| Sean Dague | e263c82 | 2014-12-05 14:25:28 -0500 | [diff] [blame] | 1 | #!/bin/bash | 
|  | 2 | # | 
| Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 3 | # functions - DevStack-specific functions | 
| Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 4 | # | 
| Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 5 | # The following variables are assumed to be defined by certain functions: | 
| Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 6 | # | 
| Dean Troyer | d8864fe | 2014-02-17 11:00:42 -0600 | [diff] [blame] | 7 | # - ``DATABASE_BACKENDS`` | 
| Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 8 | # - ``ENABLED_SERVICES`` | 
| Adam Spiers | 6a5aa7c | 2013-10-24 11:27:02 +0100 | [diff] [blame] | 9 | # - ``FILES`` | 
|  | 10 | # - ``GLANCE_HOSTPORT`` | 
| Dean Troyer | d8864fe | 2014-02-17 11:00:42 -0600 | [diff] [blame] | 11 | # | 
| Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 12 |  | 
| Ian Wienand | 4ffb454 | 2015-06-30 11:00:32 +1000 | [diff] [blame] | 13 | # ensure we don't re-source this in the same environment | 
|  | 14 | [[ -z "$_DEVSTACK_FUNCTIONS" ]] || return 0 | 
| Sean Dague | afef8bf | 2017-03-06 14:07:23 -0500 | [diff] [blame] | 15 | declare -r -g _DEVSTACK_FUNCTIONS=1 | 
| Ian Wienand | 4ffb454 | 2015-06-30 11:00:32 +1000 | [diff] [blame] | 16 |  | 
| Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 17 | # Include the common functions | 
|  | 18 | FUNC_DIR=$(cd $(dirname "${BASH_SOURCE:-$0}") && pwd) | 
|  | 19 | source ${FUNC_DIR}/functions-common | 
| Dean Troyer | bf2ad70 | 2015-03-09 15:16:10 -0500 | [diff] [blame] | 20 | source ${FUNC_DIR}/inc/ini-config | 
| Eric Fried | 2468cea | 2019-07-25 13:18:58 -0500 | [diff] [blame] | 21 | source ${FUNC_DIR}/inc/meta-config | 
| Dean Troyer | 490430d | 2015-01-30 14:38:35 -0600 | [diff] [blame] | 22 | source ${FUNC_DIR}/inc/python | 
| Dean Troyer | 32d6bc6 | 2015-03-29 14:16:44 -0500 | [diff] [blame] | 23 | source ${FUNC_DIR}/inc/rootwrap | 
| Dean Troyer | 7f9aa71 | 2012-01-31 12:11:56 -0600 | [diff] [blame] | 24 |  | 
| Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 25 | # Save trace setting | 
| Ian Wienand | 523f488 | 2015-10-13 11:03:03 +1100 | [diff] [blame] | 26 | _XTRACE_FUNCTIONS=$(set +o | grep xtrace) | 
| Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 27 | set +o xtrace | 
|  | 28 |  | 
| Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 29 | # Check if a function already exists | 
|  | 30 | function function_exists { | 
|  | 31 | declare -f -F $1 > /dev/null | 
|  | 32 | } | 
| Dean Troyer | 7f9aa71 | 2012-01-31 12:11:56 -0600 | [diff] [blame] | 33 |  | 
| Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 34 | # short_source prints out the current location of the caller in a way | 
|  | 35 | # that strips redundant directories. This is useful for PS4 usage. | 
|  | 36 | function short_source { | 
|  | 37 | saveIFS=$IFS | 
|  | 38 | IFS=" " | 
|  | 39 | called=($(caller 0)) | 
|  | 40 | IFS=$saveIFS | 
|  | 41 | file=${called[2]} | 
|  | 42 | file=${file#$RC_DIR/} | 
|  | 43 | printf "%-40s " "$file:${called[1]}:${called[0]}" | 
|  | 44 | } | 
| John L. Villalovos | daa7a41 | 2016-05-05 12:50:52 -0700 | [diff] [blame] | 45 | # PS4 is exported to child shells and uses the 'short_source' function, so | 
|  | 46 | # export it so child shells have access to the 'short_source' function also. | 
|  | 47 | export -f short_source | 
| Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 48 |  | 
| Monty Taylor | d8bb220 | 2017-09-03 12:13:59 -0500 | [diff] [blame] | 49 | # Download a file from a URL | 
|  | 50 | # | 
|  | 51 | # Will check cache (in $FILES) or download given URL. | 
|  | 52 | # | 
|  | 53 | # Argument is the URL to the remote file | 
|  | 54 | # | 
|  | 55 | # Will echo the local path to the file as the output.  Will die on | 
|  | 56 | # failure to download. | 
|  | 57 | # | 
|  | 58 | # Files can be pre-cached for CI environments, see EXTRA_CACHE_URLS | 
|  | 59 | # and tools/image_list.sh | 
|  | 60 | function get_extra_file { | 
|  | 61 | local file_url=$1 | 
|  | 62 |  | 
|  | 63 | file_name=$(basename "$file_url") | 
|  | 64 | if [[ $file_url != file* ]]; then | 
|  | 65 | # If the file isn't cache, download it | 
|  | 66 | if [[ ! -f $FILES/$file_name ]]; then | 
| yuanke wei | c652a49 | 2017-09-17 22:18:07 +0800 | [diff] [blame] | 67 | wget --progress=dot:giga -t 2 -c $file_url -O $FILES/$file_name | 
| Monty Taylor | d8bb220 | 2017-09-03 12:13:59 -0500 | [diff] [blame] | 68 | if [[ $? -ne 0 ]]; then | 
|  | 69 | die "$file_url could not be downloaded" | 
|  | 70 | fi | 
|  | 71 | fi | 
|  | 72 | echo "$FILES/$file_name" | 
|  | 73 | return | 
|  | 74 | else | 
|  | 75 | # just strip the file:// bit and that's the path to the file | 
|  | 76 | echo $file_url | sed 's/$file:\/\///g' | 
|  | 77 | fi | 
|  | 78 | } | 
|  | 79 |  | 
| Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 80 | # Generate image property arguments for OSC | 
|  | 81 | # | 
|  | 82 | # Arguments: properties, one per, like propname=value | 
|  | 83 | # | 
|  | 84 | # Result is --property propname1=value1 --property propname2=value2 | 
|  | 85 | function _image_properties_to_arg { | 
|  | 86 | local result="" | 
|  | 87 | for property in $*; do | 
|  | 88 | result+=" --property $property" | 
|  | 89 | done | 
|  | 90 | echo $result | 
|  | 91 | } | 
|  | 92 |  | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 93 | # Upload an image to glance using the configured mechanism | 
|  | 94 | # | 
|  | 95 | # Arguments: | 
|  | 96 | #  image name | 
|  | 97 | #  container format | 
|  | 98 | #  disk format | 
|  | 99 | #  path to image file | 
|  | 100 | #  optional properties (format of propname=value) | 
|  | 101 | # | 
|  | 102 | function _upload_image { | 
|  | 103 | local image_name="$1" | 
|  | 104 | shift | 
|  | 105 | local container="$1" | 
|  | 106 | shift | 
|  | 107 | local disk="$1" | 
|  | 108 | shift | 
|  | 109 | local image="$1" | 
|  | 110 | shift | 
|  | 111 | local properties | 
|  | 112 | local useimport | 
|  | 113 |  | 
| Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 114 | properties=$(_image_properties_to_arg $*) | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 115 |  | 
|  | 116 | if [[ "$GLANCE_USE_IMPORT_WORKFLOW" == "True" ]]; then | 
| Dan Smith | 33f8f6e | 2020-07-21 19:41:48 -0700 | [diff] [blame] | 117 | useimport="--import" | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 118 | fi | 
|  | 119 |  | 
|  | 120 | openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name" --public --container-format "$container" --disk-format "$disk" $useimport $properties < "${image}" | 
|  | 121 | } | 
| Sean Dague | 646085d | 2016-03-21 17:00:51 -0400 | [diff] [blame] | 122 |  | 
| Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 123 | # Retrieve an image from a URL and upload into Glance. | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 124 | # Uses the following variables: | 
| Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 125 | # | 
|  | 126 | # - ``FILES`` must be set to the cache dir | 
|  | 127 | # - ``GLANCE_HOSTPORT`` | 
|  | 128 | # | 
| Peter Stachowski | 5aeea6a | 2015-09-22 19:38:02 +0000 | [diff] [blame] | 129 | # upload_image image-url | 
| Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 130 | function upload_image { | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 131 | local image_url=$1 | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 132 |  | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 133 | local image image_fname image_name | 
