Sean Dague | e263c82 | 2014-12-05 14:25:28 -0500 | [diff] [blame] | 1 | #!/bin/bash |
| 2 | # |
Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 3 | # functions - DevStack-specific functions |
Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 4 | # |
Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 5 | # The following variables are assumed to be defined by certain functions: |
Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 6 | # |
Dean Troyer | d8864fe | 2014-02-17 11:00:42 -0600 | [diff] [blame] | 7 | # - ``DATABASE_BACKENDS`` |
Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 8 | # - ``ENABLED_SERVICES`` |
Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 9 | # - ``FILES`` |
| 10 | # - ``GLANCE_HOSTPORT`` |
Dean Troyer | d8864fe | 2014-02-17 11:00:42 -0600 | [diff] [blame] | 11 | # |
Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 12 | |
Ian Wienand | 4ffb454 | 2015-06-30 11:00:32 +1000 | [diff] [blame] | 13 | # ensure we don't re-source this in the same environment |
| 14 | [[ -z "$_DEVSTACK_FUNCTIONS" ]] || return 0 |
Sean Dague | afef8bf | 2017-03-06 14:07:23 -0500 | [diff] [blame] | 15 | declare -r -g _DEVSTACK_FUNCTIONS=1 |
Ian Wienand | 4ffb454 | 2015-06-30 11:00:32 +1000 | [diff] [blame] | 16 | |
Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 17 | # Include the common functions |
| 18 | FUNC_DIR=$(cd $(dirname "${BASH_SOURCE:-$0}") && pwd) |
| 19 | source ${FUNC_DIR}/functions-common |
Dean Troyer | bf2ad70 | 2015-03-09 15:16:10 -0500 | [diff] [blame] | 20 | source ${FUNC_DIR}/inc/ini-config |
Eric Fried | 2468cea | 2019-07-25 13:18:58 -0500 | [diff] [blame] | 21 | source ${FUNC_DIR}/inc/meta-config |
Dean Troyer | 490430d | 2015-01-30 14:38:35 -0600 | [diff] [blame] | 22 | source ${FUNC_DIR}/inc/python |
Dean Troyer | 32d6bc6 | 2015-03-29 14:16:44 -0500 | [diff] [blame] | 23 | source ${FUNC_DIR}/inc/rootwrap |
Dan Smith | 30d9bf9 | 2021-01-19 12:10:52 -0800 | [diff] [blame] | 24 | source ${FUNC_DIR}/inc/async |
Dean Troyer | 7f9aa71 | 2012-01-31 12:11:56 -0600 | [diff] [blame] | 25 | |
Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 26 | # Save trace setting |
Ian Wienand | 523f488 | 2015-10-13 11:03:03 +1100 | [diff] [blame] | 27 | _XTRACE_FUNCTIONS=$(set +o | grep xtrace) |
Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 28 | set +o xtrace |
| 29 | |
Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 30 | # Check if a function already exists |
| 31 | function function_exists { |
| 32 | declare -f -F $1 > /dev/null |
| 33 | } |
Dean Troyer | 7f9aa71 | 2012-01-31 12:11:56 -0600 | [diff] [blame] | 34 | |
Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 35 | # short_source prints out the current location of the caller in a way |
| 36 | # that strips redundant directories. This is useful for PS4 usage. |
| 37 | function short_source { |
| 38 | saveIFS=$IFS |
| 39 | IFS=" " |
| 40 | called=($(caller 0)) |
| 41 | IFS=$saveIFS |
| 42 | file=${called[2]} |
| 43 | file=${file#$RC_DIR/} |
| 44 | printf "%-40s " "$file:${called[1]}:${called[0]}" |
| 45 | } |
John L. Villalovos | daa7a41 | 2016-05-05 12:50:52 -0700 | [diff] [blame] | 46 | # PS4 is exported to child shells and uses the 'short_source' function, so |
| 47 | # export it so child shells have access to the 'short_source' function also. |
| 48 | export -f short_source |
Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 49 | |
Monty Taylor | d8bb220 | 2017-09-03 12:13:59 -0500 | [diff] [blame] | 50 | # Download a file from a URL |
| 51 | # |
| 52 | # Will check cache (in $FILES) or download given URL. |
| 53 | # |
| 54 | # Argument is the URL to the remote file |
| 55 | # |
| 56 | # Will echo the local path to the file as the output. Will die on |
| 57 | # failure to download. |
| 58 | # |
| 59 | # Files can be pre-cached for CI environments, see EXTRA_CACHE_URLS |
| 60 | # and tools/image_list.sh |
| 61 | function get_extra_file { |
| 62 | local file_url=$1 |
| 63 | |
| 64 | file_name=$(basename "$file_url") |
| 65 | if [[ $file_url != file* ]]; then |
| 66 | # If the file isn't cache, download it |
| 67 | if [[ ! -f $FILES/$file_name ]]; then |
yuanke wei | c652a49 | 2017-09-17 22:18:07 +0800 | [diff] [blame] | 68 | wget --progress=dot:giga -t 2 -c $file_url -O $FILES/$file_name |
Monty Taylor | d8bb220 | 2017-09-03 12:13:59 -0500 | [diff] [blame] | 69 | if [[ $? -ne 0 ]]; then |
| 70 | die "$file_url could not be downloaded" |
| 71 | fi |
| 72 | fi |
| 73 | echo "$FILES/$file_name" |
| 74 | return |
| 75 | else |
| 76 | # just strip the file:// bit and that's the path to the file |
| 77 | echo $file_url | sed 's/$file:\/\///g' |
| 78 | fi |
| 79 | } |
| 80 | |
Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 81 | # Generate image property arguments for OSC |
| 82 | # |
| 83 | # Arguments: properties, one per, like propname=value |
| 84 | # |
| 85 | # Result is --property propname1=value1 --property propname2=value2 |
| 86 | function _image_properties_to_arg { |
| 87 | local result="" |
| 88 | for property in $*; do |
| 89 | result+=" --property $property" |
| 90 | done |
| 91 | echo $result |
| 92 | } |
| 93 | |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 94 | # Upload an image to glance using the configured mechanism |
| 95 | # |
| 96 | # Arguments: |
| 97 | # image name |
| 98 | # container format |
| 99 | # disk format |
| 100 | # path to image file |
| 101 | # optional properties (format of propname=value) |
| 102 | # |
| 103 | function _upload_image { |
| 104 | local image_name="$1" |
| 105 | shift |
| 106 | local container="$1" |
| 107 | shift |
| 108 | local disk="$1" |
| 109 | shift |
| 110 | local image="$1" |
| 111 | shift |
| 112 | local properties |
| 113 | local useimport |
| 114 | |
Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 115 | properties=$(_image_properties_to_arg $*) |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 116 | |
| 117 | if [[ "$GLANCE_USE_IMPORT_WORKFLOW" == "True" ]]; then |
Dan Smith | 33f8f6e | 2020-07-21 19:41:48 -0700 | [diff] [blame] | 118 | useimport="--import" |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 119 | fi |
| 120 | |
| 121 | openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name" --public --container-format "$container" --disk-format "$disk" $useimport $properties < "${image}" |
| 122 | } |
Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 123 | |
Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 124 | # Retrieve an image from a URL and upload into Glance. |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 125 | # Uses the following variables: |
Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 126 | # |
| 127 | # - ``FILES`` must be set to the cache dir |
| 128 | # - ``GLANCE_HOSTPORT`` |
| 129 | # |
