X-Git-Url: https://osm.etsi.org/gitweb/?a=blobdiff_plain;f=installers%2Fcharmed_install.sh;h=d4f0b8f7d1dfa4502194a1a27a1704b16e65563e;hb=62e6044e4e5feded25e1a0c781d386d301841b3c;hp=731282b604423ab308be705dbf43d7c1a46f9a49;hpb=47cd3b277310d5d6fef0067f220e849bebff35b4;p=osm%2Fdevops.git diff --git a/installers/charmed_install.sh b/installers/charmed_install.sh index 731282b6..d4f0b8f7 100755 --- a/installers/charmed_install.sh +++ b/installers/charmed_install.sh @@ -12,53 +12,122 @@ # See the License for the specific language governing permissions and # limitations under the License. # + +# set -eux + +K8S_CLOUD_NAME="k8s-cloud" +KUBECTL="microk8s.kubectl" +IMAGES_OVERLAY_FILE=~/.osm/images-overlay.yaml function check_arguments(){ while [ $# -gt 0 ] ; do - case $1 in - --bundle) BUNDLE="$2" ;; - --kubeconfig) KUBECFG="$2" ;; - --lxd-endpoint) LXDENDPOINT="$2" ;; - --lxd-cert) LXDCERT="$2" ;; - --microstack) MICROSTACK=y - esac - shift + case $1 in + --bundle) BUNDLE="$2" ;; + --k8s) KUBECFG="$2" ;; + --vca) CONTROLLER="$2" ;; + --lxd) LXD_CLOUD="$2" ;; + --lxd-cred) LXD_CREDENTIALS="$2" ;; + --microstack) MICROSTACK=y ;; + --ha) BUNDLE="osm-ha" ;; + --tag) TAG="$2" ;; + esac + shift done - echo $BUNDLE $KUBECONFIG $LXDENDPOINT + # echo $BUNDLE $KUBECONFIG $LXDENDPOINT } + function install_snaps(){ - sudo snap install juju --classic - if [ -z "$KUBECFG" ]; then sudo snap install microk8s --classic; fi + if [ ! -v KUBECFG ]; then + sudo snap install microk8s --classic + sudo usermod -a -G microk8s `whoami` + mkdir -p ~/.kube + sudo chown -f -R `whoami` ~/.kube + KUBEGRP="microk8s" + else + KUBECTL="kubectl" + sudo snap install kubectl --classic + export KUBECONFIG=${KUBECFG} + KUBEGRP=$(id -g -n) + fi + sudo snap install juju --classic --channel=2.8/stable } function bootstrap_k8s_lxd(){ - if [ -n "$KUBECFG" ]; then - echo "Using specified K8s" - cat $KUBECFG | juju add-k8s k8s-cluster --client - juju bootstrap k8s-cluster controller - else - sudo microk8s.enable storage dns - sudo usermod -a -G microk8s ubuntu - sg microk8s -c "juju bootstrap microk8s controller" + [ -v CONTROLLER ] && ADD_K8S_OPTS="--controller ${CONTROLLER}" && CONTROLLER_NAME=$CONTROLLER + [ ! -v CONTROLLER ] && ADD_K8S_OPTS="--client" && BOOTSTRAP_NEEDED="yes" && CONTROLLER_NAME="osm-vca" + + if [ -v BOOTSTRAP_NEEDED ]; then + CONTROLLER_PRESENT=$(juju controllers 2>/dev/null| grep ${CONTROLLER_NAME} | wc -l) + if [ $CONTROLLER_PRESENT -ge 1 ]; then + cat << EOF +Threre is already a VCA present with the installer reserved name of "${CONTROLLER_NAME}". +You may either explicitly use this VCA with the "--vca ${CONTROLLER_NAME}" option, or remove it +using this command: + + juju destroy-controller --release-storage --destroy-all-models -y ${CONTROLLER_NAME} + +Please retry the installation once this conflict has been resolved. +EOF + exit 1 + fi fi - if [ -n "$LXDENDPOINT" ]; then - if [ -n "$LXDCERT" ]; then + if [ -v KUBECFG ]; then + cat $KUBECFG | juju add-k8s $K8S_CLOUD_NAME $ADD_K8S_OPTS + [ -v BOOTSTRAP_NEEDED ] && juju bootstrap $K8S_CLOUD_NAME $CONTROLLER_NAME \ + --config controller-service-type=loadbalancer \ + --agent-version=2.8.1 + else + sg ${KUBEGRP} -c "echo ${DEFAULT_IP}-${DEFAULT_IP} | microk8s.enable metallb" + sg ${KUBEGRP} -c "microk8s.enable storage dns" + TIME_TO_WAIT=30 + start_time="$(date -u +%s)" + while true + do + now="$(date -u +%s)" + if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then + echo "Microk8s storage failed to