| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 1 | #!/bin/bash |
| 2 | |
| Eduardo Sousa | 3c76174 | 2019-02-05 16:19:31 +0000 | [diff] [blame] | 3 | # Copyright 2018 Whitestack, LLC |
| 4 | # |
| 5 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 6 | # not use this file except in compliance with the License. You may obtain |
| 7 | # a copy of the License at |
| 8 | # |
| 9 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 10 | # |
| 11 | # Unless required by applicable law or agreed to in writing, software |
| 12 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 13 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 14 | # License for the specific language governing permissions and limitations |
| 15 | # under the License. |
| 16 | # |
| 17 | # For those usages not covered by the Apache License, Version 2.0 please |
| 18 | # contact: esousa@whitestack.com or glavado@whitestack.com |
| 19 | ## |
| 20 | |
| vegall | 7badcae | 2024-07-02 15:30:30 +0000 | [diff] [blame] | 21 | set -e |
| 22 | |
| Eduardo Sousa | 07e8a24 | 2018-10-08 12:49:14 +0100 | [diff] [blame] | 23 | DB_EXISTS="" |
| sousaedu | 87c4085 | 2021-07-28 12:08:43 +0200 | [diff] [blame] | 24 | USER_DB_EXISTS="" |
| Eduardo Sousa | c50ed8f | 2019-04-08 17:17:54 +0100 | [diff] [blame] | 25 | DB_NOT_EMPTY="" |
| Eduardo Sousa | 07e8a24 | 2018-10-08 12:49:14 +0100 | [diff] [blame] | 26 | |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 27 | max_attempts=120 |
| 28 | function wait_db(){ |
| 29 | db_host=$1 |
| 30 | db_port=$2 |
| 31 | attempt=0 |
| 32 | echo "Wait until $max_attempts seconds for MySQL mano Server ${db_host}:${db_port} " |
| 33 | while ! mysqladmin ping -h"$db_host" -P"$db_port" --silent; do |
| 34 | #wait 120 sec |
| 35 | if [ $attempt -ge $max_attempts ]; then |
| 36 | echo |
| 37 | echo "Can not connect to database ${db_host}:${db_port} during $max_attempts sec" |
| 38 | return 1 |
| 39 | fi |
| 40 | attempt=$[$attempt+1] |
| 41 | echo -n "." |
| 42 | sleep 1 |
| 43 | done |
| 44 | return 0 |
| 45 | } |
| 46 | |
| David Garcia | 58b0e32 | 2020-03-02 14:17:26 +0100 | [diff] [blame] | 47 | function wait_keystone_host(){ |
| 48 | attempt=0 |
| 49 | timeout=2 |
| 50 | echo "Wait until Keystone hostname can be resolved " |
| 51 | while ! nslookup $KEYSTONE_HOST; do |
| 52 | #wait 120 sec |
| 53 | if [ $attempt -ge $max_attempts ]; then |
| 54 | echo |
| 55 | echo "Can not resolve ${KEYSTONE_HOST} during $max_attempts sec" |
| 56 | return 1 |
| 57 | fi |
| 58 | attempt=$[$attempt+1] |
| 59 | echo -n "." |
| 60 | sleep 1 |
| 61 | done |
| 62 | return 0 |
| 63 | } |
| 64 | |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 65 | function is_db_created() { |
| 66 | db_host=$1 |
| 67 | db_port=$2 |
| 68 | db_user=$3 |
| 69 | db_pswd=$4 |
| 70 | db_name=$5 |
| 71 | |
| Eduardo Sousa | 07e8a24 | 2018-10-08 12:49:14 +0100 | [diff] [blame] | 72 | if mysqlshow -h"$db_host" -P"$db_port" -u"$db_user" -p"$db_pswd" | grep -v Wildcard | grep -q $db_name; then |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 73 | echo "DB $db_name exists" |
| 74 | return 0 |
| 75 | else |
| 76 | echo "DB $db_name does not exist" |
| 77 | return 1 |
| 78 | fi |
| 79 | } |
| 80 | |
| sousaedu | 87c4085 | 2021-07-28 12:08:43 +0200 | [diff] [blame] | 81 | function is_user_db_created() { |
| 82 | db_host=$1 |
| 83 | db_port=$2 |
| 84 | db_user=$3 |
| 85 | db_pswd=$4 |
| 86 | db_user_to_check=$5 |
| 87 | |
| 88 | user_count=$(mysql -h"$db_host" -P"$db_port" -u"$db_user" -p"$db_pswd" --default_character_set utf8 -sse "SELECT COUNT(*) FROM mysql.user WHERE user='$db_user_to_check' AND host='%';") |
| 89 | |
| 90 | if [ $user_count -gt 0 ]; then |
| 91 | echo "DB User $db_name exists" |
| 92 | return 0 |
| 93 | else |
| sousaedu | 9d1d0c1 | 2022-01-21 14:01:53 +0000 | [diff] [blame] | 94 | echo "DB User $db_name does not exist" |
