Sean Dague | e263c82 | 2014-12-05 14:25:28 -0500 | [diff] [blame] | 1 | #!/bin/bash |
| 2 | # |
Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 3 | # functions - DevStack-specific functions |
Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 4 | # |
Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 5 | # The following variables are assumed to be defined by certain functions: |
Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 6 | # |
Dean Troyer | d8864fe | 2014-02-17 11:00:42 -0600 | [diff] [blame] | 7 | # - ``DATABASE_BACKENDS`` |
Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 8 | # - ``ENABLED_SERVICES`` |
Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 9 | # - ``FILES`` |
| 10 | # - ``GLANCE_HOSTPORT`` |
Dean Troyer | d8864fe | 2014-02-17 11:00:42 -0600 | [diff] [blame] | 11 | # |
Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 12 | |
Ian Wienand | 4ffb454 | 2015-06-30 11:00:32 +1000 | [diff] [blame] | 13 | # ensure we don't re-source this in the same environment |
| 14 | [[ -z "$_DEVSTACK_FUNCTIONS" ]] || return 0 |
Sean Dague | afef8bf | 2017-03-06 14:07:23 -0500 | [diff] [blame] | 15 | declare -r -g _DEVSTACK_FUNCTIONS=1 |
Ian Wienand | 4ffb454 | 2015-06-30 11:00:32 +1000 | [diff] [blame] | 16 | |
Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 17 | # Include the common functions |
| 18 | FUNC_DIR=$(cd $(dirname "${BASH_SOURCE:-$0}") && pwd) |
| 19 | source ${FUNC_DIR}/functions-common |
Dean Troyer | bf2ad70 | 2015-03-09 15:16:10 -0500 | [diff] [blame] | 20 | source ${FUNC_DIR}/inc/ini-config |
Eric Fried | 2468cea | 2019-07-25 13:18:58 -0500 | [diff] [blame] | 21 | source ${FUNC_DIR}/inc/meta-config |
Dean Troyer | 490430d | 2015-01-30 14:38:35 -0600 | [diff] [blame] | 22 | source ${FUNC_DIR}/inc/python |
Dean Troyer | 32d6bc6 | 2015-03-29 14:16:44 -0500 | [diff] [blame] | 23 | source ${FUNC_DIR}/inc/rootwrap |
Dean Troyer | 7f9aa71 | 2012-01-31 12:11:56 -0600 | [diff] [blame] | 24 | |
Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 25 | # Save trace setting |
Ian Wienand | 523f488 | 2015-10-13 11:03:03 +1100 | [diff] [blame] | 26 | _XTRACE_FUNCTIONS=$(set +o | grep xtrace) |
Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 27 | set +o xtrace |
| 28 | |
Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 29 | # Check if a function already exists |
| 30 | function function_exists { |
| 31 | declare -f -F $1 > /dev/null |
| 32 | } |
Dean Troyer | 7f9aa71 | 2012-01-31 12:11:56 -0600 | [diff] [blame] | 33 | |
Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 34 | # short_source prints out the current location of the caller in a way |
| 35 | # that strips redundant directories. This is useful for PS4 usage. |
| 36 | function short_source { |
| 37 | saveIFS=$IFS |
| 38 | IFS=" " |
| 39 | called=($(caller 0)) |
| 40 | IFS=$saveIFS |
| 41 | file=${called[2]} |
| 42 | file=${file#$RC_DIR/} |
| 43 | printf "%-40s " "$file:${called[1]}:${called[0]}" |
| 44 | } |
John L. Villalovos | daa7a41 | 2016-05-05 12:50:52 -0700 | [diff] [blame] | 45 | # PS4 is exported to child shells and uses the 'short_source' function, so |
| 46 | # export it so child shells have access to the 'short_source' function also. |
| 47 | export -f short_source |
Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 48 | |
Monty Taylor | d8bb220 | 2017-09-03 12:13:59 -0500 | [diff] [blame] | 49 | # Download a file from a URL |
| 50 | # |
| 51 | # Will check cache (in $FILES) or download given URL. |
| 52 | # |
| 53 | # Argument is the URL to the remote file |
| 54 | # |
| 55 | # Will echo the local path to the file as the output. Will die on |
| 56 | # failure to download. |
| 57 | # |
| 58 | # Files can be pre-cached for CI environments, see EXTRA_CACHE_URLS |
| 59 | # and tools/image_list.sh |
| 60 | function get_extra_file { |
| 61 | local file_url=$1 |
| 62 | |
| 63 | file_name=$(basename "$file_url") |
| 64 | if [[ $file_url != file* ]]; then |
| 65 | # If the file isn't cache, download it |
| 66 | if [[ ! -f $FILES/$file_name ]]; then |
yuanke wei | c652a49 | 2017-09-17 22:18:07 +0800 | [diff] [blame] | 67 | wget --progress=dot:giga -t 2 -c $file_url -O $FILES/$file_name |
Monty Taylor | d8bb220 | 2017-09-03 12:13:59 -0500 | [diff] [blame] | 68 | if [[ $? -ne 0 ]]; then |
| 69 | die "$file_url could not be downloaded" |
| 70 | fi |
| 71 | fi |
| 72 | echo "$FILES/$file_name" |
| 73 | return |
| 74 | else |
| 75 | # just strip the file:// bit and that's the path to the file |
| 76 | echo $file_url | sed 's/$file:\/\///g' |
| 77 | fi |
| 78 | } |
| 79 | |
Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 80 | # Generate image property arguments for OSC |
| 81 | # |
| 82 | # Arguments: properties, one per, like propname=value |
| 83 | # |
| 84 | # Result is --property propname1=value1 --property propname2=value2 |
| 85 | function _image_properties_to_arg { |
| 86 | local result="" |
| 87 | for property in $*; do |
| 88 | result+=" --property $property" |
| 89 | done |
| 90 | echo $result |
| 91 | } |
| 92 | |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 93 | # Upload an image to glance using the configured mechanism |
| 94 | # |
| 95 | # Arguments: |
| 96 | # image name |
| 97 | # container format |
| 98 | # disk format |
| 99 | # path to image file |
| 100 | # optional properties (format of propname=value) |
| 101 | # |
| 102 | function _upload_image { |
| 103 | local image_name="$1" |
| 104 | shift |
| 105 | local container="$1" |
| 106 | shift |
| 107 | local disk="$1" |
| 108 | shift |
| 109 | local image="$1" |
| 110 | shift |
| 111 | local properties |
| 112 | local useimport |
| 113 | |
Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 114 | properties=$(_image_properties_to_arg $*) |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 115 | |
| 116 | if [[ "$GLANCE_USE_IMPORT_WORKFLOW" == "True" ]]; then |
Dan Smith | 09eea0b | 2020-07-09 08:31:51 -0700 | [diff] [blame] | 117 | if [[ "$GLANCE_STANDALONE" == "True" ]]; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 118 | useimport="--import" |
| 119 | else |
Dan Smith | 09eea0b | 2020-07-09 08:31:51 -0700 | [diff] [blame] | 120 | echo "*** Unable to use glance import workflow because glance is not standalone! ***" |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 121 | fi |
| 122 | fi |
| 123 | |
| 124 | openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name" --public --container-format "$container" --disk-format "$disk" $useimport $properties < "${image}" |
| 125 | } |
Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 126 | |
Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 127 | # Retrieve an image from a URL and upload into Glance. |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 128 | # Uses the following variables: |
Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 129 | # |
