Skip to main content

A solace provisioning toolkit

Project description

py-solace-provision

An automated self-generating command-line tool for Solace appliances. This tool scans the imported solace_semp_api and renders the Api into a command-line tool with some basic ability to create, update and delete Solace managed objects.

Example:

pysolpro.py [config|monitor|action] --help  

pysolpro.py config create_msg_vpn --body data/vpn.yaml

pysolpro.py action do_msg_vpn_clear_stats --msg_vpn_name default --body data/empty.yaml

pysolpro.py config update_msg_vpn \
    --msg_vpn_name myvpn \
    --body data/vpn.yaml \
    --override dmrEnabled false \
    --override enabled false

pysolpro.py action get_msg_vpns --where enabled==false

pysolpro.py config get_msg_vpn_queues --msg_vpn_name default 2>&1 | grep queueName

Status

Most commands work with some limitations.

  1. --where only supports ONE where parameter, due to solace OpenAPI spec being v2, and the API not accepting %2C encoded comma. If Solace moves to OpenAPIv3, there is a allowReserved setting to prevent encoding of reserved characters.

  2. Argparse sometimes reports the incorrect missing required positional argument, see --help for the command when this occurs.

    ./pysolpro.py config update_dmr_cluster --body data/dmr/dmr-cluster.yaml
    ERROR type error update_dmr_cluster() missing 1 required positional argument: 'body'

Dependencies

pySolPro imports one or several libraries available at runtime, solace-semp-config library is required. The monitoring and action libraries are optional, and have a performance cost. So dont install monitor or action if you dont intend to use them.

Docker

Docker images are available at https://hub.docker.com/r/unixunion/pysolpro

Installation

pySolPro depends on getting the closest version of the solace-semp-config library. Use the closest version equal or less than your broker version from the versions available.

pip

Using pip, you can install pySolPro into your python environment.

pip install py-solace-provision
pip install solace-semp-config==SOLACE_VERSION
# optional
pip install solace-semp-monitor==SOLACE_VERSION
pip install solace-semp-action==SOLACE_VERSION

manual

Create a virtual environment for this

python3 -m venv ~/spvenv
source ~/spvenv/bin/activate

Install dependencies, where SOLACE_VERSION equals your broker version or closest match. see https://pypi.org/project/solace-semp-config/ for available versions

# required
pip install -r requirements.txt
pip install solace-semp-config==SOLACE_VERSION

optional action and monitor api support

pip install solace-semp-action==SOLACE_VERSION
pip install solace-semp-monitor==SOLACE_VERSION

Optional extras

pip install argcomplete
pip install coloredlogs

Now you can run pysolpro.py --help

Configuring API

See solace.yaml for how to set up broker credentials and API endpoint(s). pySolPro searches for a file named solace.yaml in several locations listed below, or you can pass the a config filename via an environment property, e.g:

PYSOLPRO_CONFIG=/full/path/to/config.yaml pysolpro.py config get_msg_vpns

You can also pass a partial path via the environment variable, which will then search the below mentioned locations for that file.

PYSOLPRO_CONFIG=relevant/path/to/config.yaml pysolpro.py config get_msg_vpns

If the above relevant config file is not immediately found in the current working directory, it is searched for in the following locations:

".",
"~/.pysolpro/",
"/",
"/opt/pysolpro",
"/etc/pysolpro"

The config file also denotes which API's pySolPro generates commands for. There are 3 API's available, config, action and monitor. config is required, and requires the solace-semp-config module. Both action and monitor are optional, and should not be installed if not using them, as it slows down the command parser.

Configuring the API's example:

commands:
  config:
    api_path: /SEMP/v2/config
    module: solace_semp_config
    models: solace_semp_config.models
    api_class: AllApi
    config_class: Configuration
    client_class: ApiClient
  monitor:
    api_path: /SEMP/v2/monitor
    module: solace_semp_monitor
    models: solace_semp_monitor.models
    api_class: AllApi
    config_class: Configuration
    client_class: ApiClient
  action:
    api_path: /SEMP/v2/action
    module: solace_semp_action
    models: solace_semp_action.models
    api_class: AllApi
    config_class: Configuration
    client_class: ApiClient

Older versions of SEMPv2 api do not have the AllApi interface, in those cases use MsgVpnApi instead.

