Don't create admin user if there is LDAP backend set to read_only

Change-Id: I907ef638f87b2e497cb5c0af3d9a1ffdefb97a23
diff --git a/keystone/server.sls b/keystone/server.sls
index e330933..1548796 100644
--- a/keystone/server.sls
+++ b/keystone/server.sls
@@ -334,6 +334,8 @@
   - require:
     - keystone: keystone_service_tenant
 
+{%- if not server.get('ldap', {}).get('read_only', False) %}
+
 keystone_admin_user:
   keystone.user_present:
   - name: {{ server.admin_name }}
@@ -351,6 +353,8 @@
 
 {%- endif %}
 
+{%- endif %}
+
 {%- for service_name, service in server.get('service', {}).iteritems() %}
 
 keystone_{{ service_name }}_service: