1 # Copyright (C) 2021-2022 Wind River Systems, Inc.
3 # Licensed under the Apache License, Version 2.0 (the "License");
4 # you may not use this file except in compliance with the License.
5 # You may obtain a copy of the License at
7 # http://www.apache.org/licenses/LICENSE-2.0
9 # Unless required by applicable law or agreed to in writing, software
10 # distributed under the License is distributed on an "AS IS" BASIS,
11 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 # See the License for the specific language governing permissions and
13 # limitations under the License.
17 from urllib.parse import urlparse
19 from o2common import config
20 from o2common.helper import o2logging
21 logger = o2logging.get_logger(__name__)
24 _DEFAULT_DCMANAGER_URL = "http://192.168.204.1:8119/v1.0"
25 _DEFAULT_STX_URL = "http://192.168.204.1:5000/v3"
28 def get_config_path():
29 path = os.environ.get("O2APP_CONFIG", "/configs/o2app.conf")
33 def get_smo_ca_config_path():
34 path = os.environ.get("SMO_CA_CONFIG", "/configs/smoca.crt")
38 def get_postgres_uri():
39 # host = os.environ.get("DB_HOST", "localhost")
40 # port = 54321 if host == "localhost" else 5432
43 password = os.environ.get("DB_PASSWORD", "o2ims123")
44 user, db_name = "o2ims", "o2ims"
45 return f"postgresql://{user}:{password}@{host}:{port}/{db_name}"
49 # host_interal = os.environ.get("API_HOST", "localhost")
50 host_interal = "localhost"
51 host_external = os.environ.get("API_HOST_EXTERNAL_FLOATING")
52 if config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING is not None and \
53 config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING != '':
54 host_external = config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING
55 host = host_interal if host_external is None or host_external == '' \
58 port_internal = 5005 if host == "localhost" else 80
60 port = port_internal if host_external is None or host_external == '' \
62 return f"https://{host}:{port}"
65 def get_root_api_base():
69 def get_o2ims_api_base():
70 return get_root_api_base() + 'o2ims-infrastructureInventory'
73 def get_o2ims_monitoring_api_base():
74 return get_root_api_base() + 'o2ims-infrastructureMonitoring'
77 def get_o2dms_api_base():
78 return get_root_api_base() + "o2dms/v1"
81 def get_redis_host_and_port():
82 # host = os.environ.get("REDIS_HOST", "localhost")
83 # port = 63791 if host == "localhost" else 6379
86 return dict(host=host, port=port)
89 def get_smo_o2endpoint():
90 smo_o2endpoint = os.environ.get(
91 "SMO_O2_ENDPOINT", "http://localhost/smo_sim")
95 def get_stx_client_args():
97 auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
98 username=os.environ.get('OS_USERNAME', "admin"),
99 api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
100 project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
102 if config.conf.OCLOUD.OS_AUTH_URL is not None and \
103 config.conf.OCLOUD.OS_AUTH_URL != '':
104 client_args['auth_url'] = config.conf.OCLOUD.OS_AUTH_URL
105 if config.conf.OCLOUD.OS_USERNAME is not None and \
106 config.conf.OCLOUD.OS_USERNAME != '':
107 client_args['username'] = config.conf.OCLOUD.OS_USERNAME
108 if config.conf.OCLOUD.OS_PASSWORD is not None and \
109 config.conf.OCLOUD.OS_PASSWORD != '':
110 client_args['api_key'] = config.conf.OCLOUD.OS_PASSWORD
111 if config.conf.OCLOUD.OS_PROJECT_NAME is not None and \
112 config.conf.OCLOUD.OS_PROJECT_NAME != '':
113 client_args['project_name'] = config.conf.OCLOUD.OS_PROJECT_NAME
117 def get_stx_access_info(region_name="RegionOne", subcloud_hostname: str = "",
118 sub_is_https: bool = False):
119 # authurl = os.environ.get("STX_AUTH_URL", "http://192.168.204.1:5000/v3")
120 # username = os.environ.get("STX_USERNAME", "admin")
121 # pswd = os.environ.get("STX_PASSWORD", "passwd1")
122 # stx_access_info = (authurl, username, pswd)
124 # client_args = dict(
125 # auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
126 # username=os.environ.get('OS_USERNAME', "admin"),
127 # api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
128 # project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
130 client_args = get_stx_client_args()
132 logger.error('Please source your RC file before execution, '
133 'e.g.: `source ~/downloads/admin-rc.sh`')
137 for key, val in client_args.items():
138 os_client_args['os_{key}'.format(key=key)] = val
139 if "" != subcloud_hostname:
140 orig_auth_url = urlparse(_DEFAULT_STX_URL)
141 new_auth_url = orig_auth_url._replace(
142 netloc=orig_auth_url.netloc.replace(
143 orig_auth_url.hostname, subcloud_hostname))
144 # new_auth_url = new_auth_url._replace(
145 # netloc=new_auth_url.netloc.replace(str(new_auth_url.port),
148 new_auth_url = new_auth_url._replace(
149 scheme=new_auth_url.scheme.
