4 LIBDIR="$(dirname "$(dirname "$PWD")")"
6 source $LIBDIR/env/lib/common.sh
8 function get_kud_repo {
9 if [ -d $DOWNLOAD_PATH/multicloud-k8s ]; then
10 rm -rf $DOWNLOAD_PATH/multicloud-k8s
13 mkdir -p $DOWNLOAD_PATH
15 if [ "$1" == "v1" ] ; then
16 git clone --branch v1.0-icn https://github.com/akraino-icn/multicloud-k8s.git
18 git clone https://github.com/onap/multicloud-k8s.git
23 function set_ssh_key {
24 if ! [ -f ~/.ssh/id_rsa ]; then
25 echo "Generating rsa key for this host"
26 ssh-keygen -t rsa -N "" -f ~/.ssh/id_rsa <&-
29 if ! grep -qF "$(ssh-keygen -y -f ~/.ssh/id_rsa)" ~/.ssh/authorized_keys; then
30 ssh-keygen -y -f ~/.ssh/id_rsa >> ~/.ssh/authorized_keys
33 chmod og-wx ~/.ssh/authorized_keys
37 pushd $DOWNLOAD_PATH/multicloud-k8s/kud/hosting_providers/vagrant/inventory
38 HOST_IP=${HOST_IP:-$(hostname -I | cut -d ' ' -f 1)}
39 if [ "$1" == "minimal" ] ; then
42 $HOSTNAME ansible_ssh_host=${HOST_IP} ansible_ssh_port=22
53 [k8s-cluster:children]
60 $HOSTNAME ansible_ssh_host=${HOST_IP} ansible_ssh_port=22
80 [k8s-cluster:children]
88 function kud_install {
89 pushd $DOWNLOAD_PATH/multicloud-k8s/kud/hosting_providers/vagrant/
90 if [ "$1" == "all" -o "$1" == "vm" ]; then
91 sed -i -e 's/testing_enabled=${KUD_ENABLE_TESTS:-false}/testing_enabled=${KUD_ENABLE_TESTS:-true}/g' installer.sh
93 if [ "$1" == "vm" ]; then
94 sed -i -e 's/^kube_pods_subnet.*/kube_pods_subnet: 172.21.64.0\/18/g' inventory/group_vars/k8s-cluster.yml
96 ./installer.sh | tee kud_deploy.log
98 if [ "$1" == "bm" ]; then
99 for addon in ${KUD_ADDONS:-multus ovn4nfv nfd sriov qat cmk optane}; do
100 pushd $DOWNLOAD_PATH/multicloud-k8s/kud/tests/
109 pushd $DOWNLOAD_PATH/multicloud-k8s/kud/hosting_providers/vagrant/
110 ansible-playbook -i inventory/hosts.ini /opt/kubespray-2.10.4/reset.yml \
111 --become --become-user=root -e reset_confirmation=yes
117 APISERVER=$(kubectl config view --minify -o \
118 jsonpath='{.clusters[0].cluster.server}')
119 TOKEN=$(kubectl get secret \
120 $(kubectl get serviceaccount default -o \
121 jsonpath='{.secrets[0].name}') -o jsonpath='{.data.token}' | \
123 call_api $APISERVER/api --header "Authorization: Bearer $TOKEN" --insecure
126 if [ "$1" == "reset" ] ; then