| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1 | # -*- coding: utf-8 -*- |
| 2 | |
| 3 | ## |
| tierno | 9202102 | 2018-09-12 16:29:23 +0200 | [diff] [blame] | 4 | # Copyright 2015 Telefonica Investigacion y Desarrollo, S.A.U. |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 5 | # This file is part of openmano |
| 6 | # All Rights Reserved. |
| 7 | # |
| 8 | # Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 9 | # not use this file except in compliance with the License. You may obtain |
| 10 | # a copy of the License at |
| 11 | # |
| 12 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 13 | # |
| 14 | # Unless required by applicable law or agreed to in writing, software |
| 15 | # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 16 | # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 17 | # License for the specific language governing permissions and limitations |
| 18 | # under the License. |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 19 | ## |
| 20 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 21 | """ |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 22 | osconnector implements all the methods to interact with openstack using the python-neutronclient. |
| 23 | |
| 24 | For the VNF forwarding graph, The OpenStack VIM connector calls the |
| 25 | networking-sfc Neutron extension methods, whose resources are mapped |
| 26 | to the VIM connector's SFC resources as follows: |
| 27 | - Classification (OSM) -> Flow Classifier (Neutron) |
| 28 | - Service Function Instance (OSM) -> Port Pair (Neutron) |
| 29 | - Service Function (OSM) -> Port Pair Group (Neutron) |
| 30 | - Service Function Path (OSM) -> Port Chain (Neutron) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 31 | """ |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 32 | |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 33 | from osm_ro_plugin import vimconn |
| tierno | 69b590e | 2018-03-13 18:52:23 +0100 | [diff] [blame] | 34 | # import json |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 35 | import logging |
| garciadeblas | 9f8456e | 2016-09-05 05:02:59 +0200 | [diff] [blame] | 36 | import netaddr |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 37 | import time |
| tierno | 36c0b17 | 2017-01-12 18:32:28 +0100 | [diff] [blame] | 38 | import yaml |
| garciadeblas | 2299e3b | 2017-01-26 14:35:55 +0000 | [diff] [blame] | 39 | import random |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 40 | import re |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 41 | import copy |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 42 | from pprint import pformat |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 43 | |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 44 | from novaclient import client as nClient, exceptions as nvExceptions |
| 45 | from keystoneauth1.identity import v2, v3 |
| 46 | from keystoneauth1 import session |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 47 | import keystoneclient.exceptions as ksExceptions |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 48 | import keystoneclient.v3.client as ksClient_v3 |
| 49 | import keystoneclient.v2_0.client as ksClient_v2 |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 50 | from glanceclient import client as glClient |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 51 | import glanceclient.exc as gl1Exceptions |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 52 | from cinderclient import client as cClient |
| 53 | from http.client import HTTPException # TODO py3 check that this base exception matches python2 httplib.HTTPException |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 54 | from neutronclient.neutron import client as neClient |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 55 | from neutronclient.common import exceptions as neExceptions |
| 56 | from requests.exceptions import ConnectionError |
| 57 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 58 | __author__ = "Alfonso Tierno, Gerardo Garcia, Pablo Montes, xFlow Research, Igor D.C., Eduardo Sousa" |
| 59 | __date__ = "$22-sep-2017 23:59:59$" |
| tierno | 40e1bce | 2017-08-09 09:12:04 +0200 | [diff] [blame] | 60 | |
| 61 | """contain the openstack virtual machine status to openmano status""" |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 62 | vmStatus2manoFormat = {'ACTIVE': 'ACTIVE', |
| 63 | 'PAUSED': 'PAUSED', |
| 64 | 'SUSPENDED': 'SUSPENDED', |
| 65 | 'SHUTOFF': 'INACTIVE', |
| 66 | 'BUILD': 'BUILD', |
| 67 | 'ERROR': 'ERROR', |
| 68 | 'DELETED': 'DELETED' |
| 69 | } |
| 70 | netStatus2manoFormat = {'ACTIVE': 'ACTIVE', |
| 71 | 'PAUSED': 'PAUSED', |
| 72 | 'INACTIVE': 'INACTIVE', |
| 73 | 'BUILD': 'BUILD', |
| 74 | 'ERROR': 'ERROR', |
| 75 | 'DELETED': 'DELETED' |
| 76 | } |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 77 | |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 78 | supportedClassificationTypes = ['legacy_flow_classifier'] |
| 79 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 80 | # global var to have a timeout creating and deleting volumes |
| garciadeblas | 64b39c5 | 2020-05-21 08:07:25 +0000 | [diff] [blame] | 81 | volume_timeout = 1800 |
| 82 | server_timeout = 1800 |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 83 | |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 84 | |
| 85 | class SafeDumper(yaml.SafeDumper): |
| 86 | def represent_data(self, data): |
| 87 | # Openstack APIs use custom subclasses of dict and YAML safe dumper |
| 88 | # is designed to not handle that (reference issue 142 of pyyaml) |
| 89 | if isinstance(data, dict) and data.__class__ != dict: |
| 90 | # A simple solution is to convert those items back to dicts |
| 91 | data = dict(data.items()) |
| 92 | |
| 93 | return super(SafeDumper, self).represent_data(data) |
| 94 | |
| 95 | |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 96 | class vimconnector(vimconn.VimConnector): |
| tierno | b3d3674 | 2017-03-03 23:51:05 +0100 | [diff] [blame] | 97 | def __init__(self, uuid, name, tenant_id, tenant_name, url, url_admin=None, user=None, passwd=None, |
| 98 | log_level=None, config={}, persistent_info={}): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 99 | """using common constructor parameters. In this case |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 100 | 'url' is the keystone authorization url, |
| 101 | 'url_admin' is not use |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 102 | """ |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 103 | api_version = config.get('APIversion') |
| 104 | if api_version and api_version not in ('v3.3', 'v2.0', '2', '3'): |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 105 | raise vimconn.VimConnException("Invalid value '{}' for config:APIversion. " |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 106 | "Allowed values are 'v3.3', 'v2.0', '2' or '3'".format(api_version)) |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 107 | vim_type = config.get('vim_type') |
| 108 | if vim_type and vim_type not in ('vio', 'VIO'): |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 109 | raise vimconn.VimConnException("Invalid value '{}' for config:vim_type." |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 110 | "Allowed values are 'vio' or 'VIO'".format(vim_type)) |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 111 | |
| 112 | if config.get('dataplane_net_vlan_range') is not None: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 113 | # validate vlan ranges provided by user |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 114 | self._validate_vlan_ranges(config.get('dataplane_net_vlan_range'), 'dataplane_net_vlan_range') |
| 115 | |
| 116 | if config.get('multisegment_vlan_range') is not None: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 117 | # validate vlan ranges provided by user |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 118 | self._validate_vlan_ranges(config.get('multisegment_vlan_range'), 'multisegment_vlan_range') |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 119 | |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 120 | vimconn.VimConnector.__init__(self, uuid, name, tenant_id, tenant_name, url, url_admin, user, passwd, log_level, |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 121 | config) |
| tierno | b3d3674 | 2017-03-03 23:51:05 +0100 | [diff] [blame] | 122 | |
| tierno | 4d1ce22 | 2018-04-06 10:41:06 +0200 | [diff] [blame] | 123 | if self.config.get("insecure") and self.config.get("ca_cert"): |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 124 | raise vimconn.VimConnException("options insecure and ca_cert are mutually exclusive") |
| tierno | 4d1ce22 | 2018-04-06 10:41:06 +0200 | [diff] [blame] | 125 | self.verify = True |
| 126 | if self.config.get("insecure"): |
| 127 | self.verify = False |
| 128 | if self.config.get("ca_cert"): |
| 129 | self.verify = self.config.get("ca_cert") |
| tierno | 4d1ce22 | 2018-04-06 10:41:06 +0200 | [diff] [blame] | 130 | |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 131 | if not url: |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 132 | raise TypeError('url param can not be NoneType') |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 133 | self.persistent_info = persistent_info |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 134 | self.availability_zone = persistent_info.get('availability_zone', None) |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 135 | self.session = persistent_info.get('session', {'reload_client': True}) |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 136 | self.my_tenant_id = self.session.get('my_tenant_id') |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 137 | self.nova = self.session.get('nova') |
| 138 | self.neutron = self.session.get('neutron') |
| 139 | self.cinder = self.session.get('cinder') |
| 140 | self.glance = self.session.get('glance') |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 141 | # self.glancev1 = self.session.get('glancev1') |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 142 | self.keystone = self.session.get('keystone') |
| 143 | self.api_version3 = self.session.get('api_version3') |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 144 | self.vim_type = self.config.get("vim_type") |
| 145 | if self.vim_type: |
| 146 | self.vim_type = self.vim_type.upper() |
| 147 | if self.config.get("use_internal_endpoint"): |
| 148 | self.endpoint_type = "internalURL" |
| 149 | else: |
| 150 | self.endpoint_type = None |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 151 | |
| garciadeblas | a0a356e | 2019-12-18 09:32:09 +0100 | [diff] [blame] | 152 | logging.getLogger('urllib3').setLevel(logging.WARNING) |
| 153 | logging.getLogger('keystoneauth').setLevel(logging.WARNING) |
| 154 | logging.getLogger('novaclient').setLevel(logging.WARNING) |
| tierno | 73ad9e4 | 2016-09-12 18:11:11 +0200 | [diff] [blame] | 155 | self.logger = logging.getLogger('openmano.vim.openstack') |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 156 | |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 157 | # allow security_groups to be a list or a single string |
| 158 | if isinstance(self.config.get('security_groups'), str): |
| 159 | self.config['security_groups'] = [self.config['security_groups']] |
| 160 | self.security_groups_id = None |
| 161 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 162 | # ###### VIO Specific Changes ######### |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 163 | if self.vim_type == "VIO": |
| 164 | self.logger = logging.getLogger('openmano.vim.vio') |
| 165 | |
| tierno | fe78990 | 2016-09-29 14:20:44 +0000 | [diff] [blame] | 166 | if log_level: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 167 | self.logger.setLevel(getattr(logging, log_level)) |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 168 | |
| 169 | def __getitem__(self, index): |
| 170 | """Get individuals parameters. |
| 171 | Throw KeyError""" |
| 172 | if index == 'project_domain_id': |
| 173 | return self.config.get("project_domain_id") |
| 174 | elif index == 'user_domain_id': |
| 175 | return self.config.get("user_domain_id") |
| 176 | else: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 177 | return vimconn.VimConnector.__getitem__(self, index) |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 178 | |
| 179 | def __setitem__(self, index, value): |
| 180 | """Set individuals parameters and it is marked as dirty so to force connection reload. |
| 181 | Throw KeyError""" |
| 182 | if index == 'project_domain_id': |
| 183 | self.config["project_domain_id"] = value |
| 184 | elif index == 'user_domain_id': |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 185 | self.config["user_domain_id"] = value |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 186 | else: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 187 | vimconn.VimConnector.__setitem__(self, index, value) |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 188 | self.session['reload_client'] = True |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 189 | |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 190 | def serialize(self, value): |
| 191 | """Serialization of python basic types. |
| 192 | |
| 193 | In the case value is not serializable a message will be logged and a |
| 194 | simple representation of the data that cannot be converted back to |
| 195 | python is returned. |
| 196 | """ |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 197 | if isinstance(value, str): |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 198 | return value |
| 199 | |
| 200 | try: |
| 201 | return yaml.dump(value, Dumper=SafeDumper, |
| 202 | default_flow_style=True, width=256) |
| 203 | except yaml.representer.RepresenterError: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 204 | self.logger.debug('The following entity cannot be serialized in YAML:\n\n%s\n\n', pformat(value), |
| 205 | exc_info=True) |
| 206 | return str(value) |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 207 | |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 208 | def _reload_connection(self): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 209 | """Called before any operation, it check if credentials has changed |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 210 | Throw keystoneclient.apiclient.exceptions.AuthorizationFailure |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 211 | """ |
| 212 | # TODO control the timing and possible token timeout, but it seams that python client does this task for us :-) |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 213 | if self.session['reload_client']: |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 214 | if self.config.get('APIversion'): |
| 215 | self.api_version3 = self.config['APIversion'] == 'v3.3' or self.config['APIversion'] == '3' |
| 216 | else: # get from ending auth_url that end with v3 or with v2.0 |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 217 | self.api_version3 = self.url.endswith("/v3") or self.url.endswith("/v3/") |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 218 | self.session['api_version3'] = self.api_version3 |
| 219 | if self.api_version3: |
| tierno | 3cb8dc3 | 2017-10-24 18:13:19 +0200 | [diff] [blame] | 220 | if self.config.get('project_domain_id') or self.config.get('project_domain_name'): |
| 221 | project_domain_id_default = None |
| 222 | else: |
| 223 | project_domain_id_default = 'default' |
| 224 | if self.config.get('user_domain_id') or self.config.get('user_domain_name'): |
| 225 | user_domain_id_default = None |
| 226 | else: |
| 227 | user_domain_id_default = 'default' |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 228 | auth = v3.Password(auth_url=self.url, |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 229 | username=self.user, |
| 230 | password=self.passwd, |
| 231 | project_name=self.tenant_name, |
| 232 | project_id=self.tenant_id, |
| tierno | 3cb8dc3 | 2017-10-24 18:13:19 +0200 | [diff] [blame] | 233 | project_domain_id=self.config.get('project_domain_id', project_domain_id_default), |
| 234 | user_domain_id=self.config.get('user_domain_id', user_domain_id_default), |
| 235 | project_domain_name=self.config.get('project_domain_name'), |
| 236 | user_domain_name=self.config.get('user_domain_name')) |
| ahmadsa | 95baa27 | 2016-11-30 09:14:11 +0500 | [diff] [blame] | 237 | else: |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 238 | auth = v2.Password(auth_url=self.url, |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 239 | username=self.user, |
| 240 | password=self.passwd, |
| 241 | tenant_name=self.tenant_name, |
| 242 | tenant_id=self.tenant_id) |
| tierno | 4d1ce22 | 2018-04-06 10:41:06 +0200 | [diff] [blame] | 243 | sess = session.Session(auth=auth, verify=self.verify) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 244 | # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River |
| 245 | # Titanium cloud and StarlingX |
| fatollahy | 40c6a3f | 2019-02-19 12:53:40 +0000 | [diff] [blame] | 246 | region_name = self.config.get('region_name') |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 247 | if self.api_version3: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 248 | self.keystone = ksClient_v3.Client(session=sess, endpoint_type=self.endpoint_type, |
| 249 | region_name=region_name) |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 250 | else: |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 251 | self.keystone = ksClient_v2.Client(session=sess, endpoint_type=self.endpoint_type) |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 252 | self.session['keystone'] = self.keystone |
| montesmoreno | 9317d30 | 2017-08-16 12:48:23 +0200 | [diff] [blame] | 253 | # In order to enable microversion functionality an explicit microversion must be specified in 'config'. |
| 254 | # This implementation approach is due to the warning message in |
| 255 | # https://developer.openstack.org/api-guide/compute/microversions.html |
| 256 | # where it is stated that microversion backwards compatibility is not guaranteed and clients should |
| 257 | # always require an specific microversion. |
| 258 | # To be able to use 'device role tagging' functionality define 'microversion: 2.32' in datacenter config |
| 259 | version = self.config.get("microversion") |
| 260 | if not version: |
| 261 | version = "2.1" |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 262 | # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River |
| 263 | # Titanium cloud and StarlingX |
| 264 | self.nova = self.session['nova'] = nClient.Client(str(version), session=sess, |
| 265 | endpoint_type=self.endpoint_type, region_name=region_name) |
| 266 | self.neutron = self.session['neutron'] = neClient.Client('2.0', session=sess, |
| 267 | endpoint_type=self.endpoint_type, |
| 268 | region_name=region_name) |
| 269 | self.cinder = self.session['cinder'] = cClient.Client(2, session=sess, endpoint_type=self.endpoint_type, |
| 270 | region_name=region_name) |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 271 | try: |
| 272 | self.my_tenant_id = self.session['my_tenant_id'] = sess.get_project_id() |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 273 | except Exception: |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 274 | self.logger.error("Cannot get project_id from session", exc_info=True) |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 275 | if self.endpoint_type == "internalURL": |
| 276 | glance_service_id = self.keystone.services.list(name="glance")[0].id |
| 277 | glance_endpoint = self.keystone.endpoints.list(glance_service_id, interface="internal")[0].url |
| 278 | else: |
| 279 | glance_endpoint = None |
| 280 | self.glance = self.session['glance'] = glClient.Client(2, session=sess, endpoint=glance_endpoint) |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 281 | # using version 1 of glance client in new_image() |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 282 | # self.glancev1 = self.session['glancev1'] = glClient.Client('1', session=sess, |
| 283 | # endpoint=glance_endpoint) |
| tierno | b5cef37 | 2017-06-19 15:52:22 +0200 | [diff] [blame] | 284 | self.session['reload_client'] = False |
| 285 | self.persistent_info['session'] = self.session |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 286 | # add availablity zone info inside self.persistent_info |
| 287 | self._set_availablity_zones() |
| 288 | self.persistent_info['availability_zone'] = self.availability_zone |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 289 | self.security_groups_id = None # force to get again security_groups_ids next time they are needed |
| ahmadsa | 95baa27 | 2016-11-30 09:14:11 +0500 | [diff] [blame] | 290 | |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 291 | def __net_os2mano(self, net_list_dict): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 292 | """Transform the net openstack format to mano format |
| 293 | net_list_dict can be a list of dict or a single dict""" |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 294 | if type(net_list_dict) is dict: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 295 | net_list_ = (net_list_dict,) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 296 | elif type(net_list_dict) is list: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 297 | net_list_ = net_list_dict |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 298 | else: |
| 299 | raise TypeError("param net_list_dict must be a list or a dictionary") |
| 300 | for net in net_list_: |
| 301 | if net.get('provider:network_type') == "vlan": |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 302 | net['type'] = 'data' |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 303 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 304 | net['type'] = 'bridge' |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 305 | |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 306 | def __classification_os2mano(self, class_list_dict): |
