56cbf437b6
- add a new etcd_taskflow_driver for the octavia worker - bump taskflow (Etcd support) and etcd3gw (important fixes for the backend) - enable etcd in devstack if requested - add experimental jobs for jobboard/etcd Change-Id: Ib557a9cf938fcf4257d2c2848fff78a62d82109a
900 lines
36 KiB
Bash
900 lines
36 KiB
Bash
#!/usr/bin/env bash
|
|
|
|
saveenv=$-
|
|
set -ex
|
|
|
|
|
|
# devstack plugin for octavia
|
|
|
|
GET_PIP_CACHE_LOCATION=/opt/stack/cache/files/get-pip.py
|
|
|
|
function octavia_install {
|
|
if [[ ${OCTAVIA_ENABLE_AMPHORAV2_JOBBOARD} == True ]]; then
|
|
setup_develop $OCTAVIA_DIR ${OCTAVIA_JOBBOARD_BACKEND}
|
|
else
|
|
setup_develop $OCTAVIA_DIR
|
|
fi
|
|
}
|
|
|
|
function octaviaclient_install {
|
|
if use_library_from_git "python-octaviaclient"; then
|
|
git_clone_by_name "python-octaviaclient"
|
|
setup_dev_lib "python-octaviaclient"
|
|
else
|
|
pip_install_gr python-octaviaclient
|
|
fi
|
|
}
|
|
|
|
function octavia_lib_install {
|
|
if use_library_from_git "octavia-lib"; then
|
|
git_clone_by_name "octavia-lib"
|
|
setup_dev_lib "octavia-lib"
|
|
export DIB_REPOLOCATION_octavia_lib=${GITDIR["octavia-lib"]}
|
|
export DIB_REPOREF_octavia_lib=$(git --git-dir="${GITDIR["octavia-lib"]}/.git" log -1 --pretty="format:%H")
|
|
else
|
|
pip_install_gr octavia-lib
|
|
fi
|
|
}
|
|
|
|
function install_diskimage_builder {
|
|
if use_library_from_git "diskimage-builder"; then
|
|
GITREPO["diskimage-builder"]=$DISKIMAGE_BUILDER_REPO_URL
|
|
GITDIR["diskimage-builder"]=$DISKIMAGE_BUILDER_DIR
|
|
GITBRANCH["diskimage-builder"]=$DISKIMAGE_BUILDER_REPO_REF
|
|
git_clone_by_name "diskimage-builder"
|
|
setup_dev_lib -bindep "diskimage-builder"
|
|
else
|
|
pip_install -r $OCTAVIA_DIR/diskimage-create/requirements.txt
|
|
fi
|
|
}
|
|
|
|
function set_octavia_worker_image_owner_id {
|
|
image_id=$(openstack image list --property name=${OCTAVIA_AMP_IMAGE_NAME} -f value -c ID)
|
|
owner_id=$(openstack image show ${image_id} -c owner -f value)
|
|
iniset $OCTAVIA_CONF controller_worker amp_image_owner_id ${owner_id}
|
|
}
|
|
|
|
function build_octavia_worker_image {
|
|
# set up diskimage-builder if we need to
|
|
install_diskimage_builder
|
|
|
|
# Pull in DIB local elements if they are defined in devstack
|
|
if [ -n "$DIB_LOCAL_ELEMENTS" ]; then
|
|
export DIB_LOCAL_ELEMENTS=$DIB_LOCAL_ELEMENTS
|
|
fi
|
|
|
|
# Pull in the option to install nftables in the amphora
|
|
if [ -n "$DIB_OCTAVIA_AMP_USE_NFTABLES" ]; then
|
|
export DIB_OCTAVIA_AMP_USE_NFTABLES=$DIB_OCTAVIA_AMP_USE_NFTABLES
|
|
fi
|
|
|
|
# pull the agent code from the current code zuul has a reference to
|
|
if [ -n "$DIB_REPOLOCATION_pip_and_virtualenv" ]; then
|
|
export DIB_REPOLOCATION_pip_and_virtualenv=$DIB_REPOLOCATION_pip_and_virtualenv
|
|
elif [ -f $GET_PIP_CACHE_LOCATION ] ; then
|
|
export DIB_REPOLOCATION_pip_and_virtualenv=file://$GET_PIP_CACHE_LOCATION
|
|
fi
|
|
export DIB_REPOLOCATION_amphora_agent=$OCTAVIA_DIR
|
|
export DIB_REPOREF_amphora_agent=$(git --git-dir="$OCTAVIA_DIR/.git" log -1 --pretty="format:%H")
|
|
|
|
TOKEN=$(openstack token issue -f value -c id)
|
|
die_if_not_set $LINENO TOKEN "Keystone failed to get token."
|
|
|
|
octavia_dib_tracing_arg=
|
|
if [ "$OCTAVIA_DIB_TRACING" != "0" ]; then
|
|
octavia_dib_tracing_arg="-x"
|
|
fi
|
|
if [[ ${OCTAVIA_AMP_BASE_OS:+1} ]] ; then
|
|
export PARAM_OCTAVIA_AMP_BASE_OS='-i '$OCTAVIA_AMP_BASE_OS
|
|
fi
|
|
if [[ ${OCTAVIA_AMP_DISTRIBUTION_RELEASE_ID:+1} ]] ; then
|
|
export PARAM_OCTAVIA_AMP_DISTRIBUTION_RELEASE_ID='-d '$OCTAVIA_AMP_DISTRIBUTION_RELEASE_ID
|
|
fi
|
|
if [[ ${OCTAVIA_AMP_IMAGE_SIZE:+1} ]] ; then
|
|
export PARAM_OCTAVIA_AMP_IMAGE_SIZE='-s '$OCTAVIA_AMP_IMAGE_SIZE
|
|
fi
|
|
if [[ ${OCTAVIA_AMP_IMAGE_ARCH:+1} ]] ; then
|
|
export PARAM_OCTAVIA_AMP_IMAGE_ARCH='-a '$OCTAVIA_AMP_IMAGE_ARCH
|
|
fi
|
|
if [[ "$(trueorfalse False OCTAVIA_AMP_DISABLE_TMP_FS)" == "True" ]]; then
|
|
export PARAM_OCTAVIA_AMP_DISABLE_TMP_FS='-f'
|
|
fi
|
|
if [[ "$(trueorfalse False OCTAVIA_AMP_ENABLE_FIPS)" == "True" ]]; then
|
|
export PARAM_OCTAVIA_AMP_ENABLE_FIPS='-y'
|
|
fi
|
|
|
|
# Use the infra pypi mirror if it is available
|
|
if [[ -e /etc/ci/mirror_info.sh ]]; then
|
|
source /etc/ci/mirror_info.sh
|
|
fi
|
|
if [[ ${NODEPOOL_PYPI_MIRROR:+1} ]]; then
|
|
if [[ ${DIB_LOCAL_ELEMENTS:+1} ]]; then
|
|
export DIB_LOCAL_ELEMENTS="${DIB_LOCAL_ELEMENTS} pypi"
|
|
else
|
|
export DIB_LOCAL_ELEMENTS='pypi'
|
|
fi
|
|
export DIB_PYPI_MIRROR_URL=$NODEPOOL_PYPI_MIRROR
|
|
export DIB_PYPI_MIRROR_URL_1=$NODEPOOL_WHEEL_MIRROR
|
|
export DIB_PIP_RETRIES=0
|
|
fi
|
|
|
|
if ! [ -f $OCTAVIA_AMP_IMAGE_FILE ]; then
|
|
local dib_logs=/var/log/dib-build
|
|
if [[ -e ${dib_logs} ]]; then
|
|
sudo rm -rf ${dib_logs}
|
|
fi
|
|
sudo mkdir -m755 ${dib_logs}
|
|
sudo chown $STACK_USER ${dib_logs}
|
|
# Workaround for rockylinux images
|
|
export DIB_CONTAINERFILE_RUNTIME_ROOT=1
|
|
$OCTAVIA_DIR/diskimage-create/diskimage-create.sh -l ${dib_logs}/$(basename $OCTAVIA_AMP_IMAGE_FILE).log $octavia_dib_tracing_arg -o $OCTAVIA_AMP_IMAGE_FILE ${PARAM_OCTAVIA_AMP_BASE_OS:-} ${PARAM_OCTAVIA_AMP_DISTRIBUTION_RELEASE_ID:-} ${PARAM_OCTAVIA_AMP_IMAGE_SIZE:-} ${PARAM_OCTAVIA_AMP_IMAGE_ARCH:-} ${PARAM_OCTAVIA_AMP_DISABLE_TMP_FS:-} ${PARAM_OCTAVIA_AMP_ENABLE_FIPS:-}
|
|
fi
|
|
|
|
if ! [ -f $OCTAVIA_AMP_IMAGE_FILE ]; then
|
|
echo "Diskimage-builder failed to create the amphora image. Aborting."
