3 # Licensed under the Apache License, Version 2.0 (the "License");
4 # you may not use this file except in compliance with the License.
5 # You may obtain a copy of the License at
7 # http://www.apache.org/licenses/LICENSE-2.0
9 # Unless required by applicable law or agreed to in writing, software
10 # distributed under the License is distributed on an "AS IS" BASIS,
11 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 # See the License for the specific language governing permissions and
13 # limitations under the License.
18 JUJU_AGENT_VERSION
=2.8.8
19 K8S_CLOUD_NAME
="k8s-cloud"
20 KUBECTL
="microk8s.kubectl"
23 IMAGES_OVERLAY_FILE
=~
/.osm
/images-overlay.yaml
24 PATH
=/snap
/bin
:${PATH}
29 OSM_HA_BUNDLE
=cs
:osm-ha-40
32 function check_arguments
(){
33 while [ $# -gt 0 ] ; do
35 --bundle) BUNDLE
="$2" ;;
36 --k8s) KUBECFG
="$2" ;;
37 --vca) CONTROLLER
="$2" ;;
38 --lxd) LXD_CLOUD
="$2" ;;
39 --lxd-cred) LXD_CREDENTIALS
="$2" ;;
40 --microstack) MICROSTACK
=y
;;
41 --ha) BUNDLE
=$OSM_HA_BUNDLE ;;
43 --registry) REGISTRY_INFO
="$2" ;;
48 # echo $BUNDLE $KUBECONFIG $LXDENDPOINT
51 function install_snaps
(){
52 if [ ! -v KUBECFG
]; then
53 sudo snap
install microk8s
--classic --channel=${MICROK8S_VERSION}/stable
54 sudo
cat /var
/snap
/microk8s
/current
/args
/kube-apiserver |
grep advertise-address ||
(
55 echo "--advertise-address $DEFAULT_IP" | sudo
tee -a /var
/snap
/microk8s
/current
/args
/kube-apiserver
59 sudo usermod
-a -G microk8s
`whoami`
61 sudo chown
-f -R `whoami` ~
/.kube
63 sg
${KUBEGRP} -c "microk8s status --wait-ready"
64 KUBECONFIG
=~
/.osm
/microk8s-config.yaml
65 sg
${KUBEGRP} -c "microk8s config" |
tee ${KUBECONFIG}
68 sudo snap
install kubectl
--classic
69 export KUBECONFIG
=${KUBECFG}
72 sudo snap
install juju
--classic --channel=2.8/stable
75 function bootstrap_k8s_lxd
(){
76 [ -v CONTROLLER
] && ADD_K8S_OPTS
="--controller ${CONTROLLER}" && CONTROLLER_NAME
=$CONTROLLER
77 [ ! -v CONTROLLER
] && ADD_K8S_OPTS
="--client" && BOOTSTRAP_NEEDED
="yes" && CONTROLLER_NAME
="osm-vca"
79 if [ -v BOOTSTRAP_NEEDED
]; then
80 CONTROLLER_PRESENT
=$
(juju controllers
2>/dev
/null|
grep ${CONTROLLER_NAME} |
wc -l)
81 if [ $CONTROLLER_PRESENT -ge 1 ]; then
83 Threre is already a VCA present with the installer reserved name of "${CONTROLLER_NAME}".
84 You may either explicitly use this VCA with the "--vca ${CONTROLLER_NAME}" option, or remove it
87 juju destroy-controller --release-storage --destroy-all-models -y ${CONTROLLER_NAME}
89 Please retry the installation once this conflict has been resolved.
94 CONTROLLER_PRESENT
=$
(juju controllers
2>/dev
/null|
grep ${CONTROLLER_NAME} |
wc -l)
95 if [ $CONTROLLER_PRESENT -le 0 ]; then
97 Threre is no VCA present with the name "${CONTROLLER_NAME}". Please specify a VCA
98 that exists, or remove the --vca ${CONTROLLER_NAME} option.
100 Please retry the installation with one of the solutions applied.
106 if [ -v KUBECFG
]; then
107 cat $KUBECFG | juju add-k8s
$K8S_CLOUD_NAME $ADD_K8S_OPTS
108 [ -v BOOTSTRAP_NEEDED
] && juju bootstrap
$K8S_CLOUD_NAME $CONTROLLER_NAME \
109 --config controller-service-type
=loadbalancer \
110 --agent-version=$JUJU_AGENT_VERSION
112 sg
${KUBEGRP} -c "echo ${DEFAULT_IP}-${DEFAULT_IP} | microk8s.
enable metallb
"
113 sg ${KUBEGRP} -c "microk8s.
enable ingress
"
114 sg ${KUBEGRP} -c "microk8s.
enable storage dns
"
116 start_time="$
(date -u +%s
)"
120 if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then
121 echo "Microk8s storage failed to
enable"
122 sg ${KUBEGRP} -c "microk8s.status
"
125 storage_status=`sg ${KUBEGRP} -c "microk8s.status
-a storage
"`
126 if [[ $storage_status == "enabled
" ]]; then
132 [ ! -v BOOTSTRAP_NEEDED ] && sg ${KUBEGRP} -c "microk8s.config
" | juju add-k8s $K8S_CLOUD_NAME $ADD_K8S_OPTS
133 [ -v BOOTSTRAP_NEEDED ] && sg ${KUBEGRP} -c \
134 "juju bootstrap microk8s
$CONTROLLER_NAME --config controller-service-type
=loadbalancer
--agent-version=$JUJU_AGENT_VERSION" \
135 && K8S_CLOUD_NAME=microk8s
138 if [ -v LXD_CLOUD ]; then
139 if [ ! -v LXD_CREDENTIALS ]; then
140 echo "The installer needs the LXD server certificate
if the LXD is external
"
144 LXDENDPOINT=$DEFAULT_IP
145 LXD_CLOUD=~/.osm/lxd-cloud.yaml
146 LXD_CREDENTIALS=~/.osm/lxd-credentials.yaml
147 # Apply sysctl production values for optimal performance
148 sudo cp /usr/share/osm-devops/installers/60-lxd-production.conf /etc/sysctl.d/60-lxd-production.conf
151 sudo apt-get remove --purge -y liblxc1 lxc-common lxcfs lxd lxd-client
152 sudo snap install lxd
154 sudo usermod -a -G lxd `whoami`
155 cat /usr/share/osm-devops/installers/lxd-preseed.conf | sed 's/^config: {}/config:\n core.https_address: '$LXDENDPOINT':8443/' | sg lxd -c "lxd init
--preseed"
156 sg lxd -c "lxd waitready
"
157 DEFAULT_MTU=$(ip addr show $DEFAULT_IF | perl -ne 'if (/mtu\s(\d+)/) {print $1;}')
158 sg lxd -c "lxc profile device
set default eth0 mtu
$DEFAULT_MTU"
159 sg lxd -c "lxc network
set lxdbr0 bridge.mtu
$DEFAULT_MTU"
161 cat << EOF > $LXD_CLOUD
165 auth-types: [certificate]
166 endpoint: "https
://$LXDENDPOINT:8443"
168 ssl-hostname-verification: false
170 openssl req -nodes -new -x509 -keyout ~/.osm/client.key -out ~/.osm/client.crt -days 365 -subj "/C
=FR
/ST
=Nice
/L
=Nice
/O
=ETSI
/OU
=OSM
/CN
=osm.etsi.org
"
171 local server_cert=`cat /var/snap/lxd/common/lxd/server.crt | sed 's/^/ /'`
172 local client_cert=`cat ~/.osm/client.crt | sed 's/^/ /'`
173 local client_key=`cat ~/.osm/client.key | sed 's/^/ /'`
175 cat << EOF > $LXD_CREDENTIALS
179 auth-type: certificate
187 lxc config trust add local: ~/.osm/client.crt
190 juju add-cloud -c $CONTROLLER_NAME lxd-cloud $LXD_CLOUD --force
191 juju add-credential -c $CONTROLLER_NAME lxd-cloud -f $LXD_CREDENTIALS
192 sg lxd -c "lxd waitready
"
193 juju controller-config features=[k8s-operators]
196 function wait_for_port(){
200 start_time="$
(date -u +%s
)"
204 if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then
205 echo "Failed to expose external
${SERVICE} interface port
"
209 if [ $(sg ${KUBEGRP} -c "${KUBECTL} get ingresses.networking -n osm -o json | jq -r '.items[$INDEX].metadata.name'") == ${SERVICE} ] ; then
216 function deploy_charmed_osm(){
217 if [ -v REGISTRY_INFO ] ; then
218 registry_parts=(${REGISTRY_INFO//@/ })
219 if [ ${#registry_parts[@]} -eq 1 ] ; then
220 # No credentials supplied
223 REGISTRY_URL=${registry_parts[0]}
225 credentials=${registry_parts[0]}
226 credential_parts=(${credentials//:/ })
227 REGISTRY_USERNAME=${credential_parts[0]}
228 REGISTRY_PASSWORD=${credential_parts[1]}
229 REGISTRY_URL=${registry_parts[1]}
231 # Ensure the URL ends with a /
232 case $REGISTRY_URL in
234 *) REGISTRY_URL=${REGISTRY_URL}/
239 echo "Creating OSM model
"
240 if [ -v KUBECFG ]; then
241 juju add-model $MODEL_NAME $K8S_CLOUD_NAME
243 sg ${KUBEGRP} -c "juju add-model
$MODEL_NAME $K8S_CLOUD_NAME"
245 echo "Deploying OSM with charms
"
247 if [ -v REGISTRY_URL ]; then
248 [ ! -v TAG ] && TAG='latest'
250 [ -v TAG ] && generate_images_overlay && images_overlay="--overlay $IMAGES_OVERLAY_FILE"
252 if [ -v BUNDLE ]; then
253 juju deploy -m $MODEL_NAME $BUNDLE --overlay ~/.osm/vca-overlay.yaml $images_overlay
255 juju deploy -m $MODEL_NAME $OSM_BUNDLE --overlay ~/.osm/vca-overlay.yaml $images_overlay
258 echo "Waiting
for deployment to finish...
"
260 echo "OSM with charms deployed
"
261 if [ ! -v KUBECFG ]; then
262 API_SERVER=${DEFAULT_IP}
264 API_SERVER=$(kubectl config view --minify | grep server | cut -f 2- -d ":" | tr -d " ")
265 proto="$
(echo $API_SERVER |
grep :// |
sed -e's,^\(.*://\).*,\1,g')"
266 url="$
(echo ${API_SERVER/$proto/})"
267 user="$
(echo $url |
grep @ | cut
-d@
-f1)"
268 hostport="$
(echo ${url/$user@/} | cut
-d/ -f1)"
269 API_SERVER="$
(echo $hostport |
sed -e 's,:.*,,g')"
272 # Expose OSM services
274 juju config -m $MODEL_NAME nbi site_url=https://nbi.${API_SERVER}.nip.io
275 juju config -m $MODEL_NAME ng-ui site_url=https://ui.${API_SERVER}.nip.io
278 juju config -m $MODEL_NAME grafana-k8s juju-external-hostname=grafana.${API_SERVER}.nip.io
279 juju expose -m $MODEL_NAME grafana-k8s
280 wait_for_port grafana-k8s 0
283 juju config -m $MODEL_NAME prometheus-k8s juju-external-hostname=prometheus.${API_SERVER}.nip.io
284 juju expose -m $MODEL_NAME prometheus-k8s
285 wait_for_port prometheus-k8s 1
288 sg ${KUBEGRP} -c "${KUBECTL} annotate ingresses.networking nginx.ingress.kubernetes.io
/proxy-body-size
=0 -n osm
-l juju-app
=ng-ui
"
291 function check_osm_deployed() {
293 start_time="$
(date -u +%s
)"
294 total_service_count=14
298 service_count=$(juju status -m $MODEL_NAME | grep kubernetes | grep active | wc -l)
299 echo "$service_count / $total_service_count services active
"
300 if [ $service_count -eq $total_service_count ]; then
303 if [ $service_count -ne $previous_count ]; then
304 previous_count=$service_count
305 start_time="$
(date -u +%s
)"
308 if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then
309 echo "Timed out waiting
for OSM services to become ready
"
316 function create_overlay() {
319 local HOME=/home/$USER
320 local vca_user=$(cat $HOME/.local/share/juju/accounts.yaml | yq e .controllers.$CONTROLLER_NAME.user - )
321 local vca_password=$(cat $HOME/.local/share/juju/accounts.yaml | yq e .controllers.$CONTROLLER_NAME.password - )
322 local vca_host=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.api-endpoints[0] - | cut -d ":" -f 1)
323 local vca_port=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.api-endpoints[0] - | cut -d ":" -f 2)
324 local vca_pubkey=\"$(cat $HOME/.local/share/juju/ssh/juju_id_rsa.pub)\"
325 local vca_cloud="lxd-cloud
"
326 # Get the VCA Certificate
327 local vca_cacert=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.ca-cert - | base64 | tr -d \\n)
329 # Calculate the default route of this machine
330 local DEFAULT_IF=`ip route list match 0.0.0.0 | awk '{print $5}'`
332 # Generate a new overlay.yaml, overriding any existing one
333 cat << EOF > /tmp/vca-overlay.yaml
338 vca_password: $vca_password
341 vca_pubkey: $vca_pubkey
342 vca_cacert: $vca_cacert
343 vca_cloud: $vca_cloud
344 vca_k8s_cloud: $K8S_CLOUD_NAME
348 vca_password: $vca_password
350 vca_cacert: $vca_cacert
352 mv /tmp/vca-overlay.yaml ~/.osm/
353 OSM_VCA_HOST=$vca_host
356 function generate_images_overlay(){
357 cat << EOF > /tmp/nbi_registry.yaml
358 registrypath: ${REGISTRY_URL}opensourcemano/nbi:$TAG
360 cat << EOF > /tmp/ng_ui_registry.yaml
361 registrypath: ${REGISTRY_URL}opensourcemano/ng-ui:$TAG
363 if [ ! -z "$REGISTRY_USERNAME" ] ; then
364 REGISTRY_CREDENTIALS=$(cat <<EOF
366 image_username: $REGISTRY_USERNAME
367 image_password: $REGISTRY_PASSWORD
370 echo username: $REGISTRY_USERNAME >> /tmp/nbi_registry.yaml
371 echo password: $REGISTRY_PASSWORD >> /tmp/nbi_registry.yaml
372 echo username: $REGISTRY_USERNAME >> /tmp/ng_ui_registry.yaml
373 echo password: $REGISTRY_PASSWORD >> /tmp/ng_ui_registry.yaml
376 cat << EOF > /tmp/images-overlay.yaml
380 image: ${REGISTRY_URL}opensourcemano/lcm:$TAG ${REGISTRY_CREDENTIALS}
383 image: ${REGISTRY_URL}opensourcemano/mon:$TAG ${REGISTRY_CREDENTIALS}
386 image: ${REGISTRY_URL}opensourcemano/ro:$TAG ${REGISTRY_CREDENTIALS}
389 image: /tmp/nbi_registry.yaml
392 image: ${REGISTRY_URL}opensourcemano/pol:$TAG ${REGISTRY_CREDENTIALS}
395 image: ${REGISTRY_URL}opensourcemano/pla:8 ${REGISTRY_CREDENTIALS}
398 image: /tmp/ng_ui_registry.yaml
401 image: ${REGISTRY_URL}opensourcemano/keystone:$TAG ${REGISTRY_CREDENTIALS}
403 mv /tmp/images-overlay.yaml $IMAGES_OVERLAY_FILE
406 function refresh_osmclient_snap() {
407 osmclient_snap_install_refresh refresh
410 function install_osm_client_snap() {
411 osmclient_snap_install_refresh install
414 function osmclient_snap_install_refresh() {
415 channel_preference="stable candidate beta edge
"
416 for channel in $channel_preference; do
417 echo "Trying to
install osmclient from channel
$OSMCLIENT_VERSION/$channel"
418 sudo snap $1 osmclient --channel $OSMCLIENT_VERSION/$channel 2> /dev/null && echo osmclient snap installed && break
421 function install_osmclient() {
422 snap info osmclient | grep -E ^installed: && refresh_osmclient_snap || install_osm_client_snap
425 function add_local_k8scluster() {
426 osm --all-projects vim-create \
427 --name _system-osm-vim \
428 --account_type dummy \
429 --auth_url http://dummy \
430 --user osm --password osm --tenant osm \
431 --description "dummy
" \
432 --config '{management_network_name: mgmt}'
433 tmpfile=$(mktemp --tmpdir=${HOME})
434 cp ${KUBECONFIG} ${tmpfile}
435 osm --all-projects k8scluster-add \
437 --vim _system-osm-vim \
438 --k8s-nets '{"net1
": null}' \
440 --description "OSM Internal Cluster
" \
445 function install_microstack() {
446 # Install and init microstack
447 sudo snap install microstack --channel beta --devmode
448 sudo snap set microstack config.network.ports.dashboard=8080
449 sudo microstack.init --auto --control
451 # Basic configuration
452 microstack.openstack network create --enable --no-share osm-ext
453 microstack.openstack subnet create osm-ext-subnet --network osm-ext --dns-nameserver 8.8.8.8 --subnet-range 172.16.0.0/24
454 microstack.openstack router create external-router
455 microstack.openstack router add subnet external-router osm-ext-subnet
456 microstack.openstack router set --external-gateway external external-router
457 for i in $(microstack.openstack security group list | awk '/default/{ print $2 }'); do
458 microstack.openstack security group rule create $i --protocol icmp --remote-ip 0.0.0.0/0
459 microstack.openstack security group rule create $i --protocol tcp --remote-ip 0.0.0.0/0
461 KEYPAIR_PATH=~/.ssh/microstack
462 if ! test -f $KEYPAIR_PATH; then
463 echo "Generating
ssh keypair
for microstack
"
464 ssh-keygen -t rsa -N "" -f $KEYPAIR_PATH
466 microstack.openstack keypair create --public-key $KEYPAIR_PATH.pub microstack
468 # Add xenial, bionic, and focal images to microstack
469 echo "curl https
://cloud-images.ubuntu.com
/xenial
/current
/xenial-server-cloudimg-amd64-disk1.img | microstack.openstack image create
--public --container-format=bare
--disk-format=qcow2 ubuntu16.04
"
470 echo "curl https
://cloud-images.ubuntu.com
/bionic
/current
/bionic-server-cloudimg-amd64.img | microstack.openstack image create
--public --container-format=bare
--disk-format=qcow2 ubuntu18.04
"
471 echo "curl https
://cloud-images.ubuntu.com
/focal
/current
/focal-server-cloudimg-amd64.img | microstack.openstack image create
--public --container-format=bare
--disk-format=qcow2 ubuntu20.04
"
474 . /var/snap/microstack/common/etc/microstack.rc
475 osm vim-create --name microstack \
476 --user "$OS_USERNAME" \
477 --password "$OS_PASSWORD" \
478 --auth_url "$OS_AUTH_URL/v3
" \
479 --tenant "$OS_USERNAME" \
480 --account_type openstack \
482 use_floating_ip: True,
483 management_network_name: osm-ext,
486 user_domain_name: default,
487 region_name: microstack,
489 availability_zone: nova,
494 DEFAULT_IF=`ip route list match 0.0.0.0 | awk '{print $5}'`
495 DEFAULT_IP=`ip -o -4 a |grep ${DEFAULT_IF}|awk '{split($4,a,"/"); print a[1]}'`
503 export OSM_HOSTNAME=$(juju config nbi site_url | sed "s
/http.
*\?:\
/\
///"):443
506 if [ -v MICROSTACK ]; then
511 echo "Your installation is now complete
, follow these steps
for configuring the osmclient
:"
513 echo "1. Create the OSM_HOSTNAME environment variable with the NBI IP
"
515 echo "export OSM_HOSTNAME
=$OSM_HOSTNAME"
517 echo "2. Add the previous
command to your .bashrc
for other Shell sessions
"
519 echo "echo \"export OSM_HOSTNAME
=$OSM_HOSTNAME\" >> ~
/.bashrc
"