DavidPurcell | 663aedf | 2017-01-03 10:01:14 -0500 | [diff] [blame] | 1 | ============ |
| 2 | Installation |
| 3 | ============ |
| 4 | |
| 5 | Installation Information |
Felipe Monteiro | 7bc35dc | 2017-04-19 21:11:46 +0100 | [diff] [blame] | 6 | ======================== |
DavidPurcell | 663aedf | 2017-01-03 10:01:14 -0500 | [diff] [blame] | 7 | |
| 8 | At the command line:: |
| 9 | |
Felipe Monteiro | 7942336 | 2017-06-01 21:53:03 +0100 | [diff] [blame] | 10 | $ git clone http://git.openstack.org/openstack/patrole |
Felipe Monteiro | 7bc35dc | 2017-04-19 21:11:46 +0100 | [diff] [blame] | 11 | $ sudo pip install patrole |
DavidPurcell | 663aedf | 2017-01-03 10:01:14 -0500 | [diff] [blame] | 12 | |
| 13 | Or, if you have virtualenvwrapper installed:: |
| 14 | |
| 15 | $ mkvirtualenv patrole |
Felipe Monteiro | 7bc35dc | 2017-04-19 21:11:46 +0100 | [diff] [blame] | 16 | $ sudo pip install patrole |
DavidPurcell | 663aedf | 2017-01-03 10:01:14 -0500 | [diff] [blame] | 17 | |
DavidPurcell | 45bc1a6 | 2017-01-19 17:21:27 -0500 | [diff] [blame] | 18 | Or to install from the source:: |
| 19 | |
| 20 | $ navigate to patrole directory |
Felipe Monteiro | 7bc35dc | 2017-04-19 21:11:46 +0100 | [diff] [blame] | 21 | $ sudo pip install -e . |
DavidPurcell | 45bc1a6 | 2017-01-19 17:21:27 -0500 | [diff] [blame] | 22 | |
Felipe Monteiro | 7942336 | 2017-06-01 21:53:03 +0100 | [diff] [blame] | 23 | DevStack Installation |
| 24 | ===================== |
| 25 | |
| 26 | Patrole can be installed like any other DevStack plugin by including the |
| 27 | ``install_plugin`` directive inside local.conf:: |
| 28 | |
| 29 | [[local|localrc]] |
| 30 | ... |
| 31 | |
| 32 | enable_plugin patrole git://git.openstack.org/openstack/patrole |
| 33 | |
DavidPurcell | 663aedf | 2017-01-03 10:01:14 -0500 | [diff] [blame] | 34 | Configuration Information |
Felipe Monteiro | 7bc35dc | 2017-04-19 21:11:46 +0100 | [diff] [blame] | 35 | ========================= |
DavidPurcell | 663aedf | 2017-01-03 10:01:14 -0500 | [diff] [blame] | 36 | |
| 37 | tempest.conf |
| 38 | ++++++++++++ |
| 39 | |
Felipe Monteiro | 652e2a2 | 2017-01-25 16:44:02 -0500 | [diff] [blame] | 40 | To run the RBAC tempest api test, you have to make the following changes to |
DavidPurcell | 663aedf | 2017-01-03 10:01:14 -0500 | [diff] [blame] | 41 | the tempest.conf file. |
| 42 | |
Felipe Monteiro | 7bc35dc | 2017-04-19 21:11:46 +0100 | [diff] [blame] | 43 | #. ``auth`` section updates :: |
DavidPurcell | 663aedf | 2017-01-03 10:01:14 -0500 | [diff] [blame] | 44 | |
Felipe Monteiro | 7bc35dc | 2017-04-19 21:11:46 +0100 | [diff] [blame] | 45 | # Allows test cases to create/destroy projects and users. This option |
| 46 | # requires that OpenStack Identity API admin credentials are known. If |
| 47 | # false, isolated test cases and parallel execution, can still be |
| 48 | # achieved configuring a list of test accounts (boolean value) |
| 49 | use_dynamic_credentials = True |
DavidPurcell | 663aedf | 2017-01-03 10:01:14 -0500 | [diff] [blame] | 50 | |
Felipe Monteiro | 7bc35dc | 2017-04-19 21:11:46 +0100 | [diff] [blame] | 51 | #. ``rbac`` section updates :: |
DavidPurcell | 663aedf | 2017-01-03 10:01:14 -0500 | [diff] [blame] | 52 | |
Felipe Monteiro | 7bc35dc | 2017-04-19 21:11:46 +0100 | [diff] [blame] | 53 | # The role that you want the RBAC tests to use for RBAC testing |
| 54 | # This needs to be edited to run the test as a different role. |
| 55 | rbac_test_role = _member_ |
DavidPurcell | 45bc1a6 | 2017-01-19 17:21:27 -0500 | [diff] [blame] | 56 | |
Felipe Monteiro | 7bc35dc | 2017-04-19 21:11:46 +0100 | [diff] [blame] | 57 | # Enables RBAC Tempest tests if set to True. Otherwise, they are |
| 58 | # skipped. |
| 59 | enable_rbac = True |
Samantha Blanco | 0d88008 | 2017-03-23 18:14:37 -0400 | [diff] [blame] | 60 | |
Felipe Monteiro | 7bc35dc | 2017-04-19 21:11:46 +0100 | [diff] [blame] | 61 | # If set to true, tests throw a RbacParsingException for policies |
| 62 | # not found in the policy.json. Otherwise, they throw a |
| 63 | # skipException. |
| 64 | strict_policy_check = False |
Samantha Blanco | 85f79d7 | 2017-04-21 11:09:14 -0400 | [diff] [blame] | 65 | |
| 66 | # The following config options set the location of the service's |
| 67 | # policy file. For services that have their policy in code (e.g., |
| 68 | # Nova), this would be the location of a custom policy.json, if |
| 69 | # one exists. |
| 70 | cinder_policy_file = /etc/cinder/policy.json |
| 71 | glance_policy_file = /etc/glance/policy.json |
| 72 | keystone_policy_file = /etc/keystone/policy.json |
| 73 | neutron_policy_file = /etc/neutron/policy.json |
| 74 | nova_policy_file = /etc/nova/policy.json |