blob: 9faf98d4f7b90d9ad0246cedd8825d48ca9a68e2 [file] [log] [blame]
tierno7edb6752016-03-21 17:37:52 +01001# -*- coding: utf-8 -*-
2
3##
tierno92021022018-09-12 16:29:23 +02004# Copyright 2015 Telefonica Investigacion y Desarrollo, S.A.U.
tierno7edb6752016-03-21 17:37:52 +01005# This file is part of openmano
6# All Rights Reserved.
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License. You may obtain
10# a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
17# License for the specific language governing permissions and limitations
18# under the License.
tierno7edb6752016-03-21 17:37:52 +010019##
20
tierno1ec592d2020-06-16 15:29:47 +000021"""
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +000022osconnector implements all the methods to interact with openstack using the python-neutronclient.
23
24For the VNF forwarding graph, The OpenStack VIM connector calls the
25networking-sfc Neutron extension methods, whose resources are mapped
26to the VIM connector's SFC resources as follows:
27- Classification (OSM) -> Flow Classifier (Neutron)
28- Service Function Instance (OSM) -> Port Pair (Neutron)
29- Service Function (OSM) -> Port Pair Group (Neutron)
30- Service Function Path (OSM) -> Port Chain (Neutron)
tierno1ec592d2020-06-16 15:29:47 +000031"""
tierno7edb6752016-03-21 17:37:52 +010032
sousaedu049cbb12022-01-05 11:39:35 +000033import copy
34from http.client import HTTPException
elumalai8658c2c2022-04-28 19:09:31 +053035import json
tiernoae4a8d12016-07-08 12:30:39 +020036import logging
sousaedu049cbb12022-01-05 11:39:35 +000037from pprint import pformat
garciadeblas2299e3b2017-01-26 14:35:55 +000038import random
kate721d79b2017-06-24 04:21:38 -070039import re
sousaedu049cbb12022-01-05 11:39:35 +000040import time
Gulsum Atici4415c4c2023-01-19 12:44:06 +030041from typing import Dict, List, Optional, Tuple
sousaedu049cbb12022-01-05 11:39:35 +000042
43from cinderclient import client as cClient
tiernob5cef372017-06-19 15:52:22 +020044from glanceclient import client as glClient
tierno7edb6752016-03-21 17:37:52 +010045import glanceclient.exc as gl1Exceptions
sousaedu049cbb12022-01-05 11:39:35 +000046from keystoneauth1 import session
47from keystoneauth1.identity import v2, v3
48import keystoneclient.exceptions as ksExceptions
49import keystoneclient.v2_0.client as ksClient_v2
50import keystoneclient.v3.client as ksClient_v3
51import netaddr
tierno7edb6752016-03-21 17:37:52 +010052from neutronclient.common import exceptions as neExceptions
sousaedu049cbb12022-01-05 11:39:35 +000053from neutronclient.neutron import client as neClient
54from novaclient import client as nClient, exceptions as nvExceptions
55from osm_ro_plugin import vimconn
tierno7edb6752016-03-21 17:37:52 +010056from requests.exceptions import ConnectionError
sousaedu049cbb12022-01-05 11:39:35 +000057import yaml
tierno7edb6752016-03-21 17:37:52 +010058
tierno1ec592d2020-06-16 15:29:47 +000059__author__ = "Alfonso Tierno, Gerardo Garcia, Pablo Montes, xFlow Research, Igor D.C., Eduardo Sousa"
60__date__ = "$22-sep-2017 23:59:59$"
tierno40e1bce2017-08-09 09:12:04 +020061
62"""contain the openstack virtual machine status to openmano status"""
sousaedu80135b92021-02-17 15:05:18 +010063vmStatus2manoFormat = {
64 "ACTIVE": "ACTIVE",
65 "PAUSED": "PAUSED",
66 "SUSPENDED": "SUSPENDED",
67 "SHUTOFF": "INACTIVE",
68 "BUILD": "BUILD",
69 "ERROR": "ERROR",
70 "DELETED": "DELETED",
71}
72netStatus2manoFormat = {
73 "ACTIVE": "ACTIVE",
74 "PAUSED": "PAUSED",
75 "INACTIVE": "INACTIVE",
76 "BUILD": "BUILD",
77 "ERROR": "ERROR",
78 "DELETED": "DELETED",
79}
tierno7edb6752016-03-21 17:37:52 +010080
sousaedu80135b92021-02-17 15:05:18 +010081supportedClassificationTypes = ["legacy_flow_classifier"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +000082
tierno1ec592d2020-06-16 15:29:47 +000083# global var to have a timeout creating and deleting volumes
garciadeblas64b39c52020-05-21 08:07:25 +000084volume_timeout = 1800
85server_timeout = 1800
montesmoreno0c8def02016-12-22 12:16:23 +000086
Anderson Bravalheri0446cd52018-08-17 15:26:19 +010087
88class SafeDumper(yaml.SafeDumper):
89 def represent_data(self, data):
90 # Openstack APIs use custom subclasses of dict and YAML safe dumper
91 # is designed to not handle that (reference issue 142 of pyyaml)
92 if isinstance(data, dict) and data.__class__ != dict:
93 # A simple solution is to convert those items back to dicts
94 data = dict(data.items())
95
96 return super(SafeDumper, self).represent_data(data)
97
98
tierno72774862020-05-04 11:44:15 +000099class vimconnector(vimconn.VimConnector):
sousaedu80135b92021-02-17 15:05:18 +0100100 def __init__(
101 self,
102 uuid,
103 name,
104 tenant_id,
105 tenant_name,
106 url,
107 url_admin=None,
108 user=None,
109 passwd=None,
110 log_level=None,
111 config={},
112 persistent_info={},
113 ):
tierno1ec592d2020-06-16 15:29:47 +0000114 """using common constructor parameters. In this case
tierno7edb6752016-03-21 17:37:52 +0100115 'url' is the keystone authorization url,
116 'url_admin' is not use
tierno1ec592d2020-06-16 15:29:47 +0000117 """
sousaedu80135b92021-02-17 15:05:18 +0100118 api_version = config.get("APIversion")
kate721d79b2017-06-24 04:21:38 -0700119
sousaedu80135b92021-02-17 15:05:18 +0100120 if api_version and api_version not in ("v3.3", "v2.0", "2", "3"):
121 raise vimconn.VimConnException(
122 "Invalid value '{}' for config:APIversion. "
123 "Allowed values are 'v3.3', 'v2.0', '2' or '3'".format(api_version)
124 )
125
126 vim_type = config.get("vim_type")
127
128 if vim_type and vim_type not in ("vio", "VIO"):
129 raise vimconn.VimConnException(
130 "Invalid value '{}' for config:vim_type."
131 "Allowed values are 'vio' or 'VIO'".format(vim_type)
132 )
133
134 if config.get("dataplane_net_vlan_range") is not None:
tierno1ec592d2020-06-16 15:29:47 +0000135 # validate vlan ranges provided by user
sousaedu80135b92021-02-17 15:05:18 +0100136 self._validate_vlan_ranges(
137 config.get("dataplane_net_vlan_range"), "dataplane_net_vlan_range"
138 )
garciadeblasebd66722019-01-31 16:01:31 +0000139
sousaedu80135b92021-02-17 15:05:18 +0100140 if config.get("multisegment_vlan_range") is not None:
tierno1ec592d2020-06-16 15:29:47 +0000141 # validate vlan ranges provided by user
sousaedu80135b92021-02-17 15:05:18 +0100142 self._validate_vlan_ranges(
143 config.get("multisegment_vlan_range"), "multisegment_vlan_range"
144 )
kate721d79b2017-06-24 04:21:38 -0700145
sousaedu80135b92021-02-17 15:05:18 +0100146 vimconn.VimConnector.__init__(
147 self,
148 uuid,
149 name,
150 tenant_id,
151 tenant_name,
152 url,
153 url_admin,
154 user,
155 passwd,
156 log_level,
157 config,
158 )
tiernob3d36742017-03-03 23:51:05 +0100159
tierno4d1ce222018-04-06 10:41:06 +0200160 if self.config.get("insecure") and self.config.get("ca_cert"):
sousaedu80135b92021-02-17 15:05:18 +0100161 raise vimconn.VimConnException(
162 "options insecure and ca_cert are mutually exclusive"
163 )
164
tierno4d1ce222018-04-06 10:41:06 +0200165 self.verify = True
sousaedu80135b92021-02-17 15:05:18 +0100166
tierno4d1ce222018-04-06 10:41:06 +0200167 if self.config.get("insecure"):
168 self.verify = False
sousaedu80135b92021-02-17 15:05:18 +0100169
tierno4d1ce222018-04-06 10:41:06 +0200170 if self.config.get("ca_cert"):
171 self.verify = self.config.get("ca_cert")
tierno4d1ce222018-04-06 10:41:06 +0200172
tierno7edb6752016-03-21 17:37:52 +0100173 if not url:
sousaedu80135b92021-02-17 15:05:18 +0100174 raise TypeError("url param can not be NoneType")
175
tiernob5cef372017-06-19 15:52:22 +0200176 self.persistent_info = persistent_info
sousaedu80135b92021-02-17 15:05:18 +0100177 self.availability_zone = persistent_info.get("availability_zone", None)
178 self.session = persistent_info.get("session", {"reload_client": True})
179 self.my_tenant_id = self.session.get("my_tenant_id")
180 self.nova = self.session.get("nova")
181 self.neutron = self.session.get("neutron")
182 self.cinder = self.session.get("cinder")
183 self.glance = self.session.get("glance")
184 # self.glancev1 = self.session.get("glancev1")
185 self.keystone = self.session.get("keystone")
186 self.api_version3 = self.session.get("api_version3")
kate721d79b2017-06-24 04:21:38 -0700187 self.vim_type = self.config.get("vim_type")
sousaedu80135b92021-02-17 15:05:18 +0100188
kate721d79b2017-06-24 04:21:38 -0700189 if self.vim_type:
190 self.vim_type = self.vim_type.upper()
sousaedu80135b92021-02-17 15:05:18 +0100191
kate721d79b2017-06-24 04:21:38 -0700192 if self.config.get("use_internal_endpoint"):
193 self.endpoint_type = "internalURL"
194 else:
195 self.endpoint_type = None
montesmoreno0c8def02016-12-22 12:16:23 +0000196
sousaedu80135b92021-02-17 15:05:18 +0100197 logging.getLogger("urllib3").setLevel(logging.WARNING)
198 logging.getLogger("keystoneauth").setLevel(logging.WARNING)
199 logging.getLogger("novaclient").setLevel(logging.WARNING)
200 self.logger = logging.getLogger("ro.vim.openstack")
kate721d79b2017-06-24 04:21:38 -0700201
tiernoa05b65a2019-02-01 12:30:27 +0000202 # allow security_groups to be a list or a single string
sousaedu80135b92021-02-17 15:05:18 +0100203 if isinstance(self.config.get("security_groups"), str):
204 self.config["security_groups"] = [self.config["security_groups"]]
205
tiernoa05b65a2019-02-01 12:30:27 +0000206 self.security_groups_id = None
207
tierno1ec592d2020-06-16 15:29:47 +0000208 # ###### VIO Specific Changes #########
kate721d79b2017-06-24 04:21:38 -0700209 if self.vim_type == "VIO":
sousaedu80135b92021-02-17 15:05:18 +0100210 self.logger = logging.getLogger("ro.vim.vio")
kate721d79b2017-06-24 04:21:38 -0700211
tiernofe789902016-09-29 14:20:44 +0000212 if log_level:
tierno1ec592d2020-06-16 15:29:47 +0000213 self.logger.setLevel(getattr(logging, log_level))
tiernof716aea2017-06-21 18:01:40 +0200214
215 def __getitem__(self, index):
216 """Get individuals parameters.
217 Throw KeyError"""
sousaedu80135b92021-02-17 15:05:18 +0100218 if index == "project_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200219 return self.config.get("project_domain_id")
sousaedu80135b92021-02-17 15:05:18 +0100220 elif index == "user_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200221 return self.config.get("user_domain_id")
222 else:
tierno72774862020-05-04 11:44:15 +0000223 return vimconn.VimConnector.__getitem__(self, index)
tiernof716aea2017-06-21 18:01:40 +0200224
225 def __setitem__(self, index, value):
226 """Set individuals parameters and it is marked as dirty so to force connection reload.
227 Throw KeyError"""
sousaedu80135b92021-02-17 15:05:18 +0100228 if index == "project_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200229 self.config["project_domain_id"] = value
sousaedu80135b92021-02-17 15:05:18 +0100230 elif index == "user_domain_id":
tierno1ec592d2020-06-16 15:29:47 +0000231 self.config["user_domain_id"] = value
tiernof716aea2017-06-21 18:01:40 +0200232 else:
tierno72774862020-05-04 11:44:15 +0000233 vimconn.VimConnector.__setitem__(self, index, value)
sousaedu80135b92021-02-17 15:05:18 +0100234
235 self.session["reload_client"] = True
tiernof716aea2017-06-21 18:01:40 +0200236
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100237 def serialize(self, value):
238 """Serialization of python basic types.
239
240 In the case value is not serializable a message will be logged and a
241 simple representation of the data that cannot be converted back to
242 python is returned.
243 """
tierno7d782ef2019-10-04 12:56:31 +0000244 if isinstance(value, str):
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100245 return value
246
247 try:
sousaedu80135b92021-02-17 15:05:18 +0100248 return yaml.dump(
249 value, Dumper=SafeDumper, default_flow_style=True, width=256
250 )
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100251 except yaml.representer.RepresenterError:
sousaedu80135b92021-02-17 15:05:18 +0100252 self.logger.debug(
253 "The following entity cannot be serialized in YAML:\n\n%s\n\n",
254 pformat(value),
255 exc_info=True,
256 )
257
tierno1ec592d2020-06-16 15:29:47 +0000258 return str(value)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100259
tierno7edb6752016-03-21 17:37:52 +0100260 def _reload_connection(self):
tierno1ec592d2020-06-16 15:29:47 +0000261 """Called before any operation, it check if credentials has changed
tierno7edb6752016-03-21 17:37:52 +0100262 Throw keystoneclient.apiclient.exceptions.AuthorizationFailure
tierno1ec592d2020-06-16 15:29:47 +0000263 """
264 # TODO control the timing and possible token timeout, but it seams that python client does this task for us :-)
sousaedu80135b92021-02-17 15:05:18 +0100265 if self.session["reload_client"]:
266 if self.config.get("APIversion"):
267 self.api_version3 = (
268 self.config["APIversion"] == "v3.3"
269 or self.config["APIversion"] == "3"
270 )
tiernof716aea2017-06-21 18:01:40 +0200271 else: # get from ending auth_url that end with v3 or with v2.0
sousaedu80135b92021-02-17 15:05:18 +0100272 self.api_version3 = self.url.endswith("/v3") or self.url.endswith(
273 "/v3/"
274 )
275
276 self.session["api_version3"] = self.api_version3
277
tiernof716aea2017-06-21 18:01:40 +0200278 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100279 if self.config.get("project_domain_id") or self.config.get(
280 "project_domain_name"
281 ):
tierno3cb8dc32017-10-24 18:13:19 +0200282 project_domain_id_default = None
283 else:
sousaedu80135b92021-02-17 15:05:18 +0100284 project_domain_id_default = "default"
285
286 if self.config.get("user_domain_id") or self.config.get(
287 "user_domain_name"
288 ):
tierno3cb8dc32017-10-24 18:13:19 +0200289 user_domain_id_default = None
290 else:
sousaedu80135b92021-02-17 15:05:18 +0100291 user_domain_id_default = "default"
292 auth = v3.Password(
293 auth_url=self.url,
294 username=self.user,
295 password=self.passwd,
296 project_name=self.tenant_name,
297 project_id=self.tenant_id,
298 project_domain_id=self.config.get(
299 "project_domain_id", project_domain_id_default
300 ),
301 user_domain_id=self.config.get(
302 "user_domain_id", user_domain_id_default
303 ),
304 project_domain_name=self.config.get("project_domain_name"),
305 user_domain_name=self.config.get("user_domain_name"),
306 )
ahmadsa95baa272016-11-30 09:14:11 +0500307 else:
sousaedu80135b92021-02-17 15:05:18 +0100308 auth = v2.Password(
309 auth_url=self.url,
310 username=self.user,
311 password=self.passwd,
312 tenant_name=self.tenant_name,
313 tenant_id=self.tenant_id,
314 )
315
tierno4d1ce222018-04-06 10:41:06 +0200316 sess = session.Session(auth=auth, verify=self.verify)
tierno1ec592d2020-06-16 15:29:47 +0000317 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
318 # Titanium cloud and StarlingX
sousaedu80135b92021-02-17 15:05:18 +0100319 region_name = self.config.get("region_name")
320
tiernof716aea2017-06-21 18:01:40 +0200321 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100322 self.keystone = ksClient_v3.Client(
323 session=sess,
324 endpoint_type=self.endpoint_type,
325 region_name=region_name,
326 )
tiernof716aea2017-06-21 18:01:40 +0200327 else:
sousaedu80135b92021-02-17 15:05:18 +0100328 self.keystone = ksClient_v2.Client(
329 session=sess, endpoint_type=self.endpoint_type
330 )
331
332 self.session["keystone"] = self.keystone
333 # In order to enable microversion functionality an explicit microversion must be specified in "config".
montesmoreno9317d302017-08-16 12:48:23 +0200334 # This implementation approach is due to the warning message in
335 # https://developer.openstack.org/api-guide/compute/microversions.html
336 # where it is stated that microversion backwards compatibility is not guaranteed and clients should
337 # always require an specific microversion.
sousaedu80135b92021-02-17 15:05:18 +0100338 # To be able to use "device role tagging" functionality define "microversion: 2.32" in datacenter config
montesmoreno9317d302017-08-16 12:48:23 +0200339 version = self.config.get("microversion")
sousaedu80135b92021-02-17 15:05:18 +0100340
montesmoreno9317d302017-08-16 12:48:23 +0200341 if not version:
342 version = "2.1"
sousaedu80135b92021-02-17 15:05:18 +0100343
tierno1ec592d2020-06-16 15:29:47 +0000344 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
345 # Titanium cloud and StarlingX
sousaedu80135b92021-02-17 15:05:18 +0100346 self.nova = self.session["nova"] = nClient.Client(
347 str(version),
348 session=sess,
349 endpoint_type=self.endpoint_type,
350 region_name=region_name,
351 )
352 self.neutron = self.session["neutron"] = neClient.Client(
353 "2.0",
354 session=sess,
355 endpoint_type=self.endpoint_type,
356 region_name=region_name,
357 )
358 self.cinder = self.session["cinder"] = cClient.Client(
359 2,
360 session=sess,
361 endpoint_type=self.endpoint_type,
362 region_name=region_name,
363 )
364
tiernoa05b65a2019-02-01 12:30:27 +0000365 try:
sousaedu80135b92021-02-17 15:05:18 +0100366 self.my_tenant_id = self.session["my_tenant_id"] = sess.get_project_id()
tierno1ec592d2020-06-16 15:29:47 +0000367 except Exception:
tiernoa05b65a2019-02-01 12:30:27 +0000368 self.logger.error("Cannot get project_id from session", exc_info=True)
sousaedu80135b92021-02-17 15:05:18 +0100369
kate721d79b2017-06-24 04:21:38 -0700370 if self.endpoint_type == "internalURL":
371 glance_service_id = self.keystone.services.list(name="glance")[0].id
sousaedu80135b92021-02-17 15:05:18 +0100372 glance_endpoint = self.keystone.endpoints.list(
373 glance_service_id, interface="internal"
374 )[0].url
kate721d79b2017-06-24 04:21:38 -0700375 else:
376 glance_endpoint = None
sousaedu80135b92021-02-17 15:05:18 +0100377
378 self.glance = self.session["glance"] = glClient.Client(
379 2, session=sess, endpoint=glance_endpoint
380 )
tiernoa05b65a2019-02-01 12:30:27 +0000381 # using version 1 of glance client in new_image()
sousaedu80135b92021-02-17 15:05:18 +0100382 # self.glancev1 = self.session["glancev1"] = glClient.Client("1", session=sess,
tierno1beea862018-07-11 15:47:37 +0200383 # endpoint=glance_endpoint)
sousaedu80135b92021-02-17 15:05:18 +0100384 self.session["reload_client"] = False
385 self.persistent_info["session"] = self.session
mirabal29356312017-07-27 12:21:22 +0200386 # add availablity zone info inside self.persistent_info
387 self._set_availablity_zones()
sousaedu80135b92021-02-17 15:05:18 +0100388 self.persistent_info["availability_zone"] = self.availability_zone
389 # force to get again security_groups_ids next time they are needed
390 self.security_groups_id = None
ahmadsa95baa272016-11-30 09:14:11 +0500391
tierno7edb6752016-03-21 17:37:52 +0100392 def __net_os2mano(self, net_list_dict):
tierno1ec592d2020-06-16 15:29:47 +0000393 """Transform the net openstack format to mano format
394 net_list_dict can be a list of dict or a single dict"""
tierno7edb6752016-03-21 17:37:52 +0100395 if type(net_list_dict) is dict:
tierno1ec592d2020-06-16 15:29:47 +0000396 net_list_ = (net_list_dict,)
tierno7edb6752016-03-21 17:37:52 +0100397 elif type(net_list_dict) is list:
tierno1ec592d2020-06-16 15:29:47 +0000398 net_list_ = net_list_dict
tierno7edb6752016-03-21 17:37:52 +0100399 else:
400 raise TypeError("param net_list_dict must be a list or a dictionary")
401 for net in net_list_:
sousaedu80135b92021-02-17 15:05:18 +0100402 if net.get("provider:network_type") == "vlan":
403 net["type"] = "data"
tierno7edb6752016-03-21 17:37:52 +0100404 else:
sousaedu80135b92021-02-17 15:05:18 +0100405 net["type"] = "bridge"
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +0200406
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000407 def __classification_os2mano(self, class_list_dict):
408 """Transform the openstack format (Flow Classifier) to mano format
409 (Classification) class_list_dict can be a list of dict or a single dict
410 """
411 if isinstance(class_list_dict, dict):
412 class_list_ = [class_list_dict]
413 elif isinstance(class_list_dict, list):
414 class_list_ = class_list_dict
415 else:
tierno1ec592d2020-06-16 15:29:47 +0000416 raise TypeError("param class_list_dict must be a list or a dictionary")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000417 for classification in class_list_:
sousaedu80135b92021-02-17 15:05:18 +0100418 id = classification.pop("id")
419 name = classification.pop("name")
420 description = classification.pop("description")
421 project_id = classification.pop("project_id")
422 tenant_id = classification.pop("tenant_id")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000423 original_classification = copy.deepcopy(classification)
424 classification.clear()
sousaedu80135b92021-02-17 15:05:18 +0100425 classification["ctype"] = "legacy_flow_classifier"
426 classification["definition"] = original_classification
427 classification["id"] = id
428 classification["name"] = name
429 classification["description"] = description
430 classification["project_id"] = project_id
431 classification["tenant_id"] = tenant_id
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000432
433 def __sfi_os2mano(self, sfi_list_dict):
434 """Transform the openstack format (Port Pair) to mano format (SFI)
435 sfi_list_dict can be a list of dict or a single dict
436 """
437 if isinstance(sfi_list_dict, dict):
438 sfi_list_ = [sfi_list_dict]
439 elif isinstance(sfi_list_dict, list):
440 sfi_list_ = sfi_list_dict
441 else:
sousaedu80135b92021-02-17 15:05:18 +0100442 raise TypeError("param sfi_list_dict must be a list or a dictionary")
443
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000444 for sfi in sfi_list_:
sousaedu80135b92021-02-17 15:05:18 +0100445 sfi["ingress_ports"] = []
446 sfi["egress_ports"] = []
447
448 if sfi.get("ingress"):
449 sfi["ingress_ports"].append(sfi["ingress"])
450
451 if sfi.get("egress"):
452 sfi["egress_ports"].append(sfi["egress"])
453
454 del sfi["ingress"]
455 del sfi["egress"]
456 params = sfi.get("service_function_parameters")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000457 sfc_encap = False
sousaedu80135b92021-02-17 15:05:18 +0100458
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000459 if params:
sousaedu80135b92021-02-17 15:05:18 +0100460 correlation = params.get("correlation")
461
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000462 if correlation:
463 sfc_encap = True
sousaedu80135b92021-02-17 15:05:18 +0100464
465 sfi["sfc_encap"] = sfc_encap
466 del sfi["service_function_parameters"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000467
468 def __sf_os2mano(self, sf_list_dict):
469 """Transform the openstack format (Port Pair Group) to mano format (SF)
470 sf_list_dict can be a list of dict or a single dict
471 """
472 if isinstance(sf_list_dict, dict):
473 sf_list_ = [sf_list_dict]
474 elif isinstance(sf_list_dict, list):
475 sf_list_ = sf_list_dict
476 else:
sousaedu80135b92021-02-17 15:05:18 +0100477 raise TypeError("param sf_list_dict must be a list or a dictionary")
478
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000479 for sf in sf_list_:
sousaedu80135b92021-02-17 15:05:18 +0100480 del sf["port_pair_group_parameters"]
481 sf["sfis"] = sf["port_pairs"]
482 del sf["port_pairs"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000483
484 def __sfp_os2mano(self, sfp_list_dict):
485 """Transform the openstack format (Port Chain) to mano format (SFP)
486 sfp_list_dict can be a list of dict or a single dict
487 """
488 if isinstance(sfp_list_dict, dict):
489 sfp_list_ = [sfp_list_dict]
490 elif isinstance(sfp_list_dict, list):
491 sfp_list_ = sfp_list_dict
492 else:
sousaedu80135b92021-02-17 15:05:18 +0100493 raise TypeError("param sfp_list_dict must be a list or a dictionary")
494
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000495 for sfp in sfp_list_:
sousaedu80135b92021-02-17 15:05:18 +0100496 params = sfp.pop("chain_parameters")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000497 sfc_encap = False
sousaedu80135b92021-02-17 15:05:18 +0100498
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000499 if params:
sousaedu80135b92021-02-17 15:05:18 +0100500 correlation = params.get("correlation")
501
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000502 if correlation:
503 sfc_encap = True
sousaedu80135b92021-02-17 15:05:18 +0100504
505 sfp["sfc_encap"] = sfc_encap
506 sfp["spi"] = sfp.pop("chain_id")
507 sfp["classifications"] = sfp.pop("flow_classifiers")
508 sfp["service_functions"] = sfp.pop("port_pair_groups")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000509
510 # placeholder for now; read TODO note below
511 def _validate_classification(self, type, definition):
512 # only legacy_flow_classifier Type is supported at this point
513 return True
514 # TODO(igordcard): this method should be an abstract method of an
515 # abstract Classification class to be implemented by the specific
516 # Types. Also, abstract vimconnector should call the validation
517 # method before the implemented VIM connectors are called.