| 307 | """Transform the openstack format (Flow Classifier) to mano format |
| 308 | (Classification) class_list_dict can be a list of dict or a single dict |
| 309 | """ |
| 310 | if isinstance(class_list_dict, dict): |
| 311 | class_list_ = [class_list_dict] |
| 312 | elif isinstance(class_list_dict, list): |
| 313 | class_list_ = class_list_dict |
| 314 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 315 | raise TypeError("param class_list_dict must be a list or a dictionary") |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 316 | for classification in class_list_: |
| 317 | id = classification.pop('id') |
| 318 | name = classification.pop('name') |
| 319 | description = classification.pop('description') |
| 320 | project_id = classification.pop('project_id') |
| 321 | tenant_id = classification.pop('tenant_id') |
| 322 | original_classification = copy.deepcopy(classification) |
| 323 | classification.clear() |
| 324 | classification['ctype'] = 'legacy_flow_classifier' |
| 325 | classification['definition'] = original_classification |
| 326 | classification['id'] = id |
| 327 | classification['name'] = name |
| 328 | classification['description'] = description |
| 329 | classification['project_id'] = project_id |
| 330 | classification['tenant_id'] = tenant_id |
| 331 | |
| 332 | def __sfi_os2mano(self, sfi_list_dict): |
| 333 | """Transform the openstack format (Port Pair) to mano format (SFI) |
| 334 | sfi_list_dict can be a list of dict or a single dict |
| 335 | """ |
| 336 | if isinstance(sfi_list_dict, dict): |
| 337 | sfi_list_ = [sfi_list_dict] |
| 338 | elif isinstance(sfi_list_dict, list): |
| 339 | sfi_list_ = sfi_list_dict |
| 340 | else: |
| 341 | raise TypeError( |
| 342 | "param sfi_list_dict must be a list or a dictionary") |
| 343 | for sfi in sfi_list_: |
| 344 | sfi['ingress_ports'] = [] |
| 345 | sfi['egress_ports'] = [] |
| 346 | if sfi.get('ingress'): |
| 347 | sfi['ingress_ports'].append(sfi['ingress']) |
| 348 | if sfi.get('egress'): |
| 349 | sfi['egress_ports'].append(sfi['egress']) |
| 350 | del sfi['ingress'] |
| 351 | del sfi['egress'] |
| 352 | params = sfi.get('service_function_parameters') |
| 353 | sfc_encap = False |
| 354 | if params: |
| 355 | correlation = params.get('correlation') |
| 356 | if correlation: |
| 357 | sfc_encap = True |
| 358 | sfi['sfc_encap'] = sfc_encap |
| 359 | del sfi['service_function_parameters'] |
| 360 | |
| 361 | def __sf_os2mano(self, sf_list_dict): |
| 362 | """Transform the openstack format (Port Pair Group) to mano format (SF) |
| 363 | sf_list_dict can be a list of dict or a single dict |
| 364 | """ |
| 365 | if isinstance(sf_list_dict, dict): |
| 366 | sf_list_ = [sf_list_dict] |
| 367 | elif isinstance(sf_list_dict, list): |
| 368 | sf_list_ = sf_list_dict |
| 369 | else: |
| 370 | raise TypeError( |
| 371 | "param sf_list_dict must be a list or a dictionary") |
| 372 | for sf in sf_list_: |
| 373 | del sf['port_pair_group_parameters'] |
| 374 | sf['sfis'] = sf['port_pairs'] |
| 375 | del sf['port_pairs'] |
| 376 | |
| 377 | def __sfp_os2mano(self, sfp_list_dict): |
| 378 | """Transform the openstack format (Port Chain) to mano format (SFP) |
| 379 | sfp_list_dict can be a list of dict or a single dict |
| 380 | """ |
| 381 | if isinstance(sfp_list_dict, dict): |
| 382 | sfp_list_ = [sfp_list_dict] |
| 383 | elif isinstance(sfp_list_dict, list): |
| 384 | sfp_list_ = sfp_list_dict |
| 385 | else: |
| 386 | raise TypeError( |
| 387 | "param sfp_list_dict must be a list or a dictionary") |
| 388 | for sfp in sfp_list_: |
| 389 | params = sfp.pop('chain_parameters') |
| 390 | sfc_encap = False |
| 391 | if params: |
| 392 | correlation = params.get('correlation') |
| 393 | if correlation: |
| 394 | sfc_encap = True |
| 395 | sfp['sfc_encap'] = sfc_encap |
| 396 | sfp['spi'] = sfp.pop('chain_id') |
| 397 | sfp['classifications'] = sfp.pop('flow_classifiers') |
| 398 | sfp['service_functions'] = sfp.pop('port_pair_groups') |
| 399 | |
| 400 | # placeholder for now; read TODO note below |
| 401 | def _validate_classification(self, type, definition): |
| 402 | # only legacy_flow_classifier Type is supported at this point |
| 403 | return True |
| 404 | # TODO(igordcard): this method should be an abstract method of an |
| 405 | # abstract Classification class to be implemented by the specific |
| 406 | # Types. Also, abstract vimconnector should call the validation |
| 407 | # method before the implemented VIM connectors are called. |
| 408 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 409 | def _format_exception(self, exception): |
| tierno | 6964779 | 2020-03-05 16:45:48 +0000 | [diff] [blame] | 410 | """Transform a keystone, nova, neutron exception into a vimconn exception discovering the cause""" |
| tierno | de12f78 | 2019-04-05 12:46:42 +0000 | [diff] [blame] | 411 | |
| tierno | 6964779 | 2020-03-05 16:45:48 +0000 | [diff] [blame] | 412 | message_error = str(exception) |
| tierno | 5ad826a | 2020-08-11 11:19:44 +0000 | [diff] [blame] | 413 | tip = "" |
| tierno | de12f78 | 2019-04-05 12:46:42 +0000 | [diff] [blame] | 414 | |
| 415 | if isinstance(exception, (neExceptions.NetworkNotFoundClient, nvExceptions.NotFound, ksExceptions.NotFound, |
| 416 | gl1Exceptions.HTTPNotFound)): |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 417 | raise vimconn.VimConnNotFoundException(type(exception).__name__ + ": " + message_error) |
| shashankjain | 3c83a21 | 2018-10-04 13:05:46 +0530 | [diff] [blame] | 418 | elif isinstance(exception, (HTTPException, gl1Exceptions.HTTPException, gl1Exceptions.CommunicationError, |
| tierno | 6964779 | 2020-03-05 16:45:48 +0000 | [diff] [blame] | 419 | ConnectionError, ksExceptions.ConnectionError, neExceptions.ConnectionFailed)): |
| tierno | 5ad826a | 2020-08-11 11:19:44 +0000 | [diff] [blame] | 420 | if type(exception).__name__ == "SSLError": |
| 421 | tip = " (maybe option 'insecure' must be added to the VIM)" |
| 422 | raise vimconn.VimConnConnectionException("Invalid URL or credentials{}: {}".format(tip, message_error)) |
| tierno | 6964779 | 2020-03-05 16:45:48 +0000 | [diff] [blame] | 423 | elif isinstance(exception, (KeyError, nvExceptions.BadRequest, ksExceptions.BadRequest)): |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 424 | raise vimconn.VimConnException(type(exception).__name__ + ": " + message_error) |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 425 | elif isinstance(exception, (nvExceptions.ClientException, ksExceptions.ClientException, |
| 426 | neExceptions.NeutronException)): |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 427 | raise vimconn.VimConnUnexpectedResponse(type(exception).__name__ + ": " + message_error) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 428 | elif isinstance(exception, nvExceptions.Conflict): |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 429 | raise vimconn.VimConnConflictException(type(exception).__name__ + ": " + message_error) |
| 430 | elif isinstance(exception, vimconn.VimConnException): |
| tierno | 41a6981 | 2018-02-16 14:34:33 +0100 | [diff] [blame] | 431 | raise exception |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 432 | else: # () |
| tierno | de12f78 | 2019-04-05 12:46:42 +0000 | [diff] [blame] | 433 | self.logger.error("General Exception " + message_error, exc_info=True) |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 434 | raise vimconn.VimConnConnectionException(type(exception).__name__ + ": " + message_error) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 435 | |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 436 | def _get_ids_from_name(self): |
| 437 | """ |
| 438 | Obtain ids from name of tenant and security_groups. Store at self .security_groups_id" |
| 439 | :return: None |
| 440 | """ |
| 441 | # get tenant_id if only tenant_name is supplied |
| 442 | self._reload_connection() |
| 443 | if not self.my_tenant_id: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 444 | raise vimconn.VimConnConnectionException("Error getting tenant information from name={} id={}". |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 445 | format(self.tenant_name, self.tenant_id)) |
| 446 | if self.config.get('security_groups') and not self.security_groups_id: |
| 447 | # convert from name to id |
| 448 | neutron_sg_list = self.neutron.list_security_groups(tenant_id=self.my_tenant_id)["security_groups"] |
| 449 | |
| 450 | self.security_groups_id = [] |
| 451 | for sg in self.config.get('security_groups'): |
| 452 | for neutron_sg in neutron_sg_list: |
| 453 | if sg in (neutron_sg["id"], neutron_sg["name"]): |
| 454 | self.security_groups_id.append(neutron_sg["id"]) |
| 455 | break |
| 456 | else: |
| 457 | self.security_groups_id = None |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 458 | raise vimconn.VimConnConnectionException("Not found security group {} for this tenant".format(sg)) |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 459 | |
| tierno | 5509c2e | 2019-07-04 16:23:20 +0000 | [diff] [blame] | 460 | def check_vim_connectivity(self): |
| 461 | # just get network list to check connectivity and credentials |
| 462 | self.get_network_list(filter_dict={}) |
| 463 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 464 | def get_tenant_list(self, filter_dict={}): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 465 | """Obtain tenants of VIM |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 466 | filter_dict can contain the following keys: |
| 467 | name: filter by tenant name |
| 468 | id: filter by tenant uuid/id |
| 469 | <other VIM specific> |
| 470 | Returns the tenant list of dictionaries: [{'name':'<name>, 'id':'<id>, ...}, ...] |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 471 | """ |
| ahmadsa | 95baa27 | 2016-11-30 09:14:11 +0500 | [diff] [blame] | 472 | self.logger.debug("Getting tenants from VIM filter: '%s'", str(filter_dict)) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 473 | try: |
| 474 | self._reload_connection() |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 475 | if self.api_version3: |
| 476 | project_class_list = self.keystone.projects.list(name=filter_dict.get("name")) |
| ahmadsa | 95baa27 | 2016-11-30 09:14:11 +0500 | [diff] [blame] | 477 | else: |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 478 | project_class_list = self.keystone.tenants.findall(**filter_dict) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 479 | project_list = [] |
| ahmadsa | 95baa27 | 2016-11-30 09:14:11 +0500 | [diff] [blame] | 480 | for project in project_class_list: |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 481 | if filter_dict.get('id') and filter_dict["id"] != project.id: |
| 482 | continue |
| ahmadsa | 95baa27 | 2016-11-30 09:14:11 +0500 | [diff] [blame] | 483 | project_list.append(project.to_dict()) |
| 484 | return project_list |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 485 | except (ksExceptions.ConnectionError, ksExceptions.ClientException, ConnectionError) as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 486 | self._format_exception(e) |
| 487 | |
| 488 | def new_tenant(self, tenant_name, tenant_description): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 489 | """Adds a new tenant to openstack VIM. Returns the tenant identifier""" |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 490 | self.logger.debug("Adding a new tenant name: %s", tenant_name) |
| 491 | try: |
| 492 | self._reload_connection() |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 493 | if self.api_version3: |
| 494 | project = self.keystone.projects.create(tenant_name, self.config.get("project_domain_id", "default"), |
| 495 | description=tenant_description, is_domain=False) |
| ahmadsa | 95baa27 | 2016-11-30 09:14:11 +0500 | [diff] [blame] | 496 | else: |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 497 | project = self.keystone.tenants.create(tenant_name, tenant_description) |
| ahmadsa | 95baa27 | 2016-11-30 09:14:11 +0500 | [diff] [blame] | 498 | return project.id |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 499 | except (ksExceptions.ConnectionError, ksExceptions.ClientException, ksExceptions.BadRequest, ConnectionError)\ |
| 500 | as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 501 | self._format_exception(e) |
| 502 | |
| 503 | def delete_tenant(self, tenant_id): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 504 | """Delete a tenant from openstack VIM. Returns the old tenant identifier""" |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 505 | self.logger.debug("Deleting tenant %s from VIM", tenant_id) |
| 506 | try: |
| 507 | self._reload_connection() |
| tierno | f716aea | 2017-06-21 18:01:40 +0200 | [diff] [blame] | 508 | if self.api_version3: |
| ahmadsa | 95baa27 | 2016-11-30 09:14:11 +0500 | [diff] [blame] | 509 | self.keystone.projects.delete(tenant_id) |
| 510 | else: |
| 511 | self.keystone.tenants.delete(tenant_id) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 512 | return tenant_id |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 513 | except (ksExceptions.ConnectionError, ksExceptions.ClientException, ksExceptions.NotFound, ConnectionError)\ |
| 514 | as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 515 | self._format_exception(e) |
| ahmadsa | 95baa27 | 2016-11-30 09:14:11 +0500 | [diff] [blame] | 516 | |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 517 | def new_network(self, net_name, net_type, ip_profile=None, shared=False, provider_network_profile=None): |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 518 | """Adds a tenant network to VIM |
| 519 | Params: |
| 520 | 'net_name': name of the network |
| 521 | 'net_type': one of: |
| 522 | 'bridge': overlay isolated network |
| 523 | 'data': underlay E-LAN network for Passthrough and SRIOV interfaces |
| 524 | 'ptp': underlay E-LINE network for Passthrough and SRIOV interfaces. |
| 525 | 'ip_profile': is a dict containing the IP parameters of the network |
| 526 | 'ip_version': can be "IPv4" or "IPv6" (Currently only IPv4 is implemented) |
| 527 | 'subnet_address': ip_prefix_schema, that is X.X.X.X/Y |
| 528 | 'gateway_address': (Optional) ip_schema, that is X.X.X.X |
| 529 | 'dns_address': (Optional) comma separated list of ip_schema, e.g. X.X.X.X[,X,X,X,X] |
| 530 | 'dhcp_enabled': True or False |
| 531 | 'dhcp_start_address': ip_schema, first IP to grant |
| 532 | 'dhcp_count': number of IPs to grant. |
| 533 | 'shared': if this network can be seen/use by other tenants/organization |
| garciadeblas | 4af0d54 | 2020-02-18 16:01:13 +0100 | [diff] [blame] | 534 | 'provider_network_profile': (optional) contains {segmentation-id: vlan, network-type: vlan|vxlan, |
| 535 | physical-network: physnet-label} |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 536 | Returns a tuple with the network identifier and created_items, or raises an exception on error |
| 537 | created_items can be None or a dictionary where this method can include key-values that will be passed to |
| 538 | the method delete_network. Can be used to store created segments, created l2gw connections, etc. |
| 539 | Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same |
| 540 | as not present. |
| 541 | """ |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 542 | self.logger.debug("Adding a new network to VIM name '%s', type '%s'", net_name, net_type) |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 543 | # self.logger.debug(">>>>>>>>>>>>>>>>>> IP profile %s", str(ip_profile)) |
| kbsub | a85c54d | 2019-10-17 16:30:32 +0000 | [diff] [blame] | 544 | |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 545 | try: |
| kbsub | a85c54d | 2019-10-17 16:30:32 +0000 | [diff] [blame] | 546 | vlan = None |
| 547 | if provider_network_profile: |
| 548 | vlan = provider_network_profile.get("segmentation-id") |
| garciadeblas | edca7b3 | 2016-09-29 14:01:52 +0000 | [diff] [blame] | 549 | new_net = None |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 550 | created_items = {} |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 551 | self._reload_connection() |
| 552 | network_dict = {'name': net_name, 'admin_state_up': True} |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 553 | if net_type in ("data", "ptp"): |
| 554 | provider_physical_network = None |
| 555 | if provider_network_profile and provider_network_profile.get("physical-network"): |
| 556 | provider_physical_network = provider_network_profile.get("physical-network") |
| 557 | # provider-network must be one of the dataplane_physcial_netowrk if this is a list. If it is string |
| 558 | # or not declared, just ignore the checking |
| 559 | if isinstance(self.config.get('dataplane_physical_net'), (tuple, list)) and \ |
| 560 | provider_physical_network not in self.config['dataplane_physical_net']: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 561 | raise vimconn.VimConnConflictException( |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 562 | "Invalid parameter 'provider-network:physical-network' for network creation. '{}' is not " |
| 563 | "one of the declared list at VIM_config:dataplane_physical_net".format( |
| 564 | provider_physical_network)) |
| 565 | if not provider_physical_network: # use the default dataplane_physical_net |
| 566 | provider_physical_network = self.config.get('dataplane_physical_net') |
| 567 | # if it is non empty list, use the first value. If it is a string use the value directly |
| 568 | if isinstance(provider_physical_network, (tuple, list)) and provider_physical_network: |
| 569 | provider_physical_network = provider_physical_network[0] |
| 570 | |
| 571 | if not provider_physical_network: |
| tierno | 5ad826a | 2020-08-11 11:19:44 +0000 | [diff] [blame] | 572 | raise vimconn.VimConnConflictException( |
| 573 | "missing information needed for underlay networks. Provide 'dataplane_physical_net' " |
| 574 | "configuration at VIM or use the NS instantiation parameter 'provider-network.physical-network'" |
| 575 | " for the VLD") |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 576 | |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 577 | if not self.config.get('multisegment_support'): |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 578 | network_dict["provider:physical_network"] = provider_physical_network |
| garciadeblas | 4af0d54 | 2020-02-18 16:01:13 +0100 | [diff] [blame] | 579 | if provider_network_profile and "network-type" in provider_network_profile: |
| 580 | network_dict["provider:network_type"] = provider_network_profile["network-type"] |
| 581 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 582 | network_dict["provider:network_type"] = self.config.get('dataplane_network_type', 'vlan') |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 583 | if vlan: |
| 584 | network_dict["provider:segmentation_id"] = vlan |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 585 | else: |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 586 | # Multi-segment case |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 587 | segment_list = [] |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 588 | segment1_dict = { |
| 589 | "provider:physical_network": '', |
| 590 | "provider:network_type": 'vxlan' |
| 591 | } |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 592 | segment_list.append(segment1_dict) |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 593 | segment2_dict = { |
| 594 | "provider:physical_network": provider_physical_network, |
| 595 | "provider:network_type": "vlan" |
| 596 | } |
| 597 | if vlan: |
| 598 | segment2_dict["provider:segmentation_id"] = vlan |
| 599 | elif self.config.get('multisegment_vlan_range'): |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 600 | vlanID = self._generate_multisegment_vlanID() |
| 601 | segment2_dict["provider:segmentation_id"] = vlanID |
| 602 | # else |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 603 | # raise vimconn.VimConnConflictException( |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 604 | # "You must provide 'multisegment_vlan_range' at config dict before creating a multisegment |
| 605 | # network") |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 606 | segment_list.append(segment2_dict) |
| 607 | network_dict["segments"] = segment_list |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 608 | |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 609 | # VIO Specific Changes. It needs a concrete VLAN |
| 610 | if self.vim_type == "VIO" and vlan is None: |
| 611 | if self.config.get('dataplane_net_vlan_range') is None: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 612 | raise vimconn.VimConnConflictException( |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 613 | "You must provide 'dataplane_net_vlan_range' in format [start_ID - end_ID] at VIM_config " |
| 614 | "for creating underlay networks") |
| 615 | network_dict["provider:segmentation_id"] = self._generate_vlanID() |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 616 | |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 617 | network_dict["shared"] = shared |
| anwars | ff16819 | 2019-05-06 11:23:07 +0530 | [diff] [blame] | 618 | if self.config.get("disable_network_port_security"): |
| 619 | network_dict["port_security_enabled"] = False |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 620 | new_net = self.neutron.create_network({'network': network_dict}) |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 621 | # print new_net |
| 622 | # create subnetwork, even if there is no profile |
| garciadeblas | 9f8456e | 2016-09-05 05:02:59 +0200 | [diff] [blame] | 623 | if not ip_profile: |
