OpenStack安装部署
一、基础准备工作
部署环境:CentOS 7 64
1、关闭本地iptables防火墙并设置开机不自启动
|
1
2
|
# systemctl stop firewalld.service
# systemctl disable firewalld.service
|
2、关闭本地selinux防火墙
|
1
2
3
|
# vim /etc/sysconfig/selinux
SELINUX=disabled
# setenforce 0
|
3、设置主机计算机名称
|
1
|
# hostnamectl set-hostname controller
|
4、本地主机名称和ip的解析
|
1
2
|
# vim /etc/hosts
192.168.0.104 controller
|
5、安装ntp时间校准工具
|
1
2
|
# yum -y install ntp
# ntpdate asia.pool.ntp.org
|
6、安装第三方yum源
|
1
2
3
|
# yum -y install yum-plugin-priorities
# yum -y install http://dl.fedoraproject.org/pub/epel/7/x86_64/e/epel-release-7-2.noarch.rpm
# yum -y install http://rdo.fedorapeople.org/openstack-juno/rdo-release-juno.rpm
|
7、升级系统软件包并重新系统
|
1
2
|
# yum upgrade
# reboot
|
二、安装配置mariadb数据库
1、安装mariadb数据库
|
1
|
# yum -y install mariadb mariadb-server MySQL-python
|
2、配置mariadb数据库
|
1
2
3
4
5
6
7
8
9
10
|
# cp /etc/my.cnf /etc/my.cnf.bak
# rpm -ql mariadb
# vim /etc/my.cnf.d/server.cnf
[mysqld]
bind-address = 0.0.0.0
default-storage-engine = innodb
innodb_file_per_table
collation-server = utf8_general_ci
init-connect =
'SET NAMES utf8'
character-
set
-server = utf8
|
3、启动mariadb数据库
|
1
2
|
# systemctl enable mariadb.service
# systemctl start mariadb.service
|
三、安装消息队列服务
1、安装rabbit所需软件包
|
1
|
# yum -y install rabbitmq-server
|
2、启动rabbit服务
|
1
2
|
# systemctl enable rabbitmq-server.service
# systemctl start rabbitmq-server.service
|
3、设置rabbit服务密码
|
1
|
# rabbitmqctl change_password guest rabbit
|
四、安装keyston用户认证组件
1、创建keystone数据库和授权用户
|
1
2
3
4
|
mysql -u root -p
CREATE DATABASE keystone;
GRANT ALL PRIVILEGES ON keystone.* TO
'keystone'
@
'localhost'
IDENTIFIED BY
'keystone'
;
GRANT ALL PRIVILEGES ON keystone.* TO
'keystone'
@
'%'
IDENTIFIED BY
'keystone'
;
|
2、安装keystone组件包
|
1
|
# yum -y install openstack-utils openstack-keystone python-keystoneclient
|
3、配置keystone文件
|
1
2
3
4
5
6
7
8
9
10
11
|
# cp /etc/keystone/keystone.conf /etc/keystone/keystone.conf.bak
# vim /etc/keystone/keystone.conf
[DEFAULT]
verbose = True
[database]
connection = mysql:
//keystone
:keystone@controller
/keystone
[token]
provider = keystone.token.providers.uuid.Provider
driver = keystone.token.persistence.backends.sql.Token
|
4、创建证书和秘钥文件
|
1
2
3
4
|
# keystone-manage pki_setup --keystone-user keystone --keystone-group keystone
# chown -R keystone:keystone /var/log/keystone
# chown -R keystone:keystone /etc/keystone/ssl
# chmod -R o-rwx /etc/keystone/ssl
|
5、同步keystone到mariadb数据库
|
1
|
# su -s /bin/sh -c "keystone-manage db_sync" keystone
|
6、启动keystone服务并开机自启动
|
1
2
|
# systemctl enable openstack-keystone.service
# systemctl start openstack-keystone.service
|
7、清除过期的令牌
默认情况下,身份服务存储在数据库中过期的令牌无限。到期令牌的积累大大增加数据库的大小,可能会降低服务的性能,特别是在资源有限的环境中。我们建议您使用cron配置一个周期性任务,清除过期的令牌时
|
1
2
3
|
# (crontab -l -u keystone 2>&1 | grep -q token_flush) || \
echo
'@hourly /usr/bin/keystone-manage token_flush >/var/log/keystone/keystone-tokenflush.log 2>&1'
\
>>
/var/spool/cron/keystone
|
----------------------------Create tenants,user,and roles---------------------------------
1、配置admin的token
|
1
2
3
4
5
|
# export OS_SERVICE_TOKEN=$(openssl rand -hex 10)
# export OS_SERVICE_ENDPOINT=http://controller:35357/v2.0
# echo $OS_SERVICE_TOKEN > ~/ks_admin_token
# openstack-config --set /etc/keystone/keystone.conf DEFAULT admin_token $OS_SERVICE_TOKEN
# service openstack-keystone restart
|
