# set -eux
-JUJU_AGENT_VERSION=2.8.9
+LXD_VERSION=5.0
+JUJU_VERSION=2.9
+JUJU_AGENT_VERSION=2.9.34
K8S_CLOUD_NAME="k8s-cloud"
KUBECTL="microk8s.kubectl"
-MICROK8S_VERSION=1.19
-OSMCLIENT_VERSION=9.0
+MICROK8S_VERSION=1.26
+OSMCLIENT_VERSION=latest
IMAGES_OVERLAY_FILE=~/.osm/images-overlay.yaml
+PASSWORD_OVERLAY_FILE=~/.osm/password-overlay.yaml
PATH=/snap/bin:${PATH}
+OSM_DEVOPS="$( cd "$( dirname "${BASH_SOURCE[0]}" )"/.. &> /dev/null && pwd )"
+INSTALL_PLA=""
+PLA_OVERLAY_FILE=~/.osm/pla-overlay.yaml
+
+if [ -f ${OSM_DEVOPS}/common/all_funcs ] ; then
+ source ${OSM_DEVOPS}/common/all_funcs
+else
+ function track(){
+ true
+ }
+ function FATAL_TRACK(){
+ exit 1
+ }
+fi
MODEL_NAME=osm
-OSM_BUNDLE=cs:osm-61
-OSM_HA_BUNDLE=cs:osm-ha-46
-TAG=testing-daily
+OSM_BUNDLE=ch:osm
+OSM_HA_BUNDLE=ch:osm-ha
+CHARMHUB_CHANNEL=latest/beta
+unset TAG
function check_arguments(){
while [ $# -gt 0 ] ; do
case $1 in
--bundle) BUNDLE="$2" ;;
+ --overlay) OVERLAY="$2" ;;
--k8s) KUBECFG="$2" ;;
--vca) CONTROLLER="$2" ;;
+ --small-profile) INSTALL_NOLXD=y;;
--lxd) LXD_CLOUD="$2" ;;
--lxd-cred) LXD_CREDENTIALS="$2" ;;
--microstack) MICROSTACK=y ;;
--tag) TAG="$2" ;;
--registry) REGISTRY_INFO="$2" ;;
--only-vca) ONLY_VCA=y ;;
+ --pla) INSTALL_PLA=y ;;
esac
shift
done
function install_snaps(){
if [ ! -v KUBECFG ]; then
- sudo snap install microk8s --classic --channel=${MICROK8S_VERSION}/stable
+ KUBEGRP="microk8s"
+ sudo snap install microk8s --classic --channel=${MICROK8S_VERSION}/stable ||
+ FATAL_TRACK k8scluster "snap install microk8s ${MICROK8S_VERSION}/stable failed"
+ sudo usermod -a -G microk8s `whoami`
sudo cat /var/snap/microk8s/current/args/kube-apiserver | grep advertise-address || (
echo "--advertise-address $DEFAULT_IP" | sudo tee -a /var/snap/microk8s/current/args/kube-apiserver
- microk8s.stop
- microk8s.start
+ sg ${KUBEGRP} -c microk8s.stop
+ sg ${KUBEGRP} -c microk8s.start
)
- sudo usermod -a -G microk8s `whoami`
mkdir -p ~/.kube
sudo chown -f -R `whoami` ~/.kube
- KUBEGRP="microk8s"
sg ${KUBEGRP} -c "microk8s status --wait-ready"
KUBECONFIG=~/.osm/microk8s-config.yaml
sg ${KUBEGRP} -c "microk8s config" | tee ${KUBECONFIG}
+ track k8scluster k8scluster_ok
else
KUBECTL="kubectl"
sudo snap install kubectl --classic
export KUBECONFIG=${KUBECFG}
KUBEGRP=$(id -g -n)
fi
- sudo snap install juju --classic --channel=2.8/stable
+ sudo snap install juju --classic --channel=$JUJU_VERSION/stable ||
+ FATAL_TRACK juju "snap install juju ${JUJU_VERSION}/stable failed"
+ track juju juju_ok
}
function bootstrap_k8s_lxd(){
Please retry the installation once this conflict has been resolved.