|
|
exit 1
|
|
fi
|
|
|
|
upload_image file://${OCTAVIA_AMP_IMAGE_FILE} $TOKEN
|
|
|
|
}
|
|
|
|
function _configure_octavia_apache_wsgi {
|
|
|
|
# Make sure mod_wsgi is enabled in apache
|
|
# This is important for multinode where other services have not yet
|
|
# enabled it.
|
|
install_apache_wsgi
|
|
|
|
local octavia_apache_conf
|
|
octavia_apache_conf=$(apache_site_config_for octavia)
|
|
|
|
# Use the alternate port if we are running multinode behind haproxy
|
|
if [ $OCTAVIA_NODE != 'standalone' ] && [ $OCTAVIA_NODE != 'api' ]; then
|
|
local octavia_api_port=$OCTAVIA_HA_PORT
|
|
else
|
|
local octavia_api_port=$OCTAVIA_PORT
|
|
fi
|
|
local octavia_ssl=""
|
|
local octavia_certfile=""
|
|
local octavia_keyfile=""
|
|
local venv_path=""
|
|
|
|
if is_ssl_enabled_service octavia; then
|
|
octavia_ssl="SSLEngine On"
|
|
octavia_certfile="SSLCertificateFile $OCTAVIA_SSL_CERT"
|
|
octavia_keyfile="SSLCertificateKeyFile $OCTAVIA_SSL_KEY"
|
|
fi
|
|
|
|
if [[ ${USE_VENV} = True ]]; then
|
|
venv_path="python-path=${PROJECT_VENV["octavia"]}/lib/$(python_version)/site-packages"
|
|
fi
|
|
|
|
sudo cp ${OCTAVIA_DIR}/devstack/files/wsgi/octavia-api.template $octavia_apache_conf
|
|
sudo sed -e "
|
|
s|%OCTAVIA_SERVICE_PORT%|$octavia_api_port|g;
|
|
s|%USER%|$APACHE_USER|g;
|
|
s|%APACHE_NAME%|$APACHE_NAME|g;
|
|
s|%SSLENGINE%|$octavia_ssl|g;
|
|
s|%SSLCERTFILE%|$octavia_certfile|g;
|
|
s|%SSLKEYFILE%|$octavia_keyfile|g;
|
|
s|%VIRTUALENV%|$venv_path|g
|
|
s|%APIWORKERS%|$API_WORKERS|g;
|
|
" -i $octavia_apache_conf
|
|
|
|
}
|
|
|
|
function _configure_octavia_apache_uwsgi {
|
|
write_uwsgi_config "$OCTAVIA_UWSGI_CONF" "$OCTAVIA_UWSGI_APP" "/$OCTAVIA_SERVICE_TYPE"
|
|
}
|
|
|
|
|
|
function _cleanup_octavia_apache_wsgi {
|
|
if [[ "$WSGI_MODE" == "uwsgi" ]]; then
|
|
remove_uwsgi_config "$OCTAVIA_UWSGI_CONF" "$OCTAVIA_UWSGI_APP"
|
|
restart_apache_server
|
|
else
|
|
sudo rm -f $(apache_site_config_for octavia)
|
|
restart_apache_server
|
|
fi
|
|
}
|
|
|
|
function _start_octavia_apache_wsgi {
|
|
if [[ "$WSGI_MODE" == "uwsgi" ]]; then
|
|
run_process o-api "$(which uwsgi) --ini $OCTAVIA_UWSGI_CONF"
|
|
enable_apache_site octavia-wsgi
|
|
else
|
|
enable_apache_site octavia
|
|
fi
|
|
restart_apache_server
|
|
}
|
|
|
|
function _stop_octavia_apache_wsgi {
|
|
if [[ "$WSGI_MODE" == "uwsgi" ]]; then
|
|
disable_apache_site octavia-wsgi
|
|
stop_process o-api
|
|
else
|
|
disable_apache_site octavia
|
|
fi
|
|
restart_apache_server
|
|
}
|
|
|
|
function create_octavia_accounts {
|
|
create_service_user $OCTAVIA
|
|
|
|
# Increase the octavia account secgroups quota
|
|
# This is imporant for concurrent tempest testing
|
|
openstack quota set --secgroups 100 $OCTAVIA_PROJECT_NAME
|
|
openstack quota set --secgroup-rules 1000 $OCTAVIA_PROJECT_NAME
|
|
|
|
octavia_service=$(get_or_create_service "octavia" \
|
|
$OCTAVIA_SERVICE_TYPE "Octavia Load Balancing Service")
|
|
|
|
if [[ "$WSGI_MODE" == "uwsgi" ]] && [[ "$OCTAVIA_NODE" == "main" ]] ; then
|
|
get_or_create_endpoint $octavia_service \
|
|
"$REGION_NAME" \
|
|
"$OCTAVIA_PROTOCOL://$SERVICE_HOST:$OCTAVIA_PORT/$OCTAVIA_SERVICE_TYPE"
|
|
elif [[ "$WSGI_MODE" == "uwsgi" ]]; then
|
|
get_or_create_endpoint $octavia_service \
|
|
"$REGION_NAME" \
|
|
"$OCTAVIA_PROTOCOL://$SERVICE_HOST/$OCTAVIA_SERVICE_TYPE"
|
|
else
|
|
get_or_create_endpoint $octavia_service \
|
|
"$REGION_NAME" \
|
|
"$OCTAVIA_PROTOCOL://$SERVICE_HOST:$OCTAVIA_PORT/"
|
|
fi
|
|
}
|
|
|
|
function install_redis {
|
|
if is_fedora; then
|
|
install_package redis
|
|
elif is_ubuntu; then
|
|
install_package redis-server
|
|
elif is_suse; then
|
|
install_package redis
|
|
else
|
|
exit_distro_not_supported "redis installation"
|
|
fi
|
|
|
|
start_service redis
|
|
redis-cli del octavia_jobboard:listings
|
|
}
|
|
|
|
function stop_redis {
|
|
stop_service redis || true
|
|
}
|
|
|
|
function uninstall_redis {
|
|
if is_fedora; then
|
|
uninstall_package redis
|
|
elif is_ubuntu; then
|
|
uninstall_package redis-server
|
|
elif is_suse; then
|
|
uninstall_package redis
|
|
fi
|
|
}
|
|
|
|
function octavia_configure {
|
|
|
|
sudo mkdir -m 755 -p $OCTAVIA_CONF_DIR
|
|
safe_chown $STACK_USER $OCTAVIA_CONF_DIR
|
|
|
|
sudo mkdir -m 700 -p $OCTAVIA_RUN_DIR
|
|
safe_chown $STACK_USER $OCTAVIA_RUN_DIR
|
|
|
|
if ! [ -e $OCTAVIA_AUDIT_MAP ] ; then
|
|
cp $OCTAVIA_DIR/etc/audit/octavia_api_audit_map.conf.sample $OCTAVIA_AUDIT_MAP
|
|
fi
|
|
|
|
