Charm-helpers sync

This change is a result of "make sync" for neutron-api charm.

Test changes also applied: removing an "charmhelpers/tests" sync
due to recent charm changes (see commit 8937059 for details) and
keystone auth_uri/auth_url removed from test since it has to been
checked later by functional tests.

Change-Id: I108497e50f28fc2a84e035f520fea4452edd91db
This commit is contained in:
Vladimir Grevtsev 2018-10-10 19:24:48 +03:00
parent 47a2b8fbb4
commit 5eee070465
10 changed files with 151 additions and 77 deletions

View File

@ -19,7 +19,6 @@ bin/charm_helpers_sync.py:
sync: bin/charm_helpers_sync.py sync: bin/charm_helpers_sync.py
@$(PYTHON) bin/charm_helpers_sync.py -c charm-helpers-hooks.yaml @$(PYTHON) bin/charm_helpers_sync.py -c charm-helpers-hooks.yaml
@$(PYTHON) bin/charm_helpers_sync.py -c charm-helpers-tests.yaml
publish: lint test publish: lint test
bzr push lp:charms/neutron-api bzr push lp:charms/neutron-api

View File

@ -1,8 +0,0 @@
repo: https://github.com/juju/charm-helpers
destination: tests/charmhelpers
include:
- contrib.amulet
- osplatform
- contrib.openstack.amulet
- core
- osplatform

View File

@ -23,8 +23,8 @@
# #
import os import os
import subprocess
from charmhelpers.core import host
from charmhelpers.core.hookenv import ( from charmhelpers.core.hookenv import (
config as config_get, config as config_get,
relation_get, relation_get,
@ -83,14 +83,4 @@ def retrieve_ca_cert(cert_file):
def install_ca_cert(ca_cert): def install_ca_cert(ca_cert):
if ca_cert: host.install_ca_cert(ca_cert, 'keystone_juju_ca_cert')
cert_file = ('/usr/local/share/ca-certificates/'
'keystone_juju_ca_cert.crt')
old_cert = retrieve_ca_cert(cert_file)
if old_cert and old_cert == ca_cert:
log("CA cert is the same as installed version", level=INFO)
else:
log("Installing new CA cert", level=INFO)
with open(cert_file, 'wb') as crt:
crt.write(ca_cert)
subprocess.check_call(['update-ca-certificates', '--fresh'])

View File

@ -14,6 +14,7 @@
import os import os
import re import re
import six
import subprocess import subprocess
@ -95,6 +96,8 @@ class ApacheConfContext(object):
ctxt = settings['hardening'] ctxt = settings['hardening']
out = subprocess.check_output(['apache2', '-v']) out = subprocess.check_output(['apache2', '-v'])
if six.PY3:
out = out.decode('utf-8')
ctxt['apache_version'] = re.search(r'.+version: Apache/(.+?)\s.+', ctxt['apache_version'] = re.search(r'.+version: Apache/(.+?)\s.+',
out).group(1) out).group(1)
ctxt['apache_icondir'] = '/usr/share/apache2/icons/' ctxt['apache_icondir'] = '/usr/share/apache2/icons/'

View File

@ -15,7 +15,7 @@
import re import re
import subprocess import subprocess
from six import string_types import six
from charmhelpers.core.hookenv import ( from charmhelpers.core.hookenv import (
log, log,
@ -35,7 +35,7 @@ class DisabledModuleAudit(BaseAudit):
def __init__(self, modules): def __init__(self, modules):
if modules is None: if modules is None:
self.modules = [] self.modules = []
elif isinstance(modules, string_types): elif isinstance(modules, six.string_types):
self.modules = [modules] self.modules = [modules]
else: else:
self.modules = modules self.modules = modules
@ -69,6 +69,8 @@ class DisabledModuleAudit(BaseAudit):
def _get_loaded_modules(): def _get_loaded_modules():
"""Returns the modules which are enabled in Apache.""" """Returns the modules which are enabled in Apache."""
output = subprocess.check_output(['apache2ctl', '-M']) output = subprocess.check_output(['apache2ctl', '-M'])
if six.PY3:
output = output.decode('utf-8')
modules = [] modules = []
for line in output.splitlines(): for line in output.splitlines():
# Each line of the enabled module output looks like: # Each line of the enabled module output looks like:

