blob: c2ac81f44820a37aaa97a0aa6528c81ac6114256 [file] [log] [blame]
tierno7edb6752016-03-21 17:37:52 +01001# -*- coding: utf-8 -*-
2
3##
tierno92021022018-09-12 16:29:23 +02004# Copyright 2015 Telefonica Investigacion y Desarrollo, S.A.U.
tierno7edb6752016-03-21 17:37:52 +01005# This file is part of openmano
6# All Rights Reserved.
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License. You may obtain
10# a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
17# License for the specific language governing permissions and limitations
18# under the License.
tierno7edb6752016-03-21 17:37:52 +010019##
20
tierno1ec592d2020-06-16 15:29:47 +000021"""
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +000022osconnector implements all the methods to interact with openstack using the python-neutronclient.
23
24For the VNF forwarding graph, The OpenStack VIM connector calls the
25networking-sfc Neutron extension methods, whose resources are mapped
26to the VIM connector's SFC resources as follows:
27- Classification (OSM) -> Flow Classifier (Neutron)
28- Service Function Instance (OSM) -> Port Pair (Neutron)
29- Service Function (OSM) -> Port Pair Group (Neutron)
30- Service Function Path (OSM) -> Port Chain (Neutron)
tierno1ec592d2020-06-16 15:29:47 +000031"""
tierno7edb6752016-03-21 17:37:52 +010032
sousaedu0fe84cb2022-01-17 13:48:22 +000033import copy
34from http.client import HTTPException
tiernoae4a8d12016-07-08 12:30:39 +020035import logging
sousaedu0fe84cb2022-01-17 13:48:22 +000036from pprint import pformat
garciadeblas2299e3b2017-01-26 14:35:55 +000037import random
kate721d79b2017-06-24 04:21:38 -070038import re
sousaedu0fe84cb2022-01-17 13:48:22 +000039import time
40
41from cinderclient import client as cClient
tiernob5cef372017-06-19 15:52:22 +020042from glanceclient import client as glClient
tierno7edb6752016-03-21 17:37:52 +010043import glanceclient.exc as gl1Exceptions
sousaedu0fe84cb2022-01-17 13:48:22 +000044from keystoneauth1 import session
45from keystoneauth1.identity import v2, v3
46import keystoneclient.exceptions as ksExceptions
47import keystoneclient.v2_0.client as ksClient_v2
48import keystoneclient.v3.client as ksClient_v3
49import netaddr
tierno7edb6752016-03-21 17:37:52 +010050from neutronclient.common import exceptions as neExceptions
sousaedu0fe84cb2022-01-17 13:48:22 +000051from neutronclient.neutron import client as neClient
52from novaclient import client as nClient, exceptions as nvExceptions
53from osm_ro_plugin import vimconn
tierno7edb6752016-03-21 17:37:52 +010054from requests.exceptions import ConnectionError
sousaedu0fe84cb2022-01-17 13:48:22 +000055import yaml
tierno7edb6752016-03-21 17:37:52 +010056
tierno1ec592d2020-06-16 15:29:47 +000057__author__ = "Alfonso Tierno, Gerardo Garcia, Pablo Montes, xFlow Research, Igor D.C., Eduardo Sousa"
58__date__ = "$22-sep-2017 23:59:59$"
tierno40e1bce2017-08-09 09:12:04 +020059
60"""contain the openstack virtual machine status to openmano status"""
sousaedu80135b92021-02-17 15:05:18 +010061vmStatus2manoFormat = {
62 "ACTIVE": "ACTIVE",
63 "PAUSED": "PAUSED",
64 "SUSPENDED": "SUSPENDED",
65 "SHUTOFF": "INACTIVE",
66 "BUILD": "BUILD",
67 "ERROR": "ERROR",
68 "DELETED": "DELETED",
69}
70netStatus2manoFormat = {
71 "ACTIVE": "ACTIVE",
72 "PAUSED": "PAUSED",
73 "INACTIVE": "INACTIVE",
74 "BUILD": "BUILD",
75 "ERROR": "ERROR",
76 "DELETED": "DELETED",
77}
tierno7edb6752016-03-21 17:37:52 +010078
sousaedu80135b92021-02-17 15:05:18 +010079supportedClassificationTypes = ["legacy_flow_classifier"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +000080
tierno1ec592d2020-06-16 15:29:47 +000081# global var to have a timeout creating and deleting volumes
garciadeblas64b39c52020-05-21 08:07:25 +000082volume_timeout = 1800
83server_timeout = 1800
montesmoreno0c8def02016-12-22 12:16:23 +000084
Anderson Bravalheri0446cd52018-08-17 15:26:19 +010085
86class SafeDumper(yaml.SafeDumper):
87 def represent_data(self, data):
88 # Openstack APIs use custom subclasses of dict and YAML safe dumper
89 # is designed to not handle that (reference issue 142 of pyyaml)
90 if isinstance(data, dict) and data.__class__ != dict:
91 # A simple solution is to convert those items back to dicts
92 data = dict(data.items())
93
94 return super(SafeDumper, self).represent_data(data)
95
96
tierno72774862020-05-04 11:44:15 +000097class vimconnector(vimconn.VimConnector):
sousaedu80135b92021-02-17 15:05:18 +010098 def __init__(
99 self,
100 uuid,
101 name,
102 tenant_id,
103 tenant_name,
104 url,
105 url_admin=None,
106 user=None,
107 passwd=None,
108 log_level=None,
109 config={},
110 persistent_info={},
111 ):
tierno1ec592d2020-06-16 15:29:47 +0000112 """using common constructor parameters. In this case
tierno7edb6752016-03-21 17:37:52 +0100113 'url' is the keystone authorization url,
114 'url_admin' is not use
tierno1ec592d2020-06-16 15:29:47 +0000115 """
sousaedu80135b92021-02-17 15:05:18 +0100116 api_version = config.get("APIversion")
kate721d79b2017-06-24 04:21:38 -0700117
sousaedu80135b92021-02-17 15:05:18 +0100118 if api_version and api_version not in ("v3.3", "v2.0", "2", "3"):
119 raise vimconn.VimConnException(
120 "Invalid value '{}' for config:APIversion. "
121 "Allowed values are 'v3.3', 'v2.0', '2' or '3'".format(api_version)
122 )
123
124 vim_type = config.get("vim_type")
125
126 if vim_type and vim_type not in ("vio", "VIO"):
127 raise vimconn.VimConnException(
128 "Invalid value '{}' for config:vim_type."
129 "Allowed values are 'vio' or 'VIO'".format(vim_type)
130 )
131
132 if config.get("dataplane_net_vlan_range") is not None:
tierno1ec592d2020-06-16 15:29:47 +0000133 # validate vlan ranges provided by user
sousaedu80135b92021-02-17 15:05:18 +0100134 self._validate_vlan_ranges(
135 config.get("dataplane_net_vlan_range"), "dataplane_net_vlan_range"
136 )
garciadeblasebd66722019-01-31 16:01:31 +0000137
sousaedu80135b92021-02-17 15:05:18 +0100138 if config.get("multisegment_vlan_range") is not None:
tierno1ec592d2020-06-16 15:29:47 +0000139 # validate vlan ranges provided by user
sousaedu80135b92021-02-17 15:05:18 +0100140 self._validate_vlan_ranges(
141 config.get("multisegment_vlan_range"), "multisegment_vlan_range"
142 )
kate721d79b2017-06-24 04:21:38 -0700143
sousaedu80135b92021-02-17 15:05:18 +0100144 vimconn.VimConnector.__init__(
145 self,
146 uuid,
147 name,
148 tenant_id,
149 tenant_name,
150 url,
151 url_admin,
152 user,
153 passwd,
154 log_level,
155 config,
156 )
tiernob3d36742017-03-03 23:51:05 +0100157
tierno4d1ce222018-04-06 10:41:06 +0200158 if self.config.get("insecure") and self.config.get("ca_cert"):
sousaedu80135b92021-02-17 15:05:18 +0100159 raise vimconn.VimConnException(
160 "options insecure and ca_cert are mutually exclusive"
161 )
162
tierno4d1ce222018-04-06 10:41:06 +0200163 self.verify = True
sousaedu80135b92021-02-17 15:05:18 +0100164
tierno4d1ce222018-04-06 10:41:06 +0200165 if self.config.get("insecure"):
166 self.verify = False
sousaedu80135b92021-02-17 15:05:18 +0100167
tierno4d1ce222018-04-06 10:41:06 +0200168 if self.config.get("ca_cert"):
169 self.verify = self.config.get("ca_cert")
tierno4d1ce222018-04-06 10:41:06 +0200170
tierno7edb6752016-03-21 17:37:52 +0100171 if not url:
sousaedu80135b92021-02-17 15:05:18 +0100172 raise TypeError("url param can not be NoneType")
173
tiernob5cef372017-06-19 15:52:22 +0200174 self.persistent_info = persistent_info
sousaedu80135b92021-02-17 15:05:18 +0100175 self.availability_zone = persistent_info.get("availability_zone", None)
176 self.session = persistent_info.get("session", {"reload_client": True})
177 self.my_tenant_id = self.session.get("my_tenant_id")
178 self.nova = self.session.get("nova")
179 self.neutron = self.session.get("neutron")
180 self.cinder = self.session.get("cinder")
181 self.glance = self.session.get("glance")
182 # self.glancev1 = self.session.get("glancev1")
183 self.keystone = self.session.get("keystone")
184 self.api_version3 = self.session.get("api_version3")
kate721d79b2017-06-24 04:21:38 -0700185 self.vim_type = self.config.get("vim_type")
sousaedu80135b92021-02-17 15:05:18 +0100186
kate721d79b2017-06-24 04:21:38 -0700187 if self.vim_type:
188 self.vim_type = self.vim_type.upper()
sousaedu80135b92021-02-17 15:05:18 +0100189
kate721d79b2017-06-24 04:21:38 -0700190 if self.config.get("use_internal_endpoint"):
191 self.endpoint_type = "internalURL"
192 else:
193 self.endpoint_type = None
montesmoreno0c8def02016-12-22 12:16:23 +0000194
sousaedu80135b92021-02-17 15:05:18 +0100195 logging.getLogger("urllib3").setLevel(logging.WARNING)
196 logging.getLogger("keystoneauth").setLevel(logging.WARNING)
197 logging.getLogger("novaclient").setLevel(logging.WARNING)
198 self.logger = logging.getLogger("ro.vim.openstack")
kate721d79b2017-06-24 04:21:38 -0700199
tiernoa05b65a2019-02-01 12:30:27 +0000200 # allow security_groups to be a list or a single string
sousaedu80135b92021-02-17 15:05:18 +0100201 if isinstance(self.config.get("security_groups"), str):
202 self.config["security_groups"] = [self.config["security_groups"]]
203
tiernoa05b65a2019-02-01 12:30:27 +0000204 self.security_groups_id = None
205
tierno1ec592d2020-06-16 15:29:47 +0000206 # ###### VIO Specific Changes #########
kate721d79b2017-06-24 04:21:38 -0700207 if self.vim_type == "VIO":
sousaedu80135b92021-02-17 15:05:18 +0100208 self.logger = logging.getLogger("ro.vim.vio")
kate721d79b2017-06-24 04:21:38 -0700209
tiernofe789902016-09-29 14:20:44 +0000210 if log_level:
tierno1ec592d2020-06-16 15:29:47 +0000211 self.logger.setLevel(getattr(logging, log_level))
tiernof716aea2017-06-21 18:01:40 +0200212
213 def __getitem__(self, index):
214 """Get individuals parameters.
215 Throw KeyError"""
sousaedu80135b92021-02-17 15:05:18 +0100216 if index == "project_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200217 return self.config.get("project_domain_id")
sousaedu80135b92021-02-17 15:05:18 +0100218 elif index == "user_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200219 return self.config.get("user_domain_id")
220 else:
tierno72774862020-05-04 11:44:15 +0000221 return vimconn.VimConnector.__getitem__(self, index)
tiernof716aea2017-06-21 18:01:40 +0200222
223 def __setitem__(self, index, value):
224 """Set individuals parameters and it is marked as dirty so to force connection reload.
225 Throw KeyError"""
sousaedu80135b92021-02-17 15:05:18 +0100226 if index == "project_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200227 self.config["project_domain_id"] = value
sousaedu80135b92021-02-17 15:05:18 +0100228 elif index == "user_domain_id":
tierno1ec592d2020-06-16 15:29:47 +0000229 self.config["user_domain_id"] = value
tiernof716aea2017-06-21 18:01:40 +0200230 else:
tierno72774862020-05-04 11:44:15 +0000231 vimconn.VimConnector.__setitem__(self, index, value)
sousaedu80135b92021-02-17 15:05:18 +0100232
233 self.session["reload_client"] = True
tiernof716aea2017-06-21 18:01:40 +0200234
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100235 def serialize(self, value):
236 """Serialization of python basic types.
237
238 In the case value is not serializable a message will be logged and a
239 simple representation of the data that cannot be converted back to
240 python is returned.
241 """
tierno7d782ef2019-10-04 12:56:31 +0000242 if isinstance(value, str):
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100243 return value
244
245 try:
sousaedu80135b92021-02-17 15:05:18 +0100246 return yaml.dump(
247 value, Dumper=SafeDumper, default_flow_style=True, width=256
248 )
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100249 except yaml.representer.RepresenterError:
sousaedu80135b92021-02-17 15:05:18 +0100250 self.logger.debug(
251 "The following entity cannot be serialized in YAML:\n\n%s\n\n",
252 pformat(value),
253 exc_info=True,
254 )
255
tierno1ec592d2020-06-16 15:29:47 +0000256 return str(value)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100257
tierno7edb6752016-03-21 17:37:52 +0100258 def _reload_connection(self):
tierno1ec592d2020-06-16 15:29:47 +0000259 """Called before any operation, it check if credentials has changed
tierno7edb6752016-03-21 17:37:52 +0100260 Throw keystoneclient.apiclient.exceptions.AuthorizationFailure
tierno1ec592d2020-06-16 15:29:47 +0000261 """
262 # TODO control the timing and possible token timeout, but it seams that python client does this task for us :-)
sousaedu80135b92021-02-17 15:05:18 +0100263 if self.session["reload_client"]:
264 if self.config.get("APIversion"):
265 self.api_version3 = (
266 self.config["APIversion"] == "v3.3"
267 or self.config["APIversion"] == "3"
268 )
tiernof716aea2017-06-21 18:01:40 +0200269 else: # get from ending auth_url that end with v3 or with v2.0
sousaedu80135b92021-02-17 15:05:18 +0100270 self.api_version3 = self.url.endswith("/v3") or self.url.endswith(
271 "/v3/"
272 )
273
274 self.session["api_version3"] = self.api_version3
275
tiernof716aea2017-06-21 18:01:40 +0200276 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100277 if self.config.get("project_domain_id") or self.config.get(
278 "project_domain_name"
279 ):
tierno3cb8dc32017-10-24 18:13:19 +0200280 project_domain_id_default = None
281 else:
sousaedu80135b92021-02-17 15:05:18 +0100282 project_domain_id_default = "default"
283
284 if self.config.get("user_domain_id") or self.config.get(
285 "user_domain_name"
286 ):
tierno3cb8dc32017-10-24 18:13:19 +0200287 user_domain_id_default = None
288 else:
sousaedu80135b92021-02-17 15:05:18 +0100289 user_domain_id_default = "default"
290 auth = v3.Password(
291 auth_url=self.url,
292 username=self.user,
293 password=self.passwd,
294 project_name=self.tenant_name,
295 project_id=self.tenant_id,
296 project_domain_id=self.config.get(
297 "project_domain_id", project_domain_id_default
298 ),
299 user_domain_id=self.config.get(
300 "user_domain_id", user_domain_id_default
301 ),
302 project_domain_name=self.config.get("project_domain_name"),
303 user_domain_name=self.config.get("user_domain_name"),
304 )
ahmadsa95baa272016-11-30 09:14:11 +0500305 else:
sousaedu80135b92021-02-17 15:05:18 +0100306 auth = v2.Password(
307 auth_url=self.url,
308 username=self.user,
309 password=self.passwd,
310 tenant_name=self.tenant_name,
311 tenant_id=self.tenant_id,
312 )
313
tierno4d1ce222018-04-06 10:41:06 +0200314 sess = session.Session(auth=auth, verify=self.verify)
tierno1ec592d2020-06-16 15:29:47 +0000315 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
316 # Titanium cloud and StarlingX
sousaedu80135b92021-02-17 15:05:18 +0100317 region_name = self.config.get("region_name")
318
tiernof716aea2017-06-21 18:01:40 +0200319 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100320 self.keystone = ksClient_v3.Client(
321 session=sess,
322 endpoint_type=self.endpoint_type,
323 region_name=region_name,
324 )
tiernof716aea2017-06-21 18:01:40 +0200325 else:
sousaedu80135b92021-02-17 15:05:18 +0100326 self.keystone = ksClient_v2.Client(
327 session=sess, endpoint_type=self.endpoint_type
328 )
329
330 self.session["keystone"] = self.keystone
331 # In order to enable microversion functionality an explicit microversion must be specified in "config".
montesmoreno9317d302017-08-16 12:48:23 +0200332 # This implementation approach is due to the warning message in
333 # https://developer.openstack.org/api-guide/compute/microversions.html
334 # where it is stated that microversion backwards compatibility is not guaranteed and clients should
335 # always require an specific microversion.
sousaedu80135b92021-02-17 15:05:18 +0100336 # To be able to use "device role tagging" functionality define "microversion: 2.32" in datacenter config
montesmoreno9317d302017-08-16 12:48:23 +0200337 version = self.config.get("microversion")
sousaedu80135b92021-02-17 15:05:18 +0100338
montesmoreno9317d302017-08-16 12:48:23 +0200339 if not version:
340 version = "2.1"
sousaedu80135b92021-02-17 15:05:18 +0100341
tierno1ec592d2020-06-16 15:29:47 +0000342 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
343 # Titanium cloud and StarlingX
sousaedu80135b92021-02-17 15:05:18 +0100344 self.nova = self.session["nova"] = nClient.Client(
345 str(version),
346 session=sess,
347 endpoint_type=self.endpoint_type,
348 region_name=region_name,
349 )
350 self.neutron = self.session["neutron"] = neClient.Client(
351 "2.0",
352 session=sess,
353 endpoint_type=self.endpoint_type,
354 region_name=region_name,
355 )
356 self.cinder = self.session["cinder"] = cClient.Client(
357 2,
358 session=sess,
359 endpoint_type=self.endpoint_type,
360 region_name=region_name,
361 )
362
tiernoa05b65a2019-02-01 12:30:27 +0000363 try:
sousaedu80135b92021-02-17 15:05:18 +0100364 self.my_tenant_id = self.session["my_tenant_id"] = sess.get_project_id()
tierno1ec592d2020-06-16 15:29:47 +0000365 except Exception:
tiernoa05b65a2019-02-01 12:30:27 +0000366 self.logger.error("Cannot get project_id from session", exc_info=True)
sousaedu80135b92021-02-17 15:05:18 +0100367
kate721d79b2017-06-24 04:21:38 -0700368 if self.endpoint_type == "internalURL":
369 glance_service_id = self.keystone.services.list(name="glance")[0].id
sousaedu80135b92021-02-17 15:05:18 +0100370 glance_endpoint = self.keystone.endpoints.list(
371 glance_service_id, interface="internal"
372 )[0].url
kate721d79b2017-06-24 04:21:38 -0700373 else:
374 glance_endpoint = None
sousaedu80135b92021-02-17 15:05:18 +0100375
376 self.glance = self.session["glance"] = glClient.Client(
377 2, session=sess, endpoint=glance_endpoint
378 )
tiernoa05b65a2019-02-01 12:30:27 +0000379 # using version 1 of glance client in new_image()
sousaedu80135b92021-02-17 15:05:18 +0100380 # self.glancev1 = self.session["glancev1"] = glClient.Client("1", session=sess,
tierno1beea862018-07-11 15:47:37 +0200381 # endpoint=glance_endpoint)
sousaedu80135b92021-02-17 15:05:18 +0100382 self.session["reload_client"] = False
383 self.persistent_info["session"] = self.session
mirabal29356312017-07-27 12:21:22 +0200384 # add availablity zone info inside self.persistent_info
385 self._set_availablity_zones()
sousaedu80135b92021-02-17 15:05:18 +0100386 self.persistent_info["availability_zone"] = self.availability_zone
387 # force to get again security_groups_ids next time they are needed
388 self.security_groups_id = None
ahmadsa95baa272016-11-30 09:14:11 +0500389
tierno7edb6752016-03-21 17:37:52 +0100390 def __net_os2mano(self, net_list_dict):
tierno1ec592d2020-06-16 15:29:47 +0000391 """Transform the net openstack format to mano format
392 net_list_dict can be a list of dict or a single dict"""
tierno7edb6752016-03-21 17:37:52 +0100393 if type(net_list_dict) is dict:
tierno1ec592d2020-06-16 15:29:47 +0000394 net_list_ = (net_list_dict,)
tierno7edb6752016-03-21 17:37:52 +0100395 elif type(net_list_dict) is list:
tierno1ec592d2020-06-16 15:29:47 +0000396 net_list_ = net_list_dict
tierno7edb6752016-03-21 17:37:52 +0100397 else:
398 raise TypeError("param net_list_dict must be a list or a dictionary")
399 for net in net_list_:
sousaedu80135b92021-02-17 15:05:18 +0100400 if net.get("provider:network_type") == "vlan":
401 net["type"] = "data"
tierno7edb6752016-03-21 17:37:52 +0100402 else:
sousaedu80135b92021-02-17 15:05:18 +0100403 net["type"] = "bridge"
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +0200404
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000405 def __classification_os2mano(self, class_list_dict):
406 """Transform the openstack format (Flow Classifier) to mano format
407 (Classification) class_list_dict can be a list of dict or a single dict
408 """
409 if isinstance(class_list_dict, dict):
410 class_list_ = [class_list_dict]
411 elif isinstance(class_list_dict, list):
412 class_list_ = class_list_dict
413 else:
tierno1ec592d2020-06-16 15:29:47 +0000414 raise TypeError("param class_list_dict must be a list or a dictionary")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000415 for classification in class_list_:
sousaedu80135b92021-02-17 15:05:18 +0100416 id = classification.pop("id")
417 name = classification.pop("name")
418 description = classification.pop("description")
419 project_id = classification.pop("project_id")
420 tenant_id = classification.pop("tenant_id")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000421 original_classification = copy.deepcopy(classification)
422 classification.clear()
sousaedu80135b92021-02-17 15:05:18 +0100423 classification["ctype"] = "legacy_flow_classifier"
424 classification["definition"] = original_classification
425 classification["id"] = id
426 classification["name"] = name
427 classification["description"] = description
428 classification["project_id"] = project_id
429 classification["tenant_id"] = tenant_id
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000430
431 def __sfi_os2mano(self, sfi_list_dict):
432 """Transform the openstack format (Port Pair) to mano format (SFI)
433 sfi_list_dict can be a list of dict or a single dict
434 """
435 if isinstance(sfi_list_dict, dict):
436 sfi_list_ = [sfi_list_dict]
437 elif isinstance(sfi_list_dict, list):
438 sfi_list_ = sfi_list_dict
439 else:
sousaedu80135b92021-02-17 15:05:18 +0100440 raise TypeError("param sfi_list_dict must be a list or a dictionary")
441
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000442 for sfi in sfi_list_:
sousaedu80135b92021-02-17 15:05:18 +0100443 sfi["ingress_ports"] = []
444 sfi["egress_ports"] = []
445
446 if sfi.get("ingress"):
447 sfi["ingress_ports"].append(sfi["ingress"])
448
449 if sfi.get("egress"):
450 sfi["egress_ports"].append(sfi["egress"])
451
452 del sfi["ingress"]
453 del sfi["egress"]
454 params = sfi.get("service_function_parameters")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000455 sfc_encap = False
sousaedu80135b92021-02-17 15:05:18 +0100456
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000457 if params:
sousaedu80135b92021-02-17 15:05:18 +0100458 correlation = params.get("correlation")
459
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000460 if correlation:
461 sfc_encap = True
sousaedu80135b92021-02-17 15:05:18 +0100462
463 sfi["sfc_encap"] = sfc_encap
464 del sfi["service_function_parameters"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000465
466 def __sf_os2mano(self, sf_list_dict):
467 """Transform the openstack format (Port Pair Group) to mano format (SF)
468 sf_list_dict can be a list of dict or a single dict
469 """
470 if isinstance(sf_list_dict, dict):
471 sf_list_ = [sf_list_dict]
472 elif isinstance(sf_list_dict, list):
473 sf_list_ = sf_list_dict
474 else:
sousaedu80135b92021-02-17 15:05:18 +0100475 raise TypeError("param sf_list_dict must be a list or a dictionary")
476
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000477 for sf in sf_list_:
sousaedu80135b92021-02-17 15:05:18 +0100478 del sf["port_pair_group_parameters"]
479 sf["sfis"] = sf["port_pairs"]
480 del sf["port_pairs"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000481
482 def __sfp_os2mano(self, sfp_list_dict):
483 """Transform the openstack format (Port Chain) to mano format (SFP)
484 sfp_list_dict can be a list of dict or a single dict
485 """
486 if isinstance(sfp_list_dict, dict):
487 sfp_list_ = [sfp_list_dict]
488 elif isinstance(sfp_list_dict, list):
489 sfp_list_ = sfp_list_dict
490 else:
sousaedu80135b92021-02-17 15:05:18 +0100491 raise TypeError("param sfp_list_dict must be a list or a dictionary")
492
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000493 for sfp in sfp_list_:
sousaedu80135b92021-02-17 15:05:18 +0100494 params = sfp.pop("chain_parameters")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000495 sfc_encap = False
sousaedu80135b92021-02-17 15:05:18 +0100496
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000497 if params:
sousaedu80135b92021-02-17 15:05:18 +0100498 correlation = params.get("correlation")
499
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000500 if correlation:
501 sfc_encap = True
sousaedu80135b92021-02-17 15:05:18 +0100502
503 sfp["sfc_encap"] = sfc_encap
504 sfp["spi"] = sfp.pop("chain_id")
505 sfp["classifications"] = sfp.pop("flow_classifiers")
506 sfp["service_functions"] = sfp.pop("port_pair_groups")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000507
508 # placeholder for now; read TODO note below
509 def _validate_classification(self, type, definition):
510 # only legacy_flow_classifier Type is supported at this point
511 return True
512 # TODO(igordcard): this method should be an abstract method of an
513 # abstract Classification class to be implemented by the specific
514 # Types. Also, abstract vimconnector should call the validation
515 # method before the implemented VIM connectors are called.
516
tiernoae4a8d12016-07-08 12:30:39 +0200517 def _format_exception(self, exception):
tierno69647792020-03-05 16:45:48 +0000518 """Transform a keystone, nova, neutron exception into a vimconn exception discovering the cause"""
tierno69647792020-03-05 16:45:48 +0000519 message_error = str(exception)
tierno5ad826a2020-08-11 11:19:44 +0000520 tip = ""
tiernode12f782019-04-05 12:46:42 +0000521
sousaedu80135b92021-02-17 15:05:18 +0100522 if isinstance(
523 exception,
524 (
525 neExceptions.NetworkNotFoundClient,
526 nvExceptions.NotFound,
527 ksExceptions.NotFound,
528 gl1Exceptions.HTTPNotFound,
529 ),
530 ):
531 raise vimconn.VimConnNotFoundException(
532 type(exception).__name__ + ": " + message_error
533 )
534 elif isinstance(
535 exception,
536 (
537 HTTPException,
538 gl1Exceptions.HTTPException,
539 gl1Exceptions.CommunicationError,
540 ConnectionError,
541 ksExceptions.ConnectionError,
542 neExceptions.ConnectionFailed,
543 ),
544 ):
tierno5ad826a2020-08-11 11:19:44 +0000545 if type(exception).__name__ == "SSLError":
546 tip = " (maybe option 'insecure' must be added to the VIM)"
sousaedu80135b92021-02-17 15:05:18 +0100547
548 raise vimconn.VimConnConnectionException(
549 "Invalid URL or credentials{}: {}".format(tip, message_error)
550 )
551 elif isinstance(
552 exception,
553 (
554 KeyError,
555 nvExceptions.BadRequest,
556 ksExceptions.BadRequest,
557 ),
558 ):
559 raise vimconn.VimConnException(
560 type(exception).__name__ + ": " + message_error
561 )
562 elif isinstance(
563 exception,
564 (
565 nvExceptions.ClientException,
566 ksExceptions.ClientException,
567 neExceptions.NeutronException,
568 ),
569 ):
570 raise vimconn.VimConnUnexpectedResponse(
571 type(exception).__name__ + ": " + message_error
572 )
tiernoae4a8d12016-07-08 12:30:39 +0200573 elif isinstance(exception, nvExceptions.Conflict):
sousaedu80135b92021-02-17 15:05:18 +0100574 raise vimconn.VimConnConflictException(
575 type(exception).__name__ + ": " + message_error
576 )
tierno72774862020-05-04 11:44:15 +0000577 elif isinstance(exception, vimconn.VimConnException):
tierno41a69812018-02-16 14:34:33 +0100578 raise exception
tiernof716aea2017-06-21 18:01:40 +0200579 else: # ()
tiernode12f782019-04-05 12:46:42 +0000580 self.logger.error("General Exception " + message_error, exc_info=True)
sousaedu80135b92021-02-17 15:05:18 +0100581
582 raise vimconn.VimConnConnectionException(
583 type(exception).__name__ + ": " + message_error
584 )
tiernoae4a8d12016-07-08 12:30:39 +0200585
tiernoa05b65a2019-02-01 12:30:27 +0000586 def _get_ids_from_name(self):
587 """
588 Obtain ids from name of tenant and security_groups. Store at self .security_groups_id"
589 :return: None
590 """
591 # get tenant_id if only tenant_name is supplied
592 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100593
tiernoa05b65a2019-02-01 12:30:27 +0000594 if not self.my_tenant_id:
sousaedu80135b92021-02-17 15:05:18 +0100595 raise vimconn.VimConnConnectionException(
596 "Error getting tenant information from name={} id={}".format(
597 self.tenant_name, self.tenant_id
598 )
599 )
600
601 if self.config.get("security_groups") and not self.security_groups_id:
tiernoa05b65a2019-02-01 12:30:27 +0000602 # convert from name to id
sousaedu80135b92021-02-17 15:05:18 +0100603 neutron_sg_list = self.neutron.list_security_groups(
604 tenant_id=self.my_tenant_id
605 )["security_groups"]
tiernoa05b65a2019-02-01 12:30:27 +0000606
607 self.security_groups_id = []
sousaedu80135b92021-02-17 15:05:18 +0100608 for sg in self.config.get("security_groups"):
tiernoa05b65a2019-02-01 12:30:27 +0000609 for neutron_sg in neutron_sg_list:
610 if sg in (neutron_sg["id"], neutron_sg["name"]):
611 self.security_groups_id.append(neutron_sg["id"])
612 break
613 else:
614 self.security_groups_id = None
sousaedu80135b92021-02-17 15:05:18 +0100615
616 raise vimconn.VimConnConnectionException(
617 "Not found security group {} for this tenant".format(sg)
618 )
tiernoa05b65a2019-02-01 12:30:27 +0000619
tierno5509c2e2019-07-04 16:23:20 +0000620 def check_vim_connectivity(self):
621 # just get network list to check connectivity and credentials
622 self.get_network_list(filter_dict={})
623
tiernoae4a8d12016-07-08 12:30:39 +0200624 def get_tenant_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +0000625 """Obtain tenants of VIM
tiernoae4a8d12016-07-08 12:30:39 +0200626 filter_dict can contain the following keys:
627 name: filter by tenant name
628 id: filter by tenant uuid/id
629 <other VIM specific>
630 Returns the tenant list of dictionaries: [{'name':'<name>, 'id':'<id>, ...}, ...]
tierno1ec592d2020-06-16 15:29:47 +0000631 """
ahmadsa95baa272016-11-30 09:14:11 +0500632 self.logger.debug("Getting tenants from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +0100633
tiernoae4a8d12016-07-08 12:30:39 +0200634 try:
635 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100636
tiernof716aea2017-06-21 18:01:40 +0200637 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100638 project_class_list = self.keystone.projects.list(
639 name=filter_dict.get("name")
640 )
ahmadsa95baa272016-11-30 09:14:11 +0500641 else:
tiernof716aea2017-06-21 18:01:40 +0200642 project_class_list = self.keystone.tenants.findall(**filter_dict)
sousaedu80135b92021-02-17 15:05:18 +0100643
tierno1ec592d2020-06-16 15:29:47 +0000644 project_list = []
sousaedu80135b92021-02-17 15:05:18 +0100645
ahmadsa95baa272016-11-30 09:14:11 +0500646 for project in project_class_list:
sousaedu80135b92021-02-17 15:05:18 +0100647 if filter_dict.get("id") and filter_dict["id"] != project.id:
tiernof716aea2017-06-21 18:01:40 +0200648 continue
sousaedu80135b92021-02-17 15:05:18 +0100649
ahmadsa95baa272016-11-30 09:14:11 +0500650 project_list.append(project.to_dict())
sousaedu80135b92021-02-17 15:05:18 +0100651
ahmadsa95baa272016-11-30 09:14:11 +0500652 return project_list
sousaedu80135b92021-02-17 15:05:18 +0100653 except (
654 ksExceptions.ConnectionError,
655 ksExceptions.ClientException,
656 ConnectionError,
657 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200658 self._format_exception(e)
659
660 def new_tenant(self, tenant_name, tenant_description):
tierno1ec592d2020-06-16 15:29:47 +0000661 """Adds a new tenant to openstack VIM. Returns the tenant identifier"""
tiernoae4a8d12016-07-08 12:30:39 +0200662 self.logger.debug("Adding a new tenant name: %s", tenant_name)
sousaedu80135b92021-02-17 15:05:18 +0100663
tiernoae4a8d12016-07-08 12:30:39 +0200664 try:
665 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100666
tiernof716aea2017-06-21 18:01:40 +0200667 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100668 project = self.keystone.projects.create(
669 tenant_name,
670 self.config.get("project_domain_id", "default"),
671 description=tenant_description,
672 is_domain=False,
673 )
ahmadsa95baa272016-11-30 09:14:11 +0500674 else:
tiernof716aea2017-06-21 18:01:40 +0200675 project = self.keystone.tenants.create(tenant_name, tenant_description)
sousaedu80135b92021-02-17 15:05:18 +0100676
ahmadsa95baa272016-11-30 09:14:11 +0500677 return project.id
sousaedu80135b92021-02-17 15:05:18 +0100678 except (
679 ksExceptions.ConnectionError,
680 ksExceptions.ClientException,
681 ksExceptions.BadRequest,
682 ConnectionError,
683 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200684 self._format_exception(e)
685
686 def delete_tenant(self, tenant_id):
tierno1ec592d2020-06-16 15:29:47 +0000687 """Delete a tenant from openstack VIM. Returns the old tenant identifier"""
tiernoae4a8d12016-07-08 12:30:39 +0200688 self.logger.debug("Deleting tenant %s from VIM", tenant_id)
sousaedu80135b92021-02-17 15:05:18 +0100689
tiernoae4a8d12016-07-08 12:30:39 +0200690 try:
691 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100692
tiernof716aea2017-06-21 18:01:40 +0200693 if self.api_version3:
ahmadsa95baa272016-11-30 09:14:11 +0500694 self.keystone.projects.delete(tenant_id)
695 else:
696 self.keystone.tenants.delete(tenant_id)
sousaedu80135b92021-02-17 15:05:18 +0100697
tiernoae4a8d12016-07-08 12:30:39 +0200698 return tenant_id
sousaedu80135b92021-02-17 15:05:18 +0100699 except (
700 ksExceptions.ConnectionError,
701 ksExceptions.ClientException,
702 ksExceptions.NotFound,
703 ConnectionError,
704 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200705 self._format_exception(e)
ahmadsa95baa272016-11-30 09:14:11 +0500706
sousaedu80135b92021-02-17 15:05:18 +0100707 def new_network(
708 self,
709 net_name,
710 net_type,
711 ip_profile=None,
712 shared=False,
713 provider_network_profile=None,
714 ):
garciadeblasebd66722019-01-31 16:01:31 +0000715 """Adds a tenant network to VIM
716 Params:
717 'net_name': name of the network
718 'net_type': one of:
719 'bridge': overlay isolated network
720 'data': underlay E-LAN network for Passthrough and SRIOV interfaces
721 'ptp': underlay E-LINE network for Passthrough and SRIOV interfaces.
722 'ip_profile': is a dict containing the IP parameters of the network
723 'ip_version': can be "IPv4" or "IPv6" (Currently only IPv4 is implemented)
724 'subnet_address': ip_prefix_schema, that is X.X.X.X/Y
725 'gateway_address': (Optional) ip_schema, that is X.X.X.X
726 'dns_address': (Optional) comma separated list of ip_schema, e.g. X.X.X.X[,X,X,X,X]
727 'dhcp_enabled': True or False
728 'dhcp_start_address': ip_schema, first IP to grant
729 'dhcp_count': number of IPs to grant.
730 'shared': if this network can be seen/use by other tenants/organization
garciadeblas4af0d542020-02-18 16:01:13 +0100731 'provider_network_profile': (optional) contains {segmentation-id: vlan, network-type: vlan|vxlan,
732 physical-network: physnet-label}
garciadeblasebd66722019-01-31 16:01:31 +0000733 Returns a tuple with the network identifier and created_items, or raises an exception on error
734 created_items can be None or a dictionary where this method can include key-values that will be passed to
735 the method delete_network. Can be used to store created segments, created l2gw connections, etc.
736 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
737 as not present.
738 """
sousaedu80135b92021-02-17 15:05:18 +0100739 self.logger.debug(
740 "Adding a new network to VIM name '%s', type '%s'", net_name, net_type
741 )
garciadeblasebd66722019-01-31 16:01:31 +0000742 # self.logger.debug(">>>>>>>>>>>>>>>>>> IP profile %s", str(ip_profile))
kbsuba85c54d2019-10-17 16:30:32 +0000743
tierno7edb6752016-03-21 17:37:52 +0100744 try:
kbsuba85c54d2019-10-17 16:30:32 +0000745 vlan = None
sousaedu80135b92021-02-17 15:05:18 +0100746
kbsuba85c54d2019-10-17 16:30:32 +0000747 if provider_network_profile:
748 vlan = provider_network_profile.get("segmentation-id")
sousaedu80135b92021-02-17 15:05:18 +0100749
garciadeblasedca7b32016-09-29 14:01:52 +0000750 new_net = None
garciadeblasebd66722019-01-31 16:01:31 +0000751 created_items = {}
tierno7edb6752016-03-21 17:37:52 +0100752 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100753 network_dict = {"name": net_name, "admin_state_up": True}
754
tierno6869ae72020-01-09 17:37:34 +0000755 if net_type in ("data", "ptp"):
756 provider_physical_network = None
sousaedu80135b92021-02-17 15:05:18 +0100757
758 if provider_network_profile and provider_network_profile.get(
759 "physical-network"
760 ):
761 provider_physical_network = provider_network_profile.get(
762 "physical-network"
763 )
764
tierno6869ae72020-01-09 17:37:34 +0000765 # provider-network must be one of the dataplane_physcial_netowrk if this is a list. If it is string
766 # or not declared, just ignore the checking
sousaedu80135b92021-02-17 15:05:18 +0100767 if (
768 isinstance(
769 self.config.get("dataplane_physical_net"), (tuple, list)
770 )
771 and provider_physical_network
772 not in self.config["dataplane_physical_net"]
773 ):
tierno72774862020-05-04 11:44:15 +0000774 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100775 "Invalid parameter 'provider-network:physical-network' "
776 "for network creation. '{}' is not one of the declared "
777 "list at VIM_config:dataplane_physical_net".format(
778 provider_physical_network
779 )
780 )
781
782 # use the default dataplane_physical_net
783 if not provider_physical_network:
784 provider_physical_network = self.config.get(
785 "dataplane_physical_net"
786 )
787
tierno6869ae72020-01-09 17:37:34 +0000788 # if it is non empty list, use the first value. If it is a string use the value directly
sousaedu80135b92021-02-17 15:05:18 +0100789 if (
790 isinstance(provider_physical_network, (tuple, list))
791 and provider_physical_network
792 ):
tierno6869ae72020-01-09 17:37:34 +0000793 provider_physical_network = provider_physical_network[0]
794
795 if not provider_physical_network:
tierno5ad826a2020-08-11 11:19:44 +0000796 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100797 "missing information needed for underlay networks. Provide "
798 "'dataplane_physical_net' configuration at VIM or use the NS "
799 "instantiation parameter 'provider-network.physical-network'"
800 " for the VLD"
801 )
tierno6869ae72020-01-09 17:37:34 +0000802
sousaedu80135b92021-02-17 15:05:18 +0100803 if not self.config.get("multisegment_support"):
804 network_dict[
805 "provider:physical_network"
806 ] = provider_physical_network
807
808 if (
809 provider_network_profile
810 and "network-type" in provider_network_profile
811 ):
812 network_dict[
813 "provider:network_type"
814 ] = provider_network_profile["network-type"]
garciadeblas4af0d542020-02-18 16:01:13 +0100815 else:
sousaedu80135b92021-02-17 15:05:18 +0100816 network_dict["provider:network_type"] = self.config.get(
817 "dataplane_network_type", "vlan"
818 )
819
tierno6869ae72020-01-09 17:37:34 +0000820 if vlan:
821 network_dict["provider:segmentation_id"] = vlan
garciadeblasebd66722019-01-31 16:01:31 +0000822 else:
tierno6869ae72020-01-09 17:37:34 +0000823 # Multi-segment case
garciadeblasebd66722019-01-31 16:01:31 +0000824 segment_list = []
tierno6869ae72020-01-09 17:37:34 +0000825 segment1_dict = {
sousaedu80135b92021-02-17 15:05:18 +0100826 "provider:physical_network": "",
827 "provider:network_type": "vxlan",
tierno6869ae72020-01-09 17:37:34 +0000828 }
garciadeblasebd66722019-01-31 16:01:31 +0000829 segment_list.append(segment1_dict)
tierno6869ae72020-01-09 17:37:34 +0000830 segment2_dict = {
831 "provider:physical_network": provider_physical_network,
sousaedu80135b92021-02-17 15:05:18 +0100832 "provider:network_type": "vlan",
tierno6869ae72020-01-09 17:37:34 +0000833 }
sousaedu80135b92021-02-17 15:05:18 +0100834
tierno6869ae72020-01-09 17:37:34 +0000835 if vlan:
836 segment2_dict["provider:segmentation_id"] = vlan
sousaedu80135b92021-02-17 15:05:18 +0100837 elif self.config.get("multisegment_vlan_range"):
garciadeblasebd66722019-01-31 16:01:31 +0000838 vlanID = self._generate_multisegment_vlanID()
839 segment2_dict["provider:segmentation_id"] = vlanID
sousaedu80135b92021-02-17 15:05:18 +0100840
garciadeblasebd66722019-01-31 16:01:31 +0000841 # else
tierno72774862020-05-04 11:44:15 +0000842 # raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100843 # "You must provide "multisegment_vlan_range" at config dict before creating a multisegment
tierno1ec592d2020-06-16 15:29:47 +0000844 # network")
garciadeblasebd66722019-01-31 16:01:31 +0000845 segment_list.append(segment2_dict)
846 network_dict["segments"] = segment_list
kate721d79b2017-06-24 04:21:38 -0700847
tierno6869ae72020-01-09 17:37:34 +0000848 # VIO Specific Changes. It needs a concrete VLAN
849 if self.vim_type == "VIO" and vlan is None:
sousaedu80135b92021-02-17 15:05:18 +0100850 if self.config.get("dataplane_net_vlan_range") is None:
tierno72774862020-05-04 11:44:15 +0000851 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100852 "You must provide 'dataplane_net_vlan_range' in format "
853 "[start_ID - end_ID] at VIM_config for creating underlay "
854 "networks"
855 )
856
tierno6869ae72020-01-09 17:37:34 +0000857 network_dict["provider:segmentation_id"] = self._generate_vlanID()
kate721d79b2017-06-24 04:21:38 -0700858
garciadeblasebd66722019-01-31 16:01:31 +0000859 network_dict["shared"] = shared
sousaedu80135b92021-02-17 15:05:18 +0100860
anwarsff168192019-05-06 11:23:07 +0530861 if self.config.get("disable_network_port_security"):
862 network_dict["port_security_enabled"] = False
sousaedu80135b92021-02-17 15:05:18 +0100863
sousaedu2aa5f802021-06-17 15:39:29 +0100864 if self.config.get("neutron_availability_zone_hints"):
865 hints = self.config.get("neutron_availability_zone_hints")
866
867 if isinstance(hints, str):
868 hints = [hints]
869
870 network_dict["availability_zone_hints"] = hints
871
sousaedu80135b92021-02-17 15:05:18 +0100872 new_net = self.neutron.create_network({"network": network_dict})
garciadeblasebd66722019-01-31 16:01:31 +0000873 # print new_net
874 # create subnetwork, even if there is no profile
sousaedu80135b92021-02-17 15:05:18 +0100875
garciadeblas9f8456e2016-09-05 05:02:59 +0200876 if not ip_profile:
877 ip_profile = {}
sousaedu80135b92021-02-17 15:05:18 +0100878
879 if not ip_profile.get("subnet_address"):
tierno1ec592d2020-06-16 15:29:47 +0000880 # Fake subnet is required
garciadeblas2299e3b2017-01-26 14:35:55 +0000881 subnet_rand = random.randint(0, 255)
sousaedu80135b92021-02-17 15:05:18 +0100882 ip_profile["subnet_address"] = "192.168.{}.0/24".format(subnet_rand)
883
884 if "ip_version" not in ip_profile:
885 ip_profile["ip_version"] = "IPv4"
886
887 subnet = {
888 "name": net_name + "-subnet",
889 "network_id": new_net["network"]["id"],
890 "ip_version": 4 if ip_profile["ip_version"] == "IPv4" else 6,
891 "cidr": ip_profile["subnet_address"],
892 }
893
tiernoa1fb4462017-06-30 12:25:50 +0200894 # Gateway should be set to None if not needed. Otherwise openstack assigns one by default
sousaedu80135b92021-02-17 15:05:18 +0100895 if ip_profile.get("gateway_address"):
896 subnet["gateway_ip"] = ip_profile["gateway_address"]
tierno55d234c2018-07-04 18:29:21 +0200897 else:
sousaedu80135b92021-02-17 15:05:18 +0100898 subnet["gateway_ip"] = None
899
900 if ip_profile.get("dns_address"):
901 subnet["dns_nameservers"] = ip_profile["dns_address"].split(";")
902
903 if "dhcp_enabled" in ip_profile:
904 subnet["enable_dhcp"] = (
905 False
906 if ip_profile["dhcp_enabled"] == "false"
907 or ip_profile["dhcp_enabled"] is False
908 else True
909 )
910
911 if ip_profile.get("dhcp_start_address"):
912 subnet["allocation_pools"] = []
913 subnet["allocation_pools"].append(dict())
914 subnet["allocation_pools"][0]["start"] = ip_profile[
915 "dhcp_start_address"
916 ]
917
918 if ip_profile.get("dhcp_count"):
919 # parts = ip_profile["dhcp_start_address"].split(".")