2、创建tenant、user and role
|
1
2
3
4
5
6
7
8
9
10
11
12
13
|
a.Create the admin tenant、user、role
# keystone tenant-create --name admin --description "Admin Tenant"
# keystone user-create --name admin --pass admin --email admin@zhengyansheng.com
# keystone role-create --name admin
b.Add the admin tenant and user to the admin role:
# keystone user-role-add --tenant admin --user admin --role admin
c.By default, the dashboard limits access to
users
with the _member_ role.
# keystone role-create --name _member_
d.Add the admin tenant and user to the _member_ role:
# keystone user-role-add --tenant admin --user admin --role _member_
|
3、创建一个普通demo项目和用户
|
1
2
3
4
5
6
7
8
|
a.Create the demo tenant:
# keystone tenant-create --name demo --description "Demo Tenant"
b.Create the demo user:
# keystone user-create --name demo --pass demo --email demo@zhengyansheng.com
c.Add the demo tenant and user to the _member_ role:
# keystone user-role-add --tenant demo --user demo --role _member_
|
4、创建一个service项目
|
1
|
# keystone tenant-create --name service --description "Service Tenant"
|
------------------------Create the service entity and API endpoint------------------------
1、Create the service entity and API endpoint | Create the service entity for the Identity service:
|
1
|
# keystone service-create --name keystone --type identity --description "OpenStack Identity"
|
2、Create the API endpoint for the Identity service:
|
1
2
3
4
5
6
|
# keystone endpoint-create \
--service-
id
$(keystone service-list |
awk
'/ identity / {print $2}'
) \
--publicurl http:
//controller
:5000
/v2
.0 \
--internalurl http:
//controller
:5000
/v2
.0 \
--adminurl http:
//controller
:35357
/v2
.0 \
--region regionOne
|
3、查看keystone认证信息
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
|
[root@controller ~]
# keystone user-list
+----------------------------------+-------+---------+-------------------------+
|
id
| name | enabled | email |
+----------------------------------+-------+---------+-------------------------+
| 7053cfacc4b047dcabe82f6be0e5dc77 | admin | True | admin@zhengyansheng.com |
| eea569106329465996e9e09a666838bd | demo | True | demo@zhengyansheng.com |
+----------------------------------+-------+---------+-------------------------+
[root@controller ~]
# keystone tenant-list
+----------------------------------+---------+---------+
|
id
| name | enabled |
+----------------------------------+---------+---------+
| 307fd76766eb4b02a28779f4e88717ce | admin | True |
| f054bd56851b4a318a19233a13e13d31 | demo | True |
| d865c3b49f6f4bf7b2a0b93e0110e546 | service | True |
+----------------------------------+---------+---------+
[root@controller ~]
# keystone service-list
+----------------------------------+----------+----------+--------------------+
|
id
| name |
type
| description |
+----------------------------------+----------+----------+--------------------+
| 9754f7bdf78c4000875f1aa5f3291b19 | keystone | identity | OpenStack Identity |
+----------------------------------+----------+----------+--------------------+
[root@controller ~]
# keystone endpoint-list
+----------------------------------+-----------+-----------------------------+-----------------------------+------------------------------+----------------------------------+
|
id
