blob: 5c0e84764a7a5bab4aa47b4969bdac1e343b0a40 [file] [log] [blame]
garciadeblascf603f52025-06-04 11:57:28 +02001#!/bin/bash
2#
3# Licensed under the Apache License, Version 2.0 (the "License");
4# you may not use this file except in compliance with the License.
5# You may obtain a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS,
11# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12# See the License for the specific language governing permissions and
13# limitations under the License.
14#
15
16set -e -o pipefail
17
18HERE=$(dirname "$(readlink --canonicalize "$BASH_SOURCE")")
19source "${HERE}/../library/functions.sh"
20source "${HERE}/../library/trap.sh"
21source "${HERE}/../library/logging"
22source "${HERE}/../library/track"
23
24source "${HERE}/00-default-install-options.rc"
25[ ! -f "${OSM_HOME_DIR}/user-install-options.rc" ] || source "${OSM_HOME_DIR}/user-install-options.rc"
26source "${CREDENTIALS_DIR}/git_environment.rc"
27
28OSM_HELM_WORK_DIR="/etc/osm/helm"
garciadeblascf603f52025-06-04 11:57:28 +020029KUBECONFIG_AUX_CLUSTER_FILE="${OSM_HOME_DIR}/clusters/kubeconfig-aux-svc.yaml"
30KUBECONFIG_MGMT_CLUSTER_FILE="${OSM_HOME_DIR}/clusters/kubeconfig-mgmt.yaml"
31[ "${HERE}" == "/usr/share/osm-devops/installers" ] || OSM_HELM_UPDATE_DEPENDENCIES="y"
32OSM_GITOPS_ENABLED=${INSTALL_MGMT_CLUSTER:-"y"}
33
34# TODO: move this to a parent script that creates the VM
35mkdir -p "${OSM_HOME_DIR}/clusters"
36if [ -n "${KUBECONFIG_OSM_CLUSTER}" ]; then
37 cp "${KUBECONFIG_OSM_CLUSTER}" "${OSM_HOME_DIR}/clusters/kubeconfig-osm.yaml"
38else
39 cp "${HOME}/.kube/config" "${OSM_HOME_DIR}/clusters/kubeconfig-osm.yaml"
40fi
41
42export KUBECONFIG="${OSM_HOME_DIR}/clusters/kubeconfig-osm.yaml"
garciadeblas0df99ed2025-09-09 14:00:42 +020043if [ -z "${OSM_BASE_DOMAIN}" ]; then
44 echo "OSM_BASE_DOMAIN is not set, will try to set it from the nginx ingress controller load balancer IP"
garciadeblas8a28f6d2025-06-11 11:11:56 +020045 OSM_K8S_NGINX_IPADDRESS=$(kubectl get svc ingress-nginx-controller -n ingress-nginx -o jsonpath='{.status.loadBalancer.ingress[0].ip}' 2>/dev/null)
garciadeblas0df99ed2025-09-09 14:00:42 +020046 OSM_BASE_DOMAIN="${OSM_BASE_DOMAIN:-"${OSM_K8S_NGINX_IPADDRESS}.nip.io"}"
garciadeblas8a28f6d2025-06-11 11:11:56 +020047fi
garciadeblas0df99ed2025-09-09 14:00:42 +020048echo "Using OSM_BASE_DOMAIN=${OSM_BASE_DOMAIN}"
garciadeblascf603f52025-06-04 11:57:28 +020049
50# Create folder to store helm values
51sudo mkdir -p ${OSM_HELM_WORK_DIR}
52
53# Saving secrets
54echo "Creating namespace ${OSM_NAMESPACE}"
garciadeblas8a28f6d2025-06-11 11:11:56 +020055kubectl get ns "${OSM_NAMESPACE}" >/dev/null 2>&1 || kubectl create ns "${OSM_NAMESPACE}"
garciadeblascf603f52025-06-04 11:57:28 +020056echo "Saving age keys in OSM cluster"
garciadeblas8a28f6d2025-06-11 11:11:56 +020057kubectl -n ${OSM_NAMESPACE} get secret mgmt-cluster-age-keys >/dev/null 2>&1 || \
garciadeblascf603f52025-06-04 11:57:28 +020058kubectl -n ${OSM_NAMESPACE} create secret generic mgmt-cluster-age-keys --from-file=privkey="${CREDENTIALS_DIR}/age.mgmt.key" --from-file=pubkey="${CREDENTIALS_DIR}/age.mgmt.pub"
59echo "Creating secrets with kubeconfig files"
garciadeblas8a28f6d2025-06-11 11:11:56 +020060if [ -f "${KUBECONFIG_AUX_CLUSTER_FILE}" ]; then
61 kubectl -n ${OSM_NAMESPACE} get secret auxcluster-secret >/dev/null 2>&1 || \
62 kubectl -n ${OSM_NAMESPACE} create secret generic auxcluster-secret --from-file=kubeconfig="${KUBECONFIG_AUX_CLUSTER_FILE}"
63fi
64if [ -f "${KUBECONFIG_MGMT_CLUSTER_FILE}" ]; then
65 kubectl -n ${OSM_NAMESPACE} get secret mgmtcluster-secret >/dev/null 2>&1 || \
66 kubectl -n ${OSM_NAMESPACE} create secret generic mgmtcluster-secret --from-file=kubeconfig="${KUBECONFIG_MGMT_CLUSTER_FILE}"
