blob: 4b1f14a216bf02d92ebee701ebe375cf5fad8557 [file] [log] [blame]
# Copyright 2016 Mirantis, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
import copy
import os
import pkg_resources
from oslo_config import cfg
from oslo_config import generator
from tcp_tests.helpers import ext
from tcp_tests.helpers import oslo_cfg_types as ct
from tcp_tests import settings
print("\n" + "-" * 10 + " Initialize oslo.config variables with defaults"
" from environment" + "-" * 10)
_default_conf = pkg_resources.resource_filename(
__name__, 'templates/{0}/underlay.yaml'.format(settings.LAB_CONFIG_NAME))
_default_salt_steps = pkg_resources.resource_filename(
__name__, 'templates/{0}/salt.yaml'.format(settings.LAB_CONFIG_NAME))
_default_environment_template_dir = pkg_resources.resource_filename(
__name__, 'environment/')
_default_templates_dir = pkg_resources.resource_filename(
__name__, 'templates/')
_default_core_steps = pkg_resources.resource_filename(
__name__,
'templates/{0}/core.yaml'.format(
settings.LAB_CONFIG_NAME))
_default_oss_steps = pkg_resources.resource_filename(
__name__,
'templates/{0}/oss.yaml'.format(
settings.LAB_CONFIG_NAME))
_default_drivetrain_steps = pkg_resources.resource_filename(
__name__,
'templates/{0}/drivetrain.yaml'.format(
settings.LAB_CONFIG_NAME))
_default_decapod_steps = pkg_resources.resource_filename(
__name__,
'templates/{0}/decapod.yaml'.format(
settings.LAB_CONFIG_NAME))
_default_openstack_steps = pkg_resources.resource_filename(
__name__, 'templates/{0}/openstack.yaml'.format(
settings.LAB_CONFIG_NAME))
_default_openstack_resources_steps = pkg_resources.resource_filename(
__name__, 'templates/{0}/post_openstack.yaml'.format(
settings.LAB_CONFIG_NAME))
_default_opencontrail_prepare_tests_steps_path = \
pkg_resources.resource_filename(
__name__, 'templates/{0}/opencontrail.yaml'.format(
settings.LAB_CONFIG_NAME))
_default_sl_prepare_tests_steps_path = pkg_resources.resource_filename(
__name__, 'templates/{0}/sl.yaml'.format(
settings.LAB_CONFIG_NAME))
_default_ceph_prepare_tests_steps_path = pkg_resources.resource_filename(
__name__, 'templates/{0}/ceph.yaml'.format(
settings.LAB_CONFIG_NAME))
_default_k8s_steps = pkg_resources.resource_filename(
__name__, 'templates/{0}/k8s.yaml'.format(
settings.LAB_CONFIG_NAME))
_default_k8s_update_steps = pkg_resources.resource_filename(
__name__, 'templates/{0}/k8s-update.yaml'.format(
settings.LAB_CONFIG_NAME))
_default_net_mgm = os.environ.get("NET_MGMT", "admin-pool01")
_default_configure_steps = pkg_resources.resource_filename(
__name__, 'templates/{0}/cfg01_configure.yaml'.format(
settings.LAB_CONFIG_NAME))
# _default_cluster_maas_config = pkg_resources.resource_filename(
# __name__, 'templates/{0}/cluster_infra_maas.yml'.format(
# settings.LAB_CONFIG_NAME))
_default_cluster_maas_config = 'cluster_infra_maas.yml'
hardware_opts = [
ct.Cfg('manager', ct.String(),
help="Hardware manager name", default="devops"),
ct.Cfg('conf_path', ct.String(),
help="Hardware config file", default=_default_conf),
ct.Cfg('current_snapshot', ct.String(),
help="Latest environment status name",
default=ext.SNAPSHOT.hardware),
]
underlay_opts = [
ct.Cfg('ssh', ct.JSONList(),
help="""SSH Settings for Underlay: [{
'node_name': node1,
'minion_id': node1.local,
'roles': ['salt-master', 'salt-minion', ],
'host': hostname,
'login': login,
'password': password,
'address_pool': (optional),
'port': (optional),
'keys': [(optional)],
}, ...]""", default=[]),
ct.Cfg('roles', ct.JSONList(),
help="Node roles managed by underlay in the environment",
default=[ext.UNDERLAY_NODE_ROLES.salt_master,
ext.UNDERLAY_NODE_ROLES.salt_minion,
ext.UNDERLAY_NODE_ROLES.k8s_controller]),
ct.Cfg('bootstrap_timeout', ct.Integer(),
help="Timeout of waiting SSH for nodes with specified roles",
default=600),
ct.Cfg('nameservers', ct.JSONList(),
help="IP addresses of DNS servers",
default=[]),
ct.Cfg('upstream_dns_servers', ct.JSONList(),
help="IP addresses of upstream DNS servers (dnsmasq)",
default=[]),
ct.Cfg('address_pools', ct.JSONDict(),
help="""Address pools (dynamically) allocated for the environment.