150 replace(new_auth_url.scheme, 'https'))
151 os_client_args['insecure'] = True
152 os_client_args['os_auth_url'] = new_auth_url.geturl()
153 os_client_args['os_endpoint_type'] = 'public'
154 # os_client_args['system_url'] = os_client_args['os_auth_url']
155 os_client_args['os_password'] = os_client_args.pop('os_api_key')
156 os_client_args['os_region_name'] = region_name
157 os_client_args['api_version'] = 1
158 # os_client_args['user_domain_name'] = 'Default'
159 # os_client_args['project_domain_name'] = 'Default'
160 return os_client_args
163 def get_dc_access_info():
165 # client_args = dict(
166 # auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
167 # username=os.environ.get('OS_USERNAME', "admin"),
168 # api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
169 # project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
171 client_args = get_stx_client_args()
173 logger.error('Please source your RC file before execution, '
174 'e.g.: `source ~/downloads/admin-rc.sh`')
178 for key, val in client_args.items():
179 os_client_args['os_{key}'.format(key=key)] = val
180 auth_url = urlparse(os_client_args.pop('os_auth_url'))
181 dcmanager_url = urlparse(_DEFAULT_DCMANAGER_URL)
182 dcmanager_url = dcmanager_url._replace(netloc=dcmanager_url.netloc.replace(
183 dcmanager_url.hostname, auth_url.hostname))
185 os_client_args['dcmanager_url'] = dcmanager_url.geturl()
186 os_client_args['auth_url'] = auth_url.geturl()
187 os_client_args['username'] = os_client_args.pop('os_username')
188 os_client_args['api_key'] = os_client_args.pop('os_api_key')
189 os_client_args['project_name'] = os_client_args.pop('os_project_name')
190 os_client_args['user_domain_name'] = 'Default'
191 os_client_args['project_domain_name'] = 'Default'
193 return os_client_args
196 def get_fm_access_info(subcloud_hostname: str = "",
197 sub_is_https: bool = False):
199 # client_args = dict(
200 # auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
201 # username=os.environ.get('OS_USERNAME', "admin"),
202 # api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
203 # project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
205 client_args = get_stx_client_args()
207 logger.error('Please source your RC file before execution, '
208 'e.g.: `source ~/downloads/admin-rc.sh`')
212 for key, val in client_args.items():
213 os_client_args['os_{key}'.format(key=key)] = val
215 auth_url = urlparse(os_client_args.pop('os_auth_url'))
216 os_client_args['auth_url'] = auth_url.geturl()
218 if "" != subcloud_hostname:
219 orig_auth_url = urlparse(_DEFAULT_STX_URL)
220 new_auth_url = orig_auth_url._replace(
221 netloc=orig_auth_url.netloc.replace(
222 orig_auth_url.hostname, subcloud_hostname))
224 new_auth_url = new_auth_url._replace(
225 scheme=new_auth_url.scheme.