|  | 134 |  | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 135 | # Create a directory for the downloaded image tarballs. | 
|  | 136 | mkdir -p $FILES/images | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 137 | image_fname=`basename "$image_url"` | 
| Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 138 | if [[ $image_url != file* ]]; then | 
| Sreeram Yerrapragada | 314af0a | 2014-03-03 21:34:45 -0800 | [diff] [blame] | 139 | # Downloads the image (uec ami+akistyle), then extracts it. | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 140 | if [[ ! -f $FILES/$image_fname || "$(stat -c "%s" $FILES/$image_fname)" = "0" ]]; then | 
| Attila Fazekas | 057d6ae | 2015-01-13 14:01:26 +0100 | [diff] [blame] | 141 | wget --progress=dot:giga -c $image_url -O $FILES/$image_fname | 
| Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 142 | if [[ $? -ne 0 ]]; then | 
|  | 143 | echo "Not found: $image_url" | 
|  | 144 | return | 
|  | 145 | fi | 
| Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 146 | fi | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 147 | image="$FILES/${image_fname}" | 
| Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 148 | else | 
| Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 149 | # File based URL (RFC 1738): ``file://host/path`` | 
| Arnaud Legendre | 3e43944 | 2013-11-15 16:06:03 -0800 | [diff] [blame] | 150 | # Remote files are not considered here. | 
| Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 151 | # unix: ``file:///home/user/path/file`` | 
|  | 152 | # windows: ``file:///C:/Documents%20and%20Settings/user/path/file`` | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 153 | image=$(echo $image_url | sed "s/^file:\/\///g") | 
|  | 154 | if [[ ! -f $image || "$(stat -c "%s" $image)" == "0" ]]; then | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 155 | echo "Not found: $image_url" | 
|  | 156 | return | 
|  | 157 | fi | 
|  | 158 | fi | 
|  | 159 |  | 
|  | 160 | # OpenVZ-format images are provided as .tar.gz, but not decompressed prior to loading | 
|  | 161 | if [[ "$image_url" =~ 'openvz' ]]; then | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 162 | image_name="${image_fname%.tar.gz}" | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 163 | _upload_image "$image_name" ami ami "$image" | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 164 | return | 
|  | 165 | fi | 
|  | 166 |  | 
| Sreeram Yerrapragada | cbaff86 | 2013-07-24 19:49:23 -0700 | [diff] [blame] | 167 | # vmdk format images | 
|  | 168 | if [[ "$image_url" =~ '.vmdk' ]]; then | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 169 | image_name="${image_fname%.vmdk}" | 
| Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 170 |  | 
|  | 171 | # Before we can upload vmdk type images to glance, we need to know it's | 
|  | 172 | # disk type, storage adapter, and networking adapter. These values are | 
| Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 173 | # passed to glance as custom properties. | 
| Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 174 | # We take these values from the vmdk file if populated. Otherwise, we use | 
| Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 175 | # vmdk filename, which is expected in the following format: | 
|  | 176 | # | 
| Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 177 | #     <name>-<disk type>;<storage adapter>;<network adapter> | 
| Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 178 | # | 
|  | 179 | # If the filename does not follow the above format then the vsphere | 
|  | 180 | # driver will supply default values. | 
| Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 181 |  | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 182 | local vmdk_disktype="" | 
| Sabari Kumar Murugesan | 88cde0b | 2014-12-04 17:48:26 -0800 | [diff] [blame] | 183 | local vmdk_net_adapter="e1000" | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 184 | local path_len | 
| Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 185 |  | 
| Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 186 | # vmdk adapter type | 
| Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 187 | local vmdk_adapter_type | 
|  | 188 | vmdk_adapter_type="$(head -25 $image | { grep -a -F -m 1 'ddb.adapterType =' $image || true; })" | 
| Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 189 | vmdk_adapter_type="${vmdk_adapter_type#*\"}" | 
|  | 190 | vmdk_adapter_type="${vmdk_adapter_type%?}" | 
|  | 191 |  | 
|  | 192 | # vmdk disk type | 
| Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 193 | local vmdk_create_type | 
|  | 194 | vmdk_create_type="$(head -25 $image | { grep -a -F -m 1 'createType=' $image || true; })" | 
| Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 195 | vmdk_create_type="${vmdk_create_type#*\"}" | 
| Arnaud Legendre | 8dad4bd | 2014-02-03 17:57:39 -0800 | [diff] [blame] | 196 | vmdk_create_type="${vmdk_create_type%\"*}" | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 197 |  | 
|  | 198 | descriptor_data_pair_msg="Monolithic flat and VMFS disks "` | 
| Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 199 | `"should use a descriptor-data pair." | 
| Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 200 | if [[ "$vmdk_create_type" = "monolithicSparse" ]]; then | 
|  | 201 | vmdk_disktype="sparse" | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 202 | elif [[ "$vmdk_create_type" = "monolithicFlat" || "$vmdk_create_type" = "vmfs" ]]; then | 
| Dean Troyer | 3324f19 | 2014-09-18 09:26:39 -0500 | [diff] [blame] | 203 | # Attempt to retrieve the ``*-flat.vmdk`` | 
| Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 204 | local flat_fname | 
|  | 205 | flat_fname="$(head -25 $image | { grep -G 'RW\|RDONLY [0-9]+ FLAT\|VMFS' $image || true; })" | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 206 | flat_fname="${flat_fname#*\"}" | 
|  | 207 | flat_fname="${flat_fname%?}" | 
| Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 208 | if [[ -z "$flat_fname" ]]; then | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 209 | flat_fname="$image_name-flat.vmdk" | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 210 | fi | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 211 | path_len=`expr ${#image_url} - ${#image_fname}` | 
|  | 212 | local flat_url="${image_url:0:$path_len}$flat_fname" | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 213 | warn $LINENO "$descriptor_data_pair_msg"` | 
| Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 214 | `" Attempt to retrieve the *-flat.vmdk: $flat_url" | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 215 | if [[ $flat_url != file* ]]; then | 
|  | 216 | if [[ ! -f $FILES/$flat_fname || \ | 
|  | 217 | "$(stat -c "%s" $FILES/$flat_fname)" = "0" ]]; then | 
| Attila Fazekas | 057d6ae | 2015-01-13 14:01:26 +0100 | [diff] [blame] | 218 | wget --progress=dot:giga -c $flat_url -O $FILES/$flat_fname | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 219 | fi | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 220 | image="$FILES/${flat_fname}" | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 221 | else | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 222 | image=$(echo $flat_url | sed "s/^file:\/\///g") | 
|  | 223 | if [[ ! -f $image || "$(stat -c "%s" $image)" == "0" ]]; then | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 224 | echo "Flat disk not found: $flat_url" | 
| Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 225 | return 1 | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 226 | fi | 
|  | 227 | fi | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 228 | image_name="${flat_fname}" | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 229 | vmdk_disktype="preallocated" | 
| Arnaud Legendre | 8dad4bd | 2014-02-03 17:57:39 -0800 | [diff] [blame] | 230 | elif [[ "$vmdk_create_type" = "streamOptimized" ]]; then | 
|  | 231 | vmdk_disktype="streamOptimized" | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 232 | elif [[ -z "$vmdk_create_type" ]]; then | 
|  | 233 | # *-flat.vmdk provided: attempt to retrieve the descriptor (*.vmdk) | 
|  | 234 | # to retrieve appropriate metadata | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 235 | if [[ ${image_name: -5} != "-flat" ]]; then | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 236 | warn $LINENO "Expected filename suffix: '-flat'."` | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 237 | `" Filename provided: ${image_name}" | 
| Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 238 | else | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 239 | descriptor_fname="${image_name:0:${#image_name} - 5}.vmdk" | 
|  | 240 | path_len=`expr ${#image_url} - ${#image_fname}` | 
|  | 241 | local flat_path="${image_url:0:$path_len}" | 
|  | 242 | local descriptor_url=$flat_path$descriptor_fname | 
| Sreeram Yerrapragada | 9c6d284 | 2014-03-10 14:12:58 -0700 | [diff] [blame] | 243 | warn $LINENO "$descriptor_data_pair_msg"` | 
|  | 244 | `" Attempt to retrieve the descriptor *.vmdk: $descriptor_url" | 
|  | 245 | if [[ $flat_path != file* ]]; then | 
|  | 246 | if [[ ! -f $FILES/$descriptor_fname || \ | 
|  | 247 | "$(stat -c "%s" $FILES/$descriptor_fname)" = "0" ]]; then | 
|  | 248 | wget -c $descriptor_url -O $FILES/$descriptor_fname | 
|  | 249 | fi | 
|  | 250 | descriptor_url="$FILES/$descriptor_fname" | 
|  | 251 | else | 
|  | 252 | descriptor_url=$(echo $descriptor_url | sed "s/^file:\/\///g") | 
|  | 253 | if [[ ! -f $descriptor_url || \ | 
|  | 254 | "$(stat -c "%s" $descriptor_url)" == "0" ]]; then | 
|  | 255 | echo "Descriptor not found: $descriptor_url" | 
|  | 256 | return 1 | 
| Arnaud Legendre | 90bcd2f | 2013-11-22 16:05:39 -0800 | [diff] [blame] | 257 | fi | 
|  | 258 | fi | 
| Ryan Hsu | 99b622a | 2014-03-05 15:35:49 -0800 | [diff] [blame] | 259 | vmdk_adapter_type="$(head -25 $descriptor_url | { grep -a -F -m 1 'ddb.adapterType =' $descriptor_url || true; })" | 
|  | 260 | vmdk_adapter_type="${vmdk_adapter_type#*\"}" | 
|  | 261 | vmdk_adapter_type="${vmdk_adapter_type%?}" | 
|  | 262 | fi | 
| Isaku Yamahata | 6681a4f | 2014-01-10 15:28:29 +0900 | [diff] [blame] | 263 | vmdk_disktype="preallocated" | 
| Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 264 | else | 
| Arnaud Legendre | 5ea53ee | 2013-11-01 16:42:54 -0700 | [diff] [blame] | 265 | vmdk_disktype="preallocated" | 
|  | 266 | fi | 
| Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 267 |  | 
|  | 268 | # NOTE: For backwards compatibility reasons, colons may be used in place | 
|  | 269 | # of semi-colons for property delimiters but they are not permitted | 
|  | 270 | # characters in NTFS filesystems. | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 271 | property_string=`echo "$image_name" | { grep -oP '(?<=-)(?!.*-).*[:;].*[:;].*$' || true; }` | 
| Ryan Hsu | bfb3e5e | 2013-11-11 21:20:14 -0800 | [diff] [blame] | 272 | IFS=':;' read -a props <<< "$property_string" | 
|  | 273 | vmdk_disktype="${props[0]:-$vmdk_disktype}" | 
|  | 274 | vmdk_adapter_type="${props[1]:-$vmdk_adapter_type}" | 
|  | 275 | vmdk_net_adapter="${props[2]:-$vmdk_net_adapter}" | 
| Ryan Hsu | a6273b9 | 2013-09-04 23:51:29 -0700 | [diff] [blame] | 276 |  | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 277 | _upload_image "$image_name" bare vmdk "$image" vmware_disktype="$vmdk_disktype" vmware_adaptertype="$vmdk_adapter_type" hw_vif_model="$vmdk_net_adapter" | 
|  | 278 |  | 
| Sreeram Yerrapragada | cbaff86 | 2013-07-24 19:49:23 -0700 | [diff] [blame] | 279 | return | 
|  | 280 | fi | 
|  | 281 |  | 
| Mate Lakat | bc2ef92 | 2013-08-15 18:06:59 +0100 | [diff] [blame] | 282 | # XenServer-vhd-ovf-format images are provided as .vhd.tgz | 
| Davanum Srinivas | 316ed6c | 2013-02-06 15:29:49 -0500 | [diff] [blame] | 283 | # and should not be decompressed prior to loading | 
|  | 284 | if [[ "$image_url" =~ '.vhd.tgz' ]]; then | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 285 | image_name="${image_fname%.vhd.tgz}" | 
|  | 286 | local force_vm_mode="" | 
|  | 287 | if [[ "$image_name" =~ 'cirros' ]]; then | 
| Bob Ball | f1a2dbf | 2014-03-19 11:08:54 +0000 | [diff] [blame] | 288 | # Cirros VHD image currently only boots in PV mode. | 
|  | 289 | # Nova defaults to PV for all VHD images, but | 
|  | 290 | # the glance setting is needed for booting | 
|  | 291 | # directly from volume. | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 292 | force_vm_mode="vm_mode=xen" | 
| Bob Ball | f1a2dbf | 2014-03-19 11:08:54 +0000 | [diff] [blame] | 293 | fi | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 294 | _upload_image "$image_name" ovf vhd "$image" $force_vm_mode | 
| Davanum Srinivas | 316ed6c | 2013-02-06 15:29:49 -0500 | [diff] [blame] | 295 | return | 
|  | 296 | fi | 
|  | 297 |  | 
| Mate Lakat | bc2ef92 | 2013-08-15 18:06:59 +0100 | [diff] [blame] | 298 | # .xen-raw.tgz suggests a Xen capable raw image inside a tgz. | 
|  | 299 | # and should not be decompressed prior to loading. | 
|  | 300 | # Setting metadata, so PV mode is used. | 
|  | 301 | if [[ "$image_url" =~ '.xen-raw.tgz' ]]; then | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 302 | image_name="${image_fname%.xen-raw.tgz}" | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 303 | _upload_image "$image_name" tgz raw "$image" vm_mode=xen | 
| Mate Lakat | bc2ef92 | 2013-08-15 18:06:59 +0100 | [diff] [blame] | 304 | return | 
|  | 305 | fi | 
|  | 306 |  | 
| Maxim Nestratov | 54ee8a8 | 2015-07-15 11:47:11 +0300 | [diff] [blame] | 307 | if [[ "$image_url" =~ '.hds' ]]; then | 
|  | 308 | image_name="${image_fname%.hds}" | 
|  | 309 | vm_mode=${image_name##*-} | 
|  | 310 | if [[ $vm_mode != 'exe' && $vm_mode != 'hvm' ]]; then | 
|  | 311 | die $LINENO "Unknown vm_mode=${vm_mode} for Virtuozzo image" | 
|  | 312 | fi | 
|  | 313 |  | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 314 | _upload_image "$image_name" bare ploop "$image" vm_mode=$vm_mode | 
| Maxim Nestratov | 54ee8a8 | 2015-07-15 11:47:11 +0300 | [diff] [blame] | 315 | return | 
|  | 316 | fi | 
|  | 317 |  | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 318 | local kernel="" | 
|  | 319 | local ramdisk="" | 
|  | 320 | local disk_format="" | 
|  | 321 | local container_format="" | 
|  | 322 | local unpack="" | 
| Dan Smith | 49ad485 | 2020-07-15 14:54:22 -0700 | [diff] [blame] | 323 | local img_property="" | 
|  | 324 |  | 
|  | 325 | # NOTE(danms): If we're on libvirt/qemu or libvirt/kvm, set the hw_rng_model | 
|  | 326 | # to libvirt in the image properties. | 
|  | 327 | if [[ "$VIRT_DRIVER" == "libvirt" ]]; then | 
|  | 328 | if [[ "$LIBVIRT_TYPE" == "qemu" || "$LIBVIRT_TYPE" == "kvm" ]]; then | 
|  | 329 | img_property="hw_rng_model=virtio" | 
|  | 330 | fi | 
|  | 331 | fi | 
|  | 332 |  | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 333 | case "$image_fname" in | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 334 | *.tar.gz|*.tgz) | 
