Merge "Handle identity.protocol" into release/2019.2.0
diff --git a/octavia/files/ocata/octavia_api.conf b/octavia/files/ocata/octavia_api.conf
index 38bed3c..55d9dd4 100644
--- a/octavia/files/ocata/octavia_api.conf
+++ b/octavia/files/ocata/octavia_api.conf
@@ -943,7 +943,7 @@
 # because normal end users may not be  able to reach that endpoint. (string
 # value)
 #auth_uri = <None>
-auth_uri=http://{{ api.identity.host }}:5000
+auth_uri={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:5000
 
 # API version of the admin Identity API endpoint. (string value)
 #auth_version = <None>
@@ -1966,7 +1966,7 @@
 
 # Authentication URL (string value)
 #auth_url = <None>
-auth_url=http://{{ api.identity.host }}:35357
+auth_url={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:35357
 
 # Authentication type to load (string value)
 # Deprecated group/name - [service_auth]/auth_plugin
diff --git a/octavia/files/ocata/octavia_manager.conf b/octavia/files/ocata/octavia_manager.conf
index a226cd6..4a30eac 100644
--- a/octavia/files/ocata/octavia_manager.conf
+++ b/octavia/files/ocata/octavia_manager.conf
@@ -976,7 +976,7 @@
 # because normal end users may not be  able to reach that endpoint. (string
 # value)
 #auth_uri = <None>
-auth_uri=http://{{ manager.identity.host }}:5000
+auth_uri={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:5000
 
 # API version of the admin Identity API endpoint. (string value)
 #auth_version = <None>
@@ -1999,7 +1999,7 @@
 
 # Authentication URL (string value)
 #auth_url = <None>
-auth_url=http://{{ manager.identity.host }}:35357
+auth_url={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:35357
 
 # Authentication type to load (string value)
 # Deprecated group/name - [service_auth]/auth_plugin
diff --git a/octavia/files/pike/octavia_api.conf b/octavia/files/pike/octavia_api.conf
index d63a1b3..9a70770 100644
--- a/octavia/files/pike/octavia_api.conf
+++ b/octavia/files/pike/octavia_api.conf
@@ -958,7 +958,7 @@
 # value)
 # The auth_uri is the public endpoint and is returned in headers on a 401
 #auth_uri = <None>
-auth_uri=http://{{ api.identity.host }}:5000
+auth_uri={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:5000
 
 # The auth_url is the admin endpoint actually used for validating tokens
 #auth_url = <None>
@@ -1990,7 +1990,7 @@
 
 # Authentication URL (string value)
 #auth_url = <None>
-auth_url=http://{{ api.identity.host }}:35357
+auth_url={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:35357
 
 # Authentication type to load (string value)
 # Deprecated group/name - [service_auth]/auth_plugin
diff --git a/octavia/files/pike/octavia_manager.conf b/octavia/files/pike/octavia_manager.conf
index f4d4dae..60e181c 100644
--- a/octavia/files/pike/octavia_manager.conf
+++ b/octavia/files/pike/octavia_manager.conf
@@ -1005,7 +1005,7 @@
 # because normal end users may not be  able to reach that endpoint. (string
 # value)
 #auth_uri = <None>
-auth_uri=http://{{ manager.identity.host }}:5000
+auth_uri={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:5000
 
 # The auth_url is the admin endpoint actually used for validating tokens
 #auth_url = <None>
@@ -2037,7 +2037,7 @@
 
 # Authentication URL (string value)
 #auth_url = <None>
-auth_url=http://{{ manager.identity.host }}:35357
+auth_url={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:35357
 
 # Authentication type to load (string value)
 # Deprecated group/name - [service_auth]/auth_plugin
diff --git a/octavia/files/queens/octavia_api.conf b/octavia/files/queens/octavia_api.conf
index da6465f..ce95dcd 100644
--- a/octavia/files/queens/octavia_api.conf
+++ b/octavia/files/queens/octavia_api.conf
@@ -805,7 +805,7 @@
 
 # The auth_url is the admin endpoint actually used for validating tokens
 #auth_url = <None>
-auth_url=http://{{ api.identity.host }}:35357
+auth_url={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:35357
 
 {%- set _data = api.identity %}
 {%- set auth_type = _data.get('auth_type', 'password') %}
@@ -999,7 +999,7 @@
 
 # Authentication URL (string value)
 #auth_url = <None>
-auth_url=http://{{ api.identity.host }}:35357
+auth_url={{ api.identity.get('protocol', 'http') }}://{{ api.identity.host }}:35357
 
 # Authentication type to load (string value)
 # Deprecated group/name - [service_auth]/auth_plugin
diff --git a/octavia/files/queens/octavia_manager.conf b/octavia/files/queens/octavia_manager.conf
index 349270e..0e558e8 100644
--- a/octavia/files/queens/octavia_manager.conf
+++ b/octavia/files/queens/octavia_manager.conf
@@ -847,11 +847,11 @@
 # value)
 # The www_authenticate_uri is the public endpoint and is returned in headers on a 401
 # auth_uri = https://localhost:5000/v3	# www_authenticate_uri
-auth_uri=http://{{ manager.identity.host }}:5000/v3
+auth_uri={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:5000/v3
 
 # The auth_url is the admin endpoint actually used for validating tokens
 #auth_url = <None>
-auth_url=http://{{ manager.identity.host }}:35357
+auth_url={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:35357
 
 {%- set _data = manager.identity %}
 {%- set auth_type = _data.get('auth_type', 'password') %}
@@ -1045,7 +1045,7 @@
 
 # Authentication URL (string value)
 #auth_url = <None>
-auth_url=http://{{ manager.identity.host }}:35357
+auth_url={{ manager.identity.get('protocol', 'http') }}://{{ manager.identity.host }}:35357
 
 # Authentication type to load (string value)
 # Deprecated group/name - [service_auth]/auth_plugin