def init_config(): conf = { "KEYSTONE": [ Argument("keystone-db-pw", "Password for keystone to access DB", "CONFIG_KEYSTONE_DB_PW", utils.generate_random_pw(), validators=[validators.not_empty]), Argument("keystone-admin-token", "The token to use for the Keystone service api", "CONFIG_KEYSTONE_ADMIN_TOKEN", uuid.uuid4().hex, validators=[validators.not_empty]), Argument("keystone-admin-pw", "The password to use for the Keystone admin user", "CONFIG_KEYSTONE_ADMIN_PW", utils.generate_random_pw(), validators=[validators.not_empty]), Argument("keystone-demo-pw", "The password to use for the Keystone demo user", "CONFIG_KEYSTONE_DEMO_PW", utils.generate_random_pw(), validators=[validators.not_empty]), Argument("keystone-region", "Region name", "CONFIG_KEYSTONE_REGION", "RegionOne", validators=[validators.not_empty]) ] } for group in conf: Controller.get().add_group(group, conf[group])
def init_config(): conf = { "SWIFT": [ Argument("swift-ks-pw", "Password to use for the Object Storage service to " " authenticate with with the Identity service", "CONFIG_SWIFT_KS_PW", utils.generate_random_pw(), validators=[validators.not_empty]), Argument("swift-storages", "Comma-separated list of devices to use as storage device" " for Object Storage. e.g. /path/to/dev1,/path/to/dev2." " Clearstack DOES NOT creare the file system, you must " "format it with xfs. Leave blank to use a loop device", "CONFIG_SWIFT_STORAGES", '', validators=[validate_storage]), Argument("swift-storage-zones", "Number of Object Storage storage zones; this number " "MUST be no larger than the number of configured " "storage devices.", "CONFIG_SWIFT_STORAGE_ZONES", '1', validators=[validators.digit]), Argument("swift-storage-replicas", "Number of Object Storage storage replicas; this number " "MUST be no larger than the number of configured " "storage zones.", "CONFIG_SWIFT_STORAGE_REPLICAS", '1', validators=[validators.digit]), Argument("swift-hash", "Custom seed number to use for swift_hash_path_suffix in" " /etc/swift/swift.conf. If you do not provide a value, " "a seed number is automatically generated.", "CONFIG_SWIFT_HASH", utils.generate_random_pw(), validators=[validators.not_empty]), Argument("swift-storage-size", "Size of the Object Storage loopback file storage " "device in GB", "CONFIG_SWIFT_STORAGE_SIZE", "2", validators=[validators.digit]), ] } for group in conf: Controller.get().add_group(group, conf[group])
def init_config(): conf = { "NOVA": [ Argument("nova-db-pw", "Password for nova to access DB", "CONFIG_NOVA_DB_PW", utils.generate_random_pw(), validators=[validators.not_empty]), Argument("nova-ks-pw", "Password to use for the Nova to" " authenticate with Keystone", "CONFIG_NOVA_KS_PW", utils.generate_random_pw(), validators=[validators.not_empty]) ] } for group in conf: Controller.get().add_group(group, conf[group])
def init_config(): conf = { "CEILOMETER": [ Argument("ceilometer-db-pw", "Password for ceilometer to access DB", "CONFIG_CEILOMETER_DB_PW", utils.generate_random_pw(), validators=[validators.not_empty]), Argument("ceilometer-ks-pw", "Password to use for Ceilometer to" " authenticate with Keystone", "CONFIG_CEILOMETER_KS_PW", utils.generate_random_pw(), validators=[validators.not_empty]) ] } for group in conf: Controller.get().add_group(group, conf[group])
def init_config(): conf = { "GLANCE": [ Argument("glance-db-pw", "Password for glance to access DB", "CONFIG_GLANCE_DB_PW", utils.generate_random_pw(), validators=[validators.not_empty]), Argument("glance-ks-pw", "Password to use for Glance to" " authenticate with Keystone", "CONFIG_GLANCE_KS_PW", utils.generate_random_pw(), validators=[validators.not_empty]) ] } for group in conf: Controller.get().add_group(group, conf[group])
def init_config(): conf = { "HEAT": [ Argument("heat-db-pw", "Password for heat to access DB", "CONFIG_HEAT_DB_PW", utils.generate_random_pw(), validators=[validators.not_empty]), Argument("heat-ks-pw", "Password to use for Heat to" " authenticate with Keystone", "CONFIG_HEAT_KS_PW", utils.generate_random_pw(), validators=[validators.not_empty]), Argument("heat-domain", "Name of the Identity domain for Orchestration.", "CONFIG_HEAT_DOMAIN", "heat", validators=[validators.not_empty]), Argument("heat-domain-admin", "Name of the Identity domain administrative user for " "Orchestration.", "CONFIG_HEAT_DOMAIN_ADMIN", "heat_domain_admin", validators=[validators.not_empty]), Argument("heat-domain-password", "Password for the Identity domain administrative user " "for Orchestration", "CONFIG_HEAT_DOMAIN_PASSWORD", utils.generate_random_pw(), validators=[validators.not_empty]) ] } for group in conf: Controller.get().add_group(group, conf[group])
def init_config(): conf = { "MARIADB": [ Argument("mariadb-host", "The IP address or hostname of the MariaDB server", "CONFIG_MARIADB_HOST", util.get_ip(), validators=[validators.ip_or_hostname]), Argument("mariadb-user", "User for mariadb authentication", "CONFIG_MARIADB_USER", "root", validators=[validators.not_empty]), Argument("mariadb-pw", "Password for mariadb user", "CONFIG_MARIADB_PW", utils.generate_random_pw(), validators=[validators.not_empty]) ] } for group in conf: Controller.get().add_group(group, conf[group])
def init_config(): conf = { "AMQP": [ Argument("amqp-auth-user", "User for amqp authentication", "CONFIG_AMQP_AUTH_USER", "amqp_user", validators=[validators.not_empty]), Argument("amqp-auth-pw", "Password for amqp user authentication", "CONFIG_AMQP_AUTH_PASSWORD", utils.generate_random_pw(), validators=[validators.not_empty]), Argument("amqp-host", "The IP address or hostname of the server on which" " to install the AMQP service", "CONFIG_AMQP_HOST", util.get_ip(), validators=[validators.ip_or_hostname]) ] } for group in conf: Controller.get().add_group(group, conf[group])