tierno1ec592d2020-06-16 15:29:47 +0000920 # ip_int = (int(parts[0]) << 24) + (int(parts[1]) << 16) + (int(parts[2]) << 8) + int(parts[3])
sousaedu80135b92021-02-17 15:05:18 +0100921 ip_int = int(netaddr.IPAddress(ip_profile["dhcp_start_address"]))
922 ip_int += ip_profile["dhcp_count"] - 1
garciadeblas9f8456e2016-09-05 05:02:59 +0200923 ip_str = str(netaddr.IPAddress(ip_int))
sousaedu80135b92021-02-17 15:05:18 +0100924 subnet["allocation_pools"][0]["end"] = ip_str
925
tierno1ec592d2020-06-16 15:29:47 +0000926 # self.logger.debug(">>>>>>>>>>>>>>>>>> Subnet: %s", str(subnet))
927 self.neutron.create_subnet({"subnet": subnet})
garciadeblasebd66722019-01-31 16:01:31 +0000928
sousaedu80135b92021-02-17 15:05:18 +0100929 if net_type == "data" and self.config.get("multisegment_support"):
930 if self.config.get("l2gw_support"):
garciadeblasebd66722019-01-31 16:01:31 +0000931 l2gw_list = self.neutron.list_l2_gateways().get("l2_gateways", ())
932 for l2gw in l2gw_list:
tierno1ec592d2020-06-16 15:29:47 +0000933 l2gw_conn = {
934 "l2_gateway_id": l2gw["id"],
935 "network_id": new_net["network"]["id"],
936 "segmentation_id": str(vlanID),
937 }
sousaedu80135b92021-02-17 15:05:18 +0100938 new_l2gw_conn = self.neutron.create_l2_gateway_connection(
939 {"l2_gateway_connection": l2gw_conn}
940 )
941 created_items[
942 "l2gwconn:"
943 + str(new_l2gw_conn["l2_gateway_connection"]["id"])
944 ] = True
945
garciadeblasebd66722019-01-31 16:01:31 +0000946 return new_net["network"]["id"], created_items
tierno41a69812018-02-16 14:34:33 +0100947 except Exception as e:
tierno1ec592d2020-06-16 15:29:47 +0000948 # delete l2gw connections (if any) before deleting the network
garciadeblasebd66722019-01-31 16:01:31 +0000949 for k, v in created_items.items():
950 if not v: # skip already deleted
951 continue
sousaedu80135b92021-02-17 15:05:18 +0100952
garciadeblasebd66722019-01-31 16:01:31 +0000953 try:
954 k_item, _, k_id = k.partition(":")
sousaedu80135b92021-02-17 15:05:18 +0100955
garciadeblasebd66722019-01-31 16:01:31 +0000956 if k_item == "l2gwconn":
957 self.neutron.delete_l2_gateway_connection(k_id)
958 except Exception as e2:
sousaedu80135b92021-02-17 15:05:18 +0100959 self.logger.error(
960 "Error deleting l2 gateway connection: {}: {}".format(
961 type(e2).__name__, e2
962 )
963 )
964
garciadeblasedca7b32016-09-29 14:01:52 +0000965 if new_net:
sousaedu80135b92021-02-17 15:05:18 +0100966 self.neutron.delete_network(new_net["network"]["id"])
967
tiernoae4a8d12016-07-08 12:30:39 +0200968 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +0100969
970 def get_network_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +0000971 """Obtain tenant networks of VIM
tierno7edb6752016-03-21 17:37:52 +0100972 Filter_dict can be:
973 name: network name
974 id: network uuid
975 shared: boolean
976 tenant_id: tenant
977 admin_state_up: boolean
978 status: 'ACTIVE'
979 Returns the network list of dictionaries
tierno1ec592d2020-06-16 15:29:47 +0000980 """
tiernoae4a8d12016-07-08 12:30:39 +0200981 self.logger.debug("Getting network from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +0100982
tierno7edb6752016-03-21 17:37:52 +0100983 try:
984 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +0100985 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +0100986
tierno69b590e2018-03-13 18:52:23 +0100987 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +0100988 # TODO check
989 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
990
tierno69b590e2018-03-13 18:52:23 +0100991 net_dict = self.neutron.list_networks(**filter_dict_os)
tierno00e3df72017-11-29 17:20:13 +0100992 net_list = net_dict["networks"]
tierno7edb6752016-03-21 17:37:52 +0100993 self.__net_os2mano(net_list)
sousaedu80135b92021-02-17 15:05:18 +0100994
tiernoae4a8d12016-07-08 12:30:39 +0200995 return net_list
sousaedu80135b92021-02-17 15:05:18 +0100996 except (
997 neExceptions.ConnectionFailed,
998 ksExceptions.ClientException,
999 neExceptions.NeutronException,
1000 ConnectionError,
1001 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001002 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001003
tiernoae4a8d12016-07-08 12:30:39 +02001004 def get_network(self, net_id):
tierno1ec592d2020-06-16 15:29:47 +00001005 """Obtain details of network from VIM
1006 Returns the network information from a network id"""
tiernoae4a8d12016-07-08 12:30:39 +02001007 self.logger.debug(" Getting tenant network %s from VIM", net_id)
tierno1ec592d2020-06-16 15:29:47 +00001008 filter_dict = {"id": net_id}
tiernoae4a8d12016-07-08 12:30:39 +02001009 net_list = self.get_network_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01001010
tierno1ec592d2020-06-16 15:29:47 +00001011 if len(net_list) == 0:
sousaedu80135b92021-02-17 15:05:18 +01001012 raise vimconn.VimConnNotFoundException(
1013 "Network '{}' not found".format(net_id)
1014 )
tierno1ec592d2020-06-16 15:29:47 +00001015 elif len(net_list) > 1:
sousaedu80135b92021-02-17 15:05:18 +01001016 raise vimconn.VimConnConflictException(
1017 "Found more than one network with this criteria"
1018 )
1019
tierno7edb6752016-03-21 17:37:52 +01001020 net = net_list[0]
tierno1ec592d2020-06-16 15:29:47 +00001021 subnets = []
1022 for subnet_id in net.get("subnets", ()):
tierno7edb6752016-03-21 17:37:52 +01001023 try:
1024 subnet = self.neutron.show_subnet(subnet_id)
1025 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01001026 self.logger.error(
1027 "osconnector.get_network(): Error getting subnet %s %s"
1028 % (net_id, str(e))
1029 )
tiernoae4a8d12016-07-08 12:30:39 +02001030 subnet = {"id": subnet_id, "fault": str(e)}
sousaedu80135b92021-02-17 15:05:18 +01001031
tierno7edb6752016-03-21 17:37:52 +01001032 subnets.append(subnet)
sousaedu80135b92021-02-17 15:05:18 +01001033
tierno7edb6752016-03-21 17:37:52 +01001034 net["subnets"] = subnets
sousaedu80135b92021-02-17 15:05:18 +01001035 net["encapsulation"] = net.get("provider:network_type")
1036 net["encapsulation_type"] = net.get("provider:network_type")
1037 net["segmentation_id"] = net.get("provider:segmentation_id")
1038 net["encapsulation_id"] = net.get("provider:segmentation_id")
1039
tiernoae4a8d12016-07-08 12:30:39 +02001040 return net
tierno7edb6752016-03-21 17:37:52 +01001041
garciadeblasebd66722019-01-31 16:01:31 +00001042 def delete_network(self, net_id, created_items=None):
1043 """
1044 Removes a tenant network from VIM and its associated elements
1045 :param net_id: VIM identifier of the network, provided by method new_network
1046 :param created_items: dictionary with extra items to be deleted. provided by method new_network
1047 Returns the network identifier or raises an exception upon error or when network is not found
1048 """
tiernoae4a8d12016-07-08 12:30:39 +02001049 self.logger.debug("Deleting network '%s' from VIM", net_id)
sousaedu80135b92021-02-17 15:05:18 +01001050
tierno1ec592d2020-06-16 15:29:47 +00001051 if created_items is None:
garciadeblasebd66722019-01-31 16:01:31 +00001052 created_items = {}
sousaedu80135b92021-02-17 15:05:18 +01001053
tierno7edb6752016-03-21 17:37:52 +01001054 try:
1055 self._reload_connection()
tierno1ec592d2020-06-16 15:29:47 +00001056 # delete l2gw connections (if any) before deleting the network
garciadeblasebd66722019-01-31 16:01:31 +00001057 for k, v in created_items.items():
1058 if not v: # skip already deleted
1059 continue
sousaedu80135b92021-02-17 15:05:18 +01001060
garciadeblasebd66722019-01-31 16:01:31 +00001061 try:
1062 k_item, _, k_id = k.partition(":")
1063 if k_item == "l2gwconn":
1064 self.neutron.delete_l2_gateway_connection(k_id)
1065 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01001066 self.logger.error(
1067 "Error deleting l2 gateway connection: {}: {}".format(
1068 type(e).__name__, e
1069 )
1070 )
1071
tierno1ec592d2020-06-16 15:29:47 +00001072 # delete VM ports attached to this networks before the network
tierno7edb6752016-03-21 17:37:52 +01001073 ports = self.neutron.list_ports(network_id=net_id)
sousaedu80135b92021-02-17 15:05:18 +01001074 for p in ports["ports"]:
tierno7edb6752016-03-21 17:37:52 +01001075 try:
1076 self.neutron.delete_port(p["id"])
1077 except Exception as e:
tiernoae4a8d12016-07-08 12:30:39 +02001078 self.logger.error("Error deleting port %s: %s", p["id"], str(e))
sousaedu80135b92021-02-17 15:05:18 +01001079
tierno7edb6752016-03-21 17:37:52 +01001080 self.neutron.delete_network(net_id)
sousaedu80135b92021-02-17 15:05:18 +01001081
tiernoae4a8d12016-07-08 12:30:39 +02001082 return net_id
sousaedu80135b92021-02-17 15:05:18 +01001083 except (
1084 neExceptions.ConnectionFailed,
1085 neExceptions.NetworkNotFoundClient,
1086 neExceptions.NeutronException,
1087 ksExceptions.ClientException,
1088 neExceptions.NeutronException,
1089 ConnectionError,
1090 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001091 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001092
tiernoae4a8d12016-07-08 12:30:39 +02001093 def refresh_nets_status(self, net_list):
tierno1ec592d2020-06-16 15:29:47 +00001094 """Get the status of the networks
sousaedu80135b92021-02-17 15:05:18 +01001095 Params: the list of network identifiers
1096 Returns a dictionary with:
1097 net_id: #VIM id of this network
1098 status: #Mandatory. Text with one of:
1099 # DELETED (not found at vim)
1100 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
1101 # OTHER (Vim reported other status not understood)
1102 # ERROR (VIM indicates an ERROR status)
1103 # ACTIVE, INACTIVE, DOWN (admin down),
1104 # BUILD (on building process)
1105 #
1106 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
1107 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00001108 """
1109 net_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01001110
tiernoae4a8d12016-07-08 12:30:39 +02001111 for net_id in net_list:
1112 net = {}
sousaedu80135b92021-02-17 15:05:18 +01001113
tiernoae4a8d12016-07-08 12:30:39 +02001114 try:
1115 net_vim = self.get_network(net_id)
sousaedu80135b92021-02-17 15:05:18 +01001116
1117 if net_vim["status"] in netStatus2manoFormat:
1118 net["status"] = netStatus2manoFormat[net_vim["status"]]
tiernoae4a8d12016-07-08 12:30:39 +02001119 else:
1120 net["status"] = "OTHER"
sousaedu80135b92021-02-17 15:05:18 +01001121 net["error_msg"] = "VIM status reported " + net_vim["status"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001122
sousaedu80135b92021-02-17 15:05:18 +01001123 if net["status"] == "ACTIVE" and not net_vim["admin_state_up"]:
1124 net["status"] = "DOWN"
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01001125
sousaedu80135b92021-02-17 15:05:18 +01001126 net["vim_info"] = self.serialize(net_vim)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01001127
sousaedu80135b92021-02-17 15:05:18 +01001128 if net_vim.get("fault"): # TODO
1129 net["error_msg"] = str(net_vim["fault"])
tierno72774862020-05-04 11:44:15 +00001130 except vimconn.VimConnNotFoundException as e:
tiernoae4a8d12016-07-08 12:30:39 +02001131 self.logger.error("Exception getting net status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01001132 net["status"] = "DELETED"
1133 net["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00001134 except vimconn.VimConnException as e:
tiernoae4a8d12016-07-08 12:30:39 +02001135 self.logger.error("Exception getting net status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01001136 net["status"] = "VIM_ERROR"
1137 net["error_msg"] = str(e)
tiernoae4a8d12016-07-08 12:30:39 +02001138 net_dict[net_id] = net
1139 return net_dict
1140
1141 def get_flavor(self, flavor_id):
tierno1ec592d2020-06-16 15:29:47 +00001142 """Obtain flavor details from the VIM. Returns the flavor dict details"""
tiernoae4a8d12016-07-08 12:30:39 +02001143 self.logger.debug("Getting flavor '%s'", flavor_id)
sousaedu80135b92021-02-17 15:05:18 +01001144
tierno7edb6752016-03-21 17:37:52 +01001145 try:
1146 self._reload_connection()
1147 flavor = self.nova.flavors.find(id=flavor_id)
tierno1ec592d2020-06-16 15:29:47 +00001148 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
sousaedu80135b92021-02-17 15:05:18 +01001149
tiernoae4a8d12016-07-08 12:30:39 +02001150 return flavor.to_dict()
sousaedu80135b92021-02-17 15:05:18 +01001151 except (
1152 nvExceptions.NotFound,
1153 nvExceptions.ClientException,
1154 ksExceptions.ClientException,
1155 ConnectionError,
1156 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001157 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001158
tiernocf157a82017-01-30 14:07:06 +01001159 def get_flavor_id_from_data(self, flavor_dict):
1160 """Obtain flavor id that match the flavor description
sousaedu80135b92021-02-17 15:05:18 +01001161 Returns the flavor_id or raises a vimconnNotFoundException
1162 flavor_dict: contains the required ram, vcpus, disk
1163 If 'use_existing_flavors' is set to True at config, the closer flavor that provides same or more ram, vcpus
1164 and disk is returned. Otherwise a flavor with exactly same ram, vcpus and disk is returned or a
1165 vimconnNotFoundException is raised
tiernocf157a82017-01-30 14:07:06 +01001166 """
sousaedu80135b92021-02-17 15:05:18 +01001167 exact_match = False if self.config.get("use_existing_flavors") else True
1168
tiernocf157a82017-01-30 14:07:06 +01001169 try:
1170 self._reload_connection()
tiernoe26fc7a2017-05-30 14:43:03 +02001171 flavor_candidate_id = None
1172 flavor_candidate_data = (10000, 10000, 10000)
sousaedu80135b92021-02-17 15:05:18 +01001173 flavor_target = (
1174 flavor_dict["ram"],
1175 flavor_dict["vcpus"],
1176 flavor_dict["disk"],
sousaedu0e958862021-11-22 14:02:17 +00001177 flavor_dict.get("ephemeral", 0),
sousaedu61f8b372021-11-22 14:09:15 +00001178 flavor_dict.get("swap", 0),
sousaedu80135b92021-02-17 15:05:18 +01001179 )
tiernoe26fc7a2017-05-30 14:43:03 +02001180 # numa=None
anwarsae5f52c2019-04-22 10:35:27 +05301181 extended = flavor_dict.get("extended", {})
1182 if extended:
tierno1ec592d2020-06-16 15:29:47 +00001183 # TODO
sousaedu80135b92021-02-17 15:05:18 +01001184 raise vimconn.VimConnNotFoundException(
1185 "Flavor with EPA still not implemented"
1186 )
tiernocf157a82017-01-30 14:07:06 +01001187 # if len(numas) > 1:
tierno72774862020-05-04 11:44:15 +00001188 # raise vimconn.VimConnNotFoundException("Cannot find any flavor with more than one numa")
tiernocf157a82017-01-30 14:07:06 +01001189 # numa=numas[0]
1190 # numas = extended.get("numas")
1191 for flavor in self.nova.flavors.list():
1192 epa = flavor.get_keys()
sousaedu80135b92021-02-17 15:05:18 +01001193
tiernocf157a82017-01-30 14:07:06 +01001194 if epa:
1195 continue
tiernoe26fc7a2017-05-30 14:43:03 +02001196 # TODO
sousaedu80135b92021-02-17 15:05:18 +01001197
sousaedu0e958862021-11-22 14:02:17 +00001198 flavor_data = (
1199 flavor.ram,
1200 flavor.vcpus,
1201 flavor.disk,
1202 flavor.ephemeral,
preethika.p5dc3ca12022-01-20 07:24:18 +00001203 flavor.swap if isinstance(flavor.swap, int) else 0,
sousaedu0e958862021-11-22 14:02:17 +00001204 )
tiernoe26fc7a2017-05-30 14:43:03 +02001205 if flavor_data == flavor_target:
1206 return flavor.id
sousaedu80135b92021-02-17 15:05:18 +01001207 elif (
1208 not exact_match
1209 and flavor_target < flavor_data < flavor_candidate_data
1210 ):
tiernoe26fc7a2017-05-30 14:43:03 +02001211 flavor_candidate_id = flavor.id
1212 flavor_candidate_data = flavor_data
sousaedu80135b92021-02-17 15:05:18 +01001213
tiernoe26fc7a2017-05-30 14:43:03 +02001214 if not exact_match and flavor_candidate_id:
1215 return flavor_candidate_id
sousaedu80135b92021-02-17 15:05:18 +01001216
1217 raise vimconn.VimConnNotFoundException(
1218 "Cannot find any flavor matching '{}'".format(flavor_dict)
1219 )
1220 except (
1221 nvExceptions.NotFound,
1222 nvExceptions.ClientException,
1223 ksExceptions.ClientException,
1224 ConnectionError,
1225 ) as e:
tiernocf157a82017-01-30 14:07:06 +01001226 self._format_exception(e)
1227
anwarsae5f52c2019-04-22 10:35:27 +05301228 def process_resource_quota(self, quota, prefix, extra_specs):
1229 """
1230 :param prefix:
borsatti8a2dda32019-12-18 15:08:57 +00001231 :param extra_specs:
anwarsae5f52c2019-04-22 10:35:27 +05301232 :return:
1233 """
sousaedu80135b92021-02-17 15:05:18 +01001234 if "limit" in quota:
1235 extra_specs["quota:" + prefix + "_limit"] = quota["limit"]
1236
1237 if "reserve" in quota:
1238 extra_specs["quota:" + prefix + "_reservation"] = quota["reserve"]
1239
1240 if "shares" in quota:
anwarsae5f52c2019-04-22 10:35:27 +05301241 extra_specs["quota:" + prefix + "_shares_level"] = "custom"
sousaedu80135b92021-02-17 15:05:18 +01001242 extra_specs["quota:" + prefix + "_shares_share"] = quota["shares"]
anwarsae5f52c2019-04-22 10:35:27 +05301243
tiernoae4a8d12016-07-08 12:30:39 +02001244 def new_flavor(self, flavor_data, change_name_if_used=True):
tierno1ec592d2020-06-16 15:29:47 +00001245 """Adds a tenant flavor to openstack VIM
1246 if change_name_if_used is True, it will change name in case of conflict, because it is not supported name
1247 repetition
tierno7edb6752016-03-21 17:37:52 +01001248 Returns the flavor identifier
tierno1ec592d2020-06-16 15:29:47 +00001249 """
tiernoae4a8d12016-07-08 12:30:39 +02001250 self.logger.debug("Adding flavor '%s'", str(flavor_data))
tierno1ec592d2020-06-16 15:29:47 +00001251 retry = 0
1252 max_retries = 3
tierno7edb6752016-03-21 17:37:52 +01001253 name_suffix = 0
sousaedu80135b92021-02-17 15:05:18 +01001254
anwarsc76a3ee2018-10-04 14:05:32 +05301255 try:
sousaedu80135b92021-02-17 15:05:18 +01001256 name = flavor_data["name"]
tierno1ec592d2020-06-16 15:29:47 +00001257 while retry < max_retries:
1258 retry += 1
anwarsc76a3ee2018-10-04 14:05:32 +05301259 try:
1260 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01001261
anwarsc76a3ee2018-10-04 14:05:32 +05301262 if change_name_if_used:
tierno1ec592d2020-06-16 15:29:47 +00001263 # get used names
1264 fl_names = []
1265 fl = self.nova.flavors.list()
sousaedu80135b92021-02-17 15:05:18 +01001266
anwarsc76a3ee2018-10-04 14:05:32 +05301267 for f in fl:
1268 fl_names.append(f.name)
sousaedu80135b92021-02-17 15:05:18 +01001269
anwarsc76a3ee2018-10-04 14:05:32 +05301270 while name in fl_names:
1271 name_suffix += 1
sousaedu80135b92021-02-17 15:05:18 +01001272 name = flavor_data["name"] + "-" + str(name_suffix)
kate721d79b2017-06-24 04:21:38 -07001273
sousaedu80135b92021-02-17 15:05:18 +01001274 ram = flavor_data.get("ram", 64)
1275 vcpus = flavor_data.get("vcpus", 1)
tierno1ec592d2020-06-16 15:29:47 +00001276 extra_specs = {}
tierno7edb6752016-03-21 17:37:52 +01001277
anwarsc76a3ee2018-10-04 14:05:32 +05301278 extended = flavor_data.get("extended")
1279 if extended:
tierno1ec592d2020-06-16 15:29:47 +00001280 numas = extended.get("numas")
sousaedu80135b92021-02-17 15:05:18 +01001281
anwarsc76a3ee2018-10-04 14:05:32 +05301282 if numas:
1283 numa_nodes = len(numas)
sousaedu80135b92021-02-17 15:05:18 +01001284
anwarsc76a3ee2018-10-04 14:05:32 +05301285 if numa_nodes > 1:
1286 return -1, "Can not add flavor with more than one numa"
sousaedu80135b92021-02-17 15:05:18 +01001287
anwarsae5f52c2019-04-22 10:35:27 +05301288 extra_specs["hw:numa_nodes"] = str(numa_nodes)
1289 extra_specs["hw:mem_page_size"] = "large"
1290 extra_specs["hw:cpu_policy"] = "dedicated"
1291 extra_specs["hw:numa_mempolicy"] = "strict"
sousaedu80135b92021-02-17 15:05:18 +01001292
anwarsc76a3ee2018-10-04 14:05:32 +05301293 if self.vim_type == "VIO":
sousaedu80135b92021-02-17 15:05:18 +01001294 extra_specs[
1295 "vmware:extra_config"
1296 ] = '{"numa.nodeAffinity":"0"}'
anwarsae5f52c2019-04-22 10:35:27 +05301297 extra_specs["vmware:latency_sensitivity_level"] = "high"
sousaedu80135b92021-02-17 15:05:18 +01001298
anwarsc76a3ee2018-10-04 14:05:32 +05301299 for numa in numas:
tierno1ec592d2020-06-16 15:29:47 +00001300 # overwrite ram and vcpus
sousaedu80135b92021-02-17 15:05:18 +01001301 # check if key "memory" is present in numa else use ram value at flavor
1302 if "memory" in numa:
1303 ram = numa["memory"] * 1024
tierno1ec592d2020-06-16 15:29:47 +00001304 # See for reference: https://specs.openstack.org/openstack/nova-specs/specs/mitaka/
1305 # implemented/virt-driver-cpu-thread-pinning.html
garciadeblasfa35a722019-04-11 19:15:49 +02001306 extra_specs["hw:cpu_sockets"] = 1
sousaedu80135b92021-02-17 15:05:18 +01001307
1308 if "paired-threads" in numa:
1309 vcpus = numa["paired-threads"] * 2
1310 # cpu_thread_policy "require" implies that the compute node must have an
tierno1ec592d2020-06-16 15:29:47 +00001311 # STM architecture
anwarsae5f52c2019-04-22 10:35:27 +05301312 extra_specs["hw:cpu_thread_policy"] = "require"
1313 extra_specs["hw:cpu_policy"] = "dedicated"
sousaedu80135b92021-02-17 15:05:18 +01001314 elif "cores" in numa:
1315 vcpus = numa["cores"]
1316 # cpu_thread_policy "prefer" implies that the host must not have an SMT
tierno1ec592d2020-06-16 15:29:47 +00001317 # architecture, or a non-SMT architecture will be emulated
anwarsae5f52c2019-04-22 10:35:27 +05301318 extra_specs["hw:cpu_thread_policy"] = "isolate"
1319 extra_specs["hw:cpu_policy"] = "dedicated"
sousaedu80135b92021-02-17 15:05:18 +01001320 elif "threads" in numa:
1321 vcpus = numa["threads"]
tierno1ec592d2020-06-16 15:29:47 +00001322 # cpu_thread_policy "prefer" implies that the host may or may not have an SMT
1323 # architecture
anwarsae5f52c2019-04-22 10:35:27 +05301324 extra_specs["hw:cpu_thread_policy"] = "prefer"
1325 extra_specs["hw:cpu_policy"] = "dedicated"
anwarsc76a3ee2018-10-04 14:05:32 +05301326 # for interface in numa.get("interfaces",() ):
1327 # if interface["dedicated"]=="yes":
tierno1ec592d2020-06-16 15:29:47 +00001328 # raise vimconn.VimConnException("Passthrough interfaces are not supported
1329 # for the openstack connector", http_code=vimconn.HTTP_Service_Unavailable)
sousaedu80135b92021-02-17 15:05:18 +01001330 # #TODO, add the key 'pci_passthrough:alias"="<label at config>:<number ifaces>"'
tierno1ec592d2020-06-16 15:29:47 +00001331 # when a way to connect it is available
anwarsae5f52c2019-04-22 10:35:27 +05301332 elif extended.get("cpu-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001333 self.process_resource_quota(
1334 extended.get("cpu-quota"), "cpu", extra_specs
1335 )
1336
anwarsae5f52c2019-04-22 10:35:27 +05301337 if extended.get("mem-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001338 self.process_resource_quota(
1339 extended.get("mem-quota"), "memory", extra_specs
1340 )
1341
anwarsae5f52c2019-04-22 10:35:27 +05301342 if extended.get("vif-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001343 self.process_resource_quota(
1344 extended.get("vif-quota"), "vif", extra_specs
1345 )
1346
anwarsae5f52c2019-04-22 10:35:27 +05301347 if extended.get("disk-io-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001348 self.process_resource_quota(
1349 extended.get("disk-io-quota"), "disk_io", extra_specs
1350 )
1351
rodriguezgar1a0e2c82022-05-15 00:42:45 +02001352 # Set the mempage size as specified in the descriptor
1353 if extended.get("mempage-size"):
1354 if extended.get("mempage-size") == "LARGE":
1355 extra_specs["hw:mem_page_size"] = "large"
1356 elif extended.get("mempage-size") == "SMALL":
1357 extra_specs["hw:mem_page_size"] = "small"
1358 elif extended.get("mempage-size") == "SIZE_2MB":
1359 extra_specs["hw:mem_page_size"] = "2MB"
1360 elif extended.get("mempage-size") == "SIZE_1GB":
1361 extra_specs["hw:mem_page_size"] = "1GB"
1362 elif extended.get("mempage-size") == "PREFER_LARGE":
1363 extra_specs["hw:mem_page_size"] = "any"
1364 else:
1365 # The validations in NBI should make reaching here not possible.