|  | 335 | # Extract ami and aki files | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 336 | [ "${image_fname%.tar.gz}" != "$image_fname" ] && | 
|  | 337 | image_name="${image_fname%.tar.gz}" || | 
|  | 338 | image_name="${image_fname%.tgz}" | 
|  | 339 | local xdir="$FILES/images/$image_name" | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 340 | rm -Rf "$xdir"; | 
|  | 341 | mkdir "$xdir" | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 342 | tar -zxf $image -C "$xdir" | 
|  | 343 | kernel=$(for f in "$xdir/"*-vmlinuz* "$xdir/"aki-*/image; do | 
| Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 344 | [ -f "$f" ] && echo "$f" && break; done; true) | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 345 | ramdisk=$(for f in "$xdir/"*-initrd* "$xdir/"ari-*/image; do | 
| Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 346 | [ -f "$f" ] && echo "$f" && break; done; true) | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 347 | image=$(for f in "$xdir/"*.img "$xdir/"ami-*/image; do | 
| Sean Dague | 537d402 | 2013-10-22 07:43:22 -0400 | [diff] [blame] | 348 | [ -f "$f" ] && echo "$f" && break; done; true) | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 349 | if [[ -z "$image_name" ]]; then | 
|  | 350 | image_name=$(basename "$image" ".img") | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 351 | fi | 
|  | 352 | ;; | 
|  | 353 | *.img) | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 354 | image_name=$(basename "$image" ".img") | 
| Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 355 | local format | 
|  | 356 | format=$(qemu-img info ${image} | awk '/^file format/ { print $3; exit }') | 
| Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 357 | if [[ ",qcow2,raw,vdi,vmdk,vpc," =~ ",$format," ]]; then | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 358 | disk_format=$format | 
| Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 359 | else | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 360 | disk_format=raw | 
| Dean Troyer | 636a3ff | 2012-09-14 11:36:07 -0500 | [diff] [blame] | 361 | fi | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 362 | container_format=bare | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 363 | ;; | 
|  | 364 | *.img.gz) | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 365 | image_name=$(basename "$image" ".img.gz") | 
|  | 366 | disk_format=raw | 
|  | 367 | container_format=bare | 
|  | 368 | unpack=zcat | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 369 | ;; | 
| Hongbin Lu | 3feceb0 | 2016-04-17 11:11:58 -0400 | [diff] [blame] | 370 | *.img.bz2) | 
|  | 371 | image_name=$(basename "$image" ".img.bz2") | 
|  | 372 | disk_format=qcow2 | 
|  | 373 | container_format=bare | 
|  | 374 | unpack=bunzip2 | 
|  | 375 | ;; | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 376 | *.qcow2) | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 377 | image_name=$(basename "$image" ".qcow2") | 
|  | 378 | disk_format=qcow2 | 
|  | 379 | container_format=bare | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 380 | ;; | 
| Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 381 | *.qcow2.xz) | 
|  | 382 | image_name=$(basename "$image" ".qcow2.xz") | 
|  | 383 | disk_format=qcow2 | 
|  | 384 | container_format=bare | 
|  | 385 | unpack=unxz | 
|  | 386 | ;; | 
| Angel Noam | f24e299 | 2017-05-11 15:13:29 +0300 | [diff] [blame] | 387 | *.raw) | 
|  | 388 | image_name=$(basename "$image" ".raw") | 
|  | 389 | disk_format=raw | 
|  | 390 | container_format=bare | 
|  | 391 | ;; | 
| Jonathan Michalon | 0680204 | 2013-03-21 14:29:58 +0100 | [diff] [blame] | 392 | *.iso) | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 393 | image_name=$(basename "$image" ".iso") | 
|  | 394 | disk_format=iso | 
|  | 395 | container_format=bare | 
| Jonathan Michalon | 0680204 | 2013-03-21 14:29:58 +0100 | [diff] [blame] | 396 | ;; | 
| Alessandro Pilotti | ca82394 | 2014-08-07 02:05:26 +0300 | [diff] [blame] | 397 | *.vhd|*.vhdx|*.vhd.gz|*.vhdx.gz) | 
|  | 398 | local extension="${image_fname#*.}" | 
|  | 399 | image_name=$(basename "$image" ".$extension") | 
| Lucian Petrut | 2715fd0 | 2017-05-24 11:31:56 +0300 | [diff] [blame] | 400 | disk_format=$(echo $image_fname | grep -oP '(?<=\.)vhdx?(?=\.|$)') | 
| Alessandro Pilotti | ca82394 | 2014-08-07 02:05:26 +0300 | [diff] [blame] | 401 | container_format=bare | 
|  | 402 | if [ "${image_fname##*.}" == "gz" ]; then | 
|  | 403 | unpack=zcat | 
|  | 404 | fi | 
|  | 405 | ;; | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 406 | *) echo "Do not know what to do with $image_fname"; false;; | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 407 | esac | 
|  | 408 |  | 
| Rafael Folco | 72f530f | 2016-02-09 07:08:38 -0600 | [diff] [blame] | 409 | if is_arch "ppc64le" || is_arch "ppc64" || is_arch "ppc"; then | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 410 | img_property="$img_property hw_cdrom_bus=scsi os_command_line=console=hvc0" | 
| Rafael Folco | ab77587 | 2013-12-02 14:04:32 -0200 | [diff] [blame] | 411 | fi | 
|  | 412 |  | 
| Clark Laughlin | fcc3f6e | 2015-04-07 16:31:47 +0000 | [diff] [blame] | 413 | if is_arch "aarch64"; then | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 414 | img_property="$img_property hw_machine_type=virt hw_cdrom_bus=scsi hw_scsi_model=virtio-scsi os_command_line='console=ttyAMA0'" | 
| Clark Laughlin | fcc3f6e | 2015-04-07 16:31:47 +0000 | [diff] [blame] | 415 | fi | 
|  | 416 |  | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 417 | if [ "$container_format" = "bare" ]; then | 
|  | 418 | if [ "$unpack" = "zcat" ]; then | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 419 | _upload_image "$image_name" $container_format $disk_format <(zcat --force "$image") $img_property | 
| Hongbin Lu | 3feceb0 | 2016-04-17 11:11:58 -0400 | [diff] [blame] | 420 | elif [ "$unpack" = "bunzip2" ]; then | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 421 | _upload_image "$image_name" $container_format $disk_format <(bunzip2 -cdk "$image") $img_property | 
| Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 422 | elif [ "$unpack" = "unxz" ]; then | 
|  | 423 | # NOTE(brtknr): unxz the file first and cleanup afterwards to | 
|  | 424 | # prevent timeout while Glance tries to upload image (e.g. to Swift). | 
|  | 425 | local tmp_dir | 
|  | 426 | local image_path | 
|  | 427 | tmp_dir=$(mktemp -d) | 
|  | 428 | image_path="$tmp_dir/$image_name" | 
|  | 429 | unxz -cv "${image}" > "$image_path" | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 430 | _upload_image "$image_name" $container_format $disk_format "$image_path" $img_property | 
| Bharat Kunwar | f70cb70 | 2020-04-20 09:53:25 +0000 | [diff] [blame] | 431 | rm -rf $tmp_dir | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 432 | else | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 433 | _upload_image "$image_name" $container_format $disk_format "$image" $img_property | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 434 | fi | 
|  | 435 | else | 
|  | 436 | # Use glance client to add the kernel the root filesystem. | 
|  | 437 | # We parse the results of the first upload to get the glance ID of the | 
|  | 438 | # kernel for use when uploading the root filesystem. | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 439 | local kernel_id="" ramdisk_id=""; | 
|  | 440 | if [ -n "$kernel" ]; then | 
| Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 441 | kernel_id=$(openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name-kernel" $(_image_properties_to_arg $img_property) --public --container-format aki --disk-format aki < "$kernel" | grep ' id ' | get_field 2) | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 442 | fi | 
| Dean Troyer | e9f7667 | 2014-07-25 11:09:36 -0500 | [diff] [blame] | 443 | if [ -n "$ramdisk" ]; then | 
| Dan Smith | 2614c1b | 2020-07-15 14:41:38 -0700 | [diff] [blame] | 444 | ramdisk_id=$(openstack --os-cloud=devstack-admin --os-region-name="$REGION_NAME" image create "$image_name-ramdisk" $(_image_properties_to_arg $img_property) --public --container-format ari --disk-format ari < "$ramdisk" | grep ' id ' | get_field 2) | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 445 | fi | 
| Abhishek Kekane | 73ad976 | 2020-06-16 15:20:48 +0000 | [diff] [blame] | 446 | _upload_image "${image_name%.img}" ami ami "$image" ${kernel_id:+ kernel_id=$kernel_id} ${ramdisk_id:+ ramdisk_id=$ramdisk_id} $img_property | 
| Dean Troyer | ca0e3d0 | 2012-04-13 15:58:37 -0500 | [diff] [blame] | 447 | fi | 
|  | 448 | } | 
|  | 449 |  | 
| Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 450 |  | 
| Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 451 | # Set the database backend to use | 
|  | 452 | # When called from stackrc/localrc DATABASE_BACKENDS has not been | 
|  | 453 | # initialized yet, just save the configuration selection and call back later | 
|  | 454 | # to validate it. | 
| Adam Spiers | cb96159 | 2013-10-05 12:11:07 +0100 | [diff] [blame] | 455 | # | 
| Matt Riedemann | b14665f | 2019-10-17 19:34:05 +0000 | [diff] [blame] | 456 | # ``$1`` - the name of the database backend to use (mysql, postgresql, ...) | 
| Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 457 | function use_database { | 
|  | 458 | if [[ -z "$DATABASE_BACKENDS" ]]; then | 
| Dean Troyer | afc29fe | 2013-02-07 15:56:24 -0600 | [diff] [blame] | 459 | # No backends registered means this is likely called from ``localrc`` | 
|  | 460 | # This is now deprecated usage | 
| Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 461 | DATABASE_TYPE=$1 | 
| Sean Dague | 72ad942 | 2015-10-07 11:51:40 -0400 | [diff] [blame] | 462 | deprecated "The database backend needs to be properly set in ENABLED_SERVICES; use_database is deprecated localrc" | 
| Attila Fazekas | 251d3b5 | 2012-12-16 15:05:44 +0100 | [diff] [blame] | 463 | else | 
| Dean Troyer | afc29fe | 2013-02-07 15:56:24 -0600 | [diff] [blame] | 464 | # This should no longer get called...here for posterity | 
| Attila Fazekas | 251d3b5 | 2012-12-16 15:05:44 +0100 | [diff] [blame] | 465 | use_exclusive_service DATABASE_BACKENDS DATABASE_TYPE $1 | 
| Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 466 | fi | 
| Dean Troyer | c1b486a | 2012-11-05 14:26:09 -0600 | [diff] [blame] | 467 | } | 
|  | 468 |  | 
| sridhargaddam | b5ab646 | 2015-02-24 07:23:24 +0000 | [diff] [blame] | 469 | #Macro for curl statements. curl requires -g option for literal IPv6 addresses. | 
|  | 470 | CURL_GET="${CURL_GET:-curl -g}" | 
| Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 471 |  | 
| Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 472 | # Wait for an HTTP server to start answering requests | 
|  | 473 | # wait_for_service timeout url | 
| Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 474 | # | 
|  | 475 | # If the service we want is behind a proxy, the proxy may be available | 
|  | 476 | # before the service. Compliant proxies will return a 503 in this case | 
|  | 477 | # Loop until we get something else. | 
|  | 478 | # Also check for the case where there is no proxy and the service just | 
|  | 479 | # hasn't started yet. curl returns 7 for Failed to connect to host. | 
| Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 480 | function wait_for_service { | 
| Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 481 | local timeout=$1 | 
|  | 482 | local url=$2 | 
| Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 483 | local rval=0 | 
| Atsushi SAKAI | 2ca8af4 | 2015-12-08 15:36:13 +0900 | [diff] [blame] | 484 | time_start "wait_for_service" | 
| Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 485 | timeout $timeout bash -x <<EOF || rval=$? | 
|  | 486 | while [[ \$( ${CURL_GET} -k --noproxy '*' -s -o /dev/null -w '%{http_code}' ${url} ) == 503 || \$? -eq 7 ]]; do | 
|  | 487 | sleep 1 | 
|  | 488 | done | 
|  | 489 | EOF | 
| Atsushi SAKAI | 2ca8af4 | 2015-12-08 15:36:13 +0900 | [diff] [blame] | 490 | time_stop "wait_for_service" | 
| Rob Crittenden | 21e3d1e | 2016-05-06 12:35:22 -0400 | [diff] [blame] | 491 | return $rval | 
| Dean Troyer | 3a3a2ba | 2012-12-11 15:26:24 -0600 | [diff] [blame] | 492 | } | 
|  | 493 |  | 
| Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 494 | function wait_for_compute { | 
|  | 495 | local timeout=$1 | 
|  | 496 | local rval=0 | 
| Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 497 | local compute_hostname | 
| Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 498 | time_start "wait_for_service" | 
| Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 499 | compute_hostname=$(iniget $NOVA_CONF DEFAULT host) | 
|  | 500 | if [[ -z $compute_hostname ]]; then | 
|  | 501 | compute_hostname=$(hostname) | 
|  | 502 | fi | 
| Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 503 | timeout $timeout bash -x <<EOF || rval=$? | 
|  | 504 | ID="" | 
|  | 505 | while [[ "\$ID" == "" ]]; do | 
|  | 506 | sleep 1 | 
| Chris Dent | ac475bb | 2018-02-07 18:35:40 +0000 | [diff] [blame] | 507 | if [[ "$VIRT_DRIVER" = 'fake' ]]; then | 
|  | 508 | # When using the fake driver the compute hostnames have a suffix of 1 to NUMBER_FAKE_NOVA_COMPUTE | 
|  | 509 | ID=\$(openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list --host `hostname`1 --service nova-compute -c ID -f value) | 
|  | 510 | else | 
| Prabhat Ranjan | 6f38cf4 | 2018-03-16 16:33:46 +0530 | [diff] [blame] | 511 | ID=\$(openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list --host "$compute_hostname" --service nova-compute -c ID -f value) | 
| Chris Dent | ac475bb | 2018-02-07 18:35:40 +0000 | [diff] [blame] | 512 | fi | 
| Sean Dague | c2fe916 | 2017-07-28 11:29:18 +0000 | [diff] [blame] | 513 | done | 
|  | 514 | EOF | 
|  | 515 | time_stop "wait_for_service" | 
|  | 516 | # Figure out what's happening on platforms where this doesn't work | 
|  | 517 | if [[ "$rval" != 0 ]]; then | 
|  | 518 | echo "Didn't find service registered by hostname after $timeout seconds" | 
|  | 519 | openstack --os-cloud devstack-admin --os-region "$REGION_NAME" compute service list | 
|  | 520 | fi | 
|  | 521 | return $rval | 
|  | 522 | } | 
|  | 523 |  | 
| Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 524 |  | 
| Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 525 | # ping check | 
| Stephen Finucane | 4b8cba7 | 2019-05-21 14:17:11 +0100 | [diff] [blame] | 526 | # Uses globals ``ENABLED_SERVICES``, ``TOP_DIR``, ``PRIVATE_NETWORK`` | 
| Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 527 | # ping_check <ip> [boot-timeout] [from_net] [expected] | 
| Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 528 | function ping_check { | 
| Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 529 | local ip=$1 | 
|  | 530 | local timeout=${2:-30} | 
|  | 531 | local from_net=${3:-""} | 
|  | 532 | local expected=${4:-True} | 
|  | 533 | local op="!" | 
|  | 534 | local failmsg="[Fail] Couldn't ping server" | 