EOF
- exit 1
+ FATAL_TRACK bootstrap_k8s "VCA already present"
fi
else
CONTROLLER_PRESENT=$(juju controllers 2>/dev/null| grep ${CONTROLLER_NAME} | wc -l)
Please retry the installation with one of the solutions applied.
EOF
- exit 1
+ FATAL_TRACK bootstrap_k8s "Requested VCA not present"
fi
fi
else
sg ${KUBEGRP} -c "echo ${DEFAULT_IP}-${DEFAULT_IP} | microk8s.enable metallb"
sg ${KUBEGRP} -c "microk8s.enable ingress"
- sg ${KUBEGRP} -c "microk8s.enable storage dns"
+ sg ${KUBEGRP} -c "microk8s.enable hostpath-storage dns"
TIME_TO_WAIT=30
start_time="$(date -u +%s)"
while true
if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then
echo "Microk8s storage failed to enable"
sg ${KUBEGRP} -c "microk8s.status"
- exit 1
+ FATAL_TRACK bootstrap_k8s "Microk8s storage failed to enable"
fi
storage_status=`sg ${KUBEGRP} -c "microk8s.status -a storage"`
if [[ $storage_status == "enabled" ]]; then
"juju bootstrap microk8s $CONTROLLER_NAME --config controller-service-type=loadbalancer --agent-version=$JUJU_AGENT_VERSION" \
&& K8S_CLOUD_NAME=microk8s
fi
-
- if [ -v LXD_CLOUD ]; then
- if [ ! -v LXD_CREDENTIALS ]; then
- echo "The installer needs the LXD server certificate if the LXD is external"
- exit 1
- fi
- else
- LXDENDPOINT=$DEFAULT_IP
- LXD_CLOUD=~/.osm/lxd-cloud.yaml
- LXD_CREDENTIALS=~/.osm/lxd-credentials.yaml
- # Apply sysctl production values for optimal performance
- sudo cp /usr/share/osm-devops/installers/60-lxd-production.conf /etc/sysctl.d/60-lxd-production.conf
- sudo sysctl --system
- # Install LXD snap
- sudo apt-get remove --purge -y liblxc1 lxc-common lxcfs lxd lxd-client
- sudo snap install lxd
- # Configure LXD
- sudo usermod -a -G lxd `whoami`
- cat /usr/share/osm-devops/installers/lxd-preseed.conf | sed 's/^config: {}/config:\n core.https_address: '$LXDENDPOINT':8443/' | sg lxd -c "lxd init --preseed"
- sg lxd -c "lxd waitready"
- DEFAULT_MTU=$(ip addr show $DEFAULT_IF | perl -ne 'if (/mtu\s(\d+)/) {print $1;}')
- sg lxd -c "lxc profile device set default eth0 mtu $DEFAULT_MTU"
- sg lxd -c "lxc network set lxdbr0 bridge.mtu $DEFAULT_MTU"
-
- cat << EOF > $LXD_CLOUD
+ track bootstrap_k8s bootstrap_k8s_ok
+
+ if [ ! -v INSTALL_NOLXD ]; then
+ if [ -v LXD_CLOUD ]; then
+ if [ ! -v LXD_CREDENTIALS ]; then
+ echo "The installer needs the LXD server certificate if the LXD is external"
+ FATAL_TRACK bootstrap_lxd "No LXD certificate supplied"
+ fi
+ else
+ LXDENDPOINT=$DEFAULT_IP
+ LXD_CLOUD=~/.osm/lxd-cloud.yaml
+ LXD_CREDENTIALS=~/.osm/lxd-credentials.yaml
+ # Apply sysctl production values for optimal performance
+ sudo cp /usr/share/osm-devops/installers/60-lxd-production.conf /etc/sysctl.d/60-lxd-production.conf
+ sudo sysctl --system
+ # Install LXD snap
+ sudo apt-get remove --purge -y liblxc1 lxc-common lxcfs lxd lxd-client
+ snap info lxd | grep installed > /dev/null
+ if [ $? -eq 0 ]; then
+ sudo snap refresh lxd --channel $LXD_VERSION/stable
+ else
+ sudo snap install lxd --channel $LXD_VERSION/stable
+ fi
+ # Configure LXD
+ sudo usermod -a -G lxd `whoami`
+ cat /usr/share/osm-devops/installers/lxd-preseed.conf | sed 's/^config: {}/config:\n core.https_address: '$LXDENDPOINT':8443/' | sg lxd -c "lxd init --preseed"
