#!/bin/bash
+# Copyright 2018 Whitestack, LLC
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+# For those usages not covered by the Apache License, Version 2.0 please
+# contact: esousa@whitestack.com or glavado@whitestack.com
+##
+
DB_EXISTS=""
+DB_NOT_EMPTY=""
max_attempts=120
function wait_db(){
mysql -h"$DB_HOST" -P"$DB_PORT" -u"$ROOT_DB_USER" -p"$ROOT_DB_PASSWORD" --default_character_set utf8 -e "CREATE DATABASE keystone"
mysql -h"$DB_HOST" -P"$DB_PORT" -u"$ROOT_DB_USER" -p"$ROOT_DB_PASSWORD" --default_character_set utf8 -e "GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'localhost' IDENTIFIED BY '$KEYSTONE_DB_PASSWORD'"
mysql -h"$DB_HOST" -P"$DB_PORT" -u"$ROOT_DB_USER" -p"$ROOT_DB_PASSWORD" --default_character_set utf8 -e "GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'%' IDENTIFIED BY '$KEYSTONE_DB_PASSWORD'"
+else
+ if [ $(mysql -h"$DB_HOST" -P"$DB_PORT" -u"$ROOT_DB_USER" -p"$ROOT_DB_PASSWORD" --default_character_set utf8 -sse "SELECT COUNT(*) FROM keystone;") -gt 0 ]; then
+ echo "DB keystone is empty"
+ DB_NOT_EMPTY="y"
+ fi
fi
# Setting Keystone database connection
# Setting Keystone tokens
sed -i "2934s%.*%provider = fernet%" /etc/keystone/keystone.conf
+
+# Use LDAP authentication for Identity
+if [ $LDAP_AUTHENTICATION_DOMAIN_NAME ]; then
+ # Enable Keyston domains
+ sed -i "s%.*domain_specific_drivers_enabled =.*%domain_specific_drivers_enabled = true%" /etc/keystone/keystone.conf
+ sed -i "s%.*domain_config_dir =.*%domain_config_dir = /etc/keystone/domains%" /etc/keystone/keystone.conf
+ mkdir -p /etc/keystone/domains
+ # Configure domain for LDAP authentication
+ cat << EOF > /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+[identity]
+driver = ldap
+[ldap]
+url = $LDAP_URL
+user_allow_create=false
+user_allow_update=false
+user_allow_delete=false
+group_allow_create=false
+group_allow_update=false
+group_allow_delete=false
+query_scope = sub
+EOF
+ if [ $LDAP_BIND_USER ]; then
+ echo "user = $LDAP_BIND_USER" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_BIND_PASSWORD ]; then
+ echo "password = $LDAP_BIND_PASSWORD" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_USER_TREE_DN ]; then
+ echo "user_tree_dn = $LDAP_USER_TREE_DN" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_USER_OBJECTCLASS ]; then
+ echo "user_objectclass = $LDAP_USER_OBJECTCLASS" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_USER_ID_ATTRIBUTE ]; then
+ echo "user_id_attribute = $LDAP_USER_ID_ATTRIBUTE" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_USER_NAME_ATTRIBUTE ]; then
+ echo "user_name_attribute = $LDAP_USER_NAME_ATTRIBUTE" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_USER_PASS_ATTRIBUTE ]; then
+ echo "user_pass_attribute = $LDAP_USER_PASS_ATTRIBUTE" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_USER_FILTER ]; then
+ echo "user_filter = $LDAP_USER_FILTER" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_USER_ENABLED_ATTRIBUTE ]; then
+ echo "user_enabled_attribute = $LDAP_USER_ENABLED_ATTRIBUTE" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_USER_ENABLED_MASK ]; then
+ echo "user_enabled_mask = $LDAP_USER_ENABLED_MASK" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_USER_ENABLED_DEFAULT ]; then
+ echo "user_enabled_default = $LDAP_USER_ENABLED_DEFAULT" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_USER_ENABLED_INVERT ]; then
