Support register to smo with https/tls protocol.
[pti/o2.git] / o2common / config / config.py
1 # Copyright (C) 2021-2022 Wind River Systems, Inc.
2 #
3 #  Licensed under the Apache License, Version 2.0 (the "License");
4 #  you may not use this file except in compliance with the License.
5 #  You may obtain a copy of the License at
6 #
7 #      http://www.apache.org/licenses/LICENSE-2.0
8 #
9 #  Unless required by applicable law or agreed to in writing, software
10 #  distributed under the License is distributed on an "AS IS" BASIS,
11 #  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 #  See the License for the specific language governing permissions and
13 #  limitations under the License.
14
15 import os
16 import sys
17 from urllib.parse import urlparse
18
19 from o2common.helper import o2logging
20 logger = o2logging.get_logger(__name__)
21
22
23 _DEFAULT_DCMANAGER_URL = "http://192.168.204.1:8119/v1.0"
24 _DEFAULT_STX_URL = "http://192.168.204.1:5000/v3"
25
26
27 def get_config_path():
28     path = os.environ.get("O2APP_CONFIG", "/configs/o2app.conf")
29     return path
30
31
32 def get_smo_ca_config_path():
33     path = os.environ.get("SMO_CA_CONFIG", "/configs/smoca.crt")
34     return path
35
36
37 def get_postgres_uri():
38     host = os.environ.get("DB_HOST", "localhost")
39     port = 54321 if host == "localhost" else 5432
40     password = os.environ.get("DB_PASSWORD", "o2ims123")
41     user, db_name = "o2ims", "o2ims"
42     return f"postgresql://{user}:{password}@{host}:{port}/{db_name}"
43
44
45 def get_api_url():
46     host_interal = os.environ.get("API_HOST", "localhost")
47     host_external = os.environ.get("API_HOST_EXTERNAL_FLOATING")
48     host = host_interal if host_external is None or host_external == '' \
49         else host_external
50
51     port_internal = 5005 if host == "localhost" else 80
52     port_external = 30205
53     port = port_internal if host_external is None or host_external == '' \
54         else port_external
55     return f"http://{host}:{port}"
56
57
58 def get_root_api_base():
59     return "/"
60
61
62 def get_o2ims_api_base():
63     return get_root_api_base() + 'o2ims-infrastructureInventory'
64
65
66 def get_o2ims_monitoring_api_base():
67     return get_root_api_base() + 'o2ims-infrastructureMonitoring'
68
69
70 def get_o2dms_api_base():
71     return get_root_api_base() + "o2dms/v1"
72
73
74 def get_redis_host_and_port():
75     host = os.environ.get("REDIS_HOST", "localhost")
76     port = 63791 if host == "localhost" else 6379
77     return dict(host=host, port=port)
78
79
80 def get_smo_o2endpoint():
81     smo_o2endpoint = os.environ.get(
82         "SMO_O2_ENDPOINT", "http://localhost/smo_sim")
83     return smo_o2endpoint
84
85
86 def get_stx_access_info(region_name="RegionOne", subcloud_hostname: str = "",
87                         sub_is_https: bool = False):
88     # authurl = os.environ.get("STX_AUTH_URL", "http://192.168.204.1:5000/v3")
89     # username = os.environ.get("STX_USERNAME", "admin")
90     # pswd = os.environ.get("STX_PASSWORD", "passwd1")
91     # stx_access_info = (authurl, username, pswd)
92     try:
93         client_args = dict(
94             auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
95             username=os.environ.get('OS_USERNAME', "admin"),
96             api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
97             project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
98         )
99     except KeyError:
100         logger.error('Please source your RC file before execution, '
101                      'e.g.: `source ~/downloads/admin-rc.sh`')
102         sys.exit(1)
103
104     os_client_args = {}
105     for key, val in client_args.items():
106         os_client_args['os_{key}'.format(key=key)] = val
107     if "" != subcloud_hostname:
108         orig_auth_url = urlparse(_DEFAULT_STX_URL)
109         new_auth_url = orig_auth_url._replace(
110             netloc=orig_auth_url.netloc.replace(
111                 orig_auth_url.hostname, subcloud_hostname))
112         # new_auth_url = new_auth_url._replace(
113         #     netloc=new_auth_url.netloc.replace(str(new_auth_url.port),
114         # "18002"))
115         if sub_is_https:
116             new_auth_url = new_auth_url._replace(
117                 scheme=new_auth_url.scheme.