+ sg lxd -c "lxd waitready"
+ DEFAULT_MTU=$(ip addr show $DEFAULT_IF | perl -ne 'if (/mtu\s(\d+)/) {print $1;}')
+ sg lxd -c "lxc profile device set default eth0 mtu $DEFAULT_MTU"
+ sg lxd -c "lxc network set lxdbr0 bridge.mtu $DEFAULT_MTU"
+
+ cat << EOF > $LXD_CLOUD
clouds:
lxd-cloud:
type: lxd
config:
ssl-hostname-verification: false
EOF
- openssl req -nodes -new -x509 -keyout ~/.osm/client.key -out ~/.osm/client.crt -days 365 -subj "/C=FR/ST=Nice/L=Nice/O=ETSI/OU=OSM/CN=osm.etsi.org"
- local server_cert=`cat /var/snap/lxd/common/lxd/server.crt | sed 's/^/ /'`
- local client_cert=`cat ~/.osm/client.crt | sed 's/^/ /'`
- local client_key=`cat ~/.osm/client.key | sed 's/^/ /'`
-
- cat << EOF > $LXD_CREDENTIALS
+ openssl req -nodes -new -x509 -keyout ~/.osm/client.key -out ~/.osm/client.crt -days 365 -subj "/C=FR/ST=Nice/L=Nice/O=ETSI/OU=OSM/CN=osm.etsi.org"
+ cat << EOF > $LXD_CREDENTIALS
credentials:
lxd-cloud:
lxd-cloud:
auth-type: certificate
- server-cert: |
-$server_cert
- client-cert: |
-$client_cert
- client-key: |
-$client_key
+ server-cert: /var/snap/lxd/common/lxd/server.crt
+ client-cert: ~/.osm/client.crt
+ client-key: ~/.osm/client.key
EOF
- lxc config trust add local: ~/.osm/client.crt
+ lxc config trust add local: ~/.osm/client.crt
+ fi
+
+ juju add-cloud -c $CONTROLLER_NAME lxd-cloud $LXD_CLOUD --force
+ juju add-credential -c $CONTROLLER_NAME lxd-cloud -f $LXD_CREDENTIALS
+ sg lxd -c "lxd waitready"
+ juju controller-config features=[k8s-operators]
+ track bootstrap_lxd bootstrap_lxd_ok
fi
-
- juju add-cloud -c $CONTROLLER_NAME lxd-cloud $LXD_CLOUD --force
- juju add-credential -c $CONTROLLER_NAME lxd-cloud -f $LXD_CREDENTIALS
- sg lxd -c "lxd waitready"
- juju controller-config features=[k8s-operators]
-}
-
-function wait_for_port(){
- SERVICE=$1
- INDEX=$2
- TIME_TO_WAIT=30
- start_time="$(date -u +%s)"
- while true
- do
- now="$(date -u +%s)"
- if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then
- echo "Failed to expose external ${SERVICE} interface port"
- exit 1
- fi
-
- if [ $(sg ${KUBEGRP} -c "${KUBECTL} get ingresses.networking -n osm -o json | jq -r '.items[$INDEX].metadata.name'") == ${SERVICE} ] ; then
- break
- fi
- sleep 1
- done
}
function deploy_charmed_osm(){
fi
[ -v TAG ] && generate_images_overlay && images_overlay="--overlay $IMAGES_OVERLAY_FILE"
+ if [ -v OVERLAY ]; then
+ extra_overlay="--overlay $OVERLAY"
+ fi
+ echo "Creating Password Overlay"
+
+ generate_password_overlay && secret_overlay="--overlay $PASSWORD_OVERLAY_FILE"
+
+ [ -n "$INSTALL_PLA" ] && create_pla_overlay && pla_overlay="--overlay $PLA_OVERLAY_FILE"
+
if [ -v BUNDLE ]; then
- juju deploy -m $MODEL_NAME $BUNDLE --overlay ~/.osm/vca-overlay.yaml $images_overlay
+ juju deploy --trust --channel $CHARMHUB_CHANNEL -m $MODEL_NAME $BUNDLE $images_overlay $extra_overlay $secret_overlay $pla_overlay
else
- juju deploy -m $MODEL_NAME $OSM_BUNDLE --overlay ~/.osm/vca-overlay.yaml $images_overlay
+ juju deploy --trust --channel $CHARMHUB_CHANNEL -m $MODEL_NAME $OSM_BUNDLE $images_overlay $extra_overlay $secret_overlay $pla_overlay
fi
if [ ! -v KUBECFG ]; then