# Use devstack logging configuration
|
|
setup_logging $OCTAVIA_CONF
|
|
iniset $OCTAVIA_CONF DEFAULT debug $ENABLE_DEBUG_LOG_LEVEL
|
|
|
|
# Change bind host
|
|
iniset $OCTAVIA_CONF api_settings bind_host $(ipv6_unquote $SERVICE_HOST)
|
|
iniset $OCTAVIA_CONF api_settings api_handler queue_producer
|
|
|
|
iniset $OCTAVIA_CONF database connection "mysql+pymysql://${DATABASE_USER}:${DATABASE_PASSWORD}@${DATABASE_HOST}:3306/octavia"
|
|
if [[ ${OCTAVIA_ENABLE_AMPHORAV2_JOBBOARD} == True ]]; then
|
|
iniset $OCTAVIA_CONF task_flow persistence_connection "mysql+pymysql://${DATABASE_USER}:${DATABASE_PASSWORD}@${DATABASE_HOST}:3306/octavia_persistence"
|
|
iniset $OCTAVIA_CONF task_flow jobboard_expiration_time ${OCTAVIA_JOBBOARD_EXPIRATION_TIME}
|
|
iniset $OCTAVIA_CONF task_flow jobboard_enabled True
|
|
if [[ ${OCTAVIA_JOBBOARD_BACKEND} == "etcd" ]]; then
|
|
iniset $OCTAVIA_CONF task_flow jobboard_backend_driver etcd_taskflow_driver
|
|
iniset $OCTAVIA_CONF task_flow jobboard_backend_port 2379
|
|
iniset $OCTAVIA_CONF task_flow jobboard_backend_hosts ${SERVICE_HOST}
|
|
fi
|
|
fi
|
|
# Configure keystone auth_token for all users
|
|
configure_keystone_authtoken_middleware $OCTAVIA_CONF octavia
|
|
|
|
# Ensure config is set up properly for authentication as admin
|
|
iniset $OCTAVIA_CONF service_auth auth_url $KEYSTONE_SERVICE_URI
|
|
iniset $OCTAVIA_CONF service_auth auth_type password
|
|
iniset $OCTAVIA_CONF service_auth username $OCTAVIA_USERNAME
|
|
iniset $OCTAVIA_CONF service_auth password $OCTAVIA_PASSWORD
|
|
iniset $OCTAVIA_CONF service_auth user_domain_name $OCTAVIA_USER_DOMAIN_NAME
|
|
iniset $OCTAVIA_CONF service_auth project_name $OCTAVIA_PROJECT_NAME
|
|
iniset $OCTAVIA_CONF service_auth project_domain_name $OCTAVIA_PROJECT_DOMAIN_NAME
|
|
iniset $OCTAVIA_CONF service_auth cafile $SSL_BUNDLE_FILE
|
|
iniset $OCTAVIA_CONF service_auth memcached_servers $SERVICE_HOST:11211
|
|
|
|
# neutron
|
|
iniset $OCTAVIA_CONF neutron auth_url $KEYSTONE_SERVICE_URI
|
|
iniset $OCTAVIA_CONF neutron auth_type password
|
|
iniset $OCTAVIA_CONF neutron username $OCTAVIA_USERNAME
|
|
iniset $OCTAVIA_CONF neutron password $OCTAVIA_PASSWORD
|
|
iniset $OCTAVIA_CONF neutron user_domain_name $OCTAVIA_USER_DOMAIN_NAME
|
|
iniset $OCTAVIA_CONF neutron project_name $OCTAVIA_PROJECT_NAME
|
|
iniset $OCTAVIA_CONF neutron project_domain_name $OCTAVIA_PROJECT_DOMAIN_NAME
|
|
iniset $OCTAVIA_CONF neutron cafile $SSL_BUNDLE_FILE
|
|
|
|
# Setting other required default options
|
|
iniset $OCTAVIA_CONF controller_worker amphora_driver ${OCTAVIA_AMPHORA_DRIVER}
|
|
iniset $OCTAVIA_CONF controller_worker compute_driver ${OCTAVIA_COMPUTE_DRIVER}
|
|
iniset $OCTAVIA_CONF controller_worker volume_driver ${OCTAVIA_VOLUME_DRIVER}
|
|
iniset $OCTAVIA_CONF controller_worker network_driver ${OCTAVIA_NETWORK_DRIVER}
|
|
iniset $OCTAVIA_CONF controller_worker image_driver ${OCTAVIA_IMAGE_DRIVER}
|
|
iniset $OCTAVIA_CONF controller_worker amp_image_tag ${OCTAVIA_AMP_IMAGE_TAG}
|
|
iniset $OCTAVIA_CONF controller_worker amp_timezone $(readlink -e /etc/localtime | sed "s/\/usr\/share\/zoneinfo\///")
|
|
|
|
iniuncomment $OCTAVIA_CONF health_manager heartbeat_key
|
|
iniset $OCTAVIA_CONF health_manager heartbeat_key ${OCTAVIA_HEALTH_KEY}
|
|
|
|
iniset $OCTAVIA_CONF house_keeping amphora_expiry_age ${OCTAVIA_AMP_EXPIRY_AGE}
|
|
iniset $OCTAVIA_CONF house_keeping load_balancer_expiry_age ${OCTAVIA_LB_EXPIRY_AGE}
|
|
|
|
iniset_rpc_backend octavia $OCTAVIA_CONF
|
|
|
|
iniset $OCTAVIA_CONF oslo_messaging rpc_thread_pool_size 2
|
|
iniset $OCTAVIA_CONF oslo_messaging topic octavia_prov
|
|
|
|
# Uncomment other default options
|
|
iniuncomment $OCTAVIA_CONF haproxy_amphora base_path
|
|
iniuncomment $OCTAVIA_CONF haproxy_amphora base_cert_dir
|
|
iniuncomment $OCTAVIA_CONF haproxy_amphora connection_max_retries
|
|
iniuncomment $OCTAVIA_CONF haproxy_amphora connection_retry_interval
|
|
iniuncomment $OCTAVIA_CONF haproxy_amphora rest_request_conn_timeout
|
|
iniuncomment $OCTAVIA_CONF haproxy_amphora rest_request_read_timeout
|
|
iniuncomment $OCTAVIA_CONF controller_worker amp_active_retries
|
|
iniuncomment $OCTAVIA_CONF controller_worker amp_active_wait_sec
|
|
iniuncomment $OCTAVIA_CONF controller_worker workers
|
|
iniuncomment $OCTAVIA_CONF controller_worker loadbalancer_topology
|
|
|
|
iniset $OCTAVIA_CONF controller_worker loadbalancer_topology ${OCTAVIA_LB_TOPOLOGY}
|
|
|
|
