.kvs - -# Toggle to disable using a key-mangling function to ensure fixed length keys. -# This is toggle-able for debugging purposes, it is highly recommended to -# always leave this set to true. (boolean value) -#enable_key_mangler = true - -# Default lock timeout (in seconds) for distributed locking. (integer value) -#default_lock_timeout = 5 - - -[ldap] - -# -# From keystone -# - -# URL(s) for connecting to the LDAP server. Multiple LDAP URLs may be specified -# as a comma separated string. The first URL to successfully bind is used for -# the connection. (string value) -#url = ldap://localhost - -# User BindDN to query the LDAP server. (string value) -#user = - -# Password for the BindDN to query the LDAP server. (string value) -#password = - -# LDAP server suffix (string value) -#suffix = cn=example,cn=com - -# If true, will add a dummy member to groups. This is required if the -# objectclass for groups requires the "member" attribute. (boolean value) -#use_dumb_member = false - -# DN of the "dummy member" to use when "use_dumb_member" is enabled. (string -# value) -#dumb_member = cn=dumb,dc=nonexistent - -# Delete subtrees using the subtree delete control. Only enable this option if -# your LDAP server supports subtree deletion. (boolean value) -#allow_subtree_delete = false - -# The LDAP scope for queries, "one" represents oneLevel/singleLevel and "sub" -# represents subtree/wholeSubtree options. (string value) -# Allowed values: one, sub -#query_scope = one - -# Maximum results per page; a value of zero ("0") disables paging. (integer -# value) -#page_size = 0 - -# The LDAP dereferencing option for queries. The "default" option falls back to -# using default dereferencing configured by your ldap.conf. (string value) -# Allowed values: never, searching, always, finding, default -#alias_dereferencing = default - -# Sets the LDAP debugging level for LDAP calls. A value of 0 means that -# debugging is not enabled. This value is a bitmask, consult your LDAP -# documentation for possible values. (integer value) -#debug_level = - -# Override the system's default referral chasing behavior for queries. (boolean -# value) -#chase_referrals = - -# Search base for users. Defaults to the suffix value. (string value) -#user_tree_dn = - -# LDAP search filter for users. (string value) -#user_filter = - -# LDAP objectclass for users. (string value) -#user_objectclass = inetOrgPerson - -# LDAP attribute mapped to user id. WARNING: must not be a multivalued -# attribute. (string value) -#user_id_attribute = cn - -# LDAP attribute mapped to user name. (string value) -#user_name_attribute = sn - -# LDAP attribute mapped to user description. (string value) -#user_description_attribute = description - -# LDAP attribute mapped to user email. (string value) -#user_mail_attribute = mail - -# LDAP attribute mapped to password. (string value) -#user_pass_attribute = userPassword - -# LDAP attribute mapped to user enabled flag. (string value) -#user_enabled_attribute = enabled - -# Invert the meaning of the boolean enabled values. Some LDAP servers use a -# boolean lock attribute where "true" means an account is disabled. Setting -# "user_enabled_invert = true" will allow these lock attributes to be used. -# This setting will have no effect if "user_enabled_mask" or -# "user_enabled_emulation" settings are in use. (boolean value) -#user_enabled_invert = false - -# Bitmask integer to indicate the bit that the enabled value is stored in if -# the LDAP server represents "enabled" as a bit on an integer rather than a -# boolean. A value of "0" indicates the mask is not used. If this is not set to -# "0" the typical value is "2". This is typically used when -# "user_enabled_attribute = userAccountControl". (integer value) -#user_enabled_mask = 0 - -# Default value to enable users. This should match an appropriate int value if -# the LDAP server uses non-boolean (bitmask) values to indicate if a user is -# enabled or disabled. If this is not set to "True" the typical value is "512". -# This is typically used when "user_enabled_attribute = userAccountControl". -# (string value) -#user_enabled_default = True - -# List of attributes stripped off the user on update. (list value) -#user_attribute_ignore = default_project_id - -# LDAP attribute mapped to default_project_id for users. (string value) -#user_default_project_id_attribute = - -# Allow user creation in LDAP backend. (boolean value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: Write support for Identity LDAP backends has been deprecated in the M -# release and will be removed in the O release. -#user_allow_create = true - -# Allow user updates in LDAP backend. (boolean value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: Write support for Identity LDAP backends has been deprecated in the M -# release and will be removed in the O release. -#user_allow_update = true - -# Allow user deletion in LDAP backend. (boolean value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: Write support for Identity LDAP backends has been deprecated in the M -# release and will be removed in the O release. -#user_allow_delete = true - -# If true, Keystone uses an alternative method to determine if a user is -# enabled or not by checking if they are a member of the -# "user_enabled_emulation_dn" group. (boolean value) -#user_enabled_emulation = false - -# DN of the group entry to hold enabled users when using enabled emulation. -# (string value) -#user_enabled_emulation_dn = - -# Use the "group_member_attribute" and "group_objectclass" settings to -# determine membership in the emulated enabled group. (boolean value) -#user_enabled_emulation_use_group_config = false - -# List of additional LDAP attributes used for mapping additional attribute -# mappings for users. Attribute mapping format is :, -# where ldap_attr is the attribute in the LDAP entry and user_attr is the -# Identity API attribute. (list value) -#user_additional_attribute_mapping = - -# Search base for groups. Defaults to the suffix value. (string value) -#group_tree_dn = - -# LDAP search filter for groups. (string value) -#group_filter = - -# LDAP objectclass for groups. (string value) -#group_objectclass = groupOfNames - -# LDAP attribute mapped to group id. (string value) -#group_id_attribute = cn - -# LDAP attribute mapped to group name. (string value) -#group_name_attribute = ou - -# LDAP attribute mapped to show group membership. (string value) -#group_member_attribute = member - -# LDAP attribute mapped to group description. (string value) -#group_desc_attribute = description - -# List of attributes stripped off the group on update. (list value) -#group_attribute_ignore = - -# Allow group creation in LDAP backend. (boolean value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: Write support for Identity LDAP backends has been deprecated in the M -# release and will be removed in the O release. -#group_allow_create = true - -# Allow group update in LDAP backend. (boolean value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: Write support for Identity LDAP backends has been deprecated in the M -# release and will be removed in the O release. -#group_allow_update = true - -# Allow group deletion in LDAP backend. (boolean value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: Write support for Identity LDAP backends has been deprecated in the M -# release and will be removed in the O release. -#group_allow_delete = true - -# Additional attribute mappings for groups. Attribute mapping format is -# :, where ldap_attr is the attribute in the LDAP entry -# and user_attr is the Identity API attribute. (list value) -#group_additional_attribute_mapping = - -# CA certificate file path for communicating with LDAP servers. (string value) -#tls_cacertfile = - -# CA certificate directory path for communicating with LDAP servers. (string -# value) -#tls_cacertdir = - -# Enable TLS for communicating with LDAP servers. (boolean value) -#use_tls = false - -# Specifies what checks to perform on client certificates in an incoming TLS -# session. (string value) -# Allowed values: demand, never, allow -#tls_req_cert = demand - -# Enable LDAP connection pooling. (boolean value) -#use_pool = true - -# Connection pool size. (integer value) -#pool_size = 10 - -# Maximum count of reconnect trials. (integer value) -#pool_retry_max = 3 - -# Time span in seconds to wait between two reconnect trials. (floating point -# value) -#pool_retry_delay = 0.1 - -# Connector timeout in seconds. Value -1 indicates indefinite wait for -# response. (integer value) -#pool_connection_timeout = -1 - -# Connection lifetime in seconds. (integer value) -#pool_connection_lifetime = 600 - -# Enable LDAP connection pooling for end user authentication. If use_pool is -# disabled, then this setting is meaningless and is not used at all. (boolean -# value) -#use_auth_pool = true - -# End user auth connection pool size. (integer value) -#auth_pool_size = 100 - -# End user auth connection lifetime in seconds. (integer value) -#auth_pool_connection_lifetime = 60 - -# If the members of the group objectclass are user IDs rather than DNs, set -# this to true. This is the case when using posixGroup as the group objectclass -# and OpenDirectory. (boolean value) -#group_members_are_ids = false - - -[matchmaker_redis] - -# -# From oslo.messaging -# - -# Host to locate redis. (string value) -#host = 127.0.0.1 - -# Use this port to connect to redis host. (port value) -# Minimum value: 0 -# Maximum value: 65535 -#port = 6379 - -# Password for Redis server (optional). (string value) -#password = - -# List of Redis Sentinel hosts (fault tolerance mode) e.g. -# [host:port, host1:port ... ] (list value) -#sentinel_hosts = - -# Redis replica set name. (string value) -#sentinel_group_name = oslo-messaging-zeromq - -# Time in ms to wait between connection attempts. (integer value) -#wait_timeout = 500 - -# Time in ms to wait before the transaction is killed. (integer value) -#check_timeout = 20000 - -# Timeout in ms on blocking socket operations (integer value) -#socket_timeout = 1000 - - -[memcache] - -# -# From keystone -# - -# Memcache servers in the format of "host:port". (list value) -#servers = localhost:11211 - -# Number of seconds memcached server is considered dead before it is tried -# again. This is used by the key value store system (e.g. token pooled -# memcached persistence backend). (integer value) -#dead_retry = 300 - -# Timeout in seconds for every call to a server. This is used by the key value -# store system (e.g. token pooled memcached persistence backend). (integer -# value) -#socket_timeout = 3 - -# Max total number of open connections to every memcached server. This is used -# by the key value store system (e.g. token pooled memcached persistence -# backend). (integer value) -#pool_maxsize = 10 - -# Number of seconds a connection to memcached is held unused in the pool before -# it is closed. This is used by the key value store system (e.g. token pooled -# memcached persistence backend). (integer value) -#pool_unused_timeout = 60 - -# Number of seconds that an operation will wait to get a memcache client -# connection. This is used by the key value store system (e.g. token pooled -# memcached persistence backend). (integer value) -#pool_connection_get_timeout = 10 - - -[oauth1] - -# -# From keystone -# - -# Entrypoint for the OAuth backend driver in the keystone.oauth1 namespace. -# (string value) -#driver = sql - -# Duration (in seconds) for the OAuth Request Token. (integer value) -#request_token_duration = 28800 - -# Duration (in seconds) for the OAuth Access Token. (integer value) -#access_token_duration = 86400 - - -[os_inherit] - -# -# From keystone -# - -# role-assignment inheritance to projects from owning domain or from projects -# higher in the hierarchy can be optionally disabled. In the future, this -# option will be removed and the hierarchy will be always