hostport="$(echo ${url/$user@/} | cut -d/ -f1)"
API_SERVER="$(echo $hostport | sed -e 's,:.*,,g')"
fi
+ # Configure VCA Integrator
+ if [ ! -v INSTALL_NOLXD ]; then
+ juju config vca \
+ k8s-cloud=microk8s \
+ lxd-cloud=lxd-cloud:lxd-cloud \
+ controllers="`cat ~/.local/share/juju/controllers.yaml`" \
+ accounts="`cat ~/.local/share/juju/accounts.yaml`" \
+ public-key="`cat ~/.local/share/juju/ssh/juju_id_rsa.pub`"
+ else
+ juju config vca \
+ k8s-cloud=microk8s \
+ controllers="`cat ~/.local/share/juju/controllers.yaml`" \
+ accounts="`cat ~/.local/share/juju/accounts.yaml`" \
+ public-key="`cat ~/.local/share/juju/ssh/juju_id_rsa.pub`"
+ fi
# Expose OSM services
- juju config -m $MODEL_NAME nbi site_url=https://nbi.${API_SERVER}.nip.io
- juju config -m $MODEL_NAME ng-ui site_url=https://ui.${API_SERVER}.nip.io
+ juju config -m $MODEL_NAME nbi external-hostname=nbi.${API_SERVER}.nip.io
+ juju config -m $MODEL_NAME ng-ui external-hostname=ui.${API_SERVER}.nip.io
juju config -m $MODEL_NAME grafana site_url=https://grafana.${API_SERVER}.nip.io
juju config -m $MODEL_NAME prometheus site_url=https://prometheus.${API_SERVER}.nip.io
echo "Waiting for deployment to finish..."
check_osm_deployed
+ grafana_leader=`juju status -m $MODEL_NAME grafana | grep "*" | cut -d "*" -f 1`
+ grafana_admin_password=`juju run -m $MODEL_NAME --unit $grafana_leader "echo \\$GF_SECURITY_ADMIN_PASSWORD"`
+ juju config -m $MODEL_NAME mon grafana-password=$grafana_admin_password
+ check_osm_deployed
echo "OSM with charms deployed"
}
function check_osm_deployed() {
TIME_TO_WAIT=600
start_time="$(date -u +%s)"
- total_service_count=14
+ total_service_count=15
+ [ -n "$INSTALL_PLA" ] && total_service_count=$((total_service_count + 1))
previous_count=0
while true
do
- service_count=$(juju status -m $MODEL_NAME | grep kubernetes | grep active | wc -l)
+ service_count=$(juju status --format json -m $MODEL_NAME | jq '.applications[]."application-status".current' | grep active | wc -l)
echo "$service_count / $total_service_count services active"
if [ $service_count -eq $total_service_count ]; then
break
now="$(date -u +%s)"
if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then
echo "Timed out waiting for OSM services to become ready"
- exit 1
+ FATAL_TRACK deploy_osm "Timed out waiting for services to become ready"
fi
sleep 10
done
}
-function create_overlay() {
- sudo snap install jq
- sudo snap install yq
- local HOME=/home/$USER
- local vca_user=$(cat $HOME/.local/share/juju/accounts.yaml | yq e .controllers.$CONTROLLER_NAME.user - )
- local vca_secret=$(cat $HOME/.local/share/juju/accounts.yaml | yq e .controllers.$CONTROLLER_NAME.password - )
- local vca_host=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.api-endpoints[0] - | cut -d ":" -f 1)
- local vca_port=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.api-endpoints[0] - | cut -d ":" -f 2)
- local vca_pubkey=\"$(cat $HOME/.local/share/juju/ssh/juju_id_rsa.pub)\"
- local vca_cloud="lxd-cloud"
- # Get the VCA Certificate
- local vca_cacert=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.ca-cert - | base64 | tr -d \\n)
-
