97565351b3e1f9ba9213dd2b15be21c53a649caa
[pti/o2.git] / o2common / config / config.py
1 # Copyright (C) 2021-2022 Wind River Systems, Inc.
2 #
3 #  Licensed under the Apache License, Version 2.0 (the "License");
4 #  you may not use this file except in compliance with the License.
5 #  You may obtain a copy of the License at
6 #
7 #      http://www.apache.org/licenses/LICENSE-2.0
8 #
9 #  Unless required by applicable law or agreed to in writing, software
10 #  distributed under the License is distributed on an "AS IS" BASIS,
11 #  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 #  See the License for the specific language governing permissions and
13 #  limitations under the License.
14
15 import os
16 import sys
17 from urllib.parse import urlparse
18
19 from o2common.helper import o2logging
20 logger = o2logging.get_logger(__name__)
21
22
23 _DEFAULT_DCMANAGER_URL = "http://192.168.204.1:8119/v1.0"
24 _DEFAULT_STX_URL = "http://192.168.204.1:5000/v3"
25
26
27 def get_config_path():
28     path = os.environ.get("O2APP_CONFIG", "/configs/o2app.conf")
29     return path
30
31
32 def get_postgres_uri():
33     host = os.environ.get("DB_HOST", "localhost")
34     port = 54321 if host == "localhost" else 5432
35     password = os.environ.get("DB_PASSWORD", "o2ims123")
36     user, db_name = "o2ims", "o2ims"
37     return f"postgresql://{user}:{password}@{host}:{port}/{db_name}"
38
39
40 def get_api_url():
41     host_interal = os.environ.get("API_HOST", "localhost")
42     host_external = os.environ.get("API_HOST_EXTERNAL_FLOATING")
43     host = host_interal if host_external is None or host_external == '' \
44         else host_external
45
46     port_internal = 5005 if host == "localhost" else 80
47     port_external = 30205
48     port = port_internal if host_external is None or host_external == '' \
49         else port_external
50     return f"http://{host}:{port}"
51
52
53 def get_root_api_base():
54     return "/"
55
56
57 def get_o2ims_api_base():
58     return get_root_api_base() + 'o2ims-infrastructureInventory'
59
60
61 def get_o2ims_monitoring_api_base():
62     return get_root_api_base() + 'o2ims-infrastructureMonitoring'
63
64
65 def get_o2dms_api_base():
66     return get_root_api_base() + "o2dms/v1"
67
68
69 def get_redis_host_and_port():
70     host = os.environ.get("REDIS_HOST", "localhost")
71     port = 63791 if host == "localhost" else 6379
72     return dict(host=host, port=port)
73
74
75 def get_smo_o2endpoint():
76     smo_o2endpoint = os.environ.get(
77         "SMO_O2_ENDPOINT", "http://localhost/smo_sim")
78     return smo_o2endpoint
79
80
81 def get_stx_access_info(region_name="RegionOne", subcloud_hostname: str = "",
82                         sub_is_https: bool = False):
83     # authurl = os.environ.get("STX_AUTH_URL", "http://192.168.204.1:5000/v3")
84     # username = os.environ.get("STX_USERNAME", "admin")
85     # pswd = os.environ.get("STX_PASSWORD", "passwd1")
86     # stx_access_info = (authurl, username, pswd)
87     try:
88         client_args = dict(
89             auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
90             username=os.environ.get('OS_USERNAME', "admin"),
91             api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
92             project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
93         )
94     except KeyError:
95         logger.error('Please source your RC file before execution, '
96                      'e.g.: `source ~/downloads/admin-rc.sh`')
97         sys.exit(1)
98
99     os_client_args = {}
100     for key, val in client_args.items():
101         os_client_args['os_{key}'.format(key=key)] = val
102     if "" != subcloud_hostname:
103         orig_auth_url = urlparse(_DEFAULT_STX_URL)
104         new_auth_url = orig_auth_url._replace(
105             netloc=orig_auth_url.netloc.replace(
106                 orig_auth_url.hostname, subcloud_hostname))
107         # new_auth_url = new_auth_url._replace(
108         #     netloc=new_auth_url.netloc.replace(str(new_auth_url.port),
109         # "18002"))
110         if sub_is_https:
111             new_auth_url = new_auth_url._replace(
112                 scheme=new_auth_url.scheme.
113                 replace(new_auth_url.scheme, 'https'))
114             os_client_args['insecure'] = True
115         os_client_args['os_auth_url'] = new_auth_url.geturl()
116         os_client_args['os_endpoint_type'] = 'public'
117     # os_client_args['system_url'] = os_client_args['os_auth_url']
118     os_client_args['os_password'] = os_client_args.pop('os_api_key')
119     os_client_args['os_region_name'] = region_name
120     os_client_args['api_version'] = 1
121     # os_client_args['user_domain_name'] = 'Default'
122     # os_client_args['project_domain_name'] = 'Default'
123     return os_client_args
124
125
126 def get_dc_access_info():
127     try:
128         client_args = dict(
129             auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
130             username=os.environ.get('OS_USERNAME', "admin"),
131             api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
132             project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
133         )
134     except KeyError:
135         logger.error('Please source your RC file before execution, '
136                      'e.g.: `source ~/downloads/admin-rc.sh`')
137         sys.exit(1)
138
139     os_client_args = {}
140     for key, val in client_args.items():
141         os_client_args['os_{key}'.format(key=key)] = val
142     auth_url = urlparse(os_client_args.pop('os_auth_url'))
143     dcmanager_url = urlparse(_DEFAULT_DCMANAGER_URL)
144     dcmanager_url = dcmanager_url._replace(netloc=dcmanager_url.netloc.replace(
145         dcmanager_url.hostname, auth_url.hostname))
146
147     os_client_args['dcmanager_url'] = dcmanager_url.geturl()
148     os_client_args['auth_url'] = auth_url.geturl()
149     os_client_args['username'] = os_client_args.pop('os_username')
150     os_client_args['api_key'] = os_client_args.pop('os_api_key')
151     os_client_args['project_name'] = os_client_args.pop('os_project_name')
152     os_client_args['user_domain_name'] = 'Default'
153     os_client_args['project_domain_name'] = 'Default'
154
155     return os_client_args
156
157
158 def get_fm_access_info():
159     try:
160         client_args = dict(
161             auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
162             username=os.environ.get('OS_USERNAME', "admin"),
163             api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
164             project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
165         )
166     except KeyError:
167         logger.error('Please source your RC file before execution, '
168                      'e.g.: `source ~/downloads/admin-rc.sh`')
169         sys.exit(1)
170
171     os_client_args = {}
172     for key, val in client_args.items():
173         os_client_args['os_{key}'.format(key=key)] = val
174     auth_url = urlparse(os_client_args.pop('os_auth_url'))
175
176     os_client_args['insecure'] = True
177
178     os_client_args['auth_url'] = auth_url.geturl()
179     os_client_args['username'] = os_client_args.pop('os_username')
180     os_client_args['password'] = os_client_args.pop('os_api_key')
181     os_client_args['project_name'] = os_client_args.pop('os_project_name')
182     os_client_args['user_domain_name'] = 'Default'
183     os_client_args['project_domain_name'] = 'Default'
184
185     return os_client_args
186
187
188 def get_k8s_api_endpoint():
189     K8S_KUBECONFIG = os.environ.get("K8S_KUBECONFIG", None)
190     K8S_APISERVER = os.environ.get("K8S_APISERVER", None)
191     K8S_TOKEN = os.environ.get("K8S_TOKEN", None)
192     return K8S_KUBECONFIG, K8S_APISERVER, K8S_TOKEN
193
194
195 def get_helm_cli():
196     return '/usr/local/bin/helm'
197
198
199 def get_system_controller_as_respool():
200     return True
201
202
203 def gen_k8s_config_dict(cluster_api_endpoint, cluster_ca_cert, admin_user,
204                         admin_client_cert, admin_client_key):
205     # KUBECONFIG environment variable
206     # reference:
207     # https://kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/
208     data = {
209         'apiVersion': 'v1',
210         'clusters': [
211             {
212                 'cluster': {
213                     'server':
214                     cluster_api_endpoint,
215                     'certificate-authority-data':
216                     cluster_ca_cert,
217                 },
218                 'name': 'inf-cluster'
219             }],
220         'contexts': [
221             {
222                 'context': {
223                     'cluster': 'inf-cluster',
224                     'user': 'kubernetes-admin'
225                 },
226                 'name': 'kubernetes-admin@inf-cluster'
227             }
228         ],
229         'current-context': 'kubernetes-admin@inf-cluster',
230         'kind': 'Config',
231         'preferences': {},
232         'users': [
233             {
234                 'name': admin_user,
235                 'user': {
236                     'client-certificate-data':
237                     admin_client_cert,
238                     'client-key-data':
239                     admin_client_key,
240                 }
241             }]
242     }
243
244     return data
245
246
247 def get_helmcli_access():
248     host_external = os.environ.get("API_HOST_EXTERNAL_FLOATING")
249     host = "127.0.0.1" if host_external is None or host_external == '' \
250         else host_external
251     port = "10022" if host_external is None or host_external == '' \
252         else "30022"
253
254     helm_host_with_port = host+':'+port
255     helm_user = 'helm'
256     helm_pass = os.environ.get("HELM_USER_PASSWD")
257
258     return helm_host_with_port, helm_user, helm_pass
259
260
261 def get_alarm_yaml_filename():
262     alarm_yaml_name = os.environ.get("ALARM_YAML")
263     if alarm_yaml_name is not None and os.path.isfile(alarm_yaml_name):
264         return alarm_yaml_name
265     return "/configs/alarm.yaml"
266
267
268 def get_events_yaml_filename():
269     events_yaml_name = os.environ.get("EVENTS_YAML")
270     if events_yaml_name is not None and os.path.isfile(events_yaml_name):
271         return events_yaml_name
272     return "/configs/events.yaml"
273
274 # get k8s host from env:
275
276
277 def get_k8s_host():
278     k8s_host = os.environ.get("KUBERNETES_SERVICE_HOST")
279     if k8s_host is None:
280         raise Exception('Get k8s host failed.')
281     return k8s_host
282
283 # get k8s host port from env:
284
285
286 def get_k8s_port():
287     k8s_port = os.environ.get("KUBERNETES_SERVICE_PORT_HTTPS", '443')
288     return k8s_port
289
290 # token review url
291
292
293 def get_review_url():
294     try:
295         api = '/apis/authentication.k8s.io/v1/tokenreviews'
296         return "{0}{1}:{2}{3}".format(
297             'https://', get_k8s_host(), get_k8s_port(), api)
298     except Exception:
299         raise Exception('Get k8s review url failed')
300
301 # get reviewer token
302
303
304 def get_reviewer_token():
305     # token path default is below.
306     token_path = '/var/run/secrets/kubernetes.io/serviceaccount/token'
307     with open(token_path, 'r') as f:
308         ctt = f.read()
309     return ctt
310
311
312 def get_auth_provider():
313     return 'k8s'