enabled. (boolean -# value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: The option to enable the OS-INHERIT extension has been deprecated in -# the M release and will be removed in the O release. The OS-INHERIT extension -# will be enabled by default. -#enabled = true - - -[oslo_messaging_amqp] - -# -# From oslo.messaging -# - -# address prefix used when sending to a specific server (string value) -# Deprecated group/name - [amqp1]/server_request_prefix -#server_request_prefix = exclusive - -# address prefix used when broadcasting to all servers (string value) -# Deprecated group/name - [amqp1]/broadcast_prefix -#broadcast_prefix = broadcast - -# address prefix when sending to any server in group (string value) -# Deprecated group/name - [amqp1]/group_request_prefix -#group_request_prefix = unicast - -# Name for the AMQP container (string value) -# Deprecated group/name - [amqp1]/container_name -#container_name = - -# Timeout for inactive connections (in seconds) (integer value) -# Deprecated group/name - [amqp1]/idle_timeout -#idle_timeout = 0 - -# Debug: dump AMQP frames to stdout (boolean value) -# Deprecated group/name - [amqp1]/trace -#trace = false - -# CA certificate PEM file to verify server certificate (string value) -# Deprecated group/name - [amqp1]/ssl_ca_file -#ssl_ca_file = - -# Identifying certificate PEM file to present to clients (string value) -# Deprecated group/name - [amqp1]/ssl_cert_file -#ssl_cert_file = - -# Private key PEM file used to sign cert_file certificate (string value) -# Deprecated group/name - [amqp1]/ssl_key_file -#ssl_key_file = - -# Password for decrypting ssl_key_file (if encrypted) (string value) -# Deprecated group/name - [amqp1]/ssl_key_password -#ssl_key_password = - -# Accept clients using either SSL or plain TCP (boolean value) -# Deprecated group/name - [amqp1]/allow_insecure_clients -#allow_insecure_clients = false - -# Space separated list of acceptable SASL mechanisms (string value) -# Deprecated group/name - [amqp1]/sasl_mechanisms -#sasl_mechanisms = - -# Path to directory that contains the SASL configuration (string value) -# Deprecated group/name - [amqp1]/sasl_config_dir -#sasl_config_dir = - -# Name of configuration file (without .conf suffix) (string value) -# Deprecated group/name - [amqp1]/sasl_config_name -#sasl_config_name = - -# User name for message broker authentication (string value) -# Deprecated group/name - [amqp1]/username -#username = - -# Password for message broker authentication (string value) -# Deprecated group/name - [amqp1]/password -#password = - - -[oslo_messaging_notifications] - -# -# From oslo.messaging -# - -# The Drivers(s) to handle sending notifications. Possible values are -# messaging, messagingv2, routing, log, test, noop (multi valued) -# Deprecated group/name - [DEFAULT]/notification_driver -#driver = - -# A URL representing the messaging driver to use for notifications. If not set, -# we fall back to the same configuration used for RPC. (string value) -# Deprecated group/name - [DEFAULT]/notification_transport_url -#transport_url = - -# AMQP topic used for OpenStack notifications. (list value) -# Deprecated group/name - [rpc_notifier2]/topics -# Deprecated group/name - [DEFAULT]/notification_topics -#topics = notifications - - -[oslo_messaging_rabbit] - -# -# From oslo.messaging -# - -# Use durable queues in AMQP. (boolean value) -# Deprecated group/name - [DEFAULT]/amqp_durable_queues -# Deprecated group/name - [DEFAULT]/rabbit_durable_queues -#amqp_durable_queues = false - -# Auto-delete queues in AMQP. (boolean value) -# Deprecated group/name - [DEFAULT]/amqp_auto_delete -#amqp_auto_delete = false - -# SSL version to use (valid only if SSL enabled). Valid values are TLSv1 and -# SSLv23. SSLv2, SSLv3, TLSv1_1, and TLSv1_2 may be available on some -# distributions. (string value) -# Deprecated group/name - [DEFAULT]/kombu_ssl_version -#kombu_ssl_version = - -# SSL key file (valid only if SSL enabled). (string value) -# Deprecated group/name - [DEFAULT]/kombu_ssl_keyfile -#kombu_ssl_keyfile = - -# SSL cert file (valid only if SSL enabled). (string value) -# Deprecated group/name - [DEFAULT]/kombu_ssl_certfile -#kombu_ssl_certfile = - -# SSL certification authority file (valid only if SSL enabled). (string value) -# Deprecated group/name - [DEFAULT]/kombu_ssl_ca_certs -#kombu_ssl_ca_certs = - -# How long to wait before reconnecting in response to an AMQP consumer cancel -# notification. (floating point value) -# Deprecated group/name - [DEFAULT]/kombu_reconnect_delay -#kombu_reconnect_delay = 1.0 - -# EXPERIMENTAL: Possible values are: gzip, bz2. If not set compression will not -# be used. This option may notbe available in future versions. (string value) -#kombu_compression = - -# How long to wait a missing client beforce abandoning to send it its replies. -# This value should not be longer than rpc_response_timeout. (integer value) -# Deprecated group/name - [DEFAULT]/kombu_reconnect_timeout -#kombu_missing_consumer_retry_timeout = 60 - -# Determines how the next RabbitMQ node is chosen in case the one we are -# currently connected to becomes unavailable. Takes effect only if more than -# one RabbitMQ node is provided in config. (string value) -# Allowed values: round-robin, shuffle -#kombu_failover_strategy = round-robin - -# The RabbitMQ broker address where a single node is used. (string value) -# Deprecated group/name - [DEFAULT]/rabbit_host -#rabbit_host = localhost - -# The RabbitMQ broker port where a single node is used. (port value) -# Minimum value: 0 -# Maximum value: 65535 -# Deprecated group/name - [DEFAULT]/rabbit_port -#rabbit_port = 5672 - -# RabbitMQ HA cluster host:port pairs. (list value) -# Deprecated group/name - [DEFAULT]/rabbit_hosts -#rabbit_hosts = $rabbit_host:$rabbit_port - -# Connect over SSL for RabbitMQ. (boolean value) -# Deprecated group/name - [DEFAULT]/rabbit_use_ssl -#rabbit_use_ssl = false - -# The RabbitMQ userid. (string value) -# Deprecated group/name - [DEFAULT]/rabbit_userid -#rabbit_userid = guest - -# The RabbitMQ password. (string value) -# Deprecated group/name - [DEFAULT]/rabbit_password -#rabbit_password = guest - -# The RabbitMQ login method. (string value) -# Deprecated group/name - [DEFAULT]/rabbit_login_method -#rabbit_login_method = AMQPLAIN - -# The RabbitMQ virtual host. (string value) -# Deprecated group/name - [DEFAULT]/rabbit_virtual_host -#rabbit_virtual_host = / - -# How frequently to retry connecting with RabbitMQ. (integer value) -#rabbit_retry_interval = 1 - -# How long to backoff for between retries when connecting to RabbitMQ. (integer -# value) -# Deprecated group/name - [DEFAULT]/rabbit_retry_backoff -#rabbit_retry_backoff = 2 - -# Maximum interval of RabbitMQ connection retries. Default is 30 seconds. -# (integer value) -#rabbit_interval_max = 30 - -# Maximum number of RabbitMQ connection retries. Default is 0 (infinite retry -# count). (integer value) -# Deprecated group/name - [DEFAULT]/rabbit_max_retries -#rabbit_max_retries = 0 - -# Try to use HA queues in RabbitMQ (x-ha-policy: all). If you change this -# option, you must wipe the RabbitMQ database. In RabbitMQ 3.0, queue mirroring -# is no longer controlled by the x-ha-policy argument when declaring a queue. -# If you just want to make sure that all queues (except those with auto- -# generated names) are mirrored across all nodes, run: "rabbitmqctl set_policy -# HA '^(?!amq\.).*' '{"ha-mode": "all"}' " (boolean value) -# Deprecated group/name - [DEFAULT]/rabbit_ha_queues -#rabbit_ha_queues = false - -# Positive integer representing duration in seconds for queue TTL (x-expires). -# Queues which are unused for the duration of the TTL are automatically -# deleted. The parameter affects only reply and fanout queues. (integer value) -# Minimum value: 1 -#rabbit_transient_queues_ttl = 1800 - -# Specifies the number of messages to prefetch. Setting to zero allows -# unlimited messages. (integer value) -#rabbit_qos_prefetch_count = 0 - -# Number of seconds after which the Rabbit broker is considered down if -# heartbeat's keep-alive fails (0 disable the heartbeat). EXPERIMENTAL (integer -# value) -#heartbeat_timeout_threshold = 60 - -# How often times during the heartbeat_timeout_threshold we check the -# heartbeat. (integer value) -#heartbeat_rate = 2 - -# Deprecated, use rpc_backend=kombu+memory or rpc_backend=fake (boolean value) -# Deprecated group/name - [DEFAULT]/fake_rabbit -#fake_rabbit = false - -# Maximum number of channels to allow (integer value) -#channel_max = - -# The maximum byte size for an AMQP frame (integer value) -#frame_max = - -# How often to send heartbeats for consumer's connections (integer value) -#heartbeat_interval = 1 - -# Enable SSL (boolean value) -#ssl = - -# Arguments passed to ssl.wrap_socket (dict value) -#ssl_options = - -# Set socket timeout in seconds for connection's socket (floating point value) -#socket_timeout = 0.25 - -# Set TCP_USER_TIMEOUT in seconds for connection's socket (floating point -# value) -#tcp_user_timeout = 0.25 - -# Set delay for reconnection to some host which has connection error (floating -# point value) -#host_connection_reconnect_delay = 0.25 - -# Maximum number of connections to keep queued. (integer value) -#pool_max_size = 10 - -# Maximum number of connections to create above `pool_max_size`. (integer -# value) -#pool_max_overflow = 0 - -# Default number of seconds to wait for a connections to available (integer -# value) -#pool_timeout = 30 - -# Lifetime of a connection (since creation) in seconds or None for no -# recycling. Expired connections are closed on acquire. (integer value) -#pool_recycle = 600 - -# Threshold at which inactive (since release) connections are considered stale -# in seconds or None for no staleness. Stale connections are closed on acquire. -# (integer value) -#pool_stale = 60 - -# Persist notification messages. (boolean value) -#notification_persistence = false - -# Exchange name for for sending notifications (string value) -#default_notification_exchange = ${control_exchange}_notification - -# Max number of not acknowledged message which RabbitMQ can send to -# notification listener. (integer value) -#notification_listener_prefetch_count = 100 - -# Reconnecting retry count in case of connectivity problem during sending -# notification, -1 means infinite retry. (integer value) -#default_notification_retry_attempts = -1 - -# Reconnecting retry delay in case of connectivity problem during sending -# notification message (floating point value) -#notification_retry_delay = 0.25 - -# Time to live for rpc queues without consumers in seconds. (integer value) -#rpc_queue_expiration = 60 - -# Exchange name for sending RPC messages (string value) -#default_rpc_exchange = ${control_exchange}_rpc - -# Exchange name for receiving RPC replies (string value) -#rpc_reply_exchange = ${control_exchange}_rpc_reply - -# Max number of not acknowledged message which RabbitMQ can send to rpc -# listener. (integer value) -#rpc_listener_prefetch_count = 100 - -# Max number of not acknowledged message which RabbitMQ can send to rpc reply -# listener. (integer value) -#rpc_reply_listener_prefetch_count = 100 - -# Reconnecting retry count in case of connectivity problem during sending -# reply. -1 means infinite retry during rpc_timeout (integer value) -#rpc_reply_retry_attempts = -1 - -# Reconnecting retry delay in case of connectivity problem during sending -# reply. (floating point value) -#rpc_reply_retry_delay = 0.25 - -# Reconnecting retry count in case of connectivity problem during sending RPC -# message, -1 means infinite retry. If actual retry attempts in not 0 the rpc -# request could be processed more then one time (integer value) -#default_rpc_retry_attempts = -1 - -# Reconnecting retry delay in case of connectivity problem during sending RPC -# message (floating point value) -#rpc_retry_delay = 0.25 - - -[oslo_middleware] - -# -# From oslo.middleware -# - -# The maximum body size for each request, in bytes. (integer value) -# Deprecated group/name - [DEFAULT]/osapi_max_request_body_size -# Deprecated group/name - [DEFAULT]/max_request_body_size -#max_request_body_size = 114688 - -# The HTTP Header that will be used to determine what the original request -# protocol scheme was, even if it was hidden by an SSL termination proxy. -# (string value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -#secure_proxy_ssl_header = X-Forwarded-Proto - - -[oslo_policy] - -# -# From oslo.policy -# - -# The JSON file that defines policies. (string value) -# Deprecated group/name - [DEFAULT]/policy_file -#policy_file = policy.json - -# Default rule. Enforced when a requested rule is not found. (string value) -# Deprecated group/name - [DEFAULT]/policy_default_rule -#policy_default_rule = default - -# Directories where policy configuration files are stored. They can be relative -# to any directory in the search path defined by the config_dir option, or -# absolute paths. The file defined by policy_file must exist for these -# directories to be searched. Missing or empty directories are ignored. (multi -# valued) -# Deprecated group/name - [DEFAULT]/policy_dirs -#policy_dirs = policy.d - - -[paste_deploy] - -# -# From keystone -# - -# Name of the paste configuration file that defines the available pipelines. -# (string value) -#config_file = keystone-paste.ini - - -[policy] - -# -# From keystone -# - -# Entrypoint for the policy backend driver in the keystone.policy namespace. -# Supplied drivers are rules and sql. (string value) -#driver = sql - -# Maximum number of entities that will be returned in a policy collection. -# (integer value) -#list_limit = - - -[resource] - -# -# From keystone -# - -# Entrypoint for the resource backend driver in the keystone.resource -# namespace. Only an SQL driver is supplied. If a resource driver is not -# specified, the assignment driver will choose the resource driver. (string -# value) -#driver = - -# Toggle for resource caching. This has no effect unless global caching is -# enabled. (boolean value) -# Deprecated group/name - [assignment]/caching -#caching = true - -# TTL (in seconds) to cache resource data. This has no effect unless global -# caching is enabled. (integer value) -# Deprecated group/name - [assignment]/cache_time -#cache_time = - -# Maximum number of entities that will be returned in a resource collection. -# (integer value) -# Deprecated group/name - [assignment]/list_limit -#list_limit = - -# Name of the domain that owns the `admin_project_name`. Defaults to None. -# (string value) -#admin_project_domain_name = - -# Special project for performing administrative operations on remote services. -# Tokens scoped to this project will contain the key/value -# `is_admin_project=true`. Defaults to None. (string value) -#admin_project_name = - -# Whether the names of projects are restricted from containing url reserved -# characters. If set to new, attempts to create or update a project with a url -# unsafe name will return an error. In addition, if set to strict, attempts to -# scope a token using an unsafe project name will return an error. (string -# value) -# Allowed values: off, new, strict -#project_name_url_safe = off - -# Whether the names of domains are restricted from containing url reserved -# characters. If set to new, attempts to create or update a domain with a url -# unsafe name will return an error. In addition, if set to strict, attempts to -# scope a token using a domain name which is unsafe will return an error. -# (string value) -# Allowed values: off, new, strict -#domain_name_url_safe = off - - -[revoke] - -# -# From keystone -# - -# Entrypoint for an implementation of the backend for persisting revocation -# events in the keystone.revoke namespace. Supplied drivers are kvs and sql. -# (string value) -#driver = sql - -# This value (calculated in seconds) is added to token expiration before a -# revocation event may be removed from the backend. (integer value) -#expiration_buffer = 1800 - -# Toggle for revocation event caching. This has no effect unless global caching -# is enabled. (boolean value) -#caching = true - -# Time to cache the revocation list and the revocation events (in seconds). -# This has no effect unless global and token caching are enabled. (integer -# value) -# Deprecated group/name - [token]/revocation_cache_time -#cache_time = 3600 - - -[role] - -# -# From keystone -# - -# Entrypoint for the role backend driver in the keystone.role namespace. -# Supplied drivers are ldap and sql. (string value) -#driver = - -# Toggle for role caching. This has no effect unless global caching is enabled. -# (boolean value) -#caching = true - -# TTL (in seconds) to cache role data. This has no effect unless global caching -# is enabled. (integer value) -#cache_time = - -# Maximum number of entities that will be returned in a role collection. -# (integer value) -#list_limit = - - -[saml] - -# -# From keystone -# - -# Default TTL, in seconds, for any generated SAML assertion created by -# Keystone. (integer value) -#assertion_expiration_time = 3600 - -# Binary to be called for XML signing. Install the appropriate package, specify -# absolute path or adjust your PATH environment variable if the binary cannot -# be found. (string value) -#xmlsec1_binary = xmlsec1 - -# Path of the certfile for SAML signing. For non-production environments, you -# may be interested in using `keystone-manage pki_setup` to generate self- -# signed certificates. Note, the path cannot contain a comma. (string value) -#certfile = /etc/keystone/ssl/certs/signing_cert.pem - -# Path of the keyfile for SAML signing. Note, the path cannot contain a comma. -# (string value) -#keyfile = /etc/keystone/ssl/private/signing_key.pem - -# Entity ID value for unique Identity Provider identification. Usually FQDN is -# set with a suffix. A value is required to generate IDP Metadata. For example: -# https://keystone.example.com/v3/OS-FEDERATION/saml2/idp (string value) -#idp_entity_id = - -# Identity Provider Single-Sign-On service value, required in the Identity -# Provider's metadata. A value is required to generate IDP Metadata. For -# example: https://keystone.example.com/v3/OS-FEDERATION/saml2/sso (string -# value) -#idp_sso_endpoint = - -# Language used by the organization. (string value) -#idp_lang = en - -# Organization name the installation belongs to. (string value) -#idp_organization_name = - -# Organization name to be displayed. (string value) -#idp_organization_display_name = - -# URL of the organization. (string value) -#idp_organization_url = - -# Company of contact person. (string value) -#idp_contact_company = - -# Given name of contact person (string value) -#idp_contact_name = - -# Surname of contact person. (string value) -#idp_contact_surname = - -# Email address of contact person. (string value) -#idp_contact_email = - -# Telephone number of contact person. (string value) -#idp_contact_telephone = - -# The contact type describing the main point of contact for the identity -# provider. (string value) -# Allowed values: technical, support, administrative, billing, other -#idp_contact_type = other - -# Path to the Identity Provider Metadata file. This file should be generated -# with the keystone-manage saml_idp_metadata command. (string value) -#idp_metadata_path = /etc/keystone/saml2_idp_metadata.xml - -# The prefix to use for the RelayState SAML attribute, used when generating ECP -# wrapped assertions. (string value) -#relay_state_prefix = ss:mem: - - -[shadow_users] - -# -# From keystone -# - -# Entrypoint for the shadow users backend driver in the -# keystone.identity.shadow_users namespace. (string value) -#driver = sql - - -[signing] - -# -# From keystone -# - -# Path of the certfile for token signing. For non-production environments, you -# may be interested in using `keystone-manage pki_setup` to generate self- -# signed certificates. (string value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: PKI token support has been deprecated in the M release and will be -# removed in the O release. Fernet or UUID tokens are recommended. -#certfile = /etc/keystone/ssl/certs/signing_cert.pem - -# Path of the keyfile for token signing. (string value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: PKI token support has been deprecated in the M release and will be -# removed in the O release. Fernet or UUID tokens are recommended. -#keyfile = /etc/keystone/ssl/private/signing_key.pem - -# Path of the CA for token signing. (string value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: PKI token support has been deprecated in the M release and will be -# removed in the O release. Fernet or UUID tokens are recommended. -#ca_certs = /etc/keystone/ssl/certs/ca.pem - -# Path of the CA key for token signing. (string value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: PKI token support has been deprecated in the M release and will be -# removed in the O release. Fernet or UUID tokens are recommended. -#ca_key = /etc/keystone/ssl/private/cakey.pem - -# Key size (in bits) for token signing cert (auto generated certificate). -# (integer value) -# Minimum value: 1024 -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: PKI token support has been deprecated in the M release and will be -# removed in the O release. Fernet or UUID tokens are recommended. -#key_size = 2048 - -# Days the token signing cert is valid for (auto generated certificate). -# (integer value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: PKI token support has been deprecated in the M release and will be -# removed in the O release. Fernet or UUID tokens are recommended. -#valid_days = 3650 - -# Certificate subject (auto generated certificate) for token signing. (string -# value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: PKI token support has been deprecated in the M release and will be -# removed in the O release. Fernet or UUID tokens are recommended. -#cert_subject = /C=US/ST=Unset/L=Unset/O=Unset/CN=www.example.com - - -[ssl] - -# -# From keystone -# - -# Path of the CA key file for SSL. (string value) -#ca_key = /etc/keystone/ssl/private/cakey.pem - -# SSL key length (in bits) (auto generated certificate). (integer value) -# Minimum value: 1024 -#key_size = 1024 - -# Days the certificate is valid for once signed (auto generated certificate). -# (integer value) -#valid_days = 3650 - -# SSL certificate subject (auto generated certificate). (string value) -#cert_subject = /C=US/ST=Unset/L=Unset/O=Unset/CN=localhost - - -[token] - -# -# From keystone -# - -# External auth mechanisms that should add bind information to token, e.g., -# kerberos,x509. (list value) -#bind = - -# Enforcement policy on tokens presented to Keystone with bind information. One -# of disabled, permissive, strict, required or a specifically required bind -# mode, e.g., kerberos or x509 to require binding to that authentication. -# (string value) -#enforce_token_bind = permissive - -# Amount of time a token should remain valid (in seconds). (integer value) -#expiration = 3600 - -# Controls the token construction, validation, and revocation operations. -# Entrypoint in the keystone.token.provider namespace. Core providers are -# [fernet|pkiz|pki|uuid]. (string value) -#provider = uuid - -# Entrypoint for the token persistence backend driver in the -# keystone.token.persistence namespace. Supplied drivers are kvs, memcache, -# memcache_pool, and sql. (string value) -#driver = sql - -# Toggle for token system caching. This has no effect unless global caching is -# enabled. (boolean value) -#caching = true - -# Time to cache tokens (in seconds). This has no effect unless global and token -# caching are enabled. (integer value) -#cache_time = - -# Revoke token by token identifier. Setting revoke_by_id to true enables -# various forms of enumerating tokens, e.g. `list tokens for