- # Calculate the default route of this machine
- local DEFAULT_IF=`ip route list match 0.0.0.0 | awk '{print $5}'`
-
- # Generate a new overlay.yaml, overriding any existing one
- cat << EOF > /tmp/vca-overlay.yaml
+function generate_password_overlay() {
+ # prometheus
+ web_config_password=`openssl rand -hex 16`
+ # keystone
+ keystone_db_password=`openssl rand -hex 16`
+ keystone_admin_password=`openssl rand -hex 16`
+ keystone_service_password=`openssl rand -hex 16`
+ # mariadb
+ mariadb_password=`openssl rand -hex 16`
+ mariadb_root_password=`openssl rand -hex 16`
+ cat << EOF > /tmp/password-overlay.yaml
applications:
- lcm:
+ prometheus:
+ options:
+ web_config_password: $web_config_password
+ keystone:
options:
- vca_user: $vca_user
- vca_secret: $vca_secret
- vca_host: $vca_host
- vca_port: $vca_port
- vca_pubkey: $vca_pubkey
- vca_cacert: $vca_cacert
- vca_cloud: $vca_cloud
- vca_k8s_cloud: $K8S_CLOUD_NAME
- mon:
+ keystone-db-password: $keystone_db_password
+ admin-password: $keystone_admin_password
+ service-password: $keystone_service_password
+ mariadb:
+ options:
+ password: $mariadb_password
+ root_password: $mariadb_root_password
+EOF
+ mv /tmp/password-overlay.yaml $PASSWORD_OVERLAY_FILE
+}
+
+function create_pla_overlay(){
+ echo "Creating PLA Overlay"
+ [ $BUNDLE == $OSM_HA_BUNDLE ] && scale=3 || scale=1
+ cat << EOF > /tmp/pla-overlay.yaml
+applications:
+ pla:
+ charm: osm-pla
+ channel: latest/stable
+ scale: $scale
+ series: kubernetes
options:
- vca_user: $vca_user
- vca_secret: $vca_secret
- vca_host: $vca_host
- vca_cacert: $vca_cacert
+ log_level: DEBUG
+ resources:
+ image: opensourcemano/pla:testing-daily
+relations:
+ - - pla:kafka
+ - kafka:kafka
+ - - pla:mongodb
+ - mongodb:database
EOF
- mv /tmp/vca-overlay.yaml ~/.osm/
- OSM_VCA_HOST=$vca_host
+ mv /tmp/pla-overlay.yaml $PLA_OVERLAY_FILE
}
function generate_images_overlay(){
echo "applications:" > /tmp/images-overlay.yaml
- charms_with_resources="nbi lcm mon pol ng-ui ro pla keystone"
+ charms_with_resources="nbi lcm mon pol ng-ui ro"
+ [ -n "$INSTALL_PLA" ] && charms_with_resources+=" pla"
for charm in $charms_with_resources; do
cat << EOF > /tmp/${charm}_registry.yaml
registrypath: ${REGISTRY_URL}opensourcemano/${charm}:$TAG
cat << EOF >> /tmp/images-overlay.yaml
${charm}:
resources:
- image: /tmp/${charm}_registry.yaml
+ ${charm}-image: /tmp/${charm}_registry.yaml
+
+EOF
+ done
+ ch_charms_with_resources="keystone"
+ for charm in $ch_charms_with_resources; do
+ cat << EOF > /tmp/${charm}_registry.yaml
+registrypath: ${REGISTRY_URL}opensourcemano/${charm}:$TAG
+EOF
+ if [ ! -z "$REGISTRY_USERNAME" ] ; then
+ echo username: $REGISTRY_USERNAME >> /tmp/${charm}_registry.yaml
+ echo password: $REGISTRY_PASSWORD >> /tmp/${charm}_registry.yaml
+ fi
+
+ cat << EOF >> /tmp/images-overlay.yaml
+ ${charm}:
+ resources:
+ ${charm}-image: /tmp/${charm}_registry.yaml
EOF
done
}
function install_microstack() {
- sudo snap install microstack --classic --beta
- sudo microstack.init --auto
- wget https://cloud-images.ubuntu.com/releases/16.04/release/ubuntu-16.04-server-cloudimg-amd64-disk1.img -P ~/.osm/
- microstack.openstack image create \