| 624 | ip_profile = {} |
| tierno | 41a6981 | 2018-02-16 14:34:33 +0100 | [diff] [blame] | 625 | if not ip_profile.get('subnet_address'): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 626 | # Fake subnet is required |
| garciadeblas | 2299e3b | 2017-01-26 14:35:55 +0000 | [diff] [blame] | 627 | subnet_rand = random.randint(0, 255) |
| 628 | ip_profile['subnet_address'] = "192.168.{}.0/24".format(subnet_rand) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 629 | if 'ip_version' not in ip_profile: |
| garciadeblas | 9f8456e | 2016-09-05 05:02:59 +0200 | [diff] [blame] | 630 | ip_profile['ip_version'] = "IPv4" |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 631 | subnet = {"name": net_name+"-subnet", |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 632 | "network_id": new_net["network"]["id"], |
| 633 | "ip_version": 4 if ip_profile['ip_version'] == "IPv4" else 6, |
| 634 | "cidr": ip_profile['subnet_address'] |
| 635 | } |
| tierno | a1fb446 | 2017-06-30 12:25:50 +0200 | [diff] [blame] | 636 | # Gateway should be set to None if not needed. Otherwise openstack assigns one by default |
| tierno | 41a6981 | 2018-02-16 14:34:33 +0100 | [diff] [blame] | 637 | if ip_profile.get('gateway_address'): |
| tierno | 55d234c | 2018-07-04 18:29:21 +0200 | [diff] [blame] | 638 | subnet['gateway_ip'] = ip_profile['gateway_address'] |
| 639 | else: |
| 640 | subnet['gateway_ip'] = None |
| garciadeblas | edca7b3 | 2016-09-29 14:01:52 +0000 | [diff] [blame] | 641 | if ip_profile.get('dns_address'): |
| tierno | 455612d | 2017-05-30 16:40:10 +0200 | [diff] [blame] | 642 | subnet['dns_nameservers'] = ip_profile['dns_address'].split(";") |
| garciadeblas | 9f8456e | 2016-09-05 05:02:59 +0200 | [diff] [blame] | 643 | if 'dhcp_enabled' in ip_profile: |
| tierno | 41a6981 | 2018-02-16 14:34:33 +0100 | [diff] [blame] | 644 | subnet['enable_dhcp'] = False if \ |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 645 | ip_profile['dhcp_enabled'] == "false" or ip_profile['dhcp_enabled'] is False else True |
| tierno | 41a6981 | 2018-02-16 14:34:33 +0100 | [diff] [blame] | 646 | if ip_profile.get('dhcp_start_address'): |
| tierno | a1fb446 | 2017-06-30 12:25:50 +0200 | [diff] [blame] | 647 | subnet['allocation_pools'] = [] |
| garciadeblas | 9f8456e | 2016-09-05 05:02:59 +0200 | [diff] [blame] | 648 | subnet['allocation_pools'].append(dict()) |
| 649 | subnet['allocation_pools'][0]['start'] = ip_profile['dhcp_start_address'] |
| tierno | 41a6981 | 2018-02-16 14:34:33 +0100 | [diff] [blame] | 650 | if ip_profile.get('dhcp_count'): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 651 | # parts = ip_profile['dhcp_start_address'].split('.') |
| 652 | # ip_int = (int(parts[0]) << 24) + (int(parts[1]) << 16) + (int(parts[2]) << 8) + int(parts[3]) |
| garciadeblas | 9f8456e | 2016-09-05 05:02:59 +0200 | [diff] [blame] | 653 | ip_int = int(netaddr.IPAddress(ip_profile['dhcp_start_address'])) |
| garciadeblas | 21d795b | 2016-09-29 17:31:46 +0200 | [diff] [blame] | 654 | ip_int += ip_profile['dhcp_count'] - 1 |
| garciadeblas | 9f8456e | 2016-09-05 05:02:59 +0200 | [diff] [blame] | 655 | ip_str = str(netaddr.IPAddress(ip_int)) |
| 656 | subnet['allocation_pools'][0]['end'] = ip_str |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 657 | # self.logger.debug(">>>>>>>>>>>>>>>>>> Subnet: %s", str(subnet)) |
| 658 | self.neutron.create_subnet({"subnet": subnet}) |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 659 | |
| 660 | if net_type == "data" and self.config.get('multisegment_support'): |
| 661 | if self.config.get('l2gw_support'): |
| 662 | l2gw_list = self.neutron.list_l2_gateways().get("l2_gateways", ()) |
| 663 | for l2gw in l2gw_list: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 664 | l2gw_conn = { |
| 665 | "l2_gateway_id": l2gw["id"], |
| 666 | "network_id": new_net["network"]["id"], |
| 667 | "segmentation_id": str(vlanID), |
| 668 | } |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 669 | new_l2gw_conn = self.neutron.create_l2_gateway_connection({"l2_gateway_connection": l2gw_conn}) |
| 670 | created_items["l2gwconn:" + str(new_l2gw_conn["l2_gateway_connection"]["id"])] = True |
| 671 | return new_net["network"]["id"], created_items |
| tierno | 41a6981 | 2018-02-16 14:34:33 +0100 | [diff] [blame] | 672 | except Exception as e: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 673 | # delete l2gw connections (if any) before deleting the network |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 674 | for k, v in created_items.items(): |
| 675 | if not v: # skip already deleted |
| 676 | continue |
| 677 | try: |
| 678 | k_item, _, k_id = k.partition(":") |
| 679 | if k_item == "l2gwconn": |
| 680 | self.neutron.delete_l2_gateway_connection(k_id) |
| 681 | except Exception as e2: |
| 682 | self.logger.error("Error deleting l2 gateway connection: {}: {}".format(type(e2).__name__, e2)) |
| garciadeblas | edca7b3 | 2016-09-29 14:01:52 +0000 | [diff] [blame] | 683 | if new_net: |
| 684 | self.neutron.delete_network(new_net['network']['id']) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 685 | self._format_exception(e) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 686 | |
| 687 | def get_network_list(self, filter_dict={}): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 688 | """Obtain tenant networks of VIM |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 689 | Filter_dict can be: |
| 690 | name: network name |
| 691 | id: network uuid |
| 692 | shared: boolean |
| 693 | tenant_id: tenant |
| 694 | admin_state_up: boolean |
| 695 | status: 'ACTIVE' |
| 696 | Returns the network list of dictionaries |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 697 | """ |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 698 | self.logger.debug("Getting network from VIM filter: '%s'", str(filter_dict)) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 699 | try: |
| 700 | self._reload_connection() |
| tierno | 69b590e | 2018-03-13 18:52:23 +0100 | [diff] [blame] | 701 | filter_dict_os = filter_dict.copy() |
| 702 | if self.api_version3 and "tenant_id" in filter_dict_os: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 703 | filter_dict_os['project_id'] = filter_dict_os.pop('tenant_id') # TODO check |
| tierno | 69b590e | 2018-03-13 18:52:23 +0100 | [diff] [blame] | 704 | net_dict = self.neutron.list_networks(**filter_dict_os) |
| tierno | 00e3df7 | 2017-11-29 17:20:13 +0100 | [diff] [blame] | 705 | net_list = net_dict["networks"] |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 706 | self.__net_os2mano(net_list) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 707 | return net_list |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 708 | except (neExceptions.ConnectionFailed, ksExceptions.ClientException, neExceptions.NeutronException, |
| 709 | ConnectionError) as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 710 | self._format_exception(e) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 711 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 712 | def get_network(self, net_id): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 713 | """Obtain details of network from VIM |
| 714 | Returns the network information from a network id""" |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 715 | self.logger.debug(" Getting tenant network %s from VIM", net_id) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 716 | filter_dict = {"id": net_id} |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 717 | net_list = self.get_network_list(filter_dict) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 718 | if len(net_list) == 0: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 719 | raise vimconn.VimConnNotFoundException("Network '{}' not found".format(net_id)) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 720 | elif len(net_list) > 1: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 721 | raise vimconn.VimConnConflictException("Found more than one network with this criteria") |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 722 | net = net_list[0] |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 723 | subnets = [] |
| 724 | for subnet_id in net.get("subnets", ()): |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 725 | try: |
| 726 | subnet = self.neutron.show_subnet(subnet_id) |
| 727 | except Exception as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 728 | self.logger.error("osconnector.get_network(): Error getting subnet %s %s" % (net_id, str(e))) |
| 729 | subnet = {"id": subnet_id, "fault": str(e)} |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 730 | subnets.append(subnet) |
| 731 | net["subnets"] = subnets |
| Pablo Montes Moreno | 51e553b | 2017-03-23 16:39:12 +0100 | [diff] [blame] | 732 | net["encapsulation"] = net.get('provider:network_type') |
| Anderson Bravalheri | 0fb7028 | 2018-12-16 19:28:37 +0000 | [diff] [blame] | 733 | net["encapsulation_type"] = net.get('provider:network_type') |
| Pablo Montes Moreno | 3fbff9b | 2017-03-08 11:28:15 +0100 | [diff] [blame] | 734 | net["segmentation_id"] = net.get('provider:segmentation_id') |
| Anderson Bravalheri | 0fb7028 | 2018-12-16 19:28:37 +0000 | [diff] [blame] | 735 | net["encapsulation_id"] = net.get('provider:segmentation_id') |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 736 | return net |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 737 | |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 738 | def delete_network(self, net_id, created_items=None): |
| 739 | """ |
| 740 | Removes a tenant network from VIM and its associated elements |
| 741 | :param net_id: VIM identifier of the network, provided by method new_network |
| 742 | :param created_items: dictionary with extra items to be deleted. provided by method new_network |
| 743 | Returns the network identifier or raises an exception upon error or when network is not found |
| 744 | """ |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 745 | self.logger.debug("Deleting network '%s' from VIM", net_id) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 746 | if created_items is None: |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 747 | created_items = {} |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 748 | try: |
| 749 | self._reload_connection() |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 750 | # delete l2gw connections (if any) before deleting the network |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 751 | for k, v in created_items.items(): |
| 752 | if not v: # skip already deleted |
| 753 | continue |
| 754 | try: |
| 755 | k_item, _, k_id = k.partition(":") |
| 756 | if k_item == "l2gwconn": |
| 757 | self.neutron.delete_l2_gateway_connection(k_id) |
| 758 | except Exception as e: |
| 759 | self.logger.error("Error deleting l2 gateway connection: {}: {}".format(type(e).__name__, e)) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 760 | # delete VM ports attached to this networks before the network |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 761 | ports = self.neutron.list_ports(network_id=net_id) |
| 762 | for p in ports['ports']: |
| 763 | try: |
| 764 | self.neutron.delete_port(p["id"]) |
| 765 | except Exception as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 766 | self.logger.error("Error deleting port %s: %s", p["id"], str(e)) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 767 | self.neutron.delete_network(net_id) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 768 | return net_id |
| 769 | except (neExceptions.ConnectionFailed, neExceptions.NetworkNotFoundClient, neExceptions.NeutronException, |
| tierno | 8e995ce | 2016-09-22 08:13:00 +0000 | [diff] [blame] | 770 | ksExceptions.ClientException, neExceptions.NeutronException, ConnectionError) as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 771 | self._format_exception(e) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 772 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 773 | def refresh_nets_status(self, net_list): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 774 | """Get the status of the networks |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 775 | Params: the list of network identifiers |
| 776 | Returns a dictionary with: |
| 777 | net_id: #VIM id of this network |
| 778 | status: #Mandatory. Text with one of: |
| 779 | # DELETED (not found at vim) |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 780 | # VIM_ERROR (Cannot connect to VIM, VIM response error, ...) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 781 | # OTHER (Vim reported other status not understood) |
| 782 | # ERROR (VIM indicates an ERROR status) |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 783 | # ACTIVE, INACTIVE, DOWN (admin down), |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 784 | # BUILD (on building process) |
| 785 | # |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 786 | error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 787 | vim_info: #Text with plain information obtained from vim (yaml.safe_dump) |
| 788 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 789 | """ |
| 790 | net_dict = {} |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 791 | for net_id in net_list: |
| 792 | net = {} |
| 793 | try: |
| 794 | net_vim = self.get_network(net_id) |
| 795 | if net_vim['status'] in netStatus2manoFormat: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 796 | net["status"] = netStatus2manoFormat[net_vim['status']] |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 797 | else: |
| 798 | net["status"] = "OTHER" |
| 799 | net["error_msg"] = "VIM status reported " + net_vim['status'] |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 800 | |
| tierno | 8e995ce | 2016-09-22 08:13:00 +0000 | [diff] [blame] | 801 | if net['status'] == "ACTIVE" and not net_vim['admin_state_up']: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 802 | net['status'] = 'DOWN' |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 803 | |
| 804 | net['vim_info'] = self.serialize(net_vim) |
| 805 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 806 | if net_vim.get('fault'): # TODO |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 807 | net['error_msg'] = str(net_vim['fault']) |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 808 | except vimconn.VimConnNotFoundException as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 809 | self.logger.error("Exception getting net status: %s", str(e)) |
| 810 | net['status'] = "DELETED" |
| 811 | net['error_msg'] = str(e) |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 812 | except vimconn.VimConnException as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 813 | self.logger.error("Exception getting net status: %s", str(e)) |
| 814 | net['status'] = "VIM_ERROR" |
| 815 | net['error_msg'] = str(e) |
| 816 | net_dict[net_id] = net |
| 817 | return net_dict |
| 818 | |
| 819 | def get_flavor(self, flavor_id): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 820 | """Obtain flavor details from the VIM. Returns the flavor dict details""" |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 821 | self.logger.debug("Getting flavor '%s'", flavor_id) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 822 | try: |
| 823 | self._reload_connection() |
| 824 | flavor = self.nova.flavors.find(id=flavor_id) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 825 | # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 826 | return flavor.to_dict() |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 827 | except (nvExceptions.NotFound, nvExceptions.ClientException, ksExceptions.ClientException, |
| 828 | ConnectionError) as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 829 | self._format_exception(e) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 830 | |
| tierno | cf157a8 | 2017-01-30 14:07:06 +0100 | [diff] [blame] | 831 | def get_flavor_id_from_data(self, flavor_dict): |
| 832 | """Obtain flavor id that match the flavor description |
| 833 | Returns the flavor_id or raises a vimconnNotFoundException |
| tierno | e26fc7a | 2017-05-30 14:43:03 +0200 | [diff] [blame] | 834 | flavor_dict: contains the required ram, vcpus, disk |
| 835 | If 'use_existing_flavors' is set to True at config, the closer flavor that provides same or more ram, vcpus |
| 836 | and disk is returned. Otherwise a flavor with exactly same ram, vcpus and disk is returned or a |
| 837 | vimconnNotFoundException is raised |
| tierno | cf157a8 | 2017-01-30 14:07:06 +0100 | [diff] [blame] | 838 | """ |
| tierno | e26fc7a | 2017-05-30 14:43:03 +0200 | [diff] [blame] | 839 | exact_match = False if self.config.get('use_existing_flavors') else True |
| tierno | cf157a8 | 2017-01-30 14:07:06 +0100 | [diff] [blame] | 840 | try: |
| 841 | self._reload_connection() |
| tierno | e26fc7a | 2017-05-30 14:43:03 +0200 | [diff] [blame] | 842 | flavor_candidate_id = None |
| 843 | flavor_candidate_data = (10000, 10000, 10000) |
| 844 | flavor_target = (flavor_dict["ram"], flavor_dict["vcpus"], flavor_dict["disk"]) |
| 845 | # numa=None |
| anwars | ae5f52c | 2019-04-22 10:35:27 +0530 | [diff] [blame] | 846 | extended = flavor_dict.get("extended", {}) |
| 847 | if extended: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 848 | # TODO |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 849 | raise vimconn.VimConnNotFoundException("Flavor with EPA still not implemented") |
| tierno | cf157a8 | 2017-01-30 14:07:06 +0100 | [diff] [blame] | 850 | # if len(numas) > 1: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 851 | # raise vimconn.VimConnNotFoundException("Cannot find any flavor with more than one numa") |
| tierno | cf157a8 | 2017-01-30 14:07:06 +0100 | [diff] [blame] | 852 | # numa=numas[0] |
| 853 | # numas = extended.get("numas") |
| 854 | for flavor in self.nova.flavors.list(): |
| 855 | epa = flavor.get_keys() |
| 856 | if epa: |
| 857 | continue |
| tierno | e26fc7a | 2017-05-30 14:43:03 +0200 | [diff] [blame] | 858 | # TODO |
| 859 | flavor_data = (flavor.ram, flavor.vcpus, flavor.disk) |
| 860 | if flavor_data == flavor_target: |
| 861 | return flavor.id |
| 862 | elif not exact_match and flavor_target < flavor_data < flavor_candidate_data: |
| 863 | flavor_candidate_id = flavor.id |
| 864 | flavor_candidate_data = flavor_data |
| 865 | if not exact_match and flavor_candidate_id: |
| 866 | return flavor_candidate_id |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 867 | raise vimconn.VimConnNotFoundException("Cannot find any flavor matching '{}'".format(flavor_dict)) |
| 868 | except (nvExceptions.NotFound, nvExceptions.ClientException, ksExceptions.ClientException, |
| 869 | ConnectionError) as e: |
| tierno | cf157a8 | 2017-01-30 14:07:06 +0100 | [diff] [blame] | 870 | self._format_exception(e) |
| 871 | |
| anwars | ae5f52c | 2019-04-22 10:35:27 +0530 | [diff] [blame] | 872 | def process_resource_quota(self, quota, prefix, extra_specs): |
| 873 | """ |
| 874 | :param prefix: |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 875 | :param extra_specs: |
| anwars | ae5f52c | 2019-04-22 10:35:27 +0530 | [diff] [blame] | 876 | :return: |
| 877 | """ |
| 878 | if 'limit' in quota: |
| 879 | extra_specs["quota:" + prefix + "_limit"] = quota['limit'] |
| 880 | if 'reserve' in quota: |
| 881 | extra_specs["quota:" + prefix + "_reservation"] = quota['reserve'] |
| 882 | if 'shares' in quota: |
| 883 | extra_specs["quota:" + prefix + "_shares_level"] = "custom" |
| 884 | extra_specs["quota:" + prefix + "_shares_share"] = quota['shares'] |
| 885 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 886 | def new_flavor(self, flavor_data, change_name_if_used=True): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 887 | """Adds a tenant flavor to openstack VIM |
| 888 | if change_name_if_used is True, it will change name in case of conflict, because it is not supported name |
| 889 | repetition |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 890 | Returns the flavor identifier |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 891 | """ |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 892 | self.logger.debug("Adding flavor '%s'", str(flavor_data)) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 893 | retry = 0 |
| 894 | max_retries = 3 |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 895 | name_suffix = 0 |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 896 | try: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 897 | name = flavor_data['name'] |
| 898 | while retry < max_retries: |
| 899 | retry += 1 |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 900 | try: |
| 901 | self._reload_connection() |
| 902 | if change_name_if_used: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 903 | # get used names |
| 904 | fl_names = [] |
| 905 | fl = self.nova.flavors.list() |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 906 | for f in fl: |
| 907 | fl_names.append(f.name) |
| 908 | while name in fl_names: |
| 909 | name_suffix += 1 |
| 910 | name = flavor_data['name']+"-" + str(name_suffix) |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 911 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 912 | ram = flavor_data.get('ram', 64) |
| 913 | vcpus = flavor_data.get('vcpus', 1) |
| 914 | extra_specs = {} |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 915 | |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 916 | extended = flavor_data.get("extended") |
| 917 | if extended: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 918 | numas = extended.get("numas") |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 919 | if numas: |
| 920 | numa_nodes = len(numas) |
| 921 | if numa_nodes > 1: |
| 922 | return -1, "Can not add flavor with more than one numa" |
| anwars | ae5f52c | 2019-04-22 10:35:27 +0530 | [diff] [blame] | 923 | extra_specs["hw:numa_nodes"] = str(numa_nodes) |