| 130 | # - ``FILES`` must be set to the cache dir |
| 131 | # - ``GLANCE_HOSTPORT`` |
| 132 | # |
Peter Stachowski | 5aeea6a | 2015-09-22 19:38:02 +0000 | [diff] [blame] | 133 | # upload_image image-url |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 134 | function upload_image { |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 135 | local image_url=$1 |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 136 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 137 | local image image_fname image_name |
| 138 | |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 139 | # Create a directory for the downloaded image tarballs. |
| 140 | mkdir -p $FILES/images |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 141 | image_fname=`basename "$image_url"` |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 142 | if [[ $image_url != file* ]]; then |
Sreeram Yerrapragada | 314af0a | 2014-03-03 21:34:45 -0800 | [diff] [blame] | 143 | # Downloads the image (uec ami+akistyle), then extracts it. |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 144 | if [[ ! -f $FILES/$image_fname || "$(stat -c "%s" $FILES/$image_fname)" = "0" ]]; then |
Attila Fazekas | 057d6ae | 2015-01-13 14:01:26 +0100 | [diff] [blame] | 145 | wget --progress=dot:giga -c $image_url -O $FILES/$image_fname |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 146 | if [[ $? -ne 0 ]]; then |
| 147 | echo "Not found: $image_url" |
| 148 | return |
| 149 | fi |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 150 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 151 | image="$FILES/${image_fname}" |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 152 | else |
Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 153 | # File based URL (RFC 1738): ``file://host/path`` |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 154 | # Remote files are not considered here. |
Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 155 | # unix: ``file:///home/user/path/file`` |
| 156 | # windows: ``file:///C:/Documents%20and%20Settings/user/path/file`` |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 157 | image=$(echo $image_url | sed "s/^file:\/\///g") |
| 158 | if [[ ! -f $image || "$(stat -c "%s" $image)" == "0" ]]; then |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 159 | echo "Not found: $image_url" |
| 160 | return |
| 161 | fi |
| 162 | fi |
| 163 | |
| 164 | # OpenVZ-format images are provided as .tar.gz, but not decompressed prior to loading |
| 165 | if [[ "$image_url" =~ 'openvz' ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 166 | image_name="${image_fname%.tar.gz}" |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 167 | _upload_image "$image_name" ami ami "$image" |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 168 | return |
| 169 | fi |
| 170 | |
Sreeram Yerrapragada | cbaff86 | 2013-07-24 19:49:23 -0700 | [diff] [blame] | 171 | # vmdk format images |
| 172 | if [[ "$image_url" =~ '.vmdk' ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 173 | image_name="${image_fname%.vmdk}" |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 174 | |
| 175 | # Before we can upload vmdk type images to glance, we need to know it's |
| 176 | # disk type, storage adapter, and networking adapter. These values are |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 177 | # passed to glance as custom properties. |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 178 | # We take these values from the vmdk file if populated. Otherwise, we use |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 179 | # vmdk filename, which is expected in the following format: |
| 180 | # |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 181 | # <name>-<disk type>;<storage adapter>;<network adapter> |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 182 | # |
| 183 | # If the filename does not follow the above format then the vsphere |
| 184 | # driver will supply default values. |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 185 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 186 | local vmdk_disktype="" |
Sabari Kumar Murugesan | 88cde0b | 2014-12-04 17:48:26 -0800 | [diff] [blame] | 187 | local vmdk_net_adapter="e1000" |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 188 | local path_len |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 189 | |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 190 | # vmdk adapter type |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 191 | local vmdk_adapter_type |
| 192 | vmdk_adapter_type="$(head -25 $image | { grep -a -F -m 1 'ddb.adapterType =' $image || true; })" |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 193 | vmdk_adapter_type="${vmdk_adapter_type#*\"}" |
| 194 | vmdk_adapter_type="${vmdk_adapter_type%?}" |
| 195 | |
| 196 | # vmdk disk type |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 197 | local vmdk_create_type |
| 198 | vmdk_create_type="$(head -25 $image | { grep -a -F -m 1 'createType=' $image || true; })" |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 199 | vmdk_create_type="${vmdk_create_type#*\"}" |
Arnaud Legendre | 8dad4bd | 2014-02-03 17:57:39 -0800 | [diff] [blame] | 200 | vmdk_create_type="${vmdk_create_type%\"*}" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 201 | |
| 202 | descriptor_data_pair_msg="Monolithic flat and VMFS disks "` |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 203 | `"should use a descriptor-data pair." |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 204 | if [[ "$vmdk_create_type" = "monolithicSparse" ]]; then |
| 205 | vmdk_disktype="sparse" |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 206 | elif [[ "$vmdk_create_type" = "monolithicFlat" || "$vmdk_create_type" = "vmfs" ]]; then |
Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 207 | # Attempt to retrieve the ``*-flat.vmdk`` |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 208 | local flat_fname |
| 209 | flat_fname="$(head -25 $image | { grep -G 'RW\|RDONLY [0-9]+ FLAT\|VMFS' $image || true; })" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 210 | flat_fname="${flat_fname#*\"}" |
| 211 | flat_fname="${flat_fname%?}" |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 212 | if [[ -z "$flat_fname" ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 213 | flat_fname="$image_name-flat.vmdk" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 214 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 215 | path_len=`expr ${#image_url} - ${#image_fname}` |
| 216 | local flat_url="${image_url:0:$path_len}$flat_fname" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 217 | warn $LINENO "$descriptor_data_pair_msg"` |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 218 | `" Attempt to retrieve the *-flat.vmdk: $flat_url" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 219 | if [[ $flat_url != file* ]]; then |
| 220 | if [[ ! -f $FILES/$flat_fname || \ |
| 221 | "$(stat -c "%s" $FILES/$flat_fname)" = "0" ]]; then |
Attila Fazekas | 057d6ae | 2015-01-13 14:01:26 +0100 | [diff] [blame] | 222 | wget --progress=dot:giga -c $flat_url -O $FILES/$flat_fname |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 223 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 224 | image="$FILES/${flat_fname}" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 225 | else |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 226 | image=$(echo $flat_url | sed "s/^file:\/\///g") |
| 227 | if [[ ! -f $image || "$(stat -c "%s" $image)" == "0" ]]; then |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 228 | echo "Flat disk not found: $flat_url" |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 229 | return 1 |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 230 | fi |
| 231 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 232 | image_name="${flat_fname}" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 233 | vmdk_disktype="preallocated" |
Arnaud Legendre | 8dad4bd | 2014-02-03 17:57:39 -0800 | [diff] [blame] | 234 | elif [[ "$vmdk_create_type" = "streamOptimized" ]]; then |
| 235 | vmdk_disktype="streamOptimized" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 236 | elif [[ -z "$vmdk_create_type" ]]; then |
| 237 | # *-flat.vmdk provided: attempt to retrieve the descriptor (*.vmdk) |
| 238 | # to retrieve appropriate metadata |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 239 | if [[ ${image_name: -5} != "-flat" ]]; then |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 240 | warn $LINENO "Expected filename suffix: '-flat'."` |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 241 | `" Filename provided: ${image_name}" |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 242 | else |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 243 | descriptor_fname="${image_name:0:${#image_name} - 5}.vmdk" |
| 244 | path_len=`expr ${#image_url} - ${#image_fname}` |
| 245 | local flat_path="${image_url:0:$path_len}" |
| 246 | local descriptor_url=$flat_path$descriptor_fname |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 247 | warn $LINENO "$descriptor_data_pair_msg"` |
| 248 | `" Attempt to retrieve the descriptor *.vmdk: $descriptor_url" |
| 249 | if [[ $flat_path != file* ]]; then |
| 250 | if [[ ! -f $FILES/$descriptor_fname || \ |
| 251 | "$(stat -c "%s" $FILES/$descriptor_fname)" = "0" ]]; then |
| 252 | wget -c $descriptor_url -O $FILES/$descriptor_fname |
| 253 | fi |
| 254 | descriptor_url="$FILES/$descriptor_fname" |
| 255 | else |
| 256 | descriptor_url=$(echo $descriptor_url | sed "s/^file:\/\///g") |
| 257 | if [[ ! -f $descriptor_url || \ |
| 258 | "$(stat -c "%s" $descriptor_url)" == "0" ]]; then |
| 259 | echo "Descriptor not found: $descriptor_url" |
| 260 | return 1 |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 261 | fi |
| 262 | fi |
Ryan Hsu | 99b622a | 2014-03-05 15:35:49 -0800 | [diff] [blame] | 263 | vmdk_adapter_type="$(head -25 $descriptor_url | { grep -a -F -m 1 'ddb.adapterType =' $descriptor_url || true; })" |
| 264 | vmdk_adapter_type="${vmdk_adapter_type#*\"}" |
| 265 | vmdk_adapter_type="${vmdk_adapter_type%?}" |
| 266 | fi |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 267 | vmdk_disktype="preallocated" |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 268 | else |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 269 | vmdk_disktype="preallocated" |
| 270 | fi |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 271 | |
| 272 | # NOTE: For backwards compatibility reasons, colons may be used in place |
| 273 | # of semi-colons for property delimiters but they are not permitted |
| 274 | # characters in NTFS filesystems. |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 275 | property_string=`echo "$image_name" | { grep -oP '(?<=-)(?!.*-).*[:;].*[:;].*$' || true; }` |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 276 | IFS=':;' read -a props <<< "$property_string" |
| 277 | vmdk_disktype="${props[0]:-$vmdk_disktype}" |
| 278 | vmdk_adapter_type="${props[1]:-$vmdk_adapter_type}" |
| 279 | vmdk_net_adapter="${props[2]:-$vmdk_net_adapter}" |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 280 | |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 281 | _upload_image "$image_name" bare vmdk "$image" vmware_disktype="$vmdk_disktype" vmware_adaptertype="$vmdk_adapter_type" hw_vif_model="$vmdk_net_adapter" |
| 282 | |
Sreeram Yerrapragada | cbaff86 | 2013-07-24 19:49:23 -0700 | [diff] [blame] | 283 | return |
| 284 | fi |
| 285 | |
Mate Lakat | bc2ef92 | 2013-08-15 18:06:59 +0100 | [diff] [blame] | 286 | # XenServer-vhd-ovf-format images are provided as .vhd.tgz |
Davanum Srinivas | 316ed6c | 2013-02-06 15:29:49 -0500 | [diff] [blame] | 287 | # and should not be decompressed prior to loading |
| 288 | if [[ "$image_url" =~ '.vhd.tgz' ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 289 | image_name="${image_fname%.vhd.tgz}" |
| 290 | local force_vm_mode="" |
| 291 | if [[ "$image_name" =~ 'cirros' ]]; then |
Bob Ball | f1a2dbf | 2014-03-19 11:08:54 +0000 | [diff] [blame] | 292 | # Cirros VHD image currently only boots in PV mode. |
| 293 | # Nova defaults to PV for all VHD images, but |
| 294 | # the glance setting is needed for booting |
| 295 | # directly from volume. |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 296 | force_vm_mode="vm_mode=xen" |
Bob Ball | f1a2dbf | 2014-03-19 11:08:54 +0000 | [diff] [blame] | 297 | fi |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 298 | _upload_image "$image_name" ovf vhd "$image" $force_vm_mode |
Davanum Srinivas | 316ed6c | 2013-02-06 15:29:49 -0500 | [diff] [blame] | 299 | return |
| 300 | fi |
| 301 | |
Mate Lakat | bc2ef92 | 2013-08-15 18:06:59 +0100 | [diff] [blame] | 302 | # .xen-raw.tgz suggests a Xen capable raw image inside a tgz. |
| 303 | # and should not be decompressed prior to loading. |
| 304 | # Setting metadata, so PV mode is used. |
| 305 | if [[ "$image_url" =~ '.xen-raw.tgz' ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 306 | image_name="${image_fname%.xen-raw.tgz}" |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 307 | _upload_image "$image_name" tgz raw "$image" vm_mode=xen |
Mate Lakat | bc2ef92 | 2013-08-15 18:06:59 +0100 | [diff] [blame] | 308 | return |
| 309 | fi |
| 310 | |
Maxim Nestratov | 54ee8a8 | 2015-07-15 11:47:11 +0300 | [diff] [blame] | 311 | if [[ "$image_url" =~ '.hds' ]]; then |
| 312 | image_name="${image_fname%.hds}" |
| 313 | vm_mode=${image_name##*-} |
| 314 | if [[ $vm_mode != 'exe' && $vm_mode != 'hvm' ]]; then |
| 315 | die $LINENO "Unknown vm_mode=${vm_mode} for Virtuozzo image" |
| 316 | fi |
| 317 | |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 318 | _upload_image "$image_name" bare ploop "$image" vm_mode=$vm_mode |
Maxim Nestratov | 54ee8a8 | 2015-07-15 11:47:11 +0300 | [diff] [blame] | 319 | return |
| 320 | fi |
| 321 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 322 | local kernel="" |
| 323 | local ramdisk="" |
| 324 | local disk_format="" |
| 325 | local container_format="" |
| 326 | local unpack="" |
Dan Smith | 49ad485 | 2020-07-15 14:54:22 -0700 | [diff] [blame^] | 327 | local img_property="" |
| 328 | |
| 329 | # NOTE(danms): If we're on libvirt/qemu or libvirt/kvm, set the hw_rng_model |
| 330 | # to libvirt in the image properties. |
| 331 | if [[ "$VIRT_DRIVER" == "libvirt" ]]; then |
| 332 | if [[ "$LIBVIRT_TYPE" == "qemu" || "$LIBVIRT_TYPE" == "kvm" ]]; then |
| 333 | img_property="hw_rng_model=virtio" |
| 334 | fi |
| 335 | fi |
| 336 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 337 | case "$image_fname" in |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 338 | *.tar.gz|*.tgz) |
| 339 | # Extract ami and aki files |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 340 | [ "${image_fname%.tar.gz}" != "$image_fname" ] && |
| 341 | image_name="${image_fname%.tar.gz}" || |
| 342 | image_name="${image_fname%.tgz}" |
| 343 | local xdir="$FILES/images/$image_name" |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 344 | rm -Rf "$xdir"; |
| 345 | mkdir "$xdir" |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 346 | tar -zxf $image -C "$xdir" |
| 347 | kernel=$(for f in "$xdir/"*-vmlinuz* "$xdir/"aki-*/image; do |
Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 348 | [ -f "$f" ] && echo "$f" && break; done; true) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 349 | ramdisk=$(for f in "$xdir/"*-initrd* "$xdir/"ari-*/image; do |
Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 350 | [ -f "$f" ] && echo "$f" && break; done; true) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 351 | image=$(for f in "$xdir/"*.img "$xdir/"ami-*/image; do |
Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 352 | [ -f "$f" ] && echo "$f" && break; done; true) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 353 | if [[ -z "$image_name" ]]; then |
| 354 | image_name=$(basename "$image" ".img") |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 355 | fi |
| 356 | ;; |
| 357 | *.img) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 358 | image_name=$(basename "$image" ".img") |
Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 359 | local format |
| 360 | format=$(qemu-img info ${image} | awk '/^file format/ { print $3; exit }') |
Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 361 | if [[ ",qcow2,raw,vdi,vmdk,vpc," =~ ",$format," ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 362 | disk_format=$format |
Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 363 | else |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 364 | disk_format=raw |
Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 365 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 366 | container_format=bare |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 367 | ;; |
| 368 | *.img.gz) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 369 | image_name=$(basename "$image" ".img.gz") |
| 370 | disk_format=raw |
| 371 | container_format=bare |
| 372 | unpack=zcat |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 373 | ;; |
Hongbin Lu | 3feceb0 | 2016-04-17 11:11:58 -0400 | [diff] [blame] | 374 | *.img.bz2) |
| 375 | image_name=$(basename "$image" ".img.bz2") |
| 376 | disk_format=qcow2 |
| 377 | container_format=bare |
| 378 | unpack=bunzip2 |
| 379 | ;; |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 380 | *.qcow2) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 381 | image_name=$(basename "$image" ".qcow2") |
| 382 | disk_format=qcow2 |
| 383 | container_format=bare |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 384 | ;; |
Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 385 | *.qcow2.xz) |
| 386 | image_name=$(basename "$image" ".qcow2.xz") |
| 387 | disk_format=qcow2 |
| 388 | container_format=bare |
| 389 | unpack=unxz |
| 390 | ;; |
Angel Noam | f24e299 | 2017-05-11 15:13:29 +0300 | [diff] [blame] | 391 | *.raw) |
| 392 | image_name=$(basename "$image" ".raw") |
| 393 | disk_format=raw |
| 394 | container_format=bare |
| 395 | ;; |
Jonathan Michalon | 0680204 | 2013-03-21 14:29:58 +0100 | [diff] [blame] | 396 | *.iso) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 397 | image_name=$(basename "$image" ".iso") |
| 398 | disk_format=iso |
| 399 | container_format=bare |
Jonathan Michalon | 0680204 | 2013-03-21 14:29:58 +0100 | [diff] [blame] | 400 | ;; |
Alessandro Pilotti | ca82394 | 2014-08-07 02:05:26 +0300 | [diff] [blame] | 401 | *.vhd|*.vhdx|*.vhd.gz|*.vhdx.gz) |
| 402 | local extension="${image_fname#*.}" |
| 403 | image_name=$(basename "$image" ".$extension") |
Lucian Petrut | 2715fd0 | 2017-05-24 11:31:56 +0300 | [diff] [blame] | 404 | disk_format=$(echo $image_fname | grep -oP '(?<=\.)vhdx?(?=\.|$)') |
Alessandro Pilotti | ca82394 | 2014-08-07 02:05:26 +0300 | [diff] [blame] | 405 | container_format=bare |
| 406 | if [ "${image_fname##*.}" == "gz" ]; then |
| 407 | unpack=zcat |
| 408 | fi |
| 409 | ;; |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 410 | *) echo "Do not know what to do with $image_fname"; false;; |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 411 | esac |
| 412 | |
Rafael Folco | 72f530f | 2016-02-09 07:08:38 -0600 | [diff] [blame] | 413 | if is_arch "ppc64le" || is_arch "ppc64" || is_arch "ppc"; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 414 | img_property="$img_property hw_cdrom_bus=scsi os_command_line=console=hvc0" |
Rafael Folco | ab77587 | 2013-12-02 14:04:32 -0200 | [diff] [blame] | 415 | fi |
| 416 | |
Clark Laughlin | fcc3f6e | 2015-04-07 16:31:47 +0000 | [diff] [blame] | 417 | if is_arch "aarch64"; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 418 | img_property="$img_property hw_machine_type=virt hw_cdrom_bus=scsi hw_scsi_model=virtio-scsi os_command_line='console=ttyAMA0'" |
Clark Laughlin | fcc3f6e | 2015-04-07 16:31:47 +0000 | [diff] [blame] | 419 | fi |
| 420 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 421 | if [ "$container_format" = "bare" ]; then |
| 422 | if [ "$unpack" = "zcat" ]; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 423 | _upload_image "$image_name" $container_format $disk_format <(zcat --force "$image") $img_property |
Hongbin Lu | 3feceb0 | 2016-04-17 11:11:58 -0400 | [diff] [blame] | 424 | elif [ "$unpack" = "bunzip2" ]; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 425 | _upload_image "$image_name" $container_format $disk_format <(bunzip2 -cdk "$image") $img_property |
Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 426 | elif [ "$unpack" = "unxz" ]; then |
| 427 | # NOTE(brtknr): unxz the file first and cleanup afterwards to |
| 428 | # prevent timeout while Glance tries to upload image (e.g. to Swift). |
| 429 | local tmp_dir |
| 430 | local image_path |
| 431 | tmp_dir=$(mktemp -d) |
| 432 | image_path="$tmp_dir/$image_name" |
| 433 | unxz -cv "${image}" > "$image_path" |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 434 | _upload_image "$image_name" $container_format $disk_format "$image_path" $img_property |
Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 435 | rm -rf $tmp_dir |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 436 | else |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 437 | _upload_image "$image_name" $container_format $disk_format "$image" $img_property |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 438 | fi |
| 439 | else |
| 440 | # Use glance client to add the kernel the root filesystem. |
| 441 | # We parse the results of the first upload to get the glance ID of the |
| 442 | # kernel for use when uploading the root filesystem. |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 443 | local kernel_id="" ramdisk_id=""; |
| 444 | if [ -n "$kernel" ]; then |
Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 445 | kernel_id=$(openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name-kernel" $(_image_properties_to_arg $img_property) --public --container-format aki --disk-format aki < "$kernel" | grep ' id ' | get_field 2) |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 446 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 447 | if [ -n "$ramdisk" ]; then |
Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 448 | ramdisk_id=$(openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name-ramdisk" $(_image_properties_to_arg $img_property) --public --container-format ari --disk-format ari < "$ramdisk" | grep ' id ' | get_field 2) |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 449 | fi |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 450 | _upload_image "${image_name%.img}" ami ami "$image" ${kernel_id:+ kernel_id=$kernel_id} ${ramdisk_id:+ ramdisk_id=$ramdisk_id} $img_property |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 451 | fi |
| 452 | } |
| 453 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 454 | |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 455 | # Set the database backend to use |
| 456 | # When called from stackrc/localrc DATABASE_BACKENDS has not been |
| 457 | # initialized yet, just save the configuration selection and call back later |
| 458 | # to validate it. |
Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 459 | # |
Matt Riedemann | b14665f | 2019-10-17 19:34:05 +0000 | [diff] [blame] | 460 | # ``$1`` - the name of the database backend to use (mysql, postgresql, ...) |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 461 | function use_database { |
| 462 | if [[ -z "$DATABASE_BACKENDS" ]]; then |
Dean Troyer | afc29fe | 2013-02-07 15:56:24 -0600 | [diff] [blame] | 463 | # No backends registered means this is likely called from ``localrc`` |
| 464 | # This is now deprecated usage |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 465 | DATABASE_TYPE=$1 |
Sean Dague | 72ad942 | 2015-10-07 11:51:40 -0400 | [diff] [blame] | 466 | deprecated "The database backend needs to be properly set in ENABLED_SERVICES; use_database is deprecated localrc" |
Attila Fazekas | 251d3b5 | 2012-12-16 15:05:44 +0100 | [diff] [blame] | 467 | else |
Dean Troyer | afc29fe | 2013-02-07 15:56:24 -0600 | [diff] [blame] | 468 | # This should no longer get called...here for posterity |
Attila Fazekas | 251d3b5 | 2012-12-16 15:05:44 +0100 | [diff] [blame] | 469 | use_exclusive_service DATABASE_BACKENDS DATABASE_TYPE $1 |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 470 | fi |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 471 | } |
| 472 | |
sridhargaddam | b5ab646 | 2015-02-24 07:23:24 +0000 | [diff] [blame] | 473 | #Macro for curl statements. curl requires -g option for literal IPv6 addresses. |
| 474 | CURL_GET="${CURL_GET:-curl -g}" |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 475 | |
Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 476 | # Wait for an HTTP server to start answering requests |
| 477 | # wait_for_service timeout url |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 478 | # |
| 479 | # If the service we want is behind a proxy, the proxy may be available |
| 480 | # before the service. Compliant proxies will return a 503 in this case |
| 481 | # Loop until we get something else. |
| 482 | # Also check for the case where there is no proxy and the service just |
| 483 | # hasn't started yet. curl returns 7 for Failed to connect to host. |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 484 | function wait_for_service { |
Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 485 | local timeout=$1 |
| 486 | local url=$2 |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 487 | local rval=0 |
Atsushi SAKAI | 2ca8af4 | 2015-12-08 15:36:13 +0900 | [diff] [blame] | 488 | time_start "wait_for_service" |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 489 | timeout $timeout bash -x <<EOF || rval=$? |
| 490 | while [[ \$( ${CURL_GET} -k --noproxy '*' -s -o /dev/null -w '%{http_code}' ${url} ) == 503 || \$? -eq 7 ]]; do |
| 491 | sleep 1 |
| 492 | done |
| 493 | EOF |
Atsushi SAKAI | 2ca8af4 | 2015-12-08 15:36:13 +0900 | [diff] [blame] | 494 | time_stop "wait_for_service" |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 495 | return $rval |
Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 496 | } |
| 497 | |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 498 | function wait_for_compute { |
| 499 | local timeout=$1 |
| 500 | local rval=0 |
Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 501 | local compute_hostname |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 502 | time_start "wait_for_service" |
Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 503 | compute_hostname=$(iniget $NOVA_CONF DEFAULT host) |
| 504 | if [[ -z $compute_hostname ]]; then |
| 505 | compute_hostname=$(hostname) |
| 506 | fi |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 507 | timeout $timeout bash -x <<EOF || rval=$? |
| 508 | ID="" |
| 509 | while [[ "\$ID" == "" ]]; do |
| 510 | sleep 1 |
Chris Dent | ac475bb | 2018-02-07 18:35:40 +0000 | [diff] [blame] | 511 | if [[ "$VIRT_DRIVER" = 'fake' ]]; then |
| 512 | # When using the fake driver the compute hostnames have a suffix of 1 to NUMBER_FAKE_NOVA_COMPUTE |
| 513 | ID=\$(openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list --host `hostname`1 --service nova-compute -c ID -f value) |
| 514 | else |
Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 515 | ID=\$(openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list --host "$compute_hostname" --service nova-compute -c ID -f value) |
Chris Dent | ac475bb | 2018-02-07 18:35:40 +0000 | [diff] [blame] | 516 | fi |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 517 | done |
| 518 | EOF |
| 519 | time_stop "wait_for_service" |
| 520 | # Figure out what's happening on platforms where this doesn't work |
| 521 | if [[ "$rval" != 0 ]]; then |
| 522 | echo "Didn't find service registered by hostname after $timeout seconds" |
| 523 | openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list |
| 524 | fi |
| 525 | return $rval |
| 526 | } |
| 527 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 528 | |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 529 | # ping check |
Stephen Finucane | 4b8cba7 | 2019-05-21 14:17:11 +0100 | [diff] [blame] | 530 | # Uses globals ``ENABLED_SERVICES``, ``TOP_DIR``, ``PRIVATE_NETWORK`` |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 531 | # ping_check <ip> [boot-timeout] [from_net] [expected] |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 532 | function ping_check { |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 533 | local ip=$1 |
| 534 | local timeout=${2:-30} |
| 535 | local from_net=${3:-""} |
| 536 | local expected=${4:-True} |
| 537 | local op="!" |
| 538 | local failmsg="[Fail] Couldn't ping server" |
| 539 | local ping_cmd="ping" |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 540 | |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 541 | # if we don't specify a from_net we're expecting things to work |
| 542 | # fine from our local box. |
| 543 | if [[ -n "$from_net" ]]; then |
Stephen Finucane | 4b8cba7 | 2019-05-21 14:17:11 +0100 | [diff] [blame] | 544 | # TODO(stephenfin): Is there any way neutron could be disabled now? |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 545 | if is_service_enabled neutron; then |
| 546 | ping_cmd="$TOP_DIR/tools/ping_neutron.sh $from_net" |
Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 547 | fi |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 548 | fi |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 549 | |
| 550 | # inverse the logic if we're testing no connectivity |
| 551 | if [[ "$expected" != "True" ]]; then |
| 552 | op="" |
| 553 | failmsg="[Fail] Could ping server" |
| 554 | fi |
| 555 | |
| 556 | # Because we've transformed this command so many times, print it |
| 557 | # out at the end. |
| 558 | local check_command="while $op $ping_cmd -c1 -w1 $ip; do sleep 1; done" |
| 559 | echo "Checking connectivity with $check_command" |
| 560 | |
| 561 | if ! timeout $timeout sh -c "$check_command"; then |
| 562 | die $LINENO $failmsg |
| 563 | fi |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 564 | } |
| 565 | |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 566 | # Get ip of instance |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 567 | function get_instance_ip { |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 568 | local vm_id=$1 |
| 569 | local network_name=$2 |
Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 570 | local addresses |
Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 571 | local ip |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 572 | |
Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 573 | addresses=$(openstack server show -c addresses -f value "$vm_id") |
| 574 | ip=$(echo $addresses | sed -n "s/^.*$network_name=\([0-9\.]*\).*$/\1/p") |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 575 | if [[ $ip = "" ]];then |
Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 576 | echo "addresses of server $vm_id : $addresses" |
Atsushi SAKAI | 33c9a67 | 2015-11-12 19:50:00 +0900 | [diff] [blame] | 577 | die $LINENO "[Fail] Couldn't get ipaddress of VM" |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 578 | fi |
| 579 | echo $ip |
| 580 | } |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 581 | |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 582 | # ssh check |
Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 583 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 584 | # ssh_check net-name key-file floating-ip default-user active-timeout |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 585 | function ssh_check { |
Mark McClain | b05c876 | 2013-07-06 23:29:39 -0400 | [diff] [blame] | 586 | if is_service_enabled neutron; then |
| 587 | _ssh_check_neutron "$1" $2 $3 $4 $5 |
Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 588 | return |
| 589 | fi |
| 590 | _ssh_check_novanet "$1" $2 $3 $4 $5 |
| 591 | } |
| 592 | |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 593 | function _ssh_check_novanet { |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 594 | local NET_NAME=$1 |
| 595 | local KEY_FILE=$2 |
| 596 | local FLOATING_IP=$3 |
| 597 | local DEFAULT_INSTANCE_USER=$4 |
| 598 | local ACTIVE_TIMEOUT=$5 |
Dean Troyer | 6931c13 | 2012-11-07 16:51:21 -0600 | [diff] [blame] | 599 | local probe_cmd="" |
Dean Troyer | cc6b443 | 2013-04-08 15:38:03 -0500 | [diff] [blame] | 600 | if ! timeout $ACTIVE_TIMEOUT sh -c "while ! ssh -o StrictHostKeyChecking=no -i $KEY_FILE ${DEFAULT_INSTANCE_USER}@$FLOATING_IP echo success; do sleep 1; done"; then |
Nachi Ueno | 07115eb | 2013-02-26 12:38:18 -0800 | [diff] [blame] | 601 | die $LINENO "server didn't become ssh-able!" |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 602 | fi |
| 603 | } |
Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 604 | |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 605 | |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 606 | # Get the location of the $module-rootwrap executables, where module is cinder |
| 607 | # or nova. |
| 608 | # get_rootwrap_location module |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 609 | function get_rootwrap_location { |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 610 | local module=$1 |
| 611 | |
Jakub Ruzicka | 4196d55 | 2013-01-30 15:35:54 +0100 | [diff] [blame] | 612 | echo "$(get_python_exec_prefix)/$module-rootwrap" |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 613 | } |
| 614 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 615 | |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 616 | # Path permissions sanity check |
| 617 | # check_path_perm_sanity path |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 618 | function check_path_perm_sanity { |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 619 | # Ensure no element of the path has 0700 permissions, which is very |
| 620 | # likely to cause issues for daemons. Inspired by default 0700 |
| 621 | # homedir permissions on RHEL and common practice of making DEST in |
| 622 | # the stack user's homedir. |
| 623 | |
Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 624 | local real_path |
| 625 | real_path=$(readlink -f $1) |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 626 | local rebuilt_path="" |