| region | publicurl | internalurl | adminurl | service_id |
+----------------------------------+-----------+-----------------------------+-----------------------------+------------------------------+----------------------------------+
| 6831d6708fe4469fa653b9b5adf801d9 | regionOne | http:
//controller
:5000
/v2
.0 | http:
//controller
:5000
/v2
.0 | http:
//controller
:35357
/v2
.0 | 9754f7bdf78c4000875f1aa5f3291b19 |
+----------------------------------+-----------+-----------------------------+-----------------------------+------------------------------+----------------------------------+
|
4、取消临时设置的环境变量
|
1
2
|
# unset OS_SERVICE_TOKEN
# unset OS_SERVICE_ENDPOINT
|
5、使用keystone进行用户认证
|
1
2
3
4
|
# keystone --os-tenant-name admin --os-username admin --os-password admin --os-auth-url http://controller:35357/v2.0 token-get
# keystone --os-tenant-name admin --os-username admin --os-password admin --os-auth-url http://controller:35357/v2.0 tenant-list
# keystone --os-tenant-name admin --os-username admin --os-password admin --os-auth-url http://controller:35357/v2.0 user-list
# keystone --os-tenant-name admin --os-username admin --os-password admin --os-auth-url http://controller:35357/v2.0 role-list
|
6、使用普通用户demo认证测试
|
1
2
3
|
# keystone --os-tenant-name demo --os-username demo --os-password demo --os-auth-url http://controller:35357/v2.0 token-get
# keystone --os-tenant-name demo --os-username demo --os-password demo --os-auth-url http://controller:35357/v2.0 user-list
You are not authorized to perform the requested action: admin_required (HTTP 403)
|
7、客户端cli命令行脚本
|
1
2
3
4
5
|
# vim ~/admin-openrc.sh
export
OS_TENANT_NAME=admin
export
OS_USERNAME=admin
export
OS_PASSWORD=admin
export
OS_AUTH_URL=http:
//controller
:35357
/v2
.0
|
|
1
2
3
4
5
|
# vim ~/demo-openrc.sh
export
OS_TENANT_NAME=demo
export
OS_USERNAME=demo
export
OS_PASSWORD=demo
export
OS_AUTH_URL=http:
//controller
:5000
/v2
.0
|
|
1
|
# source admin-openrc.sh
|
8、测试如果取消环境变量,通过keystone仍然能够认证通过说明keystone是配置成功的
四、安装glance组件
1、创建keystone数据库和授权用户
|
1
2
3
4
|
mysql -u root -p
CREATE DATABASE glance;
GRANT ALL PRIVILEGES ON glance.* TO
'glance'
@
'localhost'
IDENTIFIED BY
'glance'
;
GRANT ALL PRIVILEGES ON glance.* TO
'glance'
@
'%'
IDENTIFIED BY
'glance'
;
|
2、创建glance用户并加入到admin组中
|
1
2
|
# keystone user-create --name glance --pass glance
# keystone user-role-add --user glance --tenant service --role admin
|
3、创建glance服务
|
1
|
# keystone service-create --name glance --type image --description "OpenStack Image Service"
|
4、创建Identity的服务访问rul
|
1
2
3
4
5
6
|
# keystone endpoint-create \
--service-
id
$(keystone service-list |
awk
'/ image / {print $2}'
) \
--publicurl http:
//controller
:9292 \
--internalurl http:
//controller
:9292 \
--adminurl http:
//controller
:9292 \
--region regionOne
|
5、安装配置glance包
|
1
|
# yum -y install openstack-glance python-glanceclient
|
6、修改glance配置文件
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
|
# cp /etc/glance/glance-api.conf /etc/glance/glance-api.conf.bak
# vim /etc/glance/glance-api.conf
[DEFAULT]
verbose = True
[database]
connection = mysql:
//glance
:glance@controller
/glance
[keystone_authtoken]
auth_uri = http:
//controller
:5000
/v2
.0
identity_uri = http:
//controller
:35357
admin_tenant_name = service
admin_user = glance
admin_password = glance