| 924 | extra_specs["hw:mem_page_size"] = "large" |
| 925 | extra_specs["hw:cpu_policy"] = "dedicated" |
| 926 | extra_specs["hw:numa_mempolicy"] = "strict" |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 927 | if self.vim_type == "VIO": |
| anwars | ae5f52c | 2019-04-22 10:35:27 +0530 | [diff] [blame] | 928 | extra_specs["vmware:extra_config"] = '{"numa.nodeAffinity":"0"}' |
| 929 | extra_specs["vmware:latency_sensitivity_level"] = "high" |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 930 | for numa in numas: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 931 | # overwrite ram and vcpus |
| 932 | # check if key 'memory' is present in numa else use ram value at flavor |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 933 | if 'memory' in numa: |
| 934 | ram = numa['memory']*1024 |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 935 | # See for reference: https://specs.openstack.org/openstack/nova-specs/specs/mitaka/ |
| 936 | # implemented/virt-driver-cpu-thread-pinning.html |
| garciadeblas | fa35a72 | 2019-04-11 19:15:49 +0200 | [diff] [blame] | 937 | extra_specs["hw:cpu_sockets"] = 1 |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 938 | if 'paired-threads' in numa: |
| 939 | vcpus = numa['paired-threads']*2 |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 940 | # cpu_thread_policy "require" implies that the compute node must have an |
| 941 | # STM architecture |
| anwars | ae5f52c | 2019-04-22 10:35:27 +0530 | [diff] [blame] | 942 | extra_specs["hw:cpu_thread_policy"] = "require" |
| 943 | extra_specs["hw:cpu_policy"] = "dedicated" |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 944 | elif 'cores' in numa: |
| 945 | vcpus = numa['cores'] |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 946 | # cpu_thread_policy "prefer" implies that the host must not have an SMT |
| 947 | # architecture, or a non-SMT architecture will be emulated |
| anwars | ae5f52c | 2019-04-22 10:35:27 +0530 | [diff] [blame] | 948 | extra_specs["hw:cpu_thread_policy"] = "isolate" |
| 949 | extra_specs["hw:cpu_policy"] = "dedicated" |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 950 | elif 'threads' in numa: |
| 951 | vcpus = numa['threads'] |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 952 | # cpu_thread_policy "prefer" implies that the host may or may not have an SMT |
| 953 | # architecture |
| anwars | ae5f52c | 2019-04-22 10:35:27 +0530 | [diff] [blame] | 954 | extra_specs["hw:cpu_thread_policy"] = "prefer" |
| 955 | extra_specs["hw:cpu_policy"] = "dedicated" |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 956 | # for interface in numa.get("interfaces",() ): |
| 957 | # if interface["dedicated"]=="yes": |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 958 | # raise vimconn.VimConnException("Passthrough interfaces are not supported |
| 959 | # for the openstack connector", http_code=vimconn.HTTP_Service_Unavailable) |
| 960 | # #TODO, add the key 'pci_passthrough:alias"="<label at config>:<number ifaces>"' |
| 961 | # when a way to connect it is available |
| anwars | ae5f52c | 2019-04-22 10:35:27 +0530 | [diff] [blame] | 962 | elif extended.get("cpu-quota"): |
| 963 | self.process_resource_quota(extended.get("cpu-quota"), "cpu", extra_specs) |
| 964 | if extended.get("mem-quota"): |
| 965 | self.process_resource_quota(extended.get("mem-quota"), "memory", extra_specs) |
| 966 | if extended.get("vif-quota"): |
| 967 | self.process_resource_quota(extended.get("vif-quota"), "vif", extra_specs) |
| 968 | if extended.get("disk-io-quota"): |
| 969 | self.process_resource_quota(extended.get("disk-io-quota"), "disk_io", extra_specs) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 970 | # create flavor |
| 971 | new_flavor = self.nova.flavors.create(name, |
| 972 | ram, |
| 973 | vcpus, |
| 974 | flavor_data.get('disk', 0), |
| 975 | is_public=flavor_data.get('is_public', True) |
| 976 | ) |
| 977 | # add metadata |
| anwars | ae5f52c | 2019-04-22 10:35:27 +0530 | [diff] [blame] | 978 | if extra_specs: |
| 979 | new_flavor.set_keys(extra_specs) |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 980 | return new_flavor.id |
| 981 | except nvExceptions.Conflict as e: |
| 982 | if change_name_if_used and retry < max_retries: |
| 983 | continue |
| 984 | self._format_exception(e) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 985 | # except nvExceptions.BadRequest as e: |
| anwars | c76a3ee | 2018-10-04 14:05:32 +0530 | [diff] [blame] | 986 | except (ksExceptions.ClientException, nvExceptions.ClientException, ConnectionError, KeyError) as e: |
| 987 | self._format_exception(e) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 988 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 989 | def delete_flavor(self, flavor_id): |
| 990 | """Deletes a tenant flavor from openstack VIM. Returns the old flavor_id |
| 991 | """ |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 992 | try: |
| 993 | self._reload_connection() |
| 994 | self.nova.flavors.delete(flavor_id) |
| 995 | return flavor_id |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 996 | # except nvExceptions.BadRequest as e: |
| 997 | except (nvExceptions.NotFound, ksExceptions.ClientException, nvExceptions.ClientException, |
| 998 | ConnectionError) as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 999 | self._format_exception(e) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1000 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1001 | def new_image(self, image_dict): |
| 1002 | """ |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1003 | Adds a tenant image to VIM. imge_dict is a dictionary with: |
| 1004 | name: name |
| 1005 | disk_format: qcow2, vhd, vmdk, raw (by default), ... |
| 1006 | location: path or URI |
| 1007 | public: "yes" or "no" |
| 1008 | metadata: metadata of the image |
| 1009 | Returns the image_id |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1010 | """ |
| 1011 | retry = 0 |
| 1012 | max_retries = 3 |
| 1013 | while retry < max_retries: |
| 1014 | retry += 1 |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1015 | try: |
| 1016 | self._reload_connection() |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1017 | # determine format http://docs.openstack.org/developer/glance/formats.html |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1018 | if "disk_format" in image_dict: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1019 | disk_format = image_dict["disk_format"] |
| 1020 | else: # autodiscover based on extension |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1021 | if image_dict['location'].endswith(".qcow2"): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1022 | disk_format = "qcow2" |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1023 | elif image_dict['location'].endswith(".vhd"): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1024 | disk_format = "vhd" |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1025 | elif image_dict['location'].endswith(".vmdk"): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1026 | disk_format = "vmdk" |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1027 | elif image_dict['location'].endswith(".vdi"): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1028 | disk_format = "vdi" |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1029 | elif image_dict['location'].endswith(".iso"): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1030 | disk_format = "iso" |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1031 | elif image_dict['location'].endswith(".aki"): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1032 | disk_format = "aki" |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1033 | elif image_dict['location'].endswith(".ari"): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1034 | disk_format = "ari" |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1035 | elif image_dict['location'].endswith(".ami"): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1036 | disk_format = "ami" |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1037 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1038 | disk_format = "raw" |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1039 | self.logger.debug("new_image: '%s' loading from '%s'", image_dict['name'], image_dict['location']) |
| shashankjain | 3c83a21 | 2018-10-04 13:05:46 +0530 | [diff] [blame] | 1040 | if self.vim_type == "VIO": |
| 1041 | container_format = "bare" |
| 1042 | if 'container_format' in image_dict: |
| 1043 | container_format = image_dict['container_format'] |
| 1044 | new_image = self.glance.images.create(name=image_dict['name'], container_format=container_format, |
| 1045 | disk_format=disk_format) |
| 1046 | else: |
| 1047 | new_image = self.glance.images.create(name=image_dict['name']) |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1048 | if image_dict['location'].startswith("http"): |
| 1049 | # TODO there is not a method to direct download. It must be downloaded locally with requests |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1050 | raise vimconn.VimConnNotImplemented("Cannot create image from URL") |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1051 | else: # local path |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1052 | with open(image_dict['location']) as fimage: |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1053 | self.glance.images.upload(new_image.id, fimage) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1054 | # new_image = self.glancev1.images.create(name=image_dict['name'], is_public= |
| 1055 | # image_dict.get('public',"yes")=="yes", |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1056 | # container_format="bare", data=fimage, disk_format=disk_format) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1057 | metadata_to_load = image_dict.get('metadata') |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1058 | # TODO location is a reserved word for current openstack versions. fixed for VIO please check |
| 1059 | # for openstack |
| shashankjain | 3c83a21 | 2018-10-04 13:05:46 +0530 | [diff] [blame] | 1060 | if self.vim_type == "VIO": |
| 1061 | metadata_to_load['upload_location'] = image_dict['location'] |
| 1062 | else: |
| 1063 | metadata_to_load['location'] = image_dict['location'] |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1064 | self.glance.images.update(new_image.id, **metadata_to_load) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1065 | return new_image.id |
| 1066 | except (nvExceptions.Conflict, ksExceptions.ClientException, nvExceptions.ClientException) as e: |
| 1067 | self._format_exception(e) |
| tierno | 8e995ce | 2016-09-22 08:13:00 +0000 | [diff] [blame] | 1068 | except (HTTPException, gl1Exceptions.HTTPException, gl1Exceptions.CommunicationError, ConnectionError) as e: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1069 | if retry == max_retries: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1070 | continue |
| 1071 | self._format_exception(e) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1072 | except IOError as e: # can not open the file |
| 1073 | raise vimconn.VimConnConnectionException("{}: {} for {}".format(type(e).__name__, e, |
| 1074 | image_dict['location']), |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1075 | http_code=vimconn.HTTP_Bad_Request) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1076 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1077 | def delete_image(self, image_id): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1078 | """Deletes a tenant image from openstack VIM. Returns the old id |
| 1079 | """ |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1080 | try: |
| 1081 | self._reload_connection() |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1082 | self.glance.images.delete(image_id) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1083 | return image_id |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1084 | except (nvExceptions.NotFound, ksExceptions.ClientException, nvExceptions.ClientException, |
| 1085 | gl1Exceptions.CommunicationError, gl1Exceptions.HTTPNotFound, ConnectionError) as e: # TODO remove |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1086 | self._format_exception(e) |
| 1087 | |
| 1088 | def get_image_id_from_path(self, path): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1089 | """Get the image id from image path in the VIM database. Returns the image_id""" |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1090 | try: |
| 1091 | self._reload_connection() |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1092 | images = self.glance.images.list() |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1093 | for image in images: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1094 | if image.metadata.get("location") == path: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1095 | return image.id |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1096 | raise vimconn.VimConnNotFoundException("image with location '{}' not found".format(path)) |
| 1097 | except (ksExceptions.ClientException, nvExceptions.ClientException, gl1Exceptions.CommunicationError, |
| 1098 | ConnectionError) as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1099 | self._format_exception(e) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1100 | |
| garciadeblas | b69fa9f | 2016-09-28 12:04:10 +0200 | [diff] [blame] | 1101 | def get_image_list(self, filter_dict={}): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1102 | """Obtain tenant images from VIM |
| garciadeblas | b69fa9f | 2016-09-28 12:04:10 +0200 | [diff] [blame] | 1103 | Filter_dict can be: |
| 1104 | id: image id |
| 1105 | name: image name |
| 1106 | checksum: image checksum |
| 1107 | Returns the image list of dictionaries: |
| 1108 | [{<the fields at Filter_dict plus some VIM specific>}, ...] |
| 1109 | List can be empty |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1110 | """ |
| garciadeblas | b69fa9f | 2016-09-28 12:04:10 +0200 | [diff] [blame] | 1111 | self.logger.debug("Getting image list from VIM filter: '%s'", str(filter_dict)) |
| 1112 | try: |
| 1113 | self._reload_connection() |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1114 | # filter_dict_os = filter_dict.copy() |
| 1115 | # First we filter by the available filter fields: name, id. The others are removed. |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1116 | image_list = self.glance.images.list() |
| garciadeblas | b69fa9f | 2016-09-28 12:04:10 +0200 | [diff] [blame] | 1117 | filtered_list = [] |
| 1118 | for image in image_list: |
| tierno | 3cb8dc3 | 2017-10-24 18:13:19 +0200 | [diff] [blame] | 1119 | try: |
| tierno | 1beea86 | 2018-07-11 15:47:37 +0200 | [diff] [blame] | 1120 | if filter_dict.get("name") and image["name"] != filter_dict["name"]: |
| 1121 | continue |
| 1122 | if filter_dict.get("id") and image["id"] != filter_dict["id"]: |
| 1123 | continue |
| 1124 | if filter_dict.get("checksum") and image["checksum"] != filter_dict["checksum"]: |
| 1125 | continue |
| 1126 | |
| 1127 | filtered_list.append(image.copy()) |
| tierno | 3cb8dc3 | 2017-10-24 18:13:19 +0200 | [diff] [blame] | 1128 | except gl1Exceptions.HTTPNotFound: |
| 1129 | pass |
| garciadeblas | b69fa9f | 2016-09-28 12:04:10 +0200 | [diff] [blame] | 1130 | return filtered_list |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1131 | except (ksExceptions.ClientException, nvExceptions.ClientException, gl1Exceptions.CommunicationError, |
| 1132 | ConnectionError) as e: |
| garciadeblas | b69fa9f | 2016-09-28 12:04:10 +0200 | [diff] [blame] | 1133 | self._format_exception(e) |
| 1134 | |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1135 | def __wait_for_vm(self, vm_id, status): |
| 1136 | """wait until vm is in the desired status and return True. |
| 1137 | If the VM gets in ERROR status, return false. |
| 1138 | If the timeout is reached generate an exception""" |
| 1139 | elapsed_time = 0 |
| 1140 | while elapsed_time < server_timeout: |
| 1141 | vm_status = self.nova.servers.get(vm_id).status |
| 1142 | if vm_status == status: |
| 1143 | return True |
| 1144 | if vm_status == 'ERROR': |
| 1145 | return False |
| tierno | 1df468d | 2018-07-06 14:25:16 +0200 | [diff] [blame] | 1146 | time.sleep(5) |
| 1147 | elapsed_time += 5 |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1148 | |
| 1149 | # if we exceeded the timeout rollback |
| 1150 | if elapsed_time >= server_timeout: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1151 | raise vimconn.VimConnException('Timeout waiting for instance ' + vm_id + ' to get ' + status, |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1152 | http_code=vimconn.HTTP_Request_Timeout) |
| 1153 | |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 1154 | def _get_openstack_availablity_zones(self): |
| 1155 | """ |
| 1156 | Get from openstack availability zones available |
| 1157 | :return: |
| 1158 | """ |
| 1159 | try: |
| 1160 | openstack_availability_zone = self.nova.availability_zones.list() |
| 1161 | openstack_availability_zone = [str(zone.zoneName) for zone in openstack_availability_zone |
| 1162 | if zone.zoneName != 'internal'] |
| 1163 | return openstack_availability_zone |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1164 | except Exception: |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 1165 | return None |
| 1166 | |
| 1167 | def _set_availablity_zones(self): |
| 1168 | """ |
| 1169 | Set vim availablity zone |
| 1170 | :return: |
| 1171 | """ |
| 1172 | |
| 1173 | if 'availability_zone' in self.config: |
| 1174 | vim_availability_zones = self.config.get('availability_zone') |
| 1175 | if isinstance(vim_availability_zones, str): |
| 1176 | self.availability_zone = [vim_availability_zones] |
| 1177 | elif isinstance(vim_availability_zones, list): |
| 1178 | self.availability_zone = vim_availability_zones |
| 1179 | else: |
| 1180 | self.availability_zone = self._get_openstack_availablity_zones() |
| 1181 | |
| tierno | 5a3273c | 2017-08-29 11:43:46 +0200 | [diff] [blame] | 1182 | def _get_vm_availability_zone(self, availability_zone_index, availability_zone_list): |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 1183 | """ |
| tierno | 5a3273c | 2017-08-29 11:43:46 +0200 | [diff] [blame] | 1184 | Return thge availability zone to be used by the created VM. |
| 1185 | :return: The VIM availability zone to be used or None |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 1186 | """ |
| tierno | 5a3273c | 2017-08-29 11:43:46 +0200 | [diff] [blame] | 1187 | if availability_zone_index is None: |
| 1188 | if not self.config.get('availability_zone'): |
| 1189 | return None |
| 1190 | elif isinstance(self.config.get('availability_zone'), str): |
| 1191 | return self.config['availability_zone'] |
| 1192 | else: |
| 1193 | # TODO consider using a different parameter at config for default AV and AV list match |
| 1194 | return self.config['availability_zone'][0] |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 1195 | |
| tierno | 5a3273c | 2017-08-29 11:43:46 +0200 | [diff] [blame] | 1196 | vim_availability_zones = self.availability_zone |
| 1197 | # check if VIM offer enough availability zones describe in the VNFD |
| 1198 | if vim_availability_zones and len(availability_zone_list) <= len(vim_availability_zones): |
| 1199 | # check if all the names of NFV AV match VIM AV names |
| 1200 | match_by_index = False |
| 1201 | for av in availability_zone_list: |
| 1202 | if av not in vim_availability_zones: |
| 1203 | match_by_index = True |
| 1204 | break |
| 1205 | if match_by_index: |
| 1206 | return vim_availability_zones[availability_zone_index] |
| 1207 | else: |
| 1208 | return availability_zone_list[availability_zone_index] |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 1209 | else: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1210 | raise vimconn.VimConnConflictException("No enough availability zones at VIM for this deployment") |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 1211 | |
| tierno | 5a3273c | 2017-08-29 11:43:46 +0200 | [diff] [blame] | 1212 | def new_vminstance(self, name, description, start, image_id, flavor_id, net_list, cloud_config=None, disk_list=None, |
| 1213 | availability_zone_index=None, availability_zone_list=None): |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1214 | """Adds a VM instance to VIM |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1215 | Params: |
| 1216 | start: indicates if VM must start or boot in pause mode. Ignored |
| 1217 | image_id,flavor_id: iamge and flavor uuid |
| 1218 | net_list: list of interfaces, each one is a dictionary with: |
| 1219 | name: |
| 1220 | net_id: network uuid to connect |
| 1221 | vpci: virtual vcpi to assign, ignored because openstack lack #TODO |
| 1222 | model: interface model, ignored #TODO |
| 1223 | mac_address: used for SR-IOV ifaces #TODO for other types |
| 1224 | use: 'data', 'bridge', 'mgmt' |
| tierno | 66eba6e | 2017-11-10 17:09:18 +0100 | [diff] [blame] | 1225 | type: 'virtual', 'PCI-PASSTHROUGH'('PF'), 'SR-IOV'('VF'), 'VFnotShared' |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1226 | vim_id: filled/added by this function |
| ahmadsa | f853d45 | 2016-12-22 11:33:47 +0500 | [diff] [blame] | 1227 | floating_ip: True/False (or it can be None) |
| tierno | 70eeb18 | 2020-10-19 16:38:00 +0000 | [diff] [blame^] | 1228 | port_security: True/False |
| tierno | 41a6981 | 2018-02-16 14:34:33 +0100 | [diff] [blame] | 1229 | 'cloud_config': (optional) dictionary with: |
| tierno | 1d213f4 | 2020-04-24 14:02:51 +0000 | [diff] [blame] | 1230 | 'key-pairs': (optional) list of strings with the public key to be inserted to the default user |
| 1231 | 'users': (optional) list of users to be inserted, each item is a dict with: |