View File

@ -618,12 +618,12 @@ class OpenStackAmuletUtils(AmuletUtils):
return self.authenticate_keystone(keystone_ip, user, password, return self.authenticate_keystone(keystone_ip, user, password,
project_name=tenant) project_name=tenant)
def authenticate_glance_admin(self, keystone): def authenticate_glance_admin(self, keystone, force_v1_client=False):
"""Authenticates admin user with glance.""" """Authenticates admin user with glance."""
self.log.debug('Authenticating glance admin...') self.log.debug('Authenticating glance admin...')
ep = keystone.service_catalog.url_for(service_type='image', ep = keystone.service_catalog.url_for(service_type='image',
interface='adminURL') interface='adminURL')
if keystone.session: if not force_v1_client and keystone.session:
return glance_clientv2.Client("2", session=keystone.session) return glance_clientv2.Client("2", session=keystone.session)
else: else:
return glance_client.Client(ep, token=keystone.auth_token) return glance_client.Client(ep, token=keystone.auth_token)
@ -680,18 +680,30 @@ class OpenStackAmuletUtils(AmuletUtils):
nova.flavors.create(name, ram, vcpus, disk, flavorid, nova.flavors.create(name, ram, vcpus, disk, flavorid,
ephemeral, swap, rxtx_factor, is_public) ephemeral, swap, rxtx_factor, is_public)
def create_cirros_image(self, glance, image_name): def glance_create_image(self, glance, image_name, image_url,
"""Download the latest cirros image and upload it to glance, download_dir='tests',
validate and return a resource pointer. hypervisor_type=None,
disk_format='qcow2',
architecture='x86_64',
container_format='bare'):
"""Download an image and upload it to glance, validate its status
and return an image object pointer. KVM defaults, can override for
LXD.
:param glance: pointer to authenticated glance connection :param glance: pointer to authenticated glance api connection
:param image_name: display name for new image :param image_name: display name for new image
:param image_url: url to retrieve
:param download_dir: directory to store downloaded image file
:param hypervisor_type: glance image hypervisor property
:param disk_format: glance image disk format
:param architecture: glance image architecture property
:param container_format: glance image container format
:returns: glance image pointer :returns: glance image pointer
""" """
self.log.debug('Creating glance cirros image ' self.log.debug('Creating glance image ({}) from '
'({})...'.format(image_name)) '{}...'.format(image_name, image_url))
# Download cirros image # Download image
http_proxy = os.getenv('AMULET_HTTP_PROXY') http_proxy = os.getenv('AMULET_HTTP_PROXY')
self.log.debug('AMULET_HTTP_PROXY: {}'.format(http_proxy)) self.log.debug('AMULET_HTTP_PROXY: {}'.format(http_proxy))
if http_proxy: if http_proxy:
@ -700,31 +712,34 @@ class OpenStackAmuletUtils(AmuletUtils):
else: else:
opener = urllib.FancyURLopener() opener = urllib.FancyURLopener()
f = opener.open('http://download.cirros-cloud.net/version/released') abs_file_name = os.path.join(download_dir, image_name)
version = f.read().strip() if not os.path.exists(abs_file_name):
cirros_img = 'cirros-{}-x86_64-disk.img'.format(version) opener.retrieve(image_url, abs_file_name)
local_path = os.path.join('tests', cirros_img)
if not os.path.exists(local_path):
cirros_url = 'http://{}/{}/{}'.format('download.cirros-cloud.net',
version, cirros_img)
opener.retrieve(cirros_url, local_path)
f.close()
# Create glance image # Create glance image
glance_properties = {
'architecture': architecture,
}
if hypervisor_type:
glance_properties['hypervisor_type'] = hypervisor_type
# Create glance image
if float(glance.version) < 2.0: if float(glance.version) < 2.0:
with open(local_path) as fimage: with open(abs_file_name) as f:
image = glance.images.create(name=image_name, is_public=True, image = glance.images.create(
disk_format='qcow2', name=image_name,
container_format='bare', is_public=True,
data=fimage) disk_format=disk_format,
container_format=container_format,
properties=glance_properties,
data=f)
else: else:
image = glance.images.create( image = glance.images.create(
name=image_name, name=image_name,
disk_format="qcow2",
visibility="public", visibility="public",
container_format="bare") disk_format=disk_format,
glance.images.upload(image.id, open(local_path, 'rb')) container_format=container_format)
glance.images.upload(image.id, open(abs_file_name, 'rb'))
glance.images.update(image.id, **glance_properties)
# Wait for image to reach active status # Wait for image to reach active status
img_id = image.id img_id = image.id
@ -753,15 +768,54 @@ class OpenStackAmuletUtils(AmuletUtils):
val_img_stat, val_img_cfmt, val_img_dfmt)) val_img_stat, val_img_cfmt, val_img_dfmt))
if val_img_name == image_name and val_img_stat == 'active' \ if val_img_name == image_name and val_img_stat == 'active' \
and val_img_pub is True and val_img_cfmt == 'bare' \ and val_img_pub is True and val_img_cfmt == container_format \
and val_img_dfmt == 'qcow2': and val_img_dfmt == disk_format:
self.log.debug(msg_attr) self.log.debug(msg_attr)
else: else:
msg = ('Volume validation failed, {}'.format(msg_attr)) msg = ('Image validation failed, {}'.format(msg_attr))
amulet.raise_status(amulet.FAIL, msg=msg) amulet.raise_status(amulet.FAIL, msg=msg)
return image return image
def create_cirros_image(self, glance, image_name, hypervisor_type=None):
"""Download the latest cirros image and upload it to glance,
validate and return a resource pointer.
:param glance: pointer to authenticated glance connection
:param image_name: display name for new image
:param hypervisor_type: glance image hypervisor property
:returns: glance image pointer
"""
# /!\ DEPRECATION WARNING
self.log.warn('/!\\ DEPRECATION WARNING: use '
'glance_create_image instead of '
'create_cirros_image.')
self.log.debug('Creating glance cirros image '
'({})...'.format(image_name))
# Get cirros image URL
http_proxy = os.getenv('AMULET_HTTP_PROXY')
self.log.debug('AMULET_HTTP_PROXY: {}'.format(http_proxy))
if http_proxy:
proxies = {'http': http_proxy}
opener = urllib.FancyURLopener(proxies)
else:
opener = urllib.FancyURLopener()
f = opener.open('http://download.cirros-cloud.net/version/released')
version = f.read().strip()
cirros_img = 'cirros-{}-x86_64-disk.img'.format(version)
cirros_url = 'http://{}/{}/{}'.format('download.cirros-cloud.net',
version, cirros_img)
f.close()
return self.glance_create_image(
glance,
image_name,
cirros_url,
hypervisor_type=hypervisor_type)
def delete_image(self, glance, image): def delete_image(self, glance, image):
"""Delete the specified image.""" """Delete the specified image."""