Peter Stachowski | 5aeea6a | 2015-09-22 19:38:02 +0000 | [diff] [blame] | 130 | # upload_image image-url |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 131 | function upload_image { |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 132 | local image_url=$1 |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 133 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 134 | local image image_fname image_name |
| 135 | |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 136 | # Create a directory for the downloaded image tarballs. |
| 137 | mkdir -p $FILES/images |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 138 | image_fname=`basename "$image_url"` |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 139 | if [[ $image_url != file* ]]; then |
Sreeram Yerrapragada | 314af0a | 2014-03-03 21:34:45 -0800 | [diff] [blame] | 140 | # Downloads the image (uec ami+akistyle), then extracts it. |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 141 | if [[ ! -f $FILES/$image_fname || "$(stat -c "%s" $FILES/$image_fname)" = "0" ]]; then |
Attila Fazekas | 057d6ae | 2015-01-13 14:01:26 +0100 | [diff] [blame] | 142 | wget --progress=dot:giga -c $image_url -O $FILES/$image_fname |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 143 | if [[ $? -ne 0 ]]; then |
| 144 | echo "Not found: $image_url" |
| 145 | return |
| 146 | fi |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 147 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 148 | image="$FILES/${image_fname}" |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 149 | else |
Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 150 | # File based URL (RFC 1738): ``file://host/path`` |
Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 151 | # Remote files are not considered here. |
Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 152 | # unix: ``file:///home/user/path/file`` |
| 153 | # windows: ``file:///C:/Documents%20and%20Settings/user/path/file`` |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 154 | image=$(echo $image_url | sed "s/^file:\/\///g") |
| 155 | if [[ ! -f $image || "$(stat -c "%s" $image)" == "0" ]]; then |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 156 | echo "Not found: $image_url" |
| 157 | return |
| 158 | fi |
| 159 | fi |
| 160 | |
| 161 | # OpenVZ-format images are provided as .tar.gz, but not decompressed prior to loading |
| 162 | if [[ "$image_url" =~ 'openvz' ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 163 | image_name="${image_fname%.tar.gz}" |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 164 | _upload_image "$image_name" ami ami "$image" |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 165 | return |
| 166 | fi |
| 167 | |
Sreeram Yerrapragada | cbaff86 | 2013-07-24 19:49:23 -0700 | [diff] [blame] | 168 | # vmdk format images |
| 169 | if [[ "$image_url" =~ '.vmdk' ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 170 | image_name="${image_fname%.vmdk}" |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 171 | |
| 172 | # Before we can upload vmdk type images to glance, we need to know it's |
| 173 | # disk type, storage adapter, and networking adapter. These values are |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 174 | # passed to glance as custom properties. |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 175 | # We take these values from the vmdk file if populated. Otherwise, we use |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 176 | # vmdk filename, which is expected in the following format: |
| 177 | # |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 178 | # <name>-<disk type>;<storage adapter>;<network adapter> |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 179 | # |
| 180 | # If the filename does not follow the above format then the vsphere |
| 181 | # driver will supply default values. |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 182 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 183 | local vmdk_disktype="" |
Sabari Kumar Murugesan | 88cde0b | 2014-12-04 17:48:26 -0800 | [diff] [blame] | 184 | local vmdk_net_adapter="e1000" |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 185 | local path_len |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 186 | |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 187 | # vmdk adapter type |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 188 | local vmdk_adapter_type |
| 189 | vmdk_adapter_type="$(head -25 $image | { grep -a -F -m 1 'ddb.adapterType =' $image || true; })" |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 190 | vmdk_adapter_type="${vmdk_adapter_type#*\"}" |
| 191 | vmdk_adapter_type="${vmdk_adapter_type%?}" |
| 192 | |
| 193 | # vmdk disk type |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 194 | local vmdk_create_type |
| 195 | vmdk_create_type="$(head -25 $image | { grep -a -F -m 1 'createType=' $image || true; })" |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 196 | vmdk_create_type="${vmdk_create_type#*\"}" |
Arnaud Legendre | 8dad4bd | 2014-02-03 17:57:39 -0800 | [diff] [blame] | 197 | vmdk_create_type="${vmdk_create_type%\"*}" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 198 | |
| 199 | descriptor_data_pair_msg="Monolithic flat and VMFS disks "` |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 200 | `"should use a descriptor-data pair." |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 201 | if [[ "$vmdk_create_type" = "monolithicSparse" ]]; then |
| 202 | vmdk_disktype="sparse" |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 203 | elif [[ "$vmdk_create_type" = "monolithicFlat" || "$vmdk_create_type" = "vmfs" ]]; then |
Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 204 | # Attempt to retrieve the ``*-flat.vmdk`` |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 205 | local flat_fname |
| 206 | flat_fname="$(head -25 $image | { grep -G 'RW\|RDONLY [0-9]+ FLAT\|VMFS' $image || true; })" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 207 | flat_fname="${flat_fname#*\"}" |
| 208 | flat_fname="${flat_fname%?}" |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 209 | if [[ -z "$flat_fname" ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 210 | flat_fname="$image_name-flat.vmdk" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 211 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 212 | path_len=`expr ${#image_url} - ${#image_fname}` |
| 213 | local flat_url="${image_url:0:$path_len}$flat_fname" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 214 | warn $LINENO "$descriptor_data_pair_msg"` |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 215 | `" Attempt to retrieve the *-flat.vmdk: $flat_url" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 216 | if [[ $flat_url != file* ]]; then |
| 217 | if [[ ! -f $FILES/$flat_fname || \ |
| 218 | "$(stat -c "%s" $FILES/$flat_fname)" = "0" ]]; then |
Attila Fazekas | 057d6ae | 2015-01-13 14:01:26 +0100 | [diff] [blame] | 219 | wget --progress=dot:giga -c $flat_url -O $FILES/$flat_fname |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 220 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 221 | image="$FILES/${flat_fname}" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 222 | else |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 223 | image=$(echo $flat_url | sed "s/^file:\/\///g") |
| 224 | if [[ ! -f $image || "$(stat -c "%s" $image)" == "0" ]]; then |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 225 | echo "Flat disk not found: $flat_url" |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 226 | return 1 |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 227 | fi |
| 228 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 229 | image_name="${flat_fname}" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 230 | vmdk_disktype="preallocated" |
Arnaud Legendre | 8dad4bd | 2014-02-03 17:57:39 -0800 | [diff] [blame] | 231 | elif [[ "$vmdk_create_type" = "streamOptimized" ]]; then |
| 232 | vmdk_disktype="streamOptimized" |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 233 | elif [[ -z "$vmdk_create_type" ]]; then |
| 234 | # *-flat.vmdk provided: attempt to retrieve the descriptor (*.vmdk) |
| 235 | # to retrieve appropriate metadata |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 236 | if [[ ${image_name: -5} != "-flat" ]]; then |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 237 | warn $LINENO "Expected filename suffix: '-flat'."` |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 238 | `" Filename provided: ${image_name}" |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 239 | else |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 240 | descriptor_fname="${image_name:0:${#image_name} - 5}.vmdk" |
| 241 | path_len=`expr ${#image_url} - ${#image_fname}` |
| 242 | local flat_path="${image_url:0:$path_len}" |
| 243 | local descriptor_url=$flat_path$descriptor_fname |
Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 244 | warn $LINENO "$descriptor_data_pair_msg"` |
| 245 | `" Attempt to retrieve the descriptor *.vmdk: $descriptor_url" |
| 246 | if [[ $flat_path != file* ]]; then |
| 247 | if [[ ! -f $FILES/$descriptor_fname || \ |
| 248 | "$(stat -c "%s" $FILES/$descriptor_fname)" = "0" ]]; then |
| 249 | wget -c $descriptor_url -O $FILES/$descriptor_fname |
| 250 | fi |
| 251 | descriptor_url="$FILES/$descriptor_fname" |
| 252 | else |
| 253 | descriptor_url=$(echo $descriptor_url | sed "s/^file:\/\///g") |
| 254 | if [[ ! -f $descriptor_url || \ |
| 255 | "$(stat -c "%s" $descriptor_url)" == "0" ]]; then |
| 256 | echo "Descriptor not found: $descriptor_url" |
| 257 | return 1 |
Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 258 | fi |
| 259 | fi |
Ryan Hsu | 99b622a | 2014-03-05 15:35:49 -0800 | [diff] [blame] | 260 | vmdk_adapter_type="$(head -25 $descriptor_url | { grep -a -F -m 1 'ddb.adapterType =' $descriptor_url || true; })" |
| 261 | vmdk_adapter_type="${vmdk_adapter_type#*\"}" |
| 262 | vmdk_adapter_type="${vmdk_adapter_type%?}" |
| 263 | fi |
Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 264 | vmdk_disktype="preallocated" |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 265 | else |
Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 266 | vmdk_disktype="preallocated" |
| 267 | fi |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 268 | |
| 269 | # NOTE: For backwards compatibility reasons, colons may be used in place |
| 270 | # of semi-colons for property delimiters but they are not permitted |
| 271 | # characters in NTFS filesystems. |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 272 | property_string=`echo "$image_name" | { grep -oP '(?<=-)(?!.*-).*[:;].*[:;].*$' || true; }` |
Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 273 | IFS=':;' read -a props <<< "$property_string" |
| 274 | vmdk_disktype="${props[0]:-$vmdk_disktype}" |
| 275 | vmdk_adapter_type="${props[1]:-$vmdk_adapter_type}" |
| 276 | vmdk_net_adapter="${props[2]:-$vmdk_net_adapter}" |
Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 277 | |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 278 | _upload_image "$image_name" bare vmdk "$image" vmware_disktype="$vmdk_disktype" vmware_adaptertype="$vmdk_adapter_type" hw_vif_model="$vmdk_net_adapter" |
| 279 | |
Sreeram Yerrapragada | cbaff86 | 2013-07-24 19:49:23 -0700 | [diff] [blame] | 280 | return |
| 281 | fi |
| 282 | |
Maxim Nestratov | 54ee8a8 | 2015-07-15 11:47:11 +0300 | [diff] [blame] | 283 | if [[ "$image_url" =~ '.hds' ]]; then |
| 284 | image_name="${image_fname%.hds}" |
| 285 | vm_mode=${image_name##*-} |
| 286 | if [[ $vm_mode != 'exe' && $vm_mode != 'hvm' ]]; then |
| 287 | die $LINENO "Unknown vm_mode=${vm_mode} for Virtuozzo image" |
| 288 | fi |
| 289 | |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 290 | _upload_image "$image_name" bare ploop "$image" vm_mode=$vm_mode |
Maxim Nestratov | 54ee8a8 | 2015-07-15 11:47:11 +0300 | [diff] [blame] | 291 | return |
| 292 | fi |
| 293 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 294 | local kernel="" |
| 295 | local ramdisk="" |
| 296 | local disk_format="" |
| 297 | local container_format="" |
| 298 | local unpack="" |
Dan Smith | 49ad485 | 2020-07-15 14:54:22 -0700 | [diff] [blame] | 299 | local img_property="" |
| 300 | |
| 301 | # NOTE(danms): If we're on libvirt/qemu or libvirt/kvm, set the hw_rng_model |
| 302 | # to libvirt in the image properties. |
| 303 | if [[ "$VIRT_DRIVER" == "libvirt" ]]; then |
| 304 | if [[ "$LIBVIRT_TYPE" == "qemu" || "$LIBVIRT_TYPE" == "kvm" ]]; then |
| 305 | img_property="hw_rng_model=virtio" |
| 306 | fi |
| 307 | fi |
| 308 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 309 | case "$image_fname" in |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 310 | *.tar.gz|*.tgz) |
| 311 | # Extract ami and aki files |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 312 | [ "${image_fname%.tar.gz}" != "$image_fname" ] && |
| 313 | image_name="${image_fname%.tar.gz}" || |
| 314 | image_name="${image_fname%.tgz}" |
| 315 | local xdir="$FILES/images/$image_name" |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 316 | rm -Rf "$xdir"; |
| 317 | mkdir "$xdir" |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 318 | tar -zxf $image -C "$xdir" |
| 319 | kernel=$(for f in "$xdir/"*-vmlinuz* "$xdir/"aki-*/image; do |
Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 320 | [ -f "$f" ] && echo "$f" && break; done; true) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 321 | ramdisk=$(for f in "$xdir/"*-initrd* "$xdir/"ari-*/image; do |
Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 322 | [ -f "$f" ] && echo "$f" && break; done; true) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 323 | image=$(for f in "$xdir/"*.img "$xdir/"ami-*/image; do |
Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 324 | [ -f "$f" ] && echo "$f" && break; done; true) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 325 | if [[ -z "$image_name" ]]; then |
| 326 | image_name=$(basename "$image" ".img") |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 327 | fi |
| 328 | ;; |
| 329 | *.img) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 330 | image_name=$(basename "$image" ".img") |
Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 331 | local format |
| 332 | format=$(qemu-img info ${image} | awk '/^file format/ { print $3; exit }') |
Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 333 | if [[ ",qcow2,raw,vdi,vmdk,vpc," =~ ",$format," ]]; then |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 334 | disk_format=$format |
Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 335 | else |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 336 | disk_format=raw |
Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 337 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 338 | container_format=bare |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 339 | ;; |
| 340 | *.img.gz) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 341 | image_name=$(basename "$image" ".img.gz") |
| 342 | disk_format=raw |
| 343 | container_format=bare |
| 344 | unpack=zcat |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 345 | ;; |
Hongbin Lu | 3feceb0 | 2016-04-17 11:11:58 -0400 | [diff] [blame] | 346 | *.img.bz2) |
| 347 | image_name=$(basename "$image" ".img.bz2") |
| 348 | disk_format=qcow2 |
| 349 | container_format=bare |
| 350 | unpack=bunzip2 |
| 351 | ;; |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 352 | *.qcow2) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 353 | image_name=$(basename "$image" ".qcow2") |
| 354 | disk_format=qcow2 |
| 355 | container_format=bare |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 356 | ;; |
Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 357 | *.qcow2.xz) |
| 358 | image_name=$(basename "$image" ".qcow2.xz") |
| 359 | disk_format=qcow2 |
| 360 | container_format=bare |
| 361 | unpack=unxz |
| 362 | ;; |
Angel Noam | f24e299 | 2017-05-11 15:13:29 +0300 | [diff] [blame] | 363 | *.raw) |
| 364 | image_name=$(basename "$image" ".raw") |
| 365 | disk_format=raw |
| 366 | container_format=bare |
| 367 | ;; |
Jonathan Michalon | 0680204 | 2013-03-21 14:29:58 +0100 | [diff] [blame] | 368 | *.iso) |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 369 | image_name=$(basename "$image" ".iso") |
| 370 | disk_format=iso |
| 371 | container_format=bare |
Jonathan Michalon | 0680204 | 2013-03-21 14:29:58 +0100 | [diff] [blame] | 372 | ;; |
Alessandro Pilotti | ca82394 | 2014-08-07 02:05:26 +0300 | [diff] [blame] | 373 | *.vhd|*.vhdx|*.vhd.gz|*.vhdx.gz) |
| 374 | local extension="${image_fname#*.}" |
| 375 | image_name=$(basename "$image" ".$extension") |
Lucian Petrut | 2715fd0 | 2017-05-24 11:31:56 +0300 | [diff] [blame] | 376 | disk_format=$(echo $image_fname | grep -oP '(?<=\.)vhdx?(?=\.|$)') |
Alessandro Pilotti | ca82394 | 2014-08-07 02:05:26 +0300 | [diff] [blame] | 377 | container_format=bare |
| 378 | if [ "${image_fname##*.}" == "gz" ]; then |
| 379 | unpack=zcat |
| 380 | fi |
| 381 | ;; |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 382 | *) echo "Do not know what to do with $image_fname"; false;; |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 383 | esac |
| 384 | |
Rafael Folco | 72f530f | 2016-02-09 07:08:38 -0600 | [diff] [blame] | 385 | if is_arch "ppc64le" || is_arch "ppc64" || is_arch "ppc"; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 386 | img_property="$img_property hw_cdrom_bus=scsi os_command_line=console=hvc0" |
Rafael Folco | ab77587 | 2013-12-02 14:04:32 -0200 | [diff] [blame] | 387 | fi |
| 388 | |
Clark Laughlin | fcc3f6e | 2015-04-07 16:31:47 +0000 | [diff] [blame] | 389 | if is_arch "aarch64"; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 390 | img_property="$img_property hw_machine_type=virt hw_cdrom_bus=scsi hw_scsi_model=virtio-scsi os_command_line='console=ttyAMA0'" |
Clark Laughlin | fcc3f6e | 2015-04-07 16:31:47 +0000 | [diff] [blame] | 391 | fi |
| 392 | |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 393 | if [ "$container_format" = "bare" ]; then |
| 394 | if [ "$unpack" = "zcat" ]; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 395 | _upload_image "$image_name" $container_format $disk_format <(zcat --force "$image") $img_property |
Hongbin Lu | 3feceb0 | 2016-04-17 11:11:58 -0400 | [diff] [blame] | 396 | elif [ "$unpack" = "bunzip2" ]; then |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 397 | _upload_image "$image_name" $container_format $disk_format <(bunzip2 -cdk "$image") $img_property |
Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 398 | elif [ "$unpack" = "unxz" ]; then |
| 399 | # NOTE(brtknr): unxz the file first and cleanup afterwards to |
| 400 | # prevent timeout while Glance tries to upload image (e.g. to Swift). |
| 401 | local tmp_dir |
| 402 | local image_path |
| 403 | tmp_dir=$(mktemp -d) |
| 404 | image_path="$tmp_dir/$image_name" |
| 405 | unxz -cv "${image}" > "$image_path" |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 406 | _upload_image "$image_name" $container_format $disk_format "$image_path" $img_property |
Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 407 | rm -rf $tmp_dir |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 408 | else |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 409 | _upload_image "$image_name" $container_format $disk_format "$image" $img_property |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 410 | fi |
| 411 | else |
| 412 | # Use glance client to add the kernel the root filesystem. |
| 413 | # We parse the results of the first upload to get the glance ID of the |
| 414 | # kernel for use when uploading the root filesystem. |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 415 | local kernel_id="" ramdisk_id=""; |
| 416 | if [ -n "$kernel" ]; then |
Eliad Cohen | fdfc144 | 2022-08-16 13:00:45 -0400 | [diff] [blame] | 417 | kernel_id=$(openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name-kernel" $(_image_properties_to_arg $img_property) --public --container-format aki --disk-format aki < "$kernel" -f value -c id) |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 418 | fi |
Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 419 | if [ -n "$ramdisk" ]; then |
