Sean Dague | e263c82 | 2014-12-05 14:25:28 -0500 | [diff] [blame] | 1 | #!/bin/bash |
| 2 | # |
Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 3 | # functions - DevStack-specific functions |
Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 4 | # |
Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 5 | # The following variables are assumed to be defined by certain functions: |
Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 6 | # |
Dean Troyer | d8864fe | 2014-02-17 11:00:42 -0600 | [diff] [blame] | 7 | # - ``DATABASE_BACKENDS`` |
Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 8 | # - ``ENABLED_SERVICES`` |
Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 9 | # - ``FILES`` |
| 10 | # - ``GLANCE_HOSTPORT`` |
Dean Troyer | d8864fe | 2014-02-17 11:00:42 -0600 | [diff] [blame] | 11 | # |
Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 12 | |
Ian Wienand | 4ffb454 | 2015-06-30 11:00:32 +1000 | [diff] [blame] | 13 | # ensure we don't re-source this in the same environment |
| 14 | [[ -z "$_DEVSTACK_FUNCTIONS" ]] || return 0 |
Sean Dague | afef8bf | 2017-03-06 14:07:23 -0500 | [diff] [blame] | 15 | declare -r -g _DEVSTACK_FUNCTIONS=1 |
Ian Wienand | 4ffb454 | 2015-06-30 11:00:32 +1000 | [diff] [blame] | 16 | |
Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 17 | # Include the common functions |
| 18 | FUNC_DIR=$(cd $(dirname "${BASH_SOURCE:-$0}") && pwd) |
| 19 | source ${FUNC_DIR}/functions-common |
Dean Troyer | bf2ad70 | 2015-03-09 15:16:10 -0500 | [diff] [blame] | 20 | source ${FUNC_DIR}/inc/ini-config |
Eric Fried | 2468cea | 2019-07-25 13:18:58 -0500 | [diff] [blame] | 21 | source ${FUNC_DIR}/inc/meta-config |
Dean Troyer | 490430d | 2015-01-30 14:38:35 -0600 | [diff] [blame] | 22 | source ${FUNC_DIR}/inc/python |
Dean Troyer | 32d6bc6 | 2015-03-29 14:16:44 -0500 | [diff] [blame] | 23 | source ${FUNC_DIR}/inc/rootwrap |
Dean Troyer | 7f9aa71 | 2012-01-31 12:11:56 -0600 | [diff] [blame] | 24 | |
Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 25 | # Save trace setting |
Ian Wienand | 523f488 | 2015-10-13 11:03:03 +1100 | [diff] [blame] | 26 | _XTRACE_FUNCTIONS=$(set +o | grep xtrace) |
Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 27 | set +o xtrace |
| 28 | |
Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 29 | # Check if a function already exists |
| 30 | function function_exists { |
| 31 | declare -f -F $1 > /dev/null |
| 32 | } |
Dean Troyer | 7f9aa71 | 2012-01-31 12:11:56 -0600 | [diff] [blame] | 33 | |
Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 34 | # short_source prints out the current location of the caller in a way |
| 35 | # that strips redundant directories. This is useful for PS4 usage. |
| 36 | function short_source { |
| 37 | saveIFS=$IFS |
| 38 | IFS=" " |
| 39 | called=($(caller 0)) |
| 40 | IFS=$saveIFS |
| 41 | file=${called[2]} |
| 42 | file=${file#$RC_DIR/} |
| 43 | printf "%-40s " "$file:${called[1]}:${called[0]}" |
| 44 | } |
John L. Villalovos | daa7a41 | 2016-05-05 12:50:52 -0700 | [diff] [blame] | 45 | # PS4 is exported to child shells and uses the 'short_source' function, so |
| 46 | # export it so child shells have access to the 'short_source' function also. |
| 47 | export -f short_source |
Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 48 | |
Monty Taylor | d8bb220 | 2017-09-03 12:13:59 -0500 | [diff] [blame] | 49 | # Download a file from a URL |
| 50 | # |
| 51 | # Will check cache (in $FILES) or download given URL. |
| 52 | # |
| 53 | # Argument is the URL to the remote file |
| 54 | # |
| 55 | # Will echo the local path to the file as the output. Will die on |
| 56 | # failure to download. |
| 57 | # |
| 58 | # Files can be pre-cached for CI environments, see EXTRA_CACHE_URLS |
| 59 | # and tools/image_list.sh |
| 60 | function get_extra_file { |
| 61 | local file_url=$1 |
| 62 | |
| 63 | file_name=$(basename "$file_url") |
| 64 | if [[ $file_url != file* ]]; then |
| 65 | # If the file isn't cache, download it |
| 66 | if [[ ! -f $FILES/$file_name ]]; then |
yuanke wei | c652a49 | 2017-09-17 22:18:07 +0800 | [diff] [blame] | 67 | wget --progress=dot:giga -t 2 -c $file_url -O $FILES/$file_name |
Monty Taylor | d8bb220 | 2017-09-03 12:13:59 -0500 | [diff] [blame] | 68 | if [[ $? -ne 0 ]]; then |
| 69 | die "$file_url could not be downloaded" |
| 70 | fi |
| 71 | fi |
| 72 | echo "$FILES/$file_name" |
| 73 | return |
| 74 | else |
| 75 | # just strip the file:// bit and that's the path to the file |
| 76 | echo $file_url | sed 's/$file:\/\///g' |
| 77 | fi |
| 78 | } |
| 79 | |
Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 80 | # Generate image property arguments for OSC |
| 81 | # |
| 82 | # Arguments: properties, one per, like propname=value |
| 83 | # |
| 84 | # Result is --property propname1=value1 --property propname2=value2 |
| 85 | function _image_properties_to_arg { |
| 86 | local result="" |
| 87 | for property in $*; do |
| 88 | result+=" --property $property" |
| 89 | done |
| 90 | echo $result |
| 91 | } |
| 92 | |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 93 | # Upload an image to glance using the configured mechanism |
| 94 | # |
| 95 | # Arguments: |
| 96 | # image name |
| 97 | # container format |
| 98 | # disk format |
| 99 | # path to image file |
| 100 | # optional properties (format of propname=value) |
| 101 | # |
| 102 | function _upload_image { |
| 103 | local image_name="$1" |
| 104 | shift |
| 105 | local container="$1" |
| 106 | shift |
| 107 | local disk="$1" |
| 108 | shift |
| 109 | local image="$1" |
| 110 | shift |
| 111 | local properties |
| 112 | local useimport |
| 113 | |
Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 114 | properties=$(_image_properties_to_arg $*) |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 115 | |
| 116 | if [[ "$GLANCE_USE_IMPORT_WORKFLOW" == "True" ]]; then |
Dan Smith | 33f8f6e | 2020-07-21 19:41:48 -0700 | [diff] [blame^] | 117 | useimport="--import" |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 118 | fi |
| 119 | |
| 120 | openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name" --public --container-format "$container" --disk-format "$disk" $useimport $properties < "${image}" |
| 121 | } |
Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 122 | |
Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 123 | # Retrieve an image from a URL and upload into Glance. |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 124 | # Uses the following variables: |
Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 125 | # |
| 126 | # - ``FILES`` must be set to the cache dir |
| 127 | # - ``GLANCE_HOSTPORT`` |
| 128 | # |
