X-Git-Url: https://osm.etsi.org/gitweb/?p=osm%2FNBI.git;a=blobdiff_plain;f=osm_nbi%2Fnbi.cfg;h=3e8463a5e1d004ca3299bb73201520e1150bc899;hp=d01aca9ec8858307576ef7bef20c84106f262618;hb=1b23c36a5f050609ac7c16e8f38e337259214174;hpb=04dbb0e85e2d3d10fc7ae79ad43af38e3f73e230 diff --git a/osm_nbi/nbi.cfg b/osm_nbi/nbi.cfg index d01aca9..3e8463a 100644 --- a/osm_nbi/nbi.cfg +++ b/osm_nbi/nbi.cfg @@ -41,13 +41,12 @@ server.ssl_private_key: "./http/privkey.pem" server.ssl_pass_phrase: "osm4u" server.thread_pool: 10 -# Only for test. It works without authorization using the provided user and project: -# test.user_not_authorized: "admin" -# test.project_not_authorized: "admin" - # Uncomment for allow basic authentication apart from bearer # auth.allow_basic_authentication: True +# comment or set to False to disable /test URL +server.enable_test: True + log.screen: False log.access_file: "" log.error_file: "" @@ -61,14 +60,18 @@ driver: "mongo" # mongo or memory host: "mongo" # hostname or IP port: 27017 name: "osm" +# replicaset: "replicaset" # user: "user" # password: "password" # commonkey: "commonkey" +[prometheus] +host: "prometheus" #hostname or IP +port: 9090 + loglevel: "DEBUG" #logfile: /var/log/osm/nbi-database.log - [storage] driver: "local" # local filesystem # for local provide file path @@ -89,4 +92,23 @@ loglevel: "DEBUG" group_id: "nbi-server" [authentication] -backend: "internal" +backend: "keystone" # internal or keystone +# for keystone backend a comma separated list of user adn project _domain_name list can ba provided. +# NBI will try authenticate with all of then if domain is not provided in the content of a POST token +# user_domain_name: "default,ldap" +# project_domain_name: "default,ldap" + +# Keystone config parameters are +# auth_url: format https://:/v3 # v3 is necessary +# auth_host: ip address of keystone host. +# auth_port: port number of keystone. +# Provide either auth_url or (auth_host and auth_port) +# service_username: "nbi" +# service_password: "nbi" + +# Only for test. It works without authorization using the provided user and project: +# user_not_authorized: "admin" +# project_not_authorized: "admin" + +[rbac] +# roles_to_operations: "roles_to_operations.yml" # initial role generation when database