user`. These -# enumerations are processed to determine the list of tokens to revoke. Only -# disable if you are switching to using the Revoke extension with a backend -# other than KVS, which stores events in memory. (boolean value) -#revoke_by_id = true - -# Allow rescoping of scoped token. Setting allow_rescoped_scoped_token to false -# prevents a user from exchanging a scoped token for any other token. (boolean -# value) -#allow_rescope_scoped_token = true - -# The hash algorithm to use for PKI tokens. This can be set to any algorithm -# that hashlib supports. WARNING: Before changing this value, the auth_token -# middleware must be configured with the hash_algorithms, otherwise token -# revocation will not be processed correctly. (string value) -# This option is deprecated for removal. -# Its value may be silently ignored in the future. -# Reason: PKI token support has been deprecated in the M release and will be -# removed in the O release. Fernet or UUID tokens are recommended. -#hash_algorithm = md5 - -# Add roles to token that are not explicitly added, but that are linked -# implicitly to other roles. (boolean value) -#infer_roles = true - - -[tokenless_auth] - -# -# From keystone -# - -# The list of trusted issuers to further filter the certificates that are -# allowed to participate in the X.509 tokenless authorization. If the option is -# absent then no certificates will be allowed. The naming format for the -# attributes of a Distinguished Name(DN) must be separated by a comma and -# contain no spaces. This configuration option may be repeated for multiple -# values. For example: trusted_issuer=CN=john,OU=keystone,O=openstack -# trusted_issuer=CN=mary,OU=eng,O=abc (multi valued) -#trusted_issuer = - -# The protocol name for the X.509 tokenless authorization along with the option -# issuer_attribute below can look up its corresponding mapping. (string value) -#protocol = x509 - -# The issuer attribute that is served as an IdP ID for the X.509 tokenless -# authorization along with the protocol to look up its corresponding mapping. -# It is the environment variable in the WSGI environment that references to the -# issuer of the client certificate. (string value) -#issuer_attribute = SSL_CLIENT_I_DN - - -[trust] - -# -# From keystone -# - -# Delegation and impersonation features can be optionally disabled. (boolean -# value) -#enabled = true - -# Enable redelegation feature. (boolean value) -#allow_redelegation = false - -# Maximum depth of trust redelegation. (integer value) -#max_redelegation_count = 3 - -# Entrypoint for the trust backend driver in the keystone.trust namespace. -# (string value) -#driver = sql - - -[moon] - -# Configuration backend driver -configuration_driver = keystone.contrib.moon.backends.memory.ConfigurationConnector - -# Tenant backend driver -tenant_driver = keystone.contrib.moon.backends.sql.TenantConnector - -# Authorisation backend driver -authz_driver = keystone.contrib.moon.backends.flat.SuperExtensionConnector - -# IntraExtension backend driver -intraextension_driver = keystone.contrib.moon.backends.sql.IntraExtensionConnector - -# InterExtension backend driver -interextension_driver = keystone.contrib.moon.backends.sql.InterExtensionConnector - -# Logs backend driver -log_driver = keystone.contrib.moon.backends.flat.LogConnector - -# Local directory where all policies are stored -policy_directory = /etc/keystone/policies - -# Local directory where Root IntraExtension configuration is stored -root_policy_directory = policy_root - -# URL of the Moon master -master = 'http://localhost:35357/' - -# Login of the Moon master -master_login = 'admin' - -# Password of the Moon master -master_password = 'nomoresecrete' diff --git a/keystone-moon/etc/logging.conf.sample b/keystone-moon/etc/logging.conf.sample deleted file mode 100644 index 6cb8c425..00000000 --- a/keystone-moon/etc/logging.conf.sample +++ /dev/null @@ -1,65 +0,0 @@ -[loggers] -keys=root,access - -[handlers] -keys=production,file,access_file,devel - -[formatters] -keys=minimal,normal,debug - - -########### -# Loggers # -########### - -[logger_root] -level=WARNING -handlers=file - -[logger_access] -level=INFO -qualname=access -handlers=access_file - - -################ -# Log Handlers # -################ - -[handler_production] -class=handlers.SysLogHandler -level=ERROR -formatter=normal -args=(('localhost', handlers.SYSLOG_UDP_PORT), handlers.SysLogHandler.LOG_USER) - -[handler_file] -class=handlers.WatchedFileHandler -level=WARNING -formatter=normal -args=('error.log',) - -[handler_access_file] -class=handlers.WatchedFileHandler -level=INFO -formatter=minimal -args=('access.log',) - -[handler_devel] -class=StreamHandler -level=NOTSET -formatter=debug -args=(sys.stdout,) - - -################## -# Log Formatters # -################## - -[formatter_minimal] -format=%(message)s - -[formatter_normal] -format=(%(name)s): %(asctime)s %(levelname)s %(message)s - -[formatter_debug] -format=(%(name)s): %(asctime)s %(levelname)s %(module)s %(funcName)s %(message)s diff --git a/keystone-moon/etc/policies/policy_authz/assignment.json b/keystone-moon/etc/policies/policy_authz/assignment.json deleted file mode 100644 index 7a6c722e..00000000 --- a/keystone-moon/etc/policies/policy_authz/assignment.json +++ /dev/null @@ -1,55 +0,0 @@ -{ - "subject_assignments": { - "subject_security_level":{ - "admin": ["high"], - "demo": ["medium"] - }, - "domain":{ - "admin": ["ft"], - "demo": ["xx"] - }, - "role": { - "admin": ["admin"], - "demo": ["dev"] - } - }, - - "action_assignments": { - "resource_action":{ - "pause": ["vm_admin"], - "unpause": ["vm_admin"], - "start": ["vm_admin"], - "stop": ["vm_admin"], - "list": ["vm_access", "vm_admin"], - "create": ["vm_admin"], - "storage_list": ["storage_access"], - "download": ["storage_access"], - "post": ["storage_admin"], - "upload": ["storage_admin"] - }, - "access": { - "pause": ["write"], - "unpause": ["write"], - "start": ["write"], - "stop": ["write"], - "list": ["read"], - "create": ["write"], - "storage_list": ["read"], - "download": ["read"], - "post": ["write"], - "upload": ["write"] - } - }, - - "object_assignments": { - "object_security_level": { - "servers": ["low"] - }, - "type": { - "servers": ["computing"] - }, - "object_id": { - "servers": ["servers"] - } - } -} diff --git a/keystone-moon/etc/policies/policy_authz/metadata.json b/keystone-moon/etc/policies/policy_authz/metadata.json deleted file mode 100644 index d0db90db..00000000 --- a/keystone-moon/etc/policies/policy_authz/metadata.json +++ /dev/null @@ -1,23 +0,0 @@ -{ - "name": "Multiple_Policy", - "model": "Multiple", - "genre": "authz", - "description": "Multiple Security Policies", - - "subject_categories": [ - "subject_security_level", - "domain", - "role" - ], - - "action_categories": [ - "resource_action", - "access" - ], - - "object_categories": [ - "object_security_level", - "type", - "object_id" - ] -} diff --git a/keystone-moon/etc/policies/policy_authz/metarule.json b/keystone-moon/etc/policies/policy_authz/metarule.json deleted file mode 100644 index c9afd6c2..00000000 --- a/keystone-moon/etc/policies/policy_authz/metarule.json +++ /dev/null @@ -1,24 +0,0 @@ -{ - "sub_meta_rules": { - "mls_rule": { - "subject_categories": ["subject_security_level"], - "action_categories": ["resource_action"], - "object_categories": ["object_security_level"], - "algorithm": "inclusion" - }, - "dte_rule": { - "subject_categories": ["domain"], - "action_categories": ["access"], - "object_categories": ["type"], - "algorithm": "inclusion" - }, - "rbac_rule": { - "subject_categories": ["role", "domain"], - "action_categories": ["access"], - "object_categories": ["object_id"], - "algorithm": "inclusion" - } - }, - "aggregation": "all_true" -} - diff --git a/keystone-moon/etc/policies/policy_authz/perimeter.json b/keystone-moon/etc/policies/policy_authz/perimeter.json deleted file mode 100644 index 47a8ee45..00000000 --- a/keystone-moon/etc/policies/policy_authz/perimeter.json +++ /dev/null @@ -1,21 +0,0 @@ -{ - "subjects": [ - "admin", - "demo" - ], - "actions": [ - "pause", - "unpause", - "start", - "stop", - "create", - "list", - "upload", - "download", - "post", - "storage_list" - ], - "objects": [ - "servers" - ] -} diff --git a/keystone-moon/etc/policies/policy_authz/rule.json b/keystone-moon/etc/policies/policy_authz/rule.json deleted file mode 100644 index 25f9d93a..00000000 --- a/keystone-moon/etc/policies/policy_authz/rule.json +++ /dev/null @@ -1,25 +0,0 @@ -{ - "mls_rule":[ - ["high", "vm_admin", "medium"], - ["high", "vm_admin", "low"], - ["medium", "vm_admin", "low"], - ["high", "vm_access", "high"], - ["high", "vm_access", "medium"], - ["high", "vm_access", "low"], - ["medium", "vm_access", "medium"], - ["medium", "vm_access", "low"], - ["low", "vm_access", "low"] - ], - "dte_rule":[ - ["ft", "read", "computing"], - ["ft", "write", "computing"], - ["ft", "read", "storage"], - ["ft", "write", "storage"], - ["xx", "read", "storage"] - ], - "rbac_rule":[ - ["dev", "xx", "read", "servers"], - ["admin", "xx", "read", "servers"], - ["admin", "ft", "read", "servers"] - ] -} diff --git a/keystone-moon/etc/policies/policy_authz/scope.json b/keystone-moon/etc/policies/policy_authz/scope.json deleted file mode 100644 index 9b313daf..00000000 --- a/keystone-moon/etc/policies/policy_authz/scope.json +++ /dev/null @@ -1,49 +0,0 @@ -{ - "subject_scopes": { - "role": [ - "admin", - "dev" - ], - "subject_security_level": [ - "high", - "medium", - "low" - ], - "domain": [ - "ft", - "xx" - ] - }, - - "action_scopes": { - "resource_action": [ - "vm_admin", - "vm_access", - "storage_admin", - "storage_access" - ], - "access": [ - "write", - "read" - ] - }, - - "object_scopes": { - "object_security_level": [ - "high", - "medium", - "low" - ], - "type": [ - "computing", - "storage" - ], - "object_id": [ - "servers", - "vm1", - "vm2", - "file1", - "file2" - ] - } -} diff --git a/keystone-moon/etc/policies/policy_empty_admin/assignment.json b/keystone-moon/etc/policies/policy_empty_admin/assignment.json deleted file mode 100644 index 24018a09..00000000 --- a/keystone-moon/etc/policies/policy_empty_admin/assignment.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "subject_assignments": {}, - - "action_assignments": {}, - - "object_assignments": {} -} diff --git a/keystone-moon/etc/policies/policy_empty_admin/metadata.json b/keystone-moon/etc/policies/policy_empty_admin/metadata.json deleted file mode 100644 index 3c9be2e5..00000000 --- a/keystone-moon/etc/policies/policy_empty_admin/metadata.json +++ /dev/null @@ -1,12 +0,0 @@ -{ - "name": "Empty_Policy", - "model": "", - "genre": "admin", - "description": "Empty Policy", - - "subject_categories": [], - - "action_categories": [], - - "object_categories": [] -} diff --git a/keystone-moon/etc/policies/policy_empty_admin/metarule.json b/keystone-moon/etc/policies/policy_empty_admin/metarule.json deleted file mode 100644 index 7acd8848..00000000 --- a/keystone-moon/etc/policies/policy_empty_admin/metarule.json +++ /dev/null @@ -1,12 +0,0 @@ -{ - "sub_meta_rules": { - "mls_rule": { - "subject_categories": [], - "action_categories": [], - "object_categories": [], - "algorithm": "" - } - }, - "aggregation": "" -} - diff --git a/keystone-moon/etc/policies/policy_empty_admin/perimeter.json b/keystone-moon/etc/policies/policy_empty_admin/perimeter.json deleted file mode 100644 index 54dbfc31..00000000 --- a/keystone-moon/etc/policies/policy_empty_admin/perimeter.