# devstack optimizations for tempest runs
|
|
iniset $OCTAVIA_CONF haproxy_amphora connection_max_retries 1500
|
|
iniset $OCTAVIA_CONF haproxy_amphora connection_retry_interval 1
|
|
iniset $OCTAVIA_CONF haproxy_amphora rest_request_conn_timeout ${OCTAVIA_AMP_CONN_TIMEOUT}
|
|
iniset $OCTAVIA_CONF haproxy_amphora rest_request_read_timeout ${OCTAVIA_AMP_READ_TIMEOUT}
|
|
iniset $OCTAVIA_CONF controller_worker amp_active_retries 100
|
|
iniset $OCTAVIA_CONF controller_worker amp_active_wait_sec 2
|
|
iniset $OCTAVIA_CONF controller_worker workers 2
|
|
|
|
if [[ -a $OCTAVIA_SSH_DIR ]] ; then
|
|
rm -rf $OCTAVIA_SSH_DIR
|
|
fi
|
|
|
|
mkdir -m755 $OCTAVIA_SSH_DIR
|
|
|
|
if [[ "$(trueorfalse False OCTAVIA_USE_PREGENERATED_SSH_KEY)" == "True" ]]; then
|
|
cp -fp ${OCTAVIA_PREGENERATED_SSH_KEY_PATH} ${OCTAVIA_AMP_SSH_KEY_PATH}
|
|
cp -fp ${OCTAVIA_PREGENERATED_SSH_KEY_PATH}.pub ${OCTAVIA_AMP_SSH_KEY_PATH}.pub
|
|
chmod 0600 ${OCTAVIA_AMP_SSH_KEY_PATH}
|
|
else
|
|
ssh-keygen -b $OCTAVIA_AMP_SSH_KEY_BITS -t $OCTAVIA_AMP_SSH_KEY_TYPE -N "" -f ${OCTAVIA_AMP_SSH_KEY_PATH}
|
|
fi
|
|
iniset $OCTAVIA_CONF controller_worker amp_ssh_key_name ${OCTAVIA_AMP_SSH_KEY_NAME}
|
|
|
|
if [ $OCTAVIA_NODE == 'main' ] || [ $OCTAVIA_NODE == 'standalone' ] || [ $OCTAVIA_NODE == 'api' ]; then
|
|
recreate_database_mysql octavia
|
|
octavia-db-manage upgrade head
|
|
|
|
if [[ ${OCTAVIA_ENABLE_AMPHORAV2_JOBBOARD} == True ]]; then
|
|
recreate_database_mysql octavia_persistence
|
|
octavia-db-manage upgrade_persistence
|
|
fi
|
|
fi
|
|
|
|
if [[ -a $OCTAVIA_CERTS_DIR ]] ; then
|
|
rm -rf $OCTAVIA_CERTS_DIR
|
|
fi
|
|
|
|
# amphorav2 required redis installation
|
|
if [[ ${OCTAVIA_ENABLE_AMPHORAV2_JOBBOARD} == True ]]; then
|
|
install_redis
|
|
fi
|
|
|
|
if [[ "$(trueorfalse False OCTAVIA_USE_PREGENERATED_CERTS)" == "True" ]]; then
|
|
cp -rfp ${OCTAVIA_PREGENERATED_CERTS_DIR} ${OCTAVIA_CERTS_DIR}
|
|
else
|
|
pushd $OCTAVIA_DIR/bin
|
|
source create_dual_intermediate_CA.sh
|
|
mkdir -p ${OCTAVIA_CERTS_DIR}/private
|
|
chmod 700 ${OCTAVIA_CERTS_DIR}/private
|
|
cp -p etc/octavia/certs/server_ca.cert.pem ${OCTAVIA_CERTS_DIR}/
|
|
cp -p etc/octavia/certs/server_ca-chain.cert.pem ${OCTAVIA_CERTS_DIR}/
|
|
cp -p etc/octavia/certs/server_ca.key.pem ${OCTAVIA_CERTS_DIR}/private/
|
|
cp -p etc/octavia/certs/client_ca.cert.pem ${OCTAVIA_CERTS_DIR}/
|
|
cp -p etc/octavia/certs/client.cert-and-key.pem ${OCTAVIA_CERTS_DIR}/private/
|
|
popd
|
|
fi
|
|
|
|
iniset $OCTAVIA_CONF certificates ca_certificate ${OCTAVIA_CERTS_DIR}/server_ca.cert.pem
|
|
iniset $OCTAVIA_CONF certificates ca_private_key ${OCTAVIA_CERTS_DIR}/private/server_ca.key.pem
|
|
iniset $OCTAVIA_CONF certificates ca_private_key_passphrase not-secure-passphrase
|
|
iniset $OCTAVIA_CONF controller_worker client_ca ${OCTAVIA_CERTS_DIR}/client_ca.cert.pem
|
|
iniset $OCTAVIA_CONF haproxy_amphora client_cert ${OCTAVIA_CERTS_DIR}/private/client.cert-and-key.pem
|
|
iniset $OCTAVIA_CONF haproxy_amphora server_ca ${OCTAVIA_CERTS_DIR}/server_ca-chain.cert.pem
|
|
|
|
# Controller side symmetric encryption, not used for PKI
|
|
iniset $OCTAVIA_CONF certificates server_certs_key_passphrase insecure-key-do-not-use-this-key
|
|
|
|
if [[ "$OCTAVIA_USE_LEGACY_RBAC" == "True" ]]; then
|
|
cp $OCTAVIA_DIR/etc/policy/admin_or_owner-policy.yaml $OCTAVIA_CONF_DIR/policy.yaml
|
|
iniset $OCTAVIA_CONF oslo_policy policy_file $OCTAVIA_CONF_DIR/policy.yaml
|
|
fi
|
|
if [[ "$OCTAVIA_USE_KEYSTONE_DEFAULT_ROLES" == "True" ]]; then
|
|
cp $OCTAVIA_DIR/etc/policy/keystone_default_roles-policy.yaml $OCTAVIA_CONF_DIR/policy.yaml
|
|
iniset $OCTAVIA_CONF oslo_policy policy_file $OCTAVIA_CONF_DIR/policy.yaml
|
|
fi
|
|
|
|
if [[ "$OCTAVIA_USE_MOD_WSGI" == "True" ]]; then
|
|
if [[ "$WSGI_MODE" == "uwsgi" ]]; then
|
|
_configure_octavia_apache_uwsgi
|
|
else
|
|
_configure_octavia_apache_wsgi
|
|
fi
|
|
fi
|
|
|
|
if [ $OCTAVIA_NODE == 'main' ]; then
|
|
configure_octavia_api_haproxy
|
|
# make sure octavia is reachable from haproxy
|
|
iniset $OCTAVIA_CONF api_settings bind_port ${OCTAVIA_HA_PORT}
|
|
iniset $OCTAVIA_CONF api_settings bind_host 0.0.0.0
|
|
fi
|
|
if [ $OCTAVIA_NODE != 'main' ] && [ $OCTAVIA_NODE != 'standalone' ] ; then
|
|
# make sure octavia is reachable from haproxy from main node
|
|
iniset $OCTAVIA_CONF api_settings bind_port ${OCTAVIA_HA_PORT}
|
|
iniset $OCTAVIA_CONF api_settings bind_host 0.0.0.0
|
|
fi
|
|
|
|
