X-Git-Url: https://osm.etsi.org/gitweb/?a=blobdiff_plain;f=installers%2Fcharmed_install.sh;h=a1e5001f1efafaf9f919c334c26d6027c6dc615f;hb=ce7b460470a5a68524533472dbb12beb5376281a;hp=86ac0c29be1d1e12c0d89ed4cd21a61ee38c06de;hpb=c784e7c9ff9e3b4c77ce3e6f812884aaf01e861e;p=osm%2Fdevops.git diff --git a/installers/charmed_install.sh b/installers/charmed_install.sh index 86ac0c29..a1e5001f 100755 --- a/installers/charmed_install.sh +++ b/installers/charmed_install.sh @@ -15,20 +15,49 @@ # set -eux +LXD_VERSION=4.0 +JUJU_VERSION=2.9 +JUJU_AGENT_VERSION=2.9.22 K8S_CLOUD_NAME="k8s-cloud" KUBECTL="microk8s.kubectl" +MICROK8S_VERSION=1.23 +OSMCLIENT_VERSION=latest IMAGES_OVERLAY_FILE=~/.osm/images-overlay.yaml +PASSWORD_OVERLAY_FILE=~/.osm/password-overlay.yaml +PATH=/snap/bin:${PATH} +OSM_DEVOPS="$( cd "$( dirname "${BASH_SOURCE[0]}" )"/.. &> /dev/null && pwd )" +if [ -f ${OSM_DEVOPS}/common/all_funcs ] ; then + source ${OSM_DEVOPS}/common/all_funcs +else + function track(){ + true + } + function FATAL_TRACK(){ + exit 1 + } +fi + +MODEL_NAME=osm + +OSM_BUNDLE=ch:osm +OSM_HA_BUNDLE=ch:osm-ha +CHARMHUB_CHANNEL=latest/edge +unset TAG + function check_arguments(){ while [ $# -gt 0 ] ; do case $1 in --bundle) BUNDLE="$2" ;; + --overlay) OVERLAY="$2" ;; --k8s) KUBECFG="$2" ;; --vca) CONTROLLER="$2" ;; --lxd) LXD_CLOUD="$2" ;; --lxd-cred) LXD_CREDENTIALS="$2" ;; --microstack) MICROSTACK=y ;; - --ha) BUNDLE="cs:osm-ha-39" ;; + --ha) BUNDLE=$OSM_HA_BUNDLE ;; --tag) TAG="$2" ;; + --registry) REGISTRY_INFO="$2" ;; + --only-vca) ONLY_VCA=y ;; esac shift done @@ -38,19 +67,30 @@ function check_arguments(){ function install_snaps(){ if [ ! -v KUBECFG ]; then - sudo snap install microk8s --classic + KUBEGRP="microk8s" + sudo snap install microk8s --classic --channel=${MICROK8S_VERSION}/stable || + FATAL_TRACK k8scluster "snap install microk8s ${MICROK8S_VERSION}/stable failed" sudo usermod -a -G microk8s `whoami` + sudo cat /var/snap/microk8s/current/args/kube-apiserver | grep advertise-address || ( + echo "--advertise-address $DEFAULT_IP" | sudo tee -a /var/snap/microk8s/current/args/kube-apiserver + sg ${KUBEGRP} -c microk8s.stop + sg ${KUBEGRP} -c microk8s.start + ) mkdir -p ~/.kube sudo chown -f -R `whoami` ~/.kube - KUBEGRP="microk8s" + sg ${KUBEGRP} -c "microk8s status --wait-ready" + KUBECONFIG=~/.osm/microk8s-config.yaml + sg ${KUBEGRP} -c "microk8s config" | tee ${KUBECONFIG} + track k8scluster k8scluster_ok else KUBECTL="kubectl" sudo snap install kubectl --classic export KUBECONFIG=${KUBECFG} KUBEGRP=$(id -g -n) fi - sleep 10 - sudo snap install juju --classic --channel=2.8/stable + sudo snap install juju --classic --channel=$JUJU_VERSION/stable || + FATAL_TRACK juju "snap install juju ${JUJU_VERSION}/stable failed" + track juju juju_ok } function bootstrap_k8s_lxd(){ @@ -69,7 +109,18 @@ using this command: Please retry the installation once this conflict has been resolved. EOF - exit 1 + FATAL_TRACK bootstrap_k8s "VCA already present" + fi + else + CONTROLLER_PRESENT=$(juju controllers 2>/dev/null| grep ${CONTROLLER_NAME} | wc -l) + if [ $CONTROLLER_PRESENT -le 0 ]; then + cat << EOF +Threre is no VCA present with the name "${CONTROLLER_NAME}". Please specify a VCA +that exists, or remove the --vca ${CONTROLLER_NAME} option. + +Please retry the installation with one of the solutions applied. +EOF + FATAL_TRACK bootstrap_k8s "Requested VCA not