- --public \
- --disk-format qcow2 \
- --container-format bare \
- --file ~/.osm/ubuntu-16.04-server-cloudimg-amd64-disk1.img \
- ubuntu1604
- ssh-keygen -t rsa -N "" -f ~/.ssh/microstack
- microstack.openstack keypair create --public-key ~/.ssh/microstack.pub microstack
- export OSM_HOSTNAME=`juju status -m $MODEL_NAME --format json | jq -rc '.applications."nbi".address'`
- osm vim-create --name microstack-site \
- --user admin \
- --password keystone \
- --auth_url http://10.20.20.1:5000/v3 \
- --tenant admin \
- --account_type openstack \
- --config='{security_groups: default,
- keypair: microstack,
- project_name: admin,
- user_domain_name: default,
- region_name: microstack,
- insecure: True,
- availability_zone: nova,
- version: 3}'
+ sudo snap install microstack --beta --devmode
+
+ CHECK=$(microstack.openstack server list)
+ if [ $? -ne 0 ] ; then
+ if [[ $CHECK == *"not initialized"* ]]; then
+ echo "Setting MicroStack dashboard to listen to port 8080"
+ sudo snap set microstack config.network.ports.dashboard=8080
+ echo "Initializing MicroStack. This can take several minutes"
+ sudo microstack.init --auto --control
+ fi
+ fi
+
+ sudo snap alias microstack.openstack openstack
+
+ echo "Updating default security group in MicroStack to allow all access"
+
+ for i in $(microstack.openstack security group list | awk '/default/{ print $2 }'); do
+ for PROTO in icmp tcp udp ; do
+ echo " $PROTO ingress"
+ CHECK=$(microstack.openstack security group rule create $i --protocol $PROTO --remote-ip 0.0.0.0/0 2>&1)
+ if [ $? -ne 0 ] ; then
+ if [[ $CHECK != *"409"* ]]; then
+ echo "Error creating ingress rule for $PROTO"
+ echo $CHECK
+ fi
+ fi
+ done
+ done
+
+ microstack.openstack network show osm-ext &>/dev/null
+ if [ $? -ne 0 ]; then
+ echo "Creating osm-ext network with router to bridge to MicroStack external network"
+ microstack.openstack network create --enable --no-share osm-ext
+ microstack.openstack subnet create osm-ext-subnet --network osm-ext --dns-nameserver 8.8.8.8 \
+ --subnet-range 172.30.0.0/24
+ microstack.openstack router create external-router
+ microstack.openstack router add subnet external-router osm-ext-subnet
+ microstack.openstack router set --external-gateway external external-router
+ fi
+
+ microstack.openstack image list | grep ubuntu20.04 &> /dev/null
+ if [ $? -ne 0 ] ; then
+ echo "Fetching Ubuntu 20.04 image and upLoading to MicroStack"
+ wget -q -O- https://cloud-images.ubuntu.com/focal/current/focal-server-cloudimg-amd64.img \
+ | microstack.openstack image create --public --container-format=bare \
+ --disk-format=qcow2 ubuntu20.04 | grep status
+ fi
+
+ if [ ! -f ~/.ssh/microstack ]; then
+ ssh-keygen -t rsa -N "" -f ~/.ssh/microstack
+ microstack.openstack keypair create --public-key ~/.ssh/microstack.pub microstack
+ fi
+
+ echo "Creating VIM microstack-site in OSM"
+ . /var/snap/microstack/common/etc/microstack.rc
+
+ osm vim-create \
+ --name microstack-site \
+ --user "$OS_USERNAME" \
+ --password "$OS_PASSWORD" \
+ --auth_url "$OS_AUTH_URL" \
+ --tenant "$OS_USERNAME" \
+ --account_type openstack \
+ --config='{use_floating_ip: True,
+ insecure: True,