1366 # If this message is shown, check validations
1367 self.logger.debug(
1368 "Invalid mempage-size %s. Will be ignored",
1369 extended.get("mempage-size"),
1370 )
1371
tierno1ec592d2020-06-16 15:29:47 +00001372 # create flavor
sousaedu80135b92021-02-17 15:05:18 +01001373 new_flavor = self.nova.flavors.create(
sousaedu0e958862021-11-22 14:02:17 +00001374 name=name,
1375 ram=ram,
1376 vcpus=vcpus,
1377 disk=flavor_data.get("disk", 0),
1378 ephemeral=flavor_data.get("ephemeral", 0),
sousaedu61f8b372021-11-22 14:09:15 +00001379 swap=flavor_data.get("swap", 0),
sousaedu80135b92021-02-17 15:05:18 +01001380 is_public=flavor_data.get("is_public", True),
1381 )
tierno1ec592d2020-06-16 15:29:47 +00001382 # add metadata
anwarsae5f52c2019-04-22 10:35:27 +05301383 if extra_specs:
1384 new_flavor.set_keys(extra_specs)
sousaedu80135b92021-02-17 15:05:18 +01001385
anwarsc76a3ee2018-10-04 14:05:32 +05301386 return new_flavor.id
1387 except nvExceptions.Conflict as e:
1388 if change_name_if_used and retry < max_retries:
1389 continue
sousaedu80135b92021-02-17 15:05:18 +01001390
anwarsc76a3ee2018-10-04 14:05:32 +05301391 self._format_exception(e)
tierno1ec592d2020-06-16 15:29:47 +00001392 # except nvExceptions.BadRequest as e:
sousaedu80135b92021-02-17 15:05:18 +01001393 except (
1394 ksExceptions.ClientException,
1395 nvExceptions.ClientException,
1396 ConnectionError,
1397 KeyError,
1398 ) as e:
anwarsc76a3ee2018-10-04 14:05:32 +05301399 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001400
tierno1ec592d2020-06-16 15:29:47 +00001401 def delete_flavor(self, flavor_id):
sousaedu80135b92021-02-17 15:05:18 +01001402 """Deletes a tenant flavor from openstack VIM. Returns the old flavor_id"""
tiernoae4a8d12016-07-08 12:30:39 +02001403 try:
1404 self._reload_connection()
1405 self.nova.flavors.delete(flavor_id)
sousaedu80135b92021-02-17 15:05:18 +01001406
tiernoae4a8d12016-07-08 12:30:39 +02001407 return flavor_id
tierno1ec592d2020-06-16 15:29:47 +00001408 # except nvExceptions.BadRequest as e:
sousaedu80135b92021-02-17 15:05:18 +01001409 except (
1410 nvExceptions.NotFound,
1411 ksExceptions.ClientException,
1412 nvExceptions.ClientException,
1413 ConnectionError,
1414 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001415 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001416
tierno1ec592d2020-06-16 15:29:47 +00001417 def new_image(self, image_dict):
1418 """
tiernoae4a8d12016-07-08 12:30:39 +02001419 Adds a tenant image to VIM. imge_dict is a dictionary with:
1420 name: name
1421 disk_format: qcow2, vhd, vmdk, raw (by default), ...
1422 location: path or URI
1423 public: "yes" or "no"
1424 metadata: metadata of the image
1425 Returns the image_id
tierno1ec592d2020-06-16 15:29:47 +00001426 """
1427 retry = 0
1428 max_retries = 3
sousaedu80135b92021-02-17 15:05:18 +01001429
tierno1ec592d2020-06-16 15:29:47 +00001430 while retry < max_retries:
1431 retry += 1
tierno7edb6752016-03-21 17:37:52 +01001432 try:
1433 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01001434
tierno1ec592d2020-06-16 15:29:47 +00001435 # determine format http://docs.openstack.org/developer/glance/formats.html
tierno7edb6752016-03-21 17:37:52 +01001436 if "disk_format" in image_dict:
tierno1ec592d2020-06-16 15:29:47 +00001437 disk_format = image_dict["disk_format"]
1438 else: # autodiscover based on extension
sousaedu80135b92021-02-17 15:05:18 +01001439 if image_dict["location"].endswith(".qcow2"):
tierno1ec592d2020-06-16 15:29:47 +00001440 disk_format = "qcow2"
sousaedu80135b92021-02-17 15:05:18 +01001441 elif image_dict["location"].endswith(".vhd"):
tierno1ec592d2020-06-16 15:29:47 +00001442 disk_format = "vhd"
sousaedu80135b92021-02-17 15:05:18 +01001443 elif image_dict["location"].endswith(".vmdk"):
tierno1ec592d2020-06-16 15:29:47 +00001444 disk_format = "vmdk"
sousaedu80135b92021-02-17 15:05:18 +01001445 elif image_dict["location"].endswith(".vdi"):
tierno1ec592d2020-06-16 15:29:47 +00001446 disk_format = "vdi"
sousaedu80135b92021-02-17 15:05:18 +01001447 elif image_dict["location"].endswith(".iso"):
tierno1ec592d2020-06-16 15:29:47 +00001448 disk_format = "iso"
sousaedu80135b92021-02-17 15:05:18 +01001449 elif image_dict["location"].endswith(".aki"):
tierno1ec592d2020-06-16 15:29:47 +00001450 disk_format = "aki"
sousaedu80135b92021-02-17 15:05:18 +01001451 elif image_dict["location"].endswith(".ari"):
tierno1ec592d2020-06-16 15:29:47 +00001452 disk_format = "ari"
sousaedu80135b92021-02-17 15:05:18 +01001453 elif image_dict["location"].endswith(".ami"):
tierno1ec592d2020-06-16 15:29:47 +00001454 disk_format = "ami"
tierno7edb6752016-03-21 17:37:52 +01001455 else:
tierno1ec592d2020-06-16 15:29:47 +00001456 disk_format = "raw"
sousaedu80135b92021-02-17 15:05:18 +01001457
1458 self.logger.debug(
1459 "new_image: '%s' loading from '%s'",
1460 image_dict["name"],
1461 image_dict["location"],
1462 )
shashankjain3c83a212018-10-04 13:05:46 +05301463 if self.vim_type == "VIO":
1464 container_format = "bare"
sousaedu80135b92021-02-17 15:05:18 +01001465 if "container_format" in image_dict:
1466 container_format = image_dict["container_format"]
1467
1468 new_image = self.glance.images.create(
1469 name=image_dict["name"],
1470 container_format=container_format,
1471 disk_format=disk_format,
1472 )
shashankjain3c83a212018-10-04 13:05:46 +05301473 else:
sousaedu80135b92021-02-17 15:05:18 +01001474 new_image = self.glance.images.create(name=image_dict["name"])
1475
1476 if image_dict["location"].startswith("http"):
tierno1beea862018-07-11 15:47:37 +02001477 # TODO there is not a method to direct download. It must be downloaded locally with requests
tierno72774862020-05-04 11:44:15 +00001478 raise vimconn.VimConnNotImplemented("Cannot create image from URL")
tierno1ec592d2020-06-16 15:29:47 +00001479 else: # local path
sousaedu80135b92021-02-17 15:05:18 +01001480 with open(image_dict["location"]) as fimage:
tierno1beea862018-07-11 15:47:37 +02001481 self.glance.images.upload(new_image.id, fimage)
sousaedu80135b92021-02-17 15:05:18 +01001482 # new_image = self.glancev1.images.create(name=image_dict["name"], is_public=
1483 # image_dict.get("public","yes")=="yes",
tierno1beea862018-07-11 15:47:37 +02001484 # container_format="bare", data=fimage, disk_format=disk_format)
sousaedu80135b92021-02-17 15:05:18 +01001485
1486 metadata_to_load = image_dict.get("metadata")
1487
1488 # TODO location is a reserved word for current openstack versions. fixed for VIO please check
tierno1ec592d2020-06-16 15:29:47 +00001489 # for openstack
shashankjain3c83a212018-10-04 13:05:46 +05301490 if self.vim_type == "VIO":
sousaedu80135b92021-02-17 15:05:18 +01001491 metadata_to_load["upload_location"] = image_dict["location"]
shashankjain3c83a212018-10-04 13:05:46 +05301492 else:
sousaedu80135b92021-02-17 15:05:18 +01001493 metadata_to_load["location"] = image_dict["location"]
1494
tierno1beea862018-07-11 15:47:37 +02001495 self.glance.images.update(new_image.id, **metadata_to_load)
sousaedu80135b92021-02-17 15:05:18 +01001496
tiernoae4a8d12016-07-08 12:30:39 +02001497 return new_image.id
sousaedu80135b92021-02-17 15:05:18 +01001498 except (
1499 nvExceptions.Conflict,
1500 ksExceptions.ClientException,
1501 nvExceptions.ClientException,
1502 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001503 self._format_exception(e)
sousaedu80135b92021-02-17 15:05:18 +01001504 except (
1505 HTTPException,
1506 gl1Exceptions.HTTPException,
1507 gl1Exceptions.CommunicationError,
1508 ConnectionError,
1509 ) as e:
tierno1ec592d2020-06-16 15:29:47 +00001510 if retry == max_retries:
tiernoae4a8d12016-07-08 12:30:39 +02001511 continue
sousaedu80135b92021-02-17 15:05:18 +01001512
tiernoae4a8d12016-07-08 12:30:39 +02001513 self._format_exception(e)
tierno1ec592d2020-06-16 15:29:47 +00001514 except IOError as e: # can not open the file
sousaedu80135b92021-02-17 15:05:18 +01001515 raise vimconn.VimConnConnectionException(
1516 "{}: {} for {}".format(type(e).__name__, e, image_dict["location"]),
1517 http_code=vimconn.HTTP_Bad_Request,
1518 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001519
tiernoae4a8d12016-07-08 12:30:39 +02001520 def delete_image(self, image_id):
sousaedu80135b92021-02-17 15:05:18 +01001521 """Deletes a tenant image from openstack VIM. Returns the old id"""
tiernoae4a8d12016-07-08 12:30:39 +02001522 try:
1523 self._reload_connection()
tierno1beea862018-07-11 15:47:37 +02001524 self.glance.images.delete(image_id)
sousaedu80135b92021-02-17 15:05:18 +01001525
tiernoae4a8d12016-07-08 12:30:39 +02001526 return image_id
sousaedu80135b92021-02-17 15:05:18 +01001527 except (
1528 nvExceptions.NotFound,
1529 ksExceptions.ClientException,
1530 nvExceptions.ClientException,
1531 gl1Exceptions.CommunicationError,
1532 gl1Exceptions.HTTPNotFound,
1533 ConnectionError,
1534 ) as e: # TODO remove
tiernoae4a8d12016-07-08 12:30:39 +02001535 self._format_exception(e)
1536
1537 def get_image_id_from_path(self, path):
tierno1ec592d2020-06-16 15:29:47 +00001538 """Get the image id from image path in the VIM database. Returns the image_id"""
tiernoae4a8d12016-07-08 12:30:39 +02001539 try:
1540 self._reload_connection()
tierno1beea862018-07-11 15:47:37 +02001541 images = self.glance.images.list()
sousaedu80135b92021-02-17 15:05:18 +01001542
tiernoae4a8d12016-07-08 12:30:39 +02001543 for image in images:
tierno1ec592d2020-06-16 15:29:47 +00001544 if image.metadata.get("location") == path:
tiernoae4a8d12016-07-08 12:30:39 +02001545 return image.id
sousaedu80135b92021-02-17 15:05:18 +01001546
1547 raise vimconn.VimConnNotFoundException(
1548 "image with location '{}' not found".format(path)
1549 )
1550 except (
1551 ksExceptions.ClientException,
1552 nvExceptions.ClientException,
1553 gl1Exceptions.CommunicationError,
1554 ConnectionError,
1555 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001556 self._format_exception(e)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001557
garciadeblasb69fa9f2016-09-28 12:04:10 +02001558 def get_image_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +00001559 """Obtain tenant images from VIM
garciadeblasb69fa9f2016-09-28 12:04:10 +02001560 Filter_dict can be:
1561 id: image id
1562 name: image name
1563 checksum: image checksum
1564 Returns the image list of dictionaries:
1565 [{<the fields at Filter_dict plus some VIM specific>}, ...]
1566 List can be empty
tierno1ec592d2020-06-16 15:29:47 +00001567 """
garciadeblasb69fa9f2016-09-28 12:04:10 +02001568 self.logger.debug("Getting image list from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +01001569
garciadeblasb69fa9f2016-09-28 12:04:10 +02001570 try:
1571 self._reload_connection()
tierno1ec592d2020-06-16 15:29:47 +00001572 # filter_dict_os = filter_dict.copy()
1573 # First we filter by the available filter fields: name, id. The others are removed.
tierno1beea862018-07-11 15:47:37 +02001574 image_list = self.glance.images.list()
garciadeblasb69fa9f2016-09-28 12:04:10 +02001575 filtered_list = []
sousaedu80135b92021-02-17 15:05:18 +01001576
garciadeblasb69fa9f2016-09-28 12:04:10 +02001577 for image in image_list:
tierno3cb8dc32017-10-24 18:13:19 +02001578 try:
tierno1beea862018-07-11 15:47:37 +02001579 if filter_dict.get("name") and image["name"] != filter_dict["name"]:
1580 continue
sousaedu80135b92021-02-17 15:05:18 +01001581
tierno1beea862018-07-11 15:47:37 +02001582 if filter_dict.get("id") and image["id"] != filter_dict["id"]:
1583 continue
sousaedu80135b92021-02-17 15:05:18 +01001584
1585 if (
1586 filter_dict.get("checksum")
1587 and image["checksum"] != filter_dict["checksum"]
1588 ):
tierno1beea862018-07-11 15:47:37 +02001589 continue
1590
1591 filtered_list.append(image.copy())
tierno3cb8dc32017-10-24 18:13:19 +02001592 except gl1Exceptions.HTTPNotFound:
1593 pass
sousaedu80135b92021-02-17 15:05:18 +01001594
garciadeblasb69fa9f2016-09-28 12:04:10 +02001595 return filtered_list
sousaedu80135b92021-02-17 15:05:18 +01001596 except (
1597 ksExceptions.ClientException,
1598 nvExceptions.ClientException,
1599 gl1Exceptions.CommunicationError,
1600 ConnectionError,
1601 ) as e:
garciadeblasb69fa9f2016-09-28 12:04:10 +02001602 self._format_exception(e)
1603
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001604 def __wait_for_vm(self, vm_id, status):
1605 """wait until vm is in the desired status and return True.
1606 If the VM gets in ERROR status, return false.
1607 If the timeout is reached generate an exception"""
1608 elapsed_time = 0
1609 while elapsed_time < server_timeout:
1610 vm_status = self.nova.servers.get(vm_id).status
sousaedu80135b92021-02-17 15:05:18 +01001611
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001612 if vm_status == status:
1613 return True
sousaedu80135b92021-02-17 15:05:18 +01001614
1615 if vm_status == "ERROR":
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001616 return False
sousaedu80135b92021-02-17 15:05:18 +01001617
tierno1df468d2018-07-06 14:25:16 +02001618 time.sleep(5)
1619 elapsed_time += 5
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001620
1621 # if we exceeded the timeout rollback
1622 if elapsed_time >= server_timeout:
sousaedu80135b92021-02-17 15:05:18 +01001623 raise vimconn.VimConnException(
1624 "Timeout waiting for instance " + vm_id + " to get " + status,
1625 http_code=vimconn.HTTP_Request_Timeout,
1626 )
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001627
mirabal29356312017-07-27 12:21:22 +02001628 def _get_openstack_availablity_zones(self):
1629 """
1630 Get from openstack availability zones available
1631 :return:
1632 """
1633 try:
1634 openstack_availability_zone = self.nova.availability_zones.list()
sousaedu80135b92021-02-17 15:05:18 +01001635 openstack_availability_zone = [
1636 str(zone.zoneName)
1637 for zone in openstack_availability_zone
1638 if zone.zoneName != "internal"
1639 ]
1640
mirabal29356312017-07-27 12:21:22 +02001641 return openstack_availability_zone
tierno1ec592d2020-06-16 15:29:47 +00001642 except Exception:
mirabal29356312017-07-27 12:21:22 +02001643 return None
1644
1645 def _set_availablity_zones(self):
1646 """
1647 Set vim availablity zone
1648 :return:
1649 """
sousaedu80135b92021-02-17 15:05:18 +01001650 if "availability_zone" in self.config:
1651 vim_availability_zones = self.config.get("availability_zone")
mirabal29356312017-07-27 12:21:22 +02001652
mirabal29356312017-07-27 12:21:22 +02001653 if isinstance(vim_availability_zones, str):
1654 self.availability_zone = [vim_availability_zones]
1655 elif isinstance(vim_availability_zones, list):
1656 self.availability_zone = vim_availability_zones
1657 else:
1658 self.availability_zone = self._get_openstack_availablity_zones()
1659
sousaedu80135b92021-02-17 15:05:18 +01001660 def _get_vm_availability_zone(
1661 self, availability_zone_index, availability_zone_list
1662 ):
mirabal29356312017-07-27 12:21:22 +02001663 """
tierno5a3273c2017-08-29 11:43:46 +02001664 Return thge availability zone to be used by the created VM.
1665 :return: The VIM availability zone to be used or None
mirabal29356312017-07-27 12:21:22 +02001666 """
tierno5a3273c2017-08-29 11:43:46 +02001667 if availability_zone_index is None:
sousaedu80135b92021-02-17 15:05:18 +01001668 if not self.config.get("availability_zone"):
tierno5a3273c2017-08-29 11:43:46 +02001669 return None
sousaedu80135b92021-02-17 15:05:18 +01001670 elif isinstance(self.config.get("availability_zone"), str):
1671 return self.config["availability_zone"]
tierno5a3273c2017-08-29 11:43:46 +02001672 else:
1673 # TODO consider using a different parameter at config for default AV and AV list match
sousaedu80135b92021-02-17 15:05:18 +01001674 return self.config["availability_zone"][0]
mirabal29356312017-07-27 12:21:22 +02001675
tierno5a3273c2017-08-29 11:43:46 +02001676 vim_availability_zones = self.availability_zone
1677 # check if VIM offer enough availability zones describe in the VNFD
sousaedu80135b92021-02-17 15:05:18 +01001678 if vim_availability_zones and len(availability_zone_list) <= len(
1679 vim_availability_zones
1680 ):
tierno5a3273c2017-08-29 11:43:46 +02001681 # check if all the names of NFV AV match VIM AV names
1682 match_by_index = False
1683 for av in availability_zone_list:
1684 if av not in vim_availability_zones:
1685 match_by_index = True
1686 break
sousaedu80135b92021-02-17 15:05:18 +01001687
tierno5a3273c2017-08-29 11:43:46 +02001688 if match_by_index:
1689 return vim_availability_zones[availability_zone_index]
1690 else:
1691 return availability_zone_list[availability_zone_index]
mirabal29356312017-07-27 12:21:22 +02001692 else:
sousaedu80135b92021-02-17 15:05:18 +01001693 raise vimconn.VimConnConflictException(
1694 "No enough availability zones at VIM for this deployment"
1695 )
mirabal29356312017-07-27 12:21:22 +02001696
sousaedu80135b92021-02-17 15:05:18 +01001697 def new_vminstance(
1698 self,
1699 name,
1700 description,
1701 start,
1702 image_id,
1703 flavor_id,
Alexis Romero73993212022-04-13 18:03:30 +02001704 affinity_group_list,
sousaedu80135b92021-02-17 15:05:18 +01001705 net_list,
1706 cloud_config=None,
1707 disk_list=None,
1708 availability_zone_index=None,
1709 availability_zone_list=None,
1710 ):
tierno98e909c2017-10-14 13:27:03 +02001711 """Adds a VM instance to VIM
tierno7edb6752016-03-21 17:37:52 +01001712 Params:
1713 start: indicates if VM must start or boot in pause mode. Ignored
Alexis Romero73993212022-04-13 18:03:30 +02001714 image_id,flavor_id: image and flavor uuid
1715 affinity_group_list: list of affinity groups, each one is a dictionary.