present" fi fi @@ -77,9 +128,10 @@ EOF cat $KUBECFG | juju add-k8s $K8S_CLOUD_NAME $ADD_K8S_OPTS [ -v BOOTSTRAP_NEEDED ] && juju bootstrap $K8S_CLOUD_NAME $CONTROLLER_NAME \ --config controller-service-type=loadbalancer \ - --agent-version=2.8.1 + --agent-version=$JUJU_AGENT_VERSION else sg ${KUBEGRP} -c "echo ${DEFAULT_IP}-${DEFAULT_IP} | microk8s.enable metallb" + sg ${KUBEGRP} -c "microk8s.enable ingress" sg ${KUBEGRP} -c "microk8s.enable storage dns" TIME_TO_WAIT=30 start_time="$(date -u +%s)" @@ -89,7 +141,7 @@ EOF if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then echo "Microk8s storage failed to enable" sg ${KUBEGRP} -c "microk8s.status" - exit 1 + FATAL_TRACK bootstrap_k8s "Microk8s storage failed to enable" fi storage_status=`sg ${KUBEGRP} -c "microk8s.status -a storage"` if [[ $storage_status == "enabled" ]]; then @@ -100,14 +152,15 @@ EOF [ ! -v BOOTSTRAP_NEEDED ] && sg ${KUBEGRP} -c "microk8s.config" | juju add-k8s $K8S_CLOUD_NAME $ADD_K8S_OPTS [ -v BOOTSTRAP_NEEDED ] && sg ${KUBEGRP} -c \ - "juju bootstrap microk8s $CONTROLLER_NAME --config controller-service-type=loadbalancer --agent-version=2.8.1" \ + "juju bootstrap microk8s $CONTROLLER_NAME --config controller-service-type=loadbalancer --agent-version=$JUJU_AGENT_VERSION" \ && K8S_CLOUD_NAME=microk8s fi + track bootstrap_k8s bootstrap_k8s_ok if [ -v LXD_CLOUD ]; then if [ ! -v LXD_CREDENTIALS ]; then echo "The installer needs the LXD server certificate if the LXD is external" - exit 1 + FATAL_TRACK bootstrap_lxd "No LXD certificate supplied" fi else LXDENDPOINT=$DEFAULT_IP @@ -118,8 +171,7 @@ EOF sudo sysctl --system # Install LXD snap sudo apt-get remove --purge -y liblxc1 lxc-common lxcfs lxd lxd-client - sudo snap install lxd - sudo apt-get install zfsutils-linux -y + sudo snap install lxd --channel $LXD_VERSION/stable # Configure LXD sudo usermod -a -G lxd `whoami` cat /usr/share/osm-devops/installers/lxd-preseed.conf | sed 's/^config: {}/config:\n core.https_address: '$LXDENDPOINT':8443/' | sg lxd -c "lxd init --preseed" @@ -160,52 +212,59 @@ EOF juju add-cloud -c $CONTROLLER_NAME lxd-cloud $LXD_CLOUD --force juju add-credential -c $CONTROLLER_NAME lxd-cloud -f $LXD_CREDENTIALS sg lxd -c "lxd waitready" - #juju add-model test lxd-cloud || true juju controller-config features=[k8s-operators] + track bootstrap_lxd bootstrap_lxd_ok } -function wait_for_port(){ - SERVICE=$1 - INDEX=$2 - TIME_TO_WAIT=30 - start_time="$(date -u +%s)" - while true - do - now="$(date -u +%s)" - if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then - echo "Failed to expose external ${SERVICE} interface port" - exit 1 - fi - - if [ $(sg ${KUBEGRP} -c "${KUBECTL} get ingress -n osm -o json | jq -r '.items[$INDEX].metadata.name'") == ${SERVICE} ] ; then - break +function deploy_charmed_osm(){ + if [ -v REGISTRY_INFO ] ; then + registry_parts=(${REGISTRY_INFO//@/ }) + if [ ${#registry_parts[@]} -eq 1 ] ; then + # No credentials supplied + REGISTRY_USERNAME="" + REGISTRY_PASSWORD="" + REGISTRY_URL=${registry_parts[0]} + else + credentials=${registry_parts[0]} + credential_parts=(${credentials//:/ }) + REGISTRY_USERNAME=${credential_parts[0]} + REGISTRY_PASSWORD=${credential_parts[1]} + REGISTRY_URL=${registry_parts[1]} fi - sleep 1 - done -} + # Ensure the URL ends with a / + case $REGISTRY_URL in + */) ;; + *) REGISTRY_URL=${REGISTRY_URL}/ + esac + fi -function