518
tiernoae4a8d12016-07-08 12:30:39 +0200519 def _format_exception(self, exception):
tierno69647792020-03-05 16:45:48 +0000520 """Transform a keystone, nova, neutron exception into a vimconn exception discovering the cause"""
tierno69647792020-03-05 16:45:48 +0000521 message_error = str(exception)
tierno5ad826a2020-08-11 11:19:44 +0000522 tip = ""
tiernode12f782019-04-05 12:46:42 +0000523
sousaedu80135b92021-02-17 15:05:18 +0100524 if isinstance(
525 exception,
526 (
527 neExceptions.NetworkNotFoundClient,
528 nvExceptions.NotFound,
529 ksExceptions.NotFound,
530 gl1Exceptions.HTTPNotFound,
531 ),
532 ):
533 raise vimconn.VimConnNotFoundException(
534 type(exception).__name__ + ": " + message_error
535 )
536 elif isinstance(
537 exception,
538 (
539 HTTPException,
540 gl1Exceptions.HTTPException,
541 gl1Exceptions.CommunicationError,
542 ConnectionError,
543 ksExceptions.ConnectionError,
544 neExceptions.ConnectionFailed,
545 ),
546 ):
tierno5ad826a2020-08-11 11:19:44 +0000547 if type(exception).__name__ == "SSLError":
548 tip = " (maybe option 'insecure' must be added to the VIM)"
sousaedu80135b92021-02-17 15:05:18 +0100549
550 raise vimconn.VimConnConnectionException(
551 "Invalid URL or credentials{}: {}".format(tip, message_error)
552 )
553 elif isinstance(
554 exception,
555 (
556 KeyError,
557 nvExceptions.BadRequest,
558 ksExceptions.BadRequest,
559 ),
560 ):
561 raise vimconn.VimConnException(
562 type(exception).__name__ + ": " + message_error
563 )
564 elif isinstance(
565 exception,
566 (
567 nvExceptions.ClientException,
568 ksExceptions.ClientException,
569 neExceptions.NeutronException,
570 ),
571 ):
572 raise vimconn.VimConnUnexpectedResponse(
573 type(exception).__name__ + ": " + message_error
574 )
tiernoae4a8d12016-07-08 12:30:39 +0200575 elif isinstance(exception, nvExceptions.Conflict):
sousaedu80135b92021-02-17 15:05:18 +0100576 raise vimconn.VimConnConflictException(
577 type(exception).__name__ + ": " + message_error
578 )
tierno72774862020-05-04 11:44:15 +0000579 elif isinstance(exception, vimconn.VimConnException):
tierno41a69812018-02-16 14:34:33 +0100580 raise exception
tiernof716aea2017-06-21 18:01:40 +0200581 else: # ()
tiernode12f782019-04-05 12:46:42 +0000582 self.logger.error("General Exception " + message_error, exc_info=True)
sousaedu80135b92021-02-17 15:05:18 +0100583
584 raise vimconn.VimConnConnectionException(
585 type(exception).__name__ + ": " + message_error
586 )
tiernoae4a8d12016-07-08 12:30:39 +0200587
tiernoa05b65a2019-02-01 12:30:27 +0000588 def _get_ids_from_name(self):
589 """
590 Obtain ids from name of tenant and security_groups. Store at self .security_groups_id"
591 :return: None
592 """
593 # get tenant_id if only tenant_name is supplied
594 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100595
tiernoa05b65a2019-02-01 12:30:27 +0000596 if not self.my_tenant_id:
sousaedu80135b92021-02-17 15:05:18 +0100597 raise vimconn.VimConnConnectionException(
598 "Error getting tenant information from name={} id={}".format(
599 self.tenant_name, self.tenant_id
600 )
601 )
602
603 if self.config.get("security_groups") and not self.security_groups_id:
tiernoa05b65a2019-02-01 12:30:27 +0000604 # convert from name to id
sousaedu80135b92021-02-17 15:05:18 +0100605 neutron_sg_list = self.neutron.list_security_groups(
606 tenant_id=self.my_tenant_id
607 )["security_groups"]
tiernoa05b65a2019-02-01 12:30:27 +0000608
609 self.security_groups_id = []
sousaedu80135b92021-02-17 15:05:18 +0100610 for sg in self.config.get("security_groups"):
tiernoa05b65a2019-02-01 12:30:27 +0000611 for neutron_sg in neutron_sg_list:
612 if sg in (neutron_sg["id"], neutron_sg["name"]):
613 self.security_groups_id.append(neutron_sg["id"])
614 break
615 else:
616 self.security_groups_id = None
sousaedu80135b92021-02-17 15:05:18 +0100617
618 raise vimconn.VimConnConnectionException(
619 "Not found security group {} for this tenant".format(sg)
620 )
tiernoa05b65a2019-02-01 12:30:27 +0000621
tierno5509c2e2019-07-04 16:23:20 +0000622 def check_vim_connectivity(self):
623 # just get network list to check connectivity and credentials
624 self.get_network_list(filter_dict={})
625
tiernoae4a8d12016-07-08 12:30:39 +0200626 def get_tenant_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +0000627 """Obtain tenants of VIM
tiernoae4a8d12016-07-08 12:30:39 +0200628 filter_dict can contain the following keys:
629 name: filter by tenant name
630 id: filter by tenant uuid/id
631 <other VIM specific>
632 Returns the tenant list of dictionaries: [{'name':'<name>, 'id':'<id>, ...}, ...]
tierno1ec592d2020-06-16 15:29:47 +0000633 """
ahmadsa95baa272016-11-30 09:14:11 +0500634 self.logger.debug("Getting tenants from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +0100635
tiernoae4a8d12016-07-08 12:30:39 +0200636 try:
637 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100638
tiernof716aea2017-06-21 18:01:40 +0200639 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100640 project_class_list = self.keystone.projects.list(
641 name=filter_dict.get("name")
642 )
ahmadsa95baa272016-11-30 09:14:11 +0500643 else:
tiernof716aea2017-06-21 18:01:40 +0200644 project_class_list = self.keystone.tenants.findall(**filter_dict)
sousaedu80135b92021-02-17 15:05:18 +0100645
tierno1ec592d2020-06-16 15:29:47 +0000646 project_list = []
sousaedu80135b92021-02-17 15:05:18 +0100647
ahmadsa95baa272016-11-30 09:14:11 +0500648 for project in project_class_list:
sousaedu80135b92021-02-17 15:05:18 +0100649 if filter_dict.get("id") and filter_dict["id"] != project.id:
tiernof716aea2017-06-21 18:01:40 +0200650 continue
sousaedu80135b92021-02-17 15:05:18 +0100651
ahmadsa95baa272016-11-30 09:14:11 +0500652 project_list.append(project.to_dict())
sousaedu80135b92021-02-17 15:05:18 +0100653
ahmadsa95baa272016-11-30 09:14:11 +0500654 return project_list
sousaedu80135b92021-02-17 15:05:18 +0100655 except (
656 ksExceptions.ConnectionError,
657 ksExceptions.ClientException,
658 ConnectionError,
659 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200660 self._format_exception(e)
661
662 def new_tenant(self, tenant_name, tenant_description):
tierno1ec592d2020-06-16 15:29:47 +0000663 """Adds a new tenant to openstack VIM. Returns the tenant identifier"""
tiernoae4a8d12016-07-08 12:30:39 +0200664 self.logger.debug("Adding a new tenant name: %s", tenant_name)
sousaedu80135b92021-02-17 15:05:18 +0100665
tiernoae4a8d12016-07-08 12:30:39 +0200666 try:
667 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100668
tiernof716aea2017-06-21 18:01:40 +0200669 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100670 project = self.keystone.projects.create(
671 tenant_name,
672 self.config.get("project_domain_id", "default"),
673 description=tenant_description,
674 is_domain=False,
675 )
ahmadsa95baa272016-11-30 09:14:11 +0500676 else:
tiernof716aea2017-06-21 18:01:40 +0200677 project = self.keystone.tenants.create(tenant_name, tenant_description)
sousaedu80135b92021-02-17 15:05:18 +0100678
ahmadsa95baa272016-11-30 09:14:11 +0500679 return project.id
sousaedu80135b92021-02-17 15:05:18 +0100680 except (
681 ksExceptions.ConnectionError,
682 ksExceptions.ClientException,
683 ksExceptions.BadRequest,
684 ConnectionError,
685 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200686 self._format_exception(e)
687
688 def delete_tenant(self, tenant_id):
tierno1ec592d2020-06-16 15:29:47 +0000689 """Delete a tenant from openstack VIM. Returns the old tenant identifier"""
tiernoae4a8d12016-07-08 12:30:39 +0200690 self.logger.debug("Deleting tenant %s from VIM", tenant_id)
sousaedu80135b92021-02-17 15:05:18 +0100691
tiernoae4a8d12016-07-08 12:30:39 +0200692 try:
693 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100694
tiernof716aea2017-06-21 18:01:40 +0200695 if self.api_version3:
ahmadsa95baa272016-11-30 09:14:11 +0500696 self.keystone.projects.delete(tenant_id)
697 else:
698 self.keystone.tenants.delete(tenant_id)
sousaedu80135b92021-02-17 15:05:18 +0100699
tiernoae4a8d12016-07-08 12:30:39 +0200700 return tenant_id
sousaedu80135b92021-02-17 15:05:18 +0100701 except (
702 ksExceptions.ConnectionError,
703 ksExceptions.ClientException,
704 ksExceptions.NotFound,
705 ConnectionError,
706 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200707 self._format_exception(e)
ahmadsa95baa272016-11-30 09:14:11 +0500708
sousaedu80135b92021-02-17 15:05:18 +0100709 def new_network(
710 self,
711 net_name,
712 net_type,
713 ip_profile=None,
714 shared=False,
715 provider_network_profile=None,
716 ):
garciadeblasebd66722019-01-31 16:01:31 +0000717 """Adds a tenant network to VIM
718 Params:
719 'net_name': name of the network
720 'net_type': one of:
721 'bridge': overlay isolated network
722 'data': underlay E-LAN network for Passthrough and SRIOV interfaces
723 'ptp': underlay E-LINE network for Passthrough and SRIOV interfaces.
724 'ip_profile': is a dict containing the IP parameters of the network
725 'ip_version': can be "IPv4" or "IPv6" (Currently only IPv4 is implemented)
726 'subnet_address': ip_prefix_schema, that is X.X.X.X/Y
727 'gateway_address': (Optional) ip_schema, that is X.X.X.X
728 'dns_address': (Optional) comma separated list of ip_schema, e.g. X.X.X.X[,X,X,X,X]
729 'dhcp_enabled': True or False
730 'dhcp_start_address': ip_schema, first IP to grant
731 'dhcp_count': number of IPs to grant.
732 'shared': if this network can be seen/use by other tenants/organization
garciadeblas4af0d542020-02-18 16:01:13 +0100733 'provider_network_profile': (optional) contains {segmentation-id: vlan, network-type: vlan|vxlan,
734 physical-network: physnet-label}
garciadeblasebd66722019-01-31 16:01:31 +0000735 Returns a tuple with the network identifier and created_items, or raises an exception on error
736 created_items can be None or a dictionary where this method can include key-values that will be passed to
737 the method delete_network. Can be used to store created segments, created l2gw connections, etc.
738 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
739 as not present.
740 """
sousaedu80135b92021-02-17 15:05:18 +0100741 self.logger.debug(
742 "Adding a new network to VIM name '%s', type '%s'", net_name, net_type
743 )
garciadeblasebd66722019-01-31 16:01:31 +0000744 # self.logger.debug(">>>>>>>>>>>>>>>>>> IP profile %s", str(ip_profile))
kbsuba85c54d2019-10-17 16:30:32 +0000745
tierno7edb6752016-03-21 17:37:52 +0100746 try:
kbsuba85c54d2019-10-17 16:30:32 +0000747 vlan = None
sousaedu80135b92021-02-17 15:05:18 +0100748
kbsuba85c54d2019-10-17 16:30:32 +0000749 if provider_network_profile:
750 vlan = provider_network_profile.get("segmentation-id")
sousaedu80135b92021-02-17 15:05:18 +0100751
garciadeblasedca7b32016-09-29 14:01:52 +0000752 new_net = None
garciadeblasebd66722019-01-31 16:01:31 +0000753 created_items = {}
tierno7edb6752016-03-21 17:37:52 +0100754 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100755 network_dict = {"name": net_name, "admin_state_up": True}
756
Gabriel Cuba0d8ce072022-12-14 18:33:50 -0500757 if net_type in ("data", "ptp") or provider_network_profile:
tierno6869ae72020-01-09 17:37:34 +0000758 provider_physical_network = None
sousaedu80135b92021-02-17 15:05:18 +0100759
760 if provider_network_profile and provider_network_profile.get(
761 "physical-network"
762 ):
763 provider_physical_network = provider_network_profile.get(
764 "physical-network"
765 )
766
tierno6869ae72020-01-09 17:37:34 +0000767 # provider-network must be one of the dataplane_physcial_netowrk if this is a list. If it is string
768 # or not declared, just ignore the checking
sousaedu80135b92021-02-17 15:05:18 +0100769 if (
770 isinstance(
771 self.config.get("dataplane_physical_net"), (tuple, list)
772 )
773 and provider_physical_network
774 not in self.config["dataplane_physical_net"]
775 ):
tierno72774862020-05-04 11:44:15 +0000776 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100777 "Invalid parameter 'provider-network:physical-network' "
778 "for network creation. '{}' is not one of the declared "
779 "list at VIM_config:dataplane_physical_net".format(
780 provider_physical_network
781 )
782 )
783
784 # use the default dataplane_physical_net
785 if not provider_physical_network:
786 provider_physical_network = self.config.get(
787 "dataplane_physical_net"
788 )
789
tierno6869ae72020-01-09 17:37:34 +0000790 # if it is non empty list, use the first value. If it is a string use the value directly
sousaedu80135b92021-02-17 15:05:18 +0100791 if (
792 isinstance(provider_physical_network, (tuple, list))
793 and provider_physical_network
794 ):
tierno6869ae72020-01-09 17:37:34 +0000795 provider_physical_network = provider_physical_network[0]
796
797 if not provider_physical_network:
tierno5ad826a2020-08-11 11:19:44 +0000798 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100799 "missing information needed for underlay networks. Provide "
800 "'dataplane_physical_net' configuration at VIM or use the NS "
801 "instantiation parameter 'provider-network.physical-network'"
802 " for the VLD"
803 )
tierno6869ae72020-01-09 17:37:34 +0000804
sousaedu80135b92021-02-17 15:05:18 +0100805 if not self.config.get("multisegment_support"):
806 network_dict[
807 "provider:physical_network"
808 ] = provider_physical_network
809
810 if (
811 provider_network_profile
812 and "network-type" in provider_network_profile
813 ):
814 network_dict[
815 "provider:network_type"
816 ] = provider_network_profile["network-type"]
garciadeblas4af0d542020-02-18 16:01:13 +0100817 else:
sousaedu80135b92021-02-17 15:05:18 +0100818 network_dict["provider:network_type"] = self.config.get(
819 "dataplane_network_type", "vlan"
820 )
821
tierno6869ae72020-01-09 17:37:34 +0000822 if vlan:
823 network_dict["provider:segmentation_id"] = vlan
garciadeblasebd66722019-01-31 16:01:31 +0000824 else:
tierno6869ae72020-01-09 17:37:34 +0000825 # Multi-segment case
garciadeblasebd66722019-01-31 16:01:31 +0000826 segment_list = []
tierno6869ae72020-01-09 17:37:34 +0000827 segment1_dict = {
sousaedu80135b92021-02-17 15:05:18 +0100828 "provider:physical_network": "",
829 "provider:network_type": "vxlan",
tierno6869ae72020-01-09 17:37:34 +0000830 }
garciadeblasebd66722019-01-31 16:01:31 +0000831 segment_list.append(segment1_dict)
tierno6869ae72020-01-09 17:37:34 +0000832 segment2_dict = {
833 "provider:physical_network": provider_physical_network,
sousaedu80135b92021-02-17 15:05:18 +0100834 "provider:network_type": "vlan",
tierno6869ae72020-01-09 17:37:34 +0000835 }
sousaedu80135b92021-02-17 15:05:18 +0100836
tierno6869ae72020-01-09 17:37:34 +0000837 if vlan:
838 segment2_dict["provider:segmentation_id"] = vlan
sousaedu80135b92021-02-17 15:05:18 +0100839 elif self.config.get("multisegment_vlan_range"):
garciadeblasebd66722019-01-31 16:01:31 +0000840 vlanID = self._generate_multisegment_vlanID()
841 segment2_dict["provider:segmentation_id"] = vlanID
sousaedu80135b92021-02-17 15:05:18 +0100842
garciadeblasebd66722019-01-31 16:01:31 +0000843 # else
tierno72774862020-05-04 11:44:15 +0000844 # raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100845 # "You must provide "multisegment_vlan_range" at config dict before creating a multisegment
tierno1ec592d2020-06-16 15:29:47 +0000846 # network")
garciadeblasebd66722019-01-31 16:01:31 +0000847 segment_list.append(segment2_dict)
848 network_dict["segments"] = segment_list
kate721d79b2017-06-24 04:21:38 -0700849
tierno6869ae72020-01-09 17:37:34 +0000850 # VIO Specific Changes. It needs a concrete VLAN
851 if self.vim_type == "VIO" and vlan is None:
sousaedu80135b92021-02-17 15:05:18 +0100852 if self.config.get("dataplane_net_vlan_range") is None:
tierno72774862020-05-04 11:44:15 +0000853 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100854 "You must provide 'dataplane_net_vlan_range' in format "
855 "[start_ID - end_ID] at VIM_config for creating underlay "
856 "networks"
857 )
858
tierno6869ae72020-01-09 17:37:34 +0000859 network_dict["provider:segmentation_id"] = self._generate_vlanID()
kate721d79b2017-06-24 04:21:38 -0700860
garciadeblasebd66722019-01-31 16:01:31 +0000861 network_dict["shared"] = shared
sousaedu80135b92021-02-17 15:05:18 +0100862
anwarsff168192019-05-06 11:23:07 +0530863 if self.config.get("disable_network_port_security"):
864 network_dict["port_security_enabled"] = False
sousaedu80135b92021-02-17 15:05:18 +0100865
sousaedu2aa5f802021-06-17 15:39:29 +0100866 if self.config.get("neutron_availability_zone_hints"):
867 hints = self.config.get("neutron_availability_zone_hints")
868
869 if isinstance(hints, str):
870 hints = [hints]
871
872 network_dict["availability_zone_hints"] = hints
873
sousaedu80135b92021-02-17 15:05:18 +0100874 new_net = self.neutron.create_network({"network": network_dict})
garciadeblasebd66722019-01-31 16:01:31 +0000875 # print new_net
876 # create subnetwork, even if there is no profile
sousaedu80135b92021-02-17 15:05:18 +0100877
garciadeblas9f8456e2016-09-05 05:02:59 +0200878 if not ip_profile:
879 ip_profile = {}
sousaedu80135b92021-02-17 15:05:18 +0100880
881 if not ip_profile.get("subnet_address"):
tierno1ec592d2020-06-16 15:29:47 +0000882 # Fake subnet is required
garciadeblas2299e3b2017-01-26 14:35:55 +0000883 subnet_rand = random.randint(0, 255)
sousaedu80135b92021-02-17 15:05:18 +0100884 ip_profile["subnet_address"] = "192.168.{}.0/24".format(subnet_rand)
885
886 if "ip_version" not in ip_profile:
887 ip_profile["ip_version"] = "IPv4"
888
889 subnet = {
890 "name": net_name + "-subnet",
891 "network_id": new_net["network"]["id"],
892 "ip_version": 4 if ip_profile["ip_version"] == "IPv4" else 6,
893 "cidr": ip_profile["subnet_address"],
894 }
895
tiernoa1fb4462017-06-30 12:25:50 +0200896 # Gateway should be set to None if not needed. Otherwise openstack assigns one by default
sousaedu80135b92021-02-17 15:05:18 +0100897 if ip_profile.get("gateway_address"):
898 subnet["gateway_ip"] = ip_profile["gateway_address"]
tierno55d234c2018-07-04 18:29:21 +0200899 else:
sousaedu80135b92021-02-17 15:05:18 +0100900 subnet["gateway_ip"] = None
901
902 if ip_profile.get("dns_address"):
903 subnet["dns_nameservers"] = ip_profile["dns_address"].split(";")
904
905 if "dhcp_enabled" in ip_profile:
906 subnet["enable_dhcp"] = (
907 False
908 if ip_profile["dhcp_enabled"] == "false"
909 or ip_profile["dhcp_enabled"] is False
910 else True
911 )
912
913 if ip_profile.get("dhcp_start_address"):
914 subnet["allocation_pools"] = []
915 subnet["allocation_pools"].append(dict())
916 subnet["allocation_pools"][0]["start"] = ip_profile[
917 "dhcp_start_address"
918 ]
919
920 if ip_profile.get("dhcp_count"):
921 # parts = ip_profile["dhcp_start_address"].split(".")
