aboutsummaryrefslogtreecommitdiffstats
path: root/nfvbench/config.py
blob: 5feeda5c608406b13ce080bd59b75db489411366 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
# Copyright 2016 Cisco Systems, Inc.  All rights reserved.
#
#    Licensed under the Apache License, Version 2.0 (the "License"); you may
#    not use this file except in compliance with the License. You may obtain
#    a copy of the License at
#
#         http://www.apache.org/licenses/LICENSE-2.0
#
#    Unless required by applicable law or agreed to in writing, software
#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
#    License for the specific language governing permissions and limitations
#    under the License.
#

from attrdict import AttrDict
import yaml

from log import LOG

def config_load(file_name, from_cfg=None, whitelist_keys=None):
    """Load a yaml file into a config dict, merge with from_cfg if not None
    The config file content taking precedence in case of duplicate
    """
    try:
        with open(file_name) as fileobj:
            cfg = AttrDict(yaml.safe_load(fileobj))
    except IOError:
        raise Exception("Configuration file at '{}' was not found. Please use correct path "
                        "and verify it is visible to container if you run nfvbench in container."
                        .format(file_name))

    if from_cfg:
        if not whitelist_keys:
            whitelist_keys = []
        _validate_config(cfg, from_cfg, whitelist_keys)
        cfg = from_cfg + cfg

    return cfg


def config_loads(cfg_text, from_cfg=None, whitelist_keys=None):
    """Same as config_load but load from a string
    """
    try:
        cfg = AttrDict(yaml.load(cfg_text))
    except TypeError:
        # empty string
        cfg = AttrDict()
    if from_cfg:
        if not whitelist_keys:
            whitelist_keys = []
        _validate_config(cfg, from_cfg, whitelist_keys)
        return from_cfg + cfg
    return cfg


def _validate_config(subset, superset, whitelist_keys):
    def get_err_config(subset, superset):
        result = {}
        for k, v in subset.items():
            if k not in whitelist_keys:
                if k not in superset:
                    result.update({k: v})
                elif v is not None and superset[k] is not None:
                    if not isinstance(v, type(superset[k])):
                        result.update({k: v})
                        continue
                if isinstance(v, dict):
                    res = get_err_config(v, superset[k])
                    if res:
                        result.update({k: res})
        if not result:
            return None
        return result

    err_cfg = get_err_config(subset, superset)
    if err_cfg:
        err_msg = 'The provided configuration has unknown options or values with invalid type: '\
                  + str(err_cfg)
        LOG.error(err_msg)
        raise Exception(err_msg)
fetch: src=/root/.ssh/id_rsa.pub dest=/tmp/ssh-keys-{{ ansible_hostname }} flat=yes - authorized_key: user: root key: "{{ lookup('file', 'item') }}" with_fileglob: - /tmp/ssh-keys-* max_fail_percentage: 0 roles: - common - hosts: all remote_user: root accelerate: true max_fail_percentage: 0 roles: - setup-network - hosts: ha remote_user: root accelerate: true max_fail_percentage: 0 roles: - ha - hosts: controller remote_user: root accelerate: true max_fail_percentage: 0 roles: - memcached - apache - database - mq - keystone - nova-controller - neutron-controller - cinder-controller - glance - neutron-common - neutron-network - ceilometer_controller # - ext-network - dashboard - heat - aodh - hosts: all remote_user: root accelerate: true max_fail_percentage: 0 roles: - storage - hosts: compute remote_user: root accelerate: true max_fail_percentage: 0 roles: - nova-compute - neutron-compute - cinder-volume - ceilometer_compute - hosts: all remote_user: root accelerate: true max_fail_percentage: 0 roles: - secgroup - hosts: ceph_adm remote_user: root accelerate: true max_fail_percentage: 0 roles: [] # - ceph-deploy - hosts: ceph remote_user: root accelerate: true max_fail_percentage: 0 roles: - ceph-purge - ceph-config - hosts: ceph_mon remote_user: root accelerate: true max_fail_percentage: 0 roles: - ceph-mon - hosts: ceph_osd remote_user: root accelerate: true max_fail_percentage: 0 roles: - ceph-osd - hosts: ceph remote_user: root accelerate: true max_fail_percentage: 0 roles: - ceph-openstack - hosts: all remote_user: root accelerate: true max_fail_percentage: 0 roles: - monitor - hosts: all remote_user: root accelerate: true max_fail_percentage: 0 tasks: - name: set bash to nova user: name: nova shell: /bin/bash - name: make sure ssh dir exist file: path: '{{ item.path }}' owner: '{{ item.owner }}' group: '{{ item.group }}' state: directory mode: 0755 with_items: - path: /var/lib/nova/.ssh owner: nova group: nova - name: copy ssh keys for nova shell: cp -rf /root/.ssh/id_rsa /var/lib/nova/.ssh; - name: write ssh config copy: content: "UserKnownHostsFile /dev/null\nStrictHostKeyChecking no" dest: '{{ item.dest }}' owner: '{{ item.owner }}' group: '{{ item.group }}' mode: 0600 with_items: - dest: /var/lib/nova/.ssh/config owner: nova group: nova - authorized_key: user: nova key: "{{ lookup('file', 'item') }}" with_fileglob: - /tmp/ssh-keys-* - name: chown ssh file shell: chown -R nova:nova /var/lib/nova/.ssh; - hosts: all remote_user: root accelerate: true max_fail_percentage: 0 roles: - odl_cluster - hosts: all remote_user: root accelerate: true max_fail_percentage: 0 roles: - onos_cluster - hosts: all remote_user: root sudo: True max_fail_percentage: 0 roles: - open-contrail - hosts: all remote_user: root accelerate: true serial: 1 max_fail_percentage: 0 roles: - odl_cluster_neutron - hosts: all remote_user: root accelerate: true max_fail_percentage: 0 roles: - odl_cluster_post - hosts: controller remote_user: root accelerate: true max_fail_percentage: 0 roles: - ext-network - hosts: controller remote_user: root accelerate: true max_fail_percentage: 0 roles: - tacker - hosts: controller remote_user: root accelerate: true max_fail_percentage: 0 roles: - controller-recovery - hosts: compute remote_user: root accelerate: true max_fail_percentage: 0 roles: - compute-recovery