|  | 535 | local ping_cmd="ping" | 
| Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 536 |  | 
| Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 537 | # if we don't specify a from_net we're expecting things to work | 
|  | 538 | # fine from our local box. | 
|  | 539 | if [[ -n "$from_net" ]]; then | 
| Stephen Finucane | 4b8cba7 | 2019-05-21 14:17:11 +0100 | [diff] [blame] | 540 | # TODO(stephenfin): Is there any way neutron could be disabled now? | 
| Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 541 | if is_service_enabled neutron; then | 
|  | 542 | ping_cmd="$TOP_DIR/tools/ping_neutron.sh $from_net" | 
| Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 543 | fi | 
| Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 544 | fi | 
| Sean Dague | af9bf86 | 2015-04-16 08:58:32 -0400 | [diff] [blame] | 545 |  | 
|  | 546 | # inverse the logic if we're testing no connectivity | 
|  | 547 | if [[ "$expected" != "True" ]]; then | 
|  | 548 | op="" | 
|  | 549 | failmsg="[Fail] Could ping server" | 
|  | 550 | fi | 
|  | 551 |  | 
|  | 552 | # Because we've transformed this command so many times, print it | 
|  | 553 | # out at the end. | 
|  | 554 | local check_command="while $op $ping_cmd -c1 -w1 $ip; do sleep 1; done" | 
|  | 555 | echo "Checking connectivity with $check_command" | 
|  | 556 |  | 
|  | 557 | if ! timeout $timeout sh -c "$check_command"; then | 
|  | 558 | die $LINENO $failmsg | 
|  | 559 | fi | 
| Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 560 | } | 
|  | 561 |  | 
| Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 562 | # Get ip of instance | 
| Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 563 | function get_instance_ip { | 
| Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 564 | local vm_id=$1 | 
|  | 565 | local network_name=$2 | 
| Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 566 | local addresses | 
| Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 567 | local ip | 
| Ian Wienand | 7ae9729 | 2016-02-16 14:50:53 +1100 | [diff] [blame] | 568 |  | 
| Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 569 | addresses=$(openstack server show -c addresses -f value "$vm_id") | 
|  | 570 | ip=$(echo $addresses | sed -n "s/^.*$network_name=\([0-9\.]*\).*$/\1/p") | 
| Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 571 | if [[ $ip = "" ]];then | 
| Ryota MIBU | 842d54a | 2017-12-25 16:28:50 +0900 | [diff] [blame] | 572 | echo "addresses of server $vm_id : $addresses" | 
| Atsushi SAKAI | 33c9a67 | 2015-11-12 19:50:00 +0900 | [diff] [blame] | 573 | die $LINENO "[Fail] Couldn't get ipaddress of VM" | 
| Nachi Ueno | 6769b16 | 2013-08-12 18:18:56 -0700 | [diff] [blame] | 574 | fi | 
|  | 575 | echo $ip | 
|  | 576 | } | 
| Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 577 |  | 
| Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 578 | # ssh check | 
| Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 579 |  | 
| Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 580 | # ssh_check net-name key-file floating-ip default-user active-timeout | 
| Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 581 | function ssh_check { | 
| Mark McClain | b05c876 | 2013-07-06 23:29:39 -0400 | [diff] [blame] | 582 | if is_service_enabled neutron; then | 
|  | 583 | _ssh_check_neutron  "$1" $2 $3 $4 $5 | 
| Nachi Ueno | 5db5bfa | 2012-10-29 11:25:29 -0700 | [diff] [blame] | 584 | return | 
|  | 585 | fi | 
|  | 586 | _ssh_check_novanet "$1" $2 $3 $4 $5 | 
|  | 587 | } | 
|  | 588 |  | 
| Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 589 | function _ssh_check_novanet { | 
| Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 590 | local NET_NAME=$1 | 
|  | 591 | local KEY_FILE=$2 | 
|  | 592 | local FLOATING_IP=$3 | 
|  | 593 | local DEFAULT_INSTANCE_USER=$4 | 
|  | 594 | local ACTIVE_TIMEOUT=$5 | 
| Dean Troyer | 6931c13 | 2012-11-07 16:51:21 -0600 | [diff] [blame] | 595 | local probe_cmd="" | 
| Dean Troyer | cc6b443 | 2013-04-08 15:38:03 -0500 | [diff] [blame] | 596 | if ! timeout $ACTIVE_TIMEOUT sh -c "while ! ssh -o StrictHostKeyChecking=no -i $KEY_FILE ${DEFAULT_INSTANCE_USER}@$FLOATING_IP echo success; do sleep 1; done"; then | 
| Nachi Ueno | 07115eb | 2013-02-26 12:38:18 -0800 | [diff] [blame] | 597 | die $LINENO "server didn't become ssh-able!" | 
| Nachi Ueno | fda946e | 2012-10-24 17:26:02 -0700 | [diff] [blame] | 598 | fi | 
|  | 599 | } | 
| Dean Troyer | 13dc5cc | 2012-03-27 14:50:45 -0500 | [diff] [blame] | 600 |  | 
| Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 601 |  | 
| Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 602 | # Get the location of the $module-rootwrap executables, where module is cinder | 
|  | 603 | # or nova. | 
|  | 604 | # get_rootwrap_location module | 
| Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 605 | function get_rootwrap_location { | 
| Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 606 | local module=$1 | 
|  | 607 |  | 
| Jakub Ruzicka | 4196d55 | 2013-01-30 15:35:54 +0100 | [diff] [blame] | 608 | echo "$(get_python_exec_prefix)/$module-rootwrap" | 
| Vincent Untz | 856a11e | 2012-11-21 16:04:12 +0100 | [diff] [blame] | 609 | } | 
|  | 610 |  | 
| Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 611 |  | 
| Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 612 | # Path permissions sanity check | 
|  | 613 | # check_path_perm_sanity path | 
| Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 614 | function check_path_perm_sanity { | 
| Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 615 | # Ensure no element of the path has 0700 permissions, which is very | 
|  | 616 | # likely to cause issues for daemons.  Inspired by default 0700 | 
|  | 617 | # homedir permissions on RHEL and common practice of making DEST in | 
|  | 618 | # the stack user's homedir. | 
|  | 619 |  | 
| Ian Wienand | ada886d | 2015-10-07 14:06:26 +1100 | [diff] [blame] | 620 | local real_path | 
|  | 621 | real_path=$(readlink -f $1) | 
| Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 622 | local rebuilt_path="" | 
|  | 623 | for i in $(echo ${real_path} | tr "/" " "); do | 
|  | 624 | rebuilt_path=$rebuilt_path"/"$i | 
|  | 625 |  | 
|  | 626 | if [[ $(stat -c '%a' ${rebuilt_path}) = 700 ]]; then | 
|  | 627 | echo "*** DEST path element" | 
|  | 628 | echo "***    ${rebuilt_path}" | 
|  | 629 | echo "*** appears to have 0700 permissions." | 
| Dean Troyer | dc97cb7 | 2015-03-28 08:20:50 -0500 | [diff] [blame] | 630 | echo "*** This is very likely to cause fatal issues for DevStack daemons." | 
| Ian Wienand | 0488edd | 2013-04-11 12:04:36 +1000 | [diff] [blame] | 631 |  | 
|  | 632 | if [[ -n "$SKIP_PATH_SANITY" ]]; then | 
|  | 633 | return | 
|  | 634 | else | 
|  | 635 | echo "*** Set SKIP_PATH_SANITY to skip this check" | 
|  | 636 | die $LINENO "Invalid path permissions" | 
|  | 637 | fi | 
|  | 638 | fi | 
|  | 639 | done | 
|  | 640 | } | 
|  | 641 |  | 
| Dean Troyer | 1a6d449 | 2013-06-03 16:47:36 -0500 | [diff] [blame] | 642 |  | 
| Ian Wienand | 2ba36cd | 2015-11-12 13:52:36 +1100 | [diff] [blame] | 643 | # vercmp ver1 op ver2 | 
|  | 644 | #  Compare VER1 to VER2 | 
|  | 645 | #   - op is one of < <= == >= > | 
|  | 646 | #   - returns true if satisified | 
|  | 647 | #  e.g. | 
|  | 648 | #  if vercmp 1.0 "<" 2.0; then | 
|  | 649 | #    ... | 
|  | 650 | #  fi | 
|  | 651 | function vercmp { | 
|  | 652 | local v1=$1 | 
|  | 653 | local op=$2 | 
|  | 654 | local v2=$3 | 
|  | 655 | local result | 
|  | 656 |  | 
