This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
nova-rdp [2013/12/23 02:36] admin |
nova-rdp [2014/06/12 19:37] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Nova RDP Support====== | + | ====== Nova RDP Support |
- | Nova currently provides support for [[http:// | + | Nova currently provides support for [[http:// |
- | ===== Getting | + | [[http:// |
- | Nova includes internally the required proxy solutions for VNC (novnc, xvpvnc) and SPICE, but this is not the case for RDP. Beside that, it's also desirable to leave third party the ability to choose a custom graphical console UI solution not necessarily included with Nova. | ||
- | In order to allow external tools to access graphical console protocol connection details, a public API has been provided. | + | ---- |
+ | ===== Configuring Nova for RDP support ===== | ||
+ | RDP console configuration is quite straightforward. All you need to do is to add the following configuration settings in your Hyper-V compute node's **nova.conf**: | ||
- | ==== Get console connection info: V2 API ==== | + | [rdp] |
+ | enabled=True | ||
+ | html5_proxy_base_url=http:// | ||
+ | |||
+ | Where the url specified in the **html5_proxy_base_url** setting is provided by the FreeRDP HTML5 proxy as detailed in the next section. | ||
- | ^Verb ^URI ^Description ^ | + | ===== Installing and configuring |
- | |GET |/ | + | |
- | Normal Response Code(s): 200 | + | The FreeRDP HTML5 proxy can be installed on various Linux distributions |
- | Error Response Code(s): badRequest (400), unauthorized (401), itemNotFound (404) | + | ==== Ubuntu 12.04 and above ==== |
+ | A shell script is provided to simplify the installation of the application and the dependencies, | ||
- | ==== Example. Get console connection request: XML ==== | + | sudo apt-get install -y git |
+ | git clone https:// | ||
+ | cd FreeRDP-WebConnect | ||
+ | sudo ./setup_all.sh -f -i | ||
+ | |||
+ | At this point the proxy, called **wsgate** can be installed by running: | ||
- | <code xml> | + | sudo make install |
- | <?xml version=" | + | |
- | < | + | |
- | </ | + | |
- | ==== Example. Get console connection request: JSON ==== | + | ==== wsgate configuration |
- | <code javascript> | + | The default configuration file is located here: |
- | { | + | |
- | " | + | |
- | } | + | |
- | </ | + | |
- | ==== Example. Get console connection response: XML ==== | + | / |
+ | |||
+ | Change the following options to match your environment configuration: | ||
- | <code xml> | + | [global] |
- | <?xml version=' | + | port = 8000 |
- | < | + | |
- | | + | |
- | < | + | |
- | <port> | + | |
- | < | + | |
- | </ | + | |
- | </ | + | |
- | ==== Example. Get console connection response: JSON ==== | + | Note: make sure to open the port in your operating system firewall. |
- | <code javascript> | + | [openstack] |
- | { | + | |
- | | + | |
- | " | + | |
- | " | + | |
- | " | + | |
- | " | + | |
- | | + | |
- | } | + | |
- | </ | + | |
- | ==== Get console connection info: V3 API ==== | + | [hyperv] |
+ | # Credentials used to connect to the Hyper-V hosts when accessing | ||
+ | # OpenStack instances consoles | ||
- | ^Verb ^URI ^Description ^ | + | hostusername = Administrator |
- | |GET |/ | + | |
- | Normal Response Code(s): 200 | + | It is also strongly recommended to encrypt the traffic using HTTPS. Here are the relevant parameters, including a PEM file containing both the certificate and the private key. |
- | Error Response Code(s): badRequest (400), unauthorized (401), itemNotFound (404) | + | [ssl] |
+ | port = 4430 | ||
+ | certfile = / | ||
+ | certpass = verysecret | ||
- | ==== Example. Get console connection request: XML ==== | + | HTML, CSS and Javascript files are available at the following location for further customization: |
- | <code xml> | + | |
- | <?xml version=" | + | |
- | < | + | |
- | </code> | + | |
- | ==== Example. Get console connection request: JSON ==== | + | ==== Running wsgate |
+ | |||
+ | wsgate can be executed as a demon with the following instruction: | ||
- | <code javascript> | + | wsgate -c /usr/ |
- | { | + | |
- | " | + | |
- | } | + | |
- | </code> | + | |
- | + | ||
- | ==== Example. Get console connection response: XML ==== | + | |
- | + | ||
- | Same output as in the [[nova-rdp# | + | |
- | + | ||
- | ==== Example. Get console connection response: JSON ==== | + | |
- | + | ||
- | Same output as in the [[nova-rdp# | + | |
+ | In case you should prefer to execute wsgate in a shell for debugging purposes, just set: | ||
+ | [global] | ||
+ | daemon = false | ||