| sousaedu | 87c4085 | 2021-07-28 12:08:43 +0200 | [diff] [blame] | 95 | return 1 |
| 96 | fi |
| 97 | } |
| 98 | |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 99 | wait_db "$DB_HOST" "$DB_PORT" || exit 1 |
| 100 | |
| 101 | is_db_created "$DB_HOST" "$DB_PORT" "$ROOT_DB_USER" "$ROOT_DB_PASSWORD" "keystone" && DB_EXISTS="Y" |
| sousaedu | 87c4085 | 2021-07-28 12:08:43 +0200 | [diff] [blame] | 102 | is_user_db_created "$DB_HOST" "$DB_PORT" "$ROOT_DB_USER" "$ROOT_DB_PASSWORD" "keystone" && USER_DB_EXISTS="Y" |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 103 | |
| 104 | if [ -z $DB_EXISTS ]; then |
| 105 | mysql -h"$DB_HOST" -P"$DB_PORT" -u"$ROOT_DB_USER" -p"$ROOT_DB_PASSWORD" --default_character_set utf8 -e "CREATE DATABASE keystone" |
| Eduardo Sousa | c50ed8f | 2019-04-08 17:17:54 +0100 | [diff] [blame] | 106 | else |
| David Garcia | 58b0e32 | 2020-03-02 14:17:26 +0100 | [diff] [blame] | 107 | if [ $(mysql -h"$DB_HOST" -P"$DB_PORT" -u"$ROOT_DB_USER" -p"$ROOT_DB_PASSWORD" --default_character_set utf8 -sse "SELECT COUNT(*) FROM INFORMATION_SCHEMA.TABLES WHERE TABLE_SCHEMA = 'keystone';") -gt 0 ]; then |
| Eduardo Sousa | c50ed8f | 2019-04-08 17:17:54 +0100 | [diff] [blame] | 108 | echo "DB keystone is empty" |
| 109 | DB_NOT_EMPTY="y" |
| 110 | fi |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 111 | fi |
| 112 | |
| sousaedu | 87c4085 | 2021-07-28 12:08:43 +0200 | [diff] [blame] | 113 | if [ -z $USER_DB_EXISTS ]; then |
| garciadeblas | cca4b8e | 2023-10-10 11:45:57 +0200 | [diff] [blame] | 114 | mysql -h"$DB_HOST" -P"$DB_PORT" -u"$ROOT_DB_USER" -p"$ROOT_DB_PASSWORD" --default_character_set utf8 -e "CREATE USER 'keystone'@'localhost' IDENTIFIED BY '$KEYSTONE_DB_PASSWORD'" |
| 115 | mysql -h"$DB_HOST" -P"$DB_PORT" -u"$ROOT_DB_USER" -p"$ROOT_DB_PASSWORD" --default_character_set utf8 -e "GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'localhost'" |
| 116 | mysql -h"$DB_HOST" -P"$DB_PORT" -u"$ROOT_DB_USER" -p"$ROOT_DB_PASSWORD" --default_character_set utf8 -e "CREATE USER 'keystone'@'%' IDENTIFIED BY '$KEYSTONE_DB_PASSWORD'" |
| 117 | mysql -h"$DB_HOST" -P"$DB_PORT" -u"$ROOT_DB_USER" -p"$ROOT_DB_PASSWORD" --default_character_set utf8 -e "GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'%'" |
| sousaedu | 87c4085 | 2021-07-28 12:08:43 +0200 | [diff] [blame] | 118 | fi |
| 119 | |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 120 | # Setting Keystone database connection |
| David Garcia | 58b0e32 | 2020-03-02 14:17:26 +0100 | [diff] [blame] | 121 | sed -i '/^\[database\]$/,/^\[/ s/^connection = .*/connection = mysql+pymysql:\/\/keystone:'$KEYSTONE_DB_PASSWORD'@'$DB_HOST':'$DB_PORT'\/keystone/' /etc/keystone/keystone.conf |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 122 | |
| 123 | # Setting Keystone tokens |
| David Garcia | 58b0e32 | 2020-03-02 14:17:26 +0100 | [diff] [blame] | 124 | sed -i '/^\[token\]$/,/^\[/ s/^.*provider = .*/provider = fernet/' /etc/keystone/keystone.conf |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 125 | |
| vegall | 7badcae | 2024-07-02 15:30:30 +0000 | [diff] [blame] | 126 | # Setting Keystone for the stderr |
| 127 | sed -i '/\[DEFAULT\]/a use_stderr = true' /etc/keystone/keystone.conf |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 128 | |
| 129 | # Use LDAP authentication for Identity |
| 130 | if [ $LDAP_AUTHENTICATION_DOMAIN_NAME ]; then |
| 131 | # Enable Keyston domains |
| 132 | sed -i "s%.*domain_specific_drivers_enabled =.*%domain_specific_drivers_enabled = true%" /etc/keystone/keystone.conf |
| 133 | sed -i "s%.*domain_config_dir =.*%domain_config_dir = /etc/keystone/domains%" /etc/keystone/keystone.conf |
| 134 | mkdir -p /etc/keystone/domains |
| 135 | # Configure domain for LDAP authentication |
