c366263407
Update the client and tests to call the workflow tripleo.parameters.v1.generate_fencing_parameters instead of the action tripleo.parameters.generate_fencing directly. Change-Id: I9539109db4edd4b5fa2ee365cc8b3055bd2c5df7 Depends-On: I63f3a579af5aa70080f8c9cdd5eb0e8f5b3d17da Partial-Bug: #1640436
137 lines
5.2 KiB
Python
137 lines
5.2 KiB
Python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
import argparse
|
|
import logging
|
|
import os
|
|
import simplejson
|
|
import yaml
|
|
|
|
from osc_lib.i18n import _
|
|
|
|
from tripleoclient import command
|
|
from tripleoclient import exceptions
|
|
from tripleoclient import utils
|
|
from tripleoclient.workflows import parameters
|
|
|
|
|
|
class SetParameters(command.Command):
|
|
"""Set a parameters for a plan"""
|
|
|
|
log = logging.getLogger(__name__ + ".CreatePlan")
|
|
|
|
def get_parser(self, prog_name):
|
|
parser = super(SetParameters, self).get_parser(prog_name)
|
|
parser.add_argument(
|
|
'name',
|
|
help=_('The name of the plan, which is used for the Swift '
|
|
'container, Mistral environment and Heat stack names.'))
|
|
parser.add_argument('file_in', type=argparse.FileType('r'))
|
|
|
|
return parser
|
|
|
|
def take_action(self, parsed_args):
|
|
self.log.debug("take_action(%s)" % parsed_args)
|
|
|
|
if parsed_args.file_in.name.endswith('.json'):
|
|
params = simplejson.load(parsed_args.file_in)
|
|
elif parsed_args.file_in.name.endswith('.yaml'):
|
|
params = yaml.safe_load(parsed_args.file_in)
|
|
else:
|
|
raise exceptions.InvalidConfiguration(
|
|
_("Invalid file extension for %s, must be json or yaml") %
|
|
parsed_args.file_in.name)
|
|
|
|
if 'parameter_defaults' in params:
|
|
params = params['parameter_defaults']
|
|
|
|
clients = self.app.client_manager
|
|
workflow_client = clients.workflow_engine
|
|
|
|
name = parsed_args.name
|
|
|
|
parameters.update_parameters(
|
|
workflow_client,
|
|
container=name,
|
|
parameters=params
|
|
)
|
|
|
|
|
|
class GenerateFencingParameters(command.Command):
|
|
"""Generate fencing parameters"""
|
|
|
|
log = logging.getLogger(__name__ + ".GenerateFencing")
|
|
|
|
def get_parser(self, prog_name):
|
|
parser = super(GenerateFencingParameters, self).get_parser(prog_name)
|
|
parser.add_argument('-a', '--action', dest='fence_action',
|
|
help=_('DEPRECATED: This option is ignored.'))
|
|
parser.add_argument('--delay', type=int,
|
|
help=_('Wait DELAY seconds before fencing is '
|
|
'started'))
|
|
parser.add_argument('--ipmi-lanplus',
|
|
action='store_true',
|
|
help=_('Use Lanplus. Defaults to: false'))
|
|
parser.add_argument('--ipmi-cipher', type=int,
|
|
help=_('Ciphersuite to use (same as ipmitool -C '
|
|
'parameter.'))
|
|
parser.add_argument('--ipmi-level',
|
|
help=_('Privilegel level on IPMI device. Valid '
|
|
'levels: callback, user, operator, '
|
|
'administrator.'))
|
|
parser.add_argument('--output', type=argparse.FileType('w'),
|
|
help=_('Write parameters to a file'))
|
|
parser.add_argument('instackenv', type=argparse.FileType('r'))
|
|
return parser
|
|
|
|
def take_action(self, parsed_args):
|
|
nodes_config = utils.parse_env_file(parsed_args.instackenv)
|
|
|
|
# We only need to collect OpenStack client authentication data
|
|
# if we have nodes using Ironic's pxe_ssh driver. If there are
|
|
# any, we'll use the fence_ironic fencing agent, which requires
|
|
# the auth data.
|
|
os_auth = None
|
|
for node in nodes_config:
|
|
if node["pm_type"] == "pxe_ssh":
|
|
os_auth = {}
|
|
if os_auth:
|
|
try:
|
|
os_auth["auth_url"] = os.environ["OS_AUTH_URL"]
|
|
os_auth["login"] = os.environ["OS_USERNAME"]
|
|
os_auth["passwd"] = os.environ["OS_PASSWORD"]
|
|
os_auth["tenant_name"] = os.environ["OS_TENANT_NAME"]
|
|
except KeyError:
|
|
# This really shouldn't happen since we're running in
|
|
# tripleoclient
|
|
raise ValueError(
|
|
_("Unable to find one or more of OS_AUTH_URL, "
|
|
"OS_USERNAME, OS_PASSWORD or OS_TENANT_NAME in the "
|
|
"environment."))
|
|
workflow_input = {
|
|
'nodes_json': nodes_config,
|
|
'os_auth': os_auth,
|
|
'delay': parsed_args.delay,
|
|
'ipmi_level': parsed_args.ipmi_level,
|
|
'ipmi_cipher': parsed_args.ipmi_cipher,
|
|
'ipmi_lanplus': parsed_args.ipmi_lanplus,
|
|
}
|
|
|
|
result = parameters.generate_fencing_parameters(
|
|
self.app.client_manager, **workflow_input)
|
|
|
|
fencing_parameters = yaml.safe_dump(result, default_flow_style=False)
|
|
if parsed_args.output:
|
|
parsed_args.output.write(fencing_parameters)
|
|
else:
|
|
print(fencing_parameters)
|