| 627 | for i in $(echo ${real_path} | tr "/" " "); do |
| 628 | rebuilt_path=$rebuilt_path"/"$i |
| 629 | |
| 630 | if [[ $(stat -c '%a' ${rebuilt_path}) = 700 ]]; then |
| 631 | echo "*** DEST path element" |
| 632 | echo "*** ${rebuilt_path}" |
| 633 | echo "*** appears to have 0700 permissions." |
Dean Troyer | dc97cb7 | 2015-03-28 08:20:50 -0500 | [diff] [blame] | 634 | echo "*** This is very likely to cause fatal issues for DevStack daemons." |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 635 | |
| 636 | if [[ -n "$SKIP_PATH_SANITY" ]]; then |
| 637 | return |
| 638 | else |
| 639 | echo "*** Set SKIP_PATH_SANITY to skip this check" |
| 640 | die $LINENO "Invalid path permissions" |
| 641 | fi |
| 642 | fi |
| 643 | done |
| 644 | } |
| 645 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 646 | |
Ian Wienand | 2ba36cd | 2015-11-12 13:52:36 +1100 | [diff] [blame] | 647 | # vercmp ver1 op ver2 |
| 648 | # Compare VER1 to VER2 |
| 649 | # - op is one of < <= == >= > |
| 650 | # - returns true if satisified |
| 651 | # e.g. |
| 652 | # if vercmp 1.0 "<" 2.0; then |
| 653 | # ... |
| 654 | # fi |
| 655 | function vercmp { |
| 656 | local v1=$1 |
| 657 | local op=$2 |
| 658 | local v2=$3 |
| 659 | local result |
| 660 | |
| 661 | # sort the two numbers with sort's "-V" argument. Based on if v2 |
| 662 | # swapped places with v1, we can determine ordering. |
| 663 | result=$(echo -e "$v1\n$v2" | sort -V | head -1) |
| 664 | |
| 665 | case $op in |
| 666 | "==") |
| 667 | [ "$v1" = "$v2" ] |
| 668 | return |
| 669 | ;; |
| 670 | ">") |
| 671 | [ "$v1" != "$v2" ] && [ "$result" = "$v2" ] |
| 672 | return |
| 673 | ;; |
| 674 | "<") |
| 675 | [ "$v1" != "$v2" ] && [ "$result" = "$v1" ] |
| 676 | return |
| 677 | ;; |
| 678 | ">=") |
| 679 | [ "$result" = "$v2" ] |
| 680 | return |
| 681 | ;; |
| 682 | "<=") |
| 683 | [ "$result" = "$v1" ] |
| 684 | return |
| 685 | ;; |
| 686 | *) |
| 687 | die $LINENO "unrecognised op: $op" |
| 688 | ;; |
| 689 | esac |
| 690 | } |
Kyle Mestery | 51a3f1f | 2013-06-13 11:47:56 +0000 | [diff] [blame] | 691 | |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 692 | # This sets up defaults we like in devstack for logging for tracking |
| 693 | # down issues, and makes sure everything is done the same between |
| 694 | # projects. |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 695 | # NOTE(jh): Historically this function switched between three different |
| 696 | # functions: setup_systemd_logging, setup_colorized_logging and |
| 697 | # setup_standard_logging_identity. Since we always run with systemd now, |
| 698 | # this could be cleaned up, but the other functions may still be in use |
| 699 | # by plugins. Since deprecations haven't worked in the past, we'll just |
| 700 | # leave them in place. |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 701 | function setup_logging { |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 702 | setup_systemd_logging $1 |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 703 | } |
| 704 | |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 705 | # This function sets log formatting options for colorizing log |
| 706 | # output to stdout. It is meant to be called by lib modules. |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 707 | function setup_colorized_logging { |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 708 | local conf_file=$1 |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 709 | # Add color to logging output |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 710 | iniset $conf_file DEFAULT logging_context_format_string "%(asctime)s.%(msecs)03d %(color)s%(levelname)s %(name)s [[01;36m%(request_id)s [00;36m%(project_name)s %(user_name)s%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 711 | iniset $conf_file DEFAULT logging_default_format_string "%(asctime)s.%(msecs)03d %(color)s%(levelname)s %(name)s [[00;36m-%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 712 | iniset $conf_file DEFAULT logging_debug_format_suffix "[00;33mfrom (pid=%(process)d) %(funcName)s %(pathname)s:%(lineno)d[00m" |
| 713 | iniset $conf_file DEFAULT logging_exception_prefix "%(color)s%(asctime)s.%(msecs)03d TRACE %(name)s [01;35m%(instance)s[00m" |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 714 | } |
| 715 | |
Sean Dague | 5edae54 | 2017-03-21 20:50:24 -0400 | [diff] [blame] | 716 | function setup_systemd_logging { |
| 717 | local conf_file=$1 |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 718 | # NOTE(sdague): this is a nice to have, and means we're using the |
| 719 | # native systemd path, which provides for things like search on |
| 720 | # request-id. However, there may be an eventlet interaction here, |
| 721 | # so going off for now. |
Kirill Zaitsev | c0644f3 | 2017-05-24 13:00:47 +0300 | [diff] [blame] | 722 | USE_JOURNAL=$(trueorfalse False USE_JOURNAL) |
Eric Fried | 8cd310d | 2017-05-16 13:52:03 -0500 | [diff] [blame] | 723 | local pidstr="" |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 724 | if [[ "$USE_JOURNAL" == "True" ]]; then |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 725 | iniset $conf_file DEFAULT use_journal "True" |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 726 | # if we are using the journal directly, our process id is already correct |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 727 | else |
Eric Fried | 8cd310d | 2017-05-16 13:52:03 -0500 | [diff] [blame] | 728 | pidstr="(pid=%(process)d) " |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 729 | fi |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 730 | iniset $conf_file DEFAULT logging_debug_format_suffix "[00;33m{{${pidstr}%(funcName)s %(pathname)s:%(lineno)d}}[00m" |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 731 | |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 732 | iniset $conf_file DEFAULT logging_context_format_string "%(color)s%(levelname)s %(name)s [[01;36m%(global_request_id)s %(request_id)s [00;36m%(project_name)s %(user_name)s%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 733 | iniset $conf_file DEFAULT logging_default_format_string "%(color)s%(levelname)s %(name)s [[00;36m-%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 734 | iniset $conf_file DEFAULT logging_exception_prefix "ERROR %(name)s [01;35m%(instance)s[00m" |
Sean Dague | 5edae54 | 2017-03-21 20:50:24 -0400 | [diff] [blame] | 735 | } |
| 736 | |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 737 | function setup_standard_logging_identity { |
| 738 | local conf_file=$1 |
| 739 | iniset $conf_file DEFAULT logging_user_identity_format "%(project_name)s %(user_name)s" |
| 740 | } |
| 741 | |
Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 742 | # These functions are provided for basic fall-back functionality for |
