def get_o2ims_api_base():
- return get_root_api_base() + 'o2ims_infrastructureInventory/v1'
+ return get_root_api_base() + 'o2ims-infrastructureInventory/v1'
+
+
+def get_o2ims_monitoring_api_base():
+ return get_root_api_base() + 'o2ims-infrastructureMonitoring/v1'
def get_provision_api_base():
return smo_o2endpoint
-def get_stx_access_info(region_name="RegionOne", subcloud_hostname: str = ""):
+def get_stx_access_info(region_name="RegionOne", subcloud_hostname: str = "",
+ sub_is_https: bool = False):
# authurl = os.environ.get("STX_AUTH_URL", "http://192.168.204.1:5000/v3")
# username = os.environ.get("STX_USERNAME", "admin")
# pswd = os.environ.get("STX_PASSWORD", "passwd1")
api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
)
- # dc_client_args = dict(
- # auth_url=os.environ['OS_AUTH_URL'],
- # username=os.environ['OS_USERNAME'],
- # api_key=os.environ['OS_PASSWORD'],
- # project_name=os.environ['OS_PROJECT_NAME'],
- # user_domain_name=os.environ['OS_USER_DOMAIN_NAME'],
- # project_domain_name=os.environ['OS_PROJECT_NAME'],
- # project_domain_id=os.environ['OS_PROJECT_DOMAIN_ID']
- # )
except KeyError:
logger.error('Please source your RC file before execution, '
'e.g.: `source ~/downloads/admin-rc.sh`')
# new_auth_url = new_auth_url._replace(
# netloc=new_auth_url.netloc.replace(str(new_auth_url.port),
# "18002"))
- new_auth_url = new_auth_url._replace(
- scheme=new_auth_url.scheme.
- replace(new_auth_url.scheme, 'https'))
+ if sub_is_https:
+ new_auth_url = new_auth_url._replace(
+ scheme=new_auth_url.scheme.
+ replace(new_auth_url.scheme, 'https'))
+ os_client_args['insecure'] = True
os_client_args['os_auth_url'] = new_auth_url.geturl()
os_client_args['os_endpoint_type'] = 'public'
- os_client_args['insecure'] = True
# os_client_args['system_url'] = os_client_args['os_auth_url']
os_client_args['os_password'] = os_client_args.pop('os_api_key')
os_client_args['os_region_name'] = region_name
return os_client_args
+def get_fm_access_info():
+ try:
+ client_args = dict(
+ auth_url=os.environ.get('OS_AUTH_URL', _DEFAULT_STX_URL),
+ username=os.environ.get('OS_USERNAME', "admin"),
+ api_key=os.environ.get('OS_PASSWORD', "fakepasswd1"),
+ project_name=os.environ.get('OS_PROJECT_NAME', "admin"),
+ )
+ except KeyError:
+ logger.error('Please source your RC file before execution, '
+ 'e.g.: `source ~/downloads/admin-rc.sh`')
+ sys.exit(1)
+
+ os_client_args = {}
+ for key, val in client_args.items():
+ os_client_args['os_{key}'.format(key=key)] = val
+ auth_url = urlparse(os_client_args.pop('os_auth_url'))
+
+ os_client_args['insecure'] = True
+
+ os_client_args['auth_url'] = auth_url.geturl()
+ os_client_args['username'] = os_client_args.pop('os_username')
+ os_client_args['password'] = os_client_args.pop('os_api_key')
+ os_client_args['project_name'] = os_client_args.pop('os_project_name')
+ os_client_args['user_domain_name'] = 'Default'
+ os_client_args['project_domain_name'] = 'Default'
+
+ return os_client_args
+
+
def get_k8s_api_endpoint():
K8S_KUBECONFIG = os.environ.get("K8S_KUBECONFIG", None)
K8S_APISERVER = os.environ.get("K8S_APISERVER", None)
def get_system_controller_as_respool():
return True
+
+
+def gen_k8s_config_dict(cluster_api_endpoint, cluster_ca_cert, admin_user,
+ admin_client_cert, admin_client_key):
+ # KUBECONFIG environment variable
+ # reference:
+ # https://kubernetes.io/docs/tasks/access-application-cluster/configure-access-multiple-clusters/
+ data = {
+ 'apiVersion': 'v1',
+ 'clusters': [
+ {
+ 'cluster': {
+ 'server':
+ cluster_api_endpoint,
+ 'certificate-authority-data':
+ cluster_ca_cert,
+ },
+ 'name': 'inf-cluster'
+ }],
+ 'contexts': [
+ {
+ 'context': {
+ 'cluster': 'inf-cluster',
+ 'user': 'kubernetes-admin'
+ },
+ 'name': 'kubernetes-admin@inf-cluster'
+ }
+ ],
+ 'current-context': 'kubernetes-admin@inf-cluster',
+ 'kind': 'Config',
+ 'preferences': {},
+ 'users': [
+ {
+ 'name': admin_user,
+ 'user': {
+ 'client-certificate-data':
+ admin_client_cert,
+ 'client-key-data':
+ admin_client_key,
+ }
+ }]
+ }
+
+ return data
+
+
+def get_helmcli_access():
+ host_external = os.environ.get("API_HOST_EXTERNAL_FLOATING")
+ host = "127.0.0.1" if host_external is None or host_external == '' \
+ else host_external
+ port = "10022" if host_external is None or host_external == '' \
+ else "30022"
+
+ helm_host_with_port = host+':'+port
+ helm_user = 'helm'
+ helm_pass = os.environ.get("HELM_USER_PASSWD")
+
+ return helm_host_with_port, helm_user, helm_pass
+
+
+def get_alarm_yaml_filename():
+ alarm_yaml_name = os.environ.get("ALARM_YAML")
+ if alarm_yaml_name is not None and os.path.isfile(alarm_yaml_name):
+ return alarm_yaml_name
+ return "/configs/alarm.yaml"
+
+
+def get_events_yaml_filename():
+ events_yaml_name = os.environ.get("EVENTS_YAML")
+ if events_yaml_name is not None and os.path.isfile(events_yaml_name):
+ return events_yaml_name
+ return "/configs/events.yaml"