# set default graceful_shutdown_timeout to 300 sec (5 minutes)
|
|
# TODO(gthiemonge) update this value after persistant taskflow commits are
|
|
# merged
|
|
iniset $OCTAVIA_CONF DEFAULT graceful_shutdown_timeout 300
|
|
}
|
|
|
|
function create_mgmt_network_interface {
|
|
if [ $OCTAVIA_MGMT_PORT_IP != 'auto' ]; then
|
|
SUBNET_ID=$(openstack subnet show lb-mgmt-subnet -f value -c id)
|
|
PORT_FIXED_IP="--fixed-ip subnet=$SUBNET_ID,ip-address=$OCTAVIA_MGMT_PORT_IP"
|
|
fi
|
|
|
|
MGMT_PORT_ID=$(openstack port create --security-group lb-health-mgr-sec-grp --device-owner Octavia:health-mgr --host=$(hostname) -c id -f value --network lb-mgmt-net $PORT_FIXED_IP octavia-health-manager-$OCTAVIA_NODE-listen-port)
|
|
MGMT_PORT_MAC=$(openstack port show -c mac_address -f value $MGMT_PORT_ID)
|
|
|
|
MGMT_PORT_IP=$(openstack port show -f yaml -c fixed_ips $MGMT_PORT_ID | awk -v IP_VER=$SERVICE_IP_VERSION '{FS=",|";gsub(",","");gsub("'\''","");for(line = 1; line <= NF; ++line) {if ($line ~ /^.*- ip_address:/) {split($line, word, " ");if ((IP_VER == "4" || IP_VER == "") && word[3] ~ /\./) print word[3];if (IP_VER == "6" && word[3] ~ /:/) print word[3];} else {split($line, word, " ");for(ind in word) {if (word[ind] ~ /^ip_address=/) {split(word[ind], token, "=");if ((IP_VER == "4" || IP_VER == "") && token[2] ~ /\./) print token[2];if (IP_VER == "6" && token[2] ~ /:/) print token[2];}}}}}')
|
|
|
|
if function_exists octavia_create_network_interface_device ; then
|
|
octavia_create_network_interface_device o-hm0 $MGMT_PORT_ID $MGMT_PORT_MAC
|
|
else
|
|
die "Unknown network controller. Please define octavia_create_network_interface_device"
|
|
fi
|
|
sudo ip link set dev o-hm0 address $MGMT_PORT_MAC
|
|
|
|
function _get_firewall () {
|
|
# The devstack CI forces the use of iptables, the openstack-INPUT table
|
|
# can be used to indicate it.
|
|
if sudo iptables -L -n -v | grep openstack-INPUT; then
|
|
echo "iptables"
|
|
elif [[ -x $(which nft 2> /dev/null) ]]; then
|
|
echo "nft"
|
|
else
|
|
echo "iptables"
|
|
fi
|
|
}
|
|
|
|
# Check if the host is using nftables, an alternative to iptables
|
|
if [[ $(_get_firewall) == "nft" ]]; then
|
|
sudo nft add table inet octavia
|
|
sudo nft add chain inet octavia o-hm0-incoming { type filter hook input priority 0\;}
|
|
sudo nft flush chain inet octavia o-hm0-incoming
|
|
# Note: Order is important here and using counter here as this is
|
|
# devstack for testing.
|
|
sudo nft insert rule inet octavia o-hm0-incoming iifname "o-hm0" counter log drop
|
|
sudo nft insert rule inet octavia o-hm0-incoming iifname "o-hm0" meta l4proto ipv6-icmp counter accept
|
|
sudo nft insert rule inet octavia o-hm0-incoming iifname "o-hm0" udp dport $OCTAVIA_HM_LISTEN_PORT counter accept
|
|
sudo nft insert rule inet octavia o-hm0-incoming iifname "o-hm0" udp dport $OCTAVIA_AMP_LOG_ADMIN_PORT counter accept
|
|
sudo nft insert rule inet octavia o-hm0-incoming iifname "o-hm0" udp dport $OCTAVIA_AMP_LOG_TENANT_PORT counter accept
|
|
sudo nft insert rule inet octavia o-hm0-incoming iifname "o-hm0" ct state related,established accept
|
|
else
|
|
if [ $SERVICE_IP_VERSION == '6' ] ; then
|
|
# Allow the required IPv6 ICMP messages
|
|
sudo ip6tables -I INPUT -i o-hm0 -p ipv6-icmp -j ACCEPT
|
|
sudo ip6tables -I INPUT -i o-hm0 -p udp --dport $OCTAVIA_HM_LISTEN_PORT -j ACCEPT
|
|
sudo ip6tables -I INPUT -i o-hm0 -p udp --dport $OCTAVIA_AMP_LOG_ADMIN_PORT -j ACCEPT
|
|
sudo ip6tables -I INPUT -i o-hm0 -p udp --dport $OCTAVIA_AMP_LOG_TENANT_PORT -j ACCEPT
|
|
else
|
|
sudo iptables -I INPUT -i o-hm0 -p udp --dport $OCTAVIA_HM_LISTEN_PORT -j ACCEPT
|
|
sudo iptables -I INPUT -i o-hm0 -p udp --dport $OCTAVIA_AMP_LOG_ADMIN_PORT -j ACCEPT
|
|
sudo iptables -I INPUT -i o-hm0 -p udp --dport $OCTAVIA_AMP_LOG_TENANT_PORT -j ACCEPT
|
|
fi
|
|
fi
|
|
|
|
|
|
if [ $OCTAVIA_CONTROLLER_IP_PORT_LIST == 'auto' ] ; then
|
|
iniset $OCTAVIA_CONF health_manager controller_ip_port_list $MGMT_PORT_IP:$OCTAVIA_HM_LISTEN_PORT
|
|
else
|
|
iniset $OCTAVIA_CONF health_manager controller_ip_port_list $OCTAVIA_CONTROLLER_IP_PORT_LIST
|
|
fi
|
|
|
|
iniset $OCTAVIA_CONF health_manager bind_ip $MGMT_PORT_IP
|
|
iniset $OCTAVIA_CONF health_manager bind_port $OCTAVIA_HM_LISTEN_PORT
|
|
|
|
iniset $OCTAVIA_CONF amphora_agent admin_log_targets "${MGMT_PORT_IP}:${OCTAVIA_AMP_LOG_ADMIN_PORT}"
|
|
iniset $OCTAVIA_CONF amphora_agent tenant_log_targets "${MGMT_PORT_IP}:${OCTAVIA_AMP_LOG_TENANT_PORT}"