| 1232 | 'name': (mandatory) user name, |
| 1233 | 'key-pairs': (optional) list of strings with the public key to be inserted to the user |
| 1234 | 'user-data': (optional) string is a text script to be passed directly to cloud-init |
| 1235 | 'config-files': (optional). List of files to be transferred. Each item is a dict with: |
| 1236 | 'dest': (mandatory) string with the destination absolute path |
| 1237 | 'encoding': (optional, by default text). Can be one of: |
| 1238 | 'b64', 'base64', 'gz', 'gz+b64', 'gz+base64', 'gzip+b64', 'gzip+base64' |
| 1239 | 'content' (mandatory): string with the content of the file |
| 1240 | 'permissions': (optional) string with file permissions, typically octal notation '0644' |
| 1241 | 'owner': (optional) file owner, string with the format 'owner:group' |
| 1242 | 'boot-data-drive': boolean to indicate if user-data must be passed using a boot drive (hard disk) |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 1243 | 'disk_list': (optional) list with additional disks to the VM. Each item is a dict with: |
| 1244 | 'image_id': (optional). VIM id of an existing image. If not provided an empty disk must be mounted |
| 1245 | 'size': (mandatory) string with the size of the disk in GB |
| tierno | 1df468d | 2018-07-06 14:25:16 +0200 | [diff] [blame] | 1246 | 'vim_id' (optional) should use this existing volume id |
| tierno | 5a3273c | 2017-08-29 11:43:46 +0200 | [diff] [blame] | 1247 | availability_zone_index: Index of availability_zone_list to use for this this VM. None if not AV required |
| 1248 | availability_zone_list: list of availability zones given by user in the VNFD descriptor. Ignore if |
| 1249 | availability_zone_index is None |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1250 | #TODO ip, security groups |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1251 | Returns a tuple with the instance identifier and created_items or raises an exception on error |
| 1252 | created_items can be None or a dictionary where this method can include key-values that will be passed to |
| 1253 | the method delete_vminstance and action_vminstance. Can be used to store created ports, volumes, etc. |
| 1254 | Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same |
| 1255 | as not present. |
| 1256 | """ |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1257 | self.logger.debug("new_vminstance input: image='%s' flavor='%s' nics='%s'", image_id, flavor_id, str(net_list)) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1258 | try: |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1259 | server = None |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1260 | created_items = {} |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1261 | # metadata = {} |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1262 | net_list_vim = [] |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1263 | external_network = [] |
| 1264 | # ^list of external networks to be connected to instance, later on used to create floating_ip |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1265 | no_secured_ports = [] # List of port-is with port-security disabled |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1266 | self._reload_connection() |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1267 | # metadata_vpci = {} # For a specific neutron plugin |
| tierno | b84cbdc | 2017-07-07 14:30:30 +0200 | [diff] [blame] | 1268 | block_device_mapping = None |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 1269 | |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1270 | for net in net_list: |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1271 | if not net.get("net_id"): # skip non connected iface |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1272 | continue |
| Pablo Montes Moreno | 3be0b2a | 2017-03-30 13:22:15 +0200 | [diff] [blame] | 1273 | |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 1274 | port_dict = { |
| Pablo Montes Moreno | 3be0b2a | 2017-03-30 13:22:15 +0200 | [diff] [blame] | 1275 | "network_id": net["net_id"], |
| 1276 | "name": net.get("name"), |
| 1277 | "admin_state_up": True |
| 1278 | } |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 1279 | if self.config.get("security_groups") and net.get("port_security") is not False and \ |
| 1280 | not self.config.get("no_port_security_extension"): |
| 1281 | if not self.security_groups_id: |
| 1282 | self._get_ids_from_name() |
| 1283 | port_dict["security_groups"] = self.security_groups_id |
| 1284 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1285 | if net["type"] == "virtual": |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1286 | pass |
| 1287 | # if "vpci" in net: |
| 1288 | # metadata_vpci[ net["net_id"] ] = [[ net["vpci"], "" ]] |
| tierno | 66eba6e | 2017-11-10 17:09:18 +0100 | [diff] [blame] | 1289 | elif net["type"] == "VF" or net["type"] == "SR-IOV": # for VF |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1290 | # if "vpci" in net: |
| 1291 | # if "VF" not in metadata_vpci: |
| 1292 | # metadata_vpci["VF"]=[] |
| 1293 | # metadata_vpci["VF"].append([ net["vpci"], "" ]) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1294 | port_dict["binding:vnic_type"] = "direct" |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1295 | # VIO specific Changes |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1296 | if self.vim_type == "VIO": |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1297 | # Need to create port with port_security_enabled = False and no-security-groups |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1298 | port_dict["port_security_enabled"] = False |
| 1299 | port_dict["provider_security_groups"] = [] |
| 1300 | port_dict["security_groups"] = [] |
| tierno | 66eba6e | 2017-11-10 17:09:18 +0100 | [diff] [blame] | 1301 | else: # For PT PCI-PASSTHROUGH |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1302 | # if "vpci" in net: |
| 1303 | # if "PF" not in metadata_vpci: |
| 1304 | # metadata_vpci["PF"]=[] |
| 1305 | # metadata_vpci["PF"].append([ net["vpci"], "" ]) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1306 | port_dict["binding:vnic_type"] = "direct-physical" |
| Pablo Montes Moreno | 3be0b2a | 2017-03-30 13:22:15 +0200 | [diff] [blame] | 1307 | if not port_dict["name"]: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1308 | port_dict["name"] = name |
| Pablo Montes Moreno | 3be0b2a | 2017-03-30 13:22:15 +0200 | [diff] [blame] | 1309 | if net.get("mac_address"): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1310 | port_dict["mac_address"] = net["mac_address"] |
| tierno | 41a6981 | 2018-02-16 14:34:33 +0100 | [diff] [blame] | 1311 | if net.get("ip_address"): |
| 1312 | port_dict["fixed_ips"] = [{'ip_address': net["ip_address"]}] |
| 1313 | # TODO add 'subnet_id': <subnet_id> |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1314 | new_port = self.neutron.create_port({"port": port_dict}) |
| tierno | 00e3df7 | 2017-11-29 17:20:13 +0100 | [diff] [blame] | 1315 | created_items["port:" + str(new_port["port"]["id"])] = True |
| Pablo Montes Moreno | 3be0b2a | 2017-03-30 13:22:15 +0200 | [diff] [blame] | 1316 | net["mac_adress"] = new_port["port"]["mac_address"] |
| 1317 | net["vim_id"] = new_port["port"]["id"] |
| tierno | b84cbdc | 2017-07-07 14:30:30 +0200 | [diff] [blame] | 1318 | # if try to use a network without subnetwork, it will return a emtpy list |
| 1319 | fixed_ips = new_port["port"].get("fixed_ips") |
| 1320 | if fixed_ips: |
| 1321 | net["ip"] = fixed_ips[0].get("ip_address") |
| 1322 | else: |
| 1323 | net["ip"] = None |
| montesmoreno | 994a29d | 2017-08-22 11:23:06 +0200 | [diff] [blame] | 1324 | |
| 1325 | port = {"port-id": new_port["port"]["id"]} |
| 1326 | if float(self.nova.api_version.get_string()) >= 2.32: |
| 1327 | port["tag"] = new_port["port"]["name"] |
| 1328 | net_list_vim.append(port) |
| Pablo Montes Moreno | 3be0b2a | 2017-03-30 13:22:15 +0200 | [diff] [blame] | 1329 | |
| ahmadsa | f853d45 | 2016-12-22 11:33:47 +0500 | [diff] [blame] | 1330 | if net.get('floating_ip', False): |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1331 | net['exit_on_floating_ip_error'] = True |
| ahmadsa | f853d45 | 2016-12-22 11:33:47 +0500 | [diff] [blame] | 1332 | external_network.append(net) |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1333 | elif net['use'] == 'mgmt' and self.config.get('use_floating_ip'): |
| 1334 | net['exit_on_floating_ip_error'] = False |
| 1335 | external_network.append(net) |
| tierno | 326fd5e | 2018-02-22 11:58:59 +0100 | [diff] [blame] | 1336 | net['floating_ip'] = self.config.get('use_floating_ip') |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1337 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1338 | # If port security is disabled when the port has not yet been attached to the VM, then all vm traffic |
| 1339 | # is dropped. |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1340 | # As a workaround we wait until the VM is active and then disable the port-security |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1341 | if net.get("port_security") is False and not self.config.get("no_port_security_extension"): |
| bravof | 7a1f525 | 2020-10-20 10:27:42 -0300 | [diff] [blame] | 1342 | no_secured_ports.append((new_port["port"]["id"], net.get("port_security_disable_strategy"))) |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1343 | |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1344 | # if metadata_vpci: |
| 1345 | # metadata = {"pci_assignement": json.dumps(metadata_vpci)} |
| 1346 | # if len(metadata["pci_assignement"]) >255: |
| 1347 | # #limit the metadata size |
| 1348 | # #metadata["pci_assignement"] = metadata["pci_assignement"][0:255] |
| 1349 | # self.logger.warn("Metadata deleted since it exceeds the expected length (255) ") |
| 1350 | # metadata = {} |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1351 | |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1352 | self.logger.debug("name '%s' image_id '%s'flavor_id '%s' net_list_vim '%s' description '%s'", |
| 1353 | name, image_id, flavor_id, str(net_list_vim), description) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1354 | |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1355 | # cloud config |
| tierno | 0a1437e | 2017-10-02 00:17:43 +0200 | [diff] [blame] | 1356 | config_drive, userdata = self._create_user_data(cloud_config) |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1357 | |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1358 | # Create additional volumes in case these are present in disk_list |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1359 | base_disk_index = ord('b') |
| tierno | 1df468d | 2018-07-06 14:25:16 +0200 | [diff] [blame] | 1360 | if disk_list: |
| tierno | b84cbdc | 2017-07-07 14:30:30 +0200 | [diff] [blame] | 1361 | block_device_mapping = {} |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1362 | for disk in disk_list: |
| tierno | 1df468d | 2018-07-06 14:25:16 +0200 | [diff] [blame] | 1363 | if disk.get('vim_id'): |
| 1364 | block_device_mapping['_vd' + chr(base_disk_index)] = disk['vim_id'] |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1365 | else: |
| tierno | 1df468d | 2018-07-06 14:25:16 +0200 | [diff] [blame] | 1366 | if 'image_id' in disk: |
| 1367 | volume = self.cinder.volumes.create(size=disk['size'], name=name + '_vd' + |
| 1368 | chr(base_disk_index), imageRef=disk['image_id']) |
| 1369 | else: |
| 1370 | volume = self.cinder.volumes.create(size=disk['size'], name=name + '_vd' + |
| 1371 | chr(base_disk_index)) |
| 1372 | created_items["volume:" + str(volume.id)] = True |
| 1373 | block_device_mapping['_vd' + chr(base_disk_index)] = volume.id |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1374 | base_disk_index += 1 |
| 1375 | |
| tierno | 1df468d | 2018-07-06 14:25:16 +0200 | [diff] [blame] | 1376 | # Wait until created volumes are with status available |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1377 | elapsed_time = 0 |
| tierno | 1df468d | 2018-07-06 14:25:16 +0200 | [diff] [blame] | 1378 | while elapsed_time < volume_timeout: |
| 1379 | for created_item in created_items: |
| 1380 | v, _, volume_id = created_item.partition(":") |
| 1381 | if v == 'volume': |
| 1382 | if self.cinder.volumes.get(volume_id).status != 'available': |
| 1383 | break |
| 1384 | else: # all ready: break from while |
| 1385 | break |
| 1386 | time.sleep(5) |
| 1387 | elapsed_time += 5 |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1388 | # If we exceeded the timeout rollback |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1389 | if elapsed_time >= volume_timeout: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1390 | raise vimconn.VimConnException('Timeout creating volumes for instance ' + name, |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1391 | http_code=vimconn.HTTP_Request_Timeout) |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 1392 | # get availability Zone |
| tierno | 5a3273c | 2017-08-29 11:43:46 +0200 | [diff] [blame] | 1393 | vm_av_zone = self._get_vm_availability_zone(availability_zone_index, availability_zone_list) |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1394 | |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1395 | self.logger.debug("nova.servers.create({}, {}, {}, nics={}, security_groups={}, " |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 1396 | "availability_zone={}, key_name={}, userdata={}, config_drive={}, " |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1397 | "block_device_mapping={})".format(name, image_id, flavor_id, net_list_vim, |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 1398 | self.config.get("security_groups"), vm_av_zone, |
| 1399 | self.config.get('keypair'), userdata, config_drive, |
| 1400 | block_device_mapping)) |
| tierno | b0b9dab | 2017-10-14 14:25:20 +0200 | [diff] [blame] | 1401 | server = self.nova.servers.create(name, image_id, flavor_id, nics=net_list_vim, |
| tierno | a05b65a | 2019-02-01 12:30:27 +0000 | [diff] [blame] | 1402 | security_groups=self.config.get("security_groups"), |
| 1403 | # TODO remove security_groups in future versions. Already at neutron port |
| mirabal | 2935631 | 2017-07-27 12:21:22 +0200 | [diff] [blame] | 1404 | availability_zone=vm_av_zone, |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1405 | key_name=self.config.get('keypair'), |
| 1406 | userdata=userdata, |
| tierno | b84cbdc | 2017-07-07 14:30:30 +0200 | [diff] [blame] | 1407 | config_drive=config_drive, |
| 1408 | block_device_mapping=block_device_mapping |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1409 | ) # , description=description) |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1410 | |
| tierno | 326fd5e | 2018-02-22 11:58:59 +0100 | [diff] [blame] | 1411 | vm_start_time = time.time() |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1412 | # Previously mentioned workaround to wait until the VM is active and then disable the port-security |
| 1413 | if no_secured_ports: |
| 1414 | self.__wait_for_vm(server.id, 'ACTIVE') |
| 1415 | |
| bravof | 7a1f525 | 2020-10-20 10:27:42 -0300 | [diff] [blame] | 1416 | for port in no_secured_ports: |
| 1417 | port_update = { |
| 1418 | "port": { |
| 1419 | "port_security_enabled": False, |
| 1420 | "security_groups": None |
| 1421 | } |
| 1422 | } |
| 1423 | |
| 1424 | if port[1] == "allow-address-pairs": |
| 1425 | port_update = { |
| 1426 | "port": { |
| 1427 | "allowed_address_pairs": [ |
| 1428 | { |
| 1429 | "ip_address": "0.0.0.0/0" |
| 1430 | } |
| 1431 | ] |
| 1432 | } |
| 1433 | } |
| 1434 | |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1435 | try: |
| bravof | 7a1f525 | 2020-10-20 10:27:42 -0300 | [diff] [blame] | 1436 | self.neutron.update_port(port[0], port_update) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1437 | except Exception: |
| bravof | 7a1f525 | 2020-10-20 10:27:42 -0300 | [diff] [blame] | 1438 | raise vimconn.VimConnException( |
| 1439 | "It was not possible to disable port security for port {}" |
| 1440 | .format(port[0]) |
| 1441 | ) |
| 1442 | |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1443 | # print "DONE :-)", server |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1444 | |
| tierno | 4d1ce22 | 2018-04-06 10:41:06 +0200 | [diff] [blame] | 1445 | # pool_id = None |
| ahmadsa | f853d45 | 2016-12-22 11:33:47 +0500 | [diff] [blame] | 1446 | for floating_network in external_network: |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1447 | try: |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1448 | assigned = False |
| tierno | cb66c7e | 2020-07-22 10:42:58 +0000 | [diff] [blame] | 1449 | floating_ip_retries = 3 |
| 1450 | # In case of RO in HA there can be conflicts, two RO trying to assign same floating IP, so retry |
| 1451 | # several times |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1452 | while not assigned: |
| tierno | cb66c7e | 2020-07-22 10:42:58 +0000 | [diff] [blame] | 1453 | floating_ips = self.neutron.list_floatingips().get("floatingips", ()) |
| 1454 | random.shuffle(floating_ips) # randomize |
| 1455 | for fip in floating_ips: |
| 1456 | if fip.get("port_id") or fip.get('tenant_id') != server.tenant_id: |
| tierno | 326fd5e | 2018-02-22 11:58:59 +0100 | [diff] [blame] | 1457 | continue |
| 1458 | if isinstance(floating_network['floating_ip'], str): |
| tierno | cb66c7e | 2020-07-22 10:42:58 +0000 | [diff] [blame] | 1459 | if fip.get("floating_network_id") != floating_network['floating_ip']: |
| tierno | 326fd5e | 2018-02-22 11:58:59 +0100 | [diff] [blame] | 1460 | continue |
| tierno | cb66c7e | 2020-07-22 10:42:58 +0000 | [diff] [blame] | 1461 | free_floating_ip = fip["id"] |
| 1462 | break |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1463 | else: |
| tierno | cb3cca2 | 2018-05-31 15:08:52 +0200 | [diff] [blame] | 1464 | if isinstance(floating_network['floating_ip'], str) and \ |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1465 | floating_network['floating_ip'].lower() != "true": |
| tierno | 326fd5e | 2018-02-22 11:58:59 +0100 | [diff] [blame] | 1466 | pool_id = floating_network['floating_ip'] |
| 1467 | else: |
| tierno | 4d1ce22 | 2018-04-06 10:41:06 +0200 | [diff] [blame] | 1468 | # Find the external network |
| tierno | 326fd5e | 2018-02-22 11:58:59 +0100 | [diff] [blame] | 1469 | external_nets = list() |
| 1470 | for net in self.neutron.list_networks()['networks']: |
| 1471 | if net['router:external']: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1472 | external_nets.append(net) |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1473 | |
| tierno | 326fd5e | 2018-02-22 11:58:59 +0100 | [diff] [blame] | 1474 | if len(external_nets) == 0: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1475 | raise vimconn.VimConnException( |
| 1476 | "Cannot create floating_ip automatically since no external network is present", |
| 1477 | http_code=vimconn.HTTP_Conflict) |
| tierno | 326fd5e | 2018-02-22 11:58:59 +0100 | [diff] [blame] | 1478 | if len(external_nets) > 1: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1479 | raise vimconn.VimConnException( |
| 1480 | "Cannot create floating_ip automatically since multiple external networks are" |
| 1481 | " present", http_code=vimconn.HTTP_Conflict) |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1482 | |
| tierno | 326fd5e | 2018-02-22 11:58:59 +0100 | [diff] [blame] | 1483 | pool_id = external_nets[0].get('id') |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1484 | param = {'floatingip': {'floating_network_id': pool_id, 'tenant_id': server.tenant_id}} |
| ahmadsa | f853d45 | 2016-12-22 11:33:47 +0500 | [diff] [blame] | 1485 | try: |
| tierno | 4d1ce22 | 2018-04-06 10:41:06 +0200 | [diff] [blame] | 1486 | # self.logger.debug("Creating floating IP") |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1487 | new_floating_ip = self.neutron.create_floatingip(param) |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 1488 | free_floating_ip = new_floating_ip['floatingip']['id'] |
| tierno | cb66c7e | 2020-07-22 10:42:58 +0000 | [diff] [blame] | 1489 | created_items["floating_ip:" + str(free_floating_ip)] = True |
| ahmadsa | f853d45 | 2016-12-22 11:33:47 +0500 | [diff] [blame] | 1490 | except Exception as e: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1491 | raise vimconn.VimConnException(type(e).__name__ + ": Cannot create new floating_ip " + |
| tierno | 326fd5e | 2018-02-22 11:58:59 +0100 | [diff] [blame] | 1492 | str(e), http_code=vimconn.HTTP_Conflict) |
| 1493 | |
| tierno | cb66c7e | 2020-07-22 10:42:58 +0000 | [diff] [blame] | 1494 | try: |
| 1495 | # for race condition ensure not already assigned |
| 1496 | fip = self.neutron.show_floatingip(free_floating_ip) |
| 1497 | if fip['floatingip']['port_id']: |
| 1498 | continue |
| 1499 | # the vim_id key contains the neutron.port_id |
| 1500 | self.neutron.update_floatingip(free_floating_ip, |
| 1501 | {"floatingip": {"port_id": floating_network["vim_id"]}}) |
| 1502 | # for race condition ensure not re-assigned to other VM after 5 seconds |
| 1503 | time.sleep(5) |
| 1504 | fip = self.neutron.show_floatingip(free_floating_ip) |
| 1505 | if fip['floatingip']['port_id'] != floating_network["vim_id"]: |
| 1506 | self.logger.error("floating_ip {} re-assigned to other port".format(free_floating_ip)) |
| 1507 | continue |
| 1508 | self.logger.debug("Assigned floating_ip {} to VM {}".format(free_floating_ip, server.id)) |
| 1509 | assigned = True |
| 1510 | except Exception as e: |
| 1511 | # openstack need some time after VM creation to assign an IP. So retry if fails |
| 1512 | vm_status = self.nova.servers.get(server.id).status |
| 1513 | if vm_status not in ('ACTIVE', 'ERROR'): |
| 1514 | if time.time() - vm_start_time < server_timeout: |
| 1515 | time.sleep(5) |
| 1516 | continue |
| 1517 | elif floating_ip_retries > 0: |