[paste_deploy]
flavor = keystone
[glance_store]
default_store =
file
filesystem_store_datadir =
/var/lib/glance/images/
|
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
|
# cp /etc/glance/glance-registry.conf /etc/glance/glance-registry.conf.bak
# vim /etc/glance/glance-registry.conf
[DEFAULT]
verbose = True
[database]
connection = mysql:
//glance
:glance@controller
/glance
[keystone_authtoken]
auth_uri = http:
//controller
:5000
/v2
.0
identity_uri = http:
//controller
:35357
admin_tenant_name = service
admin_user = glance
admin_password = glance
[paste_deploy]
flavor = keystone
|
7、同步glance到mariadb数据库
|
1
|
# su -s /bin/sh -c "glance-manage db_sync" glance
|
8、启动和开机自启动
|
1
2
|
# systemctl enable openstack-glance-api.service openstack-glance-registry.service
# systemctl start openstack-glance-api.service openstack-glance-registry.service
|
9、下载上传image镜像
|
1
2
3
4
5
6
|
# mkdir /tmp/images
# cd /tmp/images
# wget http://cdn.download.cirros-cloud.net/0.3.3/cirros-0.3.3-x86_64-disk.img
# glance image-create --name "cirros-0.3.3-x86_64" --file cirros-0.3.3-x86_64-disk.img --disk-format qcow2 --container-format bare --is-public True --progress
# glance image-list
# mv /tmp/images /opt
|
五、添加一个计算节点
1、创建nova数据库和授权用户
|
1
2
3
4
|
mysql -u root -p
CREATE DATABASE nova;
GRANT ALL PRIVILEGES ON nova.* TO
'nova'
@
'localhost'
IDENTIFIED BY
'nova'
;
GRANT ALL PRIVILEGES ON nova.* TO
'nova'
@
'%'
IDENTIFIED BY
'nova'
;
|
2、创建Nova的用户,加入到admin组、service服务
|
1
2
3
|
# keystone user-create --name nova --pass nova
# keystone user-role-add --user nova --tenant service --role admin
# keystone service-create --name nova --type compute --description "OpenStack Compute"
|
3、创建计算节点的访问url
|
1
2
3
4
5
6
|
# keystone endpoint-create \
--service-
id
$(keystone service-list |
awk
'/ compute / {print $2}'
) \
--publicurl http:
//controller
:8774
/v2/
%\(tenant_id\)s \
--internalurl http:
//controller
:8774
/v2/
%\(tenant_id\)s \
--adminurl http:
//controller
:8774
/v2/
%\(tenant_id\)s \
--region regionOne
|
4、安装Nova包
|
1
2
|
# yum -y install openstack-nova-api openstack-nova-cert openstack-nova-conductor openstack-nova-console openstack-nova-novncproxy openstack-nova-scheduler python-novaclient
# yum -y install openstack-nova-compute sysfsutils
|
5、修改nova配置文件
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
|
# cp /etc/nova/nova.conf /etc/nova/nova.conf.bak
# vim /etc/nova/nova.conf
[DEFAULT]
my_ip = controller
vncserver_listen = controller
vncserver_proxyclient_address = controller
verbose = True
rpc_backend = rabbit
rabbit_host = controller
rabbit_password = rabbit
auth_strategy = keystone
vnc_enabled = True
vncserver_listen = 0.0.0.0
vncserver_proxyclient_address = controller
novncproxy_base_url = http:
//controller
:6080
/vnc_auto
.html
[database]
connection = mysql:
//nova
:nova@controller
/nova
[keystone_authtoken]
auth_uri = http:
//controller
:5000
/v2
.0
identity_uri = http:
//controller
:35357
admin_tenant_name = service
admin_user = nova
admin_password = nova
[glance]
host = controller
[libvirt]
virt_type = qemu
|
6、同步nova到moriadb数据库
|
1
|
# su -s /bin/sh -c "nova-manage db sync" nova
|
7、启动众多服务开机自启动
|
1
2
3
4
5
6
7
8
9
10
11
12
13
|
# systemctl enable openstack-nova-api.service openstack-nova-cert.service \
openstack-nova-consoleauth.service openstack-nova-scheduler.service \