Peter Stachowski | 5aeea6a | 2015-09-22 19:38:02 +0000 | [diff] [blame] | 129 | # upload_image image-url |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 130 | function upload_image { |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 131 | local image_url=$1 |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 132 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 133 | local image image_fname image_name |
| 134 | |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 135 | # Create a directory for the downloaded image tarballs. |
| 136 | mkdir -p $FILES/images |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 137 | image_fname=`basename "$image_url"` |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 138 | if [[ $image_url != file* ]]; then |
Sreeram Yerrapragada | 314af0a | 2014-03-03 21:34:45 -0800 | [diff] [blame] | 139 | # Downloads the image (uec ami+akistyle), then extracts it. |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 140 | if [[ ! -f $FILES/$image_fname || "$(stat -c "%s" $FILES/$image_fname)" = "0" ]]; then |
Attila Fazekas | 057d6ae | 2015-01-13 14:01:26 +0100 | [diff] [blame] | 141 | wget --progress=dot:giga -c $image_url -O $FILES/$image_fname |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 142 | if [[ $? -ne 0 ]]; then |
| 143 | echo "Not found: $image_url" |
| 144 | return |
| 145 | fi |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 146 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 147 | image="$FILES/${image_fname}" |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 148 | else |
Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 149 | # File based URL (RFC 1738): ``file://host/path`` |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 150 | # Remote files are not considered here. |
Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 151 | # unix: ``file:///home/user/path/file`` |
| 152 | # windows: ``file:///C:/Documents%20and%20Settings/user/path/file`` |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 153 | image=$(echo $image_url | sed "s/^file:\/\///g") |
| 154 | if [[ ! -f $image || "$(stat -c "%s" $image)" == "0" ]]; then |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 155 | echo "Not found: $image_url" |
| 156 | return |
| 157 | fi |
| 158 | fi |
| 159 | |
| 160 | # OpenVZ-format images are provided as .tar.gz, but not decompressed prior to loading |
| 161 | if [[ "$image_url" =~ 'openvz' ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 162 | image_name="${image_fname%.tar.gz}" |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 163 | _upload_image "$image_name" ami ami "$image" |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 164 | return |
| 165 | fi |
| 166 | |
Sreeram Yerrapragada | cbaff86 | 2013-07-24 19:49:23 -0700 | [diff] [blame] | 167 | # vmdk format images |
| 168 | if [[ "$image_url" =~ '.vmdk' ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 169 | image_name="${image_fname%.vmdk}" |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 170 | |
| 171 | # Before we can upload vmdk type images to glance, we need to know it's |
| 172 | # disk type, storage adapter, and networking adapter. These values are |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 173 | # passed to glance as custom properties. |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 174 | # We take these values from the vmdk file if populated. Otherwise, we use |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 175 | # vmdk filename, which is expected in the following format: |
| 176 | # |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 177 | # <name>-<disk type>;<storage adapter>;<network adapter> |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 178 | # |
| 179 | # If the filename does not follow the above format then the vsphere |
| 180 | # driver will supply default values. |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 181 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 182 | local vmdk_disktype="" |
Sabari Kumar Murugesan | 88cde0b | 2014-12-04 17:48:26 -0800 | [diff] [blame] | 183 | local vmdk_net_adapter="e1000" |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 184 | local path_len |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 185 | |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 186 | # vmdk adapter type |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 187 | local vmdk_adapter_type |
| 188 | vmdk_adapter_type="$(head -25 $image | { grep -a -F -m 1 'ddb.adapterType =' $image || true; })" |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 189 | vmdk_adapter_type="${vmdk_adapter_type#*\"}" |
| 190 | vmdk_adapter_type="${vmdk_adapter_type%?}" |
| 191 | |
| 192 | # vmdk disk type |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 193 | local vmdk_create_type |
| 194 | vmdk_create_type="$(head -25 $image | { grep -a -F -m 1 'createType=' $image || true; })" |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 195 | vmdk_create_type="${vmdk_create_type#*\"}" |
Arnaud Legendre | 8dad4bd | 2014-02-03 17:57:39 -0800 | [diff] [blame] | 196 | vmdk_create_type="${vmdk_create_type%\"*}" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 197 | |
| 198 | descriptor_data_pair_msg="Monolithic flat and VMFS disks "` |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 199 | `"should use a descriptor-data pair." |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 200 | if [[ "$vmdk_create_type" = "monolithicSparse" ]]; then |
| 201 | vmdk_disktype="sparse" |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 202 | elif [[ "$vmdk_create_type" = "monolithicFlat" || "$vmdk_create_type" = "vmfs" ]]; then |
Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 203 | # Attempt to retrieve the ``*-flat.vmdk`` |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 204 | local flat_fname |
| 205 | flat_fname="$(head -25 $image | { grep -G 'RW\|RDONLY [0-9]+ FLAT\|VMFS' $image || true; })" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 206 | flat_fname="${flat_fname#*\"}" |
| 207 | flat_fname="${flat_fname%?}" |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 208 | if [[ -z "$flat_fname" ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 209 | flat_fname="$image_name-flat.vmdk" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 210 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 211 | path_len=`expr ${#image_url} - ${#image_fname}` |
| 212 | local flat_url="${image_url:0:$path_len}$flat_fname" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 213 | warn $LINENO "$descriptor_data_pair_msg"` |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 214 | `" Attempt to retrieve the *-flat.vmdk: $flat_url" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 215 | if [[ $flat_url != file* ]]; then |
| 216 | if [[ ! -f $FILES/$flat_fname || \ |
| 217 | "$(stat -c "%s" $FILES/$flat_fname)" = "0" ]]; then |