+ keypair: microstack,
+ management_network_name: osm-ext}'
}
-DEFAULT_IF=`ip route list match 0.0.0.0 | awk '{print $5}'`
-DEFAULT_IP=`ip -o -4 a |grep ${DEFAULT_IF}|awk '{split($4,a,"/"); print a[1]}'`
+DEFAULT_IF=`ip route list match 0.0.0.0 | awk '{print $5; exit}'`
+DEFAULT_IP=`ip -o -4 a |grep ${DEFAULT_IF}|awk '{split($4,a,"/"); print a[1]; exit}'`
check_arguments $@
mkdir -p ~/.osm
install_snaps
bootstrap_k8s_lxd
-create_overlay
if [ -v ONLY_VCA ]; then
HOME=/home/$USER
- vca_user=$(cat $HOME/.local/share/juju/accounts.yaml | yq e .controllers.$CONTROLLER_NAME.user - )
- vca_secret=$(cat $HOME/.local/share/juju/accounts.yaml | yq e .controllers.$CONTROLLER_NAME.password - )
- vca_host=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.api-endpoints[0] - | cut -d ":" -f 1)
- vca_port=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.api-endpoints[0] - | cut -d ":" -f 2)
- vca_pubkey=\"$(cat $HOME/.local/share/juju/ssh/juju_id_rsa.pub)\"
- vca_cloud="lxd-cloud"
- vca_cacert=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.ca-cert - | base64 | tr -d \\n)
- hostname=`cat /etc/hostname`
-
- echo "Use the following command to register the installed VCA to your OSM:"
- echo -e " osm vca-add --endpoints $vca_host:$vca_port \ \n --user $vca_user \ \n --secret $vca_secret \ \n --cacert $vca_cacert \ \n --lxd-cloud lxd-cloud \ \n --lxd-credentials lxd-cloud \ \n --k8s-cloud microk8s \ \n --k8s-credentials microk8s\ \n $hostname-vca"
+ k8scloud=microk8s
+ lxdcloud=lxd-cloud:lxd-cloud
+ controllers="`cat $HOME/.local/share/juju/controllers.yaml`"
+ accounts="`cat $HOME/.local/share/juju/accounts.yaml`"
+ publickey="`cat $HOME/.local/share/juju/ssh/juju_id_rsa.pub`"
+ echo "Use the following command to register the installed VCA to your OSM VCA integrator charm"
+ echo -e " juju config vca \\\n k8s-cloud=$k8scloud \\\n lxd-cloud=$lxdcloud \\\n controllers=$controllers \\\n accounts=$accounts \\\n public-key=$publickey"
+ track deploy_osm deploy_vca_only_ok
else
deploy_charmed_osm
+ track deploy_osm deploy_osm_services_k8s_ok
install_osmclient
- export OSM_HOSTNAME=$(juju config -m $MODEL_NAME nbi site_url | sed "s/http.*\?:\/\///"):443
+ track osmclient osmclient_ok
+ export OSM_HOSTNAME=$(juju config -m $MODEL_NAME nbi external-hostname):443
+ export OSM_PASSWORD=$keystone_admin_password
sleep 10
add_local_k8scluster
+ track final_ops add_local_k8scluster_ok
if [ -v MICROSTACK ]; then
install_microstack
+ track final_ops install_microstack_ok
fi
echo "Your installation is now complete, follow these steps for configuring the osmclient:"
echo "1. Create the OSM_HOSTNAME environment variable with the NBI IP"
echo
echo "export OSM_HOSTNAME=$OSM_HOSTNAME"
+ echo "export OSM_PASSWORD=$OSM_PASSWORD"
echo
- echo "2. Add the previous command to your .bashrc for other Shell sessions"
+ echo "2. Add the previous commands to your .bashrc for other Shell sessions"
echo
echo "echo \"export OSM_HOSTNAME=$OSM_HOSTNAME\" >> ~/.bashrc"
+ echo "echo \"export OSM_PASSWORD=$OSM_PASSWORD\" >> ~/.bashrc"
+ echo
+ echo "3. Login OSM GUI by using admin password: $OSM_PASSWORD"
echo
echo "DONE"
+ track end
fi