May be used to determine CIDR for a specific network from
tests or during the deployment process.
{'pool_name1': '<cidr>', 'pool_name2': '<cidr>', ...}""",
default={}),
ct.Cfg('dhcp_ranges', ct.JSONDict(),
help="""DHCP ranges allocated for the address pools.
This is extended object comparing to 'address_pools'.
May be used to determine DHCP range start/end/gateway for a
specific network from tests or during the deployment
process.
{'pool_name1': {'cidr': 'n.n.n.n/m',
'start': 'x.x.x.x',
'end': 'y.y.y.y',
'gateway': 'z.z.z.z'},
'pool_name2': {'cidr': 'n.n.n.n/m',
'start': x.x.x.x,
'end': 'y.y.y.y',
'gateway': 'z.z.z.z'},
...}""",
default={}),
ct.Cfg('ssh_keys', ct.JSONList(), default=[],
help="SSH key pair(s) for root. If the option is left empty, "
"then a key pair will be generated automatically"),
ct.Cfg('ssh_key_file', ct.String(), default=os.path.abspath('./id_rsa'),
help='Path (local) to file with private key authorized on nodes'),
ct.Cfg('net_mgmt', ct.String(), default=_default_net_mgm)
]
salt_deploy_opts = [
ct.Cfg('salt_steps_path', ct.String(),
help="Path to YAML with steps to deploy salt",
default=_default_salt_steps),
ct.Cfg('environment_template_dir', ct.String(),
help="Path to directory with Environment template and inventory",
default=_default_environment_template_dir),
ct.Cfg('templates_dir', ct.String(),
help="Path to directory with templates",
default=_default_templates_dir),
ct.Cfg('salt_roles', ct.JSONList(),
help="Node roles to install salt-minions and manage by salt",
default=[ext.UNDERLAY_NODE_ROLES.salt_master,
ext.UNDERLAY_NODE_ROLES.salt_minion,
ext.UNDERLAY_NODE_ROLES.k8s_controller]),
]
salt_opts = [
ct.Cfg('salt_master_host', ct.IPAddress(),
help="", default='0.0.0.0'),
ct.Cfg('salt_master_port', ct.String(),
help="", default='6969'),
]
core_deploy_opts = [
ct.Cfg('core_steps_path', ct.String(),
help="Path to YAML with steps to deploy common services",
default=_default_core_steps),
]
core_opts = [
ct.Cfg('core_installed', ct.Boolean(),
help="", default=False),
]
oss_deploy_opts = [
ct.Cfg('oss_steps_path', ct.String(),
help="Path to YAML with steps to deploy OSS Tools",
default=_default_oss_steps),
]
oss_opts = [
ct.Cfg('oss_installed', ct.Boolean(),
help="", default=False),
]
drivetrain_deploy_opts = [
ct.Cfg('drivetrain_steps_path', ct.String(),
help="Path to YAML with steps to deploy Drivetrain",
default=_default_drivetrain_steps),
]
drivetrain_opts = [
ct.Cfg('drivetrain_installed', ct.Boolean(),
help="", default=False),
]
decapod_deploy_opts = [
ct.Cfg('decapod_steps_path', ct.String(),
help="Path to YAML with steps to deploy Ceph with Decapod",
default=_default_decapod_steps),
]
decapod_opts = [
ct.Cfg('decapod_installed', ct.Boolean(),
help="", default=False),
]
openstack_deploy_opts = [
ct.Cfg('openstack_steps_path', ct.String(),
help="Path to YAML with steps to deploy openstack",
default=_default_openstack_steps),
ct.Cfg('openstack_resources_steps_path', ct.String(),
help="Path to YAML with steps to deploy openstack",
default=_default_openstack_resources_steps),
ct.Cfg('horizon_host', ct.IPAddress(),
help="", default='0.0.0.0'),
ct.Cfg('horizon_port', ct.String(),
help="", default='5000'),
ct.Cfg('horizon_user', ct.String(),
help="", default='admin'),
ct.Cfg('horizon_password', ct.String(),
help="", default='workshop'),
]
openstack_opts = [
ct.Cfg('openstack_installed', ct.Boolean(),
help="", default=False),
ct.Cfg('openstack_keystone_endpoint', ct.String(),
help="", default=''),
ct.Cfg('horizon_check', ct.Boolean(),