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "subjects": [], - "actions": [ - "read", - "write" - ], - "objects": [ - "authz.subjects", - "authz.objects", - "authz.actions", - "authz.subject_categories", - "authz.object_categories", - "authz.action_categories", - "authz.subject_scopes", - "authz.object_scopes", - "authz.action_scopes", - "authz.subject_assignments", - "authz.object_assignments", - "authz.action_assignments", - "authz.aggregation_algorithm", - "authz.sub_meta_rules", - "authz.rules", - "admin.subjects", - "admin.objects", - "admin.actions", - "admin.subject_categories", - "admin.object_categories", - "admin.action_categories", - "admin.subject_scopes", - "admin.object_scopes", - "admin.action_scopes", - "admin.subject_assignments", - "admin.object_assignments", - "admin.action_assignments", - "admin.aggregation_algorithm", - "admin.sub_meta_rules", - "admin.rules" - ] -} diff --git a/keystone-moon/etc/policies/policy_empty_admin/rule.json b/keystone-moon/etc/policies/policy_empty_admin/rule.json deleted file mode 100644 index fe4fae5a..00000000 --- a/keystone-moon/etc/policies/policy_empty_admin/rule.json +++ /dev/null @@ -1,3 +0,0 @@ -{ - "mls_rule":[] -} diff --git a/keystone-moon/etc/policies/policy_empty_admin/scope.json b/keystone-moon/etc/policies/policy_empty_admin/scope.json deleted file mode 100644 index 1efebe6f..00000000 --- a/keystone-moon/etc/policies/policy_empty_admin/scope.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "subject_scopes": {}, - - "action_scopes": {}, - - "object_scopes": {} -} diff --git a/keystone-moon/etc/policies/policy_empty_authz/assignment.json b/keystone-moon/etc/policies/policy_empty_authz/assignment.json deleted file mode 100644 index 24018a09..00000000 --- a/keystone-moon/etc/policies/policy_empty_authz/assignment.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "subject_assignments": {}, - - "action_assignments": {}, - - "object_assignments": {} -} diff --git a/keystone-moon/etc/policies/policy_empty_authz/metadata.json b/keystone-moon/etc/policies/policy_empty_authz/metadata.json deleted file mode 100644 index 4f300d78..00000000 --- a/keystone-moon/etc/policies/policy_empty_authz/metadata.json +++ /dev/null @@ -1,12 +0,0 @@ -{ - "name": "MLS_Policy", - "model": "MLS", - "genre": "authz", - "description": "Multi Level Security Policy", - - "subject_categories": [], - - "action_categories": [], - - "object_categories": [] -} diff --git a/keystone-moon/etc/policies/policy_empty_authz/metarule.json b/keystone-moon/etc/policies/policy_empty_authz/metarule.json deleted file mode 100644 index 7acd8848..00000000 --- a/keystone-moon/etc/policies/policy_empty_authz/metarule.json +++ /dev/null @@ -1,12 +0,0 @@ -{ - "sub_meta_rules": { - "mls_rule": { - "subject_categories": [], - "action_categories": [], - "object_categories": [], - "algorithm": "" - } - }, - "aggregation": "" -} - diff --git a/keystone-moon/etc/policies/policy_empty_authz/perimeter.json b/keystone-moon/etc/policies/policy_empty_authz/perimeter.json deleted file mode 100644 index 9da8a8c0..00000000 --- a/keystone-moon/etc/policies/policy_empty_authz/perimeter.json +++ /dev/null @@ -1,5 +0,0 @@ -{ - "subjects": [], - "actions": [], - "objects": [] -} diff --git a/keystone-moon/etc/policies/policy_empty_authz/rule.json b/keystone-moon/etc/policies/policy_empty_authz/rule.json deleted file mode 100644 index fe4fae5a..00000000 --- a/keystone-moon/etc/policies/policy_empty_authz/rule.json +++ /dev/null @@ -1,3 +0,0 @@ -{ - "mls_rule":[] -} diff --git a/keystone-moon/etc/policies/policy_empty_authz/scope.json b/keystone-moon/etc/policies/policy_empty_authz/scope.json deleted file mode 100644 index 1efebe6f..00000000 --- a/keystone-moon/etc/policies/policy_empty_authz/scope.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "subject_scopes": {}, - - "action_scopes": {}, - - "object_scopes": {} -} diff --git a/keystone-moon/etc/policies/policy_mls_authz/assignment.json b/keystone-moon/etc/policies/policy_mls_authz/assignment.json deleted file mode 100644 index 0712dfbc..00000000 --- a/keystone-moon/etc/policies/policy_mls_authz/assignment.json +++ /dev/null @@ -1,29 +0,0 @@ -{ - "subject_assignments": { - "subject_security_level":{ - "admin": ["high"], - "demo": ["medium"] - } - }, - - "action_assignments": { - "resource_action":{ - "pause": ["vm_admin"], - "unpause": ["vm_admin"], - "start": ["vm_admin"], - "stop": ["vm_admin"], - "list": ["vm_access", "vm_admin"], - "create": ["vm_admin"], - "storage_list": ["storage_access"], - "download": ["storage_access"], - "post": ["storage_admin"], - "upload": ["storage_admin"] - } - }, - - "object_assignments": { - "object_security_level": { - "servers": ["low"] - } - } -} diff --git a/keystone-moon/etc/policies/policy_mls_authz/metadata.json b/keystone-moon/etc/policies/policy_mls_authz/metadata.json deleted file mode 100644 index c419c815..00000000 --- a/keystone-moon/etc/policies/policy_mls_authz/metadata.json +++ /dev/null @@ -1,18 +0,0 @@ -{ - "name": "MLS_Policy", - "model": "MLS", - "genre": "authz", - "description": "Multi Level Security Policy", - - "subject_categories": [ - "subject_security_level" - ], - - "action_categories": [ - "resource_action" - ], - - "object_categories": [ - "object_security_level" - ] -} diff --git a/keystone-moon/etc/policies/policy_mls_authz/metarule.json b/keystone-moon/etc/policies/policy_mls_authz/metarule.json deleted file mode 100644 index e068927c..00000000 --- a/keystone-moon/etc/policies/policy_mls_authz/metarule.json +++ /dev/null @@ -1,12 +0,0 @@ -{ - "sub_meta_rules": { - "mls_rule": { - "subject_categories": ["subject_security_level"], - "action_categories": ["resource_action"], - "object_categories": ["object_security_level"], - "algorithm": "inclusion" - } - }, - "aggregation": "all_true" -} - diff --git a/keystone-moon/etc/policies/policy_mls_authz/perimeter.json b/keystone-moon/etc/policies/policy_mls_authz/perimeter.json deleted file mode 100644 index 47a8ee45..00000000 --- a/keystone-moon/etc/policies/policy_mls_authz/perimeter.json +++ /dev/null @@ -1,21 +0,0 @@ -{ - "subjects": [ - "admin", - "demo" - ], - "actions": [ - "pause", - "unpause", - "start", - "stop", - "create", - "list", - "upload", - "download", - "post", - "storage_list" - ], - "objects": [ - "servers" - ] -} diff --git a/keystone-moon/etc/policies/policy_mls_authz/rule.json b/keystone-moon/etc/policies/policy_mls_authz/rule.json deleted file mode 100644 index b17dc822..00000000 --- a/keystone-moon/etc/policies/policy_mls_authz/rule.json +++ /dev/null @@ -1,16 +0,0 @@ -{ - "mls_rule":[ - ["high", "vm_admin", "medium"], - ["high", "vm_admin", "low"], - ["medium", "vm_admin", "low"], - ["high", "vm_access", "medium"], - ["high", "vm_access", "low"], - ["medium", "vm_access", "low"], - ["high", "storage_admin", "medium"], - ["high", "storage_admin", "low"], - ["medium", "storage_admin", "low"], - ["high", "storage_access", "medium"], - ["high", "storage_access", "low"], - ["medium", "storage_access", "low"] - ] -} diff --git a/keystone-moon/etc/policies/policy_mls_authz/scope.json b/keystone-moon/etc/policies/policy_mls_authz/scope.json deleted file mode 100644 index 6cc1c28e..00000000 --- a/keystone-moon/etc/policies/policy_mls_authz/scope.json +++ /dev/null @@ -1,26 +0,0 @@ -{ - "subject_scopes": { - "subject_security_level": [ - "high", - "medium", - "low" - ] - }, - - "action_scopes": { - "resource_action": [ - "vm_admin", - "vm_access", - "storage_admin", - "storage_access" - ] - }, - - "object_scopes": { - "object_security_level": [ - "high", - "medium", - "low" - ] - } -} diff --git a/keystone-moon/etc/policies/policy_rbac_admin/assignment.json b/keystone-moon/etc/policies/policy_rbac_admin/assignment.json deleted file mode 100644 index f2378333..00000000 --- a/keystone-moon/etc/policies/policy_rbac_admin/assignment.json +++ /dev/null @@ -1,48 +0,0 @@ -{ - "subject_assignments": { - "role": { - "admin": ["root_role"], - "demo": ["dev_role"] - } - }, - "action_assignments": { - "action_id": { - "read": ["read"], - "write": ["write"] - } - }, - "object_assignments": { - "object_id": { - "authz.subjects": ["authz.subjects"], - "authz.objects": ["authz.objects"], - "authz.actions": ["authz.actions"], - "authz.subject_categories": ["authz.subject_categories"], - "authz.object_categories": ["authz.object_categories"], - "authz.action_categories": ["authz.action_categories"], - "authz.subject_scopes": ["authz.subject_scopes"], - "authz.object_scopes": ["authz.object_scopes"], - "authz.action_scopes": ["authz.action_scopes"], - "authz.subject_assignments": ["authz.subject_assignments"], - "authz.object_assignments": ["authz.object_assignments"], - "authz.action_assignments": ["authz.action_assignments"], - "authz.aggregation_algorithm": ["authz.aggregation_algorithm"], - "authz.sub_meta_rules": ["authz.sub_meta_rules"], - "authz.rules": ["authz.rules"], - "admin.subjects": ["admin.subjects"], - "admin.objects": ["admin.objects"], - "admin.actions": ["admin.actions"], - "admin.subject_categories": ["admin.subject_categories"], - "admin.object_categories": ["admin.object_categories"], - "admin.action_categories": ["admin.action_categories"], - "admin.subject_scopes": ["admin.subject_scopes"], - "admin.object_scopes": ["admin.object_scopes"], - "admin.action_scopes": ["admin.action_scopes"], - "admin.subject_assignments": ["admin.subject_assignments"], - "admin.object_assignments": ["admin.object_assignments"], - "admin.action_assignments": ["admin.action_assignments"], - "admin.aggregation_algorithm": ["admin.aggregation_algorithm"], - "admin.sub_meta_rules": ["admin.sub_meta_rules"], - "admin.rules": ["admin.rules"] - } - } -} diff --git a/keystone-moon/etc/policies/policy_rbac_admin/metadata.json b/keystone-moon/etc/policies/policy_rbac_admin/metadata.json deleted file mode 100644 index 9ee8a11d..00000000 --- a/keystone-moon/etc/policies/policy_rbac_admin/metadata.json +++ /dev/null @@ -1,18 +0,0 @@ -{ - "name": "RBAC Admin Policy", - "model": "RBAC", - "genre": "admin", - "description": "", - - "subject_categories": [ - "role" - ], - - "action_categories": [ - "action_id" - ], - - "object_categories": [ - "object_id" - ] -} diff --git a/keystone-moon/etc/policies/policy_rbac_admin/metarule.json b/keystone-moon/etc/policies/policy_rbac_admin/metarule.json deleted file mode 100644 index 86dbfad2..00000000 --- a/keystone-moon/etc/policies/policy_rbac_admin/metarule.json +++ /dev/null @@ -1,12 +0,0 @@ -{ - "sub_meta_rules": { - "rbac_rule": { - "subject_categories": ["role"], - "action_categories": ["action_id"], - "object_categories": ["object_id"], - "algorithm": "inclusion" - } - }, - "aggregation": "all_true" -} - diff --git a/keystone-moon/etc/policies/policy_rbac_admin/perimeter.json b/keystone-moon/etc/policies/policy_rbac_admin/perimeter.json deleted file mode 100644 index 1155533e..00000000 --- a/keystone-moon/etc/policies/policy_rbac_admin/perimeter.json +++ /dev/null @@ -1,42 +0,0 @@ -{ - "subjects": [ - "admin", - "demo" - ], - "actions": [ - "read", - "write" - ], - "objects": [ - "authz.subjects", - "authz.objects", - "authz.actions", - "authz.subject_categories", - "authz.object_categories", - "authz.action_categories", - "authz.subject_scopes", - "authz.object_scopes", - "authz.action_scopes", - "authz.subject_assignments", - "authz.object_assignments", - "authz.action_assignments", - "authz.aggregation_algorithm", - "authz.sub_meta_rules", - "authz.rules", - "admin.subjects", - "admin.objects", - "admin.actions", - "admin.subject_categories", - "admin.object_categories", - "admin.action_categories", - "admin.subject_scopes", - "admin.object_scopes", - "admin.action_scopes", - "admin.subject_assignments", - "admin.object_assignments", - "admin.action_assignments", - "admin.aggregation_algorithm", - "admin.sub_meta_rules", - "admin.rules" - ] -} diff --git a/keystone-moon/etc/policies/policy_rbac_admin/rule.json b/keystone-moon/etc/policies/policy_rbac_admin/rule.json deleted file mode 100644 index c89ceff3..00000000 --- a/keystone-moon/etc/policies/policy_rbac_admin/rule.json +++ /dev/null @@ -1,94 +0,0 @@ -{ - "rbac_rule":[ - ["root_role" , "read", "authz.subjects"], - ["root_role" , "read", "authz.objects"], - ["root_role" , "read", "authz.actions"], - ["root_role" , "read", "authz.subject_categories"], - ["root_role" , "read", "authz.object_categories"], - ["root_role" , "read", "authz.action_categories"], - ["root_role" , "read", "authz.subject_scopes"], - ["root_role" , "read", "authz.object_scopes"], - ["root_role" , "read", "authz.action_scopes"], - ["root_role" , "read", "authz.subject_assignments"], - ["root_role" , "read", "authz.object_assignments"], - ["root_role" , "read", "authz.action_assignments"], - ["root_role" , "read", "authz.aggregation_algorithm"], - ["root_role" , "read", "authz.sub_meta_rules"], - ["root_role" , "read", "authz.rules"], - ["root_role" , "write", "authz.subjects"], - ["root_role" , "write", "authz.objects"], - ["root_role" , "write", "authz.actions"], - ["root_role" , "write", "authz.subject_categories"], - ["root_role" , "write", "authz.object_categories"], - ["root_role" , "write", "authz.action_categories"], - ["root_role" , "write", "authz.subject_scopes"], - ["root_role" , "write", "authz.object_scopes"], - ["root_role" , "write", "authz.action_scopes"], - ["root_role" , "write", "authz.subject_assignments"], - ["root_role" , "write", "authz.object_assignments"], - ["root_role" , "write", "authz.action_assignments"], - ["root_role" , "write", "authz.aggregation_algorithm"], - ["root_role" , "write", "authz.sub_meta_rules"], - ["root_role" , "write", "authz.rules"], - ["root_role" , "read", "admin.subjects"], - ["root_role" , "read", "admin.objects"], - ["root_role" , "read", "admin.actions"], - ["root_role" , "read", "admin.subject_categories"], - ["root_role" , "read", "admin.object_categories"], - ["root_role" , "read", "admin.action_categories"], - ["root_role" , "read", "admin.subject_scopes"], - ["root_role" , "read", "admin.object_scopes"], - ["root_role" , "read", "admin.action_scopes"], - ["root_role" , "read", "admin.subject_assignments"], - ["root_role" , "read", "admin.object_assignments"], - ["root_role" , "read", "admin.action_assignments"], - ["root_role" , "read", "admin.aggregation_algorithm"], - ["root_role" , "read", "admin.sub_meta_rules"], - ["root_role" , "read", "admin.rules"], - ["root_role" , "write", "admin.subjects"], - ["root_role" , "write", "admin.objects"], - ["root_role" , "write", "admin.actions"], - ["root_role" , "write", "admin.subject_categories"], - ["root_role" , "write", "admin.object_categories"], - ["root_role" , "write", "admin.action_categories"], - ["root_role" , "write", "admin.subject_scopes"], - ["root_role" , "write", "admin.object_scopes"], - ["root_role" , "write", "admin.action_scopes"], - ["root_role" , "write", "admin.subject_assignments"], - ["root_role" , "write", "admin.object_assignments"], - ["root_role" , "write", "admin.action_assignments"], - ["root_role" , "write", "admin.aggregation_algorithm"], - ["root_role" , "write", "admin.sub_meta_rules"], - ["root_role" , "write", "admin.rules"], - ["dev_role" , "read", "authz.subjects"], - ["dev_role" , "read", "authz.objects"], - ["dev_role" , "read", "authz.actions"], - ["dev_role" , "read", "authz.subject_categories"], - ["dev_role" , "read", "authz.object_categories"], - ["dev_role" , "read", "authz.action_categories"], - ["dev_role" , "read", "authz.subject_scopes"], - ["dev_role" , "read", "authz.object_scopes"], - ["dev_role" , "read", "authz.action_scopes"], - ["dev_role" , "read", "authz.subject_assignments"], - ["dev_role" , "read", "authz.object_assignments"], - ["dev_role" , "read", "authz.action_assignments"], - ["dev_role" , "read", "authz.aggregation_algorithm"], - ["dev_role" , "read", "authz.sub_meta_rules"], - ["dev_role" , "read", "authz.rules"], - ["dev_role" , "read", "admin.subjects"], - ["dev_role" , "read", "admin.objects"], - ["dev_role" , "read", "admin.actions"], - ["dev_role" , "read", "admin.subject_categories"], - ["dev_role" , "read", "admin.object_categories"], - ["dev_role" , "read", "admin.action_categories"], - ["dev_role" , "read", "admin.subject_scopes"], - ["dev_role" , "read", "admin.object_scopes"], - ["dev_role" , "read", "admin.action_scopes"], - ["dev_role" , "read", "admin.subject_assignments"], - ["dev_role" , "read", "admin.object_assignments"], - ["dev_role" , "read", "admin.action_assignments"], - ["dev_role" , "read", "admin.aggregation_algorithm"], - ["dev_role" , "read", "admin.sub_meta_rules"], - ["dev_role" , "read", "admin.rules"] - ] -} diff --git a/keystone-moon/etc/policies/policy_rbac_admin/scope.json b/keystone-moon/etc/policies/policy_rbac_admin/scope.json deleted file mode 100644 index 149056a6..00000000 --- a/keystone-moon/etc/policies/policy_rbac_admin/scope.json +++ /dev/null @@ -1,48 +0,0 @@ -{ - "subject_scopes": { - "role": [ - "root_role", - "dev_role" - ] - }, - "action_scopes": { - "action_id": [ - "read", - "write" - ] - }, - "object_scopes": { - "object_id": [ - "authz.subjects", - "authz.objects", - "authz.actions", - "authz.subject_categories", - "authz.object_categories", - "authz.action_categories", - "authz.subject_scopes", - "authz.object_scopes", - "authz.action_scopes", - "authz.subject_assignments", - "authz.object_assignments", - "authz.action_assignments", - "authz.aggregation_algorithm", - "authz.sub_meta_rules", - "authz.rules", - "admin.subjects", - "admin.objects", - "admin.actions", - "admin.subject_categories", - "admin.object_categories", - "admin.action_categories", - "admin.subject_scopes", - "admin.object_scopes", - "admin.action_scopes", - "admin.subject_assignments", - "admin.object_assignments", - "admin.action_assignments", - "admin.aggregation_algorithm", - "admin.sub_meta_rules", - "admin.rules" - ] - } -} diff --git a/keystone-moon/etc/policies/policy_root/assignment.json b/keystone-moon/etc/policies/policy_root/assignment.json deleted file mode 100644 index e849ae13..00000000 --- a/keystone-moon/etc/policies/policy_root/assignment.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "subject_assignments": { - "role": { - "admin": ["root_role"] - } - }, - - "action_assignments": { - "action_id": { - "read": ["read"], - "write": ["write"] - } - }, - - "object_assignments": { - "object_id": { - "templates": ["templates"], - "sub_meta_rule_algorithms": ["sub_meta_rule_algorithms"], - "aggregation_algorithms": ["aggregation_algorithms"], - "tenants": ["tenants"], - "intra_extensions": ["intra_extensions"], - "admin.subjects": ["admin.subjects"], - "admin.objects": ["admin.objects"], - "admin.actions": ["admin.actions"], - "admin.subject_categories": ["admin.subject_categories"], - "admin.object_categories": ["admin.object_categories"], - "admin.action_categories": ["admin.action_categories"], - "admin.subject_category_scopes": ["admin.subject_category_scopes"], - "admin.object_category_scopes": ["admin.object_category_scopes"], - "admin.action_category_scopes": ["admin.action_category_scopes"], - "admin.subject_assignments": ["admin.subject_assignments"], - "admin.object_assignments": ["admin.object_assignments"], - "admin.action_assignments": ["admin.action_assignments"], - "admin.aggregation_algorithm": ["admin.aggregation_algorithm"], - "admin.sub_meta_rules": ["admin.sub_meta_rules"], - "admin.rules": ["admin.rules"] - } - } -} diff --git a/keystone-moon/etc/policies/policy_root/metadata.json b/keystone-moon/etc/policies/policy_root/metadata.json deleted file mode 100644 index 3e4b0f28..00000000 --- a/keystone-moon/etc/policies/policy_root/metadata.json +++ /dev/null @@ -1,18 +0,0 @@ -{ - "name": "Root Policy", - "model": "RBAC", - "genre": "admin", - "description": "root extension", - - "subject_categories": [ - "role" - ], - - "action_categories": [ - "action_id" - ], - - "object_categories": [ - "object_id" - ] -} diff --git a/keystone-moon/etc/policies/policy_root/metarule.json b/keystone-moon/etc/policies/policy_root/metarule.json deleted file mode 100644 index 86dbfad2..00000000 --- a/keystone-moon/etc/policies/policy_root/metarule.json +++ /dev/null @@ -1,12 +0,0 @@ -{ - "sub_meta_rules": { - "rbac_rule": { - "subject_categories": ["role"], - "action_categories": ["action_id"], - "object_categories": ["object_id"], - "algorithm": "inclusion" - } - }, - "aggregation": "all_true" -} - diff --git a/keystone-moon/etc/policies/policy_root/perimeter.json b/keystone-moon/etc/policies/policy_root/perimeter.json deleted file mode 100644 index 788a27f2..00000000 --- a/keystone-moon/etc/policies/policy_root/perimeter.json +++ /dev/null @@ -1,31 +0,0 @@ -{ - "subjects": [ - "admin" - ], - "actions": [ - "read", - "write" - ], - "objects": [ - "templates", - "aggregation_algorithms", - "sub_meta_rule_algorithms", - "tenants", - "intra_extensions", - "admin.subjects", - "admin.objects", - "admin.actions", - "admin.subject_categories", - "admin.object_categories", - "admin.action_categories", - "admin.subject_category_scopes", - "admin.object_category_scopes", - "admin.action_category_scopes", - "admin.subject_assignments", - "admin.object_assignments", - "admin.action_assignments", - "admin.aggregation_algorithm", - "admin.sub_meta_rules", - "admin.rules" - ] -} diff --git a/keystone-moon/etc/policies/policy_root/rule.json b/keystone-moon/etc/policies/policy_root/rule.json deleted file mode 100644 index 9bbd5e4c..00000000 --- a/keystone-moon/etc/policies/policy_root/rule.json +++ /dev/null @@ -1,44 +0,0 @@ -{ - "rbac_rule":[ - ["root_role" , "read", "templates"], - ["root_role" , "read", "aggregation_algorithms"], - ["root_role" , "read", "sub_meta_rule_algorithms"], - ["root_role" , "read", "tenants"], - ["root_role" , "read", "intra_extensions"], - ["root_role" , "write", "templates"], - ["root_role" , "write", "aggregation_algorithms"], - ["root_role" , "write", "sub_meta_rule_algorithms"], - ["root_role" , "write", "tenants"], - ["root_role" , "write", "intra_extensions"], - ["root_role" , "read", "admin.subjects"], - ["root_role" , "read", "admin.objects"], - ["root_role" , "read", "admin.actions"], - ["root_role" , "read", "admin.subject_categories"], - ["root_role" , "read", "admin.object_categories"], - ["root_role" , "read", "admin.action_categories"], - ["root_role" , "read", "admin.subject_category_scopes"], - ["root_role" , "read", "admin.object_category_scopes"], - ["root_role" , "read", "admin.action_category_scopes"], - ["root_role" , "read", "admin.subject_assignments"], - ["root_role" , "read", "admin.object_assignments"], - ["root_role" , "read", "admin.action_assignments"], - ["root_role" , "read", "admin.aggregation_algorithm"], - ["root_role" , "read", "admin.sub_meta_rules"], - ["root_role" , "read", "admin.rules"], - ["root_role" , "write", "admin.subjects"], - ["root_role" , "write", "admin.objects"], - ["root_role" , "write", "admin.actions"], - ["root_role" , "write", "admin.subject_categories"], - ["root_role" , "write", "admin.object_categories"], - ["root_role" , "write", "admin.action_categories"], - ["root_role" , "write", "admin.subject_category_scopes"], - ["root_role" , "write", "admin.object_category_scopes"], - ["root_role" , "write", "admin.action_category_scopes"], - ["root_role" , "write", "admin.subject_assignments"], - ["root_role" , "write", "admin.object_assignments"], - ["root_role" , "write", "admin.action_assignments"], - ["root_role" , "write", "admin.aggregation_algorithm"], - ["root_role" , "write", "admin.sub_meta_rules"], - ["root_role" , "write", "admin.rules"] - ] -} diff --git a/keystone-moon/etc/policies/policy_root/scope.json b/keystone-moon/etc/policies/policy_root/scope.json deleted file mode 100644 index 43f9ced8..00000000 --- a/keystone-moon/etc/policies/policy_root/scope.