| 136 | cat << EOF > /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 137 | [identity] |
| 138 | driver = ldap |
| 139 | [ldap] |
| 140 | url = $LDAP_URL |
| 141 | user_allow_create=false |
| 142 | user_allow_update=false |
| 143 | user_allow_delete=false |
| 144 | group_allow_create=false |
| 145 | group_allow_update=false |
| 146 | group_allow_delete=false |
| 147 | query_scope = sub |
| 148 | EOF |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 149 | if [ "$LDAP_BIND_USER" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 150 | echo "user = $LDAP_BIND_USER" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 151 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 152 | if [ "$LDAP_BIND_PASSWORD" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 153 | echo "password = $LDAP_BIND_PASSWORD" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 154 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 155 | if [ "$LDAP_CHASE_REFERRALS" ]; then |
| sousaedu | bb631be | 2020-10-20 01:15:37 +0100 | [diff] [blame] | 156 | echo "chase_referrals = $LDAP_CHASE_REFERRALS" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 157 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 158 | if [ "$LDAP_PAGE_SIZE" ]; then |
| sousaedu | bb631be | 2020-10-20 01:15:37 +0100 | [diff] [blame] | 159 | echo "page_size = $LDAP_PAGE_SIZE" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 160 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 161 | if [ "$LDAP_USER_TREE_DN" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 162 | echo "user_tree_dn = $LDAP_USER_TREE_DN" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 163 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 164 | if [ "$LDAP_USER_OBJECTCLASS" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 165 | echo "user_objectclass = $LDAP_USER_OBJECTCLASS" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 166 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 167 | if [ "$LDAP_USER_ID_ATTRIBUTE" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 168 | echo "user_id_attribute = $LDAP_USER_ID_ATTRIBUTE" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 169 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 170 | if [ "$LDAP_USER_NAME_ATTRIBUTE" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 171 | echo "user_name_attribute = $LDAP_USER_NAME_ATTRIBUTE" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 172 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 173 | if [ "$LDAP_USER_PASS_ATTRIBUTE" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 174 | echo "user_pass_attribute = $LDAP_USER_PASS_ATTRIBUTE" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 175 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 176 | if [ "$LDAP_USER_FILTER" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 177 | echo "user_filter = $LDAP_USER_FILTER" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 178 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 179 | if [ "$LDAP_USER_ENABLED_ATTRIBUTE" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 180 | echo "user_enabled_attribute = $LDAP_USER_ENABLED_ATTRIBUTE" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 181 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 182 | if [ "$LDAP_USER_ENABLED_MASK" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 183 | echo "user_enabled_mask = $LDAP_USER_ENABLED_MASK" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 184 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 185 | if [ "$LDAP_USER_ENABLED_DEFAULT" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 186 | echo "user_enabled_default = $LDAP_USER_ENABLED_DEFAULT" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 187 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 188 | if [ "$LDAP_USER_ENABLED_INVERT" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 189 | echo "user_enabled_invert = $LDAP_USER_ENABLED_INVERT" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 190 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 191 | if [ "$LDAP_GROUP_OBJECTCLASS" ]; then |
