Support register to smo with https/tls protocol.
[pti/o2.git] / o2common / config / config.py
index 8f44fa2..8946bdf 100644 (file)
@@ -1,4 +1,4 @@
-# Copyright (C) 2021 Wind River Systems, Inc.
+# Copyright (C) 2021-2022 Wind River Systems, Inc.
 #
 #  Licensed under the Apache License, Version 2.0 (the "License");
 #  you may not use this file except in compliance with the License.
@@ -24,6 +24,16 @@ _DEFAULT_DCMANAGER_URL = "http://192.168.204.1:8119/v1.0"
 _DEFAULT_STX_URL = "http://192.168.204.1:5000/v3"
 
 
+def get_config_path():
+    path = os.environ.get("O2APP_CONFIG", "/configs/o2app.conf")
+    return path
+
+
+def get_smo_ca_config_path():
+    path = os.environ.get("SMO_CA_CONFIG", "/configs/smoca.crt")
+    return path
+
+
 def get_postgres_uri():
     host = os.environ.get("DB_HOST", "localhost")
     port = 54321 if host == "localhost" else 5432
@@ -50,11 +60,11 @@ def get_root_api_base():
 
 
 def get_o2ims_api_base():
-    return get_root_api_base() + 'o2ims_infrastructureInventory/v1'
+    return get_root_api_base() + 'o2ims-infrastructureInventory'
 
 
-def get_provision_api_base():
-    return get_root_api_base() + 'provision/v1'
+def get_o2ims_monitoring_api_base():
+    return get_root_api_base() + 'o2ims-infrastructureMonitoring'
 
 
 def get_o2dms_api_base():
@@ -150,6 +160,36 @@ def get_dc_access_info():
     return os_client_args
 
 
+def get_fm_access_info():
+    try:
+        client_args = dict(
+            auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
+            username=os.environ.get('OS_USERNAME', "admin"),
+            api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
+            project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
+        )
+    except KeyError:
+        logger.error('Please source your RC file before execution, '
+                     'e.g.: `source ~/downloads/admin-rc.sh`')
+        sys.exit(1)
+
+    os_client_args = {}
+    for key, val in client_args.items():
+        os_client_args['os_{key}'.format(key=key)] = val
+    auth_url = urlparse(os_client_args.pop('os_auth_url'))
+
+    os_client_args['insecure'] = True
+
+    os_client_args['auth_url'] = auth_url.geturl()
+    os_client_args['username'] = os_client_args.pop('os_username')
+    os_client_args['password'] = os_client_args.pop('os_api_key')
+    os_client_args['project_name'] = os_client_args.pop('os_project_name')
+    os_client_args['user_domain_name'] = 'Default'
+    os_client_args['project_domain_name'] = 'Default'
+
+    return os_client_args
+
+
 def get_k8s_api_endpoint():
     K8S_KUBECONFIG = os.environ.get("K8S_KUBECONFIG", None)
     K8S_APISERVER = os.environ.get("K8S_APISERVER", None)
@@ -207,3 +247,72 @@ def gen_k8s_config_dict(cluster_api_endpoint, cluster_ca_cert, admin_user,
     }
 
     return data
+
+
+def get_helmcli_access():
+    host_external = os.environ.get("API_HOST_EXTERNAL_FLOATING")
+    host = "127.0.0.1" if host_external is None or host_external == '' \
+        else host_external
+    port = "10022" if host_external is None or host_external == '' \
+        else "30022"
+
+    helm_host_with_port = host+':'+port
+    helm_user = 'helm'
+    helm_pass = os.environ.get("HELM_USER_PASSWD")
+
+    return helm_host_with_port, helm_user, helm_pass
+
+
+def get_alarm_yaml_filename():
+    alarm_yaml_name = os.environ.get("ALARM_YAML")
+    if alarm_yaml_name is not None and os.path.isfile(alarm_yaml_name):
+        return alarm_yaml_name
+    return "/configs/alarm.yaml"
+
+
+def get_events_yaml_filename():
+    events_yaml_name = os.environ.get("EVENTS_YAML")
+    if events_yaml_name is not None and os.path.isfile(events_yaml_name):
+        return events_yaml_name
+    return "/configs/events.yaml"
+
+# get k8s host from env:
+
+
+def get_k8s_host():
+    k8s_host = os.environ.get("KUBERNETES_SERVICE_HOST")
+    if k8s_host is None:
+        raise Exception('Get k8s host failed.')
+    return k8s_host
+
+# get k8s host port from env:
+
+
+def get_k8s_port():
+    k8s_port = os.environ.get("KUBERNETES_SERVICE_PORT_HTTPS", '443')
+    return k8s_port
+
+# token review url
+
+
+def get_review_url():
+    try:
+        api = '/apis/authentication.k8s.io/v1/tokenreviews'
+        return "{0}{1}:{2}{3}".format(
+            'https://', get_k8s_host(), get_k8s_port(), api)
+    except Exception:
+        raise Exception('Get k8s review url failed')
+
+# get reviewer token
+
+
+def get_reviewer_token():
+    # token path default is below.
+    token_path = '/var/run/secrets/kubernetes.io/serviceaccount/token'
+    with open(token_path, 'r') as f:
+        ctt = f.read()
+    return ctt
+
+
+def get_auth_provider():
+    return 'k8s'