enable" + sg ${KUBEGRP} -c "microk8s.status" + exit 1 + fi + storage_status=`sg ${KUBEGRP} -c "microk8s.status -a storage"` + if [[ $storage_status == "enabled" ]]; then + break + fi + sleep 1 + done + + [ ! -v BOOTSTRAP_NEEDED ] && sg ${KUBEGRP} -c "microk8s.config" | juju add-k8s $K8S_CLOUD_NAME $ADD_K8S_OPTS + [ -v BOOTSTRAP_NEEDED ] && sg ${KUBEGRP} -c \ + "juju bootstrap microk8s $CONTROLLER_NAME --config controller-service-type=loadbalancer --agent-version=2.8.1" \ + && K8S_CLOUD_NAME=microk8s + fi - local server_cert=`cat $LXDCERT | sed 's/^/ /'` - else + if [ -v LXD_CLOUD ]; then + if [ ! -v LXD_CREDENTIALS ]; then echo "The installer needs the LXD server certificate if the LXD is external" exit 1 fi else LXDENDPOINT=$DEFAULT_IP - lxd init --auto --network-address $LXDENDPOINT - lxc network set lxdbr0 ipv6.address none - - local server_cert=`cat /var/lib/lxd/server.crt | sed 's/^/ /'` - fi + LXD_CLOUD=~/.osm/lxd-cloud.yaml + LXD_CREDENTIALS=~/.osm/lxd-credentials.yaml + # Apply sysctl production values for optimal performance + sudo cp /usr/share/osm-devops/installers/60-lxd-production.conf /etc/sysctl.d/60-lxd-production.conf + sudo sysctl --system + # Install LXD snap + sudo apt-get remove --purge -y liblxc1 lxc-common lxcfs lxd lxd-client + sudo snap install lxd + sudo apt-get install zfsutils-linux -y + # Configure LXD + sudo usermod -a -G lxd `whoami` + cat /usr/share/osm-devops/installers/lxd-preseed.conf | sed 's/^config: {}/config:\n core.https_address: '$LXDENDPOINT':8443/' | sg lxd -c "lxd init --preseed" + sg lxd -c "lxd waitready" + DEFAULT_MTU=$(ip addr show $DEFAULT_IF | perl -ne 'if (/mtu\s(\d+)/) {print $1;}') + sg lxd -c "lxc profile device set default eth0 mtu $DEFAULT_MTU" + sg lxd -c "lxc network set lxdbr0 bridge.mtu $DEFAULT_MTU" - sudo cat << EOF > ~/.osm/lxd-cloud.yaml + cat << EOF > $LXD_CLOUD clouds: lxd-cloud: type: lxd @@ -67,16 +136,15 @@ clouds: config: ssl-hostname-verification: false EOF - openssl req -nodes -new -x509 -keyout ~/.osm/private.key -out ~/.osm/publickey.crt -days 365 -subj "/C=FR/ST=Nice/L=Nice/O=ETSI/OU=OSM/CN=osm.etsi.org" - - - local client_cert=`cat ~/.osm/publickey.crt | sed 's/^/ /'` - local client_key=`cat ~/.osm/private.key | sed 's/^/ /'` + openssl req -nodes -new -x509 -keyout ~/.osm/client.key -out ~/.osm/client.crt -days 365 -subj "/C=FR/ST=Nice/L=Nice/O=ETSI/OU=OSM/CN=osm.etsi.org" + local server_cert=`cat /var/snap/lxd/common/lxd/server.crt | sed 's/^/ /'` + local client_cert=`cat ~/.osm/client.crt | sed 's/^/ /'` + local client_key=`cat ~/.osm/client.key | sed 's/^/ /'` - sudo cat << EOF > ~/.osm/lxd-credentials.yaml + cat << EOF > $LXD_CREDENTIALS credentials: lxd-cloud: - admin: + lxd-cloud: auth-type: certificate server-cert: | $server_cert @@ -85,72 +153,128 @@ $client_cert client-key: | $client_key EOF + lxc config trust add local: ~/.osm/client.crt + fi - lxc config trust add local: ~/.osm/publickey.crt - juju add-cloud -c controller lxd-cloud ~/.osm/lxd-cloud.yaml --force - juju add-credential -c controller lxd-cloud -f ~/.osm/lxd-credentials.yaml - juju add-model test lxd-cloud + juju add-cloud -c $CONTROLLER_NAME lxd-cloud $LXD_CLOUD --force + juju add-credential -c $CONTROLLER_NAME lxd-cloud -f $LXD_CREDENTIALS + sg lxd -c "lxd waitready" + #juju add-model test lxd-cloud || true + juju controller-config features=[k8s-operators] +} +function wait_for_port(){ + SERVICE=$1 + INDEX=$2 + TIME_TO_WAIT=30 + start_time="$(date -u +%s)" + while true + do + now="$(date -u +%s)" + if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then + echo "Failed to expose external ${SERVICE} interface port" + exit 1 + fi + + if [ $(sg ${KUBEGRP} -c "${KUBECTL} get ingress -n osm -o json | jq -r '.items[$INDEX].metadata.name'") == ${SERVICE} ] ; then + break + fi + sleep 1 + done } function deploy_charmed_osm(){ create_overlay echo "Creating OSM model" - if [ -n "$KUBECFG" ]; then - juju add-model osm-on-k8s k8s-cluster + if [ -v KUBECFG ]; then + juju add-model osm $K8S_CLOUD_NAME else - sg microk8s -c "juju add-model osm-on-k8s microk8s" + sg ${KUBEGRP} -c "juju add-model osm $K8S_CLOUD_NAME" fi echo "Deploying OSM with charms" - echo $BUNDLE - if [ -n "$BUNDLE" ]; then - juju deploy $BUNDLE --overlay ~/.osm/vca-overlay.yaml + images_overlay="" + [ -v TAG ] && generate_images_overlay && images_overlay="--overlay $IMAGES_OVERLAY_FILE" + if [ -v BUNDLE ]; then + juju deploy $BUNDLE --overlay ~/.osm/vca-overlay.yaml $images_overlay else - juju deploy osm --overlay ~/.osm/vca-overlay.yaml + juju deploy osm --overlay ~/.osm/vca-overlay.yaml $images_overlay fi + echo "Waiting for deployment to finish..." - check_osm_deployed &> /dev/null + check_osm_deployed echo "OSM with charms deployed" - sudo microk8s.enable ingress - juju config ui-k8s juju-external-hostname=osm.$DEFAULT_IP.xip.io + if [ ! -v KUBECFG ]; then + sg ${KUBEGRP} -c "microk8s.enable ingress" + API_SERVER=${DEFAULT_IP} + else + API_SERVER=$(kubectl config view --minify | grep server | cut -f 2- -d ":" | tr -d " ") + proto="$(echo $API_SERVER | grep :// | sed -e's,^\(.*://\).*,\1,g')" + url="$(echo ${API_SERVER/$proto/})" + user="$(echo $url | grep @ | cut -d@ -f1)" + hostport="$(echo ${url/$user@/} | cut -d/ -f1)" + API_SERVER="$(echo $hostport | sed -e 's,:.*,,g')" + fi + + juju config nbi-k8s juju-external-hostname=nbi.${API_SERVER}.xip.io + juju expose nbi-k8s + + wait_for_port nbi-k8s 0 + sg ${KUBEGRP} -c "${KUBECTL} get ingress -n osm -o json | jq '.items[0].metadata.annotations += {\"nginx.ingress.kubernetes.io/backend-protocol\": \"HTTPS\"}' | ${KUBECTL} --validate=false replace -f -" + sg ${KUBEGRP} -c "${KUBECTL} get ingress -n osm -o json | jq '.items[0].metadata.annotations += {\"nginx.ingress.kubernetes.io/proxy-body-size\": \"0\"}' | ${KUBECTL} replace -f -" + + juju config ng-ui juju-external-hostname=ui.${API_SERVER}.xip.io + juju expose ng-ui + + wait_for_port ng-ui 1 + sg ${KUBEGRP} -c "${KUBECTL} get ingress -n osm -o json | jq '.items[2].metadata.annotations += {\"nginx.ingress.kubernetes.io/proxy-body-size\": \"0\"}' | ${KUBECTL} --validate=false replace -f -" + + juju config ui-k8s juju-external-hostname=osm.${API_SERVER}.xip.io juju expose ui-k8s + + wait_for_port ui-k8s 2 + sg ${KUBEGRP} -c "${KUBECTL} get ingress -n osm -o json | jq '.items[1].metadata.annotations += {\"nginx.ingress.kubernetes.io/proxy-body-size\": \"0\"}' | ${KUBECTL} --validate=false replace -f -" } function check_osm_deployed() { + TIME_TO_WAIT=600 + start_time="$(date -u +%s)" + total_service_count=14 while true do - pod_name=`sg microk8s -c "microk8s.kubectl -n osm-on-k8s get pods | grep ui-k8s | grep -v operator" | awk '{print $1}' -` - - if [[ `sg microk8s -c "microk8s.kubectl -n osm-on-k8s wait pod $pod_name --for condition=Ready"` ]]; then - if [[ `sg microk8s -c "microk8s.kubectl -n osm-on-k8s wait pod lcm-k8s-0 --for condition=Ready"` ]]; then - break - fi + service_count=$(juju status | grep kubernetes | grep active | wc -l) + echo "$service_count / $total_service_count services active" + if [ $service_count -eq $total_service_count ]; then + break + fi + now="$(date -u +%s)" + if [[ $(( now - start_time )) -gt $TIME_TO_WAIT ]];then + echo "Timed out waiting for OSM services to become ready" + exit 1 fi sleep 10 done } function create_overlay() { - sudo snap install yq - - local YQ="$SNAP/bin/yq" + sudo snap install jq + sudo apt install python3-pip -y + python3 -m pip install yq + PATH=$PATH:$HOME/.local/bin # make yq command available local HOME=/home/$USER - local vca_user=$(cat $HOME/.local/share/juju/accounts.yaml | yq r - controllers.controller.user) - local vca_password=$(cat $HOME/.local/share/juju/accounts.yaml | yq r - controllers.controller.password) - local vca_host=$(cat $HOME/.local/share/juju/controllers.yaml | yq r - controllers.controller.api-endpoints[0] | cut -d ":" -f 1) - local vca_port=$(cat $HOME/.local/share/juju/controllers.yaml | yq r - controllers.controller.api-endpoints[0] | cut -d ":" -f 2) + local vca_user=$(cat $HOME/.local/share/juju/accounts.yaml | yq --arg CONTROLLER_NAME $CONTROLLER_NAME '.controllers[$CONTROLLER_NAME].user') + local vca_password=$(cat $HOME/.local/share/juju/accounts.yaml | yq --arg CONTROLLER_NAME $CONTROLLER_NAME '.controllers[$CONTROLLER_NAME].password') + local vca_host=$(cat $HOME/.local/share/juju/controllers.yaml | yq --arg CONTROLLER_NAME $CONTROLLER_NAME '.controllers[$CONTROLLER_NAME]["api-endpoints"][0]' --raw-output | cut -d ":" -f 1) + local vca_port=$(cat $HOME/.local/share/juju/controllers.yaml | yq --arg CONTROLLER_NAME $CONTROLLER_NAME '.controllers[$CONTROLLER_NAME]["api-endpoints"][0]' --raw-output | cut -d ":" -f 2) local vca_pubkey=\"$(cat $HOME/.local/share/juju/ssh/juju_id_rsa.pub)\" local vca_cloud="lxd-cloud" # Get the VCA Certificate - local vca_cacert=$(cat $HOME/.local/share/juju/controllers.yaml | yq r - controllers.controller.ca-cert | base64 | tr -d \\n) + local vca_cacert=$(cat $HOME/.local/share/juju/controllers.yaml | yq --arg CONTROLLER_NAME $CONTROLLER_NAME '.controllers[$CONTROLLER_NAME]["ca-cert"]' --raw-output | base64 | tr -d \\n) # Calculate the default route of this machine - local DEFAULT_IF=`route -n |awk '$1~/^0.0.0.0/ {print $8}'` - local vca_apiproxy=`ip -o -4 a |grep ${DEFAULT_IF}|awk '{split($4,a,"/"); print a[1]}'` + local DEFAULT_IF=`ip route list match 0.0.0.0 | awk '{print $5}'` # Generate a new overlay.yaml, overriding any existing one - sudo cat << EOF > /tmp/vca-overlay.yaml + cat << EOF > /tmp/vca-overlay.yaml applications: lcm-k8s: options: @@ -160,8 +284,8 @@ applications: vca_port: $vca_port vca_pubkey: $vca_pubkey vca_cacert: $vca_cacert - vca_apiproxy: $vca_apiproxy vca_cloud: $vca_cloud + vca_k8s_cloud: $K8S_CLOUD_NAME mon-k8s: options: vca_user: $vca_user @@ -169,8 +293,40 @@ applications: vca_host: $vca_host vca_cacert: $vca_cacert EOF - sudo cp /tmp/vca-overlay.yaml ~/.osm/ - OSM_VCA_HOST=$vca_host + mv /tmp/vca-overlay.yaml ~/.osm/ + OSM_VCA_HOST=$vca_host +} + +function generate_images_overlay(){ + cat << EOF > /tmp/images-overlay.yaml +applications: + lcm-k8s: + options: + image: opensourcemano/lcm:$TAG + mon-k8s: + options: + image: opensourcemano/mon:$TAG + ro-k8s: + options: + image: opensourcemano/ro:$TAG + nbi-k8s: + options: + image: opensourcemano/nbi:$TAG + pol-k8s: + options: + image: opensourcemano/pol:$TAG + ui-k8s: + options: + image: opensourcemano/light-ui:$TAG + pla: + options: + image: opensourcemano/pla:$TAG + ng-ui: + options: + image: opensourcemano/ng-ui:$TAG + +EOF + mv /tmp/images-overlay.yaml $IMAGES_OVERLAY_FILE } function install_osmclient() { @@ -178,64 +334,57 @@ function install_osmclient() { sudo snap alias osmclient.osm osm } -function create_iptables() { - check_install_iptables_persistent - - if ! sudo iptables -t nat -C PREROUTING -p tcp -m tcp -d $DEFAULT_IP --dport 17070 -j DNAT --to-destination $OSM_VCA_HOST; then - sudo iptables -t nat -A PREROUTING -p tcp -m tcp -d $DEFAULT_IP --dport 17070 -j DNAT --to-destination $OSM_VCA_HOST - sudo netfilter-persistent save - fi -} - -function check_install_iptables_persistent(){ - echo -e "\nChecking required packages: iptables-persistent" - if ! dpkg -l iptables-persistent &>/dev/null; then - echo -e " Not installed.\nInstalling iptables-persistent requires root privileges" - echo iptables-persistent iptables-persistent/autosave_v4 boolean true | sudo debconf-set-selections - echo iptables-persistent iptables-persistent/autosave_v6 boolean true | sudo debconf-set-selections - sudo apt-get -yq install iptables-persistent - fi -} function install_microstack() { sudo snap install microstack --classic --beta sudo microstack.init --auto wget https://cloud-images.ubuntu.com/releases/16.04/release/ubuntu-16.04-server-cloudimg-amd64-disk1.img -P ~/.osm/ microstack.openstack image create \ - --public \ - --disk-format qcow2 \ - --container-format bare \ - --file ~/.osm/ubuntu-16.04-server-cloudimg-amd64-disk1.img \ - ubuntu1604 + --public \ + --disk-format qcow2 \ + --container-format bare \ + --file ~/.osm/ubuntu-16.04-server-cloudimg-amd64-disk1.img \ + ubuntu1604 ssh-keygen -t rsa -N "" -f ~/.ssh/microstack microstack.openstack keypair create --public-key ~/.ssh/microstack.pub microstack - export OSM_HOSTNAME=`juju status --format yaml | yq r - applications.nbi-k8s.address` + export OSM_HOSTNAME=`juju status --format json | jq -rc '.applications."nbi-k8s".address'` osm vim-create --name microstack-site \ - --user admin \ - --password keystone \ - --auth_url http://10.20.20.1:5000/v3 \ - --tenant admin \ - --account_type openstack \ - --config='{security_groups: default, - keypair: microstack, - project_name: admin, - user_domain_name: default, - region_name: microstack, - insecure: True, - availability_zone: nova, - version: 3}' + --user admin \ + --password keystone \ + --auth_url http://10.20.20.1:5000/v3 \ + --tenant admin \ + --account_type openstack \ + --config='{security_groups: default, + keypair: microstack, + project_name: admin, + user_domain_name: default, + region_name: microstack, + insecure: True, + availability_zone: nova, + version: 3}' } -DEFAULT_IF=`route -n |awk '$1~/^0.0.0.0/ {print $8}'` +DEFAULT_IF=`ip route list match 0.0.0.0 | awk '{print $5}'` DEFAULT_IP=`ip -o -4 a |grep ${DEFAULT_IF}|awk '{split($4,a,"/"); print a[1]}'` check_arguments $@ -mkdir ~/.osm +mkdir -p ~/.osm install_snaps bootstrap_k8s_lxd deploy_charmed_osm -create_iptables install_osmclient -if [ -n "$MICROSTACK" ]; then +if [ -v MICROSTACK ]; then install_microstack fi + +echo "Your installation is now complete, follow these steps for configuring the osmclient:" +echo +echo "1. Create the OSM_HOSTNAME environment variable with the NBI IP" +echo +echo "export OSM_HOSTNAME=nbi.$API_SERVER.xip.io:443" +echo +echo "2. Add the previous command to your .bashrc for other Shell sessions" +echo +echo "echo \"export OSM_HOSTNAME=nbi.$API_SERVER.xip.io:443\" >> ~/.bashrc" +echo +echo "DONE"