]> git.apps.os.sepia.ceph.com Git - ceph-ci.git/commitdiff
qa/rgw: use config overrides for barbican kms backend
authorCasey Bodley <cbodley@redhat.com>
Tue, 15 Oct 2019 15:12:10 +0000 (11:12 -0400)
committerCasey Bodley <cbodley@redhat.com>
Tue, 15 Oct 2019 15:30:18 +0000 (11:30 -0400)
except for the barbican endpoint, which isn't known until the barbican
task runs

Signed-off-by: Casey Bodley <cbodley@redhat.com>
qa/suites/rgw/crypt/2-kms/barbican.yaml
qa/tasks/barbican.py
qa/tasks/rgw.py

index 48248943d1110f3063f5006021517918f53f80a4..a84a1627bfb91f3adafa6526324708a380100f41 100644 (file)
@@ -1,4 +1,11 @@
 overrides:
+  ceph:
+    conf:
+      client:
+        rgw crypt s3 kms backend: barbican
+        rgw keystone barbican tenant: rgwcrypt
+        rgw keystone barbican user: rgwcrypt-user
+        rgw keystone barbican password: rgwcrypt-pass
   rgw:
     client.0:
       use-keystone-role: client.0
index 0b54cbddc702e1036172e5db7f6c809295175aec..62fc06371ded8961dfcf83aaaf8706c7b702b7b4 100644 (file)
@@ -245,11 +245,6 @@ def create_secrets(ctx, config):
     (cclient, cconfig) = config.items()[0]
 
     rgw_user = cconfig['rgw_user']
-    ctx.barbican.token[cclient] = {
-        "username": rgw_user["username"],
-        "password": rgw_user["password"],
-        "tenant": rgw_user["tenantName"]
-    }
 
     keystone_role = cconfig.get('use-keystone-role', None)
     keystone_host, keystone_port = ctx.keystone.public_endpoints[keystone_role]
@@ -504,7 +499,6 @@ def task(ctx, config):
 
     ctx.barbican = argparse.Namespace()
     ctx.barbican.endpoints = assign_ports(ctx, config, 9311)
-    ctx.barbican.token = {}
     ctx.barbican.keys = {}
     
     with contextutil.nested(
index f5648733a64b619e055e62a033fb3e61bbcef237..46beda900eab8893e9c1ce43fa4cdc556cb5d20d 100644 (file)
@@ -131,15 +131,6 @@ def start_rgw(ctx, config, clients):
                 'http://{bhost}:{bport}'.format(bhost=barbican_host,
                                                 bport=barbican_port),
                 ])
-
-            log.info("Barbican access data: %s",ctx.barbican.token[barbican_role])
-            access_data = ctx.barbican.token[barbican_role]
-            rgw_cmd.extend([
-                '--rgw_crypt_s3_kms_backend', 'barbican',
-                '--rgw_keystone_barbican_user', access_data['username'],
-                '--rgw_keystone_barbican_password', access_data['password'],
-                '--rgw_keystone_barbican_tenant', access_data['tenant'],
-                ])
         elif vault_role is not None:
             if not ctx.vault.root_token:
                 raise ConfigError('vault: no "root_token" specified')