Attila Fazekas | 057d6ae | 2015-01-13 14:01:26 +0100 | [diff] [blame] | 218 | wget --progress=dot:giga -c $flat_url -O $FILES/$flat_fname |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 219 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 220 | image="$FILES/${flat_fname}" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 221 | else |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 222 | image=$(echo $flat_url | sed "s/^file:\/\///g") |
| 223 | if [[ ! -f $image || "$(stat -c "%s" $image)" == "0" ]]; then |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 224 | echo "Flat disk not found: $flat_url" |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 225 | return 1 |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 226 | fi |
| 227 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 228 | image_name="${flat_fname}" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 229 | vmdk_disktype="preallocated" |
Arnaud Legendre | 8dad4bd | 2014-02-03 17:57:39 -0800 | [diff] [blame] | 230 | elif [[ "$vmdk_create_type" = "streamOptimized" ]]; then |
| 231 | vmdk_disktype="streamOptimized" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 232 | elif [[ -z "$vmdk_create_type" ]]; then |
| 233 | # *-flat.vmdk provided: attempt to retrieve the descriptor (*.vmdk) |
| 234 | # to retrieve appropriate metadata |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 235 | if [[ ${image_name: -5} != "-flat" ]]; then |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 236 | warn $LINENO "Expected filename suffix: '-flat'."` |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 237 | `" Filename provided: ${image_name}" |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 238 | else |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 239 | descriptor_fname="${image_name:0:${#image_name} - 5}.vmdk" |
| 240 | path_len=`expr ${#image_url} - ${#image_fname}` |
| 241 | local flat_path="${image_url:0:$path_len}" |
| 242 | local descriptor_url=$flat_path$descriptor_fname |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 243 | warn $LINENO "$descriptor_data_pair_msg"` |
| 244 | `" Attempt to retrieve the descriptor *.vmdk: $descriptor_url" |
| 245 | if [[ $flat_path != file* ]]; then |
| 246 | if [[ ! -f $FILES/$descriptor_fname || \ |
| 247 | "$(stat -c "%s" $FILES/$descriptor_fname)" = "0" ]]; then |
| 248 | wget -c $descriptor_url -O $FILES/$descriptor_fname |
| 249 | fi |
| 250 | descriptor_url="$FILES/$descriptor_fname" |
| 251 | else |
| 252 | descriptor_url=$(echo $descriptor_url | sed "s/^file:\/\///g") |
| 253 | if [[ ! -f $descriptor_url || \ |
| 254 | "$(stat -c "%s" $descriptor_url)" == "0" ]]; then |
| 255 | echo "Descriptor not found: $descriptor_url" |
| 256 | return 1 |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 257 | fi |
| 258 | fi |
Ryan Hsu | 99b622a | 2014-03-05 15:35:49 -0800 | [diff] [blame] | 259 | vmdk_adapter_type="$(head -25 $descriptor_url | { grep -a -F -m 1 'ddb.adapterType =' $descriptor_url || true; })" |
| 260 | vmdk_adapter_type="${vmdk_adapter_type#*\"}" |
| 261 | vmdk_adapter_type="${vmdk_adapter_type%?}" |
| 262 | fi |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 263 | vmdk_disktype="preallocated" |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 264 | else |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 265 | vmdk_disktype="preallocated" |
| 266 | fi |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 267 | |
| 268 | # NOTE: For backwards compatibility reasons, colons may be used in place |
| 269 | # of semi-colons for property delimiters but they are not permitted |
| 270 | # characters in NTFS filesystems. |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 271 | property_string=`echo "$image_name" | { grep -oP '(?<=-)(?!.*-).*[:;].*[:;].*$' || true; }` |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 272 | IFS=':;' read -a props <<< "$property_string" |
| 273 | vmdk_disktype="${props[0]:-$vmdk_disktype}" |
| 274 | vmdk_adapter_type="${props[1]:-$vmdk_adapter_type}" |
| 275 | vmdk_net_adapter="${props[2]:-$vmdk_net_adapter}" |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 276 | |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 277 | _upload_image "$image_name" bare vmdk "$image" vmware_disktype="$vmdk_disktype" vmware_adaptertype="$vmdk_adapter_type" hw_vif_model="$vmdk_net_adapter" |
| 278 | |
Sreeram Yerrapragada | cbaff86 | 2013-07-24 19:49:23 -0700 | [diff] [blame] | 279 | return |
| 280 | fi |
| 281 | |
Mate Lakat | bc2ef92 | 2013-08-15 18:06:59 +0100 | [diff] [blame] | 282 | # XenServer-vhd-ovf-format images are provided as .vhd.tgz |
Davanum Srinivas | 316ed6c | 2013-02-06 15:29:49 -0500 | [diff] [blame] | 283 | # and should not be decompressed prior to loading |
| 284 | if [[ "$image_url" =~ '.vhd.tgz' ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 285 | image_name="${image_fname%.vhd.tgz}" |
| 286 | local force_vm_mode="" |
| 287 | if [[ "$image_name" =~ 'cirros' ]]; then |
Bob Ball | f1a2dbf | 2014-03-19 11:08:54 +0000 | [diff] [blame] | 288 | # Cirros VHD image currently only boots in PV mode. |
| 289 | # Nova defaults to PV for all VHD images, but |
| 290 | # the glance setting is needed for booting |
| 291 | # directly from volume. |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 292 | force_vm_mode="vm_mode=xen" |
Bob Ball | f1a2dbf | 2014-03-19 11:08:54 +0000 | [diff] [blame] | 293 | fi |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 294 | _upload_image "$image_name" ovf vhd "$image" $force_vm_mode |
Davanum Srinivas | 316ed6c | 2013-02-06 15:29:49 -0500 | [diff] [blame] | 295 | return |
| 296 | fi |
| 297 | |
Mate Lakat | bc2ef92 | 2013-08-15 18:06:59 +0100 | [diff] [blame] | 298 | # .xen-raw.tgz suggests a Xen capable raw image inside a tgz. |
| 299 | # and should not be decompressed prior to loading. |
| 300 | # Setting metadata, so PV mode is used. |
| 301 | if [[ "$image_url" =~ '.xen-raw.tgz' ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 302 | image_name="${image_fname%.xen-raw.tgz}" |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 303 | _upload_image "$image_name" tgz raw "$image" vm_mode=xen |
Mate Lakat | bc2ef92 | 2013-08-15 18:06:59 +0100 | [diff] [blame] | 304 | return |
| 305 | fi |
| 306 | |
Maxim Nestratov | 54ee8a8 | 2015-07-15 11:47:11 +0300 | [diff] [blame] | 307 | if [[ "$image_url" =~ '.hds' ]]; then |
| 308 | image_name="${image_fname%.hds}" |
| 309 | vm_mode=${image_name##*-} |
| 310 | if [[ $vm_mode != 'exe' && $vm_mode != 'hvm' ]]; then |
| 311 | die $LINENO "Unknown vm_mode=${vm_mode} for Virtuozzo image" |
| 312 | fi |
| 313 | |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 314 | _upload_image "$image_name" bare ploop "$image" vm_mode=$vm_mode |
Maxim Nestratov | 54ee8a8 | 2015-07-15 11:47:11 +0300 | [diff] [blame] | 315 | return |
| 316 | fi |