deploy_charmed_osm(){ - create_overlay echo "Creating OSM model" if [ -v KUBECFG ]; then - juju add-model osm $K8S_CLOUD_NAME + juju add-model $MODEL_NAME $K8S_CLOUD_NAME else - sg ${KUBEGRP} -c "juju add-model osm $K8S_CLOUD_NAME" + sg ${KUBEGRP} -c "juju add-model $MODEL_NAME $K8S_CLOUD_NAME" fi echo "Deploying OSM with charms" images_overlay="" + if [ -v REGISTRY_URL ]; then + [ ! -v TAG ] && TAG='latest' + fi [ -v TAG ] && generate_images_overlay && images_overlay="--overlay $IMAGES_OVERLAY_FILE" + + if [ -v OVERLAY ]; then + extra_overlay="--overlay $OVERLAY" + fi + echo "Creating Password Overlay" + + generate_password_overlay && secret_overlay="--overlay $PASSWORD_OVERLAY_FILE" + if [ -v BUNDLE ]; then - juju deploy $BUNDLE --overlay ~/.osm/vca-overlay.yaml $images_overlay + juju deploy --trust --channel $CHARMHUB_CHANNEL -m $MODEL_NAME $BUNDLE --overlay ~/.osm/vca-overlay.yaml $images_overlay $extra_overlay $secret_overlay else - juju deploy cs:osm-49 --overlay ~/.osm/vca-overlay.yaml $images_overlay + juju deploy --trust --channel $CHARMHUB_CHANNEL -m $MODEL_NAME $OSM_BUNDLE --overlay ~/.osm/vca-overlay.yaml $images_overlay $extra_overlay $secret_overlay fi - echo "Waiting for deployment to finish..." - check_osm_deployed - echo "OSM with charms deployed" if [ ! -v KUBECFG ]; then - sg ${KUBEGRP} -c "microk8s.enable ingress" API_SERVER=${DEFAULT_IP} else API_SERVER=$(kubectl config view --minify | grep server | cut -f 2- -d ":" | tr -d " ") @@ -215,35 +274,29 @@ function deploy_charmed_osm(){ hostport="$(echo ${url/$user@/} | cut -d/ -f1)" API_SERVER="$(echo $hostport | sed -e 's,:.*,,g')" fi + # Expose OSM services + juju config -m $MODEL_NAME nbi site_url=https://nbi.${API_SERVER}.nip.io + juju config -m $MODEL_NAME ng-ui site_url=https://ui.${API_SERVER}.nip.io + juju config -m $MODEL_NAME grafana site_url=https://grafana.${API_SERVER}.nip.io + juju config -m $MODEL_NAME prometheus site_url=https://prometheus.${API_SERVER}.nip.io - juju config nbi-k8s juju-external-hostname=nbi.${API_SERVER}.xip.io - juju expose nbi-k8s - - wait_for_port nbi-k8s 0 - sg ${KUBEGRP} -c "${KUBECTL} get ingress -n osm -o json | jq '.items[0].metadata.annotations += {\"nginx.ingress.kubernetes.io/backend-protocol\": \"HTTPS\"}' | ${KUBECTL} --validate=false replace -f -" - sg ${KUBEGRP} -c "${KUBECTL} get ingress -n osm -o json | jq '.items[0].metadata.annotations += {\"nginx.ingress.kubernetes.io/proxy-body-size\": \"0\"}' | ${KUBECTL} replace -f -" - - juju config ng-ui juju-external-hostname=ui.${API_SERVER}.xip.io - juju expose ng-ui - - wait_for_port ng-ui 1 - sg ${KUBEGRP} -c "${KUBECTL} get ingress -n osm -o json | jq '.items[2].metadata.annotations += {\"nginx.ingress.kubernetes.io/proxy-body-size\": \"0\"}' | ${KUBECTL} --validate=false replace -f -" - - juju config ui-k8s juju-external-hostname=osm.${API_SERVER}.xip.io - juju expose ui-k8s - - wait_for_port ui-k8s 2 - sg ${KUBEGRP} -c "${KUBECTL} get ingress -n osm -o json | jq '.items[1].metadata.annotations += {\"nginx.ingress.kubernetes.io/proxy-body-size\": \"0\"}' | ${KUBECTL} --validate=false replace -f -" + echo "Waiting for deployment to finish..." + check_osm_deployed + grafana_leader=`juju status -m $MODEL_NAME grafana | grep "*" | cut -d "*" -f 1` + grafana_admin_password=`juju run -m $MODEL_NAME --unit $grafana_leader "echo \\$GF_SECURITY_ADMIN_PASSWORD"` + juju config -m $MODEL_NAME mon grafana_password=$grafana_admin_password + check_osm_deployed + echo "OSM with charms deployed" } function check_osm_deployed() { TIME_TO_WAIT=600 start_time="$(date -u +%s)" - total_service_count=15 + total_service_count=14 previous_count=0 while true do - service_count=$(juju status | grep kubernetes | grep active | wc -l) + service_count=$(juju status --format json -m $MODEL_NAME | jq '.applications[]."application-status".current' | grep active | wc -l) echo "$service_count / $total_service_count services active" if [ $service_count -eq $total_service_count ]; then break @@ -255,26 +308,52 @@ function check_osm_deployed() { now="$(date -u +%s)" if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then echo "Timed out waiting for OSM services to become ready" - exit 1 + FATAL_TRACK deploy_osm "Timed out waiting for services to become ready" fi sleep 10 done } +function generate_password_overlay() { + # prometheus + web_config_password=`openssl rand -base64 16` + # keystone + keystone_db_password=`openssl rand -base64 16` + keystone_admin_password=`openssl rand -base64 16` + keystone_service_password=`openssl rand -base64 16` + # mariadb + mariadb_password=`openssl rand -hex 16` + mariadb_root_password=`openssl rand -hex 16` + cat << EOF > /tmp/password-overlay.yaml +applications: + prometheus: + options: + web_config_password: $web_config_password + keystone: + options: + keystone-db-password: $keystone_db_password + admin-password: $keystone_admin_password + service-password: $keystone_service_password + mariadb: + options: + password: $mariadb_password + root_password: $mariadb_root_password +EOF + mv /tmp/password-overlay.yaml $PASSWORD_OVERLAY_FILE +} + function create_overlay() { sudo snap install jq - sudo apt install python3-pip -y - python3 -m pip install yq - PATH=$PATH:$HOME/.local/bin # make yq command available + sudo snap install yq local HOME=/home/$USER - local vca_user=$(cat $HOME/.local/share/juju/accounts.yaml | yq --arg CONTROLLER_NAME $CONTROLLER_NAME '.controllers[$CONTROLLER_NAME].user') - local vca_password=$(cat $HOME/.local/share/juju/accounts.yaml | yq --arg CONTROLLER_NAME $CONTROLLER_NAME '.controllers[$CONTROLLER_NAME].password') - local vca_host=$(cat $HOME/.local/share/juju/controllers.yaml | yq --arg CONTROLLER_NAME $CONTROLLER_NAME '.controllers[$CONTROLLER_NAME]["api-endpoints"][0]' --raw-output | cut -d ":" -f 1) - local vca_port=$(cat $HOME/.local/share/juju/controllers.yaml | yq --arg CONTROLLER_NAME $CONTROLLER_NAME '.controllers[$CONTROLLER_NAME]["api-endpoints"][0]' --raw-output | cut -d ":" -f 2) + local vca_user=$(cat $HOME/.local/share/juju/accounts.yaml | yq e .controllers.$CONTROLLER_NAME.user - ) + local vca_secret=$(cat $HOME/.local/share/juju/accounts.yaml | yq e .controllers.$CONTROLLER_NAME.password - ) + local vca_host=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.api-endpoints[0] - | cut -d ":" -f 1) + local vca_port=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.api-endpoints[0] - | cut -d ":" -f 2) local vca_pubkey=\"$(cat $HOME/.local/share/juju/ssh/juju_id_rsa.pub)\" local vca_cloud="lxd-cloud" # Get the VCA Certificate - local vca_cacert=$(cat $HOME/.local/share/juju/controllers.yaml | yq --arg CONTROLLER_NAME $CONTROLLER_NAME '.controllers[$CONTROLLER_NAME]["ca-cert"]' --raw-output | base64 | tr -d \\n) + local