1716 Ignore if empty.
tierno7edb6752016-03-21 17:37:52 +01001717 net_list: list of interfaces, each one is a dictionary with:
1718 name:
1719 net_id: network uuid to connect
1720 vpci: virtual vcpi to assign, ignored because openstack lack #TODO
1721 model: interface model, ignored #TODO
1722 mac_address: used for SR-IOV ifaces #TODO for other types
1723 use: 'data', 'bridge', 'mgmt'
tierno66eba6e2017-11-10 17:09:18 +01001724 type: 'virtual', 'PCI-PASSTHROUGH'('PF'), 'SR-IOV'('VF'), 'VFnotShared'
tierno7edb6752016-03-21 17:37:52 +01001725 vim_id: filled/added by this function
ahmadsaf853d452016-12-22 11:33:47 +05001726 floating_ip: True/False (or it can be None)
tierno70eeb182020-10-19 16:38:00 +00001727 port_security: True/False
tierno41a69812018-02-16 14:34:33 +01001728 'cloud_config': (optional) dictionary with:
tierno1d213f42020-04-24 14:02:51 +00001729 'key-pairs': (optional) list of strings with the public key to be inserted to the default user
1730 'users': (optional) list of users to be inserted, each item is a dict with:
1731 'name': (mandatory) user name,
1732 'key-pairs': (optional) list of strings with the public key to be inserted to the user
1733 'user-data': (optional) string is a text script to be passed directly to cloud-init
1734 'config-files': (optional). List of files to be transferred. Each item is a dict with:
1735 'dest': (mandatory) string with the destination absolute path
1736 'encoding': (optional, by default text). Can be one of:
1737 'b64', 'base64', 'gz', 'gz+b64', 'gz+base64', 'gzip+b64', 'gzip+base64'
1738 'content' (mandatory): string with the content of the file
1739 'permissions': (optional) string with file permissions, typically octal notation '0644'
1740 'owner': (optional) file owner, string with the format 'owner:group'
1741 'boot-data-drive': boolean to indicate if user-data must be passed using a boot drive (hard disk)
mirabal29356312017-07-27 12:21:22 +02001742 'disk_list': (optional) list with additional disks to the VM. Each item is a dict with:
1743 'image_id': (optional). VIM id of an existing image. If not provided an empty disk must be mounted
1744 'size': (mandatory) string with the size of the disk in GB
tierno1df468d2018-07-06 14:25:16 +02001745 'vim_id' (optional) should use this existing volume id
tierno5a3273c2017-08-29 11:43:46 +02001746 availability_zone_index: Index of availability_zone_list to use for this this VM. None if not AV required
1747 availability_zone_list: list of availability zones given by user in the VNFD descriptor. Ignore if
1748 availability_zone_index is None
tierno7edb6752016-03-21 17:37:52 +01001749 #TODO ip, security groups
tierno98e909c2017-10-14 13:27:03 +02001750 Returns a tuple with the instance identifier and created_items or raises an exception on error
1751 created_items can be None or a dictionary where this method can include key-values that will be passed to
1752 the method delete_vminstance and action_vminstance. Can be used to store created ports, volumes, etc.
1753 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
1754 as not present.
1755 """
sousaedu80135b92021-02-17 15:05:18 +01001756 self.logger.debug(
1757 "new_vminstance input: image='%s' flavor='%s' nics='%s'",
1758 image_id,
1759 flavor_id,
1760 str(net_list),
1761 )
1762
tierno7edb6752016-03-21 17:37:52 +01001763 try:
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001764 server = None
tierno98e909c2017-10-14 13:27:03 +02001765 created_items = {}
tiernob0b9dab2017-10-14 14:25:20 +02001766 # metadata = {}
tierno98e909c2017-10-14 13:27:03 +02001767 net_list_vim = []
tierno1ec592d2020-06-16 15:29:47 +00001768 external_network = []
1769 # ^list of external networks to be connected to instance, later on used to create floating_ip
sousaedu80135b92021-02-17 15:05:18 +01001770 no_secured_ports = [] # List of port-is with port-security disabled
tierno7edb6752016-03-21 17:37:52 +01001771 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01001772 # metadata_vpci = {} # For a specific neutron plugin
tiernob84cbdc2017-07-07 14:30:30 +02001773 block_device_mapping = None
tiernoa05b65a2019-02-01 12:30:27 +00001774
tierno7edb6752016-03-21 17:37:52 +01001775 for net in net_list:
sousaedu80135b92021-02-17 15:05:18 +01001776 if not net.get("net_id"): # skip non connected iface
tierno7edb6752016-03-21 17:37:52 +01001777 continue
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001778
tiernoa05b65a2019-02-01 12:30:27 +00001779 port_dict = {
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001780 "network_id": net["net_id"],
1781 "name": net.get("name"),
sousaedu80135b92021-02-17 15:05:18 +01001782 "admin_state_up": True,
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001783 }
sousaedu80135b92021-02-17 15:05:18 +01001784
1785 if (
1786 self.config.get("security_groups")
1787 and net.get("port_security") is not False
1788 and not self.config.get("no_port_security_extension")
1789 ):
tiernoa05b65a2019-02-01 12:30:27 +00001790 if not self.security_groups_id:
1791 self._get_ids_from_name()
sousaedu80135b92021-02-17 15:05:18 +01001792
tiernoa05b65a2019-02-01 12:30:27 +00001793 port_dict["security_groups"] = self.security_groups_id
1794
tierno1ec592d2020-06-16 15:29:47 +00001795 if net["type"] == "virtual":
tiernob0b9dab2017-10-14 14:25:20 +02001796 pass
1797 # if "vpci" in net:
1798 # metadata_vpci[ net["net_id"] ] = [[ net["vpci"], "" ]]
tierno66eba6e2017-11-10 17:09:18 +01001799 elif net["type"] == "VF" or net["type"] == "SR-IOV": # for VF
tiernob0b9dab2017-10-14 14:25:20 +02001800 # if "vpci" in net:
1801 # if "VF" not in metadata_vpci:
1802 # metadata_vpci["VF"]=[]
1803 # metadata_vpci["VF"].append([ net["vpci"], "" ])
tierno1ec592d2020-06-16 15:29:47 +00001804 port_dict["binding:vnic_type"] = "direct"
sousaedu80135b92021-02-17 15:05:18 +01001805
tiernob0b9dab2017-10-14 14:25:20 +02001806 # VIO specific Changes
kate721d79b2017-06-24 04:21:38 -07001807 if self.vim_type == "VIO":
tiernob0b9dab2017-10-14 14:25:20 +02001808 # Need to create port with port_security_enabled = False and no-security-groups
tierno1ec592d2020-06-16 15:29:47 +00001809 port_dict["port_security_enabled"] = False
1810 port_dict["provider_security_groups"] = []
1811 port_dict["security_groups"] = []
sousaedu80135b92021-02-17 15:05:18 +01001812 else: # For PT PCI-PASSTHROUGH
tiernob0b9dab2017-10-14 14:25:20 +02001813 # if "vpci" in net:
1814 # if "PF" not in metadata_vpci:
1815 # metadata_vpci["PF"]=[]
1816 # metadata_vpci["PF"].append([ net["vpci"], "" ])
tierno1ec592d2020-06-16 15:29:47 +00001817 port_dict["binding:vnic_type"] = "direct-physical"
sousaedu80135b92021-02-17 15:05:18 +01001818
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001819 if not port_dict["name"]:
tierno1ec592d2020-06-16 15:29:47 +00001820 port_dict["name"] = name
sousaedu80135b92021-02-17 15:05:18 +01001821
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001822 if net.get("mac_address"):
tierno1ec592d2020-06-16 15:29:47 +00001823 port_dict["mac_address"] = net["mac_address"]
sousaedu80135b92021-02-17 15:05:18 +01001824
tierno41a69812018-02-16 14:34:33 +01001825 if net.get("ip_address"):
sousaedu80135b92021-02-17 15:05:18 +01001826 port_dict["fixed_ips"] = [{"ip_address": net["ip_address"]}]
1827 # TODO add "subnet_id": <subnet_id>
1828
tierno1ec592d2020-06-16 15:29:47 +00001829 new_port = self.neutron.create_port({"port": port_dict})
tierno00e3df72017-11-29 17:20:13 +01001830 created_items["port:" + str(new_port["port"]["id"])] = True
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001831 net["mac_adress"] = new_port["port"]["mac_address"]
1832 net["vim_id"] = new_port["port"]["id"]
tiernob84cbdc2017-07-07 14:30:30 +02001833 # if try to use a network without subnetwork, it will return a emtpy list
1834 fixed_ips = new_port["port"].get("fixed_ips")
sousaedu80135b92021-02-17 15:05:18 +01001835
tiernob84cbdc2017-07-07 14:30:30 +02001836 if fixed_ips:
1837 net["ip"] = fixed_ips[0].get("ip_address")
1838 else:
1839 net["ip"] = None
montesmoreno994a29d2017-08-22 11:23:06 +02001840
1841 port = {"port-id": new_port["port"]["id"]}
1842 if float(self.nova.api_version.get_string()) >= 2.32:
1843 port["tag"] = new_port["port"]["name"]
sousaedu80135b92021-02-17 15:05:18 +01001844
montesmoreno994a29d2017-08-22 11:23:06 +02001845 net_list_vim.append(port)
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001846
sousaedu80135b92021-02-17 15:05:18 +01001847 if net.get("floating_ip", False):
1848 net["exit_on_floating_ip_error"] = True
ahmadsaf853d452016-12-22 11:33:47 +05001849 external_network.append(net)
sousaedu80135b92021-02-17 15:05:18 +01001850 elif net["use"] == "mgmt" and self.config.get("use_floating_ip"):
1851 net["exit_on_floating_ip_error"] = False
tiernof8383b82017-01-18 15:49:48 +01001852 external_network.append(net)
sousaedu80135b92021-02-17 15:05:18 +01001853 net["floating_ip"] = self.config.get("use_floating_ip")
tiernof8383b82017-01-18 15:49:48 +01001854
tierno1ec592d2020-06-16 15:29:47 +00001855 # If port security is disabled when the port has not yet been attached to the VM, then all vm traffic
1856 # is dropped.
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001857 # As a workaround we wait until the VM is active and then disable the port-security
sousaedu80135b92021-02-17 15:05:18 +01001858 if net.get("port_security") is False and not self.config.get(
1859 "no_port_security_extension"
1860 ):
1861 no_secured_ports.append(
1862 (
1863 new_port["port"]["id"],
1864 net.get("port_security_disable_strategy"),
1865 )
1866 )
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001867
tiernob0b9dab2017-10-14 14:25:20 +02001868 # if metadata_vpci:
1869 # metadata = {"pci_assignement": json.dumps(metadata_vpci)}
1870 # if len(metadata["pci_assignement"]) >255:
1871 # #limit the metadata size
1872 # #metadata["pci_assignement"] = metadata["pci_assignement"][0:255]
1873 # self.logger.warn("Metadata deleted since it exceeds the expected length (255) ")
1874 # metadata = {}
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001875
sousaedu80135b92021-02-17 15:05:18 +01001876 self.logger.debug(
1877 "name '%s' image_id '%s'flavor_id '%s' net_list_vim '%s' description '%s'",
1878 name,
1879 image_id,
1880 flavor_id,
1881 str(net_list_vim),
1882 description,
1883 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001884
tierno98e909c2017-10-14 13:27:03 +02001885 # cloud config
tierno0a1437e2017-10-02 00:17:43 +02001886 config_drive, userdata = self._create_user_data(cloud_config)
montesmoreno0c8def02016-12-22 12:16:23 +00001887
Alexis Romeroc6439202022-05-12 13:23:25 +02001888 # get availability Zone
1889 vm_av_zone = self._get_vm_availability_zone(
1890 availability_zone_index, availability_zone_list
1891 )
1892
tierno98e909c2017-10-14 13:27:03 +02001893 # Create additional volumes in case these are present in disk_list
sousaedu80135b92021-02-17 15:05:18 +01001894 base_disk_index = ord("b")
aticig0bd5b302022-05-12 21:35:47 +03001895 boot_volume_id = None
tierno1df468d2018-07-06 14:25:16 +02001896 if disk_list:
tiernob84cbdc2017-07-07 14:30:30 +02001897 block_device_mapping = {}
montesmoreno0c8def02016-12-22 12:16:23 +00001898 for disk in disk_list:
sousaedu80135b92021-02-17 15:05:18 +01001899 if disk.get("vim_id"):
1900 block_device_mapping["_vd" + chr(base_disk_index)] = disk[
1901 "vim_id"
1902 ]
montesmoreno0c8def02016-12-22 12:16:23 +00001903 else:
sousaedu80135b92021-02-17 15:05:18 +01001904 if "image_id" in disk:
aticig0bd5b302022-05-12 21:35:47 +03001905 base_disk_index = ord("a")
sousaedu80135b92021-02-17 15:05:18 +01001906 volume = self.cinder.volumes.create(
1907 size=disk["size"],
1908 name=name + "_vd" + chr(base_disk_index),
1909 imageRef=disk["image_id"],
Alexis Romeroc6439202022-05-12 13:23:25 +02001910 # Make sure volume is in the same AZ as the VM to be attached to
1911 availability_zone=vm_av_zone,
sousaedu80135b92021-02-17 15:05:18 +01001912 )
aticig0bd5b302022-05-12 21:35:47 +03001913 boot_volume_id = volume.id
tierno1df468d2018-07-06 14:25:16 +02001914 else:
sousaedu80135b92021-02-17 15:05:18 +01001915 volume = self.cinder.volumes.create(
1916 size=disk["size"],
1917 name=name + "_vd" + chr(base_disk_index),
Alexis Romeroc6439202022-05-12 13:23:25 +02001918 # Make sure volume is in the same AZ as the VM to be attached to
1919 availability_zone=vm_av_zone,
sousaedu80135b92021-02-17 15:05:18 +01001920 )
1921
tierno1df468d2018-07-06 14:25:16 +02001922 created_items["volume:" + str(volume.id)] = True
sousaedu80135b92021-02-17 15:05:18 +01001923 block_device_mapping["_vd" + chr(base_disk_index)] = volume.id
1924
montesmoreno0c8def02016-12-22 12:16:23 +00001925 base_disk_index += 1
1926
tierno1df468d2018-07-06 14:25:16 +02001927 # Wait until created volumes are with status available
montesmoreno0c8def02016-12-22 12:16:23 +00001928 elapsed_time = 0
tierno1df468d2018-07-06 14:25:16 +02001929 while elapsed_time < volume_timeout:
1930 for created_item in created_items:
1931 v, _, volume_id = created_item.partition(":")
sousaedu80135b92021-02-17 15:05:18 +01001932 if v == "volume":
1933 if self.cinder.volumes.get(volume_id).status != "available":
tierno1df468d2018-07-06 14:25:16 +02001934 break
1935 else: # all ready: break from while
1936 break
sousaedu80135b92021-02-17 15:05:18 +01001937
tierno1df468d2018-07-06 14:25:16 +02001938 time.sleep(5)
1939 elapsed_time += 5
sousaedu80135b92021-02-17 15:05:18 +01001940
tiernob0b9dab2017-10-14 14:25:20 +02001941 # If we exceeded the timeout rollback
montesmoreno0c8def02016-12-22 12:16:23 +00001942 if elapsed_time >= volume_timeout:
sousaedu80135b92021-02-17 15:05:18 +01001943 raise vimconn.VimConnException(
1944 "Timeout creating volumes for instance " + name,
1945 http_code=vimconn.HTTP_Request_Timeout,
1946 )
aticig0bd5b302022-05-12 21:35:47 +03001947 if boot_volume_id:
1948 self.cinder.volumes.set_bootable(boot_volume_id, True)
sousaedu80135b92021-02-17 15:05:18 +01001949
Alexis Romero73993212022-04-13 18:03:30 +02001950 # Manage affinity groups/server groups
1951 server_group_id = None
1952 scheduller_hints = {}
1953
1954 if affinity_group_list:
1955 # Only first id on the list will be used. Openstack restriction
1956 server_group_id = affinity_group_list[0]["affinity_group_id"]
1957 scheduller_hints["group"] = server_group_id
1958
sousaedu80135b92021-02-17 15:05:18 +01001959 self.logger.debug(
1960 "nova.servers.create({}, {}, {}, nics={}, security_groups={}, "
1961 "availability_zone={}, key_name={}, userdata={}, config_drive={}, "
Alexis Romero73993212022-04-13 18:03:30 +02001962 "block_device_mapping={}, server_group={})".format(
sousaedu80135b92021-02-17 15:05:18 +01001963 name,
1964 image_id,
1965 flavor_id,
1966 net_list_vim,
1967 self.config.get("security_groups"),
1968 vm_av_zone,
1969 self.config.get("keypair"),
1970 userdata,
1971 config_drive,
1972 block_device_mapping,
Alexis Romero73993212022-04-13 18:03:30 +02001973 server_group_id,
sousaedu80135b92021-02-17 15:05:18 +01001974 )
1975 )
1976 server = self.nova.servers.create(
1977 name,
1978 image_id,
1979 flavor_id,
1980 nics=net_list_vim,
1981 security_groups=self.config.get("security_groups"),
1982 # TODO remove security_groups in future versions. Already at neutron port
1983 availability_zone=vm_av_zone,
1984 key_name=self.config.get("keypair"),
1985 userdata=userdata,
1986 config_drive=config_drive,
1987 block_device_mapping=block_device_mapping,
Alexis Romero73993212022-04-13 18:03:30 +02001988 scheduler_hints=scheduller_hints,
sousaedu80135b92021-02-17 15:05:18 +01001989 ) # , description=description)
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001990
tierno326fd5e2018-02-22 11:58:59 +01001991 vm_start_time = time.time()
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001992 # Previously mentioned workaround to wait until the VM is active and then disable the port-security
1993 if no_secured_ports:
sousaedu80135b92021-02-17 15:05:18 +01001994 self.__wait_for_vm(server.id, "ACTIVE")
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001995
bravof7a1f5252020-10-20 10:27:42 -03001996 for port in no_secured_ports:
1997 port_update = {
sousaedu80135b92021-02-17 15:05:18 +01001998 "port": {"port_security_enabled": False, "security_groups": None}
bravof7a1f5252020-10-20 10:27:42 -03001999 }
2000
2001 if port[1] == "allow-address-pairs":
2002 port_update = {
sousaedu80135b92021-02-17 15:05:18 +01002003 "port": {"allowed_address_pairs": [{"ip_address": "0.0.0.0/0"}]}
bravof7a1f5252020-10-20 10:27:42 -03002004 }
2005
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002006 try:
bravof7a1f5252020-10-20 10:27:42 -03002007 self.neutron.update_port(port[0], port_update)
tierno1ec592d2020-06-16 15:29:47 +00002008 except Exception:
bravof7a1f5252020-10-20 10:27:42 -03002009 raise vimconn.VimConnException(
sousaedu80135b92021-02-17 15:05:18 +01002010 "It was not possible to disable port security for port {}".format(
2011 port[0]
2012 )
bravof7a1f5252020-10-20 10:27:42 -03002013 )
2014
tierno98e909c2017-10-14 13:27:03 +02002015 # print "DONE :-)", server
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002016
tierno4d1ce222018-04-06 10:41:06 +02002017 # pool_id = None
ahmadsaf853d452016-12-22 11:33:47 +05002018 for floating_network in external_network:
tiernof8383b82017-01-18 15:49:48 +01002019 try:
tiernof8383b82017-01-18 15:49:48 +01002020 assigned = False
tiernocb66c7e2020-07-22 10:42:58 +00002021 floating_ip_retries = 3
2022 # In case of RO in HA there can be conflicts, two RO trying to assign same floating IP, so retry
2023 # several times
tierno98e909c2017-10-14 13:27:03 +02002024 while not assigned:
sousaedu80135b92021-02-17 15:05:18 +01002025 floating_ips = self.neutron.list_floatingips().get(
2026 "floatingips", ()
2027 )
2028 random.shuffle(floating_ips) # randomize
tiernocb66c7e2020-07-22 10:42:58 +00002029 for fip in floating_ips:
sousaedu80135b92021-02-17 15:05:18 +01002030 if (
2031 fip.get("port_id")
2032 or fip.get("tenant_id") != server.tenant_id
2033 ):
tierno326fd5e2018-02-22 11:58:59 +01002034 continue
sousaedu80135b92021-02-17 15:05:18 +01002035
2036 if isinstance(floating_network["floating_ip"], str):
2037 if (
2038 fip.get("floating_network_id")
2039 != floating_network["floating_ip"]
2040 ):
tierno326fd5e2018-02-22 11:58:59 +01002041 continue
sousaedu80135b92021-02-17 15:05:18 +01002042
tiernocb66c7e2020-07-22 10:42:58 +00002043 free_floating_ip = fip["id"]
2044 break
tiernof8383b82017-01-18 15:49:48 +01002045 else:
sousaedu80135b92021-02-17 15:05:18 +01002046 if (
2047 isinstance(floating_network["floating_ip"], str)
2048 and floating_network["floating_ip"].lower() != "true"
2049 ):
2050 pool_id = floating_network["floating_ip"]
tierno326fd5e2018-02-22 11:58:59 +01002051 else:
tierno4d1ce222018-04-06 10:41:06 +02002052 # Find the external network
tierno326fd5e2018-02-22 11:58:59 +01002053 external_nets = list()
sousaedu80135b92021-02-17 15:05:18 +01002054
2055 for net in self.neutron.list_networks()["networks"]:
2056 if net["router:external"]:
tierno1ec592d2020-06-16 15:29:47 +00002057 external_nets.append(net)
tiernof8383b82017-01-18 15:49:48 +01002058
tierno326fd5e2018-02-22 11:58:59 +01002059 if len(external_nets) == 0:
tierno1ec592d2020-06-16 15:29:47 +00002060 raise vimconn.VimConnException(
sousaedu80135b92021-02-17 15:05:18 +01002061 "Cannot create floating_ip automatically since "
2062 "no external network is present",
2063 http_code=vimconn.HTTP_Conflict,
2064 )
2065
tierno326fd5e2018-02-22 11:58:59 +01002066 if len(external_nets) > 1:
tierno1ec592d2020-06-16 15:29:47 +00002067 raise vimconn.VimConnException(
sousaedu80135b92021-02-17 15:05:18 +01002068 "Cannot create floating_ip automatically since "
2069 "multiple external networks are present",
2070 http_code=vimconn.HTTP_Conflict,
2071 )
tiernof8383b82017-01-18 15:49:48 +01002072
sousaedu80135b92021-02-17 15:05:18 +01002073 pool_id = external_nets[0].get("id")
2074
2075 param = {
2076 "floatingip": {
2077 "floating_network_id": pool_id,
2078 "tenant_id": server.tenant_id,
2079 }
2080 }
2081
ahmadsaf853d452016-12-22 11:33:47 +05002082 try:
tierno4d1ce222018-04-06 10:41:06 +02002083 # self.logger.debug("Creating floating IP")
tiernof8383b82017-01-18 15:49:48 +01002084 new_floating_ip = self.neutron.create_floatingip(param)
sousaedu80135b92021-02-17 15:05:18 +01002085 free_floating_ip = new_floating_ip["floatingip"]["id"]
2086 created_items[
2087 "floating_ip:" + str(free_floating_ip)
2088 ] = True
ahmadsaf853d452016-12-22 11:33:47 +05002089 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01002090 raise vimconn.VimConnException(
2091 type(e).__name__
2092 + ": Cannot create new floating_ip "
2093 + str(e),
2094 http_code=vimconn.HTTP_Conflict,
2095 )
tierno326fd5e2018-02-22 11:58:59 +01002096
tiernocb66c7e2020-07-22 10:42:58 +00002097 try:
2098 # for race condition ensure not already assigned
2099 fip = self.neutron.show_floatingip(free_floating_ip)
sousaedu80135b92021-02-17 15:05:18 +01002100
2101 if fip["floatingip"]["port_id"]:
tiernocb66c7e2020-07-22 10:42:58 +00002102 continue
sousaedu80135b92021-02-17 15:05:18 +01002103
tiernocb66c7e2020-07-22 10:42:58 +00002104 # the vim_id key contains the neutron.port_id
sousaedu80135b92021-02-17 15:05:18 +01002105 self.neutron.update_floatingip(
2106 free_floating_ip,
2107 {"floatingip": {"port_id": floating_network["vim_id"]}},
2108 )
tiernocb66c7e2020-07-22 10:42:58 +00002109 # for race condition ensure not re-assigned to other VM after 5 seconds
2110 time.sleep(5)
2111 fip = self.neutron.show_floatingip(free_floating_ip)
sousaedu80135b92021-02-17 15:05:18 +01002112
2113 if (
2114 fip["floatingip"]["port_id"]
2115 != floating_network["vim_id"]
2116 ):
2117 self.logger.error(
2118 "floating_ip {} re-assigned to other port".format(
2119 free_floating_ip
2120 )
2121 )
tiernocb66c7e2020-07-22 10:42:58 +00002122 continue
sousaedu80135b92021-02-17 15:05:18 +01002123
2124 self.logger.debug(
2125 "Assigned floating_ip {} to VM {}".format(
2126 free_floating_ip, server.id
2127 )
2128 )
tiernocb66c7e2020-07-22 10:42:58 +00002129 assigned = True
2130 except Exception as e:
2131 # openstack need some time after VM creation to assign an IP. So retry if fails
2132 vm_status = self.nova.servers.get(server.id).status
sousaedu80135b92021-02-17 15:05:18 +01002133
2134 if vm_status not in ("ACTIVE", "ERROR"):
tiernocb66c7e2020-07-22 10:42:58 +00002135 if time.time() - vm_start_time < server_timeout:
2136 time.sleep(5)
2137 continue
2138 elif floating_ip_retries > 0:
2139 floating_ip_retries -= 1
2140 continue
sousaedu80135b92021-02-17 15:05:18 +01002141
tiernocb66c7e2020-07-22 10:42:58 +00002142 raise vimconn.VimConnException(
sousaedu80135b92021-02-17 15:05:18 +01002143 "Cannot create floating_ip: {} {}".format(
2144 type(e).__name__, e
2145 ),
2146 http_code=vimconn.HTTP_Conflict,
2147 )
tierno326fd5e2018-02-22 11:58:59 +01002148
tiernof8383b82017-01-18 15:49:48 +01002149 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01002150 if not floating_network["exit_on_floating_ip_error"]:
tiernocb66c7e2020-07-22 10:42:58 +00002151 self.logger.error("Cannot create floating_ip. %s", str(e))
tiernof8383b82017-01-18 15:49:48 +01002152 continue
sousaedu80135b92021-02-17 15:05:18 +01002153
tiernof8383b82017-01-18 15:49:48 +01002154 raise
montesmoreno2a1fc4e2017-01-09 16:46:04 +00002155
tierno98e909c2017-10-14 13:27:03 +02002156 return server.id, created_items
tierno1ec592d2020-06-16 15:29:47 +00002157 # except nvExceptions.NotFound as e:
2158 # error_value=-vimconn.HTTP_Not_Found
2159 # error_text= "vm instance %s not found" % vm_id
2160 # except TypeError as e:
2161 # raise vimconn.VimConnException(type(e).__name__ + ": "+ str(e), http_code=vimconn.HTTP_Bad_Request)
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002162
2163 except Exception as e:
tierno98e909c2017-10-14 13:27:03 +02002164 server_id = None
2165 if server:
2166 server_id = server.id
sousaedu80135b92021-02-17 15:05:18 +01002167
tierno98e909c2017-10-14 13:27:03 +02002168 try:
2169 self.delete_vminstance(server_id, created_items)
2170 except Exception as e2:
2171 self.logger.error("new_vminstance rollback fail {}".format(e2))
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002172
tiernoae4a8d12016-07-08 12:30:39 +02002173 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01002174
tierno1ec592d2020-06-16 15:29:47 +00002175 def get_vminstance(self, vm_id):
2176 """Returns the VM instance information from VIM"""
2177 # self.logger.debug("Getting VM from VIM")
tierno7edb6752016-03-21 17:37:52 +01002178 try:
2179 self._reload_connection()
2180 server = self.nova.servers.find(id=vm_id)
tierno1ec592d2020-06-16 15:29:47 +00002181 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
sousaedu80135b92021-02-17 15:05:18 +01002182
tiernoae4a8d12016-07-08 12:30:39 +02002183 return server.to_dict()
sousaedu80135b92021-02-17 15:05:18 +01002184 except (
2185 ksExceptions.ClientException,
2186 nvExceptions.ClientException,
2187 nvExceptions.NotFound,
2188 ConnectionError,
2189 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002190 self._format_exception(e)
2191
tierno1ec592d2020-06-16 15:29:47 +00002192 def get_vminstance_console(self, vm_id, console_type="vnc"):
2193 """
tierno7edb6752016-03-21 17:37:52 +01002194 Get a console for the virtual machine
2195 Params:
2196 vm_id: uuid of the VM
2197 console_type, can be:
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002198 "novnc" (by default), "xvpvnc" for VNC types,
tierno7edb6752016-03-21 17:37:52 +01002199 "rdp-html5" for RDP types, "spice-html5" for SPICE types
tiernoae4a8d12016-07-08 12:30:39 +02002200 Returns dict with the console parameters:
2201 protocol: ssh, ftp, http, https, ...