|
|
# Setting these here as the devstack rsyslog configuration expects
|
|
# these values.
|
|
iniset $OCTAVIA_CONF amphora_agent user_log_facility 0
|
|
iniset $OCTAVIA_CONF amphora_agent administrative_log_facility 1
|
|
|
|
}
|
|
|
|
function build_mgmt_network {
|
|
# Create network and attach a subnet
|
|
openstack network create lb-mgmt-net
|
|
if [ $SERVICE_IP_VERSION == '6' ] ; then
|
|
openstack subnet create --subnet-range $OCTAVIA_MGMT_SUBNET_IPV6 --allocation-pool start=$OCTAVIA_MGMT_SUBNET_IPV6_START,end=$OCTAVIA_MGMT_SUBNET_IPV6_END --network lb-mgmt-net --ip-version 6 --gateway none --no-dhcp lb-mgmt-subnet
|
|
else
|
|
openstack subnet create --subnet-range $OCTAVIA_MGMT_SUBNET --allocation-pool start=$OCTAVIA_MGMT_SUBNET_START,end=$OCTAVIA_MGMT_SUBNET_END --network lb-mgmt-net --gateway none --no-dhcp lb-mgmt-subnet
|
|
fi
|
|
|
|
# Create security group and rules
|
|
# Used for the amphora lb-mgmt-net ports
|
|
openstack security group create lb-mgmt-sec-grp
|
|
if [ $SERVICE_IP_VERSION == '6' ] ; then
|
|
openstack security group rule create --protocol ipv6-icmp --ethertype IPv6 --remote-ip ::/0 lb-mgmt-sec-grp
|
|
openstack security group rule create --protocol tcp --dst-port 22 --ethertype IPv6 --remote-ip ::/0 lb-mgmt-sec-grp
|
|
openstack security group rule create --protocol tcp --dst-port 9443 --ethertype IPv6 --remote-ip ::/0 lb-mgmt-sec-grp
|
|
else
|
|
openstack security group rule create --protocol icmp lb-mgmt-sec-grp
|
|
openstack security group rule create --protocol tcp --dst-port 22 lb-mgmt-sec-grp
|
|
openstack security group rule create --protocol tcp --dst-port 9443 lb-mgmt-sec-grp
|
|
fi
|
|
|
|
# Create security group and rules
|
|
# Used for the health manager port
|
|
openstack security group create lb-health-mgr-sec-grp
|
|
if [ $SERVICE_IP_VERSION == '6' ] ; then
|
|
openstack security group rule create --protocol ipv6-icmp --ethertype IPv6 --remote-ip ::/0 lb-health-mgr-sec-grp
|
|
openstack security group rule create --protocol udp --dst-port $OCTAVIA_HM_LISTEN_PORT --ethertype IPv6 --remote-ip ::/0 lb-health-mgr-sec-grp
|
|
openstack security group rule create --protocol udp --dst-port $OCTAVIA_AMP_LOG_ADMIN_PORT --ethertype IPv6 --remote-ip ::/0 lb-health-mgr-sec-grp
|
|
openstack security group rule create --protocol udp --dst-port $OCTAVIA_AMP_LOG_TENANT_PORT --ethertype IPv6 --remote-ip ::/0 lb-health-mgr-sec-grp
|
|
else
|
|
openstack security group rule create --protocol udp --dst-port $OCTAVIA_HM_LISTEN_PORT lb-health-mgr-sec-grp
|
|
openstack security group rule create --protocol udp --dst-port $OCTAVIA_AMP_LOG_ADMIN_PORT lb-health-mgr-sec-grp
|
|
openstack security group rule create --protocol udp --dst-port $OCTAVIA_AMP_LOG_TENANT_PORT lb-health-mgr-sec-grp
|
|
fi
|
|
}
|
|
|
|
function configure_lb_mgmt_sec_grp {
|
|
OCTAVIA_MGMT_SEC_GRP_ID=$(openstack security group show lb-mgmt-sec-grp -f value -c id)
|
|
iniset ${OCTAVIA_CONF} controller_worker amp_secgroup_list ${OCTAVIA_MGMT_SEC_GRP_ID}
|
|
}
|
|
|
|
function create_amphora_flavor {
|
|
disk_size=${OCTAVIA_AMP_IMAGE_SIZE:-2}
|
|
if [[ "$OCTAVIA_AMP_IMAGE_ARCH" =~ (aarch64|arm64) ]]; then
|
|
# DIB produces images larger than size specified, add another GB to the flavor disk
|
|
# See https://bugs.launchpad.net/diskimage-builder/+bug/1918461
|
|
disk_size=$((disk_size + 1))
|
|
fi
|
|
# Pass even if it exists to avoid race condition on multinode
|
|
openstack flavor create --id auto --ram 1024 --disk $disk_size --vcpus 1 --private m1.amphora -f value -c id --property hw_rng:allowed=True || true
|
|
amp_flavor_id=$(openstack flavor show m1.amphora -f value -c id)
|
|
iniset $OCTAVIA_CONF controller_worker amp_flavor_id $amp_flavor_id
|
|
}
|
|
|
|
function configure_octavia_api_haproxy {
|
|
|
|
install_package haproxy
|
|
|
|
cp ${OCTAVIA_DIR}/devstack/etc/octavia/haproxy.cfg ${OCTAVIA_CONF_DIR}/haproxy.cfg
|
|
|
|
sed -i.bak "s/OCTAVIA_PORT/${OCTAVIA_PORT}/" ${OCTAVIA_CONF_DIR}/haproxy.cfg
|
|
|
|
NODES=(${OCTAVIA_NODES//,/ })
|
|
|
|
for NODE in ${NODES[@]}; do
|
|
DATA=(${NODE//:/ })
|
|
NAME=$(echo -e "${DATA[0]}" | tr -d '[[:space:]]')
|
|
IP=$(echo -e "${DATA[1]}" | tr -d '[[:space:]]')
|
|
echo " server octavia-${NAME} ${IP}:80 weight 1" >> ${OCTAVIA_CONF_DIR}/haproxy.cfg
|
|
done
|
|
|
|
}
|
|
|
|
function configure_rsyslog {
|
|
sudo cp ${OCTAVIA_DIR}/devstack/etc/rsyslog/10-octavia-log-offloading.conf /etc/rsyslog.d/
|
|
sudo sed -e "
|
|
s|%ADMIN_PORT%|${OCTAVIA_AMP_LOG_ADMIN_PORT}|g;
|
|
s|%TENANT_PORT%|${OCTAVIA_AMP_LOG_TENANT_PORT}|g;
