| David Garcia | 009a5d6 | 2020-08-27 16:53:44 +0200 | [diff] [blame] | 1 | # Copyright 2020 Canonical Ltd. |
| 2 | # |
| 3 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | # you may not use this file except in compliance with the License. |
| 5 | # You may obtain a copy of the License at |
| 6 | # |
| 7 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | # |
| 9 | # Unless required by applicable law or agreed to in writing, software |
| 10 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | # See the License for the specific language governing permissions and |
| 13 | # limitations under the License. |
| 14 | options: |
| 15 | image: |
| 16 | type: string |
| 17 | default: opensourcemano/keystone:latest |
| 18 | description: The docker image to install. |
| 19 | image_username: |
| 20 | type: string |
| 21 | description: | |
| 22 | The username for accessing the registry specified in image. |
| 23 | default: "" |
| 24 | image_password: |
| 25 | type: string |
| 26 | description: | |
| 27 | The password associated with image_username for accessing |
| 28 | the registry specified in image. |
| 29 | default: "" |
| 30 | max_file_size: |
| 31 | type: int |
| 32 | description: | |
| 33 | The maximum file size, in megabytes. |
| 34 | |
| 35 | If there is a reverse proxy in front of Keystone, it may |
| 36 | need to be configured to handle the requested size. |
| 37 | default: 5 |
| 38 | ingress_whitelist_source_range: |
| 39 | type: string |
| 40 | description: | |
| 41 | A comma-separated list of CIDRs to store in the |
| 42 | ingress.kubernetes.io/whitelist-source-range annotation. |
| 43 | |
| 44 | This can be used to lock down access to |
| 45 | Keystone based on source IP address. |
| 46 | default: "" |
| 47 | tls_secret_name: |
| 48 | type: string |
| 49 | description: TLS Secret name |
| 50 | default: "" |
| 51 | site_url: |
| 52 | type: string |
| 53 | description: Ingress URL |
| 54 | default: "" |
| David Garcia | 009a5d6 | 2020-08-27 16:53:44 +0200 | [diff] [blame] | 55 | region_id: |
| 56 | type: string |
| 57 | description: Region ID to be created when starting the service |
| 58 | default: RegionOne |
| 59 | keystone_db_password: |
| 60 | type: string |
| 61 | description: Keystone DB Password |
| 62 | default: admin |
| 63 | admin_username: |
| 64 | type: string |
| 65 | description: Admin username to be created when starting the service |
| 66 | default: admin |
| 67 | admin_password: |
| 68 | type: string |
| 69 | description: Admin password to be created when starting the service |
| 70 | default: admin |
| 71 | admin_project: |
| 72 | type: string |
| 73 | description: Admin project to be created when starting the service |
| 74 | default: admin |
| 75 | service_username: |
| 76 | type: string |
| 77 | description: Service Username to be created when starting the service |
| 78 | default: nbi |
| 79 | service_password: |
| 80 | type: string |
| 81 | description: Service Password to be created when starting the service |
| 82 | default: nbi |
| 83 | service_project: |
| 84 | type: string |
| 85 | description: Service Project to be created when starting the service |
| 86 | default: service |
| 87 | user_domain_name: |
| 88 | type: string |
| 89 | description: User domain name (Hardcoded in the container start.sh script) |
| 90 | default: default |
| 91 | project_domain_name: |
| 92 | type: string |
| 93 | description: | |
| 94 | Project domain name (Hardcoded in the container start.sh script) |
| 95 | default: default |
| sousaedu | 738bf6f | 2020-10-10 00:25:26 +0100 | [diff] [blame] | 96 | token_expiration: |
| 97 | type: int |
| 98 | description: Token keys expiration in seconds |
| 99 | default: 172800 |
| sousaedu | 126a443 | 2020-09-23 13:28:25 +0100 | [diff] [blame] | 100 | ldap_enabled: |
| 101 | type: boolean |
| 102 | description: Boolean to enable/disable LDAP authentication |
| 103 | default: false |
| 104 | ldap_authentication_domain_name: |
| 105 | type: string |
| 106 | description: Name of the domain which use LDAP authentication |
| 107 | default: "" |
| 108 | ldap_url: |
| 109 | type: string |
| 110 | description: URL of the LDAP server |
| 111 | default: "ldap://localhost" |
| 112 | ldap_bind_user: |
| 113 | type: string |
| 114 | description: User to bind and search for users |
| 115 | default: "" |
| 116 | ldap_bind_password: |
| 117 | type: string |
| 118 | description: Password to bind and search for users |
| 119 | default: "" |
| sousaedu | 0be373d | 2020-10-20 01:06:32 +0100 | [diff] [blame] | 120 | ldap_chase_referrals: |
| 121 | type: string |
| 122 | description: | |
| 123 | Sets keystone’s referral chasing behavior across directory partitions. |
| 124 | If left unset, the system’s default behavior will be used. |
| 125 | default: "" |
| 126 | ldap_page_size: |
| 127 | type: int |
| 128 | description: | |
| 129 | Defines the maximum number of results per page that keystone should |
| 130 | request from the LDAP server when listing objects. A value of zero (0) |
| 131 | disables paging. |
| 132 | default: 0 |
| sousaedu | 126a443 | 2020-09-23 13:28:25 +0100 | [diff] [blame] | 133 | ldap_user_tree_dn: |
| 134 | type: string |
| 135 | description: | |
| 136 | Root of the tree in LDAP server in which Keystone will search for users |
| 137 | default: "" |
| 138 | ldap_user_objectclass: |
| 139 | type: string |
| 140 | description: | |
| 141 | LDAP object class that Keystone will filter on within user_tree_dn to |
| 142 | find user objects. Any objects of other classes will be ignored. |
| 143 | default: inetOrgPerson |
| 144 | ldap_user_id_attribute: |
| 145 | type: string |
