+
+
+def get_k8s_api_endpoint():
+ K8S_KUBECONFIG = os.environ.get("K8S_KUBECONFIG", None)
+ K8S_APISERVER = os.environ.get("K8S_APISERVER", None)
+ K8S_TOKEN = os.environ.get("K8S_TOKEN", None)
+ return K8S_KUBECONFIG, K8S_APISERVER, K8S_TOKEN
+
+
+def get_helm_cli():
+ return '/usr/local/bin/helm'
+
+
+def get_system_controller_as_respool():
+ return True
+
+
+def gen_k8s_config_dict(cluster_api_endpoint, cluster_ca_cert, admin_user,
+ admin_client_cert, admin_client_key):
+ # KUBECONFIG environment variable
+ # reference:
+ # https://kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/
+ data = {
+ 'apiVersion': 'v1',
+ 'clusters': [
+ {
+ 'cluster': {
+ 'server':
+ cluster_api_endpoint,
+ 'certificate-authority-data':
+ cluster_ca_cert,
+ },
+ 'name': 'inf-cluster'
+ }],
+ 'contexts': [
+ {
+ 'context': {
+ 'cluster': 'inf-cluster',
+ 'user': 'kubernetes-admin'
+ },
+ 'name': 'kubernetes-admin@inf-cluster'
+ }
+ ],
+ 'current-context': 'kubernetes-admin@inf-cluster',
+ 'kind': 'Config',
+ 'preferences': {},
+ 'users': [
+ {
+ 'name': admin_user,
+ 'user': {
+ 'client-certificate-data':
+ admin_client_cert,
+ 'client-key-data':
+ admin_client_key,
+ }
+ }]
+ }
+
+ return data
+
+
+def get_helmcli_access():
+ host_external = os.environ.get("API_HOST_EXTERNAL_FLOATING")
+ if config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING is not None and \
+ config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING != '':
+ host_external = config.conf.OCLOUD.API_HOST_EXTERNAL_FLOATING
+ host = "127.0.0.1" if host_external is None or host_external == '' \
+ else host_external
+ port = "10022" if host_external is None or host_external == '' \
+ else "30022"
+
+ helm_host_with_port = host+':'+port
+ helm_user = 'helm'
+ helm_pass = os.environ.get("HELM_USER_PASSWD")
+
+ return helm_host_with_port, helm_user, helm_pass
+
+
+def get_alarm_yaml_filename():
+ alarm_yaml_name = os.environ.get("ALARM_YAML")
+ if alarm_yaml_name is not None and os.path.isfile(alarm_yaml_name):
+ return alarm_yaml_name
+ return "/configs/alarm.yaml"
+
+
+def get_events_yaml_filename():
+ events_yaml_name = os.environ.get("EVENTS_YAML")
+ if events_yaml_name is not None and os.path.isfile(events_yaml_name):
+ return events_yaml_name
+ return "/configs/events.yaml"
+
+
+# get k8s host from env:
+def get_k8s_host():
+ k8s_host = os.environ.get("KUBERNETES_SERVICE_HOST")
+ if k8s_host is None:
+ raise Exception('Get k8s host failed.')
+ return k8s_host
+
+
+# get k8s host port from env:
+def get_k8s_port():
+ k8s_port = os.environ.get("KUBERNETES_SERVICE_PORT_HTTPS", '443')
+ return k8s_port
+
+
+# token review url
+def get_review_url():
+ try:
+ api = '/apis/authentication.k8s.io/v1/tokenreviews'
+ return "{0}{1}:{2}{3}".format(
+ 'https://', get_k8s_host(), get_k8s_port(), api)
+ except Exception:
+ raise Exception('Get k8s review url failed')
+
+
+# get reviewer token
+def get_reviewer_token():
+ # token path default is below.
+ token_path = '/var/run/secrets/kubernetes.io/serviceaccount/token'
+ with open(token_path, 'r') as f:
+ ctt = f.read()
+ return ctt
+
+
+def get_auth_provider():
+ return 'k8s'
+
+
+def get_dms_support_profiles():
+ profiles = config.conf.API.DMS_SUPPORT_PROFILES
+ if profiles is None or profiles == '':
+ profiles = []
+ elif "[" in profiles and "]" in profiles:
+ profiles = profiles.replace("'", "").replace(
+ '"', "").replace('[', "").replace(']', "")
+ profiles = profiles.split(',')
+ if 'native_k8sapi' not in profiles:
+ profiles.append('native_k8sapi')
+ return profiles