openstack-nova-conductor.service openstack-nova-novncproxy.service
# systemctl start openstack-nova-api.service openstack-nova-cert.service \
openstack-nova-consoleauth.service openstack-nova-scheduler.service \
openstack-nova-conductor.service openstack-nova-novncproxy.service
# systemctl enable libvirtd.service openstack-nova-compute.service
# systemctl start libvirtd.service
# systemctl start openstack-nova-compute.service
# nova service-list
# nova image-list
|
六、添加一个网络节点
1、创建neutron数据库和授权用户
|
1
2
3
4
|
mysql -u root -p
CREATE DATABASE neutron;
GRANT ALL PRIVILEGES ON neutron.* TO
'neutron'
@
'localhost'
IDENTIFIED BY
'neutron'
;
GRANT ALL PRIVILEGES ON neutron.* TO
'neutron'
@
'%'
IDENTIFIED BY
'neutron'
;
|
2、创建neutron用户,加入到admin组中,并创建neutron服务
|
1
2
3
|
# keystone user-create --name neutron --pass neutron
# keystone user-role-add --user neutron --tenant service --role admin
# keystone service-create --name neutron --type network --description "OpenStack Networking"
|
3、创建neutron的endponit访问url
|
1
2
3
4
5
6
|
# keystone endpoint-create \
--service-
id
$(keystone service-list |
awk
'/ image / {print $2}'
) \
--publicurl http:
//controller
:5672 \
--internalurl http:
//controller
:5672 \
--adminurl http:
//controller
:5672 \
--region regionOne
|
4、安装neutron包
|
1
|
# yum -y install openstack-neutron openstack-neutron-ml2 python-neutronclient which
|
5、修改neutron配置文件
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
|
# cp /etc/neutron/neutron.conf /etc/neutron/neutron.conf.bak
# vim /etc/neutron/neutron.conf
[DEFAULT]
rpc_backend = rabbit
rabbit_host = controller
rabbit_password = rabbit
auth_strategy = keystone
core_plugin = ml2
service_plugins = router
allow_overlapping_ips = True
notify_nova_on_port_status_changes = True
notify_nova_on_port_data_changes = True
nova_url = http:
//controller
:8774
/v2
nova_admin_auth_url = http:
//controller
:35357
/v2
.0
nova_region_name = regionOne
nova_admin_username = nova
nova_admin_tenant_id = SERVICE_TENANT_ID
nova_admin_password = nova
verbose = True
[database]
connection = mysql:
//neutron
:neutron@controller
/neutron
[keystone_authtoken]
auth_uri = http:
//controller
:5000
/v2
.0
identity_uri = http:
//controller
:35357
admin_tenant_name = service
admin_user = neutron
admin_password = neutron
|
6、测试
|
1
|
# keystone tenant-get service
|
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
|
# cp /etc/neutron/plugins/ml2/ml2_conf.ini /etc/neutron/plugins/ml2/ml2_conf.ini.bak
# vim /etc/neutron/plugins/ml2/ml2_conf.ini
[ml2]
type_drivers = flat,gre
tenant_network_types = gre
mechanism_drivers = openvswitch
[ml2_type_gre]
tunnel_id_ranges = 1:1000
[securitygroup]
enable_security_group = True
enable_ipset = True
firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver
|
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
|
# vim /etc/nova/nova.conf
[DEFAULT]
network_api_class = nova.network.neutronv2.api.API
security_group_api = neutron
linuxnet_interface_driver = nova.network.linux_net.LinuxOVSInterfaceDriver
firewall_driver = nova.virt.firewall.NoopFirewallDriver
[neutron]
url = http:
//controller
:9696
auth_strategy = keystone
admin_auth_url = http:
//controller
:35357
/v2
.0
admin_tenant_name = service
admin_username = neutron
admin_password = neutron
|
|
1
|
