return op_id on asynchronous delete
[osm/NBI.git] / osm_nbi / nbi.cfg
index d01aca9..9255a8c 100644 (file)
@@ -41,13 +41,12 @@ server.ssl_private_key: "./http/privkey.pem"
 server.ssl_pass_phrase: "osm4u"
 server.thread_pool: 10
 
-# Only for test. It works without authorization using the provided user and project:
-# test.user_not_authorized: "admin"
-# test.project_not_authorized: "admin"
-
 # Uncomment for allow basic authentication apart from bearer
 # auth.allow_basic_authentication: True
 
+# comment or set to False to disable /test URL
+server.enable_test: True
+
 log.screen: False
 log.access_file: ""
 log.error_file: ""
@@ -65,10 +64,13 @@ name: "osm"
 # password: "password"
 # commonkey: "commonkey"
 
+[prometheus]
+host: "prometheus"         #hostname or IP
+port: 9090
+
 loglevel:  "DEBUG"
 #logfile: /var/log/osm/nbi-database.log
 
-
 [storage]
 driver: "local"            # local filesystem
 # for local provide file path
@@ -89,4 +91,15 @@ loglevel:  "DEBUG"
 group_id: "nbi-server"
 
 [authentication]
-backend: "internal"
+backend: "internal"         # internal or keystone
+# for keystone backend a comma separated list of user adn project _domain_name list can ba provided.
+# NBI will try authenticate with all of then if domain is not provided in the content of a POST token
+# user_domain_name:         "default,ldap"
+# project_domain_name:      "default,ldap"
+
+# Only for test. It works without authorization using the provided user and project:
+# user_not_authorized: "admin"
+# project_not_authorized: "admin"
+
+[rbac]
+# roles_to_operations: "roles_to_operations.yml"  # initial role generation when database