|
|
" -i /etc/rsyslog.d/10-octavia-log-offloading.conf
|
|
}
|
|
|
|
function octavia_start {
|
|
|
|
if [ $OCTAVIA_NODE != 'api' ] ; then
|
|
# This is probably out of scope here? Load it from config
|
|
MGMT_PORT_IP=$(iniget $OCTAVIA_CONF health_manager bind_ip)
|
|
|
|
if [ $SERVICE_IP_VERSION == '6' ] ; then
|
|
MGMT_SUBNET_ARRAY=(${OCTAVIA_MGMT_SUBNET_IPV6//// })
|
|
else
|
|
MGMT_SUBNET_ARRAY=(${OCTAVIA_MGMT_SUBNET//// })
|
|
fi
|
|
MGMT_SUBNET_MASK=${MGMT_SUBNET_ARRAY[1]}
|
|
|
|
sudo ip addr add $MGMT_PORT_IP/$MGMT_SUBNET_MASK dev o-hm0
|
|
sudo ip link set o-hm0 up
|
|
fi
|
|
|
|
if [ $OCTAVIA_NODE == 'main' ]; then
|
|
run_process $OCTAVIA_API_HAPROXY "/usr/sbin/haproxy -db -V -f ${OCTAVIA_CONF_DIR}/haproxy.cfg"
|
|
fi
|
|
|
|
if [[ "$OCTAVIA_USE_MOD_WSGI" == "True" ]]; then
|
|
_start_octavia_apache_wsgi
|
|
else
|
|
run_process $OCTAVIA_API "$OCTAVIA_API_BINARY $OCTAVIA_API_ARGS"
|
|
fi
|
|
|
|
run_process $OCTAVIA_DRIVER_AGENT "$OCTAVIA_DRIVER_AGENT_BINARY $OCTAVIA_DRIVER_AGENT_ARGS"
|
|
run_process $OCTAVIA_CONSUMER "$OCTAVIA_CONSUMER_BINARY $OCTAVIA_CONSUMER_ARGS"
|
|
run_process $OCTAVIA_HOUSEKEEPER "$OCTAVIA_HOUSEKEEPER_BINARY $OCTAVIA_HOUSEKEEPER_ARGS"
|
|
run_process $OCTAVIA_HEALTHMANAGER "$OCTAVIA_HEALTHMANAGER_BINARY $OCTAVIA_HEALTHMANAGER_ARGS"
|
|
|
|
restart_service rsyslog
|
|
}
|
|
|
|
function octavia_stop {
|
|
# octavia-specific stop actions
|
|
if [[ "$OCTAVIA_USE_MOD_WSGI" == "True" ]]; then
|
|
_stop_octavia_apache_wsgi
|
|
else
|
|
stop_process $OCTAVIA_API
|
|
fi
|
|
stop_process $OCTAVIA_DRIVER_AGENT
|
|
stop_process $OCTAVIA_CONSUMER
|
|
stop_process $OCTAVIA_HOUSEKEEPER
|
|
stop_process $OCTAVIA_HEALTHMANAGER
|
|
|
|
# TODO(johnsom) Remove this in 2025.2 release so upgrades will stop this
|
|
# process.
|
|
# Kill dhclient process started for o-hm0 interface
|
|
pids=$(ps aux | awk '/[o]-hm0/ { print $2 }')
|
|
[ ! -z "$pids" ] && sudo kill $pids
|
|
|
|
if function_exists octavia_delete_network_interface_device ; then
|
|
octavia_delete_network_interface_device o-hm0
|
|
fi
|
|
|
|
# Grenade upgrades need the IP address removed here
|
|
MGMT_PORT_IP=$(iniget $OCTAVIA_CONF health_manager bind_ip)
|
|
if [ $SERVICE_IP_VERSION == '6' ] ; then
|
|
MGMT_SUBNET_ARRAY=(${OCTAVIA_MGMT_SUBNET_IPV6//// })
|
|
else
|
|
MGMT_SUBNET_ARRAY=(${OCTAVIA_MGMT_SUBNET//// })
|
|
fi
|
|
MGMT_SUBNET_MASK=${MGMT_SUBNET_ARRAY[1]}
|
|
sudo ip addr del $MGMT_PORT_IP/$MGMT_SUBNET_MASK dev o-hm0
|
|
|
|
if [[ $NEUTRON_AGENT == "linuxbridge" || $Q_AGENT == "linuxbridge" ]]; then
|
|
# This elif can go away in the X cycle, needed for grenade old/new logic
|
|
if ip link show o-hm0 ; then
|
|
sudo ip link del o-hm0
|
|
fi
|
|
fi
|
|
|
|
if [[ ${OCTAVIA_ENABLE_AMPHORAV2_JOBBOARD} == True ]]; then
|
|
stop_redis
|
|
fi
|
|
}
|
|
|
|
function octavia_cleanup {
|
|
|
|
if [ ${OCTAVIA_AMP_IMAGE_NAME}x != x ] ; then
|
|
rm -rf ${OCTAVIA_AMP_IMAGE_NAME}*
|
|
fi
|
|
if [ ${OCTAVIA_AMP_SSH_KEY_NAME}x != x ] ; then
|
|
rm -f ${OCTAVIA_AMP_SSH_KEY_NAME}*
|
|
fi
|
|
if [ ${OCTAVIA_SSH_DIR}x != x ] ; then
|
|
rm -rf ${OCTAVIA_SSH_DIR}
|
|
fi
|
|
if [ ${OCTAVIA_CONF_DIR}x != x ] ; then
|
|
sudo rm -rf ${OCTAVIA_CONF_DIR}
|
|
fi
|
|
if [ ${OCTAVIA_RUN_DIR}x != x ] ; then
|
|
sudo rm -rf ${OCTAVIA_RUN_DIR}
|
|
fi
|
|
if [ ${OCTAVIA_AMP_SSH_KEY_PATH}x != x ] ; then
|
|
rm -f ${OCTAVIA_AMP_SSH_KEY_PATH} ${OCTAVIA_AMP_SSH_KEY_PATH}.pub
|
|
fi
|
|
if [ $OCTAVIA_NODE == 'main' ] || [ $OCTAVIA_NODE == 'standalone' ] ; then
|
|
if [ ${OCTAVIA_AMP_SSH_KEY_NAME}x != x ] ; then
|
|
openstack keypair delete ${OCTAVIA_AMP_SSH_KEY_NAME} || true
|
|
fi
|
|
fi
|
|
if [[ "$OCTAVIA_USE_MOD_WSGI" == "True" ]]; then
|
|
_cleanup_octavia_apache_wsgi
|
|
fi
|
|
|
|
sudo rm -rf $OCTAVIA_DIR/bin/dual_ca
|
|
sudo rm -rf $OCTAVIA_DIR/bin/single_ca
|
|
|
|
sudo rm -rf $NOVA_STATE_PATH $NOVA_AUTH_CACHE_DIR
|
|
|
|
if [[ ${OCTAVIA_ENABLE_AMPHORAV2_JOBBOARD} == True ]]; then
|
|
uninstall_redis
|
|
fi
|
|
|
|
sudo rm -f /etc/rsyslog.d/10-octavia-log-offloading.conf
|
|
restart_service rsyslog
|
|
|
|
}
|
|
|
|
function add_load-balancer_roles {
|
|
get_or_create_role load-balancer_observer
|
|
get_or_create_role load-balancer_global_observer
|
|
get_or_create_role load-balancer_member
|
|
get_or_create_role load-balancer_admin
|
|
get_or_create_role load-balancer_quota_admin
|
|
get_or_add_user_project_role load-balancer_member demo demo
|
|
}
|
|
|
|
function octavia_init {
|
|
if [ $OCTAVIA_NODE != 'main' ] && [ $OCTAVIA_NODE != 'standalone' ] && [ $OCTAVIA_NODE != 'api' ]; then
|
|