# ln -s /etc/neutron/plugins/ml2/ml2_conf.ini /etc/neutron/plugin.ini
|
7、同步neutron到mariadb数据库
|
1
|
# su -s /bin/sh -c "neutron-db-manage --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugins/ml2/ml2_conf.ini upgrade juno" neutron
|
8、重新启动compute服务
|
1
|
# systemctl restart openstack-nova-api.service openstack-nova-scheduler.service openstack-nova-conductor.service
|
9、开机自启动服务
|
1
2
|
# systemctl enable neutron-server.service
# systemctl start neutron-server.service
|
10、查看neutron-server进程
|
1
|
# neutron ext-list
|
11、查看相关信息
|
1
|
# tail -f /var/log/neutron/server.log
|
12、配置内核网络参数
|
1
2
3
4
5
6
|
# cp /etc/sysctl.conf /etc/sysctl.conf.bak
# vim /etc/sysctl.conf
net.ipv4.ip_forward=1
net.ipv4.conf.all.rp_filter=0
net.ipv4.conf.default.rp_filter=0
# sysctl -p
|
13、安装网络组件包
|
1
|
# yum -y install openstack-neutron openstack-neutron-ml2 openstack-neutron-openvswitch
|
14、配置常用的网络组件
|
1
2
3
4
5
6
7
8
9
10
11
|
# vim /etc/neutron/plugins/ml2/ml2_conf.ini
[ml2_type_flat]
flat_networks = external
[ovs]
local_ip = INSTANCE_TUNNELS_INTERFACE_IP_ADDRESS
enable_tunneling = True
bridge_mappings = external:br-ex
[agent]
tunnel_types = gre
|
|
1
2
3
4
5
6
7
|
# cp /etc/neutron/l3_agent.ini /etc/neutron/l3_agent.ini.bak
# vim /etc/neutron/l3_agent.ini
[DEFAULT]
interface_driver = neutron.agent.linux.interface.OVSInterfaceDriver
use_namespaces = True
external_network_bridge = br-ex
verbose = True
|
|
1
2
3
4
5
6
7
8
|
# cp /etc/neutron/dhcp_agent.ini /etc/neutron/dhcp_agent.ini.bak
# vim /etc/neutron/dhcp_agent.ini
[DEFAULT]
interface_driver = neutron.agent.linux.interface.OVSInterfaceDriver
dhcp_driver = neutron.agent.linux.dhcp.Dnsmasq
use_namespaces = True
verbose = True
dnsmasq_config_file =
/etc/neutron/dnsmasq-neutron
.conf
|
|
1
2
3
4
5
6
7
8
9
10
11
|
# cp /etc/neutron/metadata_agent.ini /etc/neutron/metadata_agent.ini.bak
# vim /etc/neutron/metadata_agent.ini
[DEFAULT]
auth_url = http:
//controller
:5000
/v2
.0
auth_region = regionOne
admin_tenant_name = service
admin_user = neutron
admin_password = neutron
nova_metadata_ip = controller
metadata_proxy_shared_secret = METADATA_SECRET
verbose = True
|
|
1
2
3
4
|
# vim /etc/nova/nova.conf
[neutron]
service_metadata_proxy = True
metadata_proxy_shared_secret = METADATA_SECRET
|
15、在控制节点上重新启动API服务
|
1
|
# systemctl restart openstack-nova-api.service
|
七、安装配置dashboard
1、安装dashboard和所需的和依赖包
|
1
|
# yum install openstack-dashboard httpd mod_wsgi memcached python-memcached
|
2、修改dashboard配置文件
|
1
2
3
4
5
6
7
8
9
10
11
|
# cp /etc/openstack-dashboard/local_settings /etc/openstack-dashboard/local_settings.bak
# vim /etc/openstack-dashboard/local_settings
OPENSTACK_HOST =
"controller"
ALLOWED_HOSTS = [
'*'
]
CACHES = {
'default'
: {
'BACKEND'
:
'django.core.cache.backends.memcached.MemcachedCache'
,
'LOCATION'
:
'127.0.0.1:11211'
,
}
}
TIME_ZONE =
"TIME_ZONE"
|
3、运行web服务连接OpenStack服务
|
1
|
# setsebool -P httpd_can_network_connect on
|
4、由于包装缺陷,仪表板不能正确加载CSS。运行以下命令来解决这个问题:
|
1
|
# chown -R apache:apache /usr/share/openstack-dashboard/static
|
5、启动Web服务器和会话存储服务和配置启动系统启动时:
|
1
2
|
# systemctl enable httpd.service memcached.service
# systemctl start httpd.service memcached.service
|
八、访问测试
1、基于HTTP进行访问测试:
好了,今天就先到这里吧!后续会继续补充,祝大家周末愉快。
本文转自zys467754239 51CTO博客,原文链接:http://blog.51cto.com/467754239/1587288,如需转载请自行联系原作者