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "subject_scopes": { - "role": [ - "root_role" - ] - }, - - "action_scopes": { - "action_id": [ - "read", - "write" - ] - }, - - "object_scopes": { - "object_id": [ - "templates", - "aggregation_algorithms", - "sub_meta_rule_algorithms", - "tenants", - "intra_extensions", - "admin.subjects", - "admin.objects", - "admin.actions", - "admin.subject_categories", - "admin.object_categories", - "admin.action_categories", - "admin.subject_category_scopes", - "admin.object_category_scopes", - "admin.action_category_scopes", - "admin.subject_assignments", - "admin.object_assignments", - "admin.action_assignments", - "admin.aggregation_algorithm", - "admin.sub_meta_rules", - "admin.rules" - ] - } -} diff --git a/keystone-moon/etc/policy.json b/keystone-moon/etc/policy.json deleted file mode 100644 index 797af24d..00000000 --- a/keystone-moon/etc/policy.json +++ /dev/null @@ -1,198 +0,0 @@ -{ - "admin_required": "role:admin or is_admin:1", - "service_role": "role:service", - "service_or_admin": "rule:admin_required or rule:service_role", - "owner" : "user_id:%(user_id)s", - "admin_or_owner": "rule:admin_required or rule:owner", - "token_subject": "user_id:%(target.token.user_id)s", - "admin_or_token_subject": "rule:admin_required or rule:token_subject", - "service_admin_or_token_subject": "rule:service_or_admin or rule:token_subject", - - "default": "rule:admin_required", - - "identity:get_region": "", - "identity:list_regions": "", - "identity:create_region": "rule:admin_required", - "identity:update_region": "rule:admin_required", - "identity:delete_region": "rule:admin_required", - - "identity:get_service": "rule:admin_required", - "identity:list_services": "rule:admin_required", - "identity:create_service": "rule:admin_required", - "identity:update_service": "rule:admin_required", - "identity:delete_service": "rule:admin_required", - - "identity:get_endpoint": "rule:admin_required", - "identity:list_endpoints": "rule:admin_required", - "identity:create_endpoint": "rule:admin_required", - "identity:update_endpoint": "rule:admin_required", - "identity:delete_endpoint": "rule:admin_required", - - "identity:get_domain": "rule:admin_required", - "identity:list_domains": "rule:admin_required", - "identity:create_domain": "rule:admin_required", - "identity:update_domain": "rule:admin_required", - "identity:delete_domain": "rule:admin_required", - - "identity:get_project": "rule:admin_required or project_id:%(target.project.id)s", - "identity:list_projects": "rule:admin_required", - "identity:list_user_projects": "rule:admin_or_owner", - "identity:create_project": "rule:admin_required", - "identity:update_project": "rule:admin_required", - "identity:delete_project": "rule:admin_required", - - "identity:get_user": "rule:admin_required", - "identity:list_users": "rule:admin_required", - "identity:create_user": "rule:admin_required", - "identity:update_user": "rule:admin_required", - "identity:delete_user": "rule:admin_required", - "identity:change_password": "rule:admin_or_owner", - - "identity:get_group": "rule:admin_required", - "identity:list_groups": "rule:admin_required", - "identity:list_groups_for_user": "rule:admin_or_owner", - "identity:create_group": "rule:admin_required", - "identity:update_group": "rule:admin_required", - "identity:delete_group": "rule:admin_required", - "identity:list_users_in_group": "rule:admin_required", - "identity:remove_user_from_group": "rule:admin_required", - "identity:check_user_in_group": "rule:admin_required", - "identity:add_user_to_group": "rule:admin_required", - - "identity:get_credential": "rule:admin_required", - "identity:list_credentials": "rule:admin_required", - "identity:create_credential": "rule:admin_required", - "identity:update_credential": "rule:admin_required", - "identity:delete_credential": "rule:admin_required", - - "identity:ec2_get_credential": "rule:admin_required or (rule:owner and user_id:%(target.credential.user_id)s)", - "identity:ec2_list_credentials": "rule:admin_or_owner", - "identity:ec2_create_credential": "rule:admin_or_owner", - "identity:ec2_delete_credential": "rule:admin_required or (rule:owner and user_id:%(target.credential.user_id)s)", - - "identity:get_role": "rule:admin_required", - "identity:list_roles": "rule:admin_required", - "identity:create_role": "rule:admin_required", - "identity:update_role": "rule:admin_required", - "identity:delete_role": "rule:admin_required", - "identity:get_domain_role": "rule:admin_required", - "identity:list_domain_roles": "rule:admin_required", - "identity:create_domain_role": "rule:admin_required", - "identity:update_domain_role": "rule:admin_required", - "identity:delete_domain_role": "rule:admin_required", - - "identity:get_implied_role": "rule:admin_required ", - "identity:list_implied_roles": "rule:admin_required", - "identity:create_implied_role": "rule:admin_required", - "identity:delete_implied_role": "rule:admin_required", - "identity:list_role_inference_rules": "rule:admin_required", - "identity:check_implied_role": "rule:admin_required", - - "identity:check_grant": "rule:admin_required", - "identity:list_grants": "rule:admin_required", - "identity:create_grant": "rule:admin_required", - "identity:revoke_grant": "rule:admin_required", - - "identity:list_role_assignments": "rule:admin_required", - "identity:list_role_assignments_for_tree": "rule:admin_required", - - "identity:get_policy": "rule:admin_required", - "identity:list_policies": "rule:admin_required", - "identity:create_policy": "rule:admin_required", - "identity:update_policy": "rule:admin_required", - "identity:delete_policy": "rule:admin_required", - - "identity:check_token": "rule:admin_or_token_subject", - "identity:validate_token": "rule:service_admin_or_token_subject", - "identity:validate_token_head": "rule:service_or_admin", - "identity:revocation_list": "rule:service_or_admin", - "identity:revoke_token": "rule:admin_or_token_subject", - - "identity:create_trust": "user_id:%(trust.trustor_user_id)s", - "identity:list_trusts": "", - "identity:list_roles_for_trust": "", - "identity:get_role_for_trust": "", - "identity:delete_trust": "", - - "identity:create_consumer": "rule:admin_required", - "identity:get_consumer": "rule:admin_required", - "identity:list_consumers": "rule:admin_required", - "identity:delete_consumer": "rule:admin_required", - "identity:update_consumer": "rule:admin_required", - - "identity:authorize_request_token": "rule:admin_required", - "identity:list_access_token_roles": "rule:admin_required", - "identity:get_access_token_role": "rule:admin_required", - "identity:list_access_tokens": "rule:admin_required", - "identity:get_access_token": "rule:admin_required", - "identity:delete_access_token": "rule:admin_required", - - "identity:list_projects_for_endpoint": "rule:admin_required", - "identity:add_endpoint_to_project": "rule:admin_required", - "identity:check_endpoint_in_project": "rule:admin_required", - "identity:list_endpoints_for_project": "rule:admin_required", - "identity:remove_endpoint_from_project": "rule:admin_required", - - "identity:create_endpoint_group": "rule:admin_required", - "identity:list_endpoint_groups": "rule:admin_required", - "identity:get_endpoint_group": "rule:admin_required", - "identity:update_endpoint_group": "rule:admin_required", - "identity:delete_endpoint_group": "rule:admin_required", - "identity:list_projects_associated_with_endpoint_group": "rule:admin_required", - "identity:list_endpoints_associated_with_endpoint_group": "rule:admin_required", - "identity:get_endpoint_group_in_project": "rule:admin_required", - "identity:list_endpoint_groups_for_project": "rule:admin_required", - "identity:add_endpoint_group_to_project": "rule:admin_required", - "identity:remove_endpoint_group_from_project": "rule:admin_required", - - "identity:create_identity_provider": "rule:admin_required", - "identity:list_identity_providers": "rule:admin_required", - "identity:get_identity_providers": "rule:admin_required", - "identity:update_identity_provider": "rule:admin_required", - "identity:delete_identity_provider": "rule:admin_required", - - "identity:create_protocol": "rule:admin_required", - "identity:update_protocol": "rule:admin_required", - "identity:get_protocol": "rule:admin_required", - "identity:list_protocols": "rule:admin_required", - "identity:delete_protocol": "rule:admin_required", - - "identity:create_mapping": "rule:admin_required", - "identity:get_mapping": "rule:admin_required", - "identity:list_mappings": "rule:admin_required", - "identity:delete_mapping": "rule:admin_required", - "identity:update_mapping": "rule:admin_required", - - "identity:create_service_provider": "rule:admin_required", - "identity:list_service_providers": "rule:admin_required", - "identity:get_service_provider": "rule:admin_required", - "identity:update_service_provider": "rule:admin_required", - "identity:delete_service_provider": "rule:admin_required", - - "identity:get_auth_catalog": "", - "identity:get_auth_projects": "", - "identity:get_auth_domains": "", - - "identity:list_projects_for_groups": "", - "identity:list_domains_for_groups": "", - - "identity:list_revoke_events": "", - - "identity:create_policy_association_for_endpoint": "rule:admin_required", - "identity:check_policy_association_for_endpoint": "rule:admin_required", - "identity:delete_policy_association_for_endpoint": "rule:admin_required", - "identity:create_policy_association_for_service": "rule:admin_required", - "identity:check_policy_association_for_service": "rule:admin_required", - "identity:delete_policy_association_for_service": "rule:admin_required", - "identity:create_policy_association_for_region_and_service": "rule:admin_required", - "identity:check_policy_association_for_region_and_service": "rule:admin_required", - "identity:delete_policy_association_for_region_and_service": "rule:admin_required", - "identity:get_policy_for_endpoint": "rule:admin_required", - "identity:list_endpoints_for_policy": "rule:admin_required", - - "identity:create_domain_config": "rule:admin_required", - "identity:get_domain_config": "rule:admin_required", - "identity:update_domain_config": "rule:admin_required", - "identity:delete_domain_config": "rule:admin_required", - "identity:get_domain_config_default": "rule:admin_required" -} diff --git a/keystone-moon/etc/policy.v3cloudsample.json b/keystone-moon/etc/policy.v3cloudsample.json deleted file mode 100644 index 4ec1aa95..00000000 --- a/keystone-moon/etc/policy.v3cloudsample.json +++ /dev/null @@ -1,223 +0,0 @@ -{ - "admin_required": "role:admin", - "cloud_admin": "role:admin and (token.is_admin_project:True or domain_id:admin_domain_id)", - "service_role": "role:service", - "service_or_admin": "rule:admin_required or rule:service_role", - "owner" : "user_id:%(user_id)s or user_id:%(target.token.user_id)s", - "admin_or_owner": "(rule:admin_required and domain_id:%(target.token.user.domain.id)s) or rule:owner", - "admin_and_matching_domain_id": "rule:admin_required and domain_id:%(domain_id)s", - "service_admin_or_owner": "rule:service_or_admin or rule:owner", - - "default": "rule:admin_required", - - "identity:get_region": "", - "identity:list_regions": "", - "identity:create_region": "rule:cloud_admin", - "identity:update_region": "rule:cloud_admin", - "identity:delete_region": "rule:cloud_admin", - - "identity:get_service": "rule:admin_required", - "identity:list_services": "rule:admin_required", - "identity:create_service": "rule:cloud_admin", - "identity:update_service": "rule:cloud_admin", - "identity:delete_service": "rule:cloud_admin", - - "identity:get_endpoint": "rule:admin_required", - "identity:list_endpoints": "rule:admin_required", - "identity:create_endpoint": "rule:cloud_admin", - "identity:update_endpoint": "rule:cloud_admin", - "identity:delete_endpoint": "rule:cloud_admin", - - "identity:get_domain": "rule:cloud_admin or rule:admin_and_matching_domain_id", - "identity:list_domains": "rule:cloud_admin", - "identity:create_domain": "rule:cloud_admin", - "identity:update_domain": "rule:cloud_admin", - "identity:delete_domain": "rule:cloud_admin", - - "admin_and_matching_target_project_domain_id": "rule:admin_required and domain_id:%(target.project.domain_id)s", - "admin_and_matching_project_domain_id": "rule:admin_required and domain_id:%(project.domain_id)s", - "identity:get_project": "rule:cloud_admin or rule:admin_and_matching_target_project_domain_id or project_id:%(target.project.id)s", - "identity:list_projects": "rule:cloud_admin