| 1518 | floating_ip_retries -= 1 |
| 1519 | continue |
| 1520 | raise vimconn.VimConnException( |
| 1521 | "Cannot create floating_ip: {} {}".format(type(e).__name__, e), |
| 1522 | http_code=vimconn.HTTP_Conflict) |
| tierno | 326fd5e | 2018-02-22 11:58:59 +0100 | [diff] [blame] | 1523 | |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1524 | except Exception as e: |
| 1525 | if not floating_network['exit_on_floating_ip_error']: |
| tierno | cb66c7e | 2020-07-22 10:42:58 +0000 | [diff] [blame] | 1526 | self.logger.error("Cannot create floating_ip. %s", str(e)) |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1527 | continue |
| tierno | f8383b8 | 2017-01-18 15:49:48 +0100 | [diff] [blame] | 1528 | raise |
| montesmoreno | 2a1fc4e | 2017-01-09 16:46:04 +0000 | [diff] [blame] | 1529 | |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1530 | return server.id, created_items |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1531 | # except nvExceptions.NotFound as e: |
| 1532 | # error_value=-vimconn.HTTP_Not_Found |
| 1533 | # error_text= "vm instance %s not found" % vm_id |
| 1534 | # except TypeError as e: |
| 1535 | # raise vimconn.VimConnException(type(e).__name__ + ": "+ str(e), http_code=vimconn.HTTP_Bad_Request) |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1536 | |
| 1537 | except Exception as e: |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1538 | server_id = None |
| 1539 | if server: |
| 1540 | server_id = server.id |
| 1541 | try: |
| 1542 | self.delete_vminstance(server_id, created_items) |
| 1543 | except Exception as e2: |
| 1544 | self.logger.error("new_vminstance rollback fail {}".format(e2)) |
| Pablo Montes Moreno | 6a7785b | 2017-07-03 10:44:30 +0200 | [diff] [blame] | 1545 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1546 | self._format_exception(e) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1547 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1548 | def get_vminstance(self, vm_id): |
| 1549 | """Returns the VM instance information from VIM""" |
| 1550 | # self.logger.debug("Getting VM from VIM") |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1551 | try: |
| 1552 | self._reload_connection() |
| 1553 | server = self.nova.servers.find(id=vm_id) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1554 | # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1555 | return server.to_dict() |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1556 | except (ksExceptions.ClientException, nvExceptions.ClientException, nvExceptions.NotFound, |
| 1557 | ConnectionError) as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1558 | self._format_exception(e) |
| 1559 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1560 | def get_vminstance_console(self, vm_id, console_type="vnc"): |
| 1561 | """ |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1562 | Get a console for the virtual machine |
| 1563 | Params: |
| 1564 | vm_id: uuid of the VM |
| 1565 | console_type, can be: |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 1566 | "novnc" (by default), "xvpvnc" for VNC types, |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1567 | "rdp-html5" for RDP types, "spice-html5" for SPICE types |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1568 | Returns dict with the console parameters: |
| 1569 | protocol: ssh, ftp, http, https, ... |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 1570 | server: usually ip address |
| 1571 | port: the http, ssh, ... port |
| 1572 | suffix: extra text, e.g. the http path and query string |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1573 | """ |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1574 | self.logger.debug("Getting VM CONSOLE from VIM") |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1575 | try: |
| 1576 | self._reload_connection() |
| 1577 | server = self.nova.servers.find(id=vm_id) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1578 | if console_type is None or console_type == "novnc": |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1579 | console_dict = server.get_vnc_console("novnc") |
| 1580 | elif console_type == "xvpvnc": |
| 1581 | console_dict = server.get_vnc_console(console_type) |
| 1582 | elif console_type == "rdp-html5": |
| 1583 | console_dict = server.get_rdp_console(console_type) |
| 1584 | elif console_type == "spice-html5": |
| 1585 | console_dict = server.get_spice_console(console_type) |
| 1586 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1587 | raise vimconn.VimConnException("console type '{}' not allowed".format(console_type), |
| 1588 | http_code=vimconn.HTTP_Bad_Request) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1589 | |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1590 | console_dict1 = console_dict.get("console") |
| 1591 | if console_dict1: |
| 1592 | console_url = console_dict1.get("url") |
| 1593 | if console_url: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1594 | # parse console_url |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1595 | protocol_index = console_url.find("//") |
| 1596 | suffix_index = console_url[protocol_index+2:].find("/") + protocol_index+2 |
| 1597 | port_index = console_url[protocol_index+2:suffix_index].find(":") + protocol_index+2 |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1598 | if protocol_index < 0 or port_index < 0 or suffix_index < 0: |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1599 | return -vimconn.HTTP_Internal_Server_Error, "Unexpected response from VIM" |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1600 | console_dict = {"protocol": console_url[0:protocol_index], |
| 1601 | "server": console_url[protocol_index+2:port_index], |
| 1602 | "port": console_url[port_index:suffix_index], |
| 1603 | "suffix": console_url[suffix_index+1:] |
| 1604 | } |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1605 | protocol_index += 2 |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1606 | return console_dict |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1607 | raise vimconn.VimConnUnexpectedResponse("Unexpected response from VIM") |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1608 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1609 | except (nvExceptions.NotFound, ksExceptions.ClientException, nvExceptions.ClientException, |
| 1610 | nvExceptions.BadRequest, ConnectionError) as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1611 | self._format_exception(e) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1612 | |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1613 | def delete_vminstance(self, vm_id, created_items=None): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1614 | """Removes a VM instance from VIM. Returns the old identifier |
| 1615 | """ |
| 1616 | # print "osconnector: Getting VM from VIM" |
| 1617 | if created_items is None: |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1618 | created_items = {} |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1619 | try: |
| 1620 | self._reload_connection() |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1621 | # delete VM ports attached to this networks before the virtual machine |
| 1622 | for k, v in created_items.items(): |
| 1623 | if not v: # skip already deleted |
| 1624 | continue |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1625 | try: |
| tierno | ad6bdd4 | 2018-01-10 10:43:46 +0100 | [diff] [blame] | 1626 | k_item, _, k_id = k.partition(":") |
| 1627 | if k_item == "port": |
| 1628 | self.neutron.delete_port(k_id) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1629 | except Exception as e: |
| tierno | 00e3df7 | 2017-11-29 17:20:13 +0100 | [diff] [blame] | 1630 | self.logger.error("Error deleting port: {}: {}".format(type(e).__name__, e)) |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1631 | |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1632 | # #commented because detaching the volumes makes the servers.delete not work properly ?!? |
| 1633 | # #dettach volumes attached |
| 1634 | # server = self.nova.servers.get(vm_id) |
| 1635 | # volumes_attached_dict = server._info['os-extended-volumes:volumes_attached'] #volume['id'] |
| 1636 | # #for volume in volumes_attached_dict: |
| 1637 | # # self.cinder.volumes.detach(volume['id']) |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1638 | |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1639 | if vm_id: |
| 1640 | self.nova.servers.delete(vm_id) |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1641 | |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1642 | # delete volumes. Although having detached, they should have in active status before deleting |
| 1643 | # we ensure in this loop |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1644 | keep_waiting = True |
| 1645 | elapsed_time = 0 |
| 1646 | while keep_waiting and elapsed_time < volume_timeout: |
| 1647 | keep_waiting = False |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1648 | for k, v in created_items.items(): |
| 1649 | if not v: # skip already deleted |
| 1650 | continue |
| 1651 | try: |
| tierno | ad6bdd4 | 2018-01-10 10:43:46 +0100 | [diff] [blame] | 1652 | k_item, _, k_id = k.partition(":") |
| 1653 | if k_item == "volume": |
| 1654 | if self.cinder.volumes.get(k_id).status != 'available': |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1655 | keep_waiting = True |
| 1656 | else: |
| tierno | ad6bdd4 | 2018-01-10 10:43:46 +0100 | [diff] [blame] | 1657 | self.cinder.volumes.delete(k_id) |
| tierno | cb66c7e | 2020-07-22 10:42:58 +0000 | [diff] [blame] | 1658 | created_items[k] = None |
| 1659 | elif k_item == "floating_ip": # floating ip |
| 1660 | self.neutron.delete_floatingip(k_id) |
| 1661 | created_items[k] = None |
| 1662 | |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1663 | except Exception as e: |
| tierno | cb66c7e | 2020-07-22 10:42:58 +0000 | [diff] [blame] | 1664 | self.logger.error("Error deleting {}: {}".format(k, e)) |
| montesmoreno | 0c8def0 | 2016-12-22 12:16:23 +0000 | [diff] [blame] | 1665 | if keep_waiting: |
| 1666 | time.sleep(1) |
| 1667 | elapsed_time += 1 |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1668 | return None |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1669 | except (nvExceptions.NotFound, ksExceptions.ClientException, nvExceptions.ClientException, |
| 1670 | ConnectionError) as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1671 | self._format_exception(e) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1672 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1673 | def refresh_vms_status(self, vm_list): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1674 | """Get the status of the virtual machines and their interfaces/ports |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1675 | Params: the list of VM identifiers |
| 1676 | Returns a dictionary with: |
| 1677 | vm_id: #VIM id of this Virtual Machine |
| 1678 | status: #Mandatory. Text with one of: |
| 1679 | # DELETED (not found at vim) |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 1680 | # VIM_ERROR (Cannot connect to VIM, VIM response error, ...) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1681 | # OTHER (Vim reported other status not understood) |
| 1682 | # ERROR (VIM indicates an ERROR status) |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 1683 | # ACTIVE, PAUSED, SUSPENDED, INACTIVE (not running), |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1684 | # CREATING (on building process), ERROR |
| 1685 | # ACTIVE:NoMgmtIP (Active but any of its interface has an IP address |
| 1686 | # |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 1687 | error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1688 | vim_info: #Text with plain information obtained from vim (yaml.safe_dump) |
| 1689 | interfaces: |
| 1690 | - vim_info: #Text with plain information obtained from vim (yaml.safe_dump) |
| 1691 | mac_address: #Text format XX:XX:XX:XX:XX:XX |
| 1692 | vim_net_id: #network id where this interface is connected |
| 1693 | vim_interface_id: #interface/port VIM id |
| 1694 | ip_address: #null, or text with IPv4, IPv6 address |
| tierno | 867ffe9 | 2017-03-27 12:50:34 +0200 | [diff] [blame] | 1695 | compute_node: #identification of compute node where PF,VF interface is allocated |
| 1696 | pci: #PCI address of the NIC that hosts the PF,VF |
| 1697 | vlan: #physical VLAN used for VF |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1698 | """ |
| 1699 | vm_dict = {} |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1700 | self.logger.debug("refresh_vms status: Getting tenant VM instance information from VIM") |
| 1701 | for vm_id in vm_list: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1702 | vm = {} |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1703 | try: |
| 1704 | vm_vim = self.get_vminstance(vm_id) |
| 1705 | if vm_vim['status'] in vmStatus2manoFormat: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1706 | vm['status'] = vmStatus2manoFormat[vm_vim['status']] |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1707 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1708 | vm['status'] = "OTHER" |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1709 | vm['error_msg'] = "VIM status reported " + vm_vim['status'] |
| tierno | 70eeb18 | 2020-10-19 16:38:00 +0000 | [diff] [blame^] | 1710 | vm_vim.pop("OS-EXT-SRV-ATTR:user_data", None) |
| 1711 | vm_vim.pop("user_data", None) |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 1712 | vm['vim_info'] = self.serialize(vm_vim) |
| 1713 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1714 | vm["interfaces"] = [] |
| 1715 | if vm_vim.get('fault'): |
| 1716 | vm['error_msg'] = str(vm_vim['fault']) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1717 | # get interfaces |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1718 | try: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1719 | self._reload_connection() |
| tierno | b42fd9b | 2018-06-20 10:44:32 +0200 | [diff] [blame] | 1720 | port_dict = self.neutron.list_ports(device_id=vm_id) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1721 | for port in port_dict["ports"]: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1722 | interface = {} |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 1723 | interface['vim_info'] = self.serialize(port) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1724 | interface["mac_address"] = port.get("mac_address") |
| 1725 | interface["vim_net_id"] = port["network_id"] |
| 1726 | interface["vim_interface_id"] = port["id"] |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 1727 | # check if OS-EXT-SRV-ATTR:host is there, |
| Mike Marchetti | 5b9da42 | 2017-05-02 15:35:47 -0400 | [diff] [blame] | 1728 | # in case of non-admin credentials, it will be missing |
| 1729 | if vm_vim.get('OS-EXT-SRV-ATTR:host'): |
| 1730 | interface["compute_node"] = vm_vim['OS-EXT-SRV-ATTR:host'] |
| tierno | 867ffe9 | 2017-03-27 12:50:34 +0200 | [diff] [blame] | 1731 | interface["pci"] = None |
| Mike Marchetti | 5b9da42 | 2017-05-02 15:35:47 -0400 | [diff] [blame] | 1732 | |
| Anderson Bravalheri | 0446cd5 | 2018-08-17 15:26:19 +0100 | [diff] [blame] | 1733 | # check if binding:profile is there, |
| Mike Marchetti | 5b9da42 | 2017-05-02 15:35:47 -0400 | [diff] [blame] | 1734 | # in case of non-admin credentials, it will be missing |
| 1735 | if port.get('binding:profile'): |
| 1736 | if port['binding:profile'].get('pci_slot'): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1737 | # TODO: At the moment sr-iov pci addresses are converted to PF pci addresses by setting |
| 1738 | # the slot to 0x00 |
| Mike Marchetti | 5b9da42 | 2017-05-02 15:35:47 -0400 | [diff] [blame] | 1739 | # TODO: This is just a workaround valid for niantinc. Find a better way to do so |
| 1740 | # CHANGE DDDD:BB:SS.F to DDDD:BB:00.(F%2) assuming there are 2 ports per nic |
| 1741 | pci = port['binding:profile']['pci_slot'] |
| 1742 | # interface["pci"] = pci[:-4] + "00." + str(int(pci[-1]) % 2) |
| 1743 | interface["pci"] = pci |
| tierno | 867ffe9 | 2017-03-27 12:50:34 +0200 | [diff] [blame] | 1744 | interface["vlan"] = None |
| tierno | 1dfe993 | 2020-06-18 08:50:10 +0000 | [diff] [blame] | 1745 | if port.get('binding:vif_details'): |
| 1746 | interface["vlan"] = port['binding:vif_details'].get('vlan') |
| 1747 | # Get vlan from network in case not present in port for those old openstacks and cases where |
| 1748 | # it is needed vlan at PT |
| 1749 | if not interface["vlan"]: |
| 1750 | # if network is of type vlan and port is of type direct (sr-iov) then set vlan id |
| 1751 | network = self.neutron.show_network(port["network_id"]) |
| 1752 | if network['network'].get('provider:network_type') == 'vlan': |
| 1753 | # and port.get("binding:vnic_type") in ("direct", "direct-physical"): |
| 1754 | interface["vlan"] = network['network'].get('provider:segmentation_id') |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1755 | ips = [] |
| 1756 | # look for floating ip address |
| tierno | b42fd9b | 2018-06-20 10:44:32 +0200 | [diff] [blame] | 1757 | try: |
| 1758 | floating_ip_dict = self.neutron.list_floatingips(port_id=port["id"]) |
| 1759 | if floating_ip_dict.get("floatingips"): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1760 | ips.append(floating_ip_dict["floatingips"][0].get("floating_ip_address")) |
| tierno | b42fd9b | 2018-06-20 10:44:32 +0200 | [diff] [blame] | 1761 | except Exception: |
| 1762 | pass |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1763 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1764 | for subnet in port["fixed_ips"]: |
| 1765 | ips.append(subnet["ip_address"]) |
| 1766 | interface["ip_address"] = ";".join(ips) |
| 1767 | vm["interfaces"].append(interface) |
| 1768 | except Exception as e: |
| tierno | b42fd9b | 2018-06-20 10:44:32 +0200 | [diff] [blame] | 1769 | self.logger.error("Error getting vm interface information {}: {}".format(type(e).__name__, e), |
| 1770 | exc_info=True) |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1771 | except vimconn.VimConnNotFoundException as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1772 | self.logger.error("Exception getting vm status: %s", str(e)) |
| 1773 | vm['status'] = "DELETED" |
| 1774 | vm['error_msg'] = str(e) |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1775 | except vimconn.VimConnException as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1776 | self.logger.error("Exception getting vm status: %s", str(e)) |
| 1777 | vm['status'] = "VIM_ERROR" |
| 1778 | vm['error_msg'] = str(e) |
| 1779 | vm_dict[vm_id] = vm |
| 1780 | return vm_dict |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1781 | |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1782 | def action_vminstance(self, vm_id, action_dict, created_items={}): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1783 | """Send and action over a VM instance from VIM |
| 1784 | Returns None or the console dict if the action was successfully sent to the VIM""" |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1785 | self.logger.debug("Action over VM '%s': %s", vm_id, str(action_dict)) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1786 | try: |
| 1787 | self._reload_connection() |
| 1788 | server = self.nova.servers.find(id=vm_id) |
| 1789 | if "start" in action_dict: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1790 | if action_dict["start"] == "rebuild": |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1791 | server.rebuild() |
| 1792 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1793 | if server.status == "PAUSED": |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1794 | server.unpause() |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1795 | elif server.status == "SUSPENDED": |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1796 | server.resume() |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1797 | elif server.status == "SHUTOFF": |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1798 | server.start() |
| 1799 | elif "pause" in action_dict: |
| 1800 | server.pause() |
| 1801 | elif "resume" in action_dict: |
| 1802 | server.resume() |
| 1803 | elif "shutoff" in action_dict or "shutdown" in action_dict: |
| 1804 | server.stop() |
| 1805 | elif "forceOff" in action_dict: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1806 | server.stop() # TODO |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1807 | elif "terminate" in action_dict: |
| 1808 | server.delete() |
| 1809 | elif "createImage" in action_dict: |
| 1810 | server.create_image() |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1811 | # "path":path_schema, |
| 1812 | # "description":description_schema, |
| 1813 | # "name":name_schema, |
| 1814 | # "metadata":metadata_schema, |
| 1815 | # "imageRef": id_schema, |
| 1816 | # "disk": {"oneOf":[{"type": "null"}, {"type":"string"}] }, |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1817 | elif "rebuild" in action_dict: |
| 1818 | server.rebuild(server.image['id']) |
| 1819 | elif "reboot" in action_dict: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1820 | server.reboot() # reboot_type='SOFT' |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1821 | elif "console" in action_dict: |
| 1822 | console_type = action_dict["console"] |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1823 | if console_type is None or console_type == "novnc": |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1824 | console_dict = server.get_vnc_console("novnc") |
| 1825 | elif console_type == "xvpvnc": |
| 1826 | console_dict = server.get_vnc_console(console_type) |
| 1827 | elif console_type == "rdp-html5": |
| 1828 | console_dict = server.get_rdp_console(console_type) |
| 1829 | elif console_type == "spice-html5": |