226 replace(new_auth_url.scheme, 'https'))
227 os_client_args['auth_url'] = new_auth_url.geturl()
228 os_client_args['endpoint_type'] = 'publicURL'
230 os_client_args['insecure'] = True
232 os_client_args['username'] = os_client_args.pop('os_username')
233 os_client_args['password'] = os_client_args.pop('os_api_key')
234 os_client_args['project_name'] = os_client_args.pop('os_project_name')
235 os_client_args['user_domain_name'] = 'Default'
236 os_client_args['project_domain_name'] = 'Default'
238 return os_client_args
241 def get_k8s_api_endpoint():
242 K8S_KUBECONFIG = os.environ.get("K8S_KUBECONFIG", None)
243 K8S_APISERVER = os.environ.get("K8S_APISERVER", None)
244 K8S_TOKEN = os.environ.get("K8S_TOKEN", None)
245 return K8S_KUBECONFIG, K8S_APISERVER, K8S_TOKEN
249 return '/usr/local/bin/helm'
252 def get_system_controller_as_respool():
256 def gen_k8s_config_dict(cluster_api_endpoint, cluster_ca_cert, admin_user,
257 admin_client_cert, admin_client_key):
258 # KUBECONFIG environment variable
260 # https://kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/
267 cluster_api_endpoint,
268 'certificate-authority-data':
271 'name': 'inf-cluster'
276 'cluster': 'inf-cluster',
277 'user': 'kubernetes-admin'
279 'name': 'kubernetes-admin@inf-cluster'
282 'current-context': 'kubernetes-admin@inf-cluster',
289 'client-certificate-data':
300 def get_helmcli_access():
301 host_external = os.environ.get("API_HOST_EXTERNAL_FLOATING")
302 if config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING is not None and \
303 config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING != '':
304 host_external = config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING
305 host = "127.0.0.1" if host_external is None or host_external == '' \
307 port = "10022" if host_external is None or host_external == '' \
310 helm_host_with_port = host+':'+port
312 helm_pass = os.environ.get("HELM_USER_PASSWD")
314 return helm_host_with_port, helm_user, helm_pass
317 def get_alarm_yaml_filename():
318 alarm_yaml_name = os.environ.get("ALARM_YAML")
319 if alarm_yaml_name is not None and os.path.isfile(alarm_yaml_name):
320 return alarm_yaml_name
321 return "/configs/alarm.yaml"
324 def get_events_yaml_filename():
325 events_yaml_name = os.environ.get("EVENTS_YAML")
326 if events_yaml_name is not None and os.path.isfile(events_yaml_name):
327 return events_yaml_name
328 return "/configs/events.yaml"
331 # get k8s host from env:
333 k8s_host = os.environ.get("KUBERNETES_SERVICE_HOST")
335 raise Exception('Get k8s host failed.')
339 # get k8s host port from env:
341 k8s_port = os.environ.get("KUBERNETES_SERVICE_PORT_HTTPS", '443')
346 def get_review_url():
348 api = '/apis/authentication.k8s.io/v1/tokenreviews'
349 return "{0}{1}:{2}{3}".format(
350 'https://', get_k8s_host(), get_k8s_port(), api)
352 raise Exception('Get k8s review url failed')
356 def get_reviewer_token():
357 # token path default is below.
358 token_path = '/var/run/secrets/kubernetes.io/serviceaccount/token'
359 with open(token_path, 'r') as f:
364 def get_auth_provider():
368 def get_dms_support_profiles():
369 profiles = config.conf.API.DMS_SUPPORT_PROFILES
370 if profiles is None or profiles == '':
372 elif "[" in profiles and "]" in profiles:
373 profiles = profiles.replace("'", "").replace(
374 '"', "").replace('[', "").replace(']', "")
375 profiles = profiles.split(',')
376 if 'native_k8sapi' not in profiles:
377 profiles.append('native_k8sapi')