| 317 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 318 | local kernel="" |
| 319 | local ramdisk="" |
| 320 | local disk_format="" |
| 321 | local container_format="" |
| 322 | local unpack="" |
Dan Smith | 49ad485 | 2020-07-15 14:54:22 -0700 | [diff] [blame] | 323 | local img_property="" |
| 324 | |
| 325 | # NOTE(danms): If we're on libvirt/qemu or libvirt/kvm, set the hw_rng_model |
| 326 | # to libvirt in the image properties. |
| 327 | if [[ "$VIRT_DRIVER" == "libvirt" ]]; then |
| 328 | if [[ "$LIBVIRT_TYPE" == "qemu" || "$LIBVIRT_TYPE" == "kvm" ]]; then |
| 329 | img_property="hw_rng_model=virtio" |
| 330 | fi |
| 331 | fi |
| 332 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 333 | case "$image_fname" in |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 334 | *.tar.gz|*.tgz) |
| 335 | # Extract ami and aki files |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 336 | [ "${image_fname%.tar.gz}" != "$image_fname" ] && |
| 337 | image_name="${image_fname%.tar.gz}" || |
| 338 | image_name="${image_fname%.tgz}" |
| 339 | local xdir="$FILES/images/$image_name" |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 340 | rm -Rf "$xdir"; |
| 341 | mkdir "$xdir" |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 342 | tar -zxf $image -C "$xdir" |
| 343 | kernel=$(for f in "$xdir/"*-vmlinuz* "$xdir/"aki-*/image; do |
Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 344 | [ -f "$f" ] && echo "$f" && break; done; true) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 345 | ramdisk=$(for f in "$xdir/"*-initrd* "$xdir/"ari-*/image; do |
Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 346 | [ -f "$f" ] && echo "$f" && break; done; true) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 347 | image=$(for f in "$xdir/"*.img "$xdir/"ami-*/image; do |
Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 348 | [ -f "$f" ] && echo "$f" && break; done; true) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 349 | if [[ -z "$image_name" ]]; then |
| 350 | image_name=$(basename "$image" ".img") |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 351 | fi |
| 352 | ;; |
| 353 | *.img) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 354 | image_name=$(basename "$image" ".img") |
Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 355 | local format |
| 356 | format=$(qemu-img info ${image} | awk '/^file format/ { print $3; exit }') |
Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 357 | if [[ ",qcow2,raw,vdi,vmdk,vpc," =~ ",$format," ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 358 | disk_format=$format |
Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 359 | else |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 360 | disk_format=raw |
Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 361 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 362 | container_format=bare |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 363 | ;; |
| 364 | *.img.gz) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 365 | image_name=$(basename "$image" ".img.gz") |
| 366 | disk_format=raw |
| 367 | container_format=bare |
| 368 | unpack=zcat |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 369 | ;; |
Hongbin Lu | 3feceb0 | 2016-04-17 11:11:58 -0400 | [diff] [blame] | 370 | *.img.bz2) |
| 371 | image_name=$(basename "$image" ".img.bz2") |
| 372 | disk_format=qcow2 |
| 373 | container_format=bare |
| 374 | unpack=bunzip2 |
| 375 | ;; |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 376 | *.qcow2) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 377 | image_name=$(basename "$image" ".qcow2") |
| 378 | disk_format=qcow2 |
| 379 | container_format=bare |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 380 | ;; |
Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 381 | *.qcow2.xz) |
| 382 | image_name=$(basename "$image" ".qcow2.xz") |
| 383 | disk_format=qcow2 |
| 384 | container_format=bare |
| 385 | unpack=unxz |
| 386 | ;; |
Angel Noam | f24e299 | 2017-05-11 15:13:29 +0300 | [diff] [blame] | 387 | *.raw) |
| 388 | image_name=$(basename "$image" ".raw") |
| 389 | disk_format=raw |
| 390 | container_format=bare |
| 391 | ;; |
Jonathan Michalon | 0680204 | 2013-03-21 14:29:58 +0100 | [diff] [blame] | 392 | *.iso) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 393 | image_name=$(basename "$image" ".iso") |
| 394 | disk_format=iso |
| 395 | container_format=bare |
Jonathan Michalon | 0680204 | 2013-03-21 14:29:58 +0100 | [diff] [blame] | 396 | ;; |
Alessandro Pilotti | ca82394 | 2014-08-07 02:05:26 +0300 | [diff] [blame] | 397 | *.vhd|*.vhdx|*.vhd.gz|*.vhdx.gz) |
| 398 | local extension="${image_fname#*.}" |
| 399 | image_name=$(basename "$image" ".$extension") |
Lucian Petrut | 2715fd0 | 2017-05-24 11:31:56 +0300 | [diff] [blame] | 400 | disk_format=$(echo $image_fname | grep -oP '(?<=\.)vhdx?(?=\.|$)') |
Alessandro Pilotti | ca82394 | 2014-08-07 02:05:26 +0300 | [diff] [blame] | 401 | container_format=bare |
| 402 | if [ "${image_fname##*.}" == "gz" ]; then |
| 403 | unpack=zcat |
| 404 | fi |
| 405 | ;; |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 406 | *) echo "Do not know what to do with $image_fname"; false;; |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 407 | esac |
| 408 | |
Rafael Folco | 72f530f | 2016-02-09 07:08:38 -0600 | [diff] [blame] | 409 | if is_arch "ppc64le" || is_arch "ppc64" || is_arch "ppc"; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 410 | img_property="$img_property hw_cdrom_bus=scsi os_command_line=console=hvc0" |
Rafael Folco | ab77587 | 2013-12-02 14:04:32 -0200 | [diff] [blame] | 411 | fi |
| 412 | |
Clark Laughlin | fcc3f6e | 2015-04-07 16:31:47 +0000 | [diff] [blame] | 413 | if is_arch "aarch64"; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 414 | img_property="$img_property hw_machine_type=virt hw_cdrom_bus=scsi hw_scsi_model=virtio-scsi os_command_line='console=ttyAMA0'" |
Clark Laughlin | fcc3f6e | 2015-04-07 16:31:47 +0000 | [diff] [blame] | 415 | fi |
| 416 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 417 | if [ "$container_format" = "bare" ]; then |
| 418 | if [ "$unpack" = "zcat" ]; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 419 | _upload_image "$image_name" $container_format $disk_format <(zcat --force "$image") $img_property |
Hongbin Lu | 3feceb0 | 2016-04-17 11:11:58 -0400 | [diff] [blame] | 420 | elif [ "$unpack" = "bunzip2" ]; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 421 | _upload_image "$image_name" $container_format $disk_format <(bunzip2 -cdk "$image") $img_property |
Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 422 | elif [ "$unpack" = "unxz" ]; then |
| 423 | # NOTE(brtknr): unxz the file first and cleanup afterwards to |
| 424 | # prevent timeout while Glance tries to upload image (e.g. to Swift). |
| 425 | local tmp_dir |
| 426 | local image_path |
| 427 | tmp_dir=$(mktemp -d) |
| 428 | image_path="$tmp_dir/$image_name" |
| 429 | unxz -cv "${image}" > "$image_path" |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 430 | _upload_image "$image_name" $container_format $disk_format "$image_path" $img_property |
Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 431 | rm -rf $tmp_dir |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 432 | else |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 433 | _upload_image "$image_name" $container_format $disk_format "$image" $img_property |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 434 | fi |
| 435 | else |
| 436 | # Use glance client to add the kernel the root filesystem. |
| 437 | # We parse the results of the first upload to get the glance ID of the |
| 438 | # kernel for use when uploading the root filesystem. |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 439 | local kernel_id="" ramdisk_id=""; |
| 440 | if [ -n "$kernel" ]; then |
Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 441 | kernel_id=$(openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name-kernel" $(_image_properties_to_arg $img_property) --public --container-format aki --disk-format aki < "$kernel" | grep ' id ' | get_field 2) |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 442 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 443 | if [ -n "$ramdisk" ]; then |
Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 444 | ramdisk_id=$(openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name-ramdisk" $(_image_properties_to_arg $img_property) --public --container-format ari --disk-format ari < "$ramdisk" | grep ' id ' | get_field 2) |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 445 | fi |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 446 | _upload_image "${image_name%.img}" ami ami "$image" ${kernel_id:+ kernel_id=$kernel_id} ${ramdisk_id:+ ramdisk_id=$ramdisk_id} $img_property |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 447 | fi |
| 448 | } |
| 449 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 450 | |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 451 | # Set the database backend to use |
| 452 | # When called from stackrc/localrc DATABASE_BACKENDS has not been |
| 453 | # initialized yet, just save the configuration selection and call back later |
| 454 | # to validate it. |
Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 455 | # |
Matt Riedemann | b14665f | 2019-10-17 19:34:05 +0000 | [diff] [blame] | 456 | # ``$1`` - the name of the database backend to use (mysql, postgresql, ...) |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 457 | function use_database { |
| 458 | if [[ -z "$DATABASE_BACKENDS" ]]; then |
Dean Troyer | afc29fe | 2013-02-07 15:56:24 -0600 | [diff] [blame] | 459 | # No backends registered means this is likely called from ``localrc`` |
| 460 | # This is now deprecated usage |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 461 | DATABASE_TYPE=$1 |
Sean Dague | 72ad942 | 2015-10-07 11:51:40 -0400 | [diff] [blame] | 462 | deprecated "The database backend needs to be properly set in ENABLED_SERVICES; use_database is deprecated localrc" |
Attila Fazekas | 251d3b5 | 2012-12-16 15:05:44 +0100 | [diff] [blame] | 463 | else |
Dean Troyer | afc29fe | 2013-02-07 15:56:24 -0600 | [diff] [blame] | 464 | # This should no longer get called...here for posterity |
Attila Fazekas | 251d3b5 | 2012-12-16 15:05:44 +0100 | [diff] [blame] | 465 | use_exclusive_service DATABASE_BACKENDS DATABASE_TYPE $1 |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 466 | fi |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 467 | } |
| 468 | |
sridhargaddam | b5ab646 | 2015-02-24 07:23:24 +0000 | [diff] [blame] | 469 | #Macro for curl statements. curl requires -g option for literal IPv6 addresses. |
| 470 | CURL_GET="${CURL_GET:-curl -g}" |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 471 | |
Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 472 | # Wait for an HTTP server to start answering requests |
| 473 | # wait_for_service timeout url |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 474 | # |
| 475 | # If the service we want is behind a proxy, the proxy may be available |
| 476 | # before the service. Compliant proxies will return a 503 in this case |
| 477 | # Loop until we get something else. |
| 478 | # Also check for the case where there is no proxy and the service just |
| 479 | # hasn't started yet. curl returns 7 for Failed to connect to host. |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 480 | function wait_for_service { |
Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 481 | local timeout=$1 |
| 482 | local url=$2 |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 483 | local rval=0 |
Atsushi SAKAI | 2ca8af4 | 2015-12-08 15:36:13 +0900 | [diff] [blame] | 484 | time_start "wait_for_service" |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 485 | timeout $timeout bash -x <<EOF || rval=$? |
| 486 | while [[ \$( ${CURL_GET} -k --noproxy '*' -s -o /dev/null -w '%{http_code}' ${url} ) == 503 || \$? -eq 7 ]]; do |
| 487 | sleep 1 |
| 488 | done |
| 489 | EOF |
Atsushi SAKAI | 2ca8af4 | 2015-12-08 15:36:13 +0900 | [diff] [blame] | 490 | time_stop "wait_for_service" |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 491 | return $rval |
Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 492 | } |
| 493 | |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 494 | function wait_for_compute { |
| 495 | local timeout=$1 |
| 496 | local rval=0 |
Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 497 | local compute_hostname |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 498 | time_start "wait_for_service" |
Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 499 | compute_hostname=$(iniget $NOVA_CONF DEFAULT host) |
| 500 | if [[ -z $compute_hostname ]]; then |
| 501 | compute_hostname=$(hostname) |
| 502 | fi |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 503 | timeout $timeout bash -x <<EOF || rval=$? |
| 504 | ID="" |
| 505 | while [[ "\$ID" == "" ]]; do |
| 506 | sleep 1 |
Chris Dent | ac475bb | 2018-02-07 18:35:40 +0000 | [diff] [blame] | 507 | if [[ "$VIRT_DRIVER" = 'fake' ]]; then |
| 508 | # When using the fake driver the compute hostnames have a suffix of 1 to NUMBER_FAKE_NOVA_COMPUTE |
| 509 | ID=\$(openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list --host `hostname`1 --service nova-compute -c ID -f value) |
| 510 | else |
Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 511 | ID=\$(openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list --host "$compute_hostname" --service nova-compute -c ID -f value) |
Chris Dent | ac475bb | 2018-02-07 18:35:40 +0000 | [diff] [blame] | 512 | fi |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 513 | done |