tierno1ec592d2020-06-16 15:29:47 +0000922 # ip_int = (int(parts[0]) << 24) + (int(parts[1]) << 16) + (int(parts[2]) << 8) + int(parts[3])
sousaedu80135b92021-02-17 15:05:18 +0100923 ip_int = int(netaddr.IPAddress(ip_profile["dhcp_start_address"]))
924 ip_int += ip_profile["dhcp_count"] - 1
garciadeblas9f8456e2016-09-05 05:02:59 +0200925 ip_str = str(netaddr.IPAddress(ip_int))
sousaedu80135b92021-02-17 15:05:18 +0100926 subnet["allocation_pools"][0]["end"] = ip_str
927
tierno1ec592d2020-06-16 15:29:47 +0000928 # self.logger.debug(">>>>>>>>>>>>>>>>>> Subnet: %s", str(subnet))
929 self.neutron.create_subnet({"subnet": subnet})
garciadeblasebd66722019-01-31 16:01:31 +0000930
sousaedu80135b92021-02-17 15:05:18 +0100931 if net_type == "data" and self.config.get("multisegment_support"):
932 if self.config.get("l2gw_support"):
garciadeblasebd66722019-01-31 16:01:31 +0000933 l2gw_list = self.neutron.list_l2_gateways().get("l2_gateways", ())
934 for l2gw in l2gw_list:
tierno1ec592d2020-06-16 15:29:47 +0000935 l2gw_conn = {
936 "l2_gateway_id": l2gw["id"],
937 "network_id": new_net["network"]["id"],
938 "segmentation_id": str(vlanID),
939 }
sousaedu80135b92021-02-17 15:05:18 +0100940 new_l2gw_conn = self.neutron.create_l2_gateway_connection(
941 {"l2_gateway_connection": l2gw_conn}
942 )
943 created_items[
944 "l2gwconn:"
945 + str(new_l2gw_conn["l2_gateway_connection"]["id"])
946 ] = True
947
garciadeblasebd66722019-01-31 16:01:31 +0000948 return new_net["network"]["id"], created_items
tierno41a69812018-02-16 14:34:33 +0100949 except Exception as e:
tierno1ec592d2020-06-16 15:29:47 +0000950 # delete l2gw connections (if any) before deleting the network
garciadeblasebd66722019-01-31 16:01:31 +0000951 for k, v in created_items.items():
952 if not v: # skip already deleted
953 continue
sousaedu80135b92021-02-17 15:05:18 +0100954
garciadeblasebd66722019-01-31 16:01:31 +0000955 try:
956 k_item, _, k_id = k.partition(":")
sousaedu80135b92021-02-17 15:05:18 +0100957
garciadeblasebd66722019-01-31 16:01:31 +0000958 if k_item == "l2gwconn":
959 self.neutron.delete_l2_gateway_connection(k_id)
960 except Exception as e2:
sousaedu80135b92021-02-17 15:05:18 +0100961 self.logger.error(
962 "Error deleting l2 gateway connection: {}: {}".format(
963 type(e2).__name__, e2
964 )
965 )
966
garciadeblasedca7b32016-09-29 14:01:52 +0000967 if new_net:
sousaedu80135b92021-02-17 15:05:18 +0100968 self.neutron.delete_network(new_net["network"]["id"])
969
tiernoae4a8d12016-07-08 12:30:39 +0200970 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +0100971
972 def get_network_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +0000973 """Obtain tenant networks of VIM
tierno7edb6752016-03-21 17:37:52 +0100974 Filter_dict can be:
975 name: network name
976 id: network uuid
977 shared: boolean
978 tenant_id: tenant
979 admin_state_up: boolean
980 status: 'ACTIVE'
981 Returns the network list of dictionaries
tierno1ec592d2020-06-16 15:29:47 +0000982 """
tiernoae4a8d12016-07-08 12:30:39 +0200983 self.logger.debug("Getting network from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +0100984
tierno7edb6752016-03-21 17:37:52 +0100985 try:
986 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +0100987 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +0100988
tierno69b590e2018-03-13 18:52:23 +0100989 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +0100990 # TODO check
991 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
992
tierno69b590e2018-03-13 18:52:23 +0100993 net_dict = self.neutron.list_networks(**filter_dict_os)
tierno00e3df72017-11-29 17:20:13 +0100994 net_list = net_dict["networks"]
tierno7edb6752016-03-21 17:37:52 +0100995 self.__net_os2mano(net_list)
sousaedu80135b92021-02-17 15:05:18 +0100996
tiernoae4a8d12016-07-08 12:30:39 +0200997 return net_list
sousaedu80135b92021-02-17 15:05:18 +0100998 except (
999 neExceptions.ConnectionFailed,
1000 ksExceptions.ClientException,
1001 neExceptions.NeutronException,
1002 ConnectionError,
1003 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001004 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001005
tiernoae4a8d12016-07-08 12:30:39 +02001006 def get_network(self, net_id):
tierno1ec592d2020-06-16 15:29:47 +00001007 """Obtain details of network from VIM
1008 Returns the network information from a network id"""
tiernoae4a8d12016-07-08 12:30:39 +02001009 self.logger.debug(" Getting tenant network %s from VIM", net_id)
tierno1ec592d2020-06-16 15:29:47 +00001010 filter_dict = {"id": net_id}
tiernoae4a8d12016-07-08 12:30:39 +02001011 net_list = self.get_network_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01001012
tierno1ec592d2020-06-16 15:29:47 +00001013 if len(net_list) == 0:
sousaedu80135b92021-02-17 15:05:18 +01001014 raise vimconn.VimConnNotFoundException(
1015 "Network '{}' not found".format(net_id)
1016 )
tierno1ec592d2020-06-16 15:29:47 +00001017 elif len(net_list) > 1:
sousaedu80135b92021-02-17 15:05:18 +01001018 raise vimconn.VimConnConflictException(
1019 "Found more than one network with this criteria"
1020 )
1021
tierno7edb6752016-03-21 17:37:52 +01001022 net = net_list[0]
tierno1ec592d2020-06-16 15:29:47 +00001023 subnets = []
1024 for subnet_id in net.get("subnets", ()):
tierno7edb6752016-03-21 17:37:52 +01001025 try:
1026 subnet = self.neutron.show_subnet(subnet_id)
1027 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01001028 self.logger.error(
1029 "osconnector.get_network(): Error getting subnet %s %s"
1030 % (net_id, str(e))
1031 )
tiernoae4a8d12016-07-08 12:30:39 +02001032 subnet = {"id": subnet_id, "fault": str(e)}
sousaedu80135b92021-02-17 15:05:18 +01001033
tierno7edb6752016-03-21 17:37:52 +01001034 subnets.append(subnet)
sousaedu80135b92021-02-17 15:05:18 +01001035
tierno7edb6752016-03-21 17:37:52 +01001036 net["subnets"] = subnets
sousaedu80135b92021-02-17 15:05:18 +01001037 net["encapsulation"] = net.get("provider:network_type")
1038 net["encapsulation_type"] = net.get("provider:network_type")
1039 net["segmentation_id"] = net.get("provider:segmentation_id")
1040 net["encapsulation_id"] = net.get("provider:segmentation_id")
1041
tiernoae4a8d12016-07-08 12:30:39 +02001042 return net
tierno7edb6752016-03-21 17:37:52 +01001043
garciadeblasebd66722019-01-31 16:01:31 +00001044 def delete_network(self, net_id, created_items=None):
1045 """
1046 Removes a tenant network from VIM and its associated elements
1047 :param net_id: VIM identifier of the network, provided by method new_network
1048 :param created_items: dictionary with extra items to be deleted. provided by method new_network
1049 Returns the network identifier or raises an exception upon error or when network is not found
1050 """
tiernoae4a8d12016-07-08 12:30:39 +02001051 self.logger.debug("Deleting network '%s' from VIM", net_id)
sousaedu80135b92021-02-17 15:05:18 +01001052
tierno1ec592d2020-06-16 15:29:47 +00001053 if created_items is None:
garciadeblasebd66722019-01-31 16:01:31 +00001054 created_items = {}
sousaedu80135b92021-02-17 15:05:18 +01001055
tierno7edb6752016-03-21 17:37:52 +01001056 try:
1057 self._reload_connection()
tierno1ec592d2020-06-16 15:29:47 +00001058 # delete l2gw connections (if any) before deleting the network
garciadeblasebd66722019-01-31 16:01:31 +00001059 for k, v in created_items.items():
1060 if not v: # skip already deleted
1061 continue
sousaedu80135b92021-02-17 15:05:18 +01001062
garciadeblasebd66722019-01-31 16:01:31 +00001063 try:
1064 k_item, _, k_id = k.partition(":")
1065 if k_item == "l2gwconn":
1066 self.neutron.delete_l2_gateway_connection(k_id)
1067 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01001068 self.logger.error(
1069 "Error deleting l2 gateway connection: {}: {}".format(
1070 type(e).__name__, e
1071 )
1072 )
1073
tierno1ec592d2020-06-16 15:29:47 +00001074 # delete VM ports attached to this networks before the network
tierno7edb6752016-03-21 17:37:52 +01001075 ports = self.neutron.list_ports(network_id=net_id)
sousaedu80135b92021-02-17 15:05:18 +01001076 for p in ports["ports"]:
tierno7edb6752016-03-21 17:37:52 +01001077 try:
1078 self.neutron.delete_port(p["id"])
1079 except Exception as e:
tiernoae4a8d12016-07-08 12:30:39 +02001080 self.logger.error("Error deleting port %s: %s", p["id"], str(e))
sousaedu80135b92021-02-17 15:05:18 +01001081
tierno7edb6752016-03-21 17:37:52 +01001082 self.neutron.delete_network(net_id)
sousaedu80135b92021-02-17 15:05:18 +01001083
tiernoae4a8d12016-07-08 12:30:39 +02001084 return net_id
sousaedu80135b92021-02-17 15:05:18 +01001085 except (
1086 neExceptions.ConnectionFailed,
1087 neExceptions.NetworkNotFoundClient,
1088 neExceptions.NeutronException,
1089 ksExceptions.ClientException,
1090 neExceptions.NeutronException,
1091 ConnectionError,
1092 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001093 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001094
tiernoae4a8d12016-07-08 12:30:39 +02001095 def refresh_nets_status(self, net_list):
tierno1ec592d2020-06-16 15:29:47 +00001096 """Get the status of the networks
sousaedu80135b92021-02-17 15:05:18 +01001097 Params: the list of network identifiers
1098 Returns a dictionary with:
1099 net_id: #VIM id of this network
1100 status: #Mandatory. Text with one of:
1101 # DELETED (not found at vim)
1102 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
1103 # OTHER (Vim reported other status not understood)
1104 # ERROR (VIM indicates an ERROR status)
1105 # ACTIVE, INACTIVE, DOWN (admin down),
1106 # BUILD (on building process)
1107 #
1108 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
1109 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00001110 """
1111 net_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01001112
tiernoae4a8d12016-07-08 12:30:39 +02001113 for net_id in net_list:
1114 net = {}
sousaedu80135b92021-02-17 15:05:18 +01001115
tiernoae4a8d12016-07-08 12:30:39 +02001116 try:
1117 net_vim = self.get_network(net_id)
sousaedu80135b92021-02-17 15:05:18 +01001118
1119 if net_vim["status"] in netStatus2manoFormat:
1120 net["status"] = netStatus2manoFormat[net_vim["status"]]
tiernoae4a8d12016-07-08 12:30:39 +02001121 else:
1122 net["status"] = "OTHER"
sousaedu80135b92021-02-17 15:05:18 +01001123 net["error_msg"] = "VIM status reported " + net_vim["status"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001124
sousaedu80135b92021-02-17 15:05:18 +01001125 if net["status"] == "ACTIVE" and not net_vim["admin_state_up"]:
1126 net["status"] = "DOWN"
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01001127
sousaedu80135b92021-02-17 15:05:18 +01001128 net["vim_info"] = self.serialize(net_vim)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01001129
sousaedu80135b92021-02-17 15:05:18 +01001130 if net_vim.get("fault"): # TODO
1131 net["error_msg"] = str(net_vim["fault"])
tierno72774862020-05-04 11:44:15 +00001132 except vimconn.VimConnNotFoundException as e:
tiernoae4a8d12016-07-08 12:30:39 +02001133 self.logger.error("Exception getting net status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01001134 net["status"] = "DELETED"
1135 net["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00001136 except vimconn.VimConnException as e:
tiernoae4a8d12016-07-08 12:30:39 +02001137 self.logger.error("Exception getting net status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01001138 net["status"] = "VIM_ERROR"
1139 net["error_msg"] = str(e)
tiernoae4a8d12016-07-08 12:30:39 +02001140 net_dict[net_id] = net
1141 return net_dict
1142
1143 def get_flavor(self, flavor_id):
tierno1ec592d2020-06-16 15:29:47 +00001144 """Obtain flavor details from the VIM. Returns the flavor dict details"""
tiernoae4a8d12016-07-08 12:30:39 +02001145 self.logger.debug("Getting flavor '%s'", flavor_id)
sousaedu80135b92021-02-17 15:05:18 +01001146
tierno7edb6752016-03-21 17:37:52 +01001147 try:
1148 self._reload_connection()
1149 flavor = self.nova.flavors.find(id=flavor_id)
tierno1ec592d2020-06-16 15:29:47 +00001150 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
sousaedu80135b92021-02-17 15:05:18 +01001151
tiernoae4a8d12016-07-08 12:30:39 +02001152 return flavor.to_dict()
sousaedu80135b92021-02-17 15:05:18 +01001153 except (
1154 nvExceptions.NotFound,
1155 nvExceptions.ClientException,
1156 ksExceptions.ClientException,
1157 ConnectionError,
1158 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001159 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001160
tiernocf157a82017-01-30 14:07:06 +01001161 def get_flavor_id_from_data(self, flavor_dict):
1162 """Obtain flavor id that match the flavor description
sousaedu80135b92021-02-17 15:05:18 +01001163 Returns the flavor_id or raises a vimconnNotFoundException
1164 flavor_dict: contains the required ram, vcpus, disk
1165 If 'use_existing_flavors' is set to True at config, the closer flavor that provides same or more ram, vcpus
1166 and disk is returned. Otherwise a flavor with exactly same ram, vcpus and disk is returned or a
1167 vimconnNotFoundException is raised
tiernocf157a82017-01-30 14:07:06 +01001168 """
sousaedu80135b92021-02-17 15:05:18 +01001169 exact_match = False if self.config.get("use_existing_flavors") else True
1170
tiernocf157a82017-01-30 14:07:06 +01001171 try:
1172 self._reload_connection()
tiernoe26fc7a2017-05-30 14:43:03 +02001173 flavor_candidate_id = None
1174 flavor_candidate_data = (10000, 10000, 10000)
sousaedu80135b92021-02-17 15:05:18 +01001175 flavor_target = (
1176 flavor_dict["ram"],
1177 flavor_dict["vcpus"],
1178 flavor_dict["disk"],
sousaedu648ee3d2021-11-22 14:09:15 +00001179 flavor_dict.get("ephemeral", 0),
1180 flavor_dict.get("swap", 0),
sousaedu80135b92021-02-17 15:05:18 +01001181 )
tiernoe26fc7a2017-05-30 14:43:03 +02001182 # numa=None
anwarsae5f52c2019-04-22 10:35:27 +05301183 extended = flavor_dict.get("extended", {})
1184 if extended:
tierno1ec592d2020-06-16 15:29:47 +00001185 # TODO
sousaedu80135b92021-02-17 15:05:18 +01001186 raise vimconn.VimConnNotFoundException(
1187 "Flavor with EPA still not implemented"
1188 )
tiernocf157a82017-01-30 14:07:06 +01001189 # if len(numas) > 1:
tierno72774862020-05-04 11:44:15 +00001190 # raise vimconn.VimConnNotFoundException("Cannot find any flavor with more than one numa")
tiernocf157a82017-01-30 14:07:06 +01001191 # numa=numas[0]
1192 # numas = extended.get("numas")
1193 for flavor in self.nova.flavors.list():
1194 epa = flavor.get_keys()
sousaedu80135b92021-02-17 15:05:18 +01001195
tiernocf157a82017-01-30 14:07:06 +01001196 if epa:
1197 continue
tiernoe26fc7a2017-05-30 14:43:03 +02001198 # TODO
sousaedu80135b92021-02-17 15:05:18 +01001199
sousaedu648ee3d2021-11-22 14:09:15 +00001200 flavor_data = (
1201 flavor.ram,
1202 flavor.vcpus,
1203 flavor.disk,
1204 flavor.ephemeral,
preethika.pebaba1f2022-01-20 07:24:18 +00001205 flavor.swap if isinstance(flavor.swap, int) else 0,
sousaedu648ee3d2021-11-22 14:09:15 +00001206 )
tiernoe26fc7a2017-05-30 14:43:03 +02001207 if flavor_data == flavor_target:
1208 return flavor.id
sousaedu80135b92021-02-17 15:05:18 +01001209 elif (
1210 not exact_match
1211 and flavor_target < flavor_data < flavor_candidate_data
1212 ):
tiernoe26fc7a2017-05-30 14:43:03 +02001213 flavor_candidate_id = flavor.id
1214 flavor_candidate_data = flavor_data
sousaedu80135b92021-02-17 15:05:18 +01001215
tiernoe26fc7a2017-05-30 14:43:03 +02001216 if not exact_match and flavor_candidate_id:
1217 return flavor_candidate_id
sousaedu80135b92021-02-17 15:05:18 +01001218
1219 raise vimconn.VimConnNotFoundException(
1220 "Cannot find any flavor matching '{}'".format(flavor_dict)
1221 )
1222 except (
1223 nvExceptions.NotFound,
1224 nvExceptions.ClientException,
1225 ksExceptions.ClientException,
1226 ConnectionError,
1227 ) as e:
tiernocf157a82017-01-30 14:07:06 +01001228 self._format_exception(e)
1229
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001230 @staticmethod
1231 def process_resource_quota(quota: dict, prefix: str, extra_specs: dict) -> None:
1232 """Process resource quota and fill up extra_specs.
1233 Args:
1234 quota (dict): Keeping the quota of resurces
1235 prefix (str) Prefix
1236 extra_specs (dict) Dict to be filled to be used during flavor creation
1237
anwarsae5f52c2019-04-22 10:35:27 +05301238 """
sousaedu80135b92021-02-17 15:05:18 +01001239 if "limit" in quota:
1240 extra_specs["quota:" + prefix + "_limit"] = quota["limit"]
1241
1242 if "reserve" in quota:
1243 extra_specs["quota:" + prefix + "_reservation"] = quota["reserve"]
1244
1245 if "shares" in quota:
anwarsae5f52c2019-04-22 10:35:27 +05301246 extra_specs["quota:" + prefix + "_shares_level"] = "custom"
sousaedu80135b92021-02-17 15:05:18 +01001247 extra_specs["quota:" + prefix + "_shares_share"] = quota["shares"]
anwarsae5f52c2019-04-22 10:35:27 +05301248
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001249 @staticmethod
1250 def process_numa_memory(
1251 numa: dict, node_id: Optional[int], extra_specs: dict
1252 ) -> None:
1253 """Set the memory in extra_specs.
1254 Args:
1255 numa (dict): A dictionary which includes numa information
1256 node_id (int): ID of numa node
1257 extra_specs (dict): To be filled.
1258
1259 """
1260 if not numa.get("memory"):
1261 return
1262 memory_mb = numa["memory"] * 1024
1263 memory = "hw:numa_mem.{}".format(node_id)
1264 extra_specs[memory] = int(memory_mb)
1265
1266 @staticmethod
1267 def process_numa_vcpu(numa: dict, node_id: int, extra_specs: dict) -> None:
1268 """Set the cpu in extra_specs.
1269 Args:
1270 numa (dict): A dictionary which includes numa information
1271 node_id (int): ID of numa node
1272 extra_specs (dict): To be filled.
1273
1274 """
1275 if not numa.get("vcpu"):
1276 return
1277 vcpu = numa["vcpu"]
1278 cpu = "hw:numa_cpus.{}".format(node_id)
1279 vcpu = ",".join(map(str, vcpu))
1280 extra_specs[cpu] = vcpu
1281
1282 @staticmethod
1283 def process_numa_paired_threads(numa: dict, extra_specs: dict) -> Optional[int]:
1284 """Fill up extra_specs if numa has paired-threads.
1285 Args:
1286 numa (dict): A dictionary which includes numa information
1287 extra_specs (dict): To be filled.