vca_cacert=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.ca-cert - | base64 | tr -d \\n) # Calculate the default route of this machine local DEFAULT_IF=`ip route list match 0.0.0.0 | awk '{print $5}'` @@ -282,20 +361,20 @@ function create_overlay() { # Generate a new overlay.yaml, overriding any existing one cat << EOF > /tmp/vca-overlay.yaml applications: - lcm-k8s: + lcm: options: vca_user: $vca_user - vca_password: $vca_password + vca_secret: $vca_secret vca_host: $vca_host vca_port: $vca_port vca_pubkey: $vca_pubkey vca_cacert: $vca_cacert vca_cloud: $vca_cloud vca_k8s_cloud: $K8S_CLOUD_NAME - mon-k8s: + mon: options: vca_user: $vca_user - vca_password: $vca_password + vca_secret: $vca_secret vca_host: $vca_host vca_cacert: $vca_cacert EOF @@ -304,95 +383,207 @@ EOF } function generate_images_overlay(){ - cat << EOF > /tmp/images-overlay.yaml -applications: - lcm-k8s: - options: - image: opensourcemano/lcm:$TAG - mon-k8s: - options: - image: opensourcemano/mon:$TAG - ro-k8s: - options: - image: opensourcemano/ro:$TAG - nbi-k8s: - options: - image: opensourcemano/nbi:$TAG - pol-k8s: - options: - image: opensourcemano/pol:$TAG - ui-k8s: - options: - image: opensourcemano/light-ui:$TAG - pla: - options: - image: opensourcemano/pla:$TAG - ng-ui: - options: - image: opensourcemano/ng-ui:$TAG + echo "applications:" > /tmp/images-overlay.yaml + charms_with_resources="nbi lcm mon pol ng-ui ro pla" + for charm in $charms_with_resources; do + cat << EOF > /tmp/${charm}_registry.yaml +registrypath: ${REGISTRY_URL}opensourcemano/${charm}:$TAG EOF + if [ ! -z "$REGISTRY_USERNAME" ] ; then + echo username: $REGISTRY_USERNAME >> /tmp/${charm}_registry.yaml + echo password: $REGISTRY_PASSWORD >> /tmp/${charm}_registry.yaml + fi + + cat << EOF >> /tmp/images-overlay.yaml + ${charm}: + resources: + image: /tmp/${charm}_registry.yaml + +EOF + done + ch_charms_with_resources="keystone" + for charm in $ch_charms_with_resources; do + cat << EOF > /tmp/${charm}_registry.yaml +registrypath: ${REGISTRY_URL}opensourcemano/${charm}:$TAG +EOF + if [ ! -z "$REGISTRY_USERNAME" ] ; then + echo username: $REGISTRY_USERNAME >> /tmp/${charm}_registry.yaml + echo password: $REGISTRY_PASSWORD >> /tmp/${charm}_registry.yaml + fi + + cat << EOF >> /tmp/images-overlay.yaml + ${charm}: + resources: + ${charm}-image: /tmp/${charm}_registry.yaml + +EOF + done + mv /tmp/images-overlay.yaml $IMAGES_OVERLAY_FILE } +function refresh_osmclient_snap() { + osmclient_snap_install_refresh refresh +} + +function install_osm_client_snap() { + osmclient_snap_install_refresh install +} + +function osmclient_snap_install_refresh() { + channel_preference="stable candidate beta edge" + for channel in $channel_preference; do + echo "Trying to install osmclient from channel $OSMCLIENT_VERSION/$channel" + sudo snap $1 osmclient --channel $OSMCLIENT_VERSION/$channel 2> /dev/null && echo osmclient snap installed && break + done +} function install_osmclient() { - sudo snap install osmclient - sudo snap alias osmclient.osm osm + snap info osmclient | grep -E ^installed: && refresh_osmclient_snap || install_osm_client_snap } +function add_local_k8scluster() { + osm --all-projects vim-create \ + --name _system-osm-vim \ + --account_type dummy \ + --auth_url http://dummy \ + --user osm --password osm --tenant osm \ + --description "dummy" \ + --config '{management_network_name: mgmt}' + tmpfile=$(mktemp --tmpdir=${HOME}) + cp ${KUBECONFIG} ${tmpfile} + osm --all-projects k8scluster-add \ + --creds ${tmpfile} \ + --vim _system-osm-vim \ + --k8s-nets '{"net1": null}' \ + --version '1.19' \ + --description "OSM Internal Cluster" \ + _system-osm-k8s + rm -f ${tmpfile} +} function install_microstack() { - sudo snap install microstack --classic --beta - sudo microstack.init --auto - wget https://cloud-images.ubuntu.com/releases/16.04/release/ubuntu-16.04-server-cloudimg-amd64-disk1.img -P ~/.osm/ - microstack.openstack image create \ - --public \ - --disk-format qcow2 \ - --container-format bare \ - --file ~/.osm/ubuntu-16.04-server-cloudimg-amd64-disk1.img \ - ubuntu1604 - ssh-keygen -t rsa -N "" -f ~/.ssh/microstack - microstack.openstack keypair create --public-key ~/.ssh/microstack.pub microstack - export OSM_HOSTNAME=`juju status --format json | jq -rc '.applications."nbi-k8s".address'` - osm vim-create --name microstack-site \ - --user admin \ - --password keystone \ - --auth_url http://10.20.20.1:5000/v3 \ - --tenant admin \ - --account_type openstack \ - --config='{security_groups: default, - keypair: microstack, - project_name: admin, - user_domain_name: default, - region_name: microstack, - insecure: True, - availability_zone: nova, - version: 3}' + sudo snap install microstack --beta --devmode + + CHECK=$(microstack.openstack server list) + if [ $? -ne 0 ] ; then + if [[ $CHECK == *"not initialized"* ]]; then + echo "Setting MicroStack dashboard to listen to port 8080" + sudo snap set microstack config.network.ports.dashboard=8080 + echo "Initializing MicroStack. This can take several minutes" + sudo microstack.init --auto --control + fi + fi + + sudo snap alias microstack.openstack openstack + + echo "Updating default security group in MicroStack to allow all access" + + for i in $(microstack.openstack security group list | awk '/default/{ print $2 }'); do + for PROTO in icmp tcp udp ; do + echo " $PROTO ingress" + CHECK=$(microstack.openstack security group rule create $i --protocol $PROTO --remote-ip 0.0.0.0/0 2>&1) + if [ $? -ne 0 ] ; then + if [[ $CHECK != *"409"* ]]; then + echo "Error creating ingress rule for $PROTO" + echo $CHECK + fi + fi + done + done + + microstack.openstack network show osm-ext &>/dev/null + if [ $? -ne 0 ]; then + echo "Creating osm-ext network with router to bridge to MicroStack external network" + microstack.openstack network create --enable --no-share osm-ext + microstack.openstack subnet create osm-ext-subnet --network osm-ext --dns-nameserver 8.8.8.8 \ + --subnet-range 172.30.0.0/24 + microstack.openstack router create external-router + microstack.openstack router add subnet external-router osm-ext-subnet + microstack.openstack router set --external-gateway external external-router + fi + + microstack.openstack image list | grep ubuntu20.04 &> /dev/null + if [ $? -ne 0 ] ; then + echo "Fetching Ubuntu 20.04 image and upLoading to MicroStack" + wget -q -O- https://cloud-images.ubuntu.com/focal/current/focal-server-cloudimg-amd64.img \ + | microstack.openstack image create --public --container-format=bare \ + --disk-format=qcow2 ubuntu20.04 | grep status + fi + + if [ ! -f ~/.ssh/microstack ]; then + ssh-keygen -t rsa -N "" -f ~/.ssh/microstack + microstack.openstack keypair create --public-key ~/.ssh/microstack.pub microstack + fi + + echo "Creating VIM microstack-site in