Don't create admin user if there is LDAP backend set to read_only
Change-Id: I907ef638f87b2e497cb5c0af3d9a1ffdefb97a23
diff --git a/keystone/server.sls b/keystone/server.sls
index e330933..1548796 100644
--- a/keystone/server.sls
+++ b/keystone/server.sls
@@ -334,6 +334,8 @@
- require:
- keystone: keystone_service_tenant
+{%- if not server.get('ldap', {}).get('read_only', False) %}
+
keystone_admin_user:
keystone.user_present:
- name: {{ server.admin_name }}
@@ -351,6 +353,8 @@
{%- endif %}
+{%- endif %}
+
{%- for service_name, service in server.get('service', {}).iteritems() %}
keystone_{{ service_name }}_service: