Merge "Support register to smo with https/tls protocol."
[pti/o2.git] / o2common / config / config.py
1 # Copyright (C) 2021-2022 Wind River Systems, Inc.
2 #
3 #  Licensed under the Apache License, Version 2.0 (the "License");
4 #  you may not use this file except in compliance with the License.
5 #  You may obtain a copy of the License at
6 #
7 #      http://www.apache.org/licenses/LICENSE-2.0
8 #
9 #  Unless required by applicable law or agreed to in writing, software
10 #  distributed under the License is distributed on an "AS IS" BASIS,
11 #  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 #  See the License for the specific language governing permissions and
13 #  limitations under the License.
14
15 import os
16 import sys
17 from urllib.parse import urlparse
18
19 from o2common import config
20 from o2common.helper import o2logging
21 logger = o2logging.get_logger(__name__)
22
23
24 _DEFAULT_DCMANAGER_URL = "http://192.168.204.1:8119/v1.0"
25 _DEFAULT_STX_URL = "http://192.168.204.1:5000/v3"
26
27
28 def get_config_path():
29     path = os.environ.get("O2APP_CONFIG", "/configs/o2app.conf")
30     return path
31
32
33 def get_smo_ca_config_path():
34     path = os.environ.get("SMO_CA_CONFIG", "/configs/smoca.crt")
35     return path
36
37
38 def get_postgres_uri():
39     host = os.environ.get("DB_HOST", "localhost")
40     port = 54321 if host == "localhost" else 5432
41     password = os.environ.get("DB_PASSWORD", "o2ims123")
42     user, db_name = "o2ims", "o2ims"
43     return f"postgresql://{user}:{password}@{host}:{port}/{db_name}"
44
45
46 def get_api_url():
47     host_interal = os.environ.get("API_HOST", "localhost")
48     host_external = os.environ.get("API_HOST_EXTERNAL_FLOATING")
49     if config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING is not None and \
50             config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING != '':
51         host_external = config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING
52     host = host_interal if host_external is None or host_external == '' \
53         else host_external
54
55     port_internal = 5005 if host == "localhost" else 80
56     port_external = 30205
57     port = port_internal if host_external is None or host_external == '' \
58         else port_external
59     return f"http://{host}:{port}"
60
61
62 def get_root_api_base():
63     return "/"
64
65
66 def get_o2ims_api_base():
67     return get_root_api_base() + 'o2ims-infrastructureInventory'
68
69
70 def get_o2ims_monitoring_api_base():
71     return get_root_api_base() + 'o2ims-infrastructureMonitoring'
72
73
74 def get_o2dms_api_base():
75     return get_root_api_base() + "o2dms/v1"
76
77
78 def get_redis_host_and_port():
79     host = os.environ.get("REDIS_HOST", "localhost")
80     port = 63791 if host == "localhost" else 6379
81     return dict(host=host, port=port)
82
83
84 def get_smo_o2endpoint():
85     smo_o2endpoint = os.environ.get(
86         "SMO_O2_ENDPOINT", "http://localhost/smo_sim")
87     return smo_o2endpoint
88
89
90 def get_stx_client_args():
91     client_args = dict(
92         auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
93         username=os.environ.get('OS_USERNAME', "admin"),
94         api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
95         project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
96     )
97     if config.conf.OCLOUD.OS_AUTH_URL is not None and \
98             config.conf.OCLOUD.OS_AUTH_URL != '':
99         client_args['auth_url'] = config.conf.OCLOUD.OS_AUTH_URL
100     if config.conf.OCLOUD.OS_USERNAME is not None and \
101             config.conf.OCLOUD.OS_USERNAME != '':
102         client_args['username'] = config.conf.OCLOUD.OS_USERNAME
103     if config.conf.OCLOUD.OS_PASSWORD is not None and \
104             config.conf.OCLOUD.OS_PASSWORD != '':
105         client_args['api_key'] = config.conf.OCLOUD.OS_PASSWORD
106     if config.conf.OCLOUD.OS_PROJECT_NAME is not None and \
107             config.conf.OCLOUD.OS_PROJECT_NAME != '':
108         client_args['project_name'] = config.conf.OCLOUD.OS_PROJECT_NAME
109     return client_args
110
111
112 def get_stx_access_info(region_name="RegionOne", subcloud_hostname: str = "",
113                         sub_is_https: bool = False):
114     # authurl = os.environ.get("STX_AUTH_URL", "http://192.168.204.1:5000/v3")
115     # username = os.environ.get("STX_USERNAME", "admin")
116     # pswd = os.environ.get("STX_PASSWORD", "passwd1")
117     # stx_access_info = (authurl, username, pswd)
118     try:
119         # client_args = dict(
120         #     auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
121         #     username=os.environ.get('OS_USERNAME', "admin"),
122         #     api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
123         #     project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
124         # )
125         client_args = get_stx_client_args()
126     except KeyError:
127         logger.error('Please source your RC file before execution, '
128                      'e.g.: `source ~/downloads/admin-rc.sh`')
129         sys.exit(1)
130
131     os_client_args = {}
132     for key, val in client_args.items():
133         os_client_args['os_{key}'.format(key=key)] = val
134     if "" != subcloud_hostname:
135         orig_auth_url = urlparse(_DEFAULT_STX_URL)
136         new_auth_url = orig_auth_url._replace(
137             netloc=orig_auth_url.netloc.replace(
138                 orig_auth_url.hostname, subcloud_hostname))
139         # new_auth_url = new_auth_url._replace(
140         #     netloc=new_auth_url.netloc.replace(str(new_auth_url.port),
141         # "18002"))
142         if sub_is_https:
143             new_auth_url = new_auth_url._replace(
144                 scheme=new_auth_url.scheme.
145                 replace(new_auth_url.scheme, 'https'))
146             os_client_args['insecure'] = True
147         os_client_args['os_auth_url'] = new_auth_url.geturl()
148         os_client_args['os_endpoint_type'] = 'public'
149     # os_client_args['system_url'] = os_client_args['os_auth_url']
150     os_client_args['os_password'] = os_client_args.pop('os_api_key')
151     os_client_args['os_region_name'] = region_name
152     os_client_args['api_version'] = 1
153     # os_client_args['user_domain_name'] = 'Default'
154     # os_client_args['project_domain_name'] = 'Default'
155     return os_client_args
156
157
158 def get_dc_access_info():
159     try:
160         # client_args = dict(
161         #     auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
162         #     username=os.environ.get('OS_USERNAME', "admin"),
163         #     api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
164         #     project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
165         # )
166         client_args = get_stx_client_args()
167     except KeyError:
168         logger.error('Please source your RC file before execution, '
169                      'e.g.: `source ~/downloads/admin-rc.sh`')
170         sys.exit(1)
171
172     os_client_args = {}
173     for key, val in client_args.items():
174         os_client_args['os_{key}'.format(key=key)] = val
175     auth_url = urlparse(os_client_args.pop('os_auth_url'))
176     dcmanager_url = urlparse(_DEFAULT_DCMANAGER_URL)
177     dcmanager_url = dcmanager_url._replace(netloc=dcmanager_url.netloc.replace(
178         dcmanager_url.hostname, auth_url.hostname))
179
180     os_client_args['dcmanager_url'] = dcmanager_url.geturl()
181     os_client_args['auth_url'] = auth_url.geturl()
182     os_client_args['username'] = os_client_args.pop('os_username')
183     os_client_args['api_key'] = os_client_args.pop('os_api_key')
184     os_client_args['project_name'] = os_client_args.pop('os_project_name')
185     os_client_args['user_domain_name'] = 'Default'
186     os_client_args['project_domain_name'] = 'Default'
187
188     return os_client_args
189
190
191 def get_fm_access_info():
192     try:
193         # client_args = dict(
194         #     auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
195         #     username=os.environ.get('OS_USERNAME', "admin"),
196         #     api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
197         #     project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
198         # )
199         client_args = get_stx_client_args()
200     except KeyError:
201         logger.error('Please source your RC file before execution, '
202                      'e.g.: `source ~/downloads/admin-rc.sh`')
203         sys.exit(1)
204
205     os_client_args = {}
206     for key, val in client_args.items():
207         os_client_args['os_{key}'.format(key=key)] = val
208     auth_url = urlparse(os_client_args.pop('os_auth_url'))
209
210     os_client_args['insecure'] = True
211
212     os_client_args['auth_url'] = auth_url.geturl()
213     os_client_args['username'] = os_client_args.pop('os_username')
214     os_client_args['password'] = os_client_args.pop('os_api_key')
215     os_client_args['project_name'] = os_client_args.pop('os_project_name')
216     os_client_args['user_domain_name'] = 'Default'
217     os_client_args['project_domain_name'] = 'Default'
218
219     return os_client_args
220
221
222 def get_k8s_api_endpoint():
223     K8S_KUBECONFIG = os.environ.get("K8S_KUBECONFIG", None)
224     K8S_APISERVER = os.environ.get("K8S_APISERVER", None)
225     K8S_TOKEN = os.environ.get("K8S_TOKEN", None)
226     return K8S_KUBECONFIG, K8S_APISERVER, K8S_TOKEN
227
228
229 def get_helm_cli():
230     return '/usr/local/bin/helm'
231
232
233 def get_system_controller_as_respool():
234     return True
235
236
237 def gen_k8s_config_dict(cluster_api_endpoint, cluster_ca_cert, admin_user,
238                         admin_client_cert, admin_client_key):
239     # KUBECONFIG environment variable
240     # reference:
241     # https://kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/
242     data = {
243         'apiVersion': 'v1',
244         'clusters': [
245             {
246                 'cluster': {
247                     'server':
248                     cluster_api_endpoint,
249                     'certificate-authority-data':
250                     cluster_ca_cert,
251                 },
252                 'name': 'inf-cluster'
253             }],
254         'contexts': [
255             {
256                 'context': {
257                     'cluster': 'inf-cluster',
258                     'user': 'kubernetes-admin'
259                 },
260                 'name': 'kubernetes-admin@inf-cluster'
261             }
262         ],
263         'current-context': 'kubernetes-admin@inf-cluster',
264         'kind': 'Config',
265         'preferences': {},
266         'users': [
267             {
268                 'name': admin_user,
269                 'user': {
270                     'client-certificate-data':
271                     admin_client_cert,
272                     'client-key-data':
273                     admin_client_key,
274                 }
275             }]
276     }
277
278     return data
279
280
281 def get_helmcli_access():
282     host_external = os.environ.get("API_HOST_EXTERNAL_FLOATING")
283     if config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING is not None and \
284             config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING != '':
285         host_external = config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING
286     host = "127.0.0.1" if host_external is None or host_external == '' \
287         else host_external
288     port = "10022" if host_external is None or host_external == '' \
289         else "30022"
290
291     helm_host_with_port = host+':'+port
292     helm_user = 'helm'
293     helm_pass = os.environ.get("HELM_USER_PASSWD")
294
295     return helm_host_with_port, helm_user, helm_pass
296
297
298 def get_alarm_yaml_filename():
299     alarm_yaml_name = os.environ.get("ALARM_YAML")
300     if alarm_yaml_name is not None and os.path.isfile(alarm_yaml_name):
301         return alarm_yaml_name
302     return "/configs/alarm.yaml"
303
304
305 def get_events_yaml_filename():
306     events_yaml_name = os.environ.get("EVENTS_YAML")
307     if events_yaml_name is not None and os.path.isfile(events_yaml_name):
308         return events_yaml_name
309     return "/configs/events.yaml"
310
311
312 # get k8s host from env:
313 def get_k8s_host():
314     k8s_host = os.environ.get("KUBERNETES_SERVICE_HOST")
315     if k8s_host is None:
316         raise Exception('Get k8s host failed.')
317     return k8s_host
318
319
320 # get k8s host port from env:
321 def get_k8s_port():
322     k8s_port = os.environ.get("KUBERNETES_SERVICE_PORT_HTTPS", '443')
323     return k8s_port
324
325
326 # token review url
327 def get_review_url():
328     try:
329         api = '/apis/authentication.k8s.io/v1/tokenreviews'
330         return "{0}{1}:{2}{3}".format(
331             'https://', get_k8s_host(), get_k8s_port(), api)
332     except Exception:
333         raise Exception('Get k8s review url failed')
334
335
336 # get reviewer token
337 def get_reviewer_token():
338     # token path default is below.
339     token_path = '/var/run/secrets/kubernetes.io/serviceaccount/token'
340     with open(token_path, 'r') as f:
341         ctt = f.read()
342     return ctt
343
344
345 def get_auth_provider():
346     return 'k8s'
347
348
349 def get_dms_support_profiles():
350     profiles = config.conf.API.DMS_SUPPORT_PROFILES
351     profiles = profiles.replace("'", "").replace(
352         '"', "").replace('[', "").replace(']', "")
353     profiles = profiles.split(',')
354     if 'native_k8sapi' not in profiles:
355         profiles.append('native_k8sapi')
356     return profiles