Solace broker configs are needed for each API you want to invoke.

solace_config:
  ssl:
    verify_ssl: false
    cert: certs/cert.pem
  config:
    host: http://localhost:8080
    username: admin
    password: admin
  monitor:
    host: http://localhost:8080
    username: admin
    password: admin
  action:
    host: http://localhost:8080
    username: admin
    password: admin

Yaml Object Files

All solace managed objects can be represented as YAML files. see data/ for some examples. These can be created by querying the appliance for the relevant object. Note that some attributes are NOT retrieved from appliances during GET operations. Some examples are items such as credentials. There is a task to create this feature using the opaque_password parameter.

Solace Objects have a tendency to have incompatible attributes, and these should be removed from YAML before submitting to appliance. Examples of these are commented out in data/ files. For example, you cannot use clearPercent and clearValue at same time.

eventEgressFlowCountThreshold:
  clearPercent: 40
#  clearValue: 0
  setPercent: 60
#  setValue: 0

When using --save, these most of these incompatible attributes are null valued, and are removed when writing the yaml to disk.

Other examples of incomatible types are authentication mechanisms, like password and certificate cannot both be used at the same time.

replicationBridgeAuthenticationBasicClientUsername: ""
replicationBridgeAuthenticationBasicPassword: ""
# replicationBridgeAuthenticationClientCertContent: ""
# replicationBridgeAuthenticationClientCertPassword: ""

The response from the appliance will generally indicate if you have incompatible configurations.

    "error":{
        "code":89,
        "description":"Problem with replicationBridgeAuthenticationClientCertContent or replicationBridgeAuthenticationClientCertPassword: Channel not encrypted",
        "status":"NOT_ALLOWED"
    },

When using Object Files to create/update managed objects on the broker, you can use the --override argument to override any attribute in the YAML files before it is posted to the appliance. As an example, this can be used enable/disable services. It can also be used to "template" objects using the same yaml. e.g:

pysolpro.py config create_msg_vpn --body data/vpn.yaml --override msgVpnName myVpn
pysolpro.py config create_msg_vpn --body data/vpn.yaml --override msgVpnName anotherVpnSameYaml

Running pySolPro

Simply provide what the method's help requires, parameters are passed directly on command line, and some, like body, are labeled in the help as being file: <ClassName>. These must have their argument provide a path to a YAML file.

usage: pySolPro [-h] [--save] [--save-dir SAVEDIR] [--host HOST] [--username USERNAME] [--password PASSWORD] {config,monitor,action} ...

positional arguments:
  {config,monitor,action}
                        sub-command help

optional arguments:
  -h, --help            show this help message and exit
  --save                save retrieved data to disk
  --save-dir SAVEDIR    location to save to
  --host HOST           broker host override e.g: https://localhost:8843
  --username USERNAME   username override
  --password PASSWORD   password override

PYSOLPRO_CONFIG=/path/to/broker_config.yaml python pysolpro.py config create_dmr_cluster --body data/dmr/dmr-cluster.yaml

Special parameters

--opaque_password

Allows you to upload/download secrets from the appliance. You must be using TLS.

--override

When creating/updating objects on the appliance, you can override any attributes read from the yaml files with the --override KEY VALUE argument. For example if you want to change the enabled state(s) of a MessageVPN.

./pysolpro.py config update_msg_vpn \
    --msg_vpn_name default \
    --body default-vpn.yaml \
    --override enabled false \
    --override dmrEnabled false

Multiple --override arguments can be provided.

--where

When querying the appliance with get_* commands, the SEMP API can filter the response to only include objects where certain conditions evaluate to true.

The value of where is a comma-separated list of expressions. All expressions must be true for the object to be included in the response. Each expression takes the form:

expression = attribute-name OP value OP = '==' | '!=' | '<' | '>' | '<=' | '>='

value may be a number, string, true, or false, as appropriate for the type of attribute-name. Greater-than and less-than comparisons only work for numbers. A * in a string value is interpreted as a wildcard (zero or more characters).

