716f0feb2f
It provides an easy to exploit DoS opportunity. Change-Id: I3839e9930511ff2d3a6b69bef5ae898d92a21ff1
30 lines
947 B
Django/Jinja
30 lines
947 B
Django/Jinja
# {{ ansible_managed }}
|
|
[DEFAULT]
|
|
|
|
debug = {{ keystone.debug | bool }}
|
|
transport_url = amqp://{{ keystone.message_queue.username }}:{{ keystone.message_queue.password }}@{{ keystone.message_queue.host }}:{{ keystone.message_queue.port | default('5672') }}/
|
|
|
|
[auth]
|
|
|
|
methods = password,token
|
|
|
|
{% if enable_cors | bool == true %}
|
|
[cors]
|
|
allowed_origin = {{ cors_allowed_origin | default('allowed_origin=http://localhost:8000') }}
|
|
allow_credentials = {{ enable_cors_credential_support | default('true') }}
|
|
{% endif %}
|
|
|
|
[database]
|
|
|
|
connection = mysql+pymysql://{{ keystone.database.username }}:{{ keystone.database.password }}@{{ keystone.database.host }}/{{ keystone.database.name }}?charset=utf8
|
|
use_db_reconnect = true
|
|
|
|
[security_compliance]
|
|
{% if keystone_lockout_security_attempts > 0 %}
|
|
lockout_failure_attempts = {{ keystone_lockout_security_attempts }}
|
|
lockout_duration = {{ keystone_lockout_duration }}
|
|
{% endif %}
|
|
|
|
[token]
|
|
provider = fernet
|