+++ /dev/null
-#!/bin/bash
-set -e
-
-: ${CLUSTER:=ceph}
-: ${RGW_NAME:=$(hostname -s)}
-: ${MON_NAME:=$(hostname -s)}
-: ${RGW_CIVETWEB_PORT:=80}
-: ${OSD_SIZE:=100}
-
-: ${KEYSTONE_ADMIN_TOKEN:=admin}
-: ${KEYSTONE_ADMIN_PORT:=35357}
-: ${KEYSTONE_PUBLIC_PORT:=5001}
-
-: ${KEYSTONE_SERVICE:=${CLUSTER}}
-: ${KEYSTONE_ENDPOINT_REGION:=region}
-
-: ${KEYSTONE_ADMIN_USER:=admin}
-: ${KEYSTONE_ADMIN_TENANT:=admin}
-: ${KEYSTONE_ADMIN_PASS:=admin}
-
-ip_address=$(head -n1 /etc/hosts | cut -d" " -f1)
-: ${MON_IP:=${ip_address}}
-subnet=$(ip route | grep "src ${ip_address}" | cut -d" " -f1)
-: ${CEPH_NETWORK:=${subnet}}
-
-#######
-# MON #
-#######
-
-if [ ! -n "$CEPH_NETWORK" ]; then
- echo "ERROR- CEPH_NETWORK must be defined as the name of the network for the OSDs"
- exit 1
-fi
-
-if [ ! -n "$MON_IP" ]; then
- echo "ERROR- MON_IP must be defined as the IP address of the monitor"
- exit 1
-fi
-
-# bootstrap MON
-if [ ! -e /etc/ceph/ceph.conf ]; then
- fsid=$(uuidgen)
- cat <<ENDHERE >/etc/ceph/${CLUSTER}.conf
-[global]
-fsid = $fsid
-mon initial members = ${MON_NAME}
-mon host = ${MON_IP}
-auth cluster required = cephx
-auth service required = cephx
-auth client required = cephx
-osd crush chooseleaf type = 0
-osd journal size = 100
-osd pool default pg num = 8
-osd pool default pgp num = 8
-osd pool default size = 1
-public network = ${CEPH_NETWORK}
-cluster network = ${CEPH_NETWORK}
-debug ms = 1
-
-[mon]
-debug mon = 20
-debug paxos = 20
-debug auth = 20
-
-[osd]
-debug osd = 20
-debug filestore = 20
-debug journal = 20
-debug monc = 20
-
-[mds]
-debug mds = 20
-debug mds balancer = 20
-debug mds log = 20
-debug mds migrator = 20
-
-[client.radosgw.gateway]
-rgw keystone url = http://${MON_IP}:${KEYSTONE_ADMIN_PORT}
-rgw keystone admin token = ${KEYSTONE_ADMIN_TOKEN}
-rgw keystone accepted roles = _member_
-ENDHERE
-
- # Generate administrator key
- ceph-authtool /etc/ceph/${CLUSTER}.client.admin.keyring --create-keyring --gen-key -n client.admin --set-uid=0 --cap mon 'allow *' --cap osd 'allow *' --cap mds 'allow'
-
- # Generate the mon. key
- ceph-authtool /etc/ceph/${CLUSTER}.mon.keyring --create-keyring --gen-key -n mon. --cap mon 'allow *'
-
- # Generate initial monitor map
- monmaptool --create --add ${MON_NAME} ${MON_IP} --fsid ${fsid} /etc/ceph/monmap
-fi
-
-# If we don't have a monitor keyring, this is a new monitor
-if [ ! -e /var/lib/ceph/mon/${CLUSTER}-${MON_NAME}/keyring ]; then
-
- if [ ! -e /etc/ceph/${CLUSTER}.client.admin.keyring ]; then
- echo "ERROR- /etc/ceph/${CLUSTER}.client.admin.keyring must exist; get it from your existing mon"
- exit 2
- fi
-
- if [ ! -e /etc/ceph/${CLUSTER}.mon.keyring ]; then