| 1830 | console_dict = server.get_spice_console(console_type) |
| 1831 | else: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1832 | raise vimconn.VimConnException("console type '{}' not allowed".format(console_type), |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1833 | http_code=vimconn.HTTP_Bad_Request) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1834 | try: |
| 1835 | console_url = console_dict["console"]["url"] |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1836 | # parse console_url |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 1837 | protocol_index = console_url.find("//") |
| 1838 | suffix_index = console_url[protocol_index+2:].find("/") + protocol_index+2 |
| 1839 | port_index = console_url[protocol_index+2:suffix_index].find(":") + protocol_index+2 |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1840 | if protocol_index < 0 or port_index < 0 or suffix_index < 0: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1841 | raise vimconn.VimConnException("Unexpected response from VIM " + str(console_dict)) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1842 | console_dict2 = {"protocol": console_url[0:protocol_index], |
| 1843 | "server": console_url[protocol_index+2: port_index], |
| 1844 | "port": int(console_url[port_index+1: suffix_index]), |
| 1845 | "suffix": console_url[suffix_index+1:] |
| 1846 | } |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1847 | return console_dict2 |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1848 | except Exception: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1849 | raise vimconn.VimConnException("Unexpected response from VIM " + str(console_dict)) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1850 | |
| tierno | 98e909c | 2017-10-14 13:27:03 +0200 | [diff] [blame] | 1851 | return None |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1852 | except (ksExceptions.ClientException, nvExceptions.ClientException, nvExceptions.NotFound, |
| 1853 | ConnectionError) as e: |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1854 | self._format_exception(e) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1855 | # TODO insert exception vimconn.HTTP_Unauthorized |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1856 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1857 | # ###### VIO Specific Changes ######### |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 1858 | def _generate_vlanID(self): |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1859 | """ |
| 1860 | Method to get unused vlanID |
| 1861 | Args: |
| 1862 | None |
| 1863 | Returns: |
| 1864 | vlanID |
| 1865 | """ |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1866 | # Get used VLAN IDs |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1867 | usedVlanIDs = [] |
| 1868 | networks = self.get_network_list() |
| 1869 | for net in networks: |
| 1870 | if net.get('provider:segmentation_id'): |
| 1871 | usedVlanIDs.append(net.get('provider:segmentation_id')) |
| 1872 | used_vlanIDs = set(usedVlanIDs) |
| 1873 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1874 | # find unused VLAN ID |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1875 | for vlanID_range in self.config.get('dataplane_net_vlan_range'): |
| 1876 | try: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1877 | start_vlanid, end_vlanid = map(int, vlanID_range.replace(" ", "").split("-")) |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 1878 | for vlanID in range(start_vlanid, end_vlanid + 1): |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1879 | if vlanID not in used_vlanIDs: |
| 1880 | return vlanID |
| 1881 | except Exception as exp: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1882 | raise vimconn.VimConnException("Exception {} occurred while generating VLAN ID.".format(exp)) |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1883 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1884 | raise vimconn.VimConnConflictException( |
| 1885 | "Unable to create the SRIOV VLAN network. All given Vlan IDs {} are in use.".format( |
| 1886 | self.config.get('dataplane_net_vlan_range'))) |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1887 | |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 1888 | def _generate_multisegment_vlanID(self): |
| 1889 | """ |
| 1890 | Method to get unused vlanID |
| 1891 | Args: |
| 1892 | None |
| 1893 | Returns: |
| 1894 | vlanID |
| 1895 | """ |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 1896 | # Get used VLAN IDs |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 1897 | usedVlanIDs = [] |
| 1898 | networks = self.get_network_list() |
| 1899 | for net in networks: |
| 1900 | if net.get('provider:network_type') == "vlan" and net.get('provider:segmentation_id'): |
| 1901 | usedVlanIDs.append(net.get('provider:segmentation_id')) |
| 1902 | elif net.get('segments'): |
| 1903 | for segment in net.get('segments'): |
| 1904 | if segment.get('provider:network_type') == "vlan" and segment.get('provider:segmentation_id'): |
| 1905 | usedVlanIDs.append(segment.get('provider:segmentation_id')) |
| 1906 | used_vlanIDs = set(usedVlanIDs) |
| 1907 | |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 1908 | # find unused VLAN ID |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 1909 | for vlanID_range in self.config.get('multisegment_vlan_range'): |
| 1910 | try: |
| tierno | 6869ae7 | 2020-01-09 17:37:34 +0000 | [diff] [blame] | 1911 | start_vlanid, end_vlanid = map(int, vlanID_range.replace(" ", "").split("-")) |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 1912 | for vlanID in range(start_vlanid, end_vlanid + 1): |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 1913 | if vlanID not in used_vlanIDs: |
| 1914 | return vlanID |
| 1915 | except Exception as exp: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 1916 | raise vimconn.VimConnException("Exception {} occurred while generating VLAN ID.".format(exp)) |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 1917 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1918 | raise vimconn.VimConnConflictException( |
| 1919 | "Unable to create the VLAN segment. All VLAN IDs {} are in use.".format( |
| 1920 | self.config.get('multisegment_vlan_range'))) |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 1921 | |
| 1922 | def _validate_vlan_ranges(self, input_vlan_range, text_vlan_range): |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1923 | """ |
| 1924 | Method to validate user given vlanID ranges |
| 1925 | Args: None |
| 1926 | Returns: None |
| 1927 | """ |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 1928 | for vlanID_range in input_vlan_range: |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1929 | vlan_range = vlanID_range.replace(" ", "") |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1930 | # validate format |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1931 | vlanID_pattern = r'(\d)*-(\d)*$' |
| 1932 | match_obj = re.match(vlanID_pattern, vlan_range) |
| 1933 | if not match_obj: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1934 | raise vimconn.VimConnConflictException( |
| 1935 | "Invalid VLAN range for {}: {}.You must provide '{}' in format [start_ID - end_ID].".format( |
| 1936 | text_vlan_range, vlanID_range, text_vlan_range)) |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1937 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1938 | start_vlanid, end_vlanid = map(int, vlan_range.split("-")) |
| 1939 | if start_vlanid <= 0: |
| 1940 | raise vimconn.VimConnConflictException( |
| 1941 | "Invalid VLAN range for {}: {}. Start ID can not be zero. For VLAN " |
| 1942 | "networks valid IDs are 1 to 4094 ".format(text_vlan_range, vlanID_range)) |
| 1943 | if end_vlanid > 4094: |
| 1944 | raise vimconn.VimConnConflictException( |
| 1945 | "Invalid VLAN range for {}: {}. End VLAN ID can not be greater than 4094. For VLAN " |
| 1946 | "networks valid IDs are 1 to 4094 ".format(text_vlan_range, vlanID_range)) |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1947 | |
| 1948 | if start_vlanid > end_vlanid: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1949 | raise vimconn.VimConnConflictException( |
| 1950 | "Invalid VLAN range for {}: {}. You must provide '{}' in format start_ID - end_ID and " |
| garciadeblas | ebd6672 | 2019-01-31 16:01:31 +0000 | [diff] [blame] | 1951 | "start_ID < end_ID ".format(text_vlan_range, vlanID_range, text_vlan_range)) |
| kate | 721d79b | 2017-06-24 04:21:38 -0700 | [diff] [blame] | 1952 | |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1953 | # NOT USED FUNCTIONS |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1954 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1955 | def new_external_port(self, port_data): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1956 | """Adds a external port to VIM |
| 1957 | Returns the port identifier""" |
| 1958 | # TODO openstack if needed |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1959 | return -vimconn.HTTP_Internal_Server_Error, "osconnector.new_external_port() not implemented" |
| 1960 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1961 | def connect_port_network(self, port_id, network_id, admin=False): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1962 | """Connects a external port to a network |
| 1963 | Returns status code of the VIM response""" |
| 1964 | # TODO openstack if needed |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1965 | return -vimconn.HTTP_Internal_Server_Error, "osconnector.connect_port_network() not implemented" |
| 1966 | |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1967 | def new_user(self, user_name, user_passwd, tenant_id=None): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1968 | """Adds a new user to openstack VIM |
| 1969 | Returns the user identifier""" |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1970 | self.logger.debug("osconnector: Adding a new user to VIM") |
| 1971 | try: |
| 1972 | self._reload_connection() |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1973 | user = self.keystone.users.create(user_name, password=user_passwd, default_project=tenant_id) |
| 1974 | # self.keystone.tenants.add_user(self.k_creds["username"], #role) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1975 | return user.id |
| 1976 | except ksExceptions.ConnectionError as e: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1977 | error_value = -vimconn.HTTP_Bad_Request |
| 1978 | error_text = type(e).__name__ + ": " + (str(e) if len(e.args) == 0 else str(e.args[0])) |
| 1979 | except ksExceptions.ClientException as e: # TODO remove |
| 1980 | error_value = -vimconn.HTTP_Bad_Request |
| 1981 | error_text = type(e).__name__ + ": " + (str(e) if len(e.args) == 0 else str(e.args[0])) |
| 1982 | # TODO insert exception vimconn.HTTP_Unauthorized |
| 1983 | # if reaching here is because an exception |
| tierno | 9c5c832 | 2018-03-23 15:44:03 +0100 | [diff] [blame] | 1984 | self.logger.debug("new_user " + error_text) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1985 | return error_value, error_text |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1986 | |
| 1987 | def delete_user(self, user_id): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1988 | """Delete a user from openstack VIM |
| 1989 | Returns the user identifier""" |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1990 | if self.debug: |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 1991 | print("osconnector: Deleting a user from VIM") |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1992 | try: |
| 1993 | self._reload_connection() |
| 1994 | self.keystone.users.delete(user_id) |
| 1995 | return 1, user_id |
| 1996 | except ksExceptions.ConnectionError as e: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 1997 | error_value = -vimconn.HTTP_Bad_Request |
| 1998 | error_text = type(e).__name__ + ": " + (str(e) if len(e.args) == 0 else str(e.args[0])) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 1999 | except ksExceptions.NotFound as e: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2000 | error_value = -vimconn.HTTP_Not_Found |
| 2001 | error_text = type(e).__name__ + ": " + (str(e) if len(e.args) == 0 else str(e.args[0])) |
| 2002 | except ksExceptions.ClientException as e: # TODO remove |
| 2003 | error_value = -vimconn.HTTP_Bad_Request |
| 2004 | error_text = type(e).__name__ + ": " + (str(e) if len(e.args) == 0 else str(e.args[0])) |
| 2005 | # TODO insert exception vimconn.HTTP_Unauthorized |
| 2006 | # if reaching here is because an exception |
| 2007 | self.logger.debug("delete_tenant " + error_text) |
| tierno | ae4a8d1 | 2016-07-08 12:30:39 +0200 | [diff] [blame] | 2008 | return error_value, error_text |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2009 | |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2010 | def get_hosts_info(self): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2011 | """Get the information of deployed hosts |
| 2012 | Returns the hosts content""" |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2013 | if self.debug: |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2014 | print("osconnector: Getting Host info from VIM") |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2015 | try: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2016 | h_list = [] |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2017 | self._reload_connection() |
| 2018 | hypervisors = self.nova.hypervisors.list() |
| 2019 | for hype in hypervisors: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2020 | h_list.append(hype.to_dict()) |
| 2021 | return 1, {"hosts": h_list} |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2022 | except nvExceptions.NotFound as e: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2023 | error_value = -vimconn.HTTP_Not_Found |
| 2024 | error_text = (str(e) if len(e.args) == 0 else str(e.args[0])) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2025 | except (ksExceptions.ClientException, nvExceptions.ClientException) as e: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2026 | error_value = -vimconn.HTTP_Bad_Request |
| 2027 | error_text = type(e).__name__ + ": " + (str(e) if len(e.args) == 0 else str(e.args[0])) |
| 2028 | # TODO insert exception vimconn.HTTP_Unauthorized |
| 2029 | # if reaching here is because an exception |
| tierno | 9c5c832 | 2018-03-23 15:44:03 +0100 | [diff] [blame] | 2030 | self.logger.debug("get_hosts_info " + error_text) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2031 | return error_value, error_text |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2032 | |
| 2033 | def get_hosts(self, vim_tenant): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2034 | """Get the hosts and deployed instances |
| 2035 | Returns the hosts content""" |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2036 | r, hype_dict = self.get_hosts_info() |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2037 | if r < 0: |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2038 | return r, hype_dict |
| 2039 | hypervisors = hype_dict["hosts"] |
| 2040 | try: |
| 2041 | servers = self.nova.servers.list() |
| 2042 | for hype in hypervisors: |
| 2043 | for server in servers: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2044 | if server.to_dict()['OS-EXT-SRV-ATTR:hypervisor_hostname'] == hype['hypervisor_hostname']: |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2045 | if 'vm' in hype: |
| 2046 | hype['vm'].append(server.id) |
| 2047 | else: |
| 2048 | hype['vm'] = [server.id] |
| 2049 | return 1, hype_dict |
| 2050 | except nvExceptions.NotFound as e: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2051 | error_value = -vimconn.HTTP_Not_Found |
| 2052 | error_text = (str(e) if len(e.args) == 0 else str(e.args[0])) |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2053 | except (ksExceptions.ClientException, nvExceptions.ClientException) as e: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2054 | error_value = -vimconn.HTTP_Bad_Request |
| 2055 | error_text = type(e).__name__ + ": " + (str(e) if len(e.args) == 0 else str(e.args[0])) |
| 2056 | # TODO insert exception vimconn.HTTP_Unauthorized |
| 2057 | # if reaching here is because an exception |
| tierno | 9c5c832 | 2018-03-23 15:44:03 +0100 | [diff] [blame] | 2058 | self.logger.debug("get_hosts " + error_text) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2059 | return error_value, error_text |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2060 | |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2061 | def new_classification(self, name, ctype, definition): |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 2062 | self.logger.debug('Adding a new (Traffic) Classification to VIM, named %s', name) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2063 | try: |
| 2064 | new_class = None |
| 2065 | self._reload_connection() |
| 2066 | if ctype not in supportedClassificationTypes: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2067 | raise vimconn.VimConnNotSupportedException( |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2068 | 'OpenStack VIM connector does not support provided Classification Type {}, supported ones are: ' |
| 2069 | '{}'.format(ctype, supportedClassificationTypes)) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2070 | if not self._validate_classification(ctype, definition): |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2071 | raise vimconn.VimConnException( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2072 | 'Incorrect Classification definition ' |
| 2073 | 'for the type specified.') |
| 2074 | classification_dict = definition |
| 2075 | classification_dict['name'] = name |
| tierno | 7edb675 | 2016-03-21 17:37:52 +0100 | [diff] [blame] | 2076 | |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2077 | new_class = self.neutron.create_sfc_flow_classifier( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2078 | {'flow_classifier': classification_dict}) |
| 2079 | return new_class['flow_classifier']['id'] |
| 2080 | except (neExceptions.ConnectionFailed, ksExceptions.ClientException, |
| 2081 | neExceptions.NeutronException, ConnectionError) as e: |
| 2082 | self.logger.error( |
| 2083 | 'Creation of Classification failed.') |
| 2084 | self._format_exception(e) |
| 2085 | |
| 2086 | def get_classification(self, class_id): |
| 2087 | self.logger.debug(" Getting Classification %s from VIM", class_id) |
| 2088 | filter_dict = {"id": class_id} |
| 2089 | class_list = self.get_classification_list(filter_dict) |
| 2090 | if len(class_list) == 0: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2091 | raise vimconn.VimConnNotFoundException( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2092 | "Classification '{}' not found".format(class_id)) |
| 2093 | elif len(class_list) > 1: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2094 | raise vimconn.VimConnConflictException( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2095 | "Found more than one Classification with this criteria") |
| 2096 | classification = class_list[0] |
| 2097 | return classification |
| 2098 | |
| 2099 | def get_classification_list(self, filter_dict={}): |
| 2100 | self.logger.debug("Getting Classifications from VIM filter: '%s'", |
| 2101 | str(filter_dict)) |
| 2102 | try: |
| tierno | 69b590e | 2018-03-13 18:52:23 +0100 | [diff] [blame] | 2103 | filter_dict_os = filter_dict.copy() |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2104 | self._reload_connection() |
| tierno | 69b590e | 2018-03-13 18:52:23 +0100 | [diff] [blame] | 2105 | if self.api_version3 and "tenant_id" in filter_dict_os: |
| 2106 | filter_dict_os['project_id'] = filter_dict_os.pop('tenant_id') |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2107 | classification_dict = self.neutron.list_sfc_flow_classifiers( |
| tierno | 69b590e | 2018-03-13 18:52:23 +0100 | [diff] [blame] | 2108 | **filter_dict_os) |
| 2109 | classification_list = classification_dict["flow_classifiers"] |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2110 | self.__classification_os2mano(classification_list) |
| 2111 | return classification_list |
| 2112 | except (neExceptions.ConnectionFailed, ksExceptions.ClientException, |
| 2113 | neExceptions.NeutronException, ConnectionError) as e: |
| 2114 | self._format_exception(e) |
| 2115 | |
| 2116 | def delete_classification(self, class_id): |
| 2117 | self.logger.debug("Deleting Classification '%s' from VIM", class_id) |
| 2118 | try: |
| 2119 | self._reload_connection() |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2120 | self.neutron.delete_sfc_flow_classifier(class_id) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2121 | return class_id |
| 2122 | except (neExceptions.ConnectionFailed, neExceptions.NeutronException, |
| 2123 | ksExceptions.ClientException, neExceptions.NeutronException, |
| 2124 | ConnectionError) as e: |
| 2125 | self._format_exception(e) |
| 2126 | |
| 2127 | def new_sfi(self, name, ingress_ports, egress_ports, sfc_encap=True): |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 2128 | self.logger.debug("Adding a new Service Function Instance to VIM, named '%s'", name) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2129 | try: |
| 2130 | new_sfi = None |
| 2131 | self._reload_connection() |
| 2132 | correlation = None |
| 2133 | if sfc_encap: |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2134 | correlation = 'nsh' |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2135 | if len(ingress_ports) != 1: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2136 | raise vimconn.VimConnNotSupportedException( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2137 | "OpenStack VIM connector can only have " |
| 2138 | "1 ingress port per SFI") |