| sousaedu | bb631be | 2020-10-20 01:15:37 +0100 | [diff] [blame] | 192 | echo "group_objectclass = $LDAP_GROUP_OBJECTCLASS" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 193 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 194 | if [ "$LDAP_GROUP_TREE_DN" ]; then |
| sousaedu | bb631be | 2020-10-20 01:15:37 +0100 | [diff] [blame] | 195 | echo "group_tree_dn = $LDAP_GROUP_TREE_DN" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 196 | fi |
| sousaedu | 7920102 | 2021-06-17 11:04:34 +0100 | [diff] [blame] | 197 | if [ "$LDAP_TLS_CACERT_BASE64" ]; then |
| 198 | mkdir -p /etc/ssl/certs/ |
| 199 | echo "-----BEGIN CERTIFICATE-----" >> /etc/ssl/certs/ca-certificates.crt |
| 200 | echo $LDAP_TLS_CACERT_BASE64 >> /etc/ssl/certs/ca-certificates.crt |
| 201 | echo "-----END CERTIFICATE-----" >> /etc/ssl/certs/ca-certificates.crt |
| 202 | fi |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 203 | if [ "$LDAP_USE_STARTTLS" ] && [ "$LDAP_USE_STARTTLS" == "true" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 204 | echo "use_tls = true" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 205 | mkdir -p /etc/keystone/ssl/certs/ |
| 206 | echo "-----BEGIN CERTIFICATE-----" > /etc/keystone/ssl/certs/ca.pem |
| 207 | echo $LDAP_TLS_CACERT_BASE64 >> /etc/keystone/ssl/certs/ca.pem |
| 208 | echo "-----END CERTIFICATE-----" >> /etc/keystone/ssl/certs/ca.pem |
| 209 | echo "tls_cacertfile = /etc/keystone/ssl/certs/ca.pem" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| sousaedu | 66dc9ed | 2021-06-16 16:17:48 +0100 | [diff] [blame] | 210 | if [ "$LDAP_TLS_REQ_CERT" ]; then |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 211 | echo "tls_req_cert = $LDAP_TLS_REQ_CERT" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf |
| 212 | fi |
| 213 | fi |
| 214 | fi |
| 215 | |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 216 | # Populate Keystone database |
| Eduardo Sousa | c50ed8f | 2019-04-08 17:17:54 +0100 | [diff] [blame] | 217 | if [ -z $DB_EXISTS ] || [ -z $DB_NOT_EMPTY ]; then |
| sousaedu | 9d1d0c1 | 2022-01-21 14:01:53 +0000 | [diff] [blame] | 218 | keystone-manage db_sync |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 219 | fi |
| 220 | |
| 221 | # Initialize Fernet key repositories |
| 222 | keystone-manage fernet_setup --keystone-user keystone --keystone-group keystone |
| 223 | keystone-manage credential_setup --keystone-user keystone --keystone-group keystone |
| 224 | |
| David Garcia | 58b0e32 | 2020-03-02 14:17:26 +0100 | [diff] [blame] | 225 | wait_keystone_host |
| 226 | |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 227 | # Bootstrap Keystone service |
| Eduardo Sousa | c50ed8f | 2019-04-08 17:17:54 +0100 | [diff] [blame] | 228 | if [ -z $DB_EXISTS ] || [ -z $DB_NOT_EMPTY ]; then |
| vegall | 7badcae | 2024-07-02 15:30:30 +0000 | [diff] [blame] | 229 | echo "Bootstraping keystone" |
| Eduardo Sousa | c50ed8f | 2019-04-08 17:17:54 +0100 | [diff] [blame] | 230 | keystone-manage bootstrap \ |
| 231 | --bootstrap-username "$ADMIN_USERNAME" \ |
| 232 | --bootstrap-password "$ADMIN_PASSWORD" \ |
| 233 | --bootstrap-project "$ADMIN_PROJECT" \ |
| 234 | --bootstrap-admin-url "http://$KEYSTONE_HOST:5000/v3/" \ |
| 235 | --bootstrap-internal-url "http://$KEYSTONE_HOST:5000/v3/" \ |
| 236 | --bootstrap-public-url "http://$KEYSTONE_HOST:5000/v3/" \ |
| 237 | --bootstrap-region-id "$REGION_ID" |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 238 | fi |
| 239 | |
| David Garcia | 58b0e32 | 2020-03-02 14:17:26 +0100 | [diff] [blame] | 240 | echo "ServerName $KEYSTONE_HOST" >> /etc/apache2/apache2.conf |