67fi
garciadeblascf603f52025-06-04 11:57:28 +020068# Update helm dependencies
69[ -n "${OSM_HELM_UPDATE_DEPENDENCIES}" ] && \
70 echo "Updating helm dependencies" && \
71 helm dependency update "${HERE}/helm/osm"
72
73# Generate helm values to be passed with --set
74OSM_HELM_OPTS=""
75# OSM_HELM_OPTS="${OSM_HELM_OPTS} --set nbi.useOsmSecret=false"
garciadeblas578ac922025-09-08 17:17:23 +020076[ -n "${OSM_HELM_TIMEOUT}" ] && OSM_HELM_OPTS="${OSM_HELM_OPTS} --timeout ${OSM_HELM_TIMEOUT}"
garciadeblascf603f52025-06-04 11:57:28 +020077
78# TODO: review if next line is really needed or should be conditional to DOCKER_REGISTRY_URL not empty
79# [ -n "${DOCKER_REGISTRY_URL}" ] && OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.image.repository=${DOCKER_REGISTRY_URL}${DOCKER_USER}"
80OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.image.repositoryBase=${DOCKER_REGISTRY_URL}${DOCKER_USER}"
garciadeblas24a20d12025-09-10 17:09:06 +020081OSM_HELM_OPTS="${OSM_HELM_OPTS} --set airflow.defaultAirflowRepository=${DOCKER_REGISTRY_URL}${DOCKER_USER}/airflow"
garciadeblascf603f52025-06-04 11:57:28 +020082[ ! "$OSM_DOCKER_TAG" == "testing-daily" ] && OSM_HELM_OPTS="${OSM_HELM_OPTS} --set-string global.image.tag=${OSM_DOCKER_TAG}"
garciadeblas24a20d12025-09-10 17:09:06 +020083[ ! "$OSM_DOCKER_TAG" == "testing-daily" ] && OSM_HELM_OPTS="${OSM_HELM_OPTS} --set-string airflow.defaultAirflowTag=${OSM_DOCKER_TAG}"
garciadeblascf603f52025-06-04 11:57:28 +020084[ ! "$OSM_DOCKER_TAG" == "testing-daily" ] && OSM_HELM_OPTS="${OSM_HELM_OPTS} --set prometheus.server.sidecarContainers.prometheus-config-sidecar.image=${DOCKER_REGISTRY_URL}${DOCKER_USER}/prometheus:${OSM_DOCKER_TAG}"
85
garciadeblas8a28f6d2025-06-11 11:11:56 +020086OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.hostname=${OSM_BASE_DOMAIN}"
garciadeblasb89a41f2025-09-09 13:07:50 +020087if [ -n "${OSM_CLUSTER_INGRESS_CLASS}" ]; then
88 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.ingressClassName=${OSM_CLUSTER_INGRESS_CLASS}"
89 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set grafana.ingress.ingressClassName=${OSM_CLUSTER_INGRESS_CLASS}"
90 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set prometheus.server.ingress.ingressClassName=${OSM_CLUSTER_INGRESS_CLASS}"
91 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set airflow.ingress.web.ingressClassName=${OSM_CLUSTER_INGRESS_CLASS}"
92 # OSM_HELM_OPTS="${OSM_HELM_OPTS} --set prometheus.alertmanager.ingress.ingressClassName=${OSM_CLUSTER_INGRESS_CLASS}"
93fi
garciadeblas8a28f6d2025-06-11 11:11:56 +020094OSM_HELM_OPTS="${OSM_HELM_OPTS} --set grafana.ingress.hosts={grafana.${OSM_BASE_DOMAIN}}"
95OSM_HELM_OPTS="${OSM_HELM_OPTS} --set prometheus.server.ingress.hosts={prometheus.${OSM_BASE_DOMAIN}}"
garciadeblas9b3ae032025-08-06 12:09:29 +020096OSM_HELM_OPTS="${OSM_HELM_OPTS} --set airflow.ingress.web.hosts={airflow.${OSM_BASE_DOMAIN}}"
garciadeblas8a28f6d2025-06-11 11:11:56 +020097# OSM_HELM_OPTS="${OSM_HELM_OPTS} --set prometheus.alertmanager.ingress.hosts={alertmanager.${OSM_BASE_DOMAIN}}"
garciadeblascf603f52025-06-04 11:57:28 +020098if [ -z "${OSM_GITOPS_ENABLED}" ]; then
99 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.gitops.enabled=false"
100else
garciadeblas823d8a32025-07-08 10:41:53 +0200101 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.gitops.gitBaseUrl=${GIT_BASE_HTTP_URL}"
garciadeblascf603f52025-06-04 11:57:28 +0200102 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.gitops.fleetRepoUrl=${FLEET_REPO_HTTP_URL}"
103 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.gitops.swcatalogsRepoUrl=${SW_CATALOGS_REPO_HTTP_URL}"
104 # TODO: evaluate if we need to set two git user names, one for fleet and one for sw-catalogs
garciadeblas823d8a32025-07-08 10:41:53 +0200105 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.gitops.gitUser=${GIT_BASE_USERNAME}"
garciadeblascf603f52025-06-04 11:57:28 +0200106 AGE_MGMT_PUBKEY=$(tr -d '\n' < ${CREDENTIALS_DIR}/age.mgmt.pub)
107 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.gitops.pubkey=${AGE_MGMT_PUBKEY}"
108fi
109
110if [ -n "${OSM_BEHIND_PROXY}" ]; then
111 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.behindHttpProxy=true"
112 [ -n "${HTTP_PROXY}" ] && OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.httpProxy.HTTP_PROXY=\"${HTTP_PROXY}\""
113 [ -n "${HTTPS_PROXY}" ] && OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.httpProxy.HTTPS_PROXY=\"${HTTPS_PROXY}\""
114 if [ -n "${NO_PROXY}" ]; then
115 if [[ ! "${NO_PROXY}" =~ .*".svc".* ]]; then
116 NO_PROXY="${NO_PROXY},.svc"
117 fi
118 if [[ ! "${NO_PROXY}" =~ .*".cluster.local".* ]]; then
119 NO_PROXY="${NO_PROXY},.cluster.local"
120 fi
121 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set global.httpProxy.NO_PROXY=\"${NO_PROXY//,/\,}\""
122 fi
123fi
124
garciadeblas0b1c75c2025-11-11 23:04:39 +0100125# Only applicable to OSM CICD pipeline
126# Test specific modules specified in MODULES_FOR_TESTING, using docker tag MODULE_DOCKER_TAG
127if [ -n "${MODULES_FOR_TESTING}" ]; then
128 for module in MON NBI RO LCM KEYSTONE NGUI NG-SA prometheus webhookTranslator; do
129 if echo ${MODULES_FOR_TESTING} | grep -q ${module} ; then
130 if [ "${module}" == "NG-SA" ]; then
131 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set-string airflow.defaultAirflowTag=${MODULE_DOCKER_TAG}"
132 elif [ "${module}" == "prometheus" ]; then
133 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set prometheus.server.sidecarContainers.prometheus-config-sidecar.image=${DOCKER_REGISTRY_URL}${DOCKER_USER}/prometheus:${OSM_DOCKER_TAG}"
134 else
135 # For the rest of cases, set the image tag normally
136 helm_entry=${module,,}
137 echo "Setting custom docker tag ${MODULE_DOCKER_TAG} for module ${module} in helm options"
138 OSM_HELM_OPTS="${OSM_HELM_OPTS} --set ${helm_entry}.image.tag=${MODULE_DOCKER_TAG}"
139 fi
140 fi
141 done
142fi
143
garciadeblas5d2eddf2025-11-25 16:59:01 +0100144[ ! -f "${OSM_HOME_DIR}/user-values.yaml" ] || OSM_HELM_OPTS="${OSM_HELM_OPTS} --values ${OSM_HOME_DIR}/user-values.yaml"
145
146echo "helm upgrade --install -n $OSM_NAMESPACE --create-namespace $OSM_HELM_RELEASE ${HERE}/helm/osm ${OSM_HELM_OPTS}"
147helm upgrade --install -n $OSM_NAMESPACE --create-namespace $OSM_HELM_RELEASE ${HERE}/helm/osm ${OSM_HELM_OPTS}
148# Export final values.yaml used to install OSM to a file for future reference
garciadeblascf603f52025-06-04 11:57:28 +0200149helm -n $OSM_NAMESPACE get values $OSM_HELM_RELEASE | sudo tee -a ${OSM_HELM_WORK_DIR}/osm-values.yaml
150
151# Check OSM health state
152echo -e "Checking OSM health state..."
153set +e
154${HERE}/45-osm-health.sh || \
155(echo -e "OSM is not healthy, but will probably converge to a healthy state soon." && \
156echo -e "Check OSM status with: kubectl -n ${OSM_NAMESPACE} get all" && \
157track healthchecks osm_unhealthy didnotconverge)
158track healthchecks after_healthcheck_ok
159set -e
160
161echo -e "Saving OSM enviroment to credentials folder..."
162OSM_HOSTNAME=$(kubectl get --namespace osm -o jsonpath="{.spec.rules[0].host}" ingress nbi-ingress)
garciadeblas8a28f6d2025-06-11 11:11:56 +0200163# OSM_HOSTNAME="nbi.${OSM_BASE_DOMAIN}:443"
garciadeblascf603f52025-06-04 11:57:28 +0200164echo -e "OSM HOSTNAME: ${OSM_HOSTNAME}"
165
166cat << EOF > "${CREDENTIALS_DIR}/osm_environment.rc"
167export OSM_HOSTNAME="${OSM_HOSTNAME}"
168EOF