Eliad Cohen | fdfc144 | 2022-08-16 13:00:45 -0400 | [diff] [blame] | 420 | ramdisk_id=$(openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name-ramdisk" $(_image_properties_to_arg $img_property) --public --container-format ari --disk-format ari < "$ramdisk" -f value -c id) |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 421 | fi |
Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 422 | _upload_image "${image_name%.img}" ami ami "$image" ${kernel_id:+ kernel_id=$kernel_id} ${ramdisk_id:+ ramdisk_id=$ramdisk_id} $img_property |
Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 423 | fi |
| 424 | } |
| 425 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 426 | |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 427 | # Set the database backend to use |
| 428 | # When called from stackrc/localrc DATABASE_BACKENDS has not been |
| 429 | # initialized yet, just save the configuration selection and call back later |
| 430 | # to validate it. |
Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 431 | # |
Matt Riedemann | b14665f | 2019-10-17 19:34:05 +0000 | [diff] [blame] | 432 | # ``$1`` - the name of the database backend to use (mysql, postgresql, ...) |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 433 | function use_database { |
| 434 | if [[ -z "$DATABASE_BACKENDS" ]]; then |
Dean Troyer | afc29fe | 2013-02-07 15:56:24 -0600 | [diff] [blame] | 435 | # No backends registered means this is likely called from ``localrc`` |
| 436 | # This is now deprecated usage |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 437 | DATABASE_TYPE=$1 |
Sean Dague | 72ad942 | 2015-10-07 11:51:40 -0400 | [diff] [blame] | 438 | deprecated "The database backend needs to be properly set in ENABLED_SERVICES; use_database is deprecated localrc" |
Attila Fazekas | 251d3b5 | 2012-12-16 15:05:44 +0100 | [diff] [blame] | 439 | else |
Dean Troyer | afc29fe | 2013-02-07 15:56:24 -0600 | [diff] [blame] | 440 | # This should no longer get called...here for posterity |
Attila Fazekas | 251d3b5 | 2012-12-16 15:05:44 +0100 | [diff] [blame] | 441 | use_exclusive_service DATABASE_BACKENDS DATABASE_TYPE $1 |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 442 | fi |
Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 443 | } |
| 444 | |
sridhargaddam | b5ab646 | 2015-02-24 07:23:24 +0000 | [diff] [blame] | 445 | #Macro for curl statements. curl requires -g option for literal IPv6 addresses. |
| 446 | CURL_GET="${CURL_GET:-curl -g}" |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 447 | |
Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 448 | # Wait for an HTTP server to start answering requests |
| 449 | # wait_for_service timeout url |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 450 | # |
| 451 | # If the service we want is behind a proxy, the proxy may be available |
| 452 | # before the service. Compliant proxies will return a 503 in this case |
| 453 | # Loop until we get something else. |
| 454 | # Also check for the case where there is no proxy and the service just |
| 455 | # hasn't started yet. curl returns 7 for Failed to connect to host. |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 456 | function wait_for_service { |
Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 457 | local timeout=$1 |
| 458 | local url=$2 |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 459 | local rval=0 |
Atsushi SAKAI | 2ca8af4 | 2015-12-08 15:36:13 +0900 | [diff] [blame] | 460 | time_start "wait_for_service" |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 461 | timeout $timeout bash -x <<EOF || rval=$? |
| 462 | while [[ \$( ${CURL_GET} -k --noproxy '*' -s -o /dev/null -w '%{http_code}' ${url} ) == 503 || \$? -eq 7 ]]; do |
| 463 | sleep 1 |
| 464 | done |
| 465 | EOF |
Atsushi SAKAI | 2ca8af4 | 2015-12-08 15:36:13 +0900 | [diff] [blame] | 466 | time_stop "wait_for_service" |
Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 467 | return $rval |
Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 468 | } |
| 469 | |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 470 | function wait_for_compute { |
| 471 | local timeout=$1 |
| 472 | local rval=0 |
Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 473 | local compute_hostname |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 474 | time_start "wait_for_service" |
Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 475 | compute_hostname=$(iniget $NOVA_CONF DEFAULT host) |
| 476 | if [[ -z $compute_hostname ]]; then |
| 477 | compute_hostname=$(hostname) |
| 478 | fi |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 479 | timeout $timeout bash -x <<EOF || rval=$? |
| 480 | ID="" |
| 481 | while [[ "\$ID" == "" ]]; do |
| 482 | sleep 1 |
Chris Dent | ac475bb | 2018-02-07 18:35:40 +0000 | [diff] [blame] | 483 | if [[ "$VIRT_DRIVER" = 'fake' ]]; then |
| 484 | # When using the fake driver the compute hostnames have a suffix of 1 to NUMBER_FAKE_NOVA_COMPUTE |
| 485 | ID=\$(openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list --host `hostname`1 --service nova-compute -c ID -f value) |
| 486 | else |
Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 487 | ID=\$(openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list --host "$compute_hostname" --service nova-compute -c ID -f value) |
Chris Dent | ac475bb | 2018-02-07 18:35:40 +0000 | [diff] [blame] | 488 | fi |
Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 489 | done |
| 490 | EOF |
| 491 | time_stop "wait_for_service" |
| 492 | # Figure out what's happening on platforms where this doesn't work |
| 493 | if [[ "$rval" != 0 ]]; then |
| 494 | echo "Didn't find service registered by hostname after $timeout seconds" |
| 495 | openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list |
| 496 | fi |
| 497 | return $rval |
| 498 | } |
| 499 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 500 | |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 501 | # ping check |
Stephen Finucane | 4b8cba7 | 2019-05-21 14:17:11 +0100 | [diff] [blame] | 502 | # Uses globals ``ENABLED_SERVICES``, ``TOP_DIR``, ``PRIVATE_NETWORK`` |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 503 | # ping_check <ip> [boot-timeout] [from_net] [expected] |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 504 | function ping_check { |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 505 | local ip=$1 |
| 506 | local timeout=${2:-30} |
| 507 | local from_net=${3:-""} |
| 508 | local expected=${4:-True} |
| 509 | local op="!" |
| 510 | local failmsg="[Fail] Couldn't ping server" |
| 511 | local ping_cmd="ping" |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 512 | |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 513 | # if we don't specify a from_net we're expecting things to work |
| 514 | # fine from our local box. |
| 515 | if [[ -n "$from_net" ]]; then |