118                 replace(new_auth_url.scheme, 'https'))
119             os_client_args['insecure'] = True
120         os_client_args['os_auth_url'] = new_auth_url.geturl()
121         os_client_args['os_endpoint_type'] = 'public'
122     # os_client_args['system_url'] = os_client_args['os_auth_url']
123     os_client_args['os_password'] = os_client_args.pop('os_api_key')
124     os_client_args['os_region_name'] = region_name
125     os_client_args['api_version'] = 1
126     # os_client_args['user_domain_name'] = 'Default'
127     # os_client_args['project_domain_name'] = 'Default'
128     return os_client_args
129
130
131 def get_dc_access_info():
132     try:
133         client_args = dict(
134             auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
135             username=os.environ.get('OS_USERNAME', "admin"),
136             api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
137             project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
138         )
139     except KeyError:
140         logger.error('Please source your RC file before execution, '
141                      'e.g.: `source ~/downloads/admin-rc.sh`')
142         sys.exit(1)
143
144     os_client_args = {}
145     for key, val in client_args.items():
146         os_client_args['os_{key}'.format(key=key)] = val
147     auth_url = urlparse(os_client_args.pop('os_auth_url'))
148     dcmanager_url = urlparse(_DEFAULT_DCMANAGER_URL)
149     dcmanager_url = dcmanager_url._replace(netloc=dcmanager_url.netloc.replace(
150         dcmanager_url.hostname, auth_url.hostname))
151
152     os_client_args['dcmanager_url'] = dcmanager_url.geturl()
153     os_client_args['auth_url'] = auth_url.geturl()
154     os_client_args['username'] = os_client_args.pop('os_username')
155     os_client_args['api_key'] = os_client_args.pop('os_api_key')
156     os_client_args['project_name'] = os_client_args.pop('os_project_name')
157     os_client_args['user_domain_name'] = 'Default'
158     os_client_args['project_domain_name'] = 'Default'
159
160     return os_client_args
161
162
163 def get_fm_access_info():
164     try:
165         client_args = dict(
166             auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
167             username=os.environ.get('OS_USERNAME', "admin"),
168             api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
169             project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
170         )
171     except KeyError:
172         logger.error('Please source your RC file before execution, '
173                      'e.g.: `source ~/downloads/admin-rc.sh`')
174         sys.exit(1)
175
176     os_client_args = {}
177     for key, val in client_args.items():
178         os_client_args['os_{key}'.format(key=key)] = val
179     auth_url = urlparse(os_client_args.pop('os_auth_url'))
180
181     os_client_args['insecure'] = True
182
183     os_client_args['auth_url'] = auth_url.geturl()
184     os_client_args['username'] = os_client_args.pop('os_username')
185     os_client_args['password'] = os_client_args.pop('os_api_key')
186     os_client_args['project_name'] = os_client_args.pop('os_project_name')
187     os_client_args['user_domain_name'] = 'Default'
188     os_client_args['project_domain_name'] = 'Default'
189
190     return os_client_args
191
192
193 def get_k8s_api_endpoint():
194     K8S_KUBECONFIG = os.environ.get("K8S_KUBECONFIG", None)
195     K8S_APISERVER = os.environ.get("K8S_APISERVER", None)
196     K8S_TOKEN = os.environ.get("K8S_TOKEN", None)
197     return K8S_KUBECONFIG, K8S_APISERVER, K8S_TOKEN
198
199
200 def get_helm_cli():
201     return '/usr/local/bin/helm'
202
203
204 def get_system_controller_as_respool():
205     return True
206
207
208 def gen_k8s_config_dict(cluster_api_endpoint, cluster_ca_cert, admin_user,
209                         admin_client_cert, admin_client_key):
210     # KUBECONFIG environment variable
211     # reference:
212     # https://kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/
213     data = {
214         'apiVersion': 'v1',
215         'clusters': [
216             {
217                 'cluster': {
218                     'server':
219                     cluster_api_endpoint,
220                     'certificate-authority-data':
221                     cluster_ca_cert,
222                 },
223                 'name': 'inf-cluster'
224             }],
225         'contexts': [
226             {
227                 'context': {
228                     'cluster': 'inf-cluster',
229                     'user': 'kubernetes-admin'
230                 },
231                 'name': 'kubernetes-admin@inf-cluster'
232             }
233         ],
234         'current-context': 'kubernetes-admin@inf-cluster',
235         'kind': 'Config',
236         'preferences': {},
237         'users': [
238             {
239                 'name': admin_user,
240                 'user': {
241                     'client-certificate-data':
242                     admin_client_cert,
243                     'client-key-data':
244                     admin_client_key,
245                 }
246             }]
247     }
248
249     return data
250
251
252 def get_helmcli_access():
253     host_external = os.environ.get("API_HOST_EXTERNAL_FLOATING")
254     host = "127.0.0.1" if host_external is None or host_external == '' \
255         else host_external
256     port = "10022" if host_external is None or host_external == '' \
257         else "30022"
258
259     helm_host_with_port = host+':'+port
260     helm_user = 'helm'
261     helm_pass = os.environ.get("HELM_USER_PASSWD")
262
263     return helm_host_with_port, helm_user, helm_pass
264
265
266 def get_alarm_yaml_filename():
267     alarm_yaml_name = os.environ.get("ALARM_YAML")
268     if alarm_yaml_name is not None and os.path.isfile(alarm_yaml_name):
269         return alarm_yaml_name
270     return "/configs/alarm.yaml"
271
272
273 def get_events_yaml_filename():
274     events_yaml_name = os.environ.get("EVENTS_YAML")
275     if events_yaml_name is not None and os.path.isfile(events_yaml_name):
276         return events_yaml_name
277     return "/configs/events.yaml"
278
279 # get k8s host from env:
280
281
282 def get_k8s_host():
283     k8s_host = os.environ.get("KUBERNETES_SERVICE_HOST")
284     if k8s_host is None:
285         raise Exception('Get k8s host failed.')
286     return k8s_host
287
288 # get k8s host port from env:
289
290
291 def get_k8s_port():
292     k8s_port = os.environ.get("KUBERNETES_SERVICE_PORT_HTTPS", '443')
293     return k8s_port
294
295 # token review url
296
297
298 def get_review_url():
299     try:
300         api = '/apis/authentication.k8s.io/v1/tokenreviews'
301         return "{0}{1}:{2}{3}".format(
302             'https://', get_k8s_host(), get_k8s_port(), api)
303     except Exception:
304         raise Exception('Get k8s review url failed')
305
306 # get reviewer token
307
308
309 def get_reviewer_token():
310     # token path default is below.
311     token_path = '/var/run/secrets/kubernetes.io/serviceaccount/token'
312     with open(token_path, 'r') as f:
313         ctt = f.read()
314     return ctt
315
316
317 def get_auth_provider():
318     return 'k8s'