OSM" + . /var/snap/microstack/common/etc/microstack.rc + + osm vim-create \ + --name microstack-site \ + --user "$OS_USERNAME" \ + --password "$OS_PASSWORD" \ + --auth_url "$OS_AUTH_URL" \ + --tenant "$OS_USERNAME" \ + --account_type openstack \ + --config='{use_floating_ip: True, + insecure: True, + keypair: microstack, + management_network_name: osm-ext}' } -DEFAULT_IF=`ip route list match 0.0.0.0 | awk '{print $5}'` -DEFAULT_IP=`ip -o -4 a |grep ${DEFAULT_IF}|awk '{split($4,a,"/"); print a[1]}'` +DEFAULT_IF=`ip route list match 0.0.0.0 | awk '{print $5; exit}'` +DEFAULT_IP=`ip -o -4 a |grep ${DEFAULT_IF}|awk '{split($4,a,"/"); print a[1]; exit}'` check_arguments $@ mkdir -p ~/.osm install_snaps bootstrap_k8s_lxd -deploy_charmed_osm -install_osmclient -if [ -v MICROSTACK ]; then - install_microstack +create_overlay +if [ -v ONLY_VCA ]; then + HOME=/home/$USER + vca_user=$(cat $HOME/.local/share/juju/accounts.yaml | yq e .controllers.$CONTROLLER_NAME.user - ) + vca_secret=$(cat $HOME/.local/share/juju/accounts.yaml | yq e .controllers.$CONTROLLER_NAME.password - ) + vca_host=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.api-endpoints[0] - | cut -d ":" -f 1) + vca_port=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.api-endpoints[0] - | cut -d ":" -f 2) + vca_pubkey=\"$(cat $HOME/.local/share/juju/ssh/juju_id_rsa.pub)\" + vca_cloud="lxd-cloud" + vca_cacert=$(cat $HOME/.local/share/juju/controllers.yaml | yq e .controllers.$CONTROLLER_NAME.ca-cert - | base64 | tr -d \\n) + hostname=`cat /etc/hostname` + + echo "Use the following command to register the installed VCA to your OSM:" + echo -e " osm vca-add --endpoints $vca_host:$vca_port \\\n --user $vca_user \\\n --secret $vca_secret \\\n --cacert $vca_cacert \\\n --lxd-cloud lxd-cloud \\\n --lxd-credentials lxd-cloud \\\n --k8s-cloud microk8s \\\n --k8s-credentials microk8s\\\n $hostname-vca" + track deploy_osm deploy_vca_only_ok +else + deploy_charmed_osm + track deploy_osm deploy_osm_services_k8s_ok + install_osmclient + track osmclient osmclient_ok + export OSM_HOSTNAME=$(juju config -m $MODEL_NAME nbi site_url | sed "s/http.*\?:\/\///"):443 + export OSM_PASSWORD=$keystone_admin_password + sleep 10 + add_local_k8scluster + track final_ops add_local_k8scluster_ok + if [ -v MICROSTACK ]; then + install_microstack + track final_ops install_microstack_ok + fi + + echo "Your installation is now complete, follow these steps for configuring the osmclient:" + echo + echo "1. Create the OSM_HOSTNAME environment variable with the NBI IP" + echo + echo "export OSM_HOSTNAME=$OSM_HOSTNAME" + echo "export OSM_PASSWORD=$OSM_PASSWORD" + echo + echo "2. Add the previous commands to your .bashrc for other Shell sessions" + echo + echo "echo \"export OSM_HOSTNAME=$OSM_HOSTNAME\" >> ~/.bashrc" + echo "echo \"export OSM_PASSWORD=$OSM_PASSWORD\" >> ~/.bashrc" + echo + echo "3. Login OSM GUI by using admin password: $OSM_PASSWORD" + echo + echo "DONE" + track end fi -OSM_HOSTNAME=$(juju config nbi-k8s juju-external-hostname):443 - -echo "Your installation is now complete, follow these steps for configuring the osmclient:" -echo -echo "1. Create the OSM_HOSTNAME environment variable with the NBI IP" -echo -echo "export OSM_HOSTNAME=$OSM_HOSTNAME" -echo -echo "2. Add the previous command to your .bashrc for other Shell sessions" -echo -echo "echo \"export OSM_HOSTNAME=$OSM_HOSTNAME\" >> ~/.bashrc" -echo -echo "DONE"