from osm_lcm.data_utils.lcm_config import VcaConfig
from osm_lcm.frontend_pb2 import PrimitiveRequest
-from osm_lcm.frontend_pb2 import SshKeyRequest, SshKeyReply
+from osm_lcm.frontend_pb2 import SshKeyRequest
from osm_lcm.frontend_grpc import FrontendExecutorStub
from osm_lcm.lcm_utils import LcmBase, get_ee_id_parts
vca_type: str = None,
*kargs,
**kwargs,
- ) -> (str, dict):
+ ) -> tuple[str, dict]:
"""
Creates a new helm execution environment deploying the helm-chat indicated in the
artifact_path
vca_type: str = None,
*kargs,
**kwargs,
- ) -> (str, dict):
+ ) -> tuple[str, dict]:
"""
Creates a new helm execution environment deploying the helm-chat indicated in the
attifact_path
stub = FrontendExecutorStub(channel)
if primitive_name == "_get_ssh_key":
self.log.debug("get ssh key, ip_addr: {}".format(ip_addr))
- reply: SshKeyReply = await stub.GetSshKey(SshKeyRequest())
+ reply = await stub.GetSshKey(SshKeyRequest())
return reply.message
# For any other primitives
async with stub.RunPrimitive.open() as stream:
import base64
import logging
-from typing import Dict
import typing
import uuid
import json
def create_cluster_role(
self,
name: str,
- labels: Dict[str, str],
+ labels: typing.Dict[str, str],
namespace: str = "kube-system",
):
"""
async def create_role(
self,
name: str,
- labels: Dict[str, str],
+ labels: typing.Dict[str, str],
api_groups: list,
resources: list,
verbs: list,
def create_service_account(
self,
name: str,
- labels: Dict[str, str],
+ labels: typing.Dict[str, str],
namespace: str = "kube-system",
):
"""
self.clients[CORE_CLIENT].delete_namespaced_service_account(name, namespace)
def create_cluster_role_binding(
- self, name: str, labels: Dict[str, str], namespace: str = "kube-system"
+ self, name: str, labels: typing.Dict[str, str], namespace: str = "kube-system"
):
"""
Create a cluster role binding
name: str,
role_name: str,
sa_name: str,
- labels: Dict[str, str],
+ labels: typing.Dict[str, str],
namespace: str,
):
"""
self,
name: str,
namespace: str,
- ) -> dict:
+ ) -> typing.Dict:
"""
Get secret data