Note, only one where condition is supported at the moment, due to Solace not using OpenAPI3. OpenAPI2 does not have allowReserved keyword in the parameter specification, so the , separator is encoded to %2C.

Example:

./pysolpro.py config get_msg_vpn_queues --msg_vpn_name default --where "queueName==B*"
./pysolpro.py config get_msg_vpn_queues --msg_vpn_name default --where "enabled==false"
./pysolpro.py monitor get_msg_vpn_queues --msg_vpn_name default --where "spooledByteCount>1000000"

Changing the state of something

Changes are sent to the appliance using the Yaml files, but with some additional arguments to identify the object to update. For instance when creating an object initially, it is often enough to ship send the yaml body only, but when updating, you need to name the object you are updating. Overrides can also be used to alter some yaml attributes before sending them to the appliance.

python pysolpro.py config update_dmr_cluster \
    --dmr_cluster_name mydmr \
    --body data/dmr/dmr-cluster.yaml \
    --override enabled false 

Yaml Files

You can get the YAML representation of an object with almost any of the get_* subcommands, though some fields should be commented out for compatibility reasons. See the data/ examples.

Saving Yaml

The --save option writes out to the retrieved object(s) to the --save-dir location.

python pysolpro.py --save --save-dir savedata config get_msg_vpn --msg_vpn_name default 

You can also save multiple objects when using the "plural" getters.

python pysolpro.py --save --save-dir savedata config get_msg_vpns

Saved File Naming / Mappings

Due to the varying content types of objects, data_mappings from the configuration file are used to determine which key in the data to use for the filename, or alternatively hash the payload for smalled config increments.

Optional Extras

Tab completion

pySolPro supports tab completion, and will create a cache file named pysolpro.cache upon first invocation. see argcomplete for more info

pip install argcomplete

For zsh:

# one time
autoload -U bashcompinit
bashcompinit
# add this to end of ~/.zshrc
# source the venv that you installed argcomplete into, should be same as PySolPro venv.
source ~/spvenv/bin/activate
eval "$(register-python-argcomplete pysolpro.py)"

To populate the cache, run the --help command:

./pysolpro.py --help

Colourized logs

pip install coloredlogs

Notes

Using the nw client

./server.py
./client.py config get_msg_vpn_queues --msg_vpn_name default |grep queueName | awk -F ": " '{print $2;}' | \
    xargs -I{} ./client.py config get_msg_vpn_queue_subscriptions --msg_vpn_name default --queue {}

Building wheels

pip install wheel
python setup.py bdist_wheel --universal

Building docker image

Pass the version of SEMP to build for as a buld-arg. See docker_deps/semp_config for bundled versions. You can add your own just by dropping in the appropriate yaml specs.

docker build --build-arg sempver=9.8.0.12 -t unixunion/pysolpro:dev . 
Building all versions
ls docker_deps/semp_config | xargs -I {} -t docker build --build-arg sempver={} -t unixunion/pysolpro:0.0.2-{} .
Testing all versions
ls docker_deps/semp_config | xargs -I {} -t docker run -v `pwd`/solace.yaml:/opt/pysolpro/solace.yaml unixunion/pysolpro:0.0.2-{} config get_msg_vpn --msg_vpn_name default
Getting all SEMPv2 client whl files
ls docker_deps/semp_config | xargs -I@ -t docker create unixunion/pysolpro:0.1.1-@ | xargs -I@ docker cp @:/tmp output
Releasing wheel to pypi
solace_semp_* wheels
ls docker_deps/semp_config | xargs -I@ -t docker build --build-arg sempver=@ -t unixunion/pysolpro:0.1.3-@ . -f docker_deps/Dockerfile
Creating self signed cert
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365
openssl rsa -in key.pem -out nopassskey.pem
cat nopassskey.pem >>server.pem
cat cert.pem >>server.pem

Jump into the broker and enable TLS

docker exec -ti broker1 cli
enable
configure
ssl
server-certificate server.pem
exit
service semp
shutown
listen-port 8843 ssl
no shutdown

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distribution

py_solace_provision-0.2.9-py2.py3-none-any.whl (22.5 kB view hashes)

Uploaded Python 2 Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page