+ echo "user_enabled_invert = $LDAP_USER_ENABLED_INVERT" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ if [ $LDAP_USE_STARTTLS ] && [ "$LDAP_USE_STARTTLS" == "true" ]; then
+ echo "use_tls = true" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ mkdir -p /etc/keystone/ssl/certs/
+ echo "-----BEGIN CERTIFICATE-----" > /etc/keystone/ssl/certs/ca.pem
+ echo $LDAP_TLS_CACERT_BASE64 >> /etc/keystone/ssl/certs/ca.pem
+ echo "-----END CERTIFICATE-----" >> /etc/keystone/ssl/certs/ca.pem
+ echo "tls_cacertfile = /etc/keystone/ssl/certs/ca.pem" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ if [ $LDAP_TLS_REQ_CERT ]; then
+ echo "tls_req_cert = $LDAP_TLS_REQ_CERT" >> /etc/keystone/domains/keystone.$LDAP_AUTHENTICATION_DOMAIN_NAME.conf
+ fi
+ fi
+fi
+
# Populate Keystone database
-if [ -z $DB_EXISTS ]; then
+if [ -z $DB_EXISTS ] || [ -z $DB_NOT_EMPTY ]; then
su -s /bin/sh -c "keystone-manage db_sync" keystone
fi
keystone-manage credential_setup --keystone-user keystone --keystone-group keystone
# Bootstrap Keystone service
-if [ -z $DB_EXISTS ]; then
- keystone-manage bootstrap --bootstrap-password "$ADMIN_PASSWORD" \
- --bootstrap-admin-url http://keystone:5000/v3/ \
- --bootstrap-internal-url http://keystone:5000/v3/ \
- --bootstrap-public-url http://keystone:5000/v3/ \
- --bootstrap-region-id RegionOne
+if [ -z $DB_EXISTS ] || [ -z $DB_NOT_EMPTY ]; then
+ keystone-manage bootstrap \
+ --bootstrap-username "$ADMIN_USERNAME" \
+ --bootstrap-password "$ADMIN_PASSWORD" \
+ --bootstrap-project "$ADMIN_PROJECT" \
+ --bootstrap-admin-url "http://$KEYSTONE_HOST:5000/v3/" \
+ --bootstrap-internal-url "http://$KEYSTONE_HOST:5000/v3/" \
+ --bootstrap-public-url "http://$KEYSTONE_HOST:5000/v3/" \
+ --bootstrap-region-id "$REGION_ID"
fi
# Restart Apache Service
cat << EOF >> setup_env
export OS_PROJECT_DOMAIN_NAME=default
export OS_USER_DOMAIN_NAME=default
-export OS_PROJECT_NAME=admin
-export OS_USERNAME=admin
+export OS_PROJECT_NAME=$ADMIN_PROJECT
+export OS_USERNAME=$ADMIN_USERNAME
export OS_PASSWORD=$ADMIN_PASSWORD
-export OS_AUTH_URL=http://keystone:5000/v3
+export OS_AUTH_URL=http://$KEYSTONE_HOST:5000/v3
export OS_IDENTITY_API_VERSION=3
export OS_IMAGE_API_VERSION=2
EOF
source setup_env
# Create NBI User
-if [ -z $DB_EXISTS ]; then
- openstack user create --domain default --password "$NBI_PASSWORD" nbi
- openstack project create --domain default --description "Service Project" service
- openstack role add --project service --user nbi admin
+if [ -z $DB_EXISTS ] || [ -z $DB_NOT_EMPTY ]; then
+ openstack user create --domain default --password "$SERVICE_PASSWORD" "$SERVICE_USERNAME"
+ openstack project create --domain default --description "Service Project" "$SERVICE_PROJECT"
+ openstack role add --project "$SERVICE_PROJECT" --user "$SERVICE_USERNAME" admin
+fi
+
+if [ $LDAP_AUTHENTICATION_DOMAIN_NAME ]; then
+ if !(openstack domain list | grep -q $LDAP_AUTHENTICATION_DOMAIN_NAME); then
+ # Create domain in keystone for LDAP authentication
+ openstack domain create $LDAP_AUTHENTICATION_DOMAIN_NAME
+ # Restart Apache Service
+ service apache2 restart
+ fi
+ # Check periodically LDAP for updates
+ echo "0 1 * * * keystone-manage mapping_purge --domain-name $LDAP_AUTHENTICATION_DOMAIN_NAME; keystone-manage mapping_populate --domain-name $LDAP_AUTHENTICATION_DOMAIN_NAME" >> /var/spool/cron/crontabs/root
fi
while ps -ef | grep -v grep | grep -q apache2