help="", default=False),
]
opencontrail_opts = [
ct.Cfg('opencontrail_tags', ct.String(),
help="", default=''),
ct.Cfg('opencontrail_features', ct.String(),
help="", default=''),
ct.Cfg('opencontrail_prepare_tests_steps_path', ct.String(),
help="Path to YAML with steps to prepare contrail-tests",
default=_default_opencontrail_prepare_tests_steps_path),
]
sl_deploy_opts = [
ct.Cfg('sl_steps_path', ct.String(),
help="Path to YAML with steps to deploy sl",
default=_default_sl_prepare_tests_steps_path),
ct.Cfg('docker_image_alertmanager', ct.String(),
default='{0}/openstack-docker/alertmanager:{1}'.format(
settings.DOCKER_REGISTRY, settings.DOCKER_IMAGES_SL_TAG)),
ct.Cfg('docker_image_alerta', ct.String(),
default='{0}/mirantis/external/alerta-web:{1}'.format(
settings.DOCKER_REGISTRY, settings.DOCKER_IMAGES_SL_TAG)),
ct.Cfg('docker_image_pushgateway', ct.String(),
default='{0}/openstack-docker/pushgateway:{1}'.format(
settings.DOCKER_REGISTRY, settings.DOCKER_IMAGES_SL_TAG)),
ct.Cfg('docker_image_prometheus', ct.String(),
default='{0}/openstack-docker/prometheus:{1}'.format(
settings.DOCKER_REGISTRY, settings.DOCKER_IMAGES_SL_TAG)),
ct.Cfg('docker_image_remote_agent', ct.String(),
default='{0}/openstack-docker/telegraf:{1}'.format(
settings.DOCKER_REGISTRY, settings.DOCKER_IMAGES_SL_TAG)),
ct.Cfg('docker_image_remote_storage_adapter', ct.String(),
default='{0}/openstack-docker/remote_storage_adapter:{1}'.format(
settings.DOCKER_REGISTRY, settings.DOCKER_IMAGES_SL_TAG)),
ct.Cfg('docker_image_prometheus_relay', ct.String(),
default='{0}/openstack-docker/prometheus_relay:{1}'.format(
settings.DOCKER_REGISTRY, settings.DOCKER_IMAGES_SL_TAG)),
ct.Cfg('docker_image_grafana', ct.String(),
default='{0}/mirantis/external/grafana:{1}'.format(
settings.DOCKER_REGISTRY, settings.DOCKER_IMAGES_SL_TAG)),
# SalesForce connection options for pushkin
ct.Cfg('sfdc_sandbox_enabled', ct.String(), default='False'),
ct.Cfg('sfdc_auth_url', ct.String(), default=''),
ct.Cfg('sfdc_username', ct.String(), default=''),
ct.Cfg('sfdc_password', ct.String(), default=''),
ct.Cfg('sfdc_consumer_key', ct.String(), default=''),
ct.Cfg('sfdc_consumer_secret', ct.String(), default=''),
ct.Cfg('sfdc_organization_id', ct.String(), default=''),
]
sl_opts = [
ct.Cfg('stacklight_installed', ct.Boolean(),
help="", default=False),
ct.Cfg('sl_version', ct.String(),
help="StackLight version. Could be 1 or 2", default=''),
ct.Cfg('sl_vip_host', ct.IPAddress(),
help="Vip address for SL services", default='0.0.0.0'),
ct.Cfg('sl_prometheus_port', ct.String(),
help="Prometheus port", default='15010'),
ct.Cfg('sl_prometheus_proto', ct.String(),
help="Proemtheus protocol", default='http'),
]
ceph_deploy_opts = [
ct.Cfg('ceph_steps_path', ct.String(),
help="Path to YAML with steps to deploy sl",
default=_default_ceph_prepare_tests_steps_path),
]
ceph_opts = [
ct.Cfg('ceph_installed', ct.Boolean(),
help="", default=False),
]
k8s_deploy_opts = [
ct.Cfg('k8s_steps_path', ct.String(),
help="Path to YAML with steps to deploy Kubernetes",
default=_default_k8s_steps),
ct.Cfg('k8s_update_steps_path', ct.String(),
help="Path to YAML with steps to update Kubernetes",
default=_default_k8s_update_steps),
ct.Cfg('kubernetes_admin_user', ct.String(), default='admin'),
ct.Cfg('kubernetes_admin_password', ct.String(),
default='sbPfel23ZigJF3Bm'),
ct.Cfg('kubernetes_docker_package', ct.String(), default=''),
ct.Cfg('kubernetes_hyperkube_source', ct.String(),
default='{}/mirantis/kubernetes/hyperkube-binaries/'