| 146 | description: | |
| 147 | This set of options define the mapping to LDAP attributes for the three |
| 148 | key user attributes supported by Keystone. The LDAP attribute chosen for |
| 149 | user_id must be something that is immutable for a user and no more than |
| 150 | 64 characters in length. Notice that Distinguished Name (DN) may be |
| 151 | longer than 64 characters and thus is not suitable. An uid, or mail may |
| 152 | be appropriate. |
| 153 | default: cn |
| 154 | ldap_user_name_attribute: |
| 155 | type: string |
| 156 | description: | |
| 157 | This set of options define the mapping to LDAP attributes for the three |
| 158 | key user attributes supported by Keystone. The LDAP attribute chosen for |
| 159 | user_id must be something that is immutable for a user and no more than |
| 160 | 64 characters in length. Notice that Distinguished Name (DN) may be |
| 161 | longer than 64 characters and thus is not suitable. An uid, or mail may |
| 162 | be appropriate. |
| 163 | default: sn |
| 164 | ldap_user_pass_attribute: |
| 165 | type: string |
| 166 | description: | |
| 167 | This set of options define the mapping to LDAP attributes for the three |
| 168 | key user attributes supported by Keystone. The LDAP attribute chosen for |
| 169 | user_id must be something that is immutable for a user and no more than |
| 170 | 64 characters in length. Notice that Distinguished Name (DN) may be |
| 171 | longer than 64 characters and thus is not suitable. An uid, or mail may |
| 172 | be appropriate. |
| 173 | default: userPassword |
| 174 | ldap_user_filter: |
| 175 | type: string |
| 176 | description: | |
| 177 | This filter option allow additional filter (over and above |
| 178 | user_objectclass) to be included into the search of user. One common use |
| 179 | of this is to provide more efficient searching, where the recommended |
| 180 | search for user objects is (&(objectCategory=person)(objectClass=user)). |
| 181 | By specifying user_objectclass as user and user_filter as |
| 182 | objectCategory=person in the Keystone configuration file, this can be |
| 183 | achieved. |
| 184 | default: "" |
| 185 | ldap_user_enabled_attribute: |
| 186 | type: string |
| 187 | description: | |
| 188 | In Keystone, a user entity can be either enabled or disabled. Setting |
| 189 | the above option will give a mapping to an equivalent attribute in LDAP, |
| 190 | allowing your LDAP management tools to disable a user. |
| 191 | default: enabled |
| 192 | ldap_user_enabled_mask: |
| 193 | type: int |
| 194 | description: | |
| 195 | Some LDAP schemas, rather than having a dedicated attribute for user |
| 196 | enablement, use a bit within a general control attribute (such as |
| 197 | userAccountControl) to indicate this. Setting user_enabled_mask will |
| 198 | cause Keystone to look at only the status of this bit in the attribute |
| 199 | specified by user_enabled_attribute, with the bit set indicating the |
| 200 | user is enabled. |
| 201 | default: 0 |
| 202 | ldap_user_enabled_default: |
| 203 | type: boolean |
| 204 | description: | |
| 205 | Most LDAP servers use a boolean or bit in a control field to indicate |
| 206 | enablement. However, some schemas might use an integer value in an |
| 207 | attribute. In this situation, set user_enabled_default to the integer |
| 208 | value that represents a user being enabled. |
| 209 | default: true |
| 210 | ldap_user_enabled_invert: |
| 211 | type: boolean |
| 212 | description: | |
| 213 | Some LDAP schemas have an “account locked” attribute, which is the |
| 214 | equivalent to account being “disabled.” In order to map this to the |
| 215 | Keystone enabled attribute, you can utilize the user_enabled_invert |
| 216 | setting in conjunction with user_enabled_attribute to map the lock |
| 217 | status to disabled in Keystone. |
| 218 | default: false |
| sousaedu | 0be373d | 2020-10-20 01:06:32 +0100 | [diff] [blame] | 219 | ldap_group_objectclass: |
| 220 | type: string |
| 221 | description: The LDAP object class to use for groups. |
| 222 | default: groupOfNames |
| 223 | ldap_group_tree_dn: |
| 224 | type: string |
| 225 | description: The search base to use for groups. |
| 226 | default: "" |
| sousaedu | 126a443 | 2020-09-23 13:28:25 +0100 | [diff] [blame] | 227 | ldap_use_starttls: |
| 228 | type: boolean |
| 229 | description: | |
| 230 | Enable Transport Layer Security (TLS) for providing a secure connection |
| 231 | from Keystone to LDAP (StartTLS, not LDAPS). |
| 232 | default: false |
| 233 | ldap_tls_cacert_base64: |
| 234 | type: string |
| 235 | description: | |
| 236 | CA certificate in Base64 format (if you have the PEM file, text inside |
| 237 | "-----BEGIN CERTIFICATE-----"/"-----END CERTIFICATE-----" tags). |
| 238 | default: "" |
| 239 | ldap_tls_req_cert: |
| 240 | type: string |
| 241 | description: | |
| 242 | Defines how the certificates are checked for validity in the client |
| 243 | (i.e., Keystone end) of the secure connection (this doesn’t affect what |
| 244 | level of checking the server is doing on the certificates it receives |
| 245 | from Keystone). Possible values are "demand", "never", and "allow". The |
| 246 | default of demand means the client always checks the certificate and |
| 247 | will drop the connection if it is not provided or invalid. never is the |
| 248 | opposite—it never checks it, nor requires it to be provided. allow means |
| 249 | that if it is not provided then the connection is allowed to continue, |
| 250 | but if it is provided it will be checked—and if invalid, the connection |
| 251 | will be dropped. |
| 252 | default: demand |