crowbar/crowbar-openstack

View on GitHub
chef/cookbooks/monasca/recipes/server.rb

Summary

Maintainability
C
7 hrs
Test Coverage
# Copyright 2016 SUSE Linux GmbH
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#

keystone_settings = KeystoneHelper.keystone_settings(node, @cookbook_name)

register_auth_hash = {
  user: keystone_settings["admin_user"],
  password: keystone_settings["admin_password"],
  project: keystone_settings["admin_project"]
}

keystone_register "monasca api wakeup keystone" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  action :wakeup
end

keystone_register "register monasca api user" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  user_name keystone_settings["service_user"]
  user_password keystone_settings["service_password"]
  project_name keystone_settings["service_tenant"]
  action :add_user
end

keystone_register "give monasca api user access" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  user_name keystone_settings["service_user"]
  project_name keystone_settings["service_tenant"]
  role_name "admin"
  action :add_access
end

keystone_register "register monasca api service" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  service_name "monasca"
  service_type "monitoring"
  service_description "Monasca monitoring service"
  action :add_service
end

keystone_register "register monasca api endpoint" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  endpoint_service "monasca"
  endpoint_region keystone_settings["endpoint_region"]
  endpoint_publicURL MonascaHelper.api_public_url(node)
  endpoint_adminURL MonascaHelper.api_admin_url(node)
  endpoint_internalURL MonascaHelper.api_internal_url(node)
  action :add_endpoint
end

keystone_register "register logs service" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  service_name "logs"
  service_type "logs"
  service_description "Monasca logs service"
  action :add_service
end

keystone_register "register logs endpoint" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  endpoint_service "logs"
  endpoint_region keystone_settings["endpoint_region"]
  endpoint_publicURL MonascaHelper.log_api_public_url(node, "v3.0")
  endpoint_adminURL MonascaHelper.log_api_admin_url(node, "v3.0")
  endpoint_internalURL MonascaHelper.log_api_internal_url(node, "v3.0")
  action :add_endpoint
end

keystone_register "register logs_v2 service" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  service_name "logs_v2"
  service_type "logs_v2"
  service_description "Monasca logs_v2 service"
  action :add_service
end

keystone_register "register logs_v2 endpoint" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  endpoint_service "logs_v2"
  endpoint_region keystone_settings["endpoint_region"]
  endpoint_publicURL MonascaHelper.log_api_public_url(node, "v2.0")
  endpoint_adminURL MonascaHelper.log_api_admin_url(node, "v2.0")
  endpoint_internalURL MonascaHelper.log_api_internal_url(node, "v2.0")
  action :add_endpoint
end

keystone_register "register logs-search service" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  service_name "logs-search"
  service_type "logs-search"
  service_description "Monasca logs-search service"
  action :add_service
end

keystone_register "register logs-search endpoint" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  endpoint_service "logs-search"
  endpoint_region keystone_settings["endpoint_region"]
  endpoint_publicURL MonascaHelper.logs_search_public_url(node)
  endpoint_adminURL MonascaHelper.logs_search_admin_url(node)
  endpoint_internalURL MonascaHelper.logs_search_internal_url(node)
  action :add_endpoint
end

monasca_project = node[:monasca][:service_tenant]
monasca_roles = node[:monasca][:service_roles]

if node[:monasca][:agent][:monitor_libvirt]
  monasca_roles.push node[:monasca][:delegate_role]
end

keystone_settings = KeystoneHelper.keystone_settings(node, @cookbook_name)

register_auth_hash = {
  user: keystone_settings["admin_user"],
  password: keystone_settings["admin_password"],
  project: keystone_settings["admin_project"]
}

keystone_register "monasca:common wakeup keystone" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  action :wakeup
end

keystone_register "monasca:common create project #{monasca_project} for monasca" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  project_name monasca_project
  action :add_project
end

monasca_roles.each do |role|
  keystone_register "monasca:common register #{role} role in #{monasca_project} tenant" do
    protocol keystone_settings["protocol"]
    insecure keystone_settings["insecure"]
    host keystone_settings["internal_url_host"]
    port keystone_settings["admin_port"]
    auth register_auth_hash
    role_name role
    action :add_role
  end
end

# Required for Kibana access
keystone_register "give admin user admin role in monasca tenant" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  user_name keystone_settings["admin_user"]
  project_name monasca_project
  role_name "admin"
  action :add_access
end

# Required for Grafana access
keystone_register "give admin user monasca-user role in monasca tenant" do
  protocol keystone_settings["protocol"]
  insecure keystone_settings["insecure"]
  host keystone_settings["internal_url_host"]
  port keystone_settings["admin_port"]
  auth register_auth_hash
  user_name keystone_settings["admin_user"]
  project_name monasca_project
  role_name "monasca-user"
  action :add_access
end

agents_settings = []

agents_settings.push(node[:monasca][:agent][:keystone])
la_keystone = node[:monasca][:log_agent][:keystone]
agents_settings.push(la_keystone)

unless agents_settings.empty?
  agents_settings.each do |as|

    keystone_register "monasca:common #{as["service_user"]} in #{as["service_tenant"]} project" do
      protocol keystone_settings["protocol"]
      insecure keystone_settings["insecure"]
      host keystone_settings["internal_url_host"]
      port keystone_settings["admin_port"]
      auth register_auth_hash
      user_name as["service_user"]
      user_password as["service_password"]
      project_name as["service_tenant"]
      action :add_user
    end

    keystone_register "monasca:common #{as["service_user"]} assign role #{as["service_role"]}" do
      protocol keystone_settings["protocol"]
      insecure keystone_settings["insecure"]
      host keystone_settings["internal_url_host"]
      port keystone_settings["admin_port"]
      auth register_auth_hash
      user_name as["service_user"]
      project_name as["service_tenant"]
      role_name as["service_role"]
      action :add_access
    end

  end
end