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002202 server: usually ip address
2203 port: the http, ssh, ... port
2204 suffix: extra text, e.g. the http path and query string
tierno1ec592d2020-06-16 15:29:47 +00002205 """
tiernoae4a8d12016-07-08 12:30:39 +02002206 self.logger.debug("Getting VM CONSOLE from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002207
tierno7edb6752016-03-21 17:37:52 +01002208 try:
2209 self._reload_connection()
2210 server = self.nova.servers.find(id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002211
tierno1ec592d2020-06-16 15:29:47 +00002212 if console_type is None or console_type == "novnc":
tierno7edb6752016-03-21 17:37:52 +01002213 console_dict = server.get_vnc_console("novnc")
2214 elif console_type == "xvpvnc":
2215 console_dict = server.get_vnc_console(console_type)
2216 elif console_type == "rdp-html5":
2217 console_dict = server.get_rdp_console(console_type)
2218 elif console_type == "spice-html5":
2219 console_dict = server.get_spice_console(console_type)
2220 else:
sousaedu80135b92021-02-17 15:05:18 +01002221 raise vimconn.VimConnException(
2222 "console type '{}' not allowed".format(console_type),
2223 http_code=vimconn.HTTP_Bad_Request,
2224 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002225
tierno7edb6752016-03-21 17:37:52 +01002226 console_dict1 = console_dict.get("console")
sousaedu80135b92021-02-17 15:05:18 +01002227
tierno7edb6752016-03-21 17:37:52 +01002228 if console_dict1:
2229 console_url = console_dict1.get("url")
sousaedu80135b92021-02-17 15:05:18 +01002230
tierno7edb6752016-03-21 17:37:52 +01002231 if console_url:
tierno1ec592d2020-06-16 15:29:47 +00002232 # parse console_url
tierno7edb6752016-03-21 17:37:52 +01002233 protocol_index = console_url.find("//")
sousaedu80135b92021-02-17 15:05:18 +01002234 suffix_index = (
2235 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2236 )
2237 port_index = (
2238 console_url[protocol_index + 2 : suffix_index].find(":")
2239 + protocol_index
2240 + 2
2241 )
2242
tierno1ec592d2020-06-16 15:29:47 +00002243 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
sousaedu80135b92021-02-17 15:05:18 +01002244 return (
2245 -vimconn.HTTP_Internal_Server_Error,
2246 "Unexpected response from VIM",
2247 )
2248
2249 console_dict = {
2250 "protocol": console_url[0:protocol_index],
2251 "server": console_url[protocol_index + 2 : port_index],
2252 "port": console_url[port_index:suffix_index],
2253 "suffix": console_url[suffix_index + 1 :],
2254 }
tierno7edb6752016-03-21 17:37:52 +01002255 protocol_index += 2
sousaedu80135b92021-02-17 15:05:18 +01002256
tiernoae4a8d12016-07-08 12:30:39 +02002257 return console_dict
tierno72774862020-05-04 11:44:15 +00002258 raise vimconn.VimConnUnexpectedResponse("Unexpected response from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002259 except (
2260 nvExceptions.NotFound,
2261 ksExceptions.ClientException,
2262 nvExceptions.ClientException,
2263 nvExceptions.BadRequest,
2264 ConnectionError,
2265 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002266 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01002267
tierno98e909c2017-10-14 13:27:03 +02002268 def delete_vminstance(self, vm_id, created_items=None):
sousaedu80135b92021-02-17 15:05:18 +01002269 """Removes a VM instance from VIM. Returns the old identifier"""
tierno1ec592d2020-06-16 15:29:47 +00002270 # print "osconnector: Getting VM from VIM"
2271 if created_items is None:
tierno98e909c2017-10-14 13:27:03 +02002272 created_items = {}
sousaedu80135b92021-02-17 15:05:18 +01002273
tierno7edb6752016-03-21 17:37:52 +01002274 try:
2275 self._reload_connection()
tierno98e909c2017-10-14 13:27:03 +02002276 # delete VM ports attached to this networks before the virtual machine
2277 for k, v in created_items.items():
2278 if not v: # skip already deleted
2279 continue
sousaedu80135b92021-02-17 15:05:18 +01002280
tierno7edb6752016-03-21 17:37:52 +01002281 try:
tiernoad6bdd42018-01-10 10:43:46 +01002282 k_item, _, k_id = k.partition(":")
2283 if k_item == "port":
2284 self.neutron.delete_port(k_id)
tierno7edb6752016-03-21 17:37:52 +01002285 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01002286 self.logger.error(
2287 "Error deleting port: {}: {}".format(type(e).__name__, e)
2288 )
montesmoreno0c8def02016-12-22 12:16:23 +00002289
tierno98e909c2017-10-14 13:27:03 +02002290 # #commented because detaching the volumes makes the servers.delete not work properly ?!?
2291 # #dettach volumes attached
2292 # server = self.nova.servers.get(vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002293 # volumes_attached_dict = server._info["os-extended-volumes:volumes_attached"] #volume["id"]
tierno98e909c2017-10-14 13:27:03 +02002294 # #for volume in volumes_attached_dict:
sousaedu80135b92021-02-17 15:05:18 +01002295 # # self.cinder.volumes.detach(volume["id"])
montesmoreno0c8def02016-12-22 12:16:23 +00002296
tierno98e909c2017-10-14 13:27:03 +02002297 if vm_id:
2298 self.nova.servers.delete(vm_id)
montesmoreno0c8def02016-12-22 12:16:23 +00002299
tierno98e909c2017-10-14 13:27:03 +02002300 # delete volumes. Although having detached, they should have in active status before deleting
2301 # we ensure in this loop
montesmoreno0c8def02016-12-22 12:16:23 +00002302 keep_waiting = True
2303 elapsed_time = 0
sousaedu80135b92021-02-17 15:05:18 +01002304
montesmoreno0c8def02016-12-22 12:16:23 +00002305 while keep_waiting and elapsed_time < volume_timeout:
2306 keep_waiting = False
sousaedu80135b92021-02-17 15:05:18 +01002307
tierno98e909c2017-10-14 13:27:03 +02002308 for k, v in created_items.items():
2309 if not v: # skip already deleted
2310 continue
sousaedu80135b92021-02-17 15:05:18 +01002311
tierno98e909c2017-10-14 13:27:03 +02002312 try:
tiernoad6bdd42018-01-10 10:43:46 +01002313 k_item, _, k_id = k.partition(":")
2314 if k_item == "volume":
sousaedu80135b92021-02-17 15:05:18 +01002315 if self.cinder.volumes.get(k_id).status != "available":
tierno98e909c2017-10-14 13:27:03 +02002316 keep_waiting = True
2317 else:
tiernoad6bdd42018-01-10 10:43:46 +01002318 self.cinder.volumes.delete(k_id)
tiernocb66c7e2020-07-22 10:42:58 +00002319 created_items[k] = None
2320 elif k_item == "floating_ip": # floating ip
2321 self.neutron.delete_floatingip(k_id)
2322 created_items[k] = None
2323
tierno98e909c2017-10-14 13:27:03 +02002324 except Exception as e:
tiernocb66c7e2020-07-22 10:42:58 +00002325 self.logger.error("Error deleting {}: {}".format(k, e))
sousaedu80135b92021-02-17 15:05:18 +01002326
montesmoreno0c8def02016-12-22 12:16:23 +00002327 if keep_waiting:
2328 time.sleep(1)
2329 elapsed_time += 1
sousaedu80135b92021-02-17 15:05:18 +01002330
tierno98e909c2017-10-14 13:27:03 +02002331 return None
sousaedu80135b92021-02-17 15:05:18 +01002332 except (
2333 nvExceptions.NotFound,
2334 ksExceptions.ClientException,
2335 nvExceptions.ClientException,
2336 ConnectionError,
2337 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002338 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01002339
tiernoae4a8d12016-07-08 12:30:39 +02002340 def refresh_vms_status(self, vm_list):
tierno1ec592d2020-06-16 15:29:47 +00002341 """Get the status of the virtual machines and their interfaces/ports
sousaedu80135b92021-02-17 15:05:18 +01002342 Params: the list of VM identifiers
2343 Returns a dictionary with:
2344 vm_id: #VIM id of this Virtual Machine
2345 status: #Mandatory. Text with one of:
2346 # DELETED (not found at vim)
2347 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
2348 # OTHER (Vim reported other status not understood)
2349 # ERROR (VIM indicates an ERROR status)
2350 # ACTIVE, PAUSED, SUSPENDED, INACTIVE (not running),
2351 # CREATING (on building process), ERROR
2352 # ACTIVE:NoMgmtIP (Active but any of its interface has an IP address
2353 #
2354 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
2355 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2356 interfaces:
2357 - vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2358 mac_address: #Text format XX:XX:XX:XX:XX:XX
2359 vim_net_id: #network id where this interface is connected
2360 vim_interface_id: #interface/port VIM id
2361 ip_address: #null, or text with IPv4, IPv6 address
2362 compute_node: #identification of compute node where PF,VF interface is allocated
2363 pci: #PCI address of the NIC that hosts the PF,VF
2364 vlan: #physical VLAN used for VF
tierno1ec592d2020-06-16 15:29:47 +00002365 """
2366 vm_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01002367 self.logger.debug(
2368 "refresh_vms status: Getting tenant VM instance information from VIM"
2369 )
2370
tiernoae4a8d12016-07-08 12:30:39 +02002371 for vm_id in vm_list:
tierno1ec592d2020-06-16 15:29:47 +00002372 vm = {}
sousaedu80135b92021-02-17 15:05:18 +01002373
tiernoae4a8d12016-07-08 12:30:39 +02002374 try:
2375 vm_vim = self.get_vminstance(vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002376
2377 if vm_vim["status"] in vmStatus2manoFormat:
2378 vm["status"] = vmStatus2manoFormat[vm_vim["status"]]
tierno7edb6752016-03-21 17:37:52 +01002379 else:
sousaedu80135b92021-02-17 15:05:18 +01002380 vm["status"] = "OTHER"
2381 vm["error_msg"] = "VIM status reported " + vm_vim["status"]
2382
tierno70eeb182020-10-19 16:38:00 +00002383 vm_vim.pop("OS-EXT-SRV-ATTR:user_data", None)
2384 vm_vim.pop("user_data", None)
sousaedu80135b92021-02-17 15:05:18 +01002385 vm["vim_info"] = self.serialize(vm_vim)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002386
tiernoae4a8d12016-07-08 12:30:39 +02002387 vm["interfaces"] = []
sousaedu80135b92021-02-17 15:05:18 +01002388 if vm_vim.get("fault"):
2389 vm["error_msg"] = str(vm_vim["fault"])
2390
tierno1ec592d2020-06-16 15:29:47 +00002391 # get interfaces
tierno7edb6752016-03-21 17:37:52 +01002392 try:
tiernoae4a8d12016-07-08 12:30:39 +02002393 self._reload_connection()
tiernob42fd9b2018-06-20 10:44:32 +02002394 port_dict = self.neutron.list_ports(device_id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002395
tiernoae4a8d12016-07-08 12:30:39 +02002396 for port in port_dict["ports"]:
tierno1ec592d2020-06-16 15:29:47 +00002397 interface = {}
sousaedu80135b92021-02-17 15:05:18 +01002398 interface["vim_info"] = self.serialize(port)
tiernoae4a8d12016-07-08 12:30:39 +02002399 interface["mac_address"] = port.get("mac_address")
2400 interface["vim_net_id"] = port["network_id"]
2401 interface["vim_interface_id"] = port["id"]
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002402 # check if OS-EXT-SRV-ATTR:host is there,
Mike Marchetti5b9da422017-05-02 15:35:47 -04002403 # in case of non-admin credentials, it will be missing
sousaedu80135b92021-02-17 15:05:18 +01002404
2405 if vm_vim.get("OS-EXT-SRV-ATTR:host"):
2406 interface["compute_node"] = vm_vim["OS-EXT-SRV-ATTR:host"]
2407
tierno867ffe92017-03-27 12:50:34 +02002408 interface["pci"] = None
Mike Marchetti5b9da422017-05-02 15:35:47 -04002409
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002410 # check if binding:profile is there,
Mike Marchetti5b9da422017-05-02 15:35:47 -04002411 # in case of non-admin credentials, it will be missing
sousaedu80135b92021-02-17 15:05:18 +01002412 if port.get("binding:profile"):
2413 if port["binding:profile"].get("pci_slot"):
tierno1ec592d2020-06-16 15:29:47 +00002414 # TODO: At the moment sr-iov pci addresses are converted to PF pci addresses by setting
2415 # the slot to 0x00
Mike Marchetti5b9da422017-05-02 15:35:47 -04002416 # TODO: This is just a workaround valid for niantinc. Find a better way to do so
2417 # CHANGE DDDD:BB:SS.F to DDDD:BB:00.(F%2) assuming there are 2 ports per nic
sousaedu80135b92021-02-17 15:05:18 +01002418 pci = port["binding:profile"]["pci_slot"]
Mike Marchetti5b9da422017-05-02 15:35:47 -04002419 # interface["pci"] = pci[:-4] + "00." + str(int(pci[-1]) % 2)
2420 interface["pci"] = pci
sousaedu80135b92021-02-17 15:05:18 +01002421
tierno867ffe92017-03-27 12:50:34 +02002422 interface["vlan"] = None
sousaedu80135b92021-02-17 15:05:18 +01002423
2424 if port.get("binding:vif_details"):
2425 interface["vlan"] = port["binding:vif_details"].get("vlan")
2426
tierno1dfe9932020-06-18 08:50:10 +00002427 # Get vlan from network in case not present in port for those old openstacks and cases where
2428 # it is needed vlan at PT
2429 if not interface["vlan"]:
2430 # if network is of type vlan and port is of type direct (sr-iov) then set vlan id
2431 network = self.neutron.show_network(port["network_id"])
sousaedu80135b92021-02-17 15:05:18 +01002432
2433 if (
2434 network["network"].get("provider:network_type")
2435 == "vlan"
2436 ):
tierno1dfe9932020-06-18 08:50:10 +00002437 # and port.get("binding:vnic_type") in ("direct", "direct-physical"):
sousaedu80135b92021-02-17 15:05:18 +01002438 interface["vlan"] = network["network"].get(
2439 "provider:segmentation_id"
2440 )
2441
tierno1ec592d2020-06-16 15:29:47 +00002442 ips = []
2443 # look for floating ip address
tiernob42fd9b2018-06-20 10:44:32 +02002444 try:
sousaedu80135b92021-02-17 15:05:18 +01002445 floating_ip_dict = self.neutron.list_floatingips(
2446 port_id=port["id"]
2447 )
2448
tiernob42fd9b2018-06-20 10:44:32 +02002449 if floating_ip_dict.get("floatingips"):
sousaedu80135b92021-02-17 15:05:18 +01002450 ips.append(
2451 floating_ip_dict["floatingips"][0].get(
2452 "floating_ip_address"
2453 )
2454 )
tiernob42fd9b2018-06-20 10:44:32 +02002455 except Exception:
2456 pass
tierno7edb6752016-03-21 17:37:52 +01002457
tiernoae4a8d12016-07-08 12:30:39 +02002458 for subnet in port["fixed_ips"]:
2459 ips.append(subnet["ip_address"])
sousaedu80135b92021-02-17 15:05:18 +01002460
tiernoae4a8d12016-07-08 12:30:39 +02002461 interface["ip_address"] = ";".join(ips)
2462 vm["interfaces"].append(interface)
2463 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01002464 self.logger.error(
2465 "Error getting vm interface information {}: {}".format(
2466 type(e).__name__, e
2467 ),
2468 exc_info=True,
2469 )
tierno72774862020-05-04 11:44:15 +00002470 except vimconn.VimConnNotFoundException as e:
tiernoae4a8d12016-07-08 12:30:39 +02002471 self.logger.error("Exception getting vm status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01002472 vm["status"] = "DELETED"
2473 vm["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00002474 except vimconn.VimConnException as e:
tiernoae4a8d12016-07-08 12:30:39 +02002475 self.logger.error("Exception getting vm status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01002476 vm["status"] = "VIM_ERROR"
2477 vm["error_msg"] = str(e)
2478
tiernoae4a8d12016-07-08 12:30:39 +02002479 vm_dict[vm_id] = vm
sousaedu80135b92021-02-17 15:05:18 +01002480
tiernoae4a8d12016-07-08 12:30:39 +02002481 return vm_dict
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002482
tierno98e909c2017-10-14 13:27:03 +02002483 def action_vminstance(self, vm_id, action_dict, created_items={}):
tierno1ec592d2020-06-16 15:29:47 +00002484 """Send and action over a VM instance from VIM
2485 Returns None or the console dict if the action was successfully sent to the VIM"""
tiernoae4a8d12016-07-08 12:30:39 +02002486 self.logger.debug("Action over VM '%s': %s", vm_id, str(action_dict))
sousaedu80135b92021-02-17 15:05:18 +01002487
tierno7edb6752016-03-21 17:37:52 +01002488 try:
2489 self._reload_connection()
2490 server = self.nova.servers.find(id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002491
tierno7edb6752016-03-21 17:37:52 +01002492 if "start" in action_dict:
tierno1ec592d2020-06-16 15:29:47 +00002493 if action_dict["start"] == "rebuild":
tierno7edb6752016-03-21 17:37:52 +01002494 server.rebuild()
2495 else:
tierno1ec592d2020-06-16 15:29:47 +00002496 if server.status == "PAUSED":
tierno7edb6752016-03-21 17:37:52 +01002497 server.unpause()
tierno1ec592d2020-06-16 15:29:47 +00002498 elif server.status == "SUSPENDED":
tierno7edb6752016-03-21 17:37:52 +01002499 server.resume()
tierno1ec592d2020-06-16 15:29:47 +00002500 elif server.status == "SHUTOFF":
tierno7edb6752016-03-21 17:37:52 +01002501 server.start()
2502 elif "pause" in action_dict:
2503 server.pause()
2504 elif "resume" in action_dict:
2505 server.resume()
2506 elif "shutoff" in action_dict or "shutdown" in action_dict:
2507 server.stop()
2508 elif "forceOff" in action_dict:
tierno1ec592d2020-06-16 15:29:47 +00002509 server.stop() # TODO
tierno7edb6752016-03-21 17:37:52 +01002510 elif "terminate" in action_dict:
2511 server.delete()
2512 elif "createImage" in action_dict:
2513 server.create_image()
tierno1ec592d2020-06-16 15:29:47 +00002514 # "path":path_schema,
2515 # "description":description_schema,
2516 # "name":name_schema,
2517 # "metadata":metadata_schema,
2518 # "imageRef": id_schema,
2519 # "disk": {"oneOf":[{"type": "null"}, {"type":"string"}] },
tierno7edb6752016-03-21 17:37:52 +01002520 elif "rebuild" in action_dict:
sousaedu80135b92021-02-17 15:05:18 +01002521 server.rebuild(server.image["id"])
tierno7edb6752016-03-21 17:37:52 +01002522 elif "reboot" in action_dict:
sousaedu80135b92021-02-17 15:05:18 +01002523 server.reboot() # reboot_type="SOFT"
tierno7edb6752016-03-21 17:37:52 +01002524 elif "console" in action_dict:
2525 console_type = action_dict["console"]
sousaedu80135b92021-02-17 15:05:18 +01002526
tierno1ec592d2020-06-16 15:29:47 +00002527 if console_type is None or console_type == "novnc":
tierno7edb6752016-03-21 17:37:52 +01002528 console_dict = server.get_vnc_console("novnc")
2529 elif console_type == "xvpvnc":
2530 console_dict = server.get_vnc_console(console_type)
2531 elif console_type == "rdp-html5":
2532 console_dict = server.get_rdp_console(console_type)
2533 elif console_type == "spice-html5":
2534 console_dict = server.get_spice_console(console_type)
2535 else:
sousaedu80135b92021-02-17 15:05:18 +01002536 raise vimconn.VimConnException(
2537 "console type '{}' not allowed".format(console_type),
2538 http_code=vimconn.HTTP_Bad_Request,
2539 )
2540
tierno7edb6752016-03-21 17:37:52 +01002541 try:
2542 console_url = console_dict["console"]["url"]
tierno1ec592d2020-06-16 15:29:47 +00002543 # parse console_url
tierno7edb6752016-03-21 17:37:52 +01002544 protocol_index = console_url.find("//")
sousaedu80135b92021-02-17 15:05:18 +01002545 suffix_index = (
2546 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2547 )
2548 port_index = (
2549 console_url[protocol_index + 2 : suffix_index].find(":")
2550 + protocol_index
2551 + 2
2552 )
2553
tierno1ec592d2020-06-16 15:29:47 +00002554 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
sousaedu80135b92021-02-17 15:05:18 +01002555 raise vimconn.VimConnException(
2556 "Unexpected response from VIM " + str(console_dict)
2557 )
2558
2559 console_dict2 = {
2560 "protocol": console_url[0:protocol_index],
2561 "server": console_url[protocol_index + 2 : port_index],
2562 "port": int(console_url[port_index + 1 : suffix_index]),
2563 "suffix": console_url[suffix_index + 1 :],
2564 }
2565
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002566 return console_dict2
tierno1ec592d2020-06-16 15:29:47 +00002567 except Exception:
sousaedu80135b92021-02-17 15:05:18 +01002568 raise vimconn.VimConnException(
2569 "Unexpected response from VIM " + str(console_dict)
2570 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002571
tierno98e909c2017-10-14 13:27:03 +02002572 return None
sousaedu80135b92021-02-17 15:05:18 +01002573 except (
2574 ksExceptions.ClientException,
2575 nvExceptions.ClientException,
2576 nvExceptions.NotFound,
2577 ConnectionError,
2578 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002579 self._format_exception(e)
tierno1ec592d2020-06-16 15:29:47 +00002580 # TODO insert exception vimconn.HTTP_Unauthorized
tiernoae4a8d12016-07-08 12:30:39 +02002581
tierno1ec592d2020-06-16 15:29:47 +00002582 # ###### VIO Specific Changes #########
garciadeblasebd66722019-01-31 16:01:31 +00002583 def _generate_vlanID(self):
kate721d79b2017-06-24 04:21:38 -07002584 """
sousaedu80135b92021-02-17 15:05:18 +01002585 Method to get unused vlanID
kate721d79b2017-06-24 04:21:38 -07002586 Args:
2587 None
2588 Returns:
2589 vlanID
2590 """
tierno1ec592d2020-06-16 15:29:47 +00002591 # Get used VLAN IDs
kate721d79b2017-06-24 04:21:38 -07002592 usedVlanIDs = []
2593 networks = self.get_network_list()
sousaedu80135b92021-02-17 15:05:18 +01002594
kate721d79b2017-06-24 04:21:38 -07002595 for net in networks:
sousaedu80135b92021-02-17 15:05:18 +01002596 if net.get("provider:segmentation_id"):
2597 usedVlanIDs.append(net.get("provider:segmentation_id"))
2598
kate721d79b2017-06-24 04:21:38 -07002599 used_vlanIDs = set(usedVlanIDs)
2600
tierno1ec592d2020-06-16 15:29:47 +00002601 # find unused VLAN ID
sousaedu80135b92021-02-17 15:05:18 +01002602 for vlanID_range in self.config.get("dataplane_net_vlan_range"):
kate721d79b2017-06-24 04:21:38 -07002603 try:
sousaedu80135b92021-02-17 15:05:18 +01002604 start_vlanid, end_vlanid = map(
2605 int, vlanID_range.replace(" ", "").split("-")
2606 )
2607