'hyperkube_v1.12.3-2_1544133573591'.format(
settings.BINARY_REGISTRY)),
ct.Cfg('kubernetes_hyperkube_source_hash', ct.String(),
default='md5=fc23eaf3ba63d9ed9d141f465f584012'),
ct.Cfg('kubernetes_pause_image', ct.String(),
default='{}/mirantis/kubernetes/pause-amd64:v1.12.3-2'.format(
settings.DOCKER_REGISTRY)),
ct.Cfg('kubernetes_calico_image', ct.String(),
default='{}/mirantis/projectcalico/calico/node:v3.3.2'.format(
settings.DOCKER_REGISTRY)),
ct.Cfg('kubernetes_calico_calicoctl_image', ct.String(),
default='{}/mirantis/projectcalico/calico/ctl:v3.3.2'.format(
settings.DOCKER_REGISTRY)),
ct.Cfg('kubernetes_calico_cni_image', ct.String(),
default='{}/mirantis/projectcalico/calico/cni:v3.3.2'.format(
settings.DOCKER_REGISTRY)),
ct.Cfg('kubernetes_calico_kube_controllers_image', ct.String(),
default='{}/mirantis/projectcalico/calico/kube-controllers:'
'v3.3.2'.format(settings.DOCKER_REGISTRY)),
ct.Cfg('kubernetes_calico_calicoctl_source', ct.String(),
default='{}/mirantis/projectcalico/calicoctl/'
'calicoctl-v3.3.2'.format(
settings.BINARY_REGISTRY)),
ct.Cfg('kubernetes_calico_calicoctl_source_hash', ct.String(),
default='md5=bb38517fdd6b8bb7c130ae7550a9d335'),
ct.Cfg('kubernetes_calico_birdcl_source', ct.String(),
default='{}/mirantis/projectcalico/bird/'
'birdcl-v0.3.3'.format(
settings.BINARY_REGISTRY)),
ct.Cfg('kubernetes_calico_birdcl_source_hash', ct.String(),
default='md5=0327442efd2592ddce449b66c5d0fc9d'),
ct.Cfg('kubernetes_calico_cni_source', ct.String(),
default='{}/mirantis/projectcalico/cni-plugin/'
'calico-v3.3.2'.format(
settings.BINARY_REGISTRY)),
ct.Cfg('kubernetes_calico_cni_source_hash', ct.String(),
default='md5=2544bc1865c1451cac7a61264c25a2cb'),
ct.Cfg('kubernetes_calico_cni_ipam_source', ct.String(),
default='{}/mirantis/projectcalico/cni-plugin/'
'calico-ipam-v3.3.2'.format(
settings.BINARY_REGISTRY)),
ct.Cfg('kubernetes_calico_cni_ipam_source_hash', ct.String(),
default='md5=b22623eeea3b29ba8ec071d859ac7055'),
ct.Cfg('kubernetes_netchecker_enabled', ct.Boolean(),
help="", default=True),
ct.Cfg('kubernetes_netchecker_agent_image', ct.String(),
default='mirantis/k8s-netchecker-agent:v1.2.2'),
ct.Cfg('kubernetes_netchecker_server_image', ct.String(),
default='mirantis/k8s-netchecker-server:v1.2.2'),
ct.Cfg('kubernetes_calico_policy_enabled', ct.Boolean(),
help="", default=False),
ct.Cfg('kubernetes_helm_enabled', ct.Boolean(),
help="", default=False),
ct.Cfg('kubernetes_virtlet_enabled', ct.Boolean(),
help="", default=False),
ct.Cfg('kubernetes_virtlet_image', ct.String(),
help="", default='mirantis/virtlet:v1.4.1'),
ct.Cfg('kubernetes_dns', ct.Boolean(),
help="", default=True),
ct.Cfg('kubernetes_externaldns_enabled', ct.Boolean(),
help="", default=False),
ct.Cfg('kubernetes_externaldns_image', ct.String(),
help="", default='{}/mirantis/external-dns/external-dns:'
'v0.5.6-2'.format(settings.DOCKER_REGISTRY)),
ct.Cfg('kubernetes_externaldns_provider', ct.String(),
help="", default='coredns'),
ct.Cfg('kubernetes_coredns_enabled', ct.Boolean(),
help="", default=True),
ct.Cfg('kubernetes_metallb_enabled', ct.Boolean(),
help="", default=False),
ct.Cfg('kubernetes_ingressnginx_enabled', ct.Boolean(),
help="", default=False),
ct.Cfg('kubelet_fail_on_swap', ct.Boolean(),
help="", default=False)
]
k8s_opts = [
ct.Cfg('k8s_installed', ct.Boolean(),
help="", default=False),
ct.Cfg('kube_host', ct.IPAddress(),
help="", default='0.0.0.0'),
ct.Cfg('kube_apiserver_port', ct.Integer(),
help="", default=443),