|  | 657 | # sort the two numbers with sort's "-V" argument.  Based on if v2 | 
|  | 658 | # swapped places with v1, we can determine ordering. | 
|  | 659 | result=$(echo -e "$v1\n$v2" | sort -V | head -1) | 
|  | 660 |  | 
|  | 661 | case $op in | 
|  | 662 | "==") | 
|  | 663 | [ "$v1" = "$v2" ] | 
|  | 664 | return | 
|  | 665 | ;; | 
|  | 666 | ">") | 
|  | 667 | [ "$v1" != "$v2" ] && [ "$result" = "$v2" ] | 
|  | 668 | return | 
|  | 669 | ;; | 
|  | 670 | "<") | 
|  | 671 | [ "$v1" != "$v2" ] && [ "$result" = "$v1" ] | 
|  | 672 | return | 
|  | 673 | ;; | 
|  | 674 | ">=") | 
|  | 675 | [ "$result" = "$v2" ] | 
|  | 676 | return | 
|  | 677 | ;; | 
|  | 678 | "<=") | 
|  | 679 | [ "$result" = "$v1" ] | 
|  | 680 | return | 
|  | 681 | ;; | 
|  | 682 | *) | 
|  | 683 | die $LINENO "unrecognised op: $op" | 
|  | 684 | ;; | 
|  | 685 | esac | 
|  | 686 | } | 
| Kyle Mestery | 51a3f1f | 2013-06-13 11:47:56 +0000 | [diff] [blame] | 687 |  | 
| Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 688 | # This sets up defaults we like in devstack for logging for tracking | 
|  | 689 | # down issues, and makes sure everything is done the same between | 
|  | 690 | # projects. | 
| Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 691 | # NOTE(jh): Historically this function switched between three different | 
|  | 692 | # functions: setup_systemd_logging, setup_colorized_logging and | 
|  | 693 | # setup_standard_logging_identity. Since we always run with systemd now, | 
|  | 694 | # this could be cleaned up, but the other functions may still be in use | 
|  | 695 | # by plugins. Since deprecations haven't worked in the past, we'll just | 
|  | 696 | # leave them in place. | 
| Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 697 | function setup_logging { | 
| Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 698 | setup_systemd_logging $1 | 
| Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 699 | } | 
|  | 700 |  | 
| Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 701 | # This function sets log formatting options for colorizing log | 
|  | 702 | # output to stdout. It is meant to be called by lib modules. | 
| Ian Wienand | aee18c7 | 2014-02-21 15:35:08 +1100 | [diff] [blame] | 703 | function setup_colorized_logging { | 
| Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 704 | local conf_file=$1 | 
| Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 705 | # Add color to logging output | 
| Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 706 | iniset $conf_file DEFAULT logging_context_format_string "%(asctime)s.%(msecs)03d %(color)s%(levelname)s %(name)s [[01;36m%(request_id)s [00;36m%(project_name)s %(user_name)s%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" | 
|  | 707 | iniset $conf_file DEFAULT logging_default_format_string "%(asctime)s.%(msecs)03d %(color)s%(levelname)s %(name)s [[00;36m-%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" | 
|  | 708 | iniset $conf_file DEFAULT logging_debug_format_suffix "[00;33mfrom (pid=%(process)d) %(funcName)s %(pathname)s:%(lineno)d[00m" | 
|  | 709 | iniset $conf_file DEFAULT logging_exception_prefix "%(color)s%(asctime)s.%(msecs)03d TRACE %(name)s [01;35m%(instance)s[00m" | 
| Salvatore Orlando | 05ae833 | 2013-08-20 14:51:08 -0700 | [diff] [blame] | 710 | } | 
|  | 711 |  | 
| Sean Dague | 5edae54 | 2017-03-21 20:50:24 -0400 | [diff] [blame] | 712 | function setup_systemd_logging { | 
|  | 713 | local conf_file=$1 | 
| Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 714 | # NOTE(sdague): this is a nice to have, and means we're using the | 
|  | 715 | # native systemd path, which provides for things like search on | 
|  | 716 | # request-id. However, there may be an eventlet interaction here, | 
|  | 717 | # so going off for now. | 
| Kirill Zaitsev | c0644f3 | 2017-05-24 13:00:47 +0300 | [diff] [blame] | 718 | USE_JOURNAL=$(trueorfalse False USE_JOURNAL) | 
| Eric Fried | 8cd310d | 2017-05-16 13:52:03 -0500 | [diff] [blame] | 719 | local pidstr="" | 
| Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 720 | if [[ "$USE_JOURNAL" == "True" ]]; then | 
| Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 721 | iniset $conf_file DEFAULT use_journal "True" | 
| Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 722 | # if we are using the journal directly, our process id is already correct | 
| Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 723 | else | 
| Eric Fried | 8cd310d | 2017-05-16 13:52:03 -0500 | [diff] [blame] | 724 | pidstr="(pid=%(process)d) " | 
| Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 725 | fi | 
| Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 726 | iniset $conf_file DEFAULT logging_debug_format_suffix "[00;33m{{${pidstr}%(funcName)s %(pathname)s:%(lineno)d}}[00m" | 
| Sean Dague | b2bfe56 | 2017-05-03 09:58:21 -0400 | [diff] [blame] | 727 |  | 
| Dr. Jens Harbott | 6808a34 | 2020-01-20 15:52:33 +0000 | [diff] [blame] | 728 | iniset $conf_file DEFAULT logging_context_format_string "%(color)s%(levelname)s %(name)s [[01;36m%(global_request_id)s %(request_id)s [00;36m%(project_name)s %(user_name)s%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" | 
|  | 729 | iniset $conf_file DEFAULT logging_default_format_string "%(color)s%(levelname)s %(name)s [[00;36m-%(color)s] [01;35m%(instance)s%(color)s%(message)s[00m" | 
|  | 730 | iniset $conf_file DEFAULT logging_exception_prefix "ERROR %(name)s [01;35m%(instance)s[00m" | 
| Sean Dague | 5edae54 | 2017-03-21 20:50:24 -0400 | [diff] [blame] | 731 | } | 
|  | 732 |  | 
| Sean Dague | 9751be6 | 2016-04-05 12:08:57 -0400 | [diff] [blame] | 733 | function setup_standard_logging_identity { | 
|  | 734 | local conf_file=$1 | 
|  | 735 | iniset $conf_file DEFAULT logging_user_identity_format "%(project_name)s %(user_name)s" | 
|  | 736 | } | 
|  | 737 |  | 
| Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 738 | # These functions are provided for basic fall-back functionality for | 
| Dean Troyer | dc97cb7 | 2015-03-28 08:20:50 -0500 | [diff] [blame] | 739 | # projects that include parts of DevStack (Grenade).  stack.sh will | 
|  | 740 | # override these with more specific versions for DevStack (with fancy | 
| Ian Wienand | 54e3910 | 2014-06-03 16:05:12 +1000 | [diff] [blame] | 741 | # spinners, etc).  We never override an existing version | 
|  | 742 | if ! function_exists echo_summary; then | 
|  | 743 | function echo_summary { | 
|  | 744 | echo $@ | 
|  | 745 | } | 
|  | 746 | fi | 
|  | 747 | if ! function_exists echo_nolog; then | 
|  | 748 | function echo_nolog { | 
|  | 749 | echo $@ | 
|  | 750 | } | 
|  | 751 | fi | 
| Dean Troyer | dff49a2 | 2014-01-30 15:37:40 -0600 | [diff] [blame] | 752 |  | 
| Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 753 |  | 
| Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 754 | # create_disk - Create, configure, and mount a backing disk | 
| Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 755 | function create_disk { | 
|  | 756 | local node_number | 
|  | 757 | local disk_image=${1} | 
|  | 758 | local storage_data_dir=${2} | 
|  | 759 | local loopback_disk_size=${3} | 
| Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 760 | local key | 
| Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 761 |  | 
| Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 762 | key=$(echo $disk_image | sed 's#/.##') | 
|  | 763 | key="devstack-$key" | 
| Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 764 |  | 
| Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 765 | destroy_disk $disk_image $storage_data_dir | 
| Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 766 |  | 
| Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 767 | # Create an empty file of the correct size (and ensure the | 
|  | 768 | # directory structure up to that path exists) | 
|  | 769 | sudo mkdir -p $(dirname ${disk_image}) | 
| Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 770 | sudo truncate -s ${loopback_disk_size} ${disk_image} | 
|  | 771 |  | 
|  | 772 | # Make a fresh XFS filesystem. Use bigger inodes so xattr can fit in | 
|  | 773 | # a single inode. Keeping the default inode size (256) will result in multiple | 
|  | 774 | # inodes being used to store xattr. Retrieving the xattr will be slower | 
|  | 775 | # since we have to read multiple inodes. This statement is true for both | 
|  | 776 | # Swift and Ceph. | 
|  | 777 | sudo mkfs.xfs -f -i size=1024 ${disk_image} | 
|  | 778 |  | 
| Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 779 | # Install a new loopback fstab entry for this disk image, and mount it | 
| Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 780 | echo "$disk_image $storage_data_dir xfs loop,noatime,nodiratime,logbufs=8,comment=$key 0 0" | sudo tee -a /etc/fstab | 
| Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 781 | sudo mkdir -p $storage_data_dir | 
| Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 782 | sudo mount -v $storage_data_dir | 
|  | 783 | } | 
|  | 784 |  | 
|  | 785 | # Unmount, de-configure, and destroy a backing disk | 
|  | 786 | function destroy_disk { | 
|  | 787 | local disk_image=$1 | 
|  | 788 | local storage_data_dir=$2 | 
| Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 789 | local key | 
|  | 790 |  | 
|  | 791 | key=$(echo $disk_image | sed 's#/.##') | 
|  | 792 | key="devstack-$key" | 
| Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 793 |  | 
|  | 794 | # Unmount the target, if mounted | 
|  | 795 | if egrep -q $storage_data_dir /proc/mounts; then | 
|  | 796 | sudo umount $storage_data_dir | 
|  | 797 | fi | 
|  | 798 |  | 
|  | 799 | # Clear any fstab rules | 
| Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 800 | sudo sed -i '/.*comment=$key.*/ d' /etc/fstab | 
| Dan Smith | 6766f71 | 2020-07-24 15:44:34 -0700 | [diff] [blame] | 801 |  | 
|  | 802 | # Delete the file | 
| Dan Smith | 36a575b | 2020-11-13 06:57:33 -0800 | [diff] [blame] | 803 | sudo rm -f $disk_image | 
| Sébastien Han | 36f2f02 | 2014-01-06 18:09:26 +0100 | [diff] [blame] | 804 | } | 
|  | 805 |  | 
| Ihar Hrachyshka | 7b5c7dc | 2016-07-15 20:17:13 +0200 | [diff] [blame] | 806 |  | 
|  | 807 | # set_mtu - Set MTU on a device | 
|  | 808 | function set_mtu { | 
|  | 809 | local dev=$1 | 
|  | 810 | local mtu=$2 | 
|  | 811 | sudo ip link set mtu $mtu dev $dev | 
|  | 812 | } | 
|  | 813 |  | 
|  | 814 |  | 
| Denis Buliga | 0bf75a4 | 2017-02-06 16:56:46 +0200 | [diff] [blame] | 815 | # running_in_container - Returns true otherwise false | 
|  | 816 | function running_in_container { | 
| kesper | d18d7c8 | 2017-03-23 05:52:33 +0000 | [diff] [blame] | 817 | [[ $(systemd-detect-virt --container) != 'none' ]] | 
| Denis Buliga | 0bf75a4 | 2017-02-06 16:56:46 +0200 | [diff] [blame] | 818 | } | 
|  | 819 |  | 
|  | 820 |  | 
| Ihar Hrachyshka | b3a210f | 2016-09-29 13:26:30 +0000 | [diff] [blame] | 821 | # enable_kernel_bridge_firewall - Enable kernel support for bridge firewalling | 
|  | 822 | function enable_kernel_bridge_firewall { | 
|  | 823 | # Load bridge module. This module provides access to firewall for bridged | 
|  | 824 | # frames; and also on older kernels (pre-3.18) it provides sysctl knobs to | 
|  | 825 | # enable/disable bridge firewalling | 
|  | 826 | sudo modprobe bridge | 
|  | 827 | # For newer kernels (3.18+), those sysctl settings are split into a separate | 
|  | 828 | # kernel module (br_netfilter). Load it too, if present. | 
|  | 829 | sudo modprobe br_netfilter 2>> /dev/null || : | 
|  | 830 | # Enable bridge firewalling in case it's disabled in kernel (upstream | 
|  | 831 | # default is enabled, but some distributions may decide to change it). | 
|  | 832 | # This is at least needed for RHEL 7.2 and earlier releases. | 
| Ihar Hrachyshka | 3f771b7 | 2016-12-17 04:12:24 +0000 | [diff] [blame] | 833 | for proto in ip ip6; do | 
| Ihar Hrachyshka | b3a210f | 2016-09-29 13:26:30 +0000 | [diff] [blame] | 834 | sudo sysctl -w net.bridge.bridge-nf-call-${proto}tables=1 | 
|  | 835 | done | 
|  | 836 | } | 
|  | 837 |  | 
|  | 838 |  | 
| Dan Smith | 1f55d38 | 2017-05-16 08:50:53 -0700 | [diff] [blame] | 839 | # Set a systemd system override | 
|  | 840 | # | 
|  | 841 | # This sets a system-side override in system.conf. A per-service | 
|  | 842 | # override would be /etc/systemd/system/${service}.service/override.conf | 
|  | 843 | function set_systemd_override { | 
|  | 844 | local key="$1" | 
|  | 845 | local value="$2" | 
|  | 846 |  | 
|  | 847 | local sysconf="/etc/systemd/system.conf" | 
|  | 848 | iniset -sudo "${sysconf}" "Manager" "$key" "$value" | 
|  | 849 | echo "Set systemd system override for ${key}=${value}" | 
|  | 850 |  | 
|  | 851 | sudo systemctl daemon-reload | 
|  | 852 | } | 
|  | 853 |  | 
| Matthew Treinish | 309b99e | 2017-05-23 15:18:31 -0400 | [diff] [blame] | 854 | # Get a random port from the local port range | 
|  | 855 | # | 
|  | 856 | # This function returns an available port in the local port range. The search | 
|  | 857 | # order is not truly random, but should be considered a random value by the | 
|  | 858 | # user because it depends on the state of your local system. | 
|  | 859 | function get_random_port { | 
|  | 860 | read lower_port upper_port < /proc/sys/net/ipv4/ip_local_port_range | 
|  | 861 | while true; do | 
|  | 862 | for (( port = upper_port ; port >= lower_port ; port-- )); do | 
|  | 863 | sudo lsof -i ":$port" &> /dev/null | 
|  | 864 | if [[ $? > 0 ]] ; then | 
|  | 865 | break 2 | 
|  | 866 | fi | 
|  | 867 | done | 
|  | 868 | done | 
|  | 869 | echo $port | 
|  | 870 | } | 
|  | 871 |  | 
| Ian Wienand | 07cbc44 | 2017-06-30 12:29:19 +1000 | [diff] [blame] | 872 | # Save some state information | 
|  | 873 | # | 
|  | 874 | # Write out various useful state information to /etc/devstack-version | 
| Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 875 | function write_devstack_version { | 
| Dirk Mueller | 6bab832 | 2018-03-02 21:13:12 +0100 | [diff] [blame] | 876 | cat - <<EOF | sudo tee /etc/devstack-version >/dev/null | 
| Ian Wienand | 07cbc44 | 2017-06-30 12:29:19 +1000 | [diff] [blame] | 877 | DevStack Version: ${DEVSTACK_SERIES} | 
|  | 878 | Change: $(git log --format="%H %s %ci" -1) | 
|  | 879 | OS Version: ${os_VENDOR} ${os_RELEASE} ${os_CODENAME} | 
| Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 880 | EOF | 
| Sean Dague | 2c0faca | 2017-06-28 09:13:04 -0400 | [diff] [blame] | 881 | } | 
|  | 882 |  | 
| Dean Troyer | 27e3269 | 2012-03-16 16:16:56 -0500 | [diff] [blame] | 883 | # Restore xtrace | 
| Ian Wienand | 523f488 | 2015-10-13 11:03:03 +1100 | [diff] [blame] | 884 | $_XTRACE_FUNCTIONS | 
| Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 885 |  | 
| Dean Troyer | 4a43b7b | 2012-08-28 17:43:40 -0500 | [diff] [blame] | 886 | # Local variables: | 
| Sean Dague | 584d90e | 2013-03-29 14:34:53 -0400 | [diff] [blame] | 887 | # mode: shell-script | 
| Andrew Laski | f900bd7 | 2012-09-05 17:23:14 -0400 | [diff] [blame] | 888 | # End: |