| 2139 | if len(egress_ports) != 1: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2140 | raise vimconn.VimConnNotSupportedException( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2141 | "OpenStack VIM connector can only have " |
| 2142 | "1 egress port per SFI") |
| 2143 | sfi_dict = {'name': name, |
| 2144 | 'ingress': ingress_ports[0], |
| 2145 | 'egress': egress_ports[0], |
| 2146 | 'service_function_parameters': { |
| 2147 | 'correlation': correlation}} |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2148 | new_sfi = self.neutron.create_sfc_port_pair({'port_pair': sfi_dict}) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2149 | return new_sfi['port_pair']['id'] |
| 2150 | except (neExceptions.ConnectionFailed, ksExceptions.ClientException, |
| 2151 | neExceptions.NeutronException, ConnectionError) as e: |
| 2152 | if new_sfi: |
| 2153 | try: |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2154 | self.neutron.delete_sfc_port_pair( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2155 | new_sfi['port_pair']['id']) |
| 2156 | except Exception: |
| 2157 | self.logger.error( |
| 2158 | 'Creation of Service Function Instance failed, with ' |
| 2159 | 'subsequent deletion failure as well.') |
| 2160 | self._format_exception(e) |
| 2161 | |
| 2162 | def get_sfi(self, sfi_id): |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 2163 | self.logger.debug('Getting Service Function Instance %s from VIM', sfi_id) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2164 | filter_dict = {"id": sfi_id} |
| 2165 | sfi_list = self.get_sfi_list(filter_dict) |
| 2166 | if len(sfi_list) == 0: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2167 | raise vimconn.VimConnNotFoundException("Service Function Instance '{}' not found".format(sfi_id)) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2168 | elif len(sfi_list) > 1: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2169 | raise vimconn.VimConnConflictException( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2170 | 'Found more than one Service Function Instance ' |
| 2171 | 'with this criteria') |
| 2172 | sfi = sfi_list[0] |
| 2173 | return sfi |
| 2174 | |
| 2175 | def get_sfi_list(self, filter_dict={}): |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 2176 | self.logger.debug("Getting Service Function Instances from VIM filter: '%s'", str(filter_dict)) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2177 | try: |
| 2178 | self._reload_connection() |
| tierno | 69b590e | 2018-03-13 18:52:23 +0100 | [diff] [blame] | 2179 | filter_dict_os = filter_dict.copy() |
| 2180 | if self.api_version3 and "tenant_id" in filter_dict_os: |
| 2181 | filter_dict_os['project_id'] = filter_dict_os.pop('tenant_id') |
| 2182 | sfi_dict = self.neutron.list_sfc_port_pairs(**filter_dict_os) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2183 | sfi_list = sfi_dict["port_pairs"] |
| 2184 | self.__sfi_os2mano(sfi_list) |
| 2185 | return sfi_list |
| 2186 | except (neExceptions.ConnectionFailed, ksExceptions.ClientException, |
| 2187 | neExceptions.NeutronException, ConnectionError) as e: |
| 2188 | self._format_exception(e) |
| 2189 | |
| 2190 | def delete_sfi(self, sfi_id): |
| 2191 | self.logger.debug("Deleting Service Function Instance '%s' " |
| 2192 | "from VIM", sfi_id) |
| 2193 | try: |
| 2194 | self._reload_connection() |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2195 | self.neutron.delete_sfc_port_pair(sfi_id) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2196 | return sfi_id |
| 2197 | except (neExceptions.ConnectionFailed, neExceptions.NeutronException, |
| 2198 | ksExceptions.ClientException, neExceptions.NeutronException, |
| 2199 | ConnectionError) as e: |
| 2200 | self._format_exception(e) |
| 2201 | |
| 2202 | def new_sf(self, name, sfis, sfc_encap=True): |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 2203 | self.logger.debug("Adding a new Service Function to VIM, named '%s'", name) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2204 | try: |
| 2205 | new_sf = None |
| 2206 | self._reload_connection() |
| tierno | 9c5c832 | 2018-03-23 15:44:03 +0100 | [diff] [blame] | 2207 | # correlation = None |
| 2208 | # if sfc_encap: |
| 2209 | # correlation = 'nsh' |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2210 | for instance in sfis: |
| 2211 | sfi = self.get_sfi(instance) |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2212 | if sfi.get('sfc_encap') != sfc_encap: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2213 | raise vimconn.VimConnNotSupportedException( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2214 | "OpenStack VIM connector requires all SFIs of the " |
| 2215 | "same SF to share the same SFC Encapsulation") |
| 2216 | sf_dict = {'name': name, |
| 2217 | 'port_pairs': sfis} |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2218 | new_sf = self.neutron.create_sfc_port_pair_group({ |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2219 | 'port_pair_group': sf_dict}) |
| 2220 | return new_sf['port_pair_group']['id'] |
| 2221 | except (neExceptions.ConnectionFailed, ksExceptions.ClientException, |
| 2222 | neExceptions.NeutronException, ConnectionError) as e: |
| 2223 | if new_sf: |
| 2224 | try: |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2225 | self.neutron.delete_sfc_port_pair_group( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2226 | new_sf['port_pair_group']['id']) |
| 2227 | except Exception: |
| 2228 | self.logger.error( |
| 2229 | 'Creation of Service Function failed, with ' |
| 2230 | 'subsequent deletion failure as well.') |
| 2231 | self._format_exception(e) |
| 2232 | |
| 2233 | def get_sf(self, sf_id): |
| 2234 | self.logger.debug("Getting Service Function %s from VIM", sf_id) |
| 2235 | filter_dict = {"id": sf_id} |
| 2236 | sf_list = self.get_sf_list(filter_dict) |
| 2237 | if len(sf_list) == 0: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2238 | raise vimconn.VimConnNotFoundException( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2239 | "Service Function '{}' not found".format(sf_id)) |
| 2240 | elif len(sf_list) > 1: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2241 | raise vimconn.VimConnConflictException( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2242 | "Found more than one Service Function with this criteria") |
| 2243 | sf = sf_list[0] |
| 2244 | return sf |
| 2245 | |
| 2246 | def get_sf_list(self, filter_dict={}): |
| 2247 | self.logger.debug("Getting Service Function from VIM filter: '%s'", |
| 2248 | str(filter_dict)) |
| 2249 | try: |
| 2250 | self._reload_connection() |
| tierno | 69b590e | 2018-03-13 18:52:23 +0100 | [diff] [blame] | 2251 | filter_dict_os = filter_dict.copy() |
| 2252 | if self.api_version3 and "tenant_id" in filter_dict_os: |
| 2253 | filter_dict_os['project_id'] = filter_dict_os.pop('tenant_id') |
| 2254 | sf_dict = self.neutron.list_sfc_port_pair_groups(**filter_dict_os) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2255 | sf_list = sf_dict["port_pair_groups"] |
| 2256 | self.__sf_os2mano(sf_list) |
| 2257 | return sf_list |
| 2258 | except (neExceptions.ConnectionFailed, ksExceptions.ClientException, |
| 2259 | neExceptions.NeutronException, ConnectionError) as e: |
| 2260 | self._format_exception(e) |
| 2261 | |
| 2262 | def delete_sf(self, sf_id): |
| 2263 | self.logger.debug("Deleting Service Function '%s' from VIM", sf_id) |
| 2264 | try: |
| 2265 | self._reload_connection() |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2266 | self.neutron.delete_sfc_port_pair_group(sf_id) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2267 | return sf_id |
| 2268 | except (neExceptions.ConnectionFailed, neExceptions.NeutronException, |
| 2269 | ksExceptions.ClientException, neExceptions.NeutronException, |
| 2270 | ConnectionError) as e: |
| 2271 | self._format_exception(e) |
| 2272 | |
| 2273 | def new_sfp(self, name, classifications, sfs, sfc_encap=True, spi=None): |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 2274 | self.logger.debug("Adding a new Service Function Path to VIM, named '%s'", name) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2275 | try: |
| 2276 | new_sfp = None |
| 2277 | self._reload_connection() |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2278 | # In networking-sfc the MPLS encapsulation is legacy |
| 2279 | # should be used when no full SFC Encapsulation is intended |
| schillinge | 981df9a | 2019-01-24 09:25:11 +0100 | [diff] [blame] | 2280 | correlation = 'mpls' |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2281 | if sfc_encap: |
| 2282 | correlation = 'nsh' |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2283 | sfp_dict = {'name': name, |
| 2284 | 'flow_classifiers': classifications, |
| 2285 | 'port_pair_groups': sfs, |
| 2286 | 'chain_parameters': {'correlation': correlation}} |
| 2287 | if spi: |
| 2288 | sfp_dict['chain_id'] = spi |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2289 | new_sfp = self.neutron.create_sfc_port_chain({'port_chain': sfp_dict}) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2290 | return new_sfp["port_chain"]["id"] |
| 2291 | except (neExceptions.ConnectionFailed, ksExceptions.ClientException, |
| 2292 | neExceptions.NeutronException, ConnectionError) as e: |
| 2293 | if new_sfp: |
| 2294 | try: |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2295 | self.neutron.delete_sfc_port_chain(new_sfp['port_chain']['id']) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2296 | except Exception: |
| 2297 | self.logger.error( |
| 2298 | 'Creation of Service Function Path failed, with ' |
| 2299 | 'subsequent deletion failure as well.') |
| 2300 | self._format_exception(e) |
| 2301 | |
| 2302 | def get_sfp(self, sfp_id): |
| 2303 | self.logger.debug(" Getting Service Function Path %s from VIM", sfp_id) |
| 2304 | filter_dict = {"id": sfp_id} |
| 2305 | sfp_list = self.get_sfp_list(filter_dict) |
| 2306 | if len(sfp_list) == 0: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2307 | raise vimconn.VimConnNotFoundException( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2308 | "Service Function Path '{}' not found".format(sfp_id)) |
| 2309 | elif len(sfp_list) > 1: |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2310 | raise vimconn.VimConnConflictException( |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2311 | "Found more than one Service Function Path with this criteria") |
| 2312 | sfp = sfp_list[0] |
| 2313 | return sfp |
| 2314 | |
| 2315 | def get_sfp_list(self, filter_dict={}): |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 2316 | self.logger.debug("Getting Service Function Paths from VIM filter: '%s'", str(filter_dict)) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2317 | try: |
| 2318 | self._reload_connection() |
| tierno | 69b590e | 2018-03-13 18:52:23 +0100 | [diff] [blame] | 2319 | filter_dict_os = filter_dict.copy() |
| 2320 | if self.api_version3 and "tenant_id" in filter_dict_os: |
| 2321 | filter_dict_os['project_id'] = filter_dict_os.pop('tenant_id') |
| 2322 | sfp_dict = self.neutron.list_sfc_port_chains(**filter_dict_os) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2323 | sfp_list = sfp_dict["port_chains"] |
| 2324 | self.__sfp_os2mano(sfp_list) |
| 2325 | return sfp_list |
| 2326 | except (neExceptions.ConnectionFailed, ksExceptions.ClientException, |
| 2327 | neExceptions.NeutronException, ConnectionError) as e: |
| 2328 | self._format_exception(e) |
| 2329 | |
| 2330 | def delete_sfp(self, sfp_id): |
| tierno | 7d782ef | 2019-10-04 12:56:31 +0000 | [diff] [blame] | 2331 | self.logger.debug("Deleting Service Function Path '%s' from VIM", sfp_id) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2332 | try: |
| 2333 | self._reload_connection() |
| Igor D.C | caadc44 | 2017-11-06 12:48:48 +0000 | [diff] [blame] | 2334 | self.neutron.delete_sfc_port_chain(sfp_id) |
| Igor Duarte Cardoso | 3cf9bcd | 2017-08-14 16:39:34 +0000 | [diff] [blame] | 2335 | return sfp_id |
| 2336 | except (neExceptions.ConnectionFailed, neExceptions.NeutronException, |
| 2337 | ksExceptions.ClientException, neExceptions.NeutronException, |
| 2338 | ConnectionError) as e: |
| 2339 | self._format_exception(e) |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2340 | |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2341 | def refresh_sfps_status(self, sfp_list): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2342 | """Get the status of the service function path |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2343 | Params: the list of sfp identifiers |
| 2344 | Returns a dictionary with: |
| 2345 | vm_id: #VIM id of this service function path |
| 2346 | status: #Mandatory. Text with one of: |
| 2347 | # DELETED (not found at vim) |
| 2348 | # VIM_ERROR (Cannot connect to VIM, VIM response error, ...) |
| 2349 | # OTHER (Vim reported other status not understood) |
| 2350 | # ERROR (VIM indicates an ERROR status) |
| 2351 | # ACTIVE, |
| 2352 | # CREATING (on building process) |
| 2353 | error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR |
| 2354 | vim_info: #Text with plain information obtained from vim (yaml.safe_dump)F |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2355 | """ |
| 2356 | sfp_dict = {} |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2357 | self.logger.debug("refresh_sfps status: Getting tenant SFP information from VIM") |
| 2358 | for sfp_id in sfp_list: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2359 | sfp = {} |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2360 | try: |
| 2361 | sfp_vim = self.get_sfp(sfp_id) |
| 2362 | if sfp_vim['spi']: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2363 | sfp['status'] = vmStatus2manoFormat['ACTIVE'] |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2364 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2365 | sfp['status'] = "OTHER" |
| 2366 | sfp['error_msg'] = "VIM status reported " + sfp['status'] |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2367 | |
| 2368 | sfp['vim_info'] = self.serialize(sfp_vim) |
| 2369 | |
| 2370 | if sfp_vim.get('fault'): |
| 2371 | sfp['error_msg'] = str(sfp_vim['fault']) |
| 2372 | |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2373 | except vimconn.VimConnNotFoundException as e: |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2374 | self.logger.error("Exception getting sfp status: %s", str(e)) |
| 2375 | sfp['status'] = "DELETED" |
| 2376 | sfp['error_msg'] = str(e) |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2377 | except vimconn.VimConnException as e: |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2378 | self.logger.error("Exception getting sfp status: %s", str(e)) |
| 2379 | sfp['status'] = "VIM_ERROR" |
| 2380 | sfp['error_msg'] = str(e) |
| 2381 | sfp_dict[sfp_id] = sfp |
| 2382 | return sfp_dict |
| 2383 | |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2384 | def refresh_sfis_status(self, sfi_list): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2385 | """Get the status of the service function instances |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2386 | Params: the list of sfi identifiers |
| 2387 | Returns a dictionary with: |
| 2388 | vm_id: #VIM id of this service function instance |
| 2389 | status: #Mandatory. Text with one of: |
| 2390 | # DELETED (not found at vim) |
| 2391 | # VIM_ERROR (Cannot connect to VIM, VIM response error, ...) |
| 2392 | # OTHER (Vim reported other status not understood) |
| 2393 | # ERROR (VIM indicates an ERROR status) |
| 2394 | # ACTIVE, |
| 2395 | # CREATING (on building process) |
| 2396 | error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR |
| 2397 | vim_info: #Text with plain information obtained from vim (yaml.safe_dump) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2398 | """ |
| 2399 | sfi_dict = {} |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2400 | self.logger.debug("refresh_sfis status: Getting tenant sfi information from VIM") |
| 2401 | for sfi_id in sfi_list: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2402 | sfi = {} |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2403 | try: |
| 2404 | sfi_vim = self.get_sfi(sfi_id) |
| 2405 | if sfi_vim: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2406 | sfi['status'] = vmStatus2manoFormat['ACTIVE'] |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2407 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2408 | sfi['status'] = "OTHER" |
| 2409 | sfi['error_msg'] = "VIM status reported " + sfi['status'] |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2410 | |
| 2411 | sfi['vim_info'] = self.serialize(sfi_vim) |
| 2412 | |
| 2413 | if sfi_vim.get('fault'): |
| 2414 | sfi['error_msg'] = str(sfi_vim['fault']) |
| 2415 | |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2416 | except vimconn.VimConnNotFoundException as e: |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2417 | self.logger.error("Exception getting sfi status: %s", str(e)) |
| 2418 | sfi['status'] = "DELETED" |
| 2419 | sfi['error_msg'] = str(e) |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2420 | except vimconn.VimConnException as e: |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2421 | self.logger.error("Exception getting sfi status: %s", str(e)) |
| 2422 | sfi['status'] = "VIM_ERROR" |
| 2423 | sfi['error_msg'] = str(e) |
| 2424 | sfi_dict[sfi_id] = sfi |
| 2425 | return sfi_dict |
| 2426 | |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2427 | def refresh_sfs_status(self, sf_list): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2428 | """Get the status of the service functions |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2429 | Params: the list of sf identifiers |
| 2430 | Returns a dictionary with: |
| 2431 | vm_id: #VIM id of this service function |
| 2432 | status: #Mandatory. Text with one of: |
| 2433 | # DELETED (not found at vim) |
| 2434 | # VIM_ERROR (Cannot connect to VIM, VIM response error, ...) |
| 2435 | # OTHER (Vim reported other status not understood) |
| 2436 | # ERROR (VIM indicates an ERROR status) |
| 2437 | # ACTIVE, |
| 2438 | # CREATING (on building process) |
| 2439 | error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR |
| 2440 | vim_info: #Text with plain information obtained from vim (yaml.safe_dump) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2441 | """ |
| 2442 | sf_dict = {} |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2443 | self.logger.debug("refresh_sfs status: Getting tenant sf information from VIM") |
| 2444 | for sf_id in sf_list: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2445 | sf = {} |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2446 | try: |
| 2447 | sf_vim = self.get_sf(sf_id) |
| 2448 | if sf_vim: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2449 | sf['status'] = vmStatus2manoFormat['ACTIVE'] |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2450 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2451 | sf['status'] = "OTHER" |
| 2452 | sf['error_msg'] = "VIM status reported " + sf_vim['status'] |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2453 | |
| 2454 | sf['vim_info'] = self.serialize(sf_vim) |
| 2455 | |
| 2456 | if sf_vim.get('fault'): |
| 2457 | sf['error_msg'] = str(sf_vim['fault']) |
| 2458 | |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2459 | except vimconn.VimConnNotFoundException as e: |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2460 | self.logger.error("Exception getting sf status: %s", str(e)) |
| 2461 | sf['status'] = "DELETED" |
| 2462 | sf['error_msg'] = str(e) |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2463 | except vimconn.VimConnException as e: |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2464 | self.logger.error("Exception getting sf status: %s", str(e)) |
| 2465 | sf['status'] = "VIM_ERROR" |
| 2466 | sf['error_msg'] = str(e) |
| 2467 | sf_dict[sf_id] = sf |
| 2468 | return sf_dict |
| 2469 | |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2470 | def refresh_classifications_status(self, classification_list): |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2471 | """Get the status of the classifications |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2472 | Params: the list of classification identifiers |
| 2473 | Returns a dictionary with: |
| 2474 | vm_id: #VIM id of this classifier |
| 2475 | status: #Mandatory. Text with one of: |
| 2476 | # DELETED (not found at vim) |
| 2477 | # VIM_ERROR (Cannot connect to VIM, VIM response error, ...) |
| 2478 | # OTHER (Vim reported other status not understood) |
| 2479 | # ERROR (VIM indicates an ERROR status) |
| 2480 | # ACTIVE, |
| 2481 | # CREATING (on building process) |
| 2482 | error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR |
| 2483 | vim_info: #Text with plain information obtained from vim (yaml.safe_dump) |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2484 | """ |
| 2485 | classification_dict = {} |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2486 | self.logger.debug("refresh_classifications status: Getting tenant classification information from VIM") |
| 2487 | for classification_id in classification_list: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2488 | classification = {} |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2489 | try: |
| 2490 | classification_vim = self.get_classification(classification_id) |
| 2491 | if classification_vim: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2492 | classification['status'] = vmStatus2manoFormat['ACTIVE'] |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2493 | else: |
| tierno | 1ec592d | 2020-06-16 15:29:47 +0000 | [diff] [blame] | 2494 | classification['status'] = "OTHER" |
| 2495 | classification['error_msg'] = "VIM status reported " + classification['status'] |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