Stephen Finucane | 4b8cba7 | 2019-05-21 14:17:11 +0100 | [diff] [blame] | 516 | # TODO(stephenfin): Is there any way neutron could be disabled now? |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 517 | if is_service_enabled neutron; then |
| 518 | ping_cmd="$TOP_DIR/tools/ping_neutron.sh $from_net" |
Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 519 | fi |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 520 | fi |
Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 521 | |
| 522 | # inverse the logic if we're testing no connectivity |
| 523 | if [[ "$expected" != "True" ]]; then |
| 524 | op="" |
| 525 | failmsg="[Fail] Could ping server" |
| 526 | fi |
| 527 | |
| 528 | # Because we've transformed this command so many times, print it |
| 529 | # out at the end. |
| 530 | local check_command="while $op $ping_cmd -c1 -w1 $ip; do sleep 1; done" |
| 531 | echo "Checking connectivity with $check_command" |
| 532 | |
| 533 | if ! timeout $timeout sh -c "$check_command"; then |
| 534 | die $LINENO $failmsg |
| 535 | fi |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 536 | } |
| 537 | |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 538 | # Get ip of instance |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 539 | function get_instance_ip { |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 540 | local vm_id=$1 |
| 541 | local network_name=$2 |
Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 542 | local addresses |
Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 543 | local ip |
Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 544 | |
Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 545 | addresses=$(openstack server show -c addresses -f value "$vm_id") |
| 546 | ip=$(echo $addresses | sed -n "s/^.*$network_name=\([0-9\.]*\).*$/\1/p") |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 547 | if [[ $ip = "" ]];then |
Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 548 | echo "addresses of server $vm_id : $addresses" |
Atsushi SAKAI | 33c9a67 | 2015-11-12 19:50:00 +0900 | [diff] [blame] | 549 | die $LINENO "[Fail] Couldn't get ipaddress of VM" |
Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 550 | fi |
| 551 | echo $ip |
| 552 | } |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 553 | |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 554 | # ssh check |
Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 555 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 556 | # ssh_check net-name key-file floating-ip default-user active-timeout |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 557 | function ssh_check { |
Mark McClain | b05c876 | 2013-07-06 23:29:39 -0400 | [diff] [blame] | 558 | if is_service_enabled neutron; then |
| 559 | _ssh_check_neutron "$1" $2 $3 $4 $5 |
Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 560 | return |
| 561 | fi |
| 562 | _ssh_check_novanet "$1" $2 $3 $4 $5 |
| 563 | } |
| 564 | |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 565 | function _ssh_check_novanet { |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 566 | local NET_NAME=$1 |
| 567 | local KEY_FILE=$2 |
| 568 | local FLOATING_IP=$3 |
| 569 | local DEFAULT_INSTANCE_USER=$4 |
| 570 | local ACTIVE_TIMEOUT=$5 |
Dean Troyer | 6931c13 | 2012-11-07 16:51:21 -0600 | [diff] [blame] | 571 | local probe_cmd="" |
Dean Troyer | cc6b443 | 2013-04-08 15:38:03 -0500 | [diff] [blame] | 572 | if ! timeout $ACTIVE_TIMEOUT sh -c "while ! ssh -o StrictHostKeyChecking=no -i $KEY_FILE ${DEFAULT_INSTANCE_USER}@$FLOATING_IP echo success; do sleep 1; done"; then |
Nachi Ueno | 07115eb | 2013-02-26 12:38:18 -0800 | [diff] [blame] | 573 | die $LINENO "server didn't become ssh-able!" |
Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 574 | fi |
| 575 | } |
Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 576 | |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 577 | |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 578 | # Get the location of the $module-rootwrap executables, where module is cinder |
| 579 | # or nova. |
| 580 | # get_rootwrap_location module |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 581 | function get_rootwrap_location { |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 582 | local module=$1 |
| 583 | |
Jakub Ruzicka | 4196d55 | 2013-01-30 15:35:54 +0100 | [diff] [blame] | 584 | echo "$(get_python_exec_prefix)/$module-rootwrap" |
Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 585 | } |
| 586 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 587 | |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 588 | # Path permissions sanity check |
| 589 | # check_path_perm_sanity path |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 590 | function check_path_perm_sanity { |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 591 | # Ensure no element of the path has 0700 permissions, which is very |
| 592 | # likely to cause issues for daemons. Inspired by default 0700 |
| 593 | # homedir permissions on RHEL and common practice of making DEST in |
| 594 | # the stack user's homedir. |
| 595 | |
Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 596 | local real_path |
| 597 | real_path=$(readlink -f $1) |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 598 | local rebuilt_path="" |
| 599 | for i in $(echo ${real_path} | tr "/" " "); do |
| 600 | rebuilt_path=$rebuilt_path"/"$i |
| 601 | |
| 602 | if [[ $(stat -c '%a' ${rebuilt_path}) = 700 ]]; then |
| 603 | echo "*** DEST path element" |
| 604 | echo "*** ${rebuilt_path}" |
| 605 | echo "*** appears to have 0700 permissions." |
Dean Troyer | dc97cb7 | 2015-03-28 08:20:50 -0500 | [diff] [blame] | 606 | echo "*** This is very likely to cause fatal issues for DevStack daemons." |
Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 607 | |
| 608 | if [[ -n "$SKIP_PATH_SANITY" ]]; then |
| 609 | return |
| 610 | else |
| 611 | echo "*** Set SKIP_PATH_SANITY to skip this check" |
| 612 | die $LINENO "Invalid path permissions" |
| 613 | fi |
| 614 | fi |
| 615 | done |
| 616 | } |
| 617 | |
Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 618 | |
Ian Wienand | 2ba36cd | 2015-11-12 13:52:36 +1100 | [diff] [blame] | 619 | # vercmp ver1 op ver2 |
| 620 | # Compare VER1 to VER2 |
| 621 | # - op is one of < <= == >= > |
| 622 | # - returns true if satisified |
| 623 | # e.g. |
| 624 | # if vercmp 1.0 "<" 2.0; then |
| 625 | # ... |
| 626 | # fi |
| 627 | function vercmp { |
| 628 | local v1=$1 |
| 629 | local op=$2 |
| 630 | local v2=$3 |
| 631 | local result |
| 632 | |
| 633 | # sort the two numbers with sort's "-V" argument. Based on if v2 |
| 634 | # swapped places with v1, we can determine ordering. |
| 635 | result=$(echo -e "$v1\n$v2" | sort -V | head -1) |
| 636 | |
| 637 | case $op in |
| 638 | "==") |
| 639 | [ "$v1" = "$v2" ] |
| 640 | return |
| 641 | ;; |
| 642 | ">") |