or rule:admin_and_matching_domain_id", - "identity:list_user_projects": "rule:owner or rule:admin_and_matching_domain_id", - "identity:create_project": "rule:cloud_admin or rule:admin_and_matching_project_domain_id", - "identity:update_project": "rule:cloud_admin or rule:admin_and_matching_target_project_domain_id", - "identity:delete_project": "rule:cloud_admin or rule:admin_and_matching_target_project_domain_id", - - "admin_and_matching_target_user_domain_id": "rule:admin_required and domain_id:%(target.user.domain_id)s", - "admin_and_matching_user_domain_id": "rule:admin_required and domain_id:%(user.domain_id)s", - "identity:get_user": "rule:cloud_admin or rule:admin_and_matching_target_user_domain_id", - "identity:list_users": "rule:cloud_admin or rule:admin_and_matching_domain_id", - "identity:create_user": "rule:cloud_admin or rule:admin_and_matching_user_domain_id", - "identity:update_user": "rule:cloud_admin or rule:admin_and_matching_target_user_domain_id", - "identity:delete_user": "rule:cloud_admin or rule:admin_and_matching_target_user_domain_id", - - "admin_and_matching_target_group_domain_id": "rule:admin_required and domain_id:%(target.group.domain_id)s", - "admin_and_matching_group_domain_id": "rule:admin_required and domain_id:%(group.domain_id)s", - "identity:get_group": "rule:cloud_admin or rule:admin_and_matching_target_group_domain_id", - "identity:list_groups": "rule:cloud_admin or rule:admin_and_matching_domain_id", - "identity:list_groups_for_user": "rule:owner or rule:admin_and_matching_domain_id", - "identity:create_group": "rule:cloud_admin or rule:admin_and_matching_group_domain_id", - "identity:update_group": "rule:cloud_admin or rule:admin_and_matching_target_group_domain_id", - "identity:delete_group": "rule:cloud_admin or rule:admin_and_matching_target_group_domain_id", - "identity:list_users_in_group": "rule:cloud_admin or rule:admin_and_matching_target_group_domain_id", - "identity:remove_user_from_group": "rule:cloud_admin or rule:admin_and_matching_target_group_domain_id", - "identity:check_user_in_group": "rule:cloud_admin or rule:admin_and_matching_target_group_domain_id", - "identity:add_user_to_group": "rule:cloud_admin or rule:admin_and_matching_target_group_domain_id", - - "identity:get_credential": "rule:admin_required", - "identity:list_credentials": "rule:admin_required or user_id:%(user_id)s", - "identity:create_credential": "rule:admin_required", - "identity:update_credential": "rule:admin_required", - "identity:delete_credential": "rule:admin_required", - - "identity:ec2_get_credential": "rule:admin_required or (rule:owner and user_id:%(target.credential.user_id)s)", - "identity:ec2_list_credentials": "rule:admin_required or rule:owner", - "identity:ec2_create_credential": "rule:admin_required or rule:owner", - "identity:ec2_delete_credential": "rule:admin_required or (rule:owner and user_id:%(target.credential.user_id)s)", - - "identity:get_role": "rule:admin_required", - "identity:list_roles": "rule:admin_required", - "identity:create_role": "rule:cloud_admin", - "identity:update_role": "rule:cloud_admin", - "identity:delete_role": "rule:cloud_admin", - - "identity:get_domain_role": "rule:cloud_admin or rule:get_domain_roles", - "identity:list_domain_roles": "rule:cloud_admin or rule:list_domain_roles", - "identity:create_domain_role": "rule:cloud_admin or rule:domain_admin_matches_domain_role", - "identity:update_domain_role": "rule:cloud_admin or rule:domain_admin_matches_target_domain_role", - "identity:delete_domain_role": "rule:cloud_admin or rule:domain_admin_matches_target_domain_role", - "domain_admin_matches_domain_role": "rule:admin_required and domain_id:%(role.domain_id)s", - "get_domain_roles": "rule:domain_admin_matches_target_domain_role or rule:project_admin_matches_target_domain_role", - "domain_admin_matches_target_domain_role": "rule:admin_required and domain_id:%(target.role.domain_id)s", - "project_admin_matches_target_domain_role": "rule:admin_required and project_domain_id:%(target.role.domain_id)s", - "list_domain_roles": "rule:domain_admin_matches_filter_on_list_domain_roles or rule:project_admin_matches_filter_on_list_domain_roles", - "domain_admin_matches_filter_on_list_domain_roles": "rule:admin_required and domain_id:%(domain_id)s", - "project_admin_matches_filter_on_list_domain_roles": "rule:admin_required and project_domain_id:%(domain_id)s", - - "identity:get_implied_role": "rule:cloud_admin", - "identity:list_implied_roles": "rule:cloud_admin", - "identity:create_implied_role": "rule:cloud_admin", - "identity:delete_implied_role": "rule:cloud_admin", - "identity:list_role_inference_rules": "rule:cloud_admin", - "identity:check_implied_role": "rule:cloud_admin", - - "identity:check_grant": "rule:cloud_admin or rule:domain_admin_for_grants or rule:project_admin_for_grants", - "identity:list_grants": "rule:cloud_admin or rule:domain_admin_for_list_grants or rule:project_admin_for_list_grants", - "identity:create_grant": "rule:cloud_admin or rule:domain_admin_for_grants or rule:project_admin_for_grants", - "identity:revoke_grant": "rule:cloud_admin or rule:domain_admin_for_grants or rule:project_admin_for_grants", - "domain_admin_for_grants": "rule:domain_admin_for_global_role_grants or rule:domain_admin_for_domain_role_grants", - "domain_admin_for_global_role_grants": "rule:admin_required and None:%(target.role.domain_id)s and rule:domain_admin_grant_match", - "domain_admin_for_domain_role_grants": "rule:admin_required and domain_id:%(target.role.domain_id)s and rule:domain_admin_grant_match", - "domain_admin_grant_match": "domain_id:%(domain_id)s or domain_id:%(target.project.domain_id)s", - "project_admin_for_grants": "rule:project_admin_for_global_role_grants or rule:project_admin_for_domain_role_grants", - "project_admin_for_global_role_grants": "rule:admin_required and None:%(target.role.domain_id)s and project_id:%(project_id)s", - "project_admin_for_domain_role_grants": "rule:admin_required and project_domain_id:%(target.role.domain_id)s and project_id:%(project_id)s", - "domain_admin_for_list_grants": "rule:admin_required and rule:domain_admin_grant_match", - "project_admin_for_list_grants": "rule:admin_required and project_id:%(project_id)s", - - "admin_on_domain_filter" : "rule:admin_required and domain_id:%(scope.domain.id)s", - "admin_on_project_filter" : "rule:admin_required and project_id:%(scope.project.id)s", - "admin_on_domain_of_project_filter" : "rule:admin_required and domain_id:%(target.project.domain_id)s", - "identity:list_role_assignments": "rule:cloud_admin or rule:admin_on_domain_filter or rule:admin_on_project_filter", - "identity:list_role_assignments_for_tree": "rule:cloud_admin or rule:admin_on_domain_of_project_filter", - "identity:get_policy": "rule:cloud_admin", - "identity:list_policies": "rule:cloud_admin", - "identity:create_policy": "rule:cloud_admin", - "identity:update_policy": "rule:cloud_admin", - "identity:delete_policy": "rule:cloud_admin", - - "identity:change_password": "rule:owner", - "identity:check_token": "rule:admin_or_owner", - "identity:validate_token": "rule:service_admin_or_owner", - "identity:validate_token_head": "rule:service_or_admin", - "identity:revocation_list": "rule:service_or_admin", - "identity:revoke_token": "rule:admin_or_owner", - - "identity:create_trust": "user_id:%(trust.trustor_user_id)s", - "identity:list_trusts": "", - "identity:list_roles_for_trust": "", - "identity:get_role_for_trust": "", - "identity:delete_trust": "", - - "identity:create_consumer": "rule:admin_required", - "identity:get_consumer": "rule:admin_required", - "identity:list_consumers": "rule:admin_required", - "identity:delete_consumer": "rule:admin_required", - "identity:update_consumer": "rule:admin_required", - - "identity:authorize_request_token": "rule:admin_required", - "identity:list_access_token_roles": "rule:admin_required", - "identity:get_access_token_role": "rule:admin_required", - "identity:list_access_tokens": "rule:admin_required", - "identity:get_access_token": "rule:admin_required", - "identity:delete_access_token": "rule:admin_required", - - "identity:list_projects_for_endpoint": "rule:admin_required", - "identity:add_endpoint_to_project": "rule:admin_required", - "identity:check_endpoint_in_project": "rule:admin_required", - "identity:list_endpoints_for_project": "rule:admin_required", - "identity:remove_endpoint_from_project": "rule:admin_required", - - "identity:create_endpoint_group": "rule:admin_required", - "identity:list_endpoint_groups": "rule:admin_required", - "identity:get_endpoint_group": "rule:admin_required", - "identity:update_endpoint_group": "rule:admin_required", - "identity:delete_endpoint_group": "rule:admin_required", - "identity:list_projects_associated_with_endpoint_group": "rule:admin_required", - "identity:list_endpoints_associated_with_endpoint_group": "rule:admin_required", - "identity:get_endpoint_group_in_project": "rule:admin_required", - "identity:list_endpoint_groups_for_project": "rule:admin_required", - "identity:add_endpoint_group_to_project": "rule:admin_required", - "identity:remove_endpoint_group_from_project": "rule:admin_required", - - "identity:create_identity_provider": "rule:cloud_admin", - "identity:list_identity_providers": "rule:cloud_admin", - "identity:get_identity_providers": "rule:cloud_admin", - "identity:update_identity_provider": "rule:cloud_admin", - "identity:delete_identity_provider": "rule:cloud_admin", - - "identity:create_protocol": "rule:cloud_admin", - "identity:update_protocol": "rule:cloud_admin", - "identity:get_protocol": "rule:cloud_admin", - "identity:list_protocols": "rule:cloud_admin", - "identity:delete_protocol": "rule:cloud_admin", - - "identity:create_mapping": "rule:cloud_admin", - "identity:get_mapping": "rule:cloud_admin", - "identity:list_mappings": "rule:cloud_admin", - "identity:delete_mapping": "rule:cloud_admin", - "identity:update_mapping": "rule:cloud_admin", - - "identity:create_service_provider": "rule:cloud_admin", - "identity:list_service_providers": "rule:cloud_admin", - "identity:get_service_provider": "rule:cloud_admin", - "identity:update_service_provider": "rule:cloud_admin", - "identity:delete_service_provider": "rule:cloud_admin", - - "identity:get_auth_catalog": "", - "identity:get_auth_projects": "", - "identity:get_auth_domains": "", - - "identity:list_projects_for_groups": "", - "identity:list_domains_for_groups": "", - - "identity:list_revoke_events": "", - - "identity:create_policy_association_for_endpoint": "rule:cloud_admin", - "identity:check_policy_association_for_endpoint": "rule:cloud_admin", - "identity:delete_policy_association_for_endpoint": "rule:cloud_admin", - "identity:create_policy_association_for_service": "rule:cloud_admin", - "identity:check_policy_association_for_service": "rule:cloud_admin", - "identity:delete_policy_association_for_service": "rule:cloud_admin", - "identity:create_policy_association_for_region_and_service": "rule:cloud_admin", - "identity:check_policy_association_for_region_and_service": "rule:cloud_admin", - "identity:delete_policy_association_for_region_and_service": "rule:cloud_admin", - "identity:get_policy_for_endpoint": "rule:cloud_admin", - "identity:list_endpoints_for_policy": "rule:cloud_admin", - - "identity:create_domain_config": "rule:cloud_admin", - "identity:get_domain_config": "rule:cloud_admin", - "identity:update_domain_config": "rule:cloud_admin", - "identity:delete_domain_config": "rule:cloud_admin", - "identity:get_domain_config_default": "rule:cloud_admin" -} diff --git a/keystone-moon/etc/sso_callback_template.html b/keystone-moon/etc/sso_callback_template.html deleted file mode 100644 index c6997dc4..00000000 --- a/keystone-moon/etc/sso_callback_template.html +++ /dev/null @@ -1,22 +0,0 @@ - - - - Keystone WebSSO redirect - - -
- Please wait... -
- - -
- - - \ No newline at end of file -- cgit 1.2.3-korg