| sousaedu | 9d1d0c1 | 2022-01-21 14:01:53 +0000 | [diff] [blame] | 241 | |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 242 | # Restart Apache Service |
| 243 | service apache2 restart |
| 244 | |
| Eduardo Sousa | e193dfd | 2018-09-21 11:37:49 +0100 | [diff] [blame] | 245 | cat << EOF >> setup_env |
| 246 | export OS_PROJECT_DOMAIN_NAME=default |
| 247 | export OS_USER_DOMAIN_NAME=default |
| Eduardo Sousa | c50ed8f | 2019-04-08 17:17:54 +0100 | [diff] [blame] | 248 | export OS_PROJECT_NAME=$ADMIN_PROJECT |
| 249 | export OS_USERNAME=$ADMIN_USERNAME |
| Eduardo Sousa | e193dfd | 2018-09-21 11:37:49 +0100 | [diff] [blame] | 250 | export OS_PASSWORD=$ADMIN_PASSWORD |
| Eduardo Sousa | c50ed8f | 2019-04-08 17:17:54 +0100 | [diff] [blame] | 251 | export OS_AUTH_URL=http://$KEYSTONE_HOST:5000/v3 |
| Eduardo Sousa | e193dfd | 2018-09-21 11:37:49 +0100 | [diff] [blame] | 252 | export OS_IDENTITY_API_VERSION=3 |
| 253 | export OS_IMAGE_API_VERSION=2 |
| 254 | EOF |
| 255 | |
| 256 | source setup_env |
| 257 | |
| vegall | 7badcae | 2024-07-02 15:30:30 +0000 | [diff] [blame] | 258 | # Function to retry a command up to 5 times |
| 259 | retry() { |
| 260 | local n=1 |
| 261 | local max=5 |
| 262 | local delay=5 |
| 263 | while true; do |
| 264 | "$@" && break || { |
| 265 | if [[ $n -lt $max ]]; then |
| 266 | ((n++)) |
| 267 | echo "Command failed. Attempt $n/$max:" |
| 268 | sleep $delay; |
| 269 | else |
| 270 | echo "The command has failed after $n attempts." |
| 271 | return 1 |
| 272 | fi |
| 273 | } |
| 274 | done |
| 275 | } |
| 276 | |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 277 | # Create NBI User |
| vegall | 7badcae | 2024-07-02 15:30:30 +0000 | [diff] [blame] | 278 | if ! openstack user show nbi --domain default; then |
| 279 | echo "NBI user does not exist. Creating nbi user" |
| 280 | retry openstack user create --domain default --password "$SERVICE_PASSWORD" "$SERVICE_USERNAME" || exit 1 |
| 281 | retry openstack project create --domain default --description "Service Project" "$SERVICE_PROJECT" || exit 1 |
| 282 | retry openstack role add --project "$SERVICE_PROJECT" --user "$SERVICE_USERNAME" admin || exit 1 |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 283 | fi |
| vegall | 7badcae | 2024-07-02 15:30:30 +0000 | [diff] [blame] | 284 | echo "Done creating the NBI user" |
| David Garcia | 6fff9af | 2020-03-23 15:32:43 +0100 | [diff] [blame] | 285 | |
| 286 | if [ $LDAP_AUTHENTICATION_DOMAIN_NAME ]; then |
| 287 | if !(openstack domain list | grep -q $LDAP_AUTHENTICATION_DOMAIN_NAME); then |
| 288 | # Create domain in keystone for LDAP authentication |
| 289 | openstack domain create $LDAP_AUTHENTICATION_DOMAIN_NAME |
| 290 | # Restart Apache Service |
| 291 | service apache2 restart |
| 292 | fi |
| 293 | # Check periodically LDAP for updates |
| 294 | echo "0 1 * * * keystone-manage mapping_purge --domain-name $LDAP_AUTHENTICATION_DOMAIN_NAME; keystone-manage mapping_populate --domain-name $LDAP_AUTHENTICATION_DOMAIN_NAME" >> /var/spool/cron/crontabs/root |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 295 | fi |
| 296 | |
| Eduardo Sousa | 07e8a24 | 2018-10-08 12:49:14 +0100 | [diff] [blame] | 297 | while ps -ef | grep -v grep | grep -q apache2 |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 298 | do |
| vegall | 7badcae | 2024-07-02 15:30:30 +0000 | [diff] [blame] | 299 | tail -f /var/log/keystone/keystone-manage.log |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 300 | done |
| 301 | |
| Eduardo Sousa | 07e8a24 | 2018-10-08 12:49:14 +0100 | [diff] [blame] | 302 | # Only reaches this point if apache2 stops running |
| 303 | # When this happens exits with error code |
| Eduardo Sousa | 09a1e97 | 2018-09-21 11:06:32 +0100 | [diff] [blame] | 304 | exit 1 |