1616Configuration
1717*************
1818
19- Caso configuration
19+ cASO configuration
2020==================
2121
22- caso uses a config file (default at ``/etc/caso/caso.conf ``) with several
22+ `` cASO `` uses a config file (default at ``/etc/caso/caso.conf ``) with several
2323sections. A sample file is available at ``etc/caso/caso.conf.sample ``.
2424
2525``[DEFAULT] `` section
2626---------------------
2727
28- The ``[DEFAULT] `` section configures the basic behavior of caso . The sample
28+ The ``[DEFAULT] `` section configures the basic behavior of `` cASO `` . The sample
2929config file (``/etc/caso/caso.conf.sample ``) includes a description
3030of every option. You should check at least the following options:
3131
@@ -45,16 +45,38 @@ of every option. You should check at least the following options:
4545-----------------------
4646
4747This section specifies the configuration of the extractor (mainly the
48- credentials to connect to the API. Check the following:
48+ credentials to connect to the API) . Check the following:
4949
5050* ``user `` (default: ``accounting ``), name of the user. This user needs proper
5151 permission to query the API for the tenant usages.
5252* ``password `` (default: None), password of the user.
5353* ``endpoint `` (default: None), keystone endpoint to authenticate with.
5454* ``mapping_file `` (default: ``/etc/caso/voms.json ``). File containing the
5555 mapping from VOs to local tenants as configured in Keystone-VOMS. If
56- you are running caso on keystone host, it likely
56+ you are running `` cASO `` on keystone host, it likely
5757 is ``/etc/keystone/voms.json ``. Otherwise, you have to sync this file.
58+ * ``insecure `` (default: ``False ``), wether to check or not the server's
59+ certificate.
60+
61+ .. important ::
62+ Your should not use ``insecure=True `` in production! If you get a SSL
63+ error ( ``CERTIFICATE_VERIFY_FAILED ``), this is probably due to the fact
64+ that the request module CA bundle does not contain the CA of your server.
65+
66+ If you are using the request module of your distribution package, it is
67+ normally patched to use the system's default CA bundle
68+ (``/etc/ssl/certs/ca-certificates.crt `` from the ``ca-certificates ``
69+ package on Debian systems and ``/etc/pki/tls/certs/ca-bundle.crt `` from the
70+ ``ca-certificates``on RH systems). Check the packages documentation to add a
71+ new CA to those bundles.
72+
73+ If you are not installing request through the distribution packages (e.g.
74+ via pip), it uses its own vendorized CA bundle, located in the distribution
75+ directory (i.e. requests/cacert.pem). It should be enough to append the
76+ correct certificates to the end of the cacert.pem file. In a virtualenv,
77+ the bundle should be located at
78+ ``$VIRTUAL_ENV/lib/python2.7/site-packages/requests/ ``
79+
5880
5981``[ssm] `` section
6082-----------------
@@ -81,7 +103,7 @@ OpenStack Configuration
81103The user configured in the previous section has to be a member of each of the
82104tenants (another option is to convert that user in an administrator, but the
83105former option is a safer approach) for which it is extracting the accounting.
84- Otherwise, ``caso `` will not be able to get the usages and will fail::
106+ Otherwise, ``cASO `` will not be able to get the usages and will fail::
85107
86108 keystone role-create --name accounting
87109 keystone user-create --name accounting --pass <password>
0 commit comments