| 514 | EOF |
| 515 | time_stop "wait_for_service" |
| 516 | # Figure out what's happening on platforms where this doesn't work |
| 517 | if [[ "$rval" != 0 ]]; then |
| 518 | echo "Didn't find service registered by hostname after $timeout seconds" |
| 519 | openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list |
| 520 | fi |
| 521 | return $rval |
| 522 | } |
| 523 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 524 | |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 525 | # ping check |
Stephen Finucane | 4b8cba7 | 2019-05-21 14:17:11 +0100 | [diff] [blame] | 526 | # Uses globals ``ENABLED_SERVICES``, ``TOP_DIR``, ``PRIVATE_NETWORK`` |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 527 | # ping_check <ip> [boot-timeout] [from_net] [expected] |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 528 | function ping_check { |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 529 | local ip=$1 |
| 530 | local timeout=${2:-30} |
| 531 | local from_net=${3:-""} |
| 532 | local expected=${4:-True} |
| 533 | local op="!" |
| 534 | local failmsg="[Fail] Couldn't ping server" |
| 535 | local ping_cmd="ping" |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 536 | |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 537 | # if we don't specify a from_net we're expecting things to work |
| 538 | # fine from our local box. |
| 539 | if [[ -n "$from_net" ]]; then |
Stephen Finucane | 4b8cba7 | 2019-05-21 14:17:11 +0100 | [diff] [blame] | 540 | # TODO(stephenfin): Is there any way neutron could be disabled now? |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 541 | if is_service_enabled neutron; then |
| 542 | ping_cmd="$TOP_DIR/tools/ping_neutron.sh $from_net" |
Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 543 | fi |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 544 | fi |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 545 | |
| 546 | # inverse the logic if we're testing no connectivity |
| 547 | if [[ "$expected" != "True" ]]; then |
| 548 | op="" |
| 549 | failmsg="[Fail] Could ping server" |
| 550 | fi |
| 551 | |
| 552 | # Because we've transformed this command so many times, print it |
| 553 | # out at the end. |
| 554 | local check_command="while $op $ping_cmd -c1 -w1 $ip; do sleep 1; done" |
| 555 | echo "Checking connectivity with $check_command" |
| 556 | |
| 557 | if ! timeout $timeout sh -c "$check_command"; then |
| 558 | die $LINENO $failmsg |
| 559 | fi |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 560 | } |
| 561 | |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 562 | # Get ip of instance |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 563 | function get_instance_ip { |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 564 | local vm_id=$1 |
| 565 | local network_name=$2 |
Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 566 | local addresses |
Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 567 | local ip |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 568 | |
Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 569 | addresses=$(openstack server show -c addresses -f value "$vm_id") |
| 570 | ip=$(echo $addresses | sed -n "s/^.*$network_name=\([0-9\.]*\).*$/\1/p") |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 571 | if [[ $ip = "" ]];then |
Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 572 | echo "addresses of server $vm_id : $addresses" |
Atsushi SAKAI | 33c9a67 | 2015-11-12 19:50:00 +0900 | [diff] [blame] | 573 | die $LINENO "[Fail] Couldn't get ipaddress of VM" |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 574 | fi |
| 575 | echo $ip |
| 576 | } |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 577 | |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 578 | # ssh check |
Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 579 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 580 | # ssh_check net-name key-file floating-ip default-user active-timeout |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 581 | function ssh_check { |
Mark McClain | b05c876 | 2013-07-06 23:29:39 -0400 | [diff] [blame] | 582 | if is_service_enabled neutron; then |
| 583 | _ssh_check_neutron "$1" $2 $3 $4 $5 |
Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 584 | return |
| 585 | fi |
| 586 | _ssh_check_novanet "$1" $2 $3 $4 $5 |
| 587 | } |
| 588 | |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 589 | function _ssh_check_novanet { |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 590 | local NET_NAME=$1 |
| 591 | local KEY_FILE=$2 |
| 592 | local FLOATING_IP=$3 |
| 593 | local DEFAULT_INSTANCE_USER=$4 |
| 594 | local ACTIVE_TIMEOUT=$5 |
Dean Troyer | 6931c13 | 2012-11-07 16:51:21 -0600 | [diff] [blame] | 595 | local probe_cmd="" |
Dean Troyer | cc6b443 | 2013-04-08 15:38:03 -0500 | [diff] [blame] | 596 | if ! timeout $ACTIVE_TIMEOUT sh -c "while ! ssh -o StrictHostKeyChecking=no -i $KEY_FILE ${DEFAULT_INSTANCE_USER}@$FLOATING_IP echo success; do sleep 1; done"; then |
Nachi Ueno | 07115eb | 2013-02-26 12:38:18 -0800 | [diff] [blame] | 597 | die $LINENO "server didn't become ssh-able!" |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 598 | fi |
| 599 | } |
Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 600 | |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 601 | |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 602 | # Get the location of the $module-rootwrap executables, where module is cinder |
| 603 | # or nova. |
| 604 | # get_rootwrap_location module |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 605 | function get_rootwrap_location { |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 606 | local module=$1 |
| 607 | |
Jakub Ruzicka | 4196d55 | 2013-01-30 15:35:54 +0100 | [diff] [blame] | 608 | echo "$(get_python_exec_prefix)/$module-rootwrap" |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 609 | } |
| 610 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 611 | |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 612 | # Path permissions sanity check |
| 613 | # check_path_perm_sanity path |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 614 | function check_path_perm_sanity { |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 615 | # Ensure no element of the path has 0700 permissions, which is very |
| 616 | # likely to cause issues for daemons. Inspired by default 0700 |
| 617 | # homedir permissions on RHEL and common practice of making DEST in |
| 618 | # the stack user's homedir. |
| 619 | |
Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 620 | local real_path |
| 621 | real_path=$(readlink -f $1) |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 622 | local rebuilt_path="" |
| 623 | for i in $(echo ${real_path} | tr "/" " "); do |
