Merge "Handle identity.protocol" into release/2019.2.0
diff --git a/octavia/files/ocata/octavia_api.conf b/octavia/files/ocata/octavia_api.conf
index 38bed3c..55d9dd4 100644
--- a/octavia/files/ocata/octavia_api.conf
+++ b/octavia/files/ocata/octavia_api.conf
@@ -943,7 +943,7 @@
# because normal end users may not be able to reach that endpoint. (string
# value)
#auth_uri = <None>
-auth_uri=http://{{ api.identity.host }}:5000
+auth_uri={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:5000
# API version of the admin Identity API endpoint. (string value)
#auth_version = <None>
@@ -1966,7 +1966,7 @@
# Authentication URL (string value)
#auth_url = <None>
-auth_url=http://{{ api.identity.host }}:35357
+auth_url={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:35357
# Authentication type to load (string value)
# Deprecated group/name - [service_auth]/auth_plugin
diff --git a/octavia/files/ocata/octavia_manager.conf b/octavia/files/ocata/octavia_manager.conf
index a226cd6..4a30eac 100644
--- a/octavia/files/ocata/octavia_manager.conf
+++ b/octavia/files/ocata/octavia_manager.conf
@@ -976,7 +976,7 @@
# because normal end users may not be able to reach that endpoint. (string
# value)
#auth_uri = <None>
-auth_uri=http://{{ manager.identity.host }}:5000
+auth_uri={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:5000
# API version of the admin Identity API endpoint. (string value)
#auth_version = <None>
@@ -1999,7 +1999,7 @@
# Authentication URL (string value)
#auth_url = <None>
-auth_url=http://{{ manager.identity.host }}:35357
+auth_url={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:35357
# Authentication type to load (string value)
# Deprecated group/name - [service_auth]/auth_plugin
diff --git a/octavia/files/pike/octavia_api.conf b/octavia/files/pike/octavia_api.conf
index d63a1b3..9a70770 100644
--- a/octavia/files/pike/octavia_api.conf
+++ b/octavia/files/pike/octavia_api.conf
@@ -958,7 +958,7 @@
# value)
# The auth_uri is the public endpoint and is returned in headers on a 401
#auth_uri = <None>
-auth_uri=http://{{ api.identity.host }}:5000
+auth_uri={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:5000
# The auth_url is the admin endpoint actually used for validating tokens
#auth_url = <None>
@@ -1990,7 +1990,7 @@
# Authentication URL (string value)
#auth_url = <None>
-auth_url=http://{{ api.identity.host }}:35357
+auth_url={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:35357
# Authentication type to load (string value)
# Deprecated group/name - [service_auth]/auth_plugin
diff --git a/octavia/files/pike/octavia_manager.conf b/octavia/files/pike/octavia_manager.conf
index f4d4dae..60e181c 100644
--- a/octavia/files/pike/octavia_manager.conf
+++ b/octavia/files/pike/octavia_manager.conf
@@ -1005,7 +1005,7 @@
# because normal end users may not be able to reach that endpoint. (string
# value)
#auth_uri = <None>
-auth_uri=http://{{ manager.identity.host }}:5000
+auth_uri={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:5000
# The auth_url is the admin endpoint actually used for validating tokens
#auth_url = <None>
@@ -2037,7 +2037,7 @@
# Authentication URL (string value)
#auth_url = <None>
-auth_url=http://{{ manager.identity.host }}:35357
+auth_url={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:35357
# Authentication type to load (string value)
# Deprecated group/name - [service_auth]/auth_plugin
diff --git a/octavia/files/queens/octavia_api.conf b/octavia/files/queens/octavia_api.conf
index da6465f..ce95dcd 100644
--- a/octavia/files/queens/octavia_api.conf
+++ b/octavia/files/queens/octavia_api.conf
@@ -805,7 +805,7 @@
# The auth_url is the admin endpoint actually used for validating tokens
#auth_url = <None>
-auth_url=http://{{ api.identity.host }}:35357
+auth_url={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:35357
{%- set _data = api.identity %}
{%- set auth_type = _data.get('auth_type', 'password') %}
@@ -999,7 +999,7 @@
# Authentication URL (string value)
#auth_url = <None>
-auth_url=http://{{ api.identity.host }}:35357
+auth_url={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:35357
# Authentication type to load (string value)
# Deprecated group/name - [service_auth]/auth_plugin
diff --git a/octavia/files/queens/octavia_manager.conf b/octavia/files/queens/octavia_manager.conf
index 349270e..0e558e8 100644
--- a/octavia/files/queens/octavia_manager.conf
+++ b/octavia/files/queens/octavia_manager.conf
@@ -847,11 +847,11 @@
# value)
# The www_authenticate_uri is the public endpoint and is returned in headers on a 401
# auth_uri = https://localhost:5000/v3 # www_authenticate_uri
-auth_uri=http://{{ manager.identity.host }}:5000/v3
+auth_uri={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:5000/v3
# The auth_url is the admin endpoint actually used for validating tokens
#auth_url = <None>
-auth_url=http://{{ manager.identity.host }}:35357
+auth_url={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:35357
{%- set _data = manager.identity %}
{%- set auth_type = _data.get('auth_type', 'password') %}
@@ -1045,7 +1045,7 @@
# Authentication URL (string value)
#auth_url = <None>
-auth_url=http://{{ manager.identity.host }}:35357
+auth_url={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:35357
# Authentication type to load (string value)
# Deprecated group/name - [service_auth]/auth_plugin