# without the other services enabled apparently we don't have
|
|
# credentials at this point
|
|
# TOP_DIR=$(cd $(dirname "$0") && pwd)
|
|
source ${TOP_DIR}/openrc admin admin
|
|
OCTAVIA_AMP_NETWORK_ID=$(openstack network show lb-mgmt-net -f value -c id)
|
|
iniset $OCTAVIA_CONF controller_worker amp_boot_network_list ${OCTAVIA_AMP_NETWORK_ID}
|
|
fi
|
|
|
|
if [ $OCTAVIA_NODE == 'main' ] || [ $OCTAVIA_NODE == 'standalone' ] ; then
|
|
# things that should only happen on the ha main node / or once
|
|
if ! openstack keypair show ${OCTAVIA_AMP_SSH_KEY_NAME} ; then
|
|
openstack keypair create --public-key ${OCTAVIA_AMP_SSH_KEY_PATH}.pub ${OCTAVIA_AMP_SSH_KEY_NAME}
|
|
fi
|
|
|
|
# Check if an amphora image is already loaded
|
|
AMPHORA_IMAGE_NAME=$(openstack image list --property name=${OCTAVIA_AMP_IMAGE_NAME} -f value -c Name)
|
|
export AMPHORA_IMAGE_NAME
|
|
|
|
if [ "$AMPHORA_IMAGE_NAME" == ${OCTAVIA_AMP_IMAGE_NAME} ]; then
|
|
echo "Found existing amphora image: $AMPHORA_IMAGE_NAME"
|
|
echo "Skipping amphora image build"
|
|
export DISABLE_AMP_IMAGE_BUILD=True
|
|
fi
|
|
|
|
if ! [ "$DISABLE_AMP_IMAGE_BUILD" == 'True' ]; then
|
|
build_octavia_worker_image
|
|
fi
|
|
|
|
OCTAVIA_AMP_IMAGE_ID=$(openstack image list -f value --property name=${OCTAVIA_AMP_IMAGE_NAME} -c ID)
|
|
|
|
if [ -n "$OCTAVIA_AMP_IMAGE_ID" ]; then
|
|
# Normalize architecture
|
|
# https://docs.openstack.org/nova/latest/configuration/config.html#filter_scheduler.image_properties_default_architecture
|
|
hw_arch=${OCTAVIA_AMP_IMAGE_ARCH:-x86_64}
|
|
if [[ "$OCTAVIA_AMP_IMAGE_ARCH" == "amd64" ]]; then
|
|
hw_arch="x86_64"
|
|
elif [[ "$OCTAVIA_AMP_IMAGE_ARCH" == "arm64" ]]; then
|
|
hw_arch="aarch64"
|
|
fi
|
|
openstack image set --tag ${OCTAVIA_AMP_IMAGE_TAG} --property hw_architecture=${hw_arch} --property hw_rng_model=virtio ${OCTAVIA_AMP_IMAGE_ID}
|
|
fi
|
|
|
|
# Create a management network.
|
|
build_mgmt_network
|
|
OCTAVIA_AMP_NETWORK_ID=$(openstack network show lb-mgmt-net -f value -c id)
|
|
iniset $OCTAVIA_CONF controller_worker amp_boot_network_list ${OCTAVIA_AMP_NETWORK_ID}
|
|
|
|
create_octavia_accounts
|
|
|
|
add_load-balancer_roles
|
|
elif [ $OCTAVIA_NODE == 'api' ] ; then
|
|
create_octavia_accounts
|
|
|
|
add_load-balancer_roles
|
|
fi
|
|
|
|
if [ $OCTAVIA_NODE != 'api' ] ; then
|
|
create_mgmt_network_interface
|
|
create_amphora_flavor
|
|
configure_lb_mgmt_sec_grp
|
|
configure_rsyslog
|
|
fi
|
|
|
|
if ! [ "$DISABLE_AMP_IMAGE_BUILD" == 'True' ]; then
|
|
set_octavia_worker_image_owner_id
|
|
fi
|
|
}
|
|
|
|
function _configure_tempest {
|
|
iniset $TEMPEST_CONFIG service_available octavia "True"
|
|
}
|
|
|
|
# check for service enabled
|
|
if is_service_enabled $OCTAVIA; then
|
|
if [ $OCTAVIA_NODE == 'main' ] || [ $OCTAVIA_NODE == 'standalone' ] ; then # main-ha node stuff only
|
|
if ! is_service_enabled $NEUTRON_ANY; then
|
|
die "The neutron-api/q-svc service must be enabled to use $OCTAVIA"
|
|
fi
|
|
|
|
if [ "$DISABLE_AMP_IMAGE_BUILD" == 'True' ]; then
|
|
echo "Found DISABLE_AMP_IMAGE_BUILD == True"
|
|
echo "Skipping amphora image build"
|
|
fi
|
|
|
|
fi
|
|
|
|
if [[ "$1" == "stack" && "$2" == "install" ]]; then
|
|
# Perform installation of service source
|
|
echo_summary "Installing octavia"
|
|
octavia_lib_install
|
|
octavia_install
|
|
octaviaclient_install
|
|
|
|
elif [[ "$1" == "stack" && "$2" == "post-config" ]]; then
|
|
# Configure after the other layer 1 and 2 services have been configured
|
|
# TODO: need to make sure this runs after LBaaS V2 configuration
|
|
echo_summary "Configuring octavia"
|
|
octavia_configure
|
|
|
|
elif [[ "$1" == "stack" && "$2" == "extra" ]]; then
|
|
# Initialize and start the octavia service
|
|
echo_summary "Initializing Octavia"
|
|
octavia_init
|
|
|
|
echo_summary "Starting Octavia"
|
|
octavia_start
|
|
elif [[ "$1" == "stack" && "$2" == "test-config" ]]; then
|
|
if is_service_enabled tempest; then
|
|
# Configure Tempest for Congress
|
|
_configure_tempest
|
|
fi
|
|
fi
|
|
fi
|
|
|
|
if [[ "$1" == "unstack" ]]; then
|
|
# Shut down Octavia services
|
|
if is_service_enabled $OCTAVIA; then
|
|
echo_summary "Stopping octavia"
|
|
octavia_stop
|
|
fi
|
|
fi
|
|
|
|
if [[ "$1" == "clean" ]]; then
|
|
# Remember clean.sh first calls unstack.sh
|
|
if is_service_enabled $OCTAVIA; then
|
|
echo_summary "Cleaning up octavia"
|
|
octavia_cleanup
|
|
fi
|
|
fi
|
|
|
|
if [[ $saveenv =~ e ]]; then
|
|
set -e
|
|
else
|
|
set +e
|
|
fi
|
|
if [[ $saveenv =~ x ]]; then
|
|
set -x
|
|
else
|
|
set +x
|
|
fi
|