View File

@ -1534,10 +1534,15 @@ class NeutronAPIContext(OSContextGenerator):
if 'l2-population' in rdata: if 'l2-population' in rdata:
ctxt.update(self.get_neutron_options(rdata)) ctxt.update(self.get_neutron_options(rdata))
extension_drivers = []
if ctxt['enable_qos']: if ctxt['enable_qos']:
ctxt['extension_drivers'] = 'qos' extension_drivers.append('qos')
else:
ctxt['extension_drivers'] = '' if ctxt['enable_nsg_logging']:
extension_drivers.append('log')
ctxt['extension_drivers'] = ','.join(extension_drivers)
return ctxt return ctxt
@ -1897,7 +1902,7 @@ class EnsureDirContext(OSContextGenerator):
Some software requires a user to create a target directory to be Some software requires a user to create a target directory to be
scanned for drop-in files with a specific format. This is why this scanned for drop-in files with a specific format. This is why this
context is needed to do that before rendering a template. context is needed to do that before rendering a template.
''' '''
def __init__(self, dirname, **kwargs): def __init__(self, dirname, **kwargs):
'''Used merely to ensure that a given directory exists.''' '''Used merely to ensure that a given directory exists.'''
@ -1907,3 +1912,23 @@ class EnsureDirContext(OSContextGenerator):
def __call__(self): def __call__(self):
mkdir(self.dirname, **self.kwargs) mkdir(self.dirname, **self.kwargs)
return {} return {}
class VersionsContext(OSContextGenerator):
"""Context to return the openstack and operating system versions.
"""
def __init__(self, pkg='python-keystone'):
"""Initialise context.
:param pkg: Package to extrapolate openstack version from.
:type pkg: str
"""
self.pkg = pkg
def __call__(self):
ostack = os_release(self.pkg, base='icehouse')
osystem = lsb_release()['DISTRIB_CODENAME'].lower()
return {
'openstack_release': ostack,
'operating_system_release': osystem}