tierno7d782ef2019-10-04 12:56:31 +00002608 for vlanID in range(start_vlanid, end_vlanid + 1):
kate721d79b2017-06-24 04:21:38 -07002609 if vlanID not in used_vlanIDs:
2610 return vlanID
2611 except Exception as exp:
sousaedu80135b92021-02-17 15:05:18 +01002612 raise vimconn.VimConnException(
2613 "Exception {} occurred while generating VLAN ID.".format(exp)
2614 )
kate721d79b2017-06-24 04:21:38 -07002615 else:
tierno1ec592d2020-06-16 15:29:47 +00002616 raise vimconn.VimConnConflictException(
2617 "Unable to create the SRIOV VLAN network. All given Vlan IDs {} are in use.".format(
sousaedu80135b92021-02-17 15:05:18 +01002618 self.config.get("dataplane_net_vlan_range")
2619 )
2620 )
kate721d79b2017-06-24 04:21:38 -07002621
garciadeblasebd66722019-01-31 16:01:31 +00002622 def _generate_multisegment_vlanID(self):
2623 """
sousaedu80135b92021-02-17 15:05:18 +01002624 Method to get unused vlanID
2625 Args:
2626 None
2627 Returns:
2628 vlanID
garciadeblasebd66722019-01-31 16:01:31 +00002629 """
tierno6869ae72020-01-09 17:37:34 +00002630 # Get used VLAN IDs
garciadeblasebd66722019-01-31 16:01:31 +00002631 usedVlanIDs = []
2632 networks = self.get_network_list()
2633 for net in networks:
sousaedu80135b92021-02-17 15:05:18 +01002634 if net.get("provider:network_type") == "vlan" and net.get(
2635 "provider:segmentation_id"
2636 ):
2637 usedVlanIDs.append(net.get("provider:segmentation_id"))
2638 elif net.get("segments"):
2639 for segment in net.get("segments"):
2640 if segment.get("provider:network_type") == "vlan" and segment.get(
2641 "provider:segmentation_id"
2642 ):
2643 usedVlanIDs.append(segment.get("provider:segmentation_id"))
2644
garciadeblasebd66722019-01-31 16:01:31 +00002645 used_vlanIDs = set(usedVlanIDs)
2646
tierno6869ae72020-01-09 17:37:34 +00002647 # find unused VLAN ID
sousaedu80135b92021-02-17 15:05:18 +01002648 for vlanID_range in self.config.get("multisegment_vlan_range"):
garciadeblasebd66722019-01-31 16:01:31 +00002649 try:
sousaedu80135b92021-02-17 15:05:18 +01002650 start_vlanid, end_vlanid = map(
2651 int, vlanID_range.replace(" ", "").split("-")
2652 )
2653
tierno7d782ef2019-10-04 12:56:31 +00002654 for vlanID in range(start_vlanid, end_vlanid + 1):
garciadeblasebd66722019-01-31 16:01:31 +00002655 if vlanID not in used_vlanIDs:
2656 return vlanID
2657 except Exception as exp:
sousaedu80135b92021-02-17 15:05:18 +01002658 raise vimconn.VimConnException(
2659 "Exception {} occurred while generating VLAN ID.".format(exp)
2660 )
garciadeblasebd66722019-01-31 16:01:31 +00002661 else:
tierno1ec592d2020-06-16 15:29:47 +00002662 raise vimconn.VimConnConflictException(
2663 "Unable to create the VLAN segment. All VLAN IDs {} are in use.".format(
sousaedu80135b92021-02-17 15:05:18 +01002664 self.config.get("multisegment_vlan_range")
2665 )
2666 )
garciadeblasebd66722019-01-31 16:01:31 +00002667
2668 def _validate_vlan_ranges(self, input_vlan_range, text_vlan_range):
kate721d79b2017-06-24 04:21:38 -07002669 """
2670 Method to validate user given vlanID ranges
2671 Args: None
2672 Returns: None
2673 """
garciadeblasebd66722019-01-31 16:01:31 +00002674 for vlanID_range in input_vlan_range:
kate721d79b2017-06-24 04:21:38 -07002675 vlan_range = vlanID_range.replace(" ", "")
tierno1ec592d2020-06-16 15:29:47 +00002676 # validate format
sousaedu80135b92021-02-17 15:05:18 +01002677 vlanID_pattern = r"(\d)*-(\d)*$"
kate721d79b2017-06-24 04:21:38 -07002678 match_obj = re.match(vlanID_pattern, vlan_range)
2679 if not match_obj:
tierno1ec592d2020-06-16 15:29:47 +00002680 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01002681 "Invalid VLAN range for {}: {}.You must provide "
2682 "'{}' in format [start_ID - end_ID].".format(
2683 text_vlan_range, vlanID_range, text_vlan_range
2684 )
2685 )
kate721d79b2017-06-24 04:21:38 -07002686
tierno1ec592d2020-06-16 15:29:47 +00002687 start_vlanid, end_vlanid = map(int, vlan_range.split("-"))
2688 if start_vlanid <= 0:
2689 raise vimconn.VimConnConflictException(
2690 "Invalid VLAN range for {}: {}. Start ID can not be zero. For VLAN "
sousaedu80135b92021-02-17 15:05:18 +01002691 "networks valid IDs are 1 to 4094 ".format(
2692 text_vlan_range, vlanID_range
2693 )
2694 )
2695
tierno1ec592d2020-06-16 15:29:47 +00002696 if end_vlanid > 4094:
2697 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01002698 "Invalid VLAN range for {}: {}. End VLAN ID can not be "
2699 "greater than 4094. For VLAN networks valid IDs are 1 to 4094 ".format(
2700 text_vlan_range, vlanID_range
2701 )
2702 )
kate721d79b2017-06-24 04:21:38 -07002703
2704 if start_vlanid > end_vlanid:
tierno1ec592d2020-06-16 15:29:47 +00002705 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01002706 "Invalid VLAN range for {}: {}. You must provide '{}'"
2707 " in format start_ID - end_ID and start_ID < end_ID ".format(
2708 text_vlan_range, vlanID_range, text_vlan_range
2709 )
2710 )
kate721d79b2017-06-24 04:21:38 -07002711
tierno1ec592d2020-06-16 15:29:47 +00002712 # NOT USED FUNCTIONS
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002713
tiernoae4a8d12016-07-08 12:30:39 +02002714 def new_external_port(self, port_data):
tierno1ec592d2020-06-16 15:29:47 +00002715 """Adds a external port to VIM
sousaedu80135b92021-02-17 15:05:18 +01002716 Returns the port identifier"""
tierno1ec592d2020-06-16 15:29:47 +00002717 # TODO openstack if needed
sousaedu80135b92021-02-17 15:05:18 +01002718 return (
2719 -vimconn.HTTP_Internal_Server_Error,
2720 "osconnector.new_external_port() not implemented",
2721 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002722
tiernoae4a8d12016-07-08 12:30:39 +02002723 def connect_port_network(self, port_id, network_id, admin=False):
tierno1ec592d2020-06-16 15:29:47 +00002724 """Connects a external port to a network
sousaedu80135b92021-02-17 15:05:18 +01002725 Returns status code of the VIM response"""
tierno1ec592d2020-06-16 15:29:47 +00002726 # TODO openstack if needed
sousaedu80135b92021-02-17 15:05:18 +01002727 return (
2728 -vimconn.HTTP_Internal_Server_Error,
2729 "osconnector.connect_port_network() not implemented",
2730 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002731
tiernoae4a8d12016-07-08 12:30:39 +02002732 def new_user(self, user_name, user_passwd, tenant_id=None):
tierno1ec592d2020-06-16 15:29:47 +00002733 """Adds a new user to openstack VIM
sousaedu80135b92021-02-17 15:05:18 +01002734 Returns the user identifier"""
tiernoae4a8d12016-07-08 12:30:39 +02002735 self.logger.debug("osconnector: Adding a new user to VIM")
sousaedu80135b92021-02-17 15:05:18 +01002736
tiernoae4a8d12016-07-08 12:30:39 +02002737 try:
2738 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01002739 user = self.keystone.users.create(
2740 user_name, password=user_passwd, default_project=tenant_id
2741 )
tierno1ec592d2020-06-16 15:29:47 +00002742 # self.keystone.tenants.add_user(self.k_creds["username"], #role)
sousaedu80135b92021-02-17 15:05:18 +01002743
tiernoae4a8d12016-07-08 12:30:39 +02002744 return user.id
2745 except ksExceptions.ConnectionError as e:
tierno1ec592d2020-06-16 15:29:47 +00002746 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002747 error_text = (
2748 type(e).__name__
2749 + ": "
2750 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2751 )
tierno1ec592d2020-06-16 15:29:47 +00002752 except ksExceptions.ClientException as e: # TODO remove
2753 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002754 error_text = (
2755 type(e).__name__
2756 + ": "
2757 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2758 )
2759
tierno1ec592d2020-06-16 15:29:47 +00002760 # TODO insert exception vimconn.HTTP_Unauthorized
2761 # if reaching here is because an exception
tierno9c5c8322018-03-23 15:44:03 +01002762 self.logger.debug("new_user " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01002763
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002764 return error_value, error_text
tiernoae4a8d12016-07-08 12:30:39 +02002765
2766 def delete_user(self, user_id):
tierno1ec592d2020-06-16 15:29:47 +00002767 """Delete a user from openstack VIM
sousaedu80135b92021-02-17 15:05:18 +01002768 Returns the user identifier"""
tiernoae4a8d12016-07-08 12:30:39 +02002769 if self.debug:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002770 print("osconnector: Deleting a user from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002771
tiernoae4a8d12016-07-08 12:30:39 +02002772 try:
2773 self._reload_connection()
2774 self.keystone.users.delete(user_id)
sousaedu80135b92021-02-17 15:05:18 +01002775
tiernoae4a8d12016-07-08 12:30:39 +02002776 return 1, user_id
2777 except ksExceptions.ConnectionError as e:
tierno1ec592d2020-06-16 15:29:47 +00002778 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002779 error_text = (
2780 type(e).__name__
2781 + ": "
2782 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2783 )
tiernoae4a8d12016-07-08 12:30:39 +02002784 except ksExceptions.NotFound as e:
tierno1ec592d2020-06-16 15:29:47 +00002785 error_value = -vimconn.HTTP_Not_Found
sousaedu80135b92021-02-17 15:05:18 +01002786 error_text = (
2787 type(e).__name__
2788 + ": "
2789 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2790 )
tierno1ec592d2020-06-16 15:29:47 +00002791 except ksExceptions.ClientException as e: # TODO remove
2792 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002793 error_text = (
2794 type(e).__name__
2795 + ": "
2796 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2797 )
2798
tierno1ec592d2020-06-16 15:29:47 +00002799 # TODO insert exception vimconn.HTTP_Unauthorized
2800 # if reaching here is because an exception
2801 self.logger.debug("delete_tenant " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01002802
tiernoae4a8d12016-07-08 12:30:39 +02002803 return error_value, error_text
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002804
tierno7edb6752016-03-21 17:37:52 +01002805 def get_hosts_info(self):
tierno1ec592d2020-06-16 15:29:47 +00002806 """Get the information of deployed hosts
2807 Returns the hosts content"""
tierno7edb6752016-03-21 17:37:52 +01002808 if self.debug:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002809 print("osconnector: Getting Host info from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002810
tierno7edb6752016-03-21 17:37:52 +01002811 try:
tierno1ec592d2020-06-16 15:29:47 +00002812 h_list = []
tierno7edb6752016-03-21 17:37:52 +01002813 self._reload_connection()
2814 hypervisors = self.nova.hypervisors.list()
sousaedu80135b92021-02-17 15:05:18 +01002815
tierno7edb6752016-03-21 17:37:52 +01002816 for hype in hypervisors:
tierno1ec592d2020-06-16 15:29:47 +00002817 h_list.append(hype.to_dict())
sousaedu80135b92021-02-17 15:05:18 +01002818
tierno1ec592d2020-06-16 15:29:47 +00002819 return 1, {"hosts": h_list}
tierno7edb6752016-03-21 17:37:52 +01002820 except nvExceptions.NotFound as e:
tierno1ec592d2020-06-16 15:29:47 +00002821 error_value = -vimconn.HTTP_Not_Found
sousaedu80135b92021-02-17 15:05:18 +01002822 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
tierno7edb6752016-03-21 17:37:52 +01002823 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
tierno1ec592d2020-06-16 15:29:47 +00002824 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002825 error_text = (
2826 type(e).__name__
2827 + ": "
2828 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2829 )
2830
tierno1ec592d2020-06-16 15:29:47 +00002831 # TODO insert exception vimconn.HTTP_Unauthorized
2832 # if reaching here is because an exception
tierno9c5c8322018-03-23 15:44:03 +01002833 self.logger.debug("get_hosts_info " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01002834
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002835 return error_value, error_text
tierno7edb6752016-03-21 17:37:52 +01002836
2837 def get_hosts(self, vim_tenant):
tierno1ec592d2020-06-16 15:29:47 +00002838 """Get the hosts and deployed instances
2839 Returns the hosts content"""
tierno7edb6752016-03-21 17:37:52 +01002840 r, hype_dict = self.get_hosts_info()
sousaedu80135b92021-02-17 15:05:18 +01002841
tierno1ec592d2020-06-16 15:29:47 +00002842 if r < 0:
tierno7edb6752016-03-21 17:37:52 +01002843 return r, hype_dict
sousaedu80135b92021-02-17 15:05:18 +01002844
tierno7edb6752016-03-21 17:37:52 +01002845 hypervisors = hype_dict["hosts"]
sousaedu80135b92021-02-17 15:05:18 +01002846
tierno7edb6752016-03-21 17:37:52 +01002847 try:
2848 servers = self.nova.servers.list()
2849 for hype in hypervisors:
2850 for server in servers:
sousaedu80135b92021-02-17 15:05:18 +01002851 if (
2852 server.to_dict()["OS-EXT-SRV-ATTR:hypervisor_hostname"]
2853 == hype["hypervisor_hostname"]
2854 ):
2855 if "vm" in hype:
2856 hype["vm"].append(server.id)
tierno7edb6752016-03-21 17:37:52 +01002857 else:
sousaedu80135b92021-02-17 15:05:18 +01002858 hype["vm"] = [server.id]
2859
tierno7edb6752016-03-21 17:37:52 +01002860 return 1, hype_dict
2861 except nvExceptions.NotFound as e:
tierno1ec592d2020-06-16 15:29:47 +00002862 error_value = -vimconn.HTTP_Not_Found
sousaedu80135b92021-02-17 15:05:18 +01002863 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
tierno7edb6752016-03-21 17:37:52 +01002864 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
tierno1ec592d2020-06-16 15:29:47 +00002865 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002866 error_text = (
2867 type(e).__name__
2868 + ": "
2869 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2870 )
2871
tierno1ec592d2020-06-16 15:29:47 +00002872 # TODO insert exception vimconn.HTTP_Unauthorized
2873 # if reaching here is because an exception
tierno9c5c8322018-03-23 15:44:03 +01002874 self.logger.debug("get_hosts " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01002875
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002876 return error_value, error_text
tierno7edb6752016-03-21 17:37:52 +01002877
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002878 def new_classification(self, name, ctype, definition):
sousaedu80135b92021-02-17 15:05:18 +01002879 self.logger.debug(
2880 "Adding a new (Traffic) Classification to VIM, named %s", name
2881 )
2882
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002883 try:
2884 new_class = None
2885 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01002886
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002887 if ctype not in supportedClassificationTypes:
tierno72774862020-05-04 11:44:15 +00002888 raise vimconn.VimConnNotSupportedException(
sousaedu80135b92021-02-17 15:05:18 +01002889 "OpenStack VIM connector does not support provided "
2890 "Classification Type {}, supported ones are: {}".format(
2891 ctype, supportedClassificationTypes
2892 )
2893 )
2894
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002895 if not self._validate_classification(ctype, definition):
tierno72774862020-05-04 11:44:15 +00002896 raise vimconn.VimConnException(
sousaedu80135b92021-02-17 15:05:18 +01002897 "Incorrect Classification definition for the type specified."
2898 )
tierno7edb6752016-03-21 17:37:52 +01002899
sousaedu80135b92021-02-17 15:05:18 +01002900 classification_dict = definition
2901 classification_dict["name"] = name
Igor D.Ccaadc442017-11-06 12:48:48 +00002902 new_class = self.neutron.create_sfc_flow_classifier(
sousaedu80135b92021-02-17 15:05:18 +01002903 {"flow_classifier": classification_dict}
2904 )
2905
2906 return new_class["flow_classifier"]["id"]
2907 except (
2908 neExceptions.ConnectionFailed,
2909 ksExceptions.ClientException,
2910 neExceptions.NeutronException,
2911 ConnectionError,
2912 ) as e:
2913 self.logger.error("Creation of Classification failed.")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002914 self._format_exception(e)
2915
2916 def get_classification(self, class_id):
2917 self.logger.debug(" Getting Classification %s from VIM", class_id)
2918 filter_dict = {"id": class_id}
2919 class_list = self.get_classification_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01002920
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002921 if len(class_list) == 0:
tierno72774862020-05-04 11:44:15 +00002922 raise vimconn.VimConnNotFoundException(
sousaedu80135b92021-02-17 15:05:18 +01002923 "Classification '{}' not found".format(class_id)
2924 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002925 elif len(class_list) > 1:
tierno72774862020-05-04 11:44:15 +00002926 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01002927 "Found more than one Classification with this criteria"
2928 )
2929
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002930 classification = class_list[0]
sousaedu80135b92021-02-17 15:05:18 +01002931
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002932 return classification
2933
2934 def get_classification_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01002935 self.logger.debug(
2936 "Getting Classifications from VIM filter: '%s'", str(filter_dict)
2937 )
2938
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002939 try:
tierno69b590e2018-03-13 18:52:23 +01002940 filter_dict_os = filter_dict.copy()
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002941 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01002942
tierno69b590e2018-03-13 18:52:23 +01002943 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01002944 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
2945
Igor D.Ccaadc442017-11-06 12:48:48 +00002946 classification_dict = self.neutron.list_sfc_flow_classifiers(
sousaedu80135b92021-02-17 15:05:18 +01002947 **filter_dict_os
2948 )
tierno69b590e2018-03-13 18:52:23 +01002949 classification_list = classification_dict["flow_classifiers"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002950 self.__classification_os2mano(classification_list)
sousaedu80135b92021-02-17 15:05:18 +01002951
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002952 return classification_list
sousaedu80135b92021-02-17 15:05:18 +01002953 except (
2954 neExceptions.ConnectionFailed,
2955 ksExceptions.ClientException,
2956 neExceptions.NeutronException,
2957 ConnectionError,
2958 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002959 self._format_exception(e)
2960
2961 def delete_classification(self, class_id):
2962 self.logger.debug("Deleting Classification '%s' from VIM", class_id)
sousaedu80135b92021-02-17 15:05:18 +01002963
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002964 try:
2965 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00002966 self.neutron.delete_sfc_flow_classifier(class_id)
sousaedu80135b92021-02-17 15:05:18 +01002967
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002968 return class_id
sousaedu80135b92021-02-17 15:05:18 +01002969 except (
2970 neExceptions.ConnectionFailed,
2971 neExceptions.NeutronException,
2972 ksExceptions.ClientException,
2973 neExceptions.NeutronException,
2974 ConnectionError,
2975 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002976 self._format_exception(e)
2977
2978 def new_sfi(self, name, ingress_ports, egress_ports, sfc_encap=True):
sousaedu80135b92021-02-17 15:05:18 +01002979 self.logger.debug(
2980 "Adding a new Service Function Instance to VIM, named '%s'", name
2981 )
2982
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002983 try:
2984 new_sfi = None
2985 self._reload_connection()
2986 correlation = None
sousaedu80135b92021-02-17 15:05:18 +01002987
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002988 if sfc_encap:
sousaedu80135b92021-02-17 15:05:18 +01002989 correlation = "nsh"
2990
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002991 if len(ingress_ports) != 1:
tierno72774862020-05-04 11:44:15 +00002992 raise vimconn.VimConnNotSupportedException(
sousaedu80135b92021-02-17 15:05:18 +01002993 "OpenStack VIM connector can only have 1 ingress port per SFI"
2994 )
2995
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002996 if len(egress_ports) != 1:
tierno72774862020-05-04 11:44:15 +00002997 raise vimconn.VimConnNotSupportedException(
sousaedu80135b92021-02-17 15:05:18 +01002998 "OpenStack VIM connector can only have 1 egress port per SFI"
2999 )
3000
3001 sfi_dict = {
3002 "name": name,
3003 "ingress": ingress_ports[0],
3004 "egress": egress_ports[0],
3005 "service_function_parameters": {"correlation": correlation},
3006 }
3007 new_sfi = self.neutron.create_sfc_port_pair({"port_pair": sfi_dict})
3008
3009 return new_sfi["port_pair"]["id"]
3010 except (
3011 neExceptions.ConnectionFailed,
3012 ksExceptions.ClientException,
3013 neExceptions.NeutronException,
3014 ConnectionError,
3015 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003016 if new_sfi:
3017 try:
sousaedu80135b92021-02-17 15:05:18 +01003018 self.neutron.delete_sfc_port_pair(new_sfi["port_pair"]["id"])
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003019 except Exception:
3020 self.logger.error(
sousaedu80135b92021-02-17 15:05:18 +01003021 "Creation of Service Function Instance failed, with "
3022 "subsequent deletion failure as well."