ct.Cfg("k8s_conformance_run", ct.Boolean(),
default=False),
ct.Cfg("run_extended_virtlet_conformance", ct.Boolean(),
default=False),
ct.Cfg('k8s_conformance_image', ct.String(),
default='docker-prod-virtual.docker.mirantis.net/mirantis/'
'kubernetes/k8s-conformance:v1.11.3-2'),
ct.Cfg('k8s_update_chain', ct.String(),
default='v1.9.8-4 v1.10.4-4 v1.11.3-2')
]
day1_cfg_config_opts = [
ct.Cfg('configure_steps_path', ct.String(),
help="Path to YAML with steps to config cfg01 node",
default=_default_configure_steps),
ct.Cfg('environment_template_dir', ct.String(),
help="Path to directory with Environment template and inventory",
default=_default_environment_template_dir),
ct.Cfg('templates_dir', ct.String(),
help="Path to directory with templates",
default=_default_templates_dir),
ct.Cfg('cluster_maas_config', ct.String(),
help="Path to maas class yaml file for cfg node",
default=_default_cluster_maas_config),
ct.Cfg('maas_machines_macs', ct.JSONDict(),
help="""MAC of machines interfaces for maas config:
'parameters': {
'maas' : {
'region' : {
'machines': {
'ctl01': {
'interface': {
'mac': 'aa:bb:cc:dd:ee:ff'
}
}
'...': {
'interface': {
'mac': 'aa:bb:cc:dd:ee:ff'
}
}
}}}}""", default={}),
]
_group_opts = [
('hardware', hardware_opts),
('underlay', underlay_opts),
('salt_deploy', salt_deploy_opts),
('salt', salt_opts),
('core_deploy', core_deploy_opts),
('core', core_opts),
('oss_deploy', oss_deploy_opts),
('oss', oss_opts),
('drivetrain_deploy', drivetrain_deploy_opts),
('drivetrain', drivetrain_opts),
('decapod_deploy', decapod_deploy_opts),
('decapod', decapod_opts),
('openstack_deploy', openstack_deploy_opts),
('openstack', openstack_opts),
('opencontrail', opencontrail_opts),
('stack_light', sl_opts),
('sl_deploy', sl_deploy_opts),
('ceph', ceph_opts),
('ceph_deploy', ceph_deploy_opts),
('k8s_deploy', k8s_deploy_opts),
('k8s', k8s_opts),
('day1_cfg_config', day1_cfg_config_opts),
('day1_underlay', underlay_opts),
]
def register_opts(config):
config.register_group(cfg.OptGroup(name='hardware',
title="Hardware settings", help=""))
config.register_opts(group='hardware', opts=hardware_opts)
config.register_group(cfg.OptGroup(name='underlay',
title="Underlay configuration", help=""))
config.register_opts(group='underlay', opts=underlay_opts)
config.register_group(cfg.OptGroup(name='salt_deploy',
title="salt deploy configuration", help=""))
config.register_opts(group='salt_deploy', opts=salt_deploy_opts)
config.register_group(cfg.OptGroup(name='salt',
title="salt config and credentials", help=""))
config.register_opts(group='salt', opts=salt_opts)
config.register_group(cfg.OptGroup(name='core',
title="Common services for Openstack", help=""))
config.register_opts(group='core', opts=core_opts)
config.register_group(
cfg.OptGroup(name='core_deploy',
title="Common services for Openstack deploy config",
help=""))
config.register_opts(group='core_deploy',
opts=core_deploy_opts)
config.register_group(cfg.OptGroup(name='oss',
title="Operational Support System Tools", help=""))
config.register_opts(group='oss', opts=oss_opts)
config.register_group(cfg.OptGroup(name='oss_deploy',
title="OSS deploy config", help=""))
config.register_opts(group='oss_deploy',
opts=oss_deploy_opts)
config.register_group(cfg.OptGroup(name='drivetrain',
title="Drivetrain Tools", help=""))
config.register_opts(group='drivetrain', opts=drivetrain_opts)
config.register_group(cfg.OptGroup(name='drivetrain_deploy',
title="Drivetrain deploy config", help=""))
config.register_opts(group='drivetrain_deploy',