View File

@ -1,12 +1,14 @@
{% if auth_host -%} {% if auth_host -%}
[keystone_authtoken] [keystone_authtoken]
auth_uri = {{ service_protocol }}://{{ service_host }}:{{ service_port }}
auth_url = {{ auth_protocol }}://{{ auth_host }}:{{ auth_port }}
auth_type = password auth_type = password
{% if api_version == "3" -%} {% if api_version == "3" -%}
auth_uri = {{ service_protocol }}://{{ service_host }}:{{ service_port }}/v3
auth_url = {{ auth_protocol }}://{{ auth_host }}:{{ auth_port }}/v3
project_domain_name = {{ admin_domain_name }} project_domain_name = {{ admin_domain_name }}
user_domain_name = {{ admin_domain_name }} user_domain_name = {{ admin_domain_name }}
{% else -%} {% else -%}
auth_uri = {{ service_protocol }}://{{ service_host }}:{{ service_port }}
auth_url = {{ auth_protocol }}://{{ auth_host }}:{{ auth_port }}
project_domain_name = default project_domain_name = default
user_domain_name = default user_domain_name = default
{% endif -%} {% endif -%}

View File

@ -34,7 +34,7 @@ import six
from contextlib import contextmanager from contextlib import contextmanager
from collections import OrderedDict from collections import OrderedDict
from .hookenv import log, DEBUG, local_unit from .hookenv import log, INFO, DEBUG, local_unit, charm_name
from .fstab import Fstab from .fstab import Fstab
from charmhelpers.osplatform import get_platform from charmhelpers.osplatform import get_platform
@ -1040,3 +1040,27 @@ def modulo_distribution(modulo=3, wait=30, non_zero_wait=False):
return modulo * wait return modulo * wait
else: else:
return calculated_wait_time return calculated_wait_time
def install_ca_cert(ca_cert, name=None):
"""
Install the given cert as a trusted CA.
The ``name`` is the stem of the filename where the cert is written, and if
not provided, it will default to ``juju-{charm_name}``.
If the cert is empty or None, or is unchanged, nothing is done.
"""
if not ca_cert:
return
if not isinstance(ca_cert, bytes):
ca_cert = ca_cert.encode('utf8')
if not name:
name = 'juju-{}'.format(charm_name())
cert_file = '/usr/local/share/ca-certificates/{}.crt'.format(name)
new_hash = hashlib.md5(ca_cert).hexdigest()
if file_hash(cert_file) == new_hash:
return
log("Installing new CA cert at: {}".format(cert_file), level=INFO)
write_file(cert_file, ca_cert)
subprocess.check_call(['update-ca-certificates', '--fresh'])

View File

@ -444,24 +444,11 @@ class NeutronAPIBasicDeployment(OpenStackAmuletDeployment):
'dns_domain': 'openstack.example.' 'dns_domain': 'openstack.example.'
}) })
auth_uri = '{}://{}:{}'.format(
rel_napi_ks['service_protocol'],
rel_napi_ks['service_host'],
rel_napi_ks['service_port']
)
auth_url = '{}://{}:{}'.format(
rel_napi_ks['auth_protocol'],
rel_napi_ks['auth_host'],
rel_napi_ks['auth_port']
)
if self._get_openstack_release() >= self.trusty_mitaka: if self._get_openstack_release() >= self.trusty_mitaka:
expected['nova'] = { expected['nova'] = {
'auth_section': 'keystone_authtoken', 'auth_section': 'keystone_authtoken',
} }
expected['keystone_authtoken'] = { expected['keystone_authtoken'] = {
'auth_uri': auth_uri.rstrip('/'),
'auth_url': auth_url.rstrip('/'),
'auth_type': 'password', 'auth_type': 'password',
'project_domain_name': 'default', 'project_domain_name': 'default',
'user_domain_name': 'default', 'user_domain_name': 'default',
@ -475,8 +462,6 @@ class NeutronAPIBasicDeployment(OpenStackAmuletDeployment):
'auth_section': 'keystone_authtoken', 'auth_section': 'keystone_authtoken',
} }
expected['keystone_authtoken'] = { expected['keystone_authtoken'] = {
'auth_uri': auth_uri,
'auth_url': auth_url,
'auth_plugin': 'password', 'auth_plugin': 'password',
'project_domain_id': 'default', 'project_domain_id': 'default',
'user_domain_id': 'default', 'user_domain_id': 'default',
@ -487,8 +472,6 @@ class NeutronAPIBasicDeployment(OpenStackAmuletDeployment):
} }
elif self._get_openstack_release() == self.trusty_kilo: elif self._get_openstack_release() == self.trusty_kilo:
expected['keystone_authtoken'] = { expected['keystone_authtoken'] = {
'auth_uri': auth_uri + '/',
'identity_uri': auth_url,
'admin_tenant_name': rel_napi_ks['service_tenant'], 'admin_tenant_name': rel_napi_ks['service_tenant'],
'admin_user': 'neutron', 'admin_user': 'neutron',
'admin_password': rel_napi_ks['service_password'], 'admin_password': rel_napi_ks['service_password'],