3023 )
3024
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003025 self._format_exception(e)
3026
3027 def get_sfi(self, sfi_id):
sousaedu80135b92021-02-17 15:05:18 +01003028 self.logger.debug("Getting Service Function Instance %s from VIM", sfi_id)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003029 filter_dict = {"id": sfi_id}
3030 sfi_list = self.get_sfi_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01003031
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003032 if len(sfi_list) == 0:
sousaedu80135b92021-02-17 15:05:18 +01003033 raise vimconn.VimConnNotFoundException(
3034 "Service Function Instance '{}' not found".format(sfi_id)
3035 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003036 elif len(sfi_list) > 1:
tierno72774862020-05-04 11:44:15 +00003037 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003038 "Found more than one Service Function Instance with this criteria"
3039 )
3040
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003041 sfi = sfi_list[0]
sousaedu80135b92021-02-17 15:05:18 +01003042
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003043 return sfi
3044
3045 def get_sfi_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01003046 self.logger.debug(
3047 "Getting Service Function Instances from VIM filter: '%s'", str(filter_dict)
3048 )
3049
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003050 try:
3051 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +01003052 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +01003053
tierno69b590e2018-03-13 18:52:23 +01003054 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01003055 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3056
tierno69b590e2018-03-13 18:52:23 +01003057 sfi_dict = self.neutron.list_sfc_port_pairs(**filter_dict_os)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003058 sfi_list = sfi_dict["port_pairs"]
3059 self.__sfi_os2mano(sfi_list)
sousaedu80135b92021-02-17 15:05:18 +01003060
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003061 return sfi_list
sousaedu80135b92021-02-17 15:05:18 +01003062 except (
3063 neExceptions.ConnectionFailed,
3064 ksExceptions.ClientException,
3065 neExceptions.NeutronException,
3066 ConnectionError,
3067 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003068 self._format_exception(e)
3069
3070 def delete_sfi(self, sfi_id):
sousaedu80135b92021-02-17 15:05:18 +01003071 self.logger.debug("Deleting Service Function Instance '%s' from VIM", sfi_id)
3072
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003073 try:
3074 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003075 self.neutron.delete_sfc_port_pair(sfi_id)
sousaedu80135b92021-02-17 15:05:18 +01003076
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003077 return sfi_id
sousaedu80135b92021-02-17 15:05:18 +01003078 except (
3079 neExceptions.ConnectionFailed,
3080 neExceptions.NeutronException,
3081 ksExceptions.ClientException,
3082 neExceptions.NeutronException,
3083 ConnectionError,
3084 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003085 self._format_exception(e)
3086
3087 def new_sf(self, name, sfis, sfc_encap=True):
tierno7d782ef2019-10-04 12:56:31 +00003088 self.logger.debug("Adding a new Service Function to VIM, named '%s'", name)
sousaedu80135b92021-02-17 15:05:18 +01003089
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003090 try:
3091 new_sf = None
3092 self._reload_connection()
tierno9c5c8322018-03-23 15:44:03 +01003093 # correlation = None
3094 # if sfc_encap:
sousaedu80135b92021-02-17 15:05:18 +01003095 # correlation = "nsh"
3096
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003097 for instance in sfis:
3098 sfi = self.get_sfi(instance)
sousaedu80135b92021-02-17 15:05:18 +01003099
3100 if sfi.get("sfc_encap") != sfc_encap:
tierno72774862020-05-04 11:44:15 +00003101 raise vimconn.VimConnNotSupportedException(
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003102 "OpenStack VIM connector requires all SFIs of the "
sousaedu80135b92021-02-17 15:05:18 +01003103 "same SF to share the same SFC Encapsulation"
3104 )
3105
3106 sf_dict = {"name": name, "port_pairs": sfis}
3107 new_sf = self.neutron.create_sfc_port_pair_group(
3108 {"port_pair_group": sf_dict}
3109 )
3110
3111 return new_sf["port_pair_group"]["id"]
3112 except (
3113 neExceptions.ConnectionFailed,
3114 ksExceptions.ClientException,
3115 neExceptions.NeutronException,
3116 ConnectionError,
3117 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003118 if new_sf:
3119 try:
Igor D.Ccaadc442017-11-06 12:48:48 +00003120 self.neutron.delete_sfc_port_pair_group(
sousaedu80135b92021-02-17 15:05:18 +01003121 new_sf["port_pair_group"]["id"]
3122 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003123 except Exception:
3124 self.logger.error(
sousaedu80135b92021-02-17 15:05:18 +01003125 "Creation of Service Function failed, with "
3126 "subsequent deletion failure as well."
3127 )
3128
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003129 self._format_exception(e)
3130
3131 def get_sf(self, sf_id):
3132 self.logger.debug("Getting Service Function %s from VIM", sf_id)
3133 filter_dict = {"id": sf_id}
3134 sf_list = self.get_sf_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01003135
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003136 if len(sf_list) == 0:
tierno72774862020-05-04 11:44:15 +00003137 raise vimconn.VimConnNotFoundException(
sousaedu80135b92021-02-17 15:05:18 +01003138 "Service Function '{}' not found".format(sf_id)
3139 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003140 elif len(sf_list) > 1:
tierno72774862020-05-04 11:44:15 +00003141 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003142 "Found more than one Service Function with this criteria"
3143 )
3144
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003145 sf = sf_list[0]
sousaedu80135b92021-02-17 15:05:18 +01003146
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003147 return sf
3148
3149 def get_sf_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01003150 self.logger.debug(
3151 "Getting Service Function from VIM filter: '%s'", str(filter_dict)
3152 )
3153
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003154 try:
3155 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +01003156 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +01003157
tierno69b590e2018-03-13 18:52:23 +01003158 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01003159 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3160
tierno69b590e2018-03-13 18:52:23 +01003161 sf_dict = self.neutron.list_sfc_port_pair_groups(**filter_dict_os)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003162 sf_list = sf_dict["port_pair_groups"]
3163 self.__sf_os2mano(sf_list)
sousaedu80135b92021-02-17 15:05:18 +01003164
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003165 return sf_list
sousaedu80135b92021-02-17 15:05:18 +01003166 except (
3167 neExceptions.ConnectionFailed,
3168 ksExceptions.ClientException,
3169 neExceptions.NeutronException,
3170 ConnectionError,
3171 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003172 self._format_exception(e)
3173
3174 def delete_sf(self, sf_id):
3175 self.logger.debug("Deleting Service Function '%s' from VIM", sf_id)
sousaedu80135b92021-02-17 15:05:18 +01003176
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003177 try:
3178 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003179 self.neutron.delete_sfc_port_pair_group(sf_id)
sousaedu80135b92021-02-17 15:05:18 +01003180
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003181 return sf_id
sousaedu80135b92021-02-17 15:05:18 +01003182 except (
3183 neExceptions.ConnectionFailed,
3184 neExceptions.NeutronException,
3185 ksExceptions.ClientException,
3186 neExceptions.NeutronException,
3187 ConnectionError,
3188 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003189 self._format_exception(e)
3190
3191 def new_sfp(self, name, classifications, sfs, sfc_encap=True, spi=None):
tierno7d782ef2019-10-04 12:56:31 +00003192 self.logger.debug("Adding a new Service Function Path to VIM, named '%s'", name)
sousaedu80135b92021-02-17 15:05:18 +01003193
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003194 try:
3195 new_sfp = None
3196 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003197 # In networking-sfc the MPLS encapsulation is legacy
3198 # should be used when no full SFC Encapsulation is intended
sousaedu80135b92021-02-17 15:05:18 +01003199 correlation = "mpls"
3200
Igor D.Ccaadc442017-11-06 12:48:48 +00003201 if sfc_encap:
sousaedu80135b92021-02-17 15:05:18 +01003202 correlation = "nsh"
3203
3204 sfp_dict = {
3205 "name": name,
3206 "flow_classifiers": classifications,
3207 "port_pair_groups": sfs,
3208 "chain_parameters": {"correlation": correlation},
3209 }
3210
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003211 if spi:
sousaedu80135b92021-02-17 15:05:18 +01003212 sfp_dict["chain_id"] = spi
3213
3214 new_sfp = self.neutron.create_sfc_port_chain({"port_chain": sfp_dict})
3215
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003216 return new_sfp["port_chain"]["id"]
sousaedu80135b92021-02-17 15:05:18 +01003217 except (
3218 neExceptions.ConnectionFailed,
3219 ksExceptions.ClientException,
3220 neExceptions.NeutronException,
3221 ConnectionError,
3222 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003223 if new_sfp:
3224 try:
sousaedu80135b92021-02-17 15:05:18 +01003225 self.neutron.delete_sfc_port_chain(new_sfp["port_chain"]["id"])
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003226 except Exception:
3227 self.logger.error(
sousaedu80135b92021-02-17 15:05:18 +01003228 "Creation of Service Function Path failed, with "
3229 "subsequent deletion failure as well."
3230 )
3231
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003232 self._format_exception(e)
3233
3234 def get_sfp(self, sfp_id):
3235 self.logger.debug(" Getting Service Function Path %s from VIM", sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003236
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003237 filter_dict = {"id": sfp_id}
3238 sfp_list = self.get_sfp_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01003239
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003240 if len(sfp_list) == 0:
tierno72774862020-05-04 11:44:15 +00003241 raise vimconn.VimConnNotFoundException(
sousaedu80135b92021-02-17 15:05:18 +01003242 "Service Function Path '{}' not found".format(sfp_id)
3243 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003244 elif len(sfp_list) > 1:
tierno72774862020-05-04 11:44:15 +00003245 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003246 "Found more than one Service Function Path with this criteria"
3247 )
3248
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003249 sfp = sfp_list[0]
sousaedu80135b92021-02-17 15:05:18 +01003250
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003251 return sfp
3252
3253 def get_sfp_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01003254 self.logger.debug(
3255 "Getting Service Function Paths from VIM filter: '%s'", str(filter_dict)
3256 )
3257
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003258 try:
3259 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +01003260 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +01003261
tierno69b590e2018-03-13 18:52:23 +01003262 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01003263 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3264
tierno69b590e2018-03-13 18:52:23 +01003265 sfp_dict = self.neutron.list_sfc_port_chains(**filter_dict_os)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003266 sfp_list = sfp_dict["port_chains"]
3267 self.__sfp_os2mano(sfp_list)
sousaedu80135b92021-02-17 15:05:18 +01003268
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003269 return sfp_list
sousaedu80135b92021-02-17 15:05:18 +01003270 except (
3271 neExceptions.ConnectionFailed,
3272 ksExceptions.ClientException,
3273 neExceptions.NeutronException,
3274 ConnectionError,
3275 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003276 self._format_exception(e)
3277
3278 def delete_sfp(self, sfp_id):
tierno7d782ef2019-10-04 12:56:31 +00003279 self.logger.debug("Deleting Service Function Path '%s' from VIM", sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003280
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003281 try:
3282 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003283 self.neutron.delete_sfc_port_chain(sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003284
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003285 return sfp_id
sousaedu80135b92021-02-17 15:05:18 +01003286 except (
3287 neExceptions.ConnectionFailed,
3288 neExceptions.NeutronException,
3289 ksExceptions.ClientException,
3290 neExceptions.NeutronException,
3291 ConnectionError,
3292 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003293 self._format_exception(e)
borsatti8a2dda32019-12-18 15:08:57 +00003294
borsatti8a2dda32019-12-18 15:08:57 +00003295 def refresh_sfps_status(self, sfp_list):
tierno1ec592d2020-06-16 15:29:47 +00003296 """Get the status of the service function path
sousaedu80135b92021-02-17 15:05:18 +01003297 Params: the list of sfp identifiers
3298 Returns a dictionary with:
3299 vm_id: #VIM id of this service function path
3300 status: #Mandatory. Text with one of:
3301 # DELETED (not found at vim)
3302 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3303 # OTHER (Vim reported other status not understood)
3304 # ERROR (VIM indicates an ERROR status)
3305 # ACTIVE,
3306 # CREATING (on building process)
3307 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3308 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)F
tierno1ec592d2020-06-16 15:29:47 +00003309 """
3310 sfp_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01003311 self.logger.debug(
3312 "refresh_sfps status: Getting tenant SFP information from VIM"
3313 )
3314
borsatti8a2dda32019-12-18 15:08:57 +00003315 for sfp_id in sfp_list:
tierno1ec592d2020-06-16 15:29:47 +00003316 sfp = {}
sousaedu80135b92021-02-17 15:05:18 +01003317
borsatti8a2dda32019-12-18 15:08:57 +00003318 try:
3319 sfp_vim = self.get_sfp(sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003320
3321 if sfp_vim["spi"]:
3322 sfp["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003323 else:
sousaedu80135b92021-02-17 15:05:18 +01003324 sfp["status"] = "OTHER"
3325 sfp["error_msg"] = "VIM status reported " + sfp["status"]
borsatti8a2dda32019-12-18 15:08:57 +00003326
sousaedu80135b92021-02-17 15:05:18 +01003327 sfp["vim_info"] = self.serialize(sfp_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003328
sousaedu80135b92021-02-17 15:05:18 +01003329 if sfp_vim.get("fault"):
3330 sfp["error_msg"] = str(sfp_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003331 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003332 self.logger.error("Exception getting sfp status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003333 sfp["status"] = "DELETED"
3334 sfp["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003335 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003336 self.logger.error("Exception getting sfp status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003337 sfp["status"] = "VIM_ERROR"
3338 sfp["error_msg"] = str(e)
3339
borsatti8a2dda32019-12-18 15:08:57 +00003340 sfp_dict[sfp_id] = sfp
sousaedu80135b92021-02-17 15:05:18 +01003341
borsatti8a2dda32019-12-18 15:08:57 +00003342 return sfp_dict
3343
borsatti8a2dda32019-12-18 15:08:57 +00003344 def refresh_sfis_status(self, sfi_list):
tierno1ec592d2020-06-16 15:29:47 +00003345 """Get the status of the service function instances
sousaedu80135b92021-02-17 15:05:18 +01003346 Params: the list of sfi identifiers
3347 Returns a dictionary with:
3348 vm_id: #VIM id of this service function instance
3349 status: #Mandatory. Text with one of:
3350 # DELETED (not found at vim)
3351 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3352 # OTHER (Vim reported other status not understood)
3353 # ERROR (VIM indicates an ERROR status)
3354 # ACTIVE,
3355 # CREATING (on building process)
3356 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3357 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00003358 """
3359 sfi_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01003360 self.logger.debug(
3361 "refresh_sfis status: Getting tenant sfi information from VIM"
3362 )
3363
borsatti8a2dda32019-12-18 15:08:57 +00003364 for sfi_id in sfi_list:
tierno1ec592d2020-06-16 15:29:47 +00003365 sfi = {}
sousaedu80135b92021-02-17 15:05:18 +01003366
borsatti8a2dda32019-12-18 15:08:57 +00003367 try:
3368 sfi_vim = self.get_sfi(sfi_id)
sousaedu80135b92021-02-17 15:05:18 +01003369
borsatti8a2dda32019-12-18 15:08:57 +00003370 if sfi_vim:
sousaedu80135b92021-02-17 15:05:18 +01003371 sfi["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003372 else:
sousaedu80135b92021-02-17 15:05:18 +01003373 sfi["status"] = "OTHER"
3374 sfi["error_msg"] = "VIM status reported " + sfi["status"]
borsatti8a2dda32019-12-18 15:08:57 +00003375
sousaedu80135b92021-02-17 15:05:18 +01003376 sfi["vim_info"] = self.serialize(sfi_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003377
sousaedu80135b92021-02-17 15:05:18 +01003378 if sfi_vim.get("fault"):
3379 sfi["error_msg"] = str(sfi_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003380 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003381 self.logger.error("Exception getting sfi status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003382 sfi["status"] = "DELETED"
3383 sfi["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003384 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003385 self.logger.error("Exception getting sfi status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003386 sfi["status"] = "VIM_ERROR"
3387 sfi["error_msg"] = str(e)
3388
borsatti8a2dda32019-12-18 15:08:57 +00003389 sfi_dict[sfi_id] = sfi
sousaedu80135b92021-02-17 15:05:18 +01003390
borsatti8a2dda32019-12-18 15:08:57 +00003391 return sfi_dict
3392
borsatti8a2dda32019-12-18 15:08:57 +00003393 def refresh_sfs_status(self, sf_list):
tierno1ec592d2020-06-16 15:29:47 +00003394 """Get the status of the service functions
sousaedu80135b92021-02-17 15:05:18 +01003395 Params: the list of sf identifiers
3396 Returns a dictionary with:
3397 vm_id: #VIM id of this service function
3398 status: #Mandatory. Text with one of:
3399 # DELETED (not found at vim)
3400 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3401 # OTHER (Vim reported other status not understood)
3402 # ERROR (VIM indicates an ERROR status)
3403 # ACTIVE,
3404 # CREATING (on building process)
3405 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3406 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00003407 """
3408 sf_dict = {}
borsatti8a2dda32019-12-18 15:08:57 +00003409 self.logger.debug("refresh_sfs status: Getting tenant sf information from VIM")
sousaedu80135b92021-02-17 15:05:18 +01003410
borsatti8a2dda32019-12-18 15:08:57 +00003411 for sf_id in sf_list:
tierno1ec592d2020-06-16 15:29:47 +00003412 sf = {}
sousaedu80135b92021-02-17 15:05:18 +01003413
borsatti8a2dda32019-12-18 15:08:57 +00003414 try:
3415 sf_vim = self.get_sf(sf_id)
sousaedu80135b92021-02-17 15:05:18 +01003416
borsatti8a2dda32019-12-18 15:08:57 +00003417 if sf_vim:
sousaedu80135b92021-02-17 15:05:18 +01003418 sf["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003419 else:
sousaedu80135b92021-02-17 15:05:18 +01003420 sf["status"] = "OTHER"
3421 sf["error_msg"] = "VIM status reported " + sf_vim["status"]
borsatti8a2dda32019-12-18 15:08:57 +00003422
sousaedu80135b92021-02-17 15:05:18 +01003423 sf["vim_info"] = self.serialize(sf_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003424
sousaedu80135b92021-02-17 15:05:18 +01003425 if sf_vim.get("fault"):
3426 sf["error_msg"] = str(sf_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003427 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003428 self.logger.error("Exception getting sf status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003429 sf["status"] = "DELETED"
3430 sf["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003431 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003432 self.logger.error("Exception getting sf status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003433 sf["status"] = "VIM_ERROR"
3434 sf["error_msg"] = str(e)
3435
borsatti8a2dda32019-12-18 15:08:57 +00003436 sf_dict[sf_id] = sf
sousaedu80135b92021-02-17 15:05:18 +01003437
borsatti8a2dda32019-12-18 15:08:57 +00003438 return sf_dict
3439
borsatti8a2dda32019-12-18 15:08:57 +00003440 def refresh_classifications_status(self, classification_list):
tierno1ec592d2020-06-16 15:29:47 +00003441 """Get the status of the classifications
sousaedu80135b92021-02-17 15:05:18 +01003442 Params: the list of classification identifiers
3443 Returns a dictionary with:
3444 vm_id: #VIM id of this classifier
3445 status: #Mandatory. Text with one of:
3446 # DELETED (not found at vim)
3447 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3448 # OTHER (Vim reported other status not understood)
3449 # ERROR (VIM indicates an ERROR status)
3450 # ACTIVE,
3451 # CREATING (on building process)
3452 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3453 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00003454 """
3455 classification_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01003456 self.logger.debug(
3457 "refresh_classifications status: Getting tenant classification information from VIM"
3458 )
3459
borsatti8a2dda32019-12-18 15:08:57 +00003460 for classification_id in classification_list:
tierno1ec592d2020-06-16 15:29:47 +00003461 classification = {}
sousaedu80135b92021-02-17 15:05:18 +01003462
borsatti8a2dda32019-12-18 15:08:57 +00003463 try:
3464 classification_vim = self.get_classification(classification_id)
sousaedu80135b92021-02-17 15:05:18 +01003465
borsatti8a2dda32019-12-18 15:08:57 +00003466 if classification_vim:
sousaedu80135b92021-02-17 15:05:18 +01003467 classification["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003468 else:
sousaedu80135b92021-02-17 15:05:18 +01003469 classification["status"] = "OTHER"
3470 classification["error_msg"] = (
3471 "VIM status reported " + classification["status"]
3472 )
borsatti8a2dda32019-12-18 15:08:57 +00003473
sousaedu80135b92021-02-17 15:05:18 +01003474 classification["vim_info"] = self.serialize(classification_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003475
sousaedu80135b92021-02-17 15:05:18 +01003476 if classification_vim.get("fault"):
3477 classification["error_msg"] = str(classification_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003478 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003479 self.logger.error("Exception getting classification status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003480 classification["status"] = "DELETED"
3481 classification["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003482 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003483 self.logger.error("Exception getting classification status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003484 classification["status"] = "VIM_ERROR"
3485 classification["error_msg"] = str(e)
3486
borsatti8a2dda32019-12-18 15:08:57 +00003487 classification_dict[classification_id] = classification
sousaedu80135b92021-02-17 15:05:18 +01003488
borsatti8a2dda32019-12-18 15:08:57 +00003489 return classification_dict
Alexis Romero73993212022-04-13 18:03:30 +02003490
3491 def new_affinity_group(self, affinity_group_data):
3492 """Adds a server group to VIM
3493 affinity_group_data contains a dictionary with information, keys:
3494 name: name in VIM for the server group
3495 type: affinity or anti-affinity
3496 scope: Only nfvi-node allowed
3497 Returns the server group identifier"""
3498 self.logger.debug("Adding Server Group '%s'", str(affinity_group_data))
3499
3500 try:
3501 name = affinity_group_data["name"]
3502 policy = affinity_group_data["type"]
3503
3504 self._reload_connection()
3505 new_server_group = self.nova.server_groups.create(name, policy)
3506
3507 return new_server_group.id
3508 except (
3509 ksExceptions.ClientException,
3510 nvExceptions.ClientException,
3511 ConnectionError,
3512 KeyError,
3513 ) as e:
3514 self._format_exception(e)
3515
3516 def get_affinity_group(self, affinity_group_id):
3517 """Obtain server group details from the VIM. Returns the server group detais as a dict"""
3518 self.logger.debug("Getting flavor '%s'", affinity_group_id)
3519 try:
3520 self._reload_connection()
3521 server_group = self.nova.server_groups.find(id=affinity_group_id)
3522
3523 return server_group.to_dict()
3524 except (
3525 nvExceptions.NotFound,
3526 nvExceptions.ClientException,
3527 ksExceptions.ClientException,
3528 ConnectionError,
3529 ) as e:
3530 self._format_exception(e)
3531
3532 def delete_affinity_group(self, affinity_group_id):
3533 """Deletes a server group from the VIM. Returns the old affinity_group_id"""
3534 self.logger.debug("Getting server group '%s'", affinity_group_id)
3535 try:
3536 self._reload_connection()
3537 self.nova.server_groups.delete(affinity_group_id)
3538
3539 return affinity_group_id
3540 except (
3541 nvExceptions.NotFound,
3542 ksExceptions.ClientException,
3543 nvExceptions.ClientException,
3544 ConnectionError,
3545 ) as e:
3546 self._format_exception(e)