1288
1289 Returns:
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001290 threads (int) Number of virtual cpus
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001291
1292 """
1293 if not numa.get("paired-threads"):
1294 return
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001295
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001296 # cpu_thread_policy "require" implies that compute node must have an STM architecture
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001297 threads = numa["paired-threads"] * 2
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001298 extra_specs["hw:cpu_thread_policy"] = "require"
1299 extra_specs["hw:cpu_policy"] = "dedicated"
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001300 return threads
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001301
1302 @staticmethod
1303 def process_numa_cores(numa: dict, extra_specs: dict) -> Optional[int]:
1304 """Fill up extra_specs if numa has cores.
1305 Args:
1306 numa (dict): A dictionary which includes numa information
1307 extra_specs (dict): To be filled.
1308
1309 Returns:
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001310 cores (int) Number of virtual cpus
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001311
1312 """
1313 # cpu_thread_policy "isolate" implies that the host must not have an SMT
1314 # architecture, or a non-SMT architecture will be emulated
1315 if not numa.get("cores"):
1316 return
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001317 cores = numa["cores"]
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001318 extra_specs["hw:cpu_thread_policy"] = "isolate"
1319 extra_specs["hw:cpu_policy"] = "dedicated"
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001320 return cores
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001321
1322 @staticmethod
1323 def process_numa_threads(numa: dict, extra_specs: dict) -> Optional[int]:
1324 """Fill up extra_specs if numa has threads.
1325 Args:
1326 numa (dict): A dictionary which includes numa information
1327 extra_specs (dict): To be filled.
1328
1329 Returns:
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001330 threads (int) Number of virtual cpus
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001331
1332 """
1333 # cpu_thread_policy "prefer" implies that the host may or may not have an SMT architecture
1334 if not numa.get("threads"):
1335 return
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001336 threads = numa["threads"]
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001337 extra_specs["hw:cpu_thread_policy"] = "prefer"
1338 extra_specs["hw:cpu_policy"] = "dedicated"
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001339 return threads
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001340
1341 def _process_numa_parameters_of_flavor(
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001342 self, numas: List, extra_specs: Dict
1343 ) -> None:
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001344 """Process numa parameters and fill up extra_specs.
1345
1346 Args:
1347 numas (list): List of dictionary which includes numa information
1348 extra_specs (dict): To be filled.
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001349
1350 """
1351 numa_nodes = len(numas)
1352 extra_specs["hw:numa_nodes"] = str(numa_nodes)
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001353 cpu_cores, cpu_threads = 0, 0
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001354
1355 if self.vim_type == "VIO":
Gulsum Aticid0571fe2022-11-14 13:06:06 +03001356 self.process_vio_numa_nodes(numa_nodes, extra_specs)
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001357
1358 for numa in numas:
1359 if "id" in numa:
1360 node_id = numa["id"]
1361 # overwrite ram and vcpus
1362 # check if key "memory" is present in numa else use ram value at flavor
1363 self.process_numa_memory(numa, node_id, extra_specs)
1364 self.process_numa_vcpu(numa, node_id, extra_specs)
1365
1366 # See for reference: https://specs.openstack.org/openstack/nova-specs/specs/mitaka/implemented/virt-driver-cpu-thread-pinning.html
1367 extra_specs["hw:cpu_sockets"] = str(numa_nodes)
1368
1369 if "paired-threads" in numa:
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001370 threads = self.process_numa_paired_threads(numa, extra_specs)
1371 cpu_threads += threads
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001372
1373 elif "cores" in numa:
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001374 cores = self.process_numa_cores(numa, extra_specs)
1375 cpu_cores += cores
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001376
1377 elif "threads" in numa:
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001378 threads = self.process_numa_threads(numa, extra_specs)
1379 cpu_threads += threads
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001380
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001381 if cpu_cores:
1382 extra_specs["hw:cpu_cores"] = str(cpu_cores)
1383 if cpu_threads:
1384 extra_specs["hw:cpu_threads"] = str(cpu_threads)
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001385
Gulsum Aticid0571fe2022-11-14 13:06:06 +03001386 @staticmethod
1387 def process_vio_numa_nodes(numa_nodes: int, extra_specs: Dict) -> None:
1388 """According to number of numa nodes, updates the extra_specs for VIO.
1389
1390 Args:
1391
1392 numa_nodes (int): List keeps the numa node numbers
1393 extra_specs (dict): Extra specs dict to be updated
1394
1395 """
1396 # If there is not any numa, numas_nodes equals to 0.
1397 if not numa_nodes:
1398 extra_specs["vmware:extra_config"] = '{"numa.nodeAffinity":"0"}'
1399
1400 # If there are several numas, we do not define specific affinity.
1401 extra_specs["vmware:latency_sensitivity_level"] = "high"
1402
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001403 def _change_flavor_name(
1404 self, name: str, name_suffix: int, flavor_data: dict
1405 ) -> str:
1406 """Change the flavor name if the name already exists.
1407
1408 Args:
1409 name (str): Flavor name to be checked
1410 name_suffix (int): Suffix to be appended to name
1411 flavor_data (dict): Flavor dict
1412
1413 Returns:
1414 name (str): New flavor name to be used
1415
1416 """
1417 # Get used names
1418 fl = self.nova.flavors.list()
1419 fl_names = [f.name for f in fl]
1420
1421 while name in fl_names:
1422 name_suffix += 1
1423 name = flavor_data["name"] + "-" + str(name_suffix)
1424
1425 return name
1426
1427 def _process_extended_config_of_flavor(
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001428 self, extended: dict, extra_specs: dict
1429 ) -> None:
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001430 """Process the extended dict to fill up extra_specs.
1431 Args:
1432
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001433 extended (dict): Keeping the extra specification of flavor
1434 extra_specs (dict) Dict to be filled to be used during flavor creation
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001435
1436 """
1437 quotas = {
1438 "cpu-quota": "cpu",
1439 "mem-quota": "memory",
1440 "vif-quota": "vif",
1441 "disk-io-quota": "disk_io",
1442 }
1443
1444 page_sizes = {
1445 "LARGE": "large",
1446 "SMALL": "small",
1447 "SIZE_2MB": "2MB",
1448 "SIZE_1GB": "1GB",
1449 "PREFER_LARGE": "any",
1450 }
1451
1452 policies = {
1453 "cpu-pinning-policy": "hw:cpu_policy",
1454 "cpu-thread-pinning-policy": "hw:cpu_thread_policy",
1455 "mem-policy": "hw:numa_mempolicy",
1456 }
1457
1458 numas = extended.get("numas")
1459 if numas:
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001460 self._process_numa_parameters_of_flavor(numas, extra_specs)
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001461
1462 for quota, item in quotas.items():
1463 if quota in extended.keys():
1464 self.process_resource_quota(extended.get(quota), item, extra_specs)
1465
1466 # Set the mempage size as specified in the descriptor
1467 if extended.get("mempage-size"):
1468 if extended["mempage-size"] in page_sizes.keys():
1469 extra_specs["hw:mem_page_size"] = page_sizes[extended["mempage-size"]]
1470 else:
1471 # Normally, validations in NBI should not allow to this condition.
1472 self.logger.debug(
1473 "Invalid mempage-size %s. Will be ignored",
1474 extended.get("mempage-size"),
1475 )
1476
1477 for policy, hw_policy in policies.items():
1478 if extended.get(policy):
1479 extra_specs[hw_policy] = extended[policy].lower()
1480
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001481 @staticmethod
1482 def _get_flavor_details(flavor_data: dict) -> Tuple:
1483 """Returns the details of flavor
1484 Args:
1485 flavor_data (dict): Dictionary that includes required flavor details
1486
1487 Returns:
1488 ram, vcpus, extra_specs, extended (tuple): Main items of required flavor
1489
1490 """
1491 return (
1492 flavor_data.get("ram", 64),
1493 flavor_data.get("vcpus", 1),
1494 {},
1495 flavor_data.get("extended"),
1496 )
1497
1498 def new_flavor(self, flavor_data: dict, change_name_if_used: bool = True) -> str:
1499 """Adds a tenant flavor to openstack VIM.
1500 if change_name_if_used is True, it will change name in case of conflict,
1501 because it is not supported name repetition.
1502
1503 Args:
1504 flavor_data (dict): Flavor details to be processed
1505 change_name_if_used (bool): Change name in case of conflict
1506
1507 Returns:
1508 flavor_id (str): flavor identifier
1509
tierno1ec592d2020-06-16 15:29:47 +00001510 """
tiernoae4a8d12016-07-08 12:30:39 +02001511 self.logger.debug("Adding flavor '%s'", str(flavor_data))
tierno1ec592d2020-06-16 15:29:47 +00001512 retry = 0
1513 max_retries = 3
tierno7edb6752016-03-21 17:37:52 +01001514 name_suffix = 0
sousaedu80135b92021-02-17 15:05:18 +01001515
anwarsc76a3ee2018-10-04 14:05:32 +05301516 try:
sousaedu80135b92021-02-17 15:05:18 +01001517 name = flavor_data["name"]
tierno1ec592d2020-06-16 15:29:47 +00001518 while retry < max_retries:
1519 retry += 1
anwarsc76a3ee2018-10-04 14:05:32 +05301520 try:
1521 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01001522
anwarsc76a3ee2018-10-04 14:05:32 +05301523 if change_name_if_used:
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001524 name = self._change_flavor_name(name, name_suffix, flavor_data)
sousaedu80135b92021-02-17 15:05:18 +01001525
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001526 ram, vcpus, extra_specs, extended = self._get_flavor_details(
1527 flavor_data
1528 )
anwarsc76a3ee2018-10-04 14:05:32 +05301529 if extended:
Gulsum Atici6a6e3342023-01-23 16:22:59 +03001530 self._process_extended_config_of_flavor(extended, extra_specs)
sousaedu80135b92021-02-17 15:05:18 +01001531
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001532 # Create flavor
sousaedu80135b92021-02-17 15:05:18 +01001533
sousaedu80135b92021-02-17 15:05:18 +01001534 new_flavor = self.nova.flavors.create(
sousaeduf524da82021-11-22 14:02:17 +00001535 name=name,
1536 ram=ram,
1537 vcpus=vcpus,
1538 disk=flavor_data.get("disk", 0),
1539 ephemeral=flavor_data.get("ephemeral", 0),
sousaedu648ee3d2021-11-22 14:09:15 +00001540 swap=flavor_data.get("swap", 0),
sousaedu80135b92021-02-17 15:05:18 +01001541 is_public=flavor_data.get("is_public", True),
1542 )
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001543
1544 # Add metadata
anwarsae5f52c2019-04-22 10:35:27 +05301545 if extra_specs:
1546 new_flavor.set_keys(extra_specs)
sousaedu80135b92021-02-17 15:05:18 +01001547
anwarsc76a3ee2018-10-04 14:05:32 +05301548 return new_flavor.id
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001549
anwarsc76a3ee2018-10-04 14:05:32 +05301550 except nvExceptions.Conflict as e:
1551 if change_name_if_used and retry < max_retries:
1552 continue
sousaedu80135b92021-02-17 15:05:18 +01001553
anwarsc76a3ee2018-10-04 14:05:32 +05301554 self._format_exception(e)
Gulsum Atici4415c4c2023-01-19 12:44:06 +03001555
sousaedu80135b92021-02-17 15:05:18 +01001556 except (
1557 ksExceptions.ClientException,
1558 nvExceptions.ClientException,
1559 ConnectionError,
1560 KeyError,
1561 ) as e:
anwarsc76a3ee2018-10-04 14:05:32 +05301562 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001563
tierno1ec592d2020-06-16 15:29:47 +00001564 def delete_flavor(self, flavor_id):
sousaedu80135b92021-02-17 15:05:18 +01001565 """Deletes a tenant flavor from openstack VIM. Returns the old flavor_id"""
tiernoae4a8d12016-07-08 12:30:39 +02001566 try:
1567 self._reload_connection()
1568 self.nova.flavors.delete(flavor_id)
sousaedu80135b92021-02-17 15:05:18 +01001569
tiernoae4a8d12016-07-08 12:30:39 +02001570 return flavor_id
tierno1ec592d2020-06-16 15:29:47 +00001571 # except nvExceptions.BadRequest as e:
sousaedu80135b92021-02-17 15:05:18 +01001572 except (
1573 nvExceptions.NotFound,
1574 ksExceptions.ClientException,
1575 nvExceptions.ClientException,
1576 ConnectionError,
1577 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001578 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001579
tierno1ec592d2020-06-16 15:29:47 +00001580 def new_image(self, image_dict):
1581 """
tiernoae4a8d12016-07-08 12:30:39 +02001582 Adds a tenant image to VIM. imge_dict is a dictionary with:
1583 name: name
1584 disk_format: qcow2, vhd, vmdk, raw (by default), ...
1585 location: path or URI
1586 public: "yes" or "no"
1587 metadata: metadata of the image
1588 Returns the image_id
tierno1ec592d2020-06-16 15:29:47 +00001589 """
1590 retry = 0
1591 max_retries = 3
sousaedu80135b92021-02-17 15:05:18 +01001592
tierno1ec592d2020-06-16 15:29:47 +00001593 while retry < max_retries:
1594 retry += 1
tierno7edb6752016-03-21 17:37:52 +01001595 try:
1596 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01001597
tierno1ec592d2020-06-16 15:29:47 +00001598 # determine format http://docs.openstack.org/developer/glance/formats.html
tierno7edb6752016-03-21 17:37:52 +01001599 if "disk_format" in image_dict:
tierno1ec592d2020-06-16 15:29:47 +00001600 disk_format = image_dict["disk_format"]
1601 else: # autodiscover based on extension
sousaedu80135b92021-02-17 15:05:18 +01001602 if image_dict["location"].endswith(".qcow2"):
tierno1ec592d2020-06-16 15:29:47 +00001603 disk_format = "qcow2"
sousaedu80135b92021-02-17 15:05:18 +01001604 elif image_dict["location"].endswith(".vhd"):
tierno1ec592d2020-06-16 15:29:47 +00001605 disk_format = "vhd"
sousaedu80135b92021-02-17 15:05:18 +01001606 elif image_dict["location"].endswith(".vmdk"):
tierno1ec592d2020-06-16 15:29:47 +00001607 disk_format = "vmdk"
sousaedu80135b92021-02-17 15:05:18 +01001608 elif image_dict["location"].endswith(".vdi"):
tierno1ec592d2020-06-16 15:29:47 +00001609 disk_format = "vdi"
sousaedu80135b92021-02-17 15:05:18 +01001610 elif image_dict["location"].endswith(".iso"):
tierno1ec592d2020-06-16 15:29:47 +00001611 disk_format = "iso"
sousaedu80135b92021-02-17 15:05:18 +01001612 elif image_dict["location"].endswith(".aki"):
tierno1ec592d2020-06-16 15:29:47 +00001613 disk_format = "aki"
sousaedu80135b92021-02-17 15:05:18 +01001614 elif image_dict["location"].endswith(".ari"):
tierno1ec592d2020-06-16 15:29:47 +00001615 disk_format = "ari"
sousaedu80135b92021-02-17 15:05:18 +01001616 elif image_dict["location"].endswith(".ami"):
tierno1ec592d2020-06-16 15:29:47 +00001617 disk_format = "ami"
tierno7edb6752016-03-21 17:37:52 +01001618 else:
tierno1ec592d2020-06-16 15:29:47 +00001619 disk_format = "raw"
sousaedu80135b92021-02-17 15:05:18 +01001620
1621 self.logger.debug(
1622 "new_image: '%s' loading from '%s'",
1623 image_dict["name"],
1624 image_dict["location"],
1625 )
shashankjain3c83a212018-10-04 13:05:46 +05301626 if self.vim_type == "VIO":
1627 container_format = "bare"
sousaedu80135b92021-02-17 15:05:18 +01001628 if "container_format" in image_dict:
1629 container_format = image_dict["container_format"]
1630
1631 new_image = self.glance.images.create(
1632 name=image_dict["name"],
1633 container_format=container_format,
1634 disk_format=disk_format,
1635 )
shashankjain3c83a212018-10-04 13:05:46 +05301636 else:
sousaedu80135b92021-02-17 15:05:18 +01001637 new_image = self.glance.images.create(name=image_dict["name"])
1638
1639 if image_dict["location"].startswith("http"):
tierno1beea862018-07-11 15:47:37 +02001640 # TODO there is not a method to direct download. It must be downloaded locally with requests
tierno72774862020-05-04 11:44:15 +00001641 raise vimconn.VimConnNotImplemented("Cannot create image from URL")
tierno1ec592d2020-06-16 15:29:47 +00001642 else: # local path
sousaedu80135b92021-02-17 15:05:18 +01001643 with open(image_dict["location"]) as fimage:
tierno1beea862018-07-11 15:47:37 +02001644 self.glance.images.upload(new_image.id, fimage)
sousaedu80135b92021-02-17 15:05:18 +01001645 # new_image = self.glancev1.images.create(name=image_dict["name"], is_public=
1646 # image_dict.get("public","yes")=="yes",
tierno1beea862018-07-11 15:47:37 +02001647 # container_format="bare", data=fimage, disk_format=disk_format)
sousaedu80135b92021-02-17 15:05:18 +01001648
1649 metadata_to_load = image_dict.get("metadata")
1650
1651 # TODO location is a reserved word for current openstack versions. fixed for VIO please check
tierno1ec592d2020-06-16 15:29:47 +00001652 # for openstack
shashankjain3c83a212018-10-04 13:05:46 +05301653 if self.vim_type == "VIO":
sousaedu80135b92021-02-17 15:05:18 +01001654 metadata_to_load["upload_location"] = image_dict["location"]
shashankjain3c83a212018-10-04 13:05:46 +05301655 else:
sousaedu80135b92021-02-17 15:05:18 +01001656 metadata_to_load["location"] = image_dict["location"]
1657
tierno1beea862018-07-11 15:47:37 +02001658 self.glance.images.update(new_image.id, **metadata_to_load)
sousaedu80135b92021-02-17 15:05:18 +01001659
tiernoae4a8d12016-07-08 12:30:39 +02001660 return new_image.id
sousaedu80135b92021-02-17 15:05:18 +01001661 except (
1662 nvExceptions.Conflict,
1663 ksExceptions.ClientException,
1664 nvExceptions.ClientException,
1665 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001666 self._format_exception(e)
sousaedu80135b92021-02-17 15:05:18 +01001667 except (
1668 HTTPException,
1669 gl1Exceptions.HTTPException,
1670 gl1Exceptions.CommunicationError,
1671 ConnectionError,
1672 ) as e:
tierno1ec592d2020-06-16 15:29:47 +00001673 if retry == max_retries:
tiernoae4a8d12016-07-08 12:30:39 +02001674 continue
sousaedu80135b92021-02-17 15:05:18 +01001675
tiernoae4a8d12016-07-08 12:30:39 +02001676 self._format_exception(e)
tierno1ec592d2020-06-16 15:29:47 +00001677 except IOError as e: # can not open the file
sousaedu80135b92021-02-17 15:05:18 +01001678 raise vimconn.VimConnConnectionException(
1679 "{}: {} for {}".format(type(e).__name__, e, image_dict["location"]),
1680 http_code=vimconn.HTTP_Bad_Request,
1681 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001682
tiernoae4a8d12016-07-08 12:30:39 +02001683 def delete_image(self, image_id):
sousaedu80135b92021-02-17 15:05:18 +01001684 """Deletes a tenant image from openstack VIM. Returns the old id"""
tiernoae4a8d12016-07-08 12:30:39 +02001685 try:
1686 self._reload_connection()
tierno1beea862018-07-11 15:47:37 +02001687 self.glance.images.delete(image_id)
sousaedu80135b92021-02-17 15:05:18 +01001688
tiernoae4a8d12016-07-08 12:30:39 +02001689 return image_id
sousaedu80135b92021-02-17 15:05:18 +01001690 except (
1691 nvExceptions.NotFound,
1692 ksExceptions.ClientException,
1693 nvExceptions.ClientException,
1694 gl1Exceptions.CommunicationError,
1695 gl1Exceptions.HTTPNotFound,
1696 ConnectionError,
1697 ) as e: # TODO remove
tiernoae4a8d12016-07-08 12:30:39 +02001698 self._format_exception(e)
1699
1700 def get_image_id_from_path(self, path):
tierno1ec592d2020-06-16 15:29:47 +00001701 """Get the image id from image path in the VIM database. Returns the image_id"""
tiernoae4a8d12016-07-08 12:30:39 +02001702 try:
1703 self._reload_connection()
tierno1beea862018-07-11 15:47:37 +02001704 images = self.glance.images.list()
sousaedu80135b92021-02-17 15:05:18 +01001705
tiernoae4a8d12016-07-08 12:30:39 +02001706 for image in images:
tierno1ec592d2020-06-16 15:29:47 +00001707 if image.metadata.get("location") == path:
tiernoae4a8d12016-07-08 12:30:39 +02001708 return image.id
sousaedu80135b92021-02-17 15:05:18 +01001709
1710 raise vimconn.VimConnNotFoundException(
1711 "image with location '{}' not found".format(path)
1712 )
1713 except (
1714 ksExceptions.ClientException,
1715 nvExceptions.ClientException,
1716 gl1Exceptions.CommunicationError,
1717 ConnectionError,
1718 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001719 self._format_exception(e)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001720
garciadeblasb69fa9f2016-09-28 12:04:10 +02001721 def get_image_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +00001722 """Obtain tenant images from VIM
garciadeblasb69fa9f2016-09-28 12:04:10 +02001723 Filter_dict can be:
1724 id: image id
1725 name: image name
1726 checksum: image checksum
1727 Returns the image list of dictionaries:
1728 [{<the fields at Filter_dict plus some VIM specific>}, ...]
1729 List can be empty
tierno1ec592d2020-06-16 15:29:47 +00001730 """
garciadeblasb69fa9f2016-09-28 12:04:10 +02001731 self.logger.debug("Getting image list from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +01001732
garciadeblasb69fa9f2016-09-28 12:04:10 +02001733 try:
1734 self._reload_connection()
tierno1ec592d2020-06-16 15:29:47 +00001735 # filter_dict_os = filter_dict.copy()
1736 # First we filter by the available filter fields: name, id. The others are removed.
tierno1beea862018-07-11 15:47:37 +02001737 image_list = self.glance.images.list()
garciadeblasb69fa9f2016-09-28 12:04:10 +02001738 filtered_list = []
sousaedu80135b92021-02-17 15:05:18 +01001739
garciadeblasb69fa9f2016-09-28 12:04:10 +02001740 for image in image_list:
tierno3cb8dc32017-10-24 18:13:19 +02001741 try:
tierno1beea862018-07-11 15:47:37 +02001742 if filter_dict.get("name") and image["name"] != filter_dict["name"]:
1743 continue
sousaedu80135b92021-02-17 15:05:18 +01001744
tierno1beea862018-07-11 15:47:37 +02001745 if filter_dict.get("id") and image["id"] != filter_dict["id"]:
1746 continue
sousaedu80135b92021-02-17 15:05:18 +01001747
1748 if (
1749 filter_dict.get("checksum")
1750 and image["checksum"] != filter_dict["checksum"]
1751 ):
tierno1beea862018-07-11 15:47:37 +02001752 continue
1753
1754 filtered_list.append(image.copy())
tierno3cb8dc32017-10-24 18:13:19 +02001755 except gl1Exceptions.HTTPNotFound:
1756 pass
sousaedu80135b92021-02-17 15:05:18 +01001757
garciadeblasb69fa9f2016-09-28 12:04:10 +02001758 return filtered_list
sousaedu80135b92021-02-17 15:05:18 +01001759 except (
1760 ksExceptions.ClientException,
1761 nvExceptions.ClientException,
1762 gl1Exceptions.CommunicationError,
1763 ConnectionError,
1764 ) as e:
garciadeblasb69fa9f2016-09-28 12:04:10 +02001765 self._format_exception(e)
1766
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001767 def __wait_for_vm(self, vm_id, status):
1768 """wait until vm is in the desired status and return True.