opts=drivetrain_deploy_opts)
config.register_group(cfg.OptGroup(name='decapod',
title="Decapod options for Ceph", help=""))
config.register_opts(group='decapod', opts=decapod_opts)
config.register_group(cfg.OptGroup(name='decapod_deploy',
title="Decapod deploy config", help=""))
config.register_opts(group='decapod_deploy',
opts=decapod_deploy_opts)
config.register_group(cfg.OptGroup(name='openstack',
title="Openstack config and credentials", help=""))
config.register_opts(group='openstack', opts=openstack_opts)
config.register_group(
cfg.OptGroup(name='openstack_deploy',
title="Openstack deploy config and credentials",
help=""))
config.register_opts(group='openstack_deploy', opts=openstack_deploy_opts)
config.register_group(cfg.OptGroup(name='opencontrail',
title="Options for Juniper contrail-tests", help=""))
config.register_opts(group='opencontrail', opts=opencontrail_opts)
config.register_group(
cfg.OptGroup(name='stack_light',
title="StackLight config and credentials", help=""))
config.register_opts(group='stack_light', opts=sl_opts)
config.register_group(
cfg.OptGroup(name='sl_deploy',
title="SL deploy config and credentials",
help=""))
config.register_opts(group='sl_deploy', opts=sl_deploy_opts)
config.register_group(cfg.OptGroup(name='k8s_deploy',
title="K8s deploy configuration"))
config.register_opts(group='k8s_deploy', opts=k8s_deploy_opts)
config.register_group(cfg.OptGroup(name='k8s',
title="K8s config and credentials"))
config.register_opts(group='k8s', opts=k8s_opts)
config.register_group(cfg.OptGroup(name='ceph',
title="ceph config", help=""))
config.register_opts(group='ceph', opts=ceph_opts)
config.register_group(
cfg.OptGroup(name='ceph_deploy',
title="Ceph deploy config ",
help=""))
config.register_opts(group='ceph_deploy', opts=ceph_deploy_opts)
config.register_group(cfg.OptGroup(name='day1_cfg_config',
title="Day01 config node configuration", help=""))
config.register_opts(group='day1_cfg_config', opts=day1_cfg_config_opts)
config.register_group(cfg.OptGroup(name='day1_underlay',
title="Day01 underlay configuration", help=""))
config.register_opts(group='day1_underlay', opts=underlay_opts)
return config
def load_config(config_files):
config = cfg.CONF
register_opts(config)
config(args=[], default_config_files=config_files)
return config
def reload_snapshot_config(config, test_config_path):
"""Reset config to the state from test_config file"""
config(args=[], default_config_files=[test_config_path])
return config
def list_opts():
"""Return a list of oslo.config options available in the tcp_tests.
"""
return [(group, copy.deepcopy(opts)) for group, opts in _group_opts]
def list_current_opts(config):
"""Return a list of oslo.config options available in the tcp_tests.
"""
result_opts = []
for group, opts in _group_opts:
current_opts = copy.deepcopy(opts)
for opt in current_opts:
if hasattr(config, group):
if hasattr(config[group], opt.name):
opt.default = getattr(config[group], opt.name)
result_opts.append((group, current_opts))
return result_opts
def save_config(config, snapshot_name, env_name=None):
if env_name is None:
env_name = 'config'
test_config_path = os.path.join(
settings.LOGS_DIR, '{0}_{1}.ini'.format(env_name, snapshot_name))
with open(test_config_path, 'w') as output_file:
formatter = generator._OptFormatter(output_file=output_file)
for group, opts in list_current_opts(config):
formatter.format_group(group)
for opt in opts:
formatter.format(opt, group, minimal=True)
formatter.write('\n')
formatter.write('\n')