| 624 | rebuilt_path=$rebuilt_path"/"$i |
| 625 | |
| 626 | if [[ $(stat -c '%a' ${rebuilt_path}) = 700 ]]; then |
| 627 | echo "*** DEST path element" |
| 628 | echo "*** ${rebuilt_path}" |
| 629 | echo "*** appears to have 0700 permissions." |
Dean Troyer | dc97cb7 | 2015-03-28 08:20:50 -0500 | [diff] [blame] | 630 | echo "*** This is very likely to cause fatal issues for DevStack daemons." |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 631 | |
| 632 | if [[ -n "$SKIP_PATH_SANITY" ]]; then |
| 633 | return |
| 634 | else |
| 635 | echo "*** Set SKIP_PATH_SANITY to skip this check" |
| 636 | die $LINENO "Invalid path permissions" |
| 637 | fi |
| 638 | fi |
| 639 | done |
| 640 | } |
| 641 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 642 | |
Ian Wienand | 2ba36cd | 2015-11-12 13:52:36 +1100 | [diff] [blame] | 643 | # vercmp ver1 op ver2 |
| 644 | # Compare VER1 to VER2 |
| 645 | # - op is one of < <= == >= > |
| 646 | # - returns true if satisified |
| 647 | # e.g. |
| 648 | # if vercmp 1.0 "<" 2.0; then |
| 649 | # ... |
| 650 | # fi |
| 651 | function vercmp { |
| 652 | local v1=$1 |
| 653 | local op=$2 |
| 654 | local v2=$3 |
| 655 | local result |
| 656 | |
| 657 | # sort the two numbers with sort's "-V" argument. Based on if v2 |
| 658 | # swapped places with v1, we can determine ordering. |
| 659 | result=$(echo -e "$v1\n$v2" | sort -V | head -1) |
| 660 | |
| 661 | case $op in |
| 662 | "==") |
| 663 | [ "$v1" = "$v2" ] |
| 664 | return |
| 665 | ;; |
| 666 | ">") |
| 667 | [ "$v1" != "$v2" ] && [ "$result" = "$v2" ] |
| 668 | return |
| 669 | ;; |
| 670 | "<") |
| 671 | [ "$v1" != "$v2" ] && [ "$result" = "$v1" ] |
| 672 | return |
| 673 | ;; |
| 674 | ">=") |
| 675 | [ "$result" = "$v2" ] |
| 676 | return |
| 677 | ;; |
| 678 | "<=") |
| 679 | [ "$result" = "$v1" ] |
| 680 | return |
| 681 | ;; |
| 682 | *) |
| 683 | die $LINENO "unrecognised op: $op" |
| 684 | ;; |
| 685 | esac |
| 686 | } |
Kyle Mestery | 51a3f1f | 2013-06-13 11:47:56 +0000 | [diff] [blame] | 687 | |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 688 | # This sets up defaults we like in devstack for logging for tracking |
| 689 | # down issues, and makes sure everything is done the same between |
| 690 | # projects. |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 691 | # NOTE(jh): Historically this function switched between three different |
| 692 | # functions: setup_systemd_logging, setup_colorized_logging and |
| 693 | # setup_standard_logging_identity. Since we always run with systemd now, |
| 694 | # this could be cleaned up, but the other functions may still be in use |
| 695 | # by plugins. Since deprecations haven't worked in the past, we'll just |
| 696 | # leave them in place. |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 697 | function setup_logging { |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 698 | setup_systemd_logging $1 |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 699 | } |
| 700 | |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 701 | # This function sets log formatting options for colorizing log |
| 702 | # output to stdout. It is meant to be called by lib modules. |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 703 | function setup_colorized_logging { |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 704 | local conf_file=$1 |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 705 | # Add color to logging output |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 706 | iniset $conf_file DEFAULT logging_context_format_string "%(asctime)s.%(msecs)03d %(color)s%(levelname)s %(name)s [[01;36m%(request_id)s [00;36m%(project_name)s %(user_name)s%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 707 | iniset $conf_file DEFAULT logging_default_format_string "%(asctime)s.%(msecs)03d %(color)s%(levelname)s %(name)s [[00;36m-%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 708 | iniset $conf_file DEFAULT logging_debug_format_suffix "[00;33mfrom (pid=%(process)d) %(funcName)s %(pathname)s:%(lineno)d[00m" |
| 709 | iniset $conf_file DEFAULT logging_exception_prefix "%(color)s%(asctime)s.%(msecs)03d TRACE %(name)s [01;35m%(instance)s[00m" |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 710 | } |
| 711 | |
Sean Dague | 5edae54 | 2017-03-21 20:50:24 -0400 | [diff] [blame] | 712 | function setup_systemd_logging { |
| 713 | local conf_file=$1 |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 714 | # NOTE(sdague): this is a nice to have, and means we're using the |
| 715 | # native systemd path, which provides for things like search on |
| 716 | # request-id. However, there may be an eventlet interaction here, |
| 717 | # so going off for now. |
Kirill Zaitsev | c0644f3 | 2017-05-24 13:00:47 +0300 | [diff] [blame] | 718 | USE_JOURNAL=$(trueorfalse False USE_JOURNAL) |
Eric Fried | 8cd310d | 2017-05-16 13:52:03 -0500 | [diff] [blame] | 719 | local pidstr="" |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 720 | if [[ "$USE_JOURNAL" == "True" ]]; then |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 721 | iniset $conf_file DEFAULT use_journal "True" |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 722 | # if we are using the journal directly, our process id is already correct |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 723 | else |
Eric Fried | 8cd310d | 2017-05-16 13:52:03 -0500 | [diff] [blame] | 724 | pidstr="(pid=%(process)d) " |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 725 | fi |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 726 | iniset $conf_file DEFAULT logging_debug_format_suffix "[00;33m{{${pidstr}%(funcName)s %(pathname)s:%(lineno)d}}[00m" |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 727 | |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 728 | iniset $conf_file DEFAULT logging_context_format_string "%(color)s%(levelname)s %(name)s [[01;36m%(global_request_id)s %(request_id)s [00;36m%(project_name)s %(user_name)s%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 729 | iniset $conf_file DEFAULT logging_default_format_string "%(color)s%(levelname)s %(name)s [[00;36m-%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 730 | iniset $conf_file DEFAULT logging_exception_prefix "ERROR %(name)s [01;35m%(instance)s[00m" |
Sean Dague | 5edae54 | 2017-03-21 20:50:24 -0400 | [diff] [blame] | 731 | } |
| 732 | |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 733 | function setup_standard_logging_identity { |
| 734 | local conf_file=$1 |
| 735 | iniset $conf_file DEFAULT logging_user_identity_format "%(project_name)s %(user_name)s" |
| 736 | } |
| 737 | |
Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 738 | # These functions are provided for basic fall-back functionality for |