| 643 | [ "$v1" != "$v2" ] && [ "$result" = "$v2" ] |
| 644 | return |
| 645 | ;; |
| 646 | "<") |
| 647 | [ "$v1" != "$v2" ] && [ "$result" = "$v1" ] |
| 648 | return |
| 649 | ;; |
| 650 | ">=") |
| 651 | [ "$result" = "$v2" ] |
| 652 | return |
| 653 | ;; |
| 654 | "<=") |
| 655 | [ "$result" = "$v1" ] |
| 656 | return |
| 657 | ;; |
| 658 | *) |
| 659 | die $LINENO "unrecognised op: $op" |
| 660 | ;; |
| 661 | esac |
| 662 | } |
Kyle Mestery | 51a3f1f | 2013-06-13 11:47:56 +0000 | [diff] [blame] | 663 | |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 664 | # This sets up defaults we like in devstack for logging for tracking |
| 665 | # down issues, and makes sure everything is done the same between |
| 666 | # projects. |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 667 | # NOTE(jh): Historically this function switched between three different |
| 668 | # functions: setup_systemd_logging, setup_colorized_logging and |
| 669 | # setup_standard_logging_identity. Since we always run with systemd now, |
| 670 | # this could be cleaned up, but the other functions may still be in use |
| 671 | # by plugins. Since deprecations haven't worked in the past, we'll just |
| 672 | # leave them in place. |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 673 | function setup_logging { |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 674 | setup_systemd_logging $1 |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 675 | } |
| 676 | |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 677 | # This function sets log formatting options for colorizing log |
| 678 | # output to stdout. It is meant to be called by lib modules. |
Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 679 | function setup_colorized_logging { |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 680 | local conf_file=$1 |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 681 | # Add color to logging output |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 682 | iniset $conf_file DEFAULT logging_context_format_string "%(asctime)s.%(msecs)03d %(color)s%(levelname)s %(name)s [[01;36m%(request_id)s [00;36m%(project_name)s %(user_name)s%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 683 | iniset $conf_file DEFAULT logging_default_format_string "%(asctime)s.%(msecs)03d %(color)s%(levelname)s %(name)s [[00;36m-%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 684 | iniset $conf_file DEFAULT logging_debug_format_suffix "[00;33mfrom (pid=%(process)d) %(funcName)s %(pathname)s:%(lineno)d[00m" |
| 685 | iniset $conf_file DEFAULT logging_exception_prefix "%(color)s%(asctime)s.%(msecs)03d TRACE %(name)s [01;35m%(instance)s[00m" |
Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 686 | } |
| 687 | |
Sean Dague | 5edae54 | 2017-03-21 20:50:24 -0400 | [diff] [blame] | 688 | function setup_systemd_logging { |
| 689 | local conf_file=$1 |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 690 | # NOTE(sdague): this is a nice to have, and means we're using the |
| 691 | # native systemd path, which provides for things like search on |
| 692 | # request-id. However, there may be an eventlet interaction here, |
| 693 | # so going off for now. |
Kirill Zaitsev | c0644f3 | 2017-05-24 13:00:47 +0300 | [diff] [blame] | 694 | USE_JOURNAL=$(trueorfalse False USE_JOURNAL) |
Eric Fried | 8cd310d | 2017-05-16 13:52:03 -0500 | [diff] [blame] | 695 | local pidstr="" |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 696 | if [[ "$USE_JOURNAL" == "True" ]]; then |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 697 | iniset $conf_file DEFAULT use_journal "True" |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 698 | # if we are using the journal directly, our process id is already correct |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 699 | else |
Eric Fried | 8cd310d | 2017-05-16 13:52:03 -0500 | [diff] [blame] | 700 | pidstr="(pid=%(process)d) " |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 701 | fi |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 702 | iniset $conf_file DEFAULT logging_debug_format_suffix "[00;33m{{${pidstr}%(funcName)s %(pathname)s:%(lineno)d}}[00m" |
Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 703 | |
Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 704 | iniset $conf_file DEFAULT logging_context_format_string "%(color)s%(levelname)s %(name)s [[01;36m%(global_request_id)s %(request_id)s [00;36m%(project_name)s %(user_name)s%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 705 | iniset $conf_file DEFAULT logging_default_format_string "%(color)s%(levelname)s %(name)s [[00;36m-%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" |
| 706 | iniset $conf_file DEFAULT logging_exception_prefix "ERROR %(name)s [01;35m%(instance)s[00m" |
Sean Dague | 5edae54 | 2017-03-21 20:50:24 -0400 | [diff] [blame] | 707 | } |
| 708 | |
Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 709 | function setup_standard_logging_identity { |
| 710 | local conf_file=$1 |
| 711 | iniset $conf_file DEFAULT logging_user_identity_format "%(project_name)s %(user_name)s" |
| 712 | } |
| 713 | |
Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 714 | # These functions are provided for basic fall-back functionality for |
Dean Troyer | dc97cb7 | 2015-03-28 08:20:50 -0500 | [diff] [blame] | 715 | # projects that include parts of DevStack (Grenade). stack.sh will |
| 716 | # override these with more specific versions for DevStack (with fancy |
Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 717 | # spinners, etc). We never override an existing version |
| 718 | if ! function_exists echo_summary; then |
| 719 | function echo_summary { |
| 720 | echo $@ |
| 721 | } |
| 722 | fi |
| 723 | if ! function_exists echo_nolog; then |
| 724 | function echo_nolog { |
| 725 | echo $@ |
| 726 | } |
| 727 | fi |
Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 728 | |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 729 | |
Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 730 | # create_disk - Create, configure, and mount a backing disk |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 731 | function create_disk { |
| 732 | local node_number |
| 733 | local disk_image=${1} |
| 734 | local storage_data_dir=${2} |
| 735 | local loopback_disk_size=${3} |
Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 736 | local key |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 737 | |
Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 738 | key=$(echo $disk_image | sed 's#/.##') |
| 739 | key="devstack-$key" |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 740 | |
Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 741 | destroy_disk $disk_image $storage_data_dir |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 742 | |
Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 743 | # Create an empty file of the correct size (and ensure the |
| 744 | # directory structure up to that path exists) |
| 745 | sudo mkdir -p $(dirname ${disk_image}) |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 746 | sudo truncate -s ${loopback_disk_size} ${disk_image} |
| 747 | |
| 748 | # Make a fresh XFS filesystem. Use bigger inodes so xattr can fit in |
| 749 | # a single inode. Keeping the default inode size (256) will result in multiple |
| 750 | # inodes being used to store xattr. Retrieving the xattr will be slower |
| 751 | # since we have to read multiple inodes. This statement is true for both |
| 752 | # Swift and Ceph. |
| 753 | sudo mkfs.xfs -f -i size=1024 ${disk_image} |
| 754 | |
Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 755 | # Install a new loopback fstab entry for this disk image, and mount it |
Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 756 | echo "$disk_image $storage_data_dir xfs loop,noatime,nodiratime,logbufs=8,comment=$key 0 0" | sudo tee -a /etc/fstab |
Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 757 | sudo mkdir -p $storage_data_dir |
Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 758 | sudo mount -v $storage_data_dir |
| 759 | } |
| 760 | |
| 761 | # Unmount, de-configure, and destroy a backing disk |
| 762 | function destroy_disk { |
| 763 | local disk_image=$1 |
| 764 | local storage_data_dir=$2 |
Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 765 | local key |
| 766 | |
| 767 | key=$(echo $disk_image | sed 's#/.##') |
| 768 | key="devstack-$key" |
Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 769 | |
| 770 | # Unmount the target, if mounted |
| 771 | if egrep -q $storage_data_dir /proc/mounts; then |
| 772 | sudo umount $storage_data_dir |
| 773 | fi |
| 774 | |
| 775 | # Clear any fstab rules |
Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 776 | sudo sed -i '/.*comment=$key.*/ d' /etc/fstab |
Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 777 | |
| 778 | # Delete the file |
Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 779 | sudo rm -f $disk_image |
Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 780 | } |
| 781 | |
Ihar Hrachyshka | 7b5c7dc | 2016-07-15 20:17:13 +0200 | [diff] [blame] | 782 | |
| 783 | # set_mtu - Set MTU on a device |
| 784 | function set_mtu { |
| 785 | local dev=$1 |
| 786 | local mtu=$2 |
| 787 | sudo ip link set mtu $mtu dev $dev |
| 788 | } |
| 789 | |
| 790 | |
Denis Buliga | 0bf75a4 | 2017-02-06 16:56:46 +0200 | [diff] [blame] | 791 | # running_in_container - Returns true otherwise false |
| 792 | function running_in_container { |
kesper | d18d7c8 | 2017-03-23 05:52:33 +0000 | [diff] [blame] | 793 | [[ $(systemd-detect-virt --container) != 'none' ]] |
Denis Buliga | 0bf75a4 | 2017-02-06 16:56:46 +0200 | [diff] [blame] | 794 | } |
| 795 | |
| 796 | |
Ihar Hrachyshka | b3a210f | 2016-09-29 13:26:30 +0000 | [diff] [blame] | 797 | # enable_kernel_bridge_firewall - Enable kernel support for bridge firewalling |
| 798 | function enable_kernel_bridge_firewall { |
| 799 | # Load bridge module. This module provides access to firewall for bridged |
| 800 | # frames; and also on older kernels (pre-3.18) it provides sysctl knobs to |
| 801 | # enable/disable bridge firewalling |
| 802 | sudo modprobe bridge |
| 803 | # For newer kernels (3.18+), those sysctl settings are split into a separate |
| 804 | # kernel module (br_netfilter). Load it too, if present. |
| 805 | sudo modprobe br_netfilter 2>> /dev/null || : |
| 806 | # Enable bridge firewalling in case it's disabled in kernel (upstream |
| 807 | # default is enabled, but some distributions may decide to change it). |
| 808 | # This is at least needed for RHEL 7.2 and earlier releases. |
Ihar Hrachyshka | 3f771b7 | 2016-12-17 04:12:24 +0000 | [diff] [blame] | 809 | for proto in ip ip6; do |
Ihar Hrachyshka | b3a210f | 2016-09-29 13:26:30 +0000 | [diff] [blame] | 810 | sudo sysctl -w net.bridge.bridge-nf-call-${proto}tables=1 |
| 811 | done |
| 812 | } |
| 813 | |
| 814 | |
Dan Smith | 1f55d38 | 2017-05-16 08:50:53 -0700 | [diff] [blame] | 815 | # Set a systemd system override |
| 816 | # |
| 817 | # This sets a system-side override in system.conf. A per-service |
| 818 | # override would be /etc/systemd/system/${service}.service/override.conf |
| 819 | function set_systemd_override { |
| 820 | local key="$1" |
| 821 | local value="$2" |
| 822 | |
| 823 | local sysconf="/etc/systemd/system.conf" |
| 824 | iniset -sudo "${sysconf}" "Manager" "$key" "$value" |
| 825 | echo "Set systemd system override for ${key}=${value}" |
| 826 | |
| 827 | sudo systemctl daemon-reload |
| 828 | } |
| 829 | |
Matthew Treinish | 309b99e | 2017-05-23 15:18:31 -0400 | [diff] [blame] | 830 | # Get a random port from the local port range |
| 831 | # |
| 832 | # This function returns an available port in the local port range. The search |
| 833 | # order is not truly random, but should be considered a random value by the |
| 834 | # user because it depends on the state of your local system. |
| 835 | function get_random_port { |
| 836 | read lower_port upper_port < /proc/sys/net/ipv4/ip_local_port_range |
| 837 | while true; do |
| 838 | for (( port = upper_port ; port >= lower_port ; port-- )); do |
| 839 | sudo lsof -i ":$port" &> /dev/null |
| 840 | if [[ $? > 0 ]] ; then |
| 841 | break 2 |
| 842 | fi |
| 843 | done |
| 844 | done |
| 845 | echo $port |
| 846 | } |
| 847 | |
Ian Wienand | 07cbc44 | 2017-06-30 12:29:19 +1000 | [diff] [blame] | 848 | # Save some state information |
| 849 | # |
| 850 | # Write out various useful state information to /etc/devstack-version |
Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 851 | function write_devstack_version { |
Dirk Mueller | 6bab832 | 2018-03-02 21:13:12 +0100 | [diff] [blame] | 852 | cat - <<EOF | sudo tee /etc/devstack-version >/dev/null |
Ian Wienand | 07cbc44 | 2017-06-30 12:29:19 +1000 | [diff] [blame] | 853 | DevStack Version: ${DEVSTACK_SERIES} |
| 854 | Change: $(git log --format="%H %s %ci" -1) |
| 855 | OS Version: ${os_VENDOR} ${os_RELEASE} ${os_CODENAME} |
Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 856 | EOF |
Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 857 | } |
| 858 | |
Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 859 | # Restore xtrace |
Ian Wienand | 523f488 | 2015-10-13 11:03:03 +1100 | [diff] [blame] | 860 | $_XTRACE_FUNCTIONS |
Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 861 | |
Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 862 | # Local variables: |
Sean Dague | 584d90e | 2013-03-29 14:34:53 -0400 | [diff] [blame] | 863 | # mode: shell-script |
Andrew Laski | f900bd7 | 2012-09-05 17:23:14 -0400 | [diff] [blame] | 864 | # End: |