Dean Troyer | dc97cb7 | 2015-03-28 08:20:50 -0500 | [diff] [blame] | 743 | # projects that include parts of DevStack (Grenade). stack.sh will |
| 744 | # override these with more specific versions for DevStack (with fancy |
Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 745 | # spinners, etc). We never override an existing version |
| 746 | if ! function_exists echo_summary; then |
| 747 | function echo_summary { |
| 748 | echo $@ |
| 749 | } |
| 750 | fi |
| 751 | if ! function_exists echo_nolog; then |
| 752 | function echo_nolog { |
| 753 | echo $@ |
| 754 | } |
| 755 | fi |
Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 756 | |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 757 | |
| 758 | # create_disk - Create backing disk |
| 759 | function create_disk { |
| 760 | local node_number |
| 761 | local disk_image=${1} |
| 762 | local storage_data_dir=${2} |
| 763 | local loopback_disk_size=${3} |
| 764 | |
| 765 | # Create a loopback disk and format it to XFS. |
| 766 | if [[ -e ${disk_image} ]]; then |
| 767 | if egrep -q ${storage_data_dir} /proc/mounts; then |
liumk | 38a23d9 | 2017-12-13 15:09:02 +0800 | [diff] [blame] | 768 | sudo umount ${storage_data_dir} |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 769 | sudo rm -f ${disk_image} |
| 770 | fi |
| 771 | fi |
| 772 | |
| 773 | sudo mkdir -p ${storage_data_dir}/drives/images |
| 774 | |
| 775 | sudo truncate -s ${loopback_disk_size} ${disk_image} |
| 776 | |
| 777 | # Make a fresh XFS filesystem. Use bigger inodes so xattr can fit in |
| 778 | # a single inode. Keeping the default inode size (256) will result in multiple |
| 779 | # inodes being used to store xattr. Retrieving the xattr will be slower |
| 780 | # since we have to read multiple inodes. This statement is true for both |
| 781 | # Swift and Ceph. |
| 782 | sudo mkfs.xfs -f -i size=1024 ${disk_image} |
| 783 | |
| 784 | # Mount the disk with mount options to make it as efficient as possible |
| 785 | if ! egrep -q ${storage_data_dir} /proc/mounts; then |
Lee Yarwood | 5d7d891 | 2018-12-03 14:21:06 +0000 | [diff] [blame] | 786 | sudo mount -t xfs -o loop,noatime,nodiratime,logbufs=8 \ |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 787 | ${disk_image} ${storage_data_dir} |
| 788 | fi |
| 789 | } |
| 790 | |
Ihar Hrachyshka | 7b5c7dc | 2016-07-15 20:17:13 +0200 | [diff] [blame] | 791 | |
| 792 | # set_mtu - Set MTU on a device |
| 793 | function set_mtu { |
| 794 | local dev=$1 |
| 795 | local mtu=$2 |
| 796 | sudo ip link set mtu $mtu dev $dev |
| 797 | } |
| 798 | |
| 799 | |
Denis Buliga | 0bf75a4 | 2017-02-06 16:56:46 +0200 | [diff] [blame] | 800 | # running_in_container - Returns true otherwise false |
| 801 | function running_in_container { |
kesper | d18d7c8 | 2017-03-23 05:52:33 +0000 | [diff] [blame] | 802 | [[ $(systemd-detect-virt --container) != 'none' ]] |
Denis Buliga | 0bf75a4 | 2017-02-06 16:56:46 +0200 | [diff] [blame] | 803 | } |
| 804 | |
| 805 | |
Ihar Hrachyshka | b3a210f | 2016-09-29 13:26:30 +0000 | [diff] [blame] | 806 | # enable_kernel_bridge_firewall - Enable kernel support for bridge firewalling |
| 807 | function enable_kernel_bridge_firewall { |
| 808 | # Load bridge module. This module provides access to firewall for bridged |
| 809 | # frames; and also on older kernels (pre-3.18) it provides sysctl knobs to |
| 810 | # enable/disable bridge firewalling |
| 811 | sudo modprobe bridge |
| 812 | # For newer kernels (3.18+), those sysctl settings are split into a separate |
| 813 | # kernel module (br_netfilter). Load it too, if present. |
| 814 | sudo modprobe br_netfilter 2>> /dev/null || : |
| 815 | # Enable bridge firewalling in case it's disabled in kernel (upstream |
| 816 | # default is enabled, but some distributions may decide to change it). |
| 817 | # This is at least needed for RHEL 7.2 and earlier releases. |
Ihar Hrachyshka | 3f771b7 | 2016-12-17 04:12:24 +0000 | [diff] [blame] | 818 | for proto in ip ip6; do |
Ihar Hrachyshka | b3a210f | 2016-09-29 13:26:30 +0000 | [diff] [blame] | 819 | sudo sysctl -w net.bridge.bridge-nf-call-${proto}tables=1 |
| 820 | done |
| 821 | } |
| 822 | |
| 823 | |
Dan Smith | 1f55d38 | 2017-05-16 08:50:53 -0700 | [diff] [blame] | 824 | # Set a systemd system override |
| 825 | # |
| 826 | # This sets a system-side override in system.conf. A per-service |
| 827 | # override would be /etc/systemd/system/${service}.service/override.conf |
| 828 | function set_systemd_override { |
| 829 | local key="$1" |
| 830 | local value="$2" |
| 831 | |
| 832 | local sysconf="/etc/systemd/system.conf" |
| 833 | iniset -sudo "${sysconf}" "Manager" "$key" "$value" |
| 834 | echo "Set systemd system override for ${key}=${value}" |
| 835 | |
| 836 | sudo systemctl daemon-reload |
| 837 | } |
| 838 | |
Matthew Treinish | 309b99e | 2017-05-23 15:18:31 -0400 | [diff] [blame] | 839 | # Get a random port from the local port range |
| 840 | # |
| 841 | # This function returns an available port in the local port range. The search |
| 842 | # order is not truly random, but should be considered a random value by the |
| 843 | # user because it depends on the state of your local system. |
| 844 | function get_random_port { |
| 845 | read lower_port upper_port < /proc/sys/net/ipv4/ip_local_port_range |
| 846 | while true; do |
| 847 | for (( port = upper_port ; port >= lower_port ; port-- )); do |
| 848 | sudo lsof -i ":$port" &> /dev/null |
| 849 | if [[ $? > 0 ]] ; then |
| 850 | break 2 |
| 851 | fi |
| 852 | done |
| 853 | done |
| 854 | echo $port |
| 855 | } |
| 856 | |
Ian Wienand | 07cbc44 | 2017-06-30 12:29:19 +1000 | [diff] [blame] | 857 | # Save some state information |
| 858 | # |
| 859 | # Write out various useful state information to /etc/devstack-version |
Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 860 | function write_devstack_version { |
Dirk Mueller | 6bab832 | 2018-03-02 21:13:12 +0100 | [diff] [blame] | 861 | cat - <<EOF | sudo tee /etc/devstack-version >/dev/null |
Ian Wienand | 07cbc44 | 2017-06-30 12:29:19 +1000 | [diff] [blame] | 862 | DevStack Version: ${DEVSTACK_SERIES} |
| 863 | Change: $(git log --format="%H %s %ci" -1) |
| 864 | OS Version: ${os_VENDOR} ${os_RELEASE} ${os_CODENAME} |
Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 865 | EOF |
Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 866 | } |
| 867 | |
Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 868 | # Restore xtrace |
Ian Wienand | 523f488 | 2015-10-13 11:03:03 +1100 | [diff] [blame] | 869 | $_XTRACE_FUNCTIONS |
Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 870 | |
Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 871 | # Local variables: |
Sean Dague | 584d90e | 2013-03-29 14:34:53 -0400 | [diff] [blame] | 872 | # mode: shell-script |
Andrew Laski | f900bd7 | 2012-09-05 17:23:14 -0400 | [diff] [blame] | 873 | # End: |