- echo "ERROR- /etc/ceph/${CLUSTER}.mon.keyring must exist. You can extract it from your current monitor by running 'ceph auth get mon. -o /tmp/${CLUSTER}.mon.keyring'"
- exit 3
- fi
-
- if [ ! -e /etc/ceph/monmap ]; then
- echo "ERROR- /etc/ceph/monmap must exist. You can extract it from your current monitor by running 'ceph mon getmap -o /tmp/monmap'"
- exit 4
- fi
-
- # Import the client.admin keyring and the monitor keyring into a new, temporary one
- ceph-authtool /tmp/${CLUSTER}.mon.keyring --create-keyring --import-keyring /etc/ceph/${CLUSTER}.client.admin.keyring
- ceph-authtool /tmp/${CLUSTER}.mon.keyring --import-keyring /etc/ceph/${CLUSTER}.mon.keyring
-
- # Make the monitor directory
- mkdir -p /var/lib/ceph/mon/${CLUSTER}-${MON_NAME}
-
- # Prepare the monitor daemon's directory with the map and keyring
- ceph-mon --mkfs -i ${MON_NAME} --monmap /etc/ceph/monmap --keyring /tmp/${CLUSTER}.mon.keyring
-
- # Clean up the temporary key
- rm /tmp/${CLUSTER}.mon.keyring
-fi
-
-# start MON
-ceph-mon -i ${MON_NAME} --public-addr ${MON_IP}:6789
-
-# change replica size
-ceph osd pool set rbd size 1
-
-
-#######
-# OSD #
-#######
-
-if [ ! -e /var/lib/ceph/osd/${CLUSTER}-0/keyring ]; then
- # bootstrap OSD
- mkdir -p /var/lib/ceph/osd/${CLUSTER}-0
- # skip btrfs HACK if btrfs is already in place
- if [ "$(stat -f /var/lib/ceph/osd/${CLUSTER}-0 2>/dev/null | grep btrfs | wc -l)" == "0" ]; then
- # HACK create btrfs loopback device
- echo "creating osd storage image"
- dd if=/dev/zero of=/tmp/osddata bs=1M count=${OSD_SIZE}
- mkfs.btrfs /tmp/osddata
- echo "mounting via loopback"
- mount -o loop /tmp/osddata /var/lib/ceph/osd/${CLUSTER}-0
- echo "now mounted:"
- mount
- # end HACK
- fi
- echo "creating osd"
- ceph osd create
- echo "creating osd filesystem"
- ceph-osd -i 0 --mkfs
- echo "creating osd keyring"
- ceph auth get-or-create osd.0 osd 'allow *' mon 'allow profile osd' -o /var/lib/ceph/osd/${CLUSTER}-0/keyring
- echo "configuring osd crush"
- ceph osd crush add 0 1 root=default host=$(hostname -s)
- echo "adding osd keyring"
- ceph-osd -i 0 -k /var/lib/ceph/osd/${CLUSTER}-0/keyring
-fi
-
-# start OSD
-echo "starting osd"
-ceph-osd --cluster=${CLUSTER} -i 0
-
-#sleep 10
-
-#######
-# MDS #
-#######
-
-if [ ! -e /var/lib/ceph/mds/${CLUSTER}-0/keyring ]; then
- # create ceph filesystem
- echo "creating osd pool"
- ceph osd pool create cephfs_data 8
- echo "creating osd pool metadata"
- ceph osd pool create cephfs_metadata 8
- echo "creating cephfs"
- ceph fs new cephfs cephfs_metadata cephfs_data
-
- # bootstrap MDS
- mkdir -p /var/lib/ceph/mds/${CLUSTER}-0
- echo "creating mds auth"