Dean Troyer | dc97cb7 | 2015-03-28 08:20:50 -0500 | [diff] [blame] | 739 | # projects that include parts of DevStack (Grenade). stack.sh will |
| 740 | # override these with more specific versions for DevStack (with fancy |
Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 741 | # spinners, etc). We never override an existing version |
| 742 | if ! function_exists echo_summary; then |
| 743 | function echo_summary { |
| 744 | echo $@ |
| 745 | } |
| 746 | fi |
| 747 | if ! function_exists echo_nolog; then |
| 748 | function echo_nolog { |
| 749 | echo $@ |
| 750 | } |
| 751 | fi |
Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 752 | |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 753 | |
| 754 | # create_disk - Create backing disk |
| 755 | function create_disk { |
| 756 | local node_number |
| 757 | local disk_image=${1} |
| 758 | local storage_data_dir=${2} |
| 759 | local loopback_disk_size=${3} |
| 760 | |
| 761 | # Create a loopback disk and format it to XFS. |
| 762 | if [[ -e ${disk_image} ]]; then |
| 763 | if egrep -q ${storage_data_dir} /proc/mounts; then |
liumk | 38a23d9 | 2017-12-13 15:09:02 +0800 | [diff] [blame] | 764 | sudo umount ${storage_data_dir} |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 765 | sudo rm -f ${disk_image} |
| 766 | fi |
| 767 | fi |
| 768 | |
| 769 | sudo mkdir -p ${storage_data_dir}/drives/images |
| 770 | |
| 771 | sudo truncate -s ${loopback_disk_size} ${disk_image} |
| 772 | |
| 773 | # Make a fresh XFS filesystem. Use bigger inodes so xattr can fit in |
| 774 | # a single inode. Keeping the default inode size (256) will result in multiple |
| 775 | # inodes being used to store xattr. Retrieving the xattr will be slower |
| 776 | # since we have to read multiple inodes. This statement is true for both |
| 777 | # Swift and Ceph. |
| 778 | sudo mkfs.xfs -f -i size=1024 ${disk_image} |
| 779 | |
| 780 | # Mount the disk with mount options to make it as efficient as possible |
| 781 | if ! egrep -q ${storage_data_dir} /proc/mounts; then |
Lee Yarwood | 5d7d891 | 2018-12-03 14:21:06 +0000 | [diff] [blame] | 782 | sudo mount -t xfs -o loop,noatime,nodiratime,logbufs=8 \ |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 783 | ${disk_image} ${storage_data_dir} |
| 784 | fi |
| 785 | } |
| 786 | |
Ihar Hrachyshka | 7b5c7dc | 2016-07-15 20:17:13 +0200 | [diff] [blame] | 787 | |
| 788 | # set_mtu - Set MTU on a device |
| 789 | function set_mtu { |
| 790 | local dev=$1 |
| 791 | local mtu=$2 |
| 792 | sudo ip link set mtu $mtu dev $dev |
| 793 | } |
| 794 | |
| 795 | |
Denis Buliga | 0bf75a4 | 2017-02-06 16:56:46 +0200 | [diff] [blame] | 796 | # running_in_container - Returns true otherwise false |
| 797 | function running_in_container { |
kesper | d18d7c8 | 2017-03-23 05:52:33 +0000 | [diff] [blame] | 798 | [[ $(systemd-detect-virt --container) != 'none' ]] |
Denis Buliga | 0bf75a4 | 2017-02-06 16:56:46 +0200 | [diff] [blame] | 799 | } |
| 800 | |
| 801 | |
Ihar Hrachyshka | b3a210f | 2016-09-29 13:26:30 +0000 | [diff] [blame] | 802 | # enable_kernel_bridge_firewall - Enable kernel support for bridge firewalling |
| 803 | function enable_kernel_bridge_firewall { |
| 804 | # Load bridge module. This module provides access to firewall for bridged |
| 805 | # frames; and also on older kernels (pre-3.18) it provides sysctl knobs to |
| 806 | # enable/disable bridge firewalling |
| 807 | sudo modprobe bridge |
| 808 | # For newer kernels (3.18+), those sysctl settings are split into a separate |
| 809 | # kernel module (br_netfilter). Load it too, if present. |
| 810 | sudo modprobe br_netfilter 2>> /dev/null || : |
| 811 | # Enable bridge firewalling in case it's disabled in kernel (upstream |
| 812 | # default is enabled, but some distributions may decide to change it). |
| 813 | # This is at least needed for RHEL 7.2 and earlier releases. |
Ihar Hrachyshka | 3f771b7 | 2016-12-17 04:12:24 +0000 | [diff] [blame] | 814 | for proto in ip ip6; do |
Ihar Hrachyshka | b3a210f | 2016-09-29 13:26:30 +0000 | [diff] [blame] | 815 | sudo sysctl -w net.bridge.bridge-nf-call-${proto}tables=1 |
| 816 | done |
| 817 | } |
| 818 | |
| 819 | |
Dan Smith | 1f55d38 | 2017-05-16 08:50:53 -0700 | [diff] [blame] | 820 | # Set a systemd system override |
| 821 | # |
| 822 | # This sets a system-side override in system.conf. A per-service |
| 823 | # override would be /etc/systemd/system/${service}.service/override.conf |
| 824 | function set_systemd_override { |
| 825 | local key="$1" |
| 826 | local value="$2" |
| 827 | |
| 828 | local sysconf="/etc/systemd/system.conf" |
| 829 | iniset -sudo "${sysconf}" "Manager" "$key" "$value" |
| 830 | echo "Set systemd system override for ${key}=${value}" |
| 831 | |
| 832 | sudo systemctl daemon-reload |
| 833 | } |
| 834 | |
Matthew Treinish | 309b99e | 2017-05-23 15:18:31 -0400 | [diff] [blame] | 835 | # Get a random port from the local port range |
| 836 | # |
| 837 | # This function returns an available port in the local port range. The search |
| 838 | # order is not truly random, but should be considered a random value by the |
| 839 | # user because it depends on the state of your local system. |
| 840 | function get_random_port { |
| 841 | read lower_port upper_port < /proc/sys/net/ipv4/ip_local_port_range |
| 842 | while true; do |
| 843 | for (( port = upper_port ; port >= lower_port ; port-- )); do |
| 844 | sudo lsof -i ":$port" &> /dev/null |
| 845 | if [[ $? > 0 ]] ; then |
| 846 | break 2 |
| 847 | fi |
| 848 | done |
| 849 | done |
| 850 | echo $port |
| 851 | } |
| 852 | |
Ian Wienand | 07cbc44 | 2017-06-30 12:29:19 +1000 | [diff] [blame] | 853 | # Save some state information |
| 854 | # |
| 855 | # Write out various useful state information to /etc/devstack-version |
Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 856 | function write_devstack_version { |
Dirk Mueller | 6bab832 | 2018-03-02 21:13:12 +0100 | [diff] [blame] | 857 | cat - <<EOF | sudo tee /etc/devstack-version >/dev/null |
Ian Wienand | 07cbc44 | 2017-06-30 12:29:19 +1000 | [diff] [blame] | 858 | DevStack Version: ${DEVSTACK_SERIES} |
| 859 | Change: $(git log --format="%H %s %ci" -1) |
| 860 | OS Version: ${os_VENDOR} ${os_RELEASE} ${os_CODENAME} |
Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 861 | EOF |
Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 862 | } |
| 863 | |
Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 864 | # Restore xtrace |
Ian Wienand | 523f488 | 2015-10-13 11:03:03 +1100 | [diff] [blame] | 865 | $_XTRACE_FUNCTIONS |
Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 866 | |
Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 867 | # Local variables: |
Sean Dague | 584d90e | 2013-03-29 14:34:53 -0400 | [diff] [blame] | 868 | # mode: shell-script |
Andrew Laski | f900bd7 | 2012-09-05 17:23:14 -0400 | [diff] [blame] | 869 | # End: |