1769 If the VM gets in ERROR status, return false.
1770 If the timeout is reached generate an exception"""
1771 elapsed_time = 0
1772 while elapsed_time < server_timeout:
1773 vm_status = self.nova.servers.get(vm_id).status
sousaedu80135b92021-02-17 15:05:18 +01001774
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001775 if vm_status == status:
1776 return True
sousaedu80135b92021-02-17 15:05:18 +01001777
1778 if vm_status == "ERROR":
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001779 return False
sousaedu80135b92021-02-17 15:05:18 +01001780
tierno1df468d2018-07-06 14:25:16 +02001781 time.sleep(5)
1782 elapsed_time += 5
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001783
1784 # if we exceeded the timeout rollback
1785 if elapsed_time >= server_timeout:
sousaedu80135b92021-02-17 15:05:18 +01001786 raise vimconn.VimConnException(
1787 "Timeout waiting for instance " + vm_id + " to get " + status,
1788 http_code=vimconn.HTTP_Request_Timeout,
1789 )
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001790
mirabal29356312017-07-27 12:21:22 +02001791 def _get_openstack_availablity_zones(self):
1792 """
1793 Get from openstack availability zones available
1794 :return:
1795 """
1796 try:
1797 openstack_availability_zone = self.nova.availability_zones.list()
sousaedu80135b92021-02-17 15:05:18 +01001798 openstack_availability_zone = [
1799 str(zone.zoneName)
1800 for zone in openstack_availability_zone
1801 if zone.zoneName != "internal"
1802 ]
1803
mirabal29356312017-07-27 12:21:22 +02001804 return openstack_availability_zone
tierno1ec592d2020-06-16 15:29:47 +00001805 except Exception:
mirabal29356312017-07-27 12:21:22 +02001806 return None
1807
1808 def _set_availablity_zones(self):
1809 """
1810 Set vim availablity zone
1811 :return:
1812 """
sousaedu80135b92021-02-17 15:05:18 +01001813 if "availability_zone" in self.config:
1814 vim_availability_zones = self.config.get("availability_zone")
mirabal29356312017-07-27 12:21:22 +02001815
mirabal29356312017-07-27 12:21:22 +02001816 if isinstance(vim_availability_zones, str):
1817 self.availability_zone = [vim_availability_zones]
1818 elif isinstance(vim_availability_zones, list):
1819 self.availability_zone = vim_availability_zones
1820 else:
1821 self.availability_zone = self._get_openstack_availablity_zones()
1822
sousaedu80135b92021-02-17 15:05:18 +01001823 def _get_vm_availability_zone(
1824 self, availability_zone_index, availability_zone_list
1825 ):
mirabal29356312017-07-27 12:21:22 +02001826 """
tierno5a3273c2017-08-29 11:43:46 +02001827 Return thge availability zone to be used by the created VM.
1828 :return: The VIM availability zone to be used or None
mirabal29356312017-07-27 12:21:22 +02001829 """
tierno5a3273c2017-08-29 11:43:46 +02001830 if availability_zone_index is None:
sousaedu80135b92021-02-17 15:05:18 +01001831 if not self.config.get("availability_zone"):
tierno5a3273c2017-08-29 11:43:46 +02001832 return None
sousaedu80135b92021-02-17 15:05:18 +01001833 elif isinstance(self.config.get("availability_zone"), str):
1834 return self.config["availability_zone"]
tierno5a3273c2017-08-29 11:43:46 +02001835 else:
1836 # TODO consider using a different parameter at config for default AV and AV list match
sousaedu80135b92021-02-17 15:05:18 +01001837 return self.config["availability_zone"][0]
mirabal29356312017-07-27 12:21:22 +02001838
tierno5a3273c2017-08-29 11:43:46 +02001839 vim_availability_zones = self.availability_zone
1840 # check if VIM offer enough availability zones describe in the VNFD
sousaedu80135b92021-02-17 15:05:18 +01001841 if vim_availability_zones and len(availability_zone_list) <= len(
1842 vim_availability_zones
1843 ):
tierno5a3273c2017-08-29 11:43:46 +02001844 # check if all the names of NFV AV match VIM AV names
1845 match_by_index = False
1846 for av in availability_zone_list:
1847 if av not in vim_availability_zones:
1848 match_by_index = True
1849 break
sousaedu80135b92021-02-17 15:05:18 +01001850
tierno5a3273c2017-08-29 11:43:46 +02001851 if match_by_index:
1852 return vim_availability_zones[availability_zone_index]
1853 else:
1854 return availability_zone_list[availability_zone_index]
mirabal29356312017-07-27 12:21:22 +02001855 else:
sousaedu80135b92021-02-17 15:05:18 +01001856 raise vimconn.VimConnConflictException(
1857 "No enough availability zones at VIM for this deployment"
1858 )
mirabal29356312017-07-27 12:21:22 +02001859
Gulsum Atici26f73662022-10-27 15:18:27 +03001860 def _prepare_port_dict_security_groups(self, net: dict, port_dict: dict) -> None:
1861 """Fill up the security_groups in the port_dict.
1862
1863 Args:
1864 net (dict): Network details
1865 port_dict (dict): Port details
1866
1867 """
1868 if (
1869 self.config.get("security_groups")
1870 and net.get("port_security") is not False
1871 and not self.config.get("no_port_security_extension")
1872 ):
1873 if not self.security_groups_id:
1874 self._get_ids_from_name()
1875
1876 port_dict["security_groups"] = self.security_groups_id
1877
1878 def _prepare_port_dict_binding(self, net: dict, port_dict: dict) -> None:
1879 """Fill up the network binding depending on network type in the port_dict.
1880
1881 Args:
1882 net (dict): Network details
1883 port_dict (dict): Port details
1884
1885 """
1886 if not net.get("type"):
1887 raise vimconn.VimConnException("Type is missing in the network details.")
1888
1889 if net["type"] == "virtual":
1890 pass
1891
1892 # For VF
1893 elif net["type"] == "VF" or net["type"] == "SR-IOV":
Gulsum Atici26f73662022-10-27 15:18:27 +03001894 port_dict["binding:vnic_type"] = "direct"
1895
1896 # VIO specific Changes
1897 if self.vim_type == "VIO":
1898 # Need to create port with port_security_enabled = False and no-security-groups
1899 port_dict["port_security_enabled"] = False
1900 port_dict["provider_security_groups"] = []
1901 port_dict["security_groups"] = []
1902
1903 else:
1904 # For PT PCI-PASSTHROUGH
1905 port_dict["binding:vnic_type"] = "direct-physical"
1906
1907 @staticmethod
1908 def _set_fixed_ip(new_port: dict, net: dict) -> None:
1909 """Set the "ip" parameter in net dictionary.
1910
1911 Args:
1912 new_port (dict): New created port
1913 net (dict): Network details
1914
1915 """
1916 fixed_ips = new_port["port"].get("fixed_ips")
1917
1918 if fixed_ips:
1919 net["ip"] = fixed_ips[0].get("ip_address")
1920 else:
1921 net["ip"] = None
1922
1923 @staticmethod
1924 def _prepare_port_dict_mac_ip_addr(net: dict, port_dict: dict) -> None:
1925 """Fill up the mac_address and fixed_ips in port_dict.
1926
1927 Args:
1928 net (dict): Network details
1929 port_dict (dict): Port details
1930
1931 """
1932 if net.get("mac_address"):
1933 port_dict["mac_address"] = net["mac_address"]
1934
1935 if net.get("ip_address"):
1936 port_dict["fixed_ips"] = [{"ip_address": net["ip_address"]}]
1937 # TODO add "subnet_id": <subnet_id>
1938
1939 def _create_new_port(self, port_dict: dict, created_items: dict, net: dict) -> Dict:
1940 """Create new port using neutron.
1941
1942 Args:
1943 port_dict (dict): Port details
1944 created_items (dict): All created items
1945 net (dict): Network details
1946
1947 Returns:
1948 new_port (dict): New created port
1949
1950 """
1951 new_port = self.neutron.create_port({"port": port_dict})
1952 created_items["port:" + str(new_port["port"]["id"])] = True
1953 net["mac_adress"] = new_port["port"]["mac_address"]
1954 net["vim_id"] = new_port["port"]["id"]
1955
1956 return new_port
1957
1958 def _create_port(
1959 self, net: dict, name: str, created_items: dict
1960 ) -> Tuple[dict, dict]:
1961 """Create port using net details.
1962
1963 Args:
1964 net (dict): Network details
1965 name (str): Name to be used as network name if net dict does not include name
1966 created_items (dict): All created items
1967
1968 Returns:
1969 new_port, port New created port, port dictionary
1970
1971 """
1972
1973 port_dict = {
1974 "network_id": net["net_id"],
1975 "name": net.get("name"),
1976 "admin_state_up": True,
1977 }
1978
1979 if not port_dict["name"]:
1980 port_dict["name"] = name
1981
1982 self._prepare_port_dict_security_groups(net, port_dict)
1983
1984 self._prepare_port_dict_binding(net, port_dict)
1985
1986 vimconnector._prepare_port_dict_mac_ip_addr(net, port_dict)
1987
1988 new_port = self._create_new_port(port_dict, created_items, net)
1989
1990 vimconnector._set_fixed_ip(new_port, net)
1991
1992 port = {"port-id": new_port["port"]["id"]}
1993
1994 if float(self.nova.api_version.get_string()) >= 2.32:
1995 port["tag"] = new_port["port"]["name"]
1996
1997 return new_port, port
1998
1999 def _prepare_network_for_vminstance(
2000 self,
2001 name: str,
2002 net_list: list,
2003 created_items: dict,
2004 net_list_vim: list,
2005 external_network: list,
2006 no_secured_ports: list,
2007 ) -> None:
2008 """Create port and fill up net dictionary for new VM instance creation.
2009
2010 Args:
2011 name (str): Name of network
2012 net_list (list): List of networks
2013 created_items (dict): All created items belongs to a VM
2014 net_list_vim (list): List of ports
2015 external_network (list): List of external-networks
2016 no_secured_ports (list): Port security disabled ports
2017 """
2018
2019 self._reload_connection()
2020
2021 for net in net_list:
2022 # Skip non-connected iface
2023 if not net.get("net_id"):
2024 continue
2025
2026 new_port, port = self._create_port(net, name, created_items)
2027
2028 net_list_vim.append(port)
2029
2030 if net.get("floating_ip", False):
2031 net["exit_on_floating_ip_error"] = True
2032 external_network.append(net)
2033
2034 elif net["use"] == "mgmt" and self.config.get("use_floating_ip"):
2035 net["exit_on_floating_ip_error"] = False
2036 external_network.append(net)
2037 net["floating_ip"] = self.config.get("use_floating_ip")
2038
2039 # If port security is disabled when the port has not yet been attached to the VM, then all vm traffic
2040 # is dropped. As a workaround we wait until the VM is active and then disable the port-security
2041 if net.get("port_security") is False and not self.config.get(
2042 "no_port_security_extension"
2043 ):
2044 no_secured_ports.append(
2045 (
2046 new_port["port"]["id"],
2047 net.get("port_security_disable_strategy"),
2048 )
2049 )
2050
2051 def _prepare_persistent_root_volumes(
2052 self,
2053 name: str,
2054 vm_av_zone: list,
2055 disk: dict,
2056 base_disk_index: int,
2057 block_device_mapping: dict,
2058 existing_vim_volumes: list,
2059 created_items: dict,
2060 ) -> Optional[str]:
2061 """Prepare persistent root volumes for new VM instance.
2062
2063 Args:
2064 name (str): Name of VM instance
2065 vm_av_zone (list): List of availability zones
2066 disk (dict): Disk details
2067 base_disk_index (int): Disk index
2068 block_device_mapping (dict): Block device details
2069 existing_vim_volumes (list): Existing disk details
2070 created_items (dict): All created items belongs to VM
2071
2072 Returns:
2073 boot_volume_id (str): ID of boot volume
2074
2075 """
2076 # Disk may include only vim_volume_id or only vim_id."
2077 # Use existing persistent root volume finding with volume_id or vim_id
2078 key_id = "vim_volume_id" if "vim_volume_id" in disk.keys() else "vim_id"
2079
2080 if disk.get(key_id):
Gulsum Atici26f73662022-10-27 15:18:27 +03002081 block_device_mapping["vd" + chr(base_disk_index)] = disk[key_id]
2082 existing_vim_volumes.append({"id": disk[key_id]})
2083
2084 else:
2085 # Create persistent root volume
2086 volume = self.cinder.volumes.create(
2087 size=disk["size"],
2088 name=name + "vd" + chr(base_disk_index),
2089 imageRef=disk["image_id"],
2090 # Make sure volume is in the same AZ as the VM to be attached to
2091 availability_zone=vm_av_zone,
2092 )
2093 boot_volume_id = volume.id
aticig2f4ab6c2022-09-03 18:15:20 +03002094 self.update_block_device_mapping(
2095 volume=volume,
2096 block_device_mapping=block_device_mapping,
2097 base_disk_index=base_disk_index,
2098 disk=disk,
2099 created_items=created_items,
2100 )
Gulsum Atici26f73662022-10-27 15:18:27 +03002101
2102 return boot_volume_id
2103
aticig2f4ab6c2022-09-03 18:15:20 +03002104 @staticmethod
2105 def update_block_device_mapping(
2106 volume: object,
2107 block_device_mapping: dict,
2108 base_disk_index: int,
2109 disk: dict,
2110 created_items: dict,
2111 ) -> None:
2112 """Add volume information to block device mapping dict.
2113 Args:
2114 volume (object): Created volume object
2115 block_device_mapping (dict): Block device details
2116 base_disk_index (int): Disk index
2117 disk (dict): Disk details
2118 created_items (dict): All created items belongs to VM
2119 """
2120 if not volume:
2121 raise vimconn.VimConnException("Volume is empty.")
2122
2123 if not hasattr(volume, "id"):
2124 raise vimconn.VimConnException(
2125 "Created volume is not valid, does not have id attribute."
2126 )
2127
2128 volume_txt = "volume:" + str(volume.id)
2129 if disk.get("keep"):
2130 volume_txt += ":keep"
2131 created_items[volume_txt] = True
2132 block_device_mapping["vd" + chr(base_disk_index)] = volume.id
2133
Gulsum Atici26f73662022-10-27 15:18:27 +03002134 def _prepare_non_root_persistent_volumes(
2135 self,
2136 name: str,
2137 disk: dict,
2138 vm_av_zone: list,
2139 block_device_mapping: dict,
2140 base_disk_index: int,
2141 existing_vim_volumes: list,
2142 created_items: dict,
2143 ) -> None:
2144 """Prepare persistent volumes for new VM instance.
2145
2146 Args:
2147 name (str): Name of VM instance
2148 disk (dict): Disk details
2149 vm_av_zone (list): List of availability zones
2150 block_device_mapping (dict): Block device details
2151 base_disk_index (int): Disk index
2152 existing_vim_volumes (list): Existing disk details
2153 created_items (dict): All created items belongs to VM
2154 """
2155 # Non-root persistent volumes
2156 # Disk may include only vim_volume_id or only vim_id."
2157 key_id = "vim_volume_id" if "vim_volume_id" in disk.keys() else "vim_id"
2158
2159 if disk.get(key_id):
Gulsum Atici26f73662022-10-27 15:18:27 +03002160 # Use existing persistent volume
2161 block_device_mapping["vd" + chr(base_disk_index)] = disk[key_id]
2162 existing_vim_volumes.append({"id": disk[key_id]})
2163
2164 else:
2165 # Create persistent volume
2166 volume = self.cinder.volumes.create(
2167 size=disk["size"],
2168 name=name + "vd" + chr(base_disk_index),
2169 # Make sure volume is in the same AZ as the VM to be attached to
2170 availability_zone=vm_av_zone,
2171 )
aticig2f4ab6c2022-09-03 18:15:20 +03002172 self.update_block_device_mapping(
2173 volume=volume,
2174 block_device_mapping=block_device_mapping,
2175 base_disk_index=base_disk_index,
2176 disk=disk,
2177 created_items=created_items,
2178 )
Gulsum Atici26f73662022-10-27 15:18:27 +03002179
2180 def _wait_for_created_volumes_availability(
2181 self, elapsed_time: int, created_items: dict
2182 ) -> Optional[int]:
2183 """Wait till created volumes become available.
2184
2185 Args:
2186 elapsed_time (int): Passed time while waiting
2187 created_items (dict): All created items belongs to VM
2188
2189 Returns:
2190 elapsed_time (int): Time spent while waiting
2191
2192 """
2193
2194 while elapsed_time < volume_timeout:
2195 for created_item in created_items:
aticig2f4ab6c2022-09-03 18:15:20 +03002196 v, volume_id = (
2197 created_item.split(":")[0],
2198 created_item.split(":")[1],
2199 )
Gulsum Atici26f73662022-10-27 15:18:27 +03002200 if v == "volume":
2201 if self.cinder.volumes.get(volume_id).status != "available":
2202 break
2203 else:
2204 # All ready: break from while
2205 break
2206
2207 time.sleep(5)
2208 elapsed_time += 5
2209
2210 return elapsed_time
2211
2212 def _wait_for_existing_volumes_availability(
2213 self, elapsed_time: int, existing_vim_volumes: list
2214 ) -> Optional[int]:
2215 """Wait till existing volumes become available.
2216
2217 Args:
2218 elapsed_time (int): Passed time while waiting
2219 existing_vim_volumes (list): Existing volume details
2220
2221 Returns:
2222 elapsed_time (int): Time spent while waiting
2223
2224 """
2225
2226 while elapsed_time < volume_timeout:
2227 for volume in existing_vim_volumes:
2228 if self.cinder.volumes.get(volume["id"]).status != "available":
2229 break
2230 else: # all ready: break from while
2231 break
2232
2233 time.sleep(5)
2234 elapsed_time += 5
2235
2236 return elapsed_time
2237
2238 def _prepare_disk_for_vminstance(
2239 self,
2240 name: str,
2241 existing_vim_volumes: list,
2242 created_items: dict,
2243 vm_av_zone: list,
Gulsum Atici13d02322022-11-18 00:10:15 +03002244 block_device_mapping: dict,
Gulsum Atici26f73662022-10-27 15:18:27 +03002245 disk_list: list = None,
2246 ) -> None:
2247 """Prepare all volumes for new VM instance.
2248
2249 Args:
2250 name (str): Name of Instance
2251 existing_vim_volumes (list): List of existing volumes
2252 created_items (dict): All created items belongs to VM
2253 vm_av_zone (list): VM availability zone
Gulsum Atici13d02322022-11-18 00:10:15 +03002254 block_device_mapping (dict): Block devices to be attached to VM
Gulsum Atici26f73662022-10-27 15:18:27 +03002255 disk_list (list): List of disks
2256
2257 """
2258 # Create additional volumes in case these are present in disk_list
2259 base_disk_index = ord("b")
2260 boot_volume_id = None
2261 elapsed_time = 0
2262
Gulsum Atici26f73662022-10-27 15:18:27 +03002263 for disk in disk_list:
2264 if "image_id" in disk:
2265 # Root persistent volume
2266 base_disk_index = ord("a")
2267 boot_volume_id = self._prepare_persistent_root_volumes(
2268 name=name,
2269 vm_av_zone=vm_av_zone,
2270 disk=disk,
2271 base_disk_index=base_disk_index,
2272 block_device_mapping=block_device_mapping,
2273 existing_vim_volumes=existing_vim_volumes,
2274 created_items=created_items,
2275 )
2276 else:
2277 # Non-root persistent volume
2278 self._prepare_non_root_persistent_volumes(
2279 name=name,
2280 disk=disk,
2281 vm_av_zone=vm_av_zone,
2282 block_device_mapping=block_device_mapping,
2283 base_disk_index=base_disk_index,
2284 existing_vim_volumes=existing_vim_volumes,
2285 created_items=created_items,
2286 )
2287 base_disk_index += 1
2288
2289 # Wait until created volumes are with status available
2290 elapsed_time = self._wait_for_created_volumes_availability(
2291 elapsed_time, created_items
2292 )
2293 # Wait until existing volumes in vim are with status available
2294 elapsed_time = self._wait_for_existing_volumes_availability(
2295 elapsed_time, existing_vim_volumes
2296 )
2297 # If we exceeded the timeout rollback
2298 if elapsed_time >= volume_timeout:
2299 raise vimconn.VimConnException(
2300 "Timeout creating volumes for instance " + name,
2301 http_code=vimconn.HTTP_Request_Timeout,
2302 )
2303 if boot_volume_id:
2304 self.cinder.volumes.set_bootable(boot_volume_id, True)
2305
2306 def _find_the_external_network_for_floating_ip(self):
2307 """Get the external network ip in order to create floating IP.
2308
2309 Returns:
2310 pool_id (str): External network pool ID
2311
2312 """
2313
2314 # Find the external network
2315 external_nets = list()
2316
2317 for net in self.neutron.list_networks()["networks"]:
2318 if net["router:external"]:
2319 external_nets.append(net)
2320
2321 if len(external_nets) == 0:
2322 raise vimconn.VimConnException(
2323 "Cannot create floating_ip automatically since "
2324 "no external network is present",
2325 http_code=vimconn.HTTP_Conflict,
2326 )
2327
2328 if len(external_nets) > 1:
2329 raise vimconn.VimConnException(
2330 "Cannot create floating_ip automatically since "
2331 "multiple external networks are present",
2332 http_code=vimconn.HTTP_Conflict,
2333 )
2334
2335 # Pool ID
2336 return external_nets[0].get("id")
2337
2338 def _neutron_create_float_ip(self, param: dict, created_items: dict) -> None:
2339 """Trigger neutron to create a new floating IP using external network ID.
2340
2341 Args:
2342 param (dict): Input parameters to create a floating IP
2343 created_items (dict): All created items belongs to new VM instance
2344
2345 Raises:
2346
2347 VimConnException
2348 """
2349 try:
2350 self.logger.debug("Creating floating IP")
2351 new_floating_ip = self.neutron.create_floatingip(param)
2352 free_floating_ip = new_floating_ip["floatingip"]["id"]
2353 created_items["floating_ip:" + str(free_floating_ip)] = True
2354
2355 except Exception as e:
2356 raise vimconn.VimConnException(
2357 type(e).__name__ + ": Cannot create new floating_ip " + str(e),
2358 http_code=vimconn.HTTP_Conflict,
2359 )
2360
2361 def _create_floating_ip(
2362 self, floating_network: dict, server: object, created_items: dict
2363 ) -> None:
2364 """Get the available Pool ID and create a new floating IP.
2365
2366 Args:
2367 floating_network (dict): Dict including external network ID
2368 server (object): Server object
2369 created_items (dict): All created items belongs to new VM instance
2370
2371 """
2372
2373 # Pool_id is available
2374 if (
2375 isinstance(floating_network["floating_ip"], str)
2376 and floating_network["floating_ip"].lower() != "true"
2377 ):
2378 pool_id = floating_network["floating_ip"]
2379
2380 # Find the Pool_id
2381 else:
2382 pool_id = self._find_the_external_network_for_floating_ip()
2383
2384 param = {
2385 "floatingip": {
2386 "floating_network_id": pool_id,
2387 "tenant_id": server.tenant_id,
2388 }
2389 }
2390
2391 self._neutron_create_float_ip(param, created_items)
2392
2393 def _find_floating_ip(
2394 self,
2395 server: object,
2396 floating_ips: list,
2397 floating_network: dict,
2398 ) -> Optional[str]:
2399 """Find the available free floating IPs if there are.
2400
2401 Args:
2402 server (object): Server object
2403 floating_ips (list): List of floating IPs
2404 floating_network (dict): Details of floating network such as ID
2405
2406 Returns:
2407 free_floating_ip (str): Free floating ip address
2408
2409 """
2410 for fip in floating_ips:
2411 if fip.get("port_id") or fip.get("tenant_id") != server.tenant_id:
2412 continue
2413
2414 if isinstance(floating_network["floating_ip"], str):
2415 if fip.get("floating_network_id") != floating_network["floating_ip"]:
2416 continue
2417
2418 return fip["id"]
2419
2420 def _assign_floating_ip(
2421 self, free_floating_ip: str, floating_network: dict
2422 ) -> Dict:
2423 """Assign the free floating ip address to port.
2424
2425 Args:
2426 free_floating_ip (str): Floating IP to be assigned
2427 floating_network (dict): ID of floating network
2428
2429 Returns:
2430 fip (dict) (dict): Floating ip details
2431
2432 """
2433 # The vim_id key contains the neutron.port_id
2434 self.neutron.update_floatingip(
2435 free_floating_ip,
2436 {"floatingip": {"port_id": floating_network["vim_id"]}},
2437 )
2438 # For race condition ensure not re-assigned to other VM after 5 seconds
2439 time.sleep(5)
2440
2441 return self.neutron.show_floatingip(free_floating_ip)
2442
2443 def _get_free_floating_ip(
Gulsum Atici9e76ebb2022-12-12 19:21:25 +03002444 self, server: object, floating_network: dict
Gulsum Atici26f73662022-10-27 15:18:27 +03002445 ) -> Optional[str]:
2446 """Get the free floating IP address.
2447
2448 Args:
2449 server (object): Server Object
2450 floating_network (dict): Floating network details
Gulsum Atici26f73662022-10-27 15:18:27 +03002451
2452 Returns:
2453 free_floating_ip (str): Free floating ip addr
2454
2455 """
2456
2457 floating_ips = self.neutron.list_floatingips().get("floatingips", ())
2458
2459 # Randomize
2460 random.shuffle(floating_ips)
2461
Gulsum Atici9e76ebb2022-12-12 19:21:25 +03002462 return self._find_floating_ip(server, floating_ips, floating_network)
Gulsum Atici26f73662022-10-27 15:18:27 +03002463
2464 def _prepare_external_network_for_vminstance(
2465 self,
2466 external_network: list,
2467 server: object,
2468 created_items: dict,
2469 vm_start_time: float,
2470 ) -> None:
2471 """Assign floating IP address for VM instance.
2472
2473 Args:
2474 external_network (list): ID of External network
2475 server (object): Server Object
2476 created_items (dict): All created items belongs to new VM instance
2477 vm_start_time (float): Time as a floating point number expressed in seconds since the epoch, in UTC
2478
2479 Raises:
2480 VimConnException
2481
2482 """
2483 for floating_network in external_network:
2484 try:
2485 assigned = False
2486 floating_ip_retries = 3
2487 # In case of RO in HA there can be conflicts, two RO trying to assign same floating IP, so retry
2488 # several times
2489 while not assigned:
Gulsum Atici26f73662022-10-27 15:18:27 +03002490 free_floating_ip = self._get_free_floating_ip(
Gulsum Atici9e76ebb2022-12-12 19:21:25 +03002491 server, floating_network
Gulsum Atici26f73662022-10-27 15:18:27 +03002492 )
2493
2494 if not free_floating_ip:
2495 self._create_floating_ip(
2496 floating_network, server, created_items
2497 )
2498
2499 try:
2500 # For race condition ensure not already assigned
2501 fip = self.neutron.show_floatingip(free_floating_ip)
2502
2503 if fip["floatingip"].get("port_id"):
2504 continue
2505
2506 # Assign floating ip
2507 fip = self._assign_floating_ip(
2508 free_floating_ip, floating_network
2509 )
2510
2511 if fip["floatingip"]["port_id"] != floating_network["vim_id"]:
2512 self.logger.warning(
2513 "floating_ip {} re-assigned to other port".format(
2514 free_floating_ip
2515 )
2516 )
2517 continue
2518
2519 self.logger.debug(
2520 "Assigned floating_ip {} to VM {}".format(
2521 free_floating_ip, server.id
2522 )
2523 )
2524
2525 assigned = True
2526
2527 except Exception as e:
2528 # Openstack need some time after VM creation to assign an IP. So retry if fails
2529 vm_status = self.nova.servers.get(server.id).status
2530
2531 if vm_status not in ("ACTIVE", "ERROR"):
2532 if time.time() - vm_start_time < server_timeout:
2533 time.sleep(5)
2534 continue
2535 elif floating_ip_retries > 0:
2536 floating_ip_retries -= 1
2537 continue
2538
2539 raise vimconn.VimConnException(
2540 "Cannot create floating_ip: {} {}".format(
2541 type(e).__name__, e
2542 ),
2543 http_code=vimconn.HTTP_Conflict,
2544 )
2545
2546 except Exception as e:
2547 if not floating_network["exit_on_floating_ip_error"]:
2548 self.logger.error("Cannot create floating_ip. %s", str(e))
2549 continue
2550
2551 raise
2552
2553 def _update_port_security_for_vminstance(
2554 self,
2555 no_secured_ports: list,
2556 server: object,
2557 ) -> None:
2558 """Updates the port security according to no_secured_ports list.
2559
2560 Args:
2561 no_secured_ports (list): List of ports that security will be disabled
2562 server (object): Server Object
2563
2564 Raises:
2565 VimConnException
2566
2567 """
2568 # Wait until the VM is active and then disable the port-security
2569 if no_secured_ports:
2570 self.__wait_for_vm(server.id, "ACTIVE")
2571
2572 for port in no_secured_ports:
2573 port_update = {
2574 "port": {"port_security_enabled": False, "security_groups": None}
2575 }
2576
2577 if port[1] == "allow-address-pairs":
2578 port_update = {
2579 "port": {"allowed_address_pairs": [{"ip_address": "0.0.0.0/0"}]}
2580 }
2581
2582 try:
2583 self.neutron.update_port(port[0], port_update)
2584
2585 except Exception:
Gulsum Atici26f73662022-10-27 15:18:27 +03002586 raise vimconn.VimConnException(
2587 "It was not possible to disable port security for port {}".format(
2588 port[0]
2589 )
2590 )
2591
sousaedu80135b92021-02-17 15:05:18 +01002592 def new_vminstance(
2593 self,
Gulsum Atici26f73662022-10-27 15:18:27 +03002594 name: str,
2595 description: str,
2596 start: bool,
2597 image_id: str,
2598 flavor_id: str,
2599 affinity_group_list: list,
2600 net_list: list,
sousaedu80135b92021-02-17 15:05:18 +01002601 cloud_config=None,
2602 disk_list=None,
2603 availability_zone_index=None,
2604 availability_zone_list=None,
Gulsum Atici26f73662022-10-27 15:18:27 +03002605 ) -> tuple:
2606 """Adds a VM instance to VIM.
2607
2608 Args:
2609 name (str): name of VM
2610 description (str): description
2611 start (bool): indicates if VM must start or boot in pause mode. Ignored
2612 image_id (str) image uuid
2613 flavor_id (str) flavor uuid
2614 affinity_group_list (list): list of affinity groups, each one is a dictionary.Ignore if empty.
2615 net_list (list): list of interfaces, each one is a dictionary with:
2616 name: name of network
2617 net_id: network uuid to connect
2618 vpci: virtual vcpi to assign, ignored because openstack lack #TODO
2619 model: interface model, ignored #TODO
2620 mac_address: used for SR-IOV ifaces #TODO for other types
2621 use: 'data', 'bridge', 'mgmt'
2622 type: 'virtual', 'PCI-PASSTHROUGH'('PF'), 'SR-IOV'('VF'), 'VFnotShared'
2623 vim_id: filled/added by this function
2624 floating_ip: True/False (or it can be None)
2625 port_security: True/False
2626 cloud_config (dict): (optional) dictionary with:
2627 key-pairs: (optional) list of strings with the public key to be inserted to the default user
2628 users: (optional) list of users to be inserted, each item is a dict with:
2629 name: (mandatory) user name,
2630 key-pairs: (optional) list of strings with the public key to be inserted to the user
2631 user-data: (optional) string is a text script to be passed directly to cloud-init
2632 config-files: (optional). List of files to be transferred. Each item is a dict with:
2633 dest: (mandatory) string with the destination absolute path
2634 encoding: (optional, by default text). Can be one of:
tierno1d213f42020-04-24 14:02:51 +00002635 'b64', 'base64', 'gz', 'gz+b64', 'gz+base64', 'gzip+b64', 'gzip+base64'
Gulsum Atici26f73662022-10-27 15:18:27 +03002636 content : (mandatory) string with the content of the file
2637 permissions: (optional) string with file permissions, typically octal notation '0644'
2638 owner: (optional) file owner, string with the format 'owner:group'
2639 boot-data-drive: boolean to indicate if user-data must be passed using a boot drive (hard disk)
2640 disk_list: (optional) list with additional disks to the VM. Each item is a dict with:
2641 image_id: (optional). VIM id of an existing image. If not provided an empty disk must be mounted
2642 size: (mandatory) string with the size of the disk in GB
2643 vim_id: (optional) should use this existing volume id
2644 availability_zone_index: Index of availability_zone_list to use for this this VM. None if not AV required
2645 availability_zone_list: list of availability zones given by user in the VNFD descriptor. Ignore if
tierno5a3273c2017-08-29 11:43:46 +02002646 availability_zone_index is None
tierno7edb6752016-03-21 17:37:52 +01002647 #TODO ip, security groups
Gulsum Atici26f73662022-10-27 15:18:27 +03002648
2649 Returns:
2650 A tuple with the instance identifier and created_items or raises an exception on error
tierno98e909c2017-10-14 13:27:03 +02002651 created_items can be None or a dictionary where this method can include key-values that will be passed to
2652 the method delete_vminstance and action_vminstance. Can be used to store created ports, volumes, etc.
2653 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
2654 as not present.
aticig2f4ab6c2022-09-03 18:15:20 +03002655
tierno98e909c2017-10-14 13:27:03 +02002656 """
sousaedu80135b92021-02-17 15:05:18 +01002657 self.logger.debug(
2658 "new_vminstance input: image='%s' flavor='%s' nics='%s'",
2659 image_id,
2660 flavor_id,
2661 str(net_list),
2662 )
2663
tierno7edb6752016-03-21 17:37:52 +01002664 try:
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002665 server = None
tierno98e909c2017-10-14 13:27:03 +02002666 created_items = {}
tierno98e909c2017-10-14 13:27:03 +02002667 net_list_vim = []
Gulsum Atici26f73662022-10-27 15:18:27 +03002668 # list of external networks to be connected to instance, later on used to create floating_ip
tierno1ec592d2020-06-16 15:29:47 +00002669 external_network = []
Gulsum Atici26f73662022-10-27 15:18:27 +03002670 # List of ports with port-security disabled
2671 no_secured_ports = []
Gulsum Atici13d02322022-11-18 00:10:15 +03002672 block_device_mapping = {}
Gulsum Atici26f73662022-10-27 15:18:27 +03002673 existing_vim_volumes = []
2674 server_group_id = None
2675 scheduller_hints = {}
tiernoa05b65a2019-02-01 12:30:27 +00002676
Gulsum Atici26f73662022-10-27 15:18:27 +03002677 # Check the Openstack Connection
2678 self._reload_connection()
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02002679
Gulsum Atici26f73662022-10-27 15:18:27 +03002680 # Prepare network list
2681 self._prepare_network_for_vminstance(
2682 name=name,
2683 net_list=net_list,
2684 created_items=created_items,
2685 net_list_vim=net_list_vim,
2686 external_network=external_network,
2687 no_secured_ports=no_secured_ports,
sousaedu80135b92021-02-17 15:05:18 +01002688 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002689
Gulsum Atici26f73662022-10-27 15:18:27 +03002690 # Cloud config
tierno0a1437e2017-10-02 00:17:43 +02002691 config_drive, userdata = self._create_user_data(cloud_config)
montesmoreno0c8def02016-12-22 12:16:23 +00002692
Gulsum Atici26f73662022-10-27 15:18:27 +03002693 # Get availability Zone
Alexis Romero247cc432022-05-12 13:23:25 +02002694 vm_av_zone = self._get_vm_availability_zone(
2695 availability_zone_index, availability_zone_list
2696 )
2697
tierno1df468d2018-07-06 14:25:16 +02002698 if disk_list:
Gulsum Atici26f73662022-10-27 15:18:27 +03002699 # Prepare disks
2700 self._prepare_disk_for_vminstance(
2701 name=name,
2702 existing_vim_volumes=existing_vim_volumes,
2703 created_items=created_items,
2704 vm_av_zone=vm_av_zone,
Gulsum Atici13d02322022-11-18 00:10:15 +03002705 block_device_mapping=block_device_mapping,
Gulsum Atici26f73662022-10-27 15:18:27 +03002706 disk_list=disk_list,
2707 )
Alexis Romerob70f4ed2022-03-11 18:00:49 +01002708
2709 if affinity_group_list:
2710 # Only first id on the list will be used. Openstack restriction
2711 server_group_id = affinity_group_list[0]["affinity_group_id"]
2712 scheduller_hints["group"] = server_group_id
2713
sousaedu80135b92021-02-17 15:05:18 +01002714 self.logger.debug(
2715 "nova.servers.create({}, {}, {}, nics={}, security_groups={}, "
2716 "availability_zone={}, key_name={}, userdata={}, config_drive={}, "
Alexis Romerob70f4ed2022-03-11 18:00:49 +01002717 "block_device_mapping={}, server_group={})".format(
sousaedu80135b92021-02-17 15:05:18 +01002718 name,
2719 image_id,
2720 flavor_id,
2721 net_list_vim,
2722 self.config.get("security_groups"),
2723 vm_av_zone,
2724 self.config.get("keypair"),
2725 userdata,
2726 config_drive,
2727 block_device_mapping,
Alexis Romerob70f4ed2022-03-11 18:00:49 +01002728 server_group_id,
sousaedu80135b92021-02-17 15:05:18 +01002729 )
2730 )
Gulsum Atici26f73662022-10-27 15:18:27 +03002731
2732 # Create VM
sousaedu80135b92021-02-17 15:05:18 +01002733 server = self.nova.servers.create(
aticigcf14bb12022-05-19 13:03:17 +03002734 name=name,
2735 image=image_id,
2736 flavor=flavor_id,
sousaedu80135b92021-02-17 15:05:18 +01002737 nics=net_list_vim,
2738 security_groups=self.config.get("security_groups"),
2739 # TODO remove security_groups in future versions. Already at neutron port
2740 availability_zone=vm_av_zone,
2741 key_name=self.config.get("keypair"),
2742 userdata=userdata,
2743 config_drive=config_drive,
2744 block_device_mapping=block_device_mapping,
Alexis Romerob70f4ed2022-03-11 18:00:49 +01002745 scheduler_hints=scheduller_hints,
Gulsum Atici26f73662022-10-27 15:18:27 +03002746 )
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002747
tierno326fd5e2018-02-22 11:58:59 +01002748 vm_start_time = time.time()
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002749
Gulsum Atici26f73662022-10-27 15:18:27 +03002750 self._update_port_security_for_vminstance(no_secured_ports, server)
bravof7a1f5252020-10-20 10:27:42 -03002751
Gulsum Atici26f73662022-10-27 15:18:27 +03002752 self._prepare_external_network_for_vminstance(
2753 external_network=external_network,
2754 server=server,
2755 created_items=created_items,
2756 vm_start_time=vm_start_time,
2757 )
montesmoreno2a1fc4e2017-01-09 16:46:04 +00002758
tierno98e909c2017-10-14 13:27:03 +02002759 return server.id, created_items
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002760
2761 except Exception as e:
tierno98e909c2017-10-14 13:27:03 +02002762 server_id = None
2763 if server:
2764 server_id = server.id
sousaedu80135b92021-02-17 15:05:18 +01002765
tierno98e909c2017-10-14 13:27:03 +02002766 try:
aticig2f4ab6c2022-09-03 18:15:20 +03002767 created_items = self.remove_keep_tag_from_persistent_volumes(
2768 created_items
2769 )
2770
tierno98e909c2017-10-14 13:27:03 +02002771 self.delete_vminstance(server_id, created_items)
Gulsum Atici26f73662022-10-27 15:18:27 +03002772
tierno98e909c2017-10-14 13:27:03 +02002773 except Exception as e2:
2774 self.logger.error("new_vminstance rollback fail {}".format(e2))
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002775
tiernoae4a8d12016-07-08 12:30:39 +02002776 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01002777
aticig2f4ab6c2022-09-03 18:15:20 +03002778 @staticmethod
2779 def remove_keep_tag_from_persistent_volumes(created_items: Dict) -> Dict:
2780 """Removes the keep flag from persistent volumes. So, those volumes could be removed.
2781
2782 Args:
2783 created_items (dict): All created items belongs to VM
2784
2785 Returns:
2786 updated_created_items (dict): Dict which does not include keep flag for volumes.
2787
2788 """
2789 return {
2790 key.replace(":keep", ""): value for (key, value) in created_items.items()
2791 }
2792
tierno1ec592d2020-06-16 15:29:47 +00002793 def get_vminstance(self, vm_id):
2794 """Returns the VM instance information from VIM"""
2795 # self.logger.debug("Getting VM from VIM")
tierno7edb6752016-03-21 17:37:52 +01002796 try:
2797 self._reload_connection()
2798 server = self.nova.servers.find(id=vm_id)
tierno1ec592d2020-06-16 15:29:47 +00002799 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
sousaedu80135b92021-02-17 15:05:18 +01002800
tiernoae4a8d12016-07-08 12:30:39 +02002801 return server.to_dict()
sousaedu80135b92021-02-17 15:05:18 +01002802 except (
2803 ksExceptions.ClientException,
2804 nvExceptions.ClientException,
2805 nvExceptions.NotFound,
2806 ConnectionError,
2807 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002808 self._format_exception(e)
2809
tierno1ec592d2020-06-16 15:29:47 +00002810 def get_vminstance_console(self, vm_id, console_type="vnc"):
2811 """
tierno7edb6752016-03-21 17:37:52 +01002812 Get a console for the virtual machine
2813 Params:
2814 vm_id: uuid of the VM
2815 console_type, can be:
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002816 "novnc" (by default), "xvpvnc" for VNC types,
tierno7edb6752016-03-21 17:37:52 +01002817 "rdp-html5" for RDP types, "spice-html5" for SPICE types
tiernoae4a8d12016-07-08 12:30:39 +02002818 Returns dict with the console parameters:
2819 protocol: ssh, ftp, http, https, ...
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002820 server: usually ip address
2821 port: the http, ssh, ... port
2822 suffix: extra text, e.g. the http path and query string
tierno1ec592d2020-06-16 15:29:47 +00002823 """
tiernoae4a8d12016-07-08 12:30:39 +02002824 self.logger.debug("Getting VM CONSOLE from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002825
tierno7edb6752016-03-21 17:37:52 +01002826 try:
2827 self._reload_connection()
2828 server = self.nova.servers.find(id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002829
tierno1ec592d2020-06-16 15:29:47 +00002830 if console_type is None or console_type == "novnc":
tierno7edb6752016-03-21 17:37:52 +01002831 console_dict = server.get_vnc_console("novnc")
2832 elif console_type == "xvpvnc":
2833 console_dict = server.get_vnc_console(console_type)
2834 elif console_type == "rdp-html5":
2835 console_dict = server.get_rdp_console(console_type)
2836 elif console_type == "spice-html5":
2837 console_dict = server.get_spice_console(console_type)
2838 else:
sousaedu80135b92021-02-17 15:05:18 +01002839 raise vimconn.VimConnException(
2840 "console type '{}' not allowed".format(console_type),
2841 http_code=vimconn.HTTP_Bad_Request,
2842 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002843
tierno7edb6752016-03-21 17:37:52 +01002844 console_dict1 = console_dict.get("console")
sousaedu80135b92021-02-17 15:05:18 +01002845
tierno7edb6752016-03-21 17:37:52 +01002846 if console_dict1:
2847 console_url = console_dict1.get("url")
sousaedu80135b92021-02-17 15:05:18 +01002848
tierno7edb6752016-03-21 17:37:52 +01002849 if console_url:
tierno1ec592d2020-06-16 15:29:47 +00002850 # parse console_url
tierno7edb6752016-03-21 17:37:52 +01002851 protocol_index = console_url.find("//")
sousaedu80135b92021-02-17 15:05:18 +01002852 suffix_index = (
2853 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2854 )
2855 port_index = (
2856 console_url[protocol_index + 2 : suffix_index].find(":")
2857 + protocol_index
2858 + 2
2859 )
2860
tierno1ec592d2020-06-16 15:29:47 +00002861 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
sousaedu80135b92021-02-17 15:05:18 +01002862 return (
2863 -vimconn.HTTP_Internal_Server_Error,
2864 "Unexpected response from VIM",
2865 )
2866
2867 console_dict = {
2868 "protocol": console_url[0:protocol_index],
2869 "server": console_url[protocol_index + 2 : port_index],
2870 "port": console_url[port_index:suffix_index],
2871 "suffix": console_url[suffix_index + 1 :],
2872 }
tierno7edb6752016-03-21 17:37:52 +01002873 protocol_index += 2
sousaedu80135b92021-02-17 15:05:18 +01002874
tiernoae4a8d12016-07-08 12:30:39 +02002875 return console_dict
tierno72774862020-05-04 11:44:15 +00002876 raise vimconn.VimConnUnexpectedResponse("Unexpected response from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002877 except (
2878 nvExceptions.NotFound,
2879 ksExceptions.ClientException,
2880 nvExceptions.ClientException,
2881 nvExceptions.BadRequest,
2882 ConnectionError,
2883 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002884 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01002885
Gulsum Atici4bc8eb92022-11-21 14:11:02 +03002886 def _delete_ports_by_id_wth_neutron(self, k_id: str) -> None:
2887 """Neutron delete ports by id.
2888 Args:
2889 k_id (str): Port id in the VIM
2890 """
2891 try:
Gulsum Atici4bc8eb92022-11-21 14:11:02 +03002892 port_dict = self.neutron.list_ports()
2893 existing_ports = [port["id"] for port in port_dict["ports"] if port_dict]
2894
2895 if k_id in existing_ports:
2896 self.neutron.delete_port(k_id)
2897
2898 except Exception as e:
Gulsum Atici4bc8eb92022-11-21 14:11:02 +03002899 self.logger.error("Error deleting port: {}: {}".format(type(e).__name__, e))
2900
2901 def _delete_volumes_by_id_wth_cinder(
2902 self, k: str, k_id: str, volumes_to_hold: list, created_items: dict
2903 ) -> bool:
2904 """Cinder delete volume by id.
2905 Args:
2906 k (str): Full item name in created_items
2907 k_id (str): ID of floating ip in VIM
2908 volumes_to_hold (list): Volumes not to delete
2909 created_items (dict): All created items belongs to VM
2910 """
2911 try:
2912 if k_id in volumes_to_hold:
2913 return
2914
2915 if self.cinder.volumes.get(k_id).status != "available":
2916 return True
2917
2918 else:
2919 self.cinder.volumes.delete(k_id)
2920 created_items[k] = None
2921
2922 except Exception as e:
2923 self.logger.error(
2924 "Error deleting volume: {}: {}".format(type(e).__name__, e)
2925 )
2926
2927 def _delete_floating_ip_by_id(self, k: str, k_id: str, created_items: dict) -> None:
2928 """Neutron delete floating ip by id.
2929 Args:
2930 k (str): Full item name in created_items
2931 k_id (str): ID of floating ip in VIM
2932 created_items (dict): All created items belongs to VM
2933 """
2934 try:
2935 self.neutron.delete_floatingip(k_id)
2936 created_items[k] = None
2937
2938 except Exception as e:
2939 self.logger.error(
2940 "Error deleting floating ip: {}: {}".format(type(e).__name__, e)
2941 )
2942
2943 @staticmethod
2944 def _get_item_name_id(k: str) -> Tuple[str, str]:
2945 k_item, _, k_id = k.partition(":")
2946 return k_item, k_id
2947
2948 def _delete_vm_ports_attached_to_network(self, created_items: dict) -> None:
2949 """Delete VM ports attached to the networks before deleting virtual machine.
2950 Args:
2951 created_items (dict): All created items belongs to VM
2952 """
2953
2954 for k, v in created_items.items():
2955 if not v: # skip already deleted
2956 continue
2957
2958 try:
2959 k_item, k_id = self._get_item_name_id(k)
2960 if k_item == "port":
2961 self._delete_ports_by_id_wth_neutron(k_id)
2962
2963 except Exception as e:
2964 self.logger.error(
2965 "Error deleting port: {}: {}".format(type(e).__name__, e)
2966 )
2967
2968 def _delete_created_items(
2969 self, created_items: dict, volumes_to_hold: list, keep_waiting: bool
2970 ) -> bool:
2971 """Delete Volumes and floating ip if they exist in created_items."""
2972 for k, v in created_items.items():
2973 if not v: # skip already deleted
2974 continue
2975
2976 try:
2977 k_item, k_id = self._get_item_name_id(k)
2978
2979 if k_item == "volume":
Gulsum Atici4bc8eb92022-11-21 14:11:02 +03002980 unavailable_vol = self._delete_volumes_by_id_wth_cinder(
2981 k, k_id, volumes_to_hold, created_items
2982 )
2983
2984 if unavailable_vol:
2985 keep_waiting = True
2986
2987 elif k_item == "floating_ip":
Gulsum Atici4bc8eb92022-11-21 14:11:02 +03002988 self._delete_floating_ip_by_id(k, k_id, created_items)
2989
2990 except Exception as e:
2991 self.logger.error("Error deleting {}: {}".format(k, e))
2992
2993 return keep_waiting
2994
aticig2f4ab6c2022-09-03 18:15:20 +03002995 @staticmethod
2996 def _extract_items_wth_keep_flag_from_created_items(created_items: dict) -> dict:
2997 """Remove the volumes which has key flag from created_items
2998
2999 Args:
3000 created_items (dict): All created items belongs to VM
3001
3002 Returns:
3003 created_items (dict): Persistent volumes eliminated created_items
3004 """
3005 return {
3006 key: value
3007 for (key, value) in created_items.items()
3008 if len(key.split(":")) == 2
3009 }
3010
Gulsum Atici4bc8eb92022-11-21 14:11:02 +03003011 def delete_vminstance(
3012 self, vm_id: str, created_items: dict = None, volumes_to_hold: list = None
3013 ) -> None:
3014 """Removes a VM instance from VIM. Returns the old identifier.
3015 Args:
3016 vm_id (str): Identifier of VM instance
3017 created_items (dict): All created items belongs to VM
3018 volumes_to_hold (list): Volumes_to_hold
3019 """
tierno1ec592d2020-06-16 15:29:47 +00003020 if created_items is None:
tierno98e909c2017-10-14 13:27:03 +02003021 created_items = {}
Gulsum Atici4bc8eb92022-11-21 14:11:02 +03003022 if volumes_to_hold is None:
3023 volumes_to_hold = []
sousaedu80135b92021-02-17 15:05:18 +01003024
tierno7edb6752016-03-21 17:37:52 +01003025 try:
aticig2f4ab6c2022-09-03 18:15:20 +03003026 created_items = self._extract_items_wth_keep_flag_from_created_items(
3027 created_items
3028 )
3029
tierno7edb6752016-03-21 17:37:52 +01003030 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01003031
Gulsum Atici4bc8eb92022-11-21 14:11:02 +03003032 # Delete VM ports attached to the networks before the virtual machine
3033 if created_items:
3034 self._delete_vm_ports_attached_to_network(created_items)
montesmoreno0c8def02016-12-22 12:16:23 +00003035
tierno98e909c2017-10-14 13:27:03 +02003036 if vm_id:
3037 self.nova.servers.delete(vm_id)
montesmoreno0c8def02016-12-22 12:16:23 +00003038
Gulsum Atici4bc8eb92022-11-21 14:11:02 +03003039 # Although having detached, volumes should have in active status before deleting.
3040 # We ensure in this loop
montesmoreno0c8def02016-12-22 12:16:23 +00003041 keep_waiting = True
3042 elapsed_time = 0
sousaedu80135b92021-02-17 15:05:18 +01003043
montesmoreno0c8def02016-12-22 12:16:23 +00003044 while keep_waiting and elapsed_time < volume_timeout:
3045 keep_waiting = False
sousaedu80135b92021-02-17 15:05:18 +01003046
Gulsum Atici4bc8eb92022-11-21 14:11:02 +03003047 # Delete volumes and floating IP.
3048 keep_waiting = self._delete_created_items(
3049 created_items, volumes_to_hold, keep_waiting
3050 )
sousaedu80135b92021-02-17 15:05:18 +01003051
montesmoreno0c8def02016-12-22 12:16:23 +00003052 if keep_waiting:
3053 time.sleep(1)
3054 elapsed_time += 1
sousaedu80135b92021-02-17 15:05:18 +01003055
sousaedu80135b92021-02-17 15:05:18 +01003056 except (
3057 nvExceptions.NotFound,
3058 ksExceptions.ClientException,
3059 nvExceptions.ClientException,
3060 ConnectionError,
3061 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02003062 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01003063
tiernoae4a8d12016-07-08 12:30:39 +02003064 def refresh_vms_status(self, vm_list):
tierno1ec592d2020-06-16 15:29:47 +00003065 """Get the status of the virtual machines and their interfaces/ports
sousaedu80135b92021-02-17 15:05:18 +01003066 Params: the list of VM identifiers
3067 Returns a dictionary with:
3068 vm_id: #VIM id of this Virtual Machine
3069 status: #Mandatory. Text with one of:
3070 # DELETED (not found at vim)
3071 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3072 # OTHER (Vim reported other status not understood)
3073 # ERROR (VIM indicates an ERROR status)
3074 # ACTIVE, PAUSED, SUSPENDED, INACTIVE (not running),
3075 # CREATING (on building process), ERROR
3076 # ACTIVE:NoMgmtIP (Active but any of its interface has an IP address
3077 #
3078 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3079 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
3080 interfaces:
3081 - vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
3082 mac_address: #Text format XX:XX:XX:XX:XX:XX
3083 vim_net_id: #network id where this interface is connected
3084 vim_interface_id: #interface/port VIM id
3085 ip_address: #null, or text with IPv4, IPv6 address
3086 compute_node: #identification of compute node where PF,VF interface is allocated
3087 pci: #PCI address of the NIC that hosts the PF,VF
3088 vlan: #physical VLAN used for VF
tierno1ec592d2020-06-16 15:29:47 +00003089 """
3090 vm_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01003091 self.logger.debug(
3092 "refresh_vms status: Getting tenant VM instance information from VIM"
3093 )
3094
tiernoae4a8d12016-07-08 12:30:39 +02003095 for vm_id in vm_list:
tierno1ec592d2020-06-16 15:29:47 +00003096 vm = {}
sousaedu80135b92021-02-17 15:05:18 +01003097
tiernoae4a8d12016-07-08 12:30:39 +02003098 try:
3099 vm_vim = self.get_vminstance(vm_id)
sousaedu80135b92021-02-17 15:05:18 +01003100
3101 if vm_vim["status"] in vmStatus2manoFormat:
3102 vm["status"] = vmStatus2manoFormat[vm_vim["status"]]
tierno7edb6752016-03-21 17:37:52 +01003103 else:
sousaedu80135b92021-02-17 15:05:18 +01003104 vm["status"] = "OTHER"
3105 vm["error_msg"] = "VIM status reported " + vm_vim["status"]
3106
tierno70eeb182020-10-19 16:38:00 +00003107 vm_vim.pop("OS-EXT-SRV-ATTR:user_data", None)
3108 vm_vim.pop("user_data", None)
sousaedu80135b92021-02-17 15:05:18 +01003109 vm["vim_info"] = self.serialize(vm_vim)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01003110
tiernoae4a8d12016-07-08 12:30:39 +02003111 vm["interfaces"] = []
sousaedu80135b92021-02-17 15:05:18 +01003112 if vm_vim.get("fault"):
3113 vm["error_msg"] = str(vm_vim["fault"])
3114
tierno1ec592d2020-06-16 15:29:47 +00003115 # get interfaces
tierno7edb6752016-03-21 17:37:52 +01003116 try:
tiernoae4a8d12016-07-08 12:30:39 +02003117 self._reload_connection()
tiernob42fd9b2018-06-20 10:44:32 +02003118 port_dict = self.neutron.list_ports(device_id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01003119
tiernoae4a8d12016-07-08 12:30:39 +02003120 for port in port_dict["ports"]:
tierno1ec592d2020-06-16 15:29:47 +00003121 interface = {}
sousaedu80135b92021-02-17 15:05:18 +01003122 interface["vim_info"] = self.serialize(port)
tiernoae4a8d12016-07-08 12:30:39 +02003123 interface["mac_address"] = port.get("mac_address")
3124 interface["vim_net_id"] = port["network_id"]
3125 interface["vim_interface_id"] = port["id"]
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01003126 # check if OS-EXT-SRV-ATTR:host is there,
Mike Marchetti5b9da422017-05-02 15:35:47 -04003127 # in case of non-admin credentials, it will be missing
sousaedu80135b92021-02-17 15:05:18 +01003128
3129 if vm_vim.get("OS-EXT-SRV-ATTR:host"):
3130 interface["compute_node"] = vm_vim["OS-EXT-SRV-ATTR:host"]
3131
tierno867ffe92017-03-27 12:50:34 +02003132 interface["pci"] = None
Mike Marchetti5b9da422017-05-02 15:35:47 -04003133
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01003134 # check if binding:profile is there,
Mike Marchetti5b9da422017-05-02 15:35:47 -04003135 # in case of non-admin credentials, it will be missing
sousaedu80135b92021-02-17 15:05:18 +01003136 if port.get("binding:profile"):
3137 if port["binding:profile"].get("pci_slot"):
tierno1ec592d2020-06-16 15:29:47 +00003138 # TODO: At the moment sr-iov pci addresses are converted to PF pci addresses by setting
3139 # the slot to 0x00
Mike Marchetti5b9da422017-05-02 15:35:47 -04003140 # TODO: This is just a workaround valid for niantinc. Find a better way to do so
3141 # CHANGE DDDD:BB:SS.F to DDDD:BB:00.(F%2) assuming there are 2 ports per nic
sousaedu80135b92021-02-17 15:05:18 +01003142 pci = port["binding:profile"]["pci_slot"]
Mike Marchetti5b9da422017-05-02 15:35:47 -04003143 # interface["pci"] = pci[:-4] + "00." + str(int(pci[-1]) % 2)
3144 interface["pci"] = pci
sousaedu80135b92021-02-17 15:05:18 +01003145
tierno867ffe92017-03-27 12:50:34 +02003146 interface["vlan"] = None
sousaedu80135b92021-02-17 15:05:18 +01003147
3148 if port.get("binding:vif_details"):
3149 interface["vlan"] = port["binding:vif_details"].get("vlan")
3150
tierno1dfe9932020-06-18 08:50:10 +00003151 # Get vlan from network in case not present in port for those old openstacks and cases where
3152 # it is needed vlan at PT
3153 if not interface["vlan"]:
3154 # if network is of type vlan and port is of type direct (sr-iov) then set vlan id
3155 network = self.neutron.show_network(port["network_id"])
sousaedu80135b92021-02-17 15:05:18 +01003156
3157 if (
3158 network["network"].get("provider:network_type")
3159 == "vlan"
3160 ):
tierno1dfe9932020-06-18 08:50:10 +00003161 # and port.get("binding:vnic_type") in ("direct", "direct-physical"):
sousaedu80135b92021-02-17 15:05:18 +01003162 interface["vlan"] = network["network"].get(
3163 "provider:segmentation_id"
3164 )
3165
tierno1ec592d2020-06-16 15:29:47 +00003166 ips = []
3167 # look for floating ip address
tiernob42fd9b2018-06-20 10:44:32 +02003168 try:
sousaedu80135b92021-02-17 15:05:18 +01003169 floating_ip_dict = self.neutron.list_floatingips(
3170 port_id=port["id"]
3171 )
3172
tiernob42fd9b2018-06-20 10:44:32 +02003173 if floating_ip_dict.get("floatingips"):
sousaedu80135b92021-02-17 15:05:18 +01003174 ips.append(
3175 floating_ip_dict["floatingips"][0].get(
3176 "floating_ip_address"
3177 )
3178 )
tiernob42fd9b2018-06-20 10:44:32 +02003179 except Exception:
3180 pass
tierno7edb6752016-03-21 17:37:52 +01003181
tiernoae4a8d12016-07-08 12:30:39 +02003182 for subnet in port["fixed_ips"]:
3183 ips.append(subnet["ip_address"])
sousaedu80135b92021-02-17 15:05:18 +01003184
tiernoae4a8d12016-07-08 12:30:39 +02003185 interface["ip_address"] = ";".join(ips)
3186 vm["interfaces"].append(interface)
3187 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01003188 self.logger.error(
3189 "Error getting vm interface information {}: {}".format(
3190 type(e).__name__, e
3191 ),
3192 exc_info=True,
3193 )
tierno72774862020-05-04 11:44:15 +00003194 except vimconn.VimConnNotFoundException as e:
tiernoae4a8d12016-07-08 12:30:39 +02003195 self.logger.error("Exception getting vm status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003196 vm["status"] = "DELETED"
3197 vm["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003198 except vimconn.VimConnException as e:
tiernoae4a8d12016-07-08 12:30:39 +02003199 self.logger.error("Exception getting vm status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003200 vm["status"] = "VIM_ERROR"
3201 vm["error_msg"] = str(e)
3202
tiernoae4a8d12016-07-08 12:30:39 +02003203 vm_dict[vm_id] = vm
sousaedu80135b92021-02-17 15:05:18 +01003204
tiernoae4a8d12016-07-08 12:30:39 +02003205 return vm_dict
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003206
tierno98e909c2017-10-14 13:27:03 +02003207 def action_vminstance(self, vm_id, action_dict, created_items={}):
tierno1ec592d2020-06-16 15:29:47 +00003208 """Send and action over a VM instance from VIM
Gulsum Atici21c55d62023-02-02 20:41:00 +03003209 Returns None or the console dict if the action was successfully sent to the VIM
3210 """
tiernoae4a8d12016-07-08 12:30:39 +02003211 self.logger.debug("Action over VM '%s': %s", vm_id, str(action_dict))
sousaedu80135b92021-02-17 15:05:18 +01003212
tierno7edb6752016-03-21 17:37:52 +01003213 try:
3214 self._reload_connection()
3215 server = self.nova.servers.find(id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01003216
tierno7edb6752016-03-21 17:37:52 +01003217 if "start" in action_dict:
tierno1ec592d2020-06-16 15:29:47 +00003218 if action_dict["start"] == "rebuild":
tierno7edb6752016-03-21 17:37:52 +01003219 server.rebuild()
3220 else:
tierno1ec592d2020-06-16 15:29:47 +00003221 if server.status == "PAUSED":
tierno7edb6752016-03-21 17:37:52 +01003222 server.unpause()
tierno1ec592d2020-06-16 15:29:47 +00003223 elif server.status == "SUSPENDED":
tierno7edb6752016-03-21 17:37:52 +01003224 server.resume()
tierno1ec592d2020-06-16 15:29:47 +00003225 elif server.status == "SHUTOFF":
tierno7edb6752016-03-21 17:37:52 +01003226 server.start()
k4.rahul78f474e2022-05-02 15:47:57 +00003227 else:
3228 self.logger.debug(
3229 "ERROR : Instance is not in SHUTOFF/PAUSE/SUSPEND state"
3230 )
3231 raise vimconn.VimConnException(
3232 "Cannot 'start' instance while it is in active state",
3233 http_code=vimconn.HTTP_Bad_Request,
3234 )
3235
tierno7edb6752016-03-21 17:37:52 +01003236 elif "pause" in action_dict:
3237 server.pause()
3238 elif "resume" in action_dict:
3239 server.resume()
3240 elif "shutoff" in action_dict or "shutdown" in action_dict:
k4.rahul78f474e2022-05-02 15:47:57 +00003241 self.logger.debug("server status %s", server.status)
3242 if server.status == "ACTIVE":
3243 server.stop()
3244 else:
3245 self.logger.debug("ERROR: VM is not in Active state")
3246 raise vimconn.VimConnException(
3247 "VM is not in active state, stop operation is not allowed",
3248 http_code=vimconn.HTTP_Bad_Request,
3249 )
tierno7edb6752016-03-21 17:37:52 +01003250 elif "forceOff" in action_dict:
tierno1ec592d2020-06-16 15:29:47 +00003251 server.stop() # TODO
tierno7edb6752016-03-21 17:37:52 +01003252 elif "terminate" in action_dict:
3253 server.delete()
3254 elif "createImage" in action_dict:
3255 server.create_image()
tierno1ec592d2020-06-16 15:29:47 +00003256 # "path":path_schema,
3257 # "description":description_schema,
3258 # "name":name_schema,
3259 # "metadata":metadata_schema,
3260 # "imageRef": id_schema,
3261 # "disk": {"oneOf":[{"type": "null"}, {"type":"string"}] },
tierno7edb6752016-03-21 17:37:52 +01003262 elif "rebuild" in action_dict:
sousaedu80135b92021-02-17 15:05:18 +01003263 server.rebuild(server.image["id"])
tierno7edb6752016-03-21 17:37:52 +01003264 elif "reboot" in action_dict:
sousaedu80135b92021-02-17 15:05:18 +01003265 server.reboot() # reboot_type="SOFT"
tierno7edb6752016-03-21 17:37:52 +01003266 elif "console" in action_dict:
3267 console_type = action_dict["console"]
sousaedu80135b92021-02-17 15:05:18 +01003268
tierno1ec592d2020-06-16 15:29:47 +00003269 if console_type is None or console_type == "novnc":
tierno7edb6752016-03-21 17:37:52 +01003270 console_dict = server.get_vnc_console("novnc")
3271 elif console_type == "xvpvnc":
3272 console_dict = server.get_vnc_console(console_type)
3273 elif console_type == "rdp-html5":
3274 console_dict = server.get_rdp_console(console_type)
3275 elif console_type == "spice-html5":
3276 console_dict = server.get_spice_console(console_type)
3277 else:
sousaedu80135b92021-02-17 15:05:18 +01003278 raise vimconn.VimConnException(
3279 "console type '{}' not allowed".format(console_type),
3280 http_code=vimconn.HTTP_Bad_Request,
3281 )
3282
tierno7edb6752016-03-21 17:37:52 +01003283 try:
3284 console_url = console_dict["console"]["url"]
tierno1ec592d2020-06-16 15:29:47 +00003285 # parse console_url
tierno7edb6752016-03-21 17:37:52 +01003286 protocol_index = console_url.find("//")
sousaedu80135b92021-02-17 15:05:18 +01003287 suffix_index = (
3288 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
3289 )
3290 port_index = (
3291 console_url[protocol_index + 2 : suffix_index].find(":")
3292 + protocol_index
3293 + 2
3294 )
3295
tierno1ec592d2020-06-16 15:29:47 +00003296 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
sousaedu80135b92021-02-17 15:05:18 +01003297 raise vimconn.VimConnException(
3298 "Unexpected response from VIM " + str(console_dict)
3299 )
3300
3301 console_dict2 = {
3302 "protocol": console_url[0:protocol_index],
3303 "server": console_url[protocol_index + 2 : port_index],
3304 "port": int(console_url[port_index + 1 : suffix_index]),
3305 "suffix": console_url[suffix_index + 1 :],
3306 }
3307
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003308 return console_dict2
tierno1ec592d2020-06-16 15:29:47 +00003309 except Exception:
sousaedu80135b92021-02-17 15:05:18 +01003310 raise vimconn.VimConnException(
3311 "Unexpected response from VIM " + str(console_dict)
3312 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003313
tierno98e909c2017-10-14 13:27:03 +02003314 return None
sousaedu80135b92021-02-17 15:05:18 +01003315 except (
3316 ksExceptions.ClientException,
3317 nvExceptions.ClientException,
3318 nvExceptions.NotFound,
3319 ConnectionError,
3320 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02003321 self._format_exception(e)
tierno1ec592d2020-06-16 15:29:47 +00003322 # TODO insert exception vimconn.HTTP_Unauthorized
tiernoae4a8d12016-07-08 12:30:39 +02003323
tierno1ec592d2020-06-16 15:29:47 +00003324 # ###### VIO Specific Changes #########
garciadeblasebd66722019-01-31 16:01:31 +00003325 def _generate_vlanID(self):
kate721d79b2017-06-24 04:21:38 -07003326 """
sousaedu80135b92021-02-17 15:05:18 +01003327 Method to get unused vlanID
kate721d79b2017-06-24 04:21:38 -07003328 Args:
3329 None
3330 Returns:
3331 vlanID
3332 """
tierno1ec592d2020-06-16 15:29:47 +00003333 # Get used VLAN IDs
kate721d79b2017-06-24 04:21:38 -07003334 usedVlanIDs = []
3335 networks = self.get_network_list()
sousaedu80135b92021-02-17 15:05:18 +01003336
kate721d79b2017-06-24 04:21:38 -07003337 for net in networks:
sousaedu80135b92021-02-17 15:05:18 +01003338 if net.get("provider:segmentation_id"):
3339 usedVlanIDs.append(net.get("provider:segmentation_id"))
3340
kate721d79b2017-06-24 04:21:38 -07003341 used_vlanIDs = set(usedVlanIDs)
3342
tierno1ec592d2020-06-16 15:29:47 +00003343 # find unused VLAN ID
sousaedu80135b92021-02-17 15:05:18 +01003344 for vlanID_range in self.config.get("dataplane_net_vlan_range"):
kate721d79b2017-06-24 04:21:38 -07003345 try:
sousaedu80135b92021-02-17 15:05:18 +01003346 start_vlanid, end_vlanid = map(
3347 int, vlanID_range.replace(" ", "").split("-")
3348 )
3349
tierno7d782ef2019-10-04 12:56:31 +00003350 for vlanID in range(start_vlanid, end_vlanid + 1):
kate721d79b2017-06-24 04:21:38 -07003351 if vlanID not in used_vlanIDs:
3352 return vlanID
3353 except Exception as exp:
sousaedu80135b92021-02-17 15:05:18 +01003354 raise vimconn.VimConnException(
3355 "Exception {} occurred while generating VLAN ID.".format(exp)
3356 )
kate721d79b2017-06-24 04:21:38 -07003357 else:
tierno1ec592d2020-06-16 15:29:47 +00003358 raise vimconn.VimConnConflictException(
3359 "Unable to create the SRIOV VLAN network. All given Vlan IDs {} are in use.".format(
sousaedu80135b92021-02-17 15:05:18 +01003360 self.config.get("dataplane_net_vlan_range")
3361 )
3362 )
kate721d79b2017-06-24 04:21:38 -07003363
garciadeblasebd66722019-01-31 16:01:31 +00003364 def _generate_multisegment_vlanID(self):
3365 """
sousaedu80135b92021-02-17 15:05:18 +01003366 Method to get unused vlanID
3367 Args:
3368 None
3369 Returns:
3370 vlanID
garciadeblasebd66722019-01-31 16:01:31 +00003371 """
tierno6869ae72020-01-09 17:37:34 +00003372 # Get used VLAN IDs
garciadeblasebd66722019-01-31 16:01:31 +00003373 usedVlanIDs = []
3374 networks = self.get_network_list()
3375 for net in networks:
sousaedu80135b92021-02-17 15:05:18 +01003376 if net.get("provider:network_type") == "vlan" and net.get(
3377 "provider:segmentation_id"
3378 ):
3379 usedVlanIDs.append(net.get("provider:segmentation_id"))
3380 elif net.get("segments"):
3381 for segment in net.get("segments"):
3382 if segment.get("provider:network_type") == "vlan" and segment.get(
3383 "provider:segmentation_id"
3384 ):
3385 usedVlanIDs.append(segment.get("provider:segmentation_id"))
3386
garciadeblasebd66722019-01-31 16:01:31 +00003387 used_vlanIDs = set(usedVlanIDs)
3388
tierno6869ae72020-01-09 17:37:34 +00003389 # find unused VLAN ID
sousaedu80135b92021-02-17 15:05:18 +01003390 for vlanID_range in self.config.get("multisegment_vlan_range"):
garciadeblasebd66722019-01-31 16:01:31 +00003391 try:
sousaedu80135b92021-02-17 15:05:18 +01003392 start_vlanid, end_vlanid = map(
3393 int, vlanID_range.replace(" ", "").split("-")
3394 )
3395
tierno7d782ef2019-10-04 12:56:31 +00003396 for vlanID in range(start_vlanid, end_vlanid + 1):
garciadeblasebd66722019-01-31 16:01:31 +00003397 if vlanID not in used_vlanIDs:
3398 return vlanID
3399 except Exception as exp:
sousaedu80135b92021-02-17 15:05:18 +01003400 raise vimconn.VimConnException(
3401 "Exception {} occurred while generating VLAN ID.".format(exp)
3402 )
garciadeblasebd66722019-01-31 16:01:31 +00003403 else:
tierno1ec592d2020-06-16 15:29:47 +00003404 raise vimconn.VimConnConflictException(
3405 "Unable to create the VLAN segment. All VLAN IDs {} are in use.".format(
sousaedu80135b92021-02-17 15:05:18 +01003406 self.config.get("multisegment_vlan_range")
3407 )
3408 )
garciadeblasebd66722019-01-31 16:01:31 +00003409
3410 def _validate_vlan_ranges(self, input_vlan_range, text_vlan_range):
kate721d79b2017-06-24 04:21:38 -07003411 """
3412 Method to validate user given vlanID ranges
3413 Args: None
3414 Returns: None
3415 """
garciadeblasebd66722019-01-31 16:01:31 +00003416 for vlanID_range in input_vlan_range:
kate721d79b2017-06-24 04:21:38 -07003417 vlan_range = vlanID_range.replace(" ", "")
tierno1ec592d2020-06-16 15:29:47 +00003418 # validate format
sousaedu80135b92021-02-17 15:05:18 +01003419 vlanID_pattern = r"(\d)*-(\d)*$"
kate721d79b2017-06-24 04:21:38 -07003420 match_obj = re.match(vlanID_pattern, vlan_range)
3421 if not match_obj:
tierno1ec592d2020-06-16 15:29:47 +00003422 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003423 "Invalid VLAN range for {}: {}.You must provide "
3424 "'{}' in format [start_ID - end_ID].".format(
3425 text_vlan_range, vlanID_range, text_vlan_range
3426 )
3427 )
kate721d79b2017-06-24 04:21:38 -07003428
tierno1ec592d2020-06-16 15:29:47 +00003429 start_vlanid, end_vlanid = map(int, vlan_range.split("-"))
3430 if start_vlanid <= 0:
3431 raise vimconn.VimConnConflictException(
3432 "Invalid VLAN range for {}: {}. Start ID can not be zero. For VLAN "
sousaedu80135b92021-02-17 15:05:18 +01003433 "networks valid IDs are 1 to 4094 ".format(
3434 text_vlan_range, vlanID_range
3435 )
3436 )
3437
tierno1ec592d2020-06-16 15:29:47 +00003438 if end_vlanid > 4094:
3439 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003440 "Invalid VLAN range for {}: {}. End VLAN ID can not be "
3441 "greater than 4094. For VLAN networks valid IDs are 1 to 4094 ".format(
3442 text_vlan_range, vlanID_range
3443 )
3444 )
kate721d79b2017-06-24 04:21:38 -07003445
3446 if start_vlanid > end_vlanid:
tierno1ec592d2020-06-16 15:29:47 +00003447 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003448 "Invalid VLAN range for {}: {}. You must provide '{}'"
3449 " in format start_ID - end_ID and start_ID < end_ID ".format(
3450 text_vlan_range, vlanID_range, text_vlan_range
3451 )
3452 )
kate721d79b2017-06-24 04:21:38 -07003453
tierno7edb6752016-03-21 17:37:52 +01003454 def get_hosts_info(self):
tierno1ec592d2020-06-16 15:29:47 +00003455 """Get the information of deployed hosts
3456 Returns the hosts content"""
tierno7edb6752016-03-21 17:37:52 +01003457 if self.debug:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003458 print("osconnector: Getting Host info from VIM")
sousaedu80135b92021-02-17 15:05:18 +01003459
tierno7edb6752016-03-21 17:37:52 +01003460 try:
tierno1ec592d2020-06-16 15:29:47 +00003461 h_list = []
tierno7edb6752016-03-21 17:37:52 +01003462 self._reload_connection()
3463 hypervisors = self.nova.hypervisors.list()
sousaedu80135b92021-02-17 15:05:18 +01003464
tierno7edb6752016-03-21 17:37:52 +01003465 for hype in hypervisors:
tierno1ec592d2020-06-16 15:29:47 +00003466 h_list.append(hype.to_dict())
sousaedu80135b92021-02-17 15:05:18 +01003467
tierno1ec592d2020-06-16 15:29:47 +00003468 return 1, {"hosts": h_list}
tierno7edb6752016-03-21 17:37:52 +01003469 except nvExceptions.NotFound as e:
tierno1ec592d2020-06-16 15:29:47 +00003470 error_value = -vimconn.HTTP_Not_Found
sousaedu80135b92021-02-17 15:05:18 +01003471 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
tierno7edb6752016-03-21 17:37:52 +01003472 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
tierno1ec592d2020-06-16 15:29:47 +00003473 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01003474 error_text = (
3475 type(e).__name__
3476 + ": "
3477 + (str(e) if len(e.args) == 0 else str(e.args[0]))
3478 )
3479
tierno1ec592d2020-06-16 15:29:47 +00003480 # TODO insert exception vimconn.HTTP_Unauthorized
3481 # if reaching here is because an exception
tierno9c5c8322018-03-23 15:44:03 +01003482 self.logger.debug("get_hosts_info " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01003483
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003484 return error_value, error_text
tierno7edb6752016-03-21 17:37:52 +01003485
3486 def get_hosts(self, vim_tenant):
tierno1ec592d2020-06-16 15:29:47 +00003487 """Get the hosts and deployed instances
3488 Returns the hosts content"""
tierno7edb6752016-03-21 17:37:52 +01003489 r, hype_dict = self.get_hosts_info()
sousaedu80135b92021-02-17 15:05:18 +01003490
tierno1ec592d2020-06-16 15:29:47 +00003491 if r < 0:
tierno7edb6752016-03-21 17:37:52 +01003492 return r, hype_dict
sousaedu80135b92021-02-17 15:05:18 +01003493
tierno7edb6752016-03-21 17:37:52 +01003494 hypervisors = hype_dict["hosts"]
sousaedu80135b92021-02-17 15:05:18 +01003495
tierno7edb6752016-03-21 17:37:52 +01003496 try:
3497 servers = self.nova.servers.list()
3498 for hype in hypervisors:
3499 for server in servers:
sousaedu80135b92021-02-17 15:05:18 +01003500 if (
3501 server.to_dict()["OS-EXT-SRV-ATTR:hypervisor_hostname"]
3502 == hype["hypervisor_hostname"]
3503 ):
3504 if "vm" in hype:
3505 hype["vm"].append(server.id)
tierno7edb6752016-03-21 17:37:52 +01003506 else:
sousaedu80135b92021-02-17 15:05:18 +01003507 hype["vm"] = [server.id]
3508
tierno7edb6752016-03-21 17:37:52 +01003509 return 1, hype_dict
3510 except nvExceptions.NotFound as e:
tierno1ec592d2020-06-16 15:29:47 +00003511 error_value = -vimconn.HTTP_Not_Found
sousaedu80135b92021-02-17 15:05:18 +01003512 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
tierno7edb6752016-03-21 17:37:52 +01003513 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
tierno1ec592d2020-06-16 15:29:47 +00003514 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01003515 error_text = (
3516 type(e).__name__
3517 + ": "
3518 + (str(e) if len(e.args) == 0 else str(e.args[0]))
3519 )
3520
tierno1ec592d2020-06-16 15:29:47 +00003521 # TODO insert exception vimconn.HTTP_Unauthorized
3522 # if reaching here is because an exception
tierno9c5c8322018-03-23 15:44:03 +01003523 self.logger.debug("get_hosts " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01003524
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003525 return error_value, error_text
tierno7edb6752016-03-21 17:37:52 +01003526
Alexis Romerob70f4ed2022-03-11 18:00:49 +01003527 def new_affinity_group(self, affinity_group_data):
3528 """Adds a server group to VIM
3529 affinity_group_data contains a dictionary with information, keys:
3530 name: name in VIM for the server group
3531 type: affinity or anti-affinity
3532 scope: Only nfvi-node allowed
3533 Returns the server group identifier"""
3534 self.logger.debug("Adding Server Group '%s'", str(affinity_group_data))
3535
3536 try:
3537 name = affinity_group_data["name"]
3538 policy = affinity_group_data["type"]
3539
3540 self._reload_connection()
3541 new_server_group = self.nova.server_groups.create(name, policy)
3542
3543 return new_server_group.id
3544 except (
3545 ksExceptions.ClientException,
3546 nvExceptions.ClientException,
3547 ConnectionError,
3548 KeyError,
3549 ) as e:
3550 self._format_exception(e)
3551
3552 def get_affinity_group(self, affinity_group_id):
3553 """Obtain server group details from the VIM. Returns the server group detais as a dict"""
3554 self.logger.debug("Getting flavor '%s'", affinity_group_id)
3555 try:
3556 self._reload_connection()
3557 server_group = self.nova.server_groups.find(id=affinity_group_id)
3558
3559 return server_group.to_dict()
3560 except (
3561 nvExceptions.NotFound,
3562 nvExceptions.ClientException,
3563 ksExceptions.ClientException,
3564 ConnectionError,
3565 ) as e:
3566 self._format_exception(e)
3567
3568 def delete_affinity_group(self, affinity_group_id):
3569 """Deletes a server group from the VIM. Returns the old affinity_group_id"""
3570 self.logger.debug("Getting server group '%s'", affinity_group_id)
3571 try:
3572 self._reload_connection()
3573 self.nova.server_groups.delete(affinity_group_id)
3574
3575 return affinity_group_id
3576 except (
3577 nvExceptions.NotFound,
3578 ksExceptions.ClientException,
3579 nvExceptions.ClientException,
3580 ConnectionError,
3581 ) as e:
3582 self._format_exception(e)
elumalai8658c2c2022-04-28 19:09:31 +05303583
3584 def get_vdu_state(self, vm_id):
3585 """
3586 Getting the state of a vdu
3587 param:
3588 vm_id: ID of an instance
3589 """
3590 self.logger.debug("Getting the status of VM")
3591 self.logger.debug("VIM VM ID %s", vm_id)
3592 self._reload_connection()
3593 server = self.nova.servers.find(id=vm_id)
3594 server_dict = server.to_dict()
3595 vdu_data = [
3596 server_dict["status"],
3597 server_dict["flavor"]["id"],
3598 server_dict["OS-EXT-SRV-ATTR:host"],
3599 server_dict["OS-EXT-AZ:availability_zone"],
3600 ]
3601 self.logger.debug("vdu_data %s", vdu_data)
3602 return vdu_data
3603
3604 def check_compute_availability(self, host, server_flavor_details):
3605 self._reload_connection()
3606 hypervisor_search = self.nova.hypervisors.search(
3607 hypervisor_match=host, servers=True
3608 )
3609 for hypervisor in hypervisor_search:
3610 hypervisor_id = hypervisor.to_dict()["id"]
3611 hypervisor_details = self.nova.hypervisors.get(hypervisor=hypervisor_id)
3612 hypervisor_dict = hypervisor_details.to_dict()
3613 hypervisor_temp = json.dumps(hypervisor_dict)
3614 hypervisor_json = json.loads(hypervisor_temp)
3615 resources_available = [
3616 hypervisor_json["free_ram_mb"],
3617 hypervisor_json["disk_available_least"],
3618 hypervisor_json["vcpus"] - hypervisor_json["vcpus_used"],
3619 ]
3620 compute_available = all(
3621 x > y for x, y in zip(resources_available, server_flavor_details)
3622 )
3623 if compute_available:
3624 return host
3625
3626 def check_availability_zone(
3627 self, old_az, server_flavor_details, old_host, host=None
3628 ):
3629 self._reload_connection()
3630 az_check = {"zone_check": False, "compute_availability": None}
3631 aggregates_list = self.nova.aggregates.list()
3632 for aggregate in aggregates_list:
3633 aggregate_details = aggregate.to_dict()
3634 aggregate_temp = json.dumps(aggregate_details)
3635 aggregate_json = json.loads(aggregate_temp)
3636 if aggregate_json["availability_zone"] == old_az:
3637 hosts_list = aggregate_json["hosts"]
3638 if host is not None:
3639 if host in hosts_list:
3640 az_check["zone_check"] = True
3641 available_compute_id = self.check_compute_availability(
3642 host, server_flavor_details
3643 )
3644 if available_compute_id is not None:
3645 az_check["compute_availability"] = available_compute_id
3646 else:
3647 for check_host in hosts_list:
3648 if check_host != old_host:
3649 available_compute_id = self.check_compute_availability(
3650 check_host, server_flavor_details
3651 )
3652 if available_compute_id is not None:
3653 az_check["zone_check"] = True
3654 az_check["compute_availability"] = available_compute_id
3655 break
3656 else:
3657 az_check["zone_check"] = True
3658 return az_check
3659
3660 def migrate_instance(self, vm_id, compute_host=None):
3661 """
3662 Migrate a vdu
3663 param:
3664 vm_id: ID of an instance
3665 compute_host: Host to migrate the vdu to
3666 """
3667 self._reload_connection()
3668 vm_state = False
3669 instance_state = self.get_vdu_state(vm_id)
3670 server_flavor_id = instance_state[1]
3671 server_hypervisor_name = instance_state[2]
3672 server_availability_zone = instance_state[3]
3673 try:
3674 server_flavor = self.nova.flavors.find(id=server_flavor_id).to_dict()
3675 server_flavor_details = [
3676 server_flavor["ram"],
3677 server_flavor["disk"],
3678 server_flavor["vcpus"],
3679 ]
3680 if compute_host == server_hypervisor_name:
3681 raise vimconn.VimConnException(
3682 "Unable to migrate instance '{}' to the same host '{}'".format(
3683 vm_id, compute_host
3684 ),
3685 http_code=vimconn.HTTP_Bad_Request,
3686 )
3687 az_status = self.check_availability_zone(
3688 server_availability_zone,
3689 server_flavor_details,
3690 server_hypervisor_name,
3691 compute_host,
3692 )
3693 availability_zone_check = az_status["zone_check"]
3694 available_compute_id = az_status.get("compute_availability")
3695
3696 if availability_zone_check is False:
3697 raise vimconn.VimConnException(
3698 "Unable to migrate instance '{}' to a different availability zone".format(
3699 vm_id
3700 ),
3701 http_code=vimconn.HTTP_Bad_Request,
3702 )
3703 if available_compute_id is not None:
3704 self.nova.servers.live_migrate(
3705 server=vm_id,
3706 host=available_compute_id,
3707 block_migration=True,
3708 disk_over_commit=False,
3709 )
3710 state = "MIGRATING"
3711 changed_compute_host = ""
3712 if state == "MIGRATING":
3713 vm_state = self.__wait_for_vm(vm_id, "ACTIVE")
3714 changed_compute_host = self.get_vdu_state(vm_id)[2]
3715 if vm_state and changed_compute_host == available_compute_id:
3716 self.logger.debug(
3717 "Instance '{}' migrated to the new compute host '{}'".format(
3718 vm_id, changed_compute_host
3719 )
3720 )
3721 return state, available_compute_id
3722 else:
3723 raise vimconn.VimConnException(
3724 "Migration Failed. Instance '{}' not moved to the new host {}".format(
3725 vm_id, available_compute_id
3726 ),
3727 http_code=vimconn.HTTP_Bad_Request,
3728 )
3729 else:
3730 raise vimconn.VimConnException(
3731 "Compute '{}' not available or does not have enough resources to migrate the instance".format(
3732 available_compute_id
3733 ),
3734 http_code=vimconn.HTTP_Bad_Request,
3735 )
3736 except (
3737 nvExceptions.BadRequest,
3738 nvExceptions.ClientException,
3739 nvExceptions.NotFound,
3740 ) as e:
3741 self._format_exception(e)
sritharan29a4c1a2022-05-05 12:15:04 +00003742
3743 def resize_instance(self, vm_id, new_flavor_id):
3744 """
3745 For resizing the vm based on the given
3746 flavor details
3747 param:
3748 vm_id : ID of an instance
3749 new_flavor_id : Flavor id to be resized
3750 Return the status of a resized instance
3751 """
3752 self._reload_connection()
3753 self.logger.debug("resize the flavor of an instance")
3754 instance_status, old_flavor_id, compute_host, az = self.get_vdu_state(vm_id)
3755 old_flavor_disk = self.nova.flavors.find(id=old_flavor_id).to_dict()["disk"]
3756 new_flavor_disk = self.nova.flavors.find(id=new_flavor_id).to_dict()["disk"]
3757 try:
3758 if instance_status == "ACTIVE" or instance_status == "SHUTOFF":
3759 if old_flavor_disk > new_flavor_disk:
3760 raise nvExceptions.BadRequest(
3761 400,
3762 message="Server disk resize failed. Resize to lower disk flavor is not allowed",
3763 )
3764 else:
3765 self.nova.servers.resize(server=vm_id, flavor=new_flavor_id)
3766 vm_state = self.__wait_for_vm(vm_id, "VERIFY_RESIZE")
3767 if vm_state:
3768 instance_resized_status = self.confirm_resize(vm_id)
3769 return instance_resized_status
3770 else:
3771 raise nvExceptions.BadRequest(
3772 409,
3773 message="Cannot 'resize' vm_state is in ERROR",
3774 )
3775
3776 else:
3777 self.logger.debug("ERROR : Instance is not in ACTIVE or SHUTOFF state")
3778 raise nvExceptions.BadRequest(
3779 409,
3780 message="Cannot 'resize' instance while it is in vm_state resized",
3781 )
3782 except (
3783 nvExceptions.BadRequest,
3784 nvExceptions.ClientException,
3785 nvExceptions.NotFound,
3786 ) as e:
3787 self._format_exception(e)
3788
3789 def confirm_resize(self, vm_id):
3790 """
3791 Confirm the resize of an instance
3792 param:
3793 vm_id: ID of an instance
3794 """
3795 self._reload_connection()
3796 self.nova.servers.confirm_resize(server=vm_id)
3797 if self.get_vdu_state(vm_id)[0] == "VERIFY_RESIZE":
3798 self.__wait_for_vm(vm_id, "ACTIVE")
3799 instance_status = self.get_vdu_state(vm_id)[0]
3800 return instance_status