- ceph auth get-or-create mds.0 mds 'allow' osd 'allow *' mon 'allow profile mds' > /var/lib/ceph/mds/${CLUSTER}-0/keyring
-fi
-
-# start MDS
-echo "starting mds"
-ceph-mds --cluster=${CLUSTER} -i 0
-
-#sleep 10
-
-
-#######
-# RGW #
-#######
-
-if [ ! -e /var/lib/ceph/radosgw/${RGW_NAME}/keyring ]; then
- # bootstrap RGW
- mkdir -p /var/lib/ceph/radosgw/${RGW_NAME}
- echo "creating rgw auth"
- ceph auth get-or-create client.radosgw.gateway osd 'allow rwx' mon 'allow rw' -o /var/lib/ceph/radosgw/${RGW_NAME}/keyring
-fi
-
-# start RGW
-echo "starting rgw"
-radosgw -c /etc/ceph/ceph.conf -n client.radosgw.gateway -k /var/lib/ceph/radosgw/${RGW_NAME}/keyring --rgw-socket-path="" --rgw-frontends="civetweb port=${RGW_CIVETWEB_PORT}"
-
-
-#######
-# API #
-#######
-
-# start ceph-rest-api
-echo "starting rest api"
-ceph-rest-api -n client.admin &
-
-############
-# Keystone #
-############
-
-if [ ! -e /etc/keystone/${CLUSTER}.conf ]; then
- cat <<ENDHERE > /etc/keystone/${CLUSTER}.conf
-[DEFAULT]
-admin_token=${KEYSTONE_ADMIN_TOKEN}
-admin_port=${KEYSTONE_ADMIN_PORT}
-public_port=${KEYSTONE_PUBLIC_PORT}
-
-[database]
-connection = sqlite:////var/lib/keystone/keystone.db
-ENDHERE
-
- # start Keystone
- echo "starting keystone"
- keystone-all --config-file /etc/keystone/${CLUSTER}.conf &
-
- # wait until up
- while ! nc ${MON_IP} ${KEYSTONE_ADMIN_PORT} </dev/null; do
- sleep 1
- done
-
- export OS_SERVICE_TOKEN=${KEYSTONE_ADMIN_TOKEN}
- export OS_SERVICE_ENDPOINT=http://${MON_IP}:${KEYSTONE_ADMIN_PORT}/v2.0
-
- echo "creating keystone service ${KEYSTONE_SERVICE}"
- keystone service-create --name ${KEYSTONE_SERVICE} --type object-store
- echo "creating keystone endpoint ${KEYSTONE_SERVICE}"
- keystone endpoint-create --service ${KEYSTONE_SERVICE} \
- --region ${KEYSTONE_ENDPOINT_REGION} \
- --publicurl http://${MON_IP}:${RGW_CIVETWEB_PORT}/swift/v1 \
- --internalurl http://${MON_IP}:${RGW_CIVETWEB_PORT}/swift/v1 \
- --adminurl http://${MON_IP}:${RGW_CIVETWEB_PORT}/swift/v1
-
- echo "creating keystone user ${KEYSTONE_ADMIN_USER}"
- keystone user-create --name=${KEYSTONE_ADMIN_USER} --pass=${KEYSTONE_ADMIN_PASS} --email=dev@null.com
- echo "creating keystone tenant ${KEYSTONE_ADMIN_TENANT}"
- keystone tenant-create --name=${KEYSTONE_ADMIN_TENANT} --description=admin
- echo "adding keystone role _member_"
- keystone user-role-add --user=${KEYSTONE_ADMIN_USER} --tenant=${KEYSTONE_ADMIN_TENANT} --role=_member_
-
- echo "creating keystone role admin"
- keystone role-create --name=admin
- echo "adding keystone role admin"
- keystone user-role-add --user=${KEYSTONE_ADMIN_USER} --tenant=${KEYSTONE_ADMIN_TENANT} --role=admin
-fi
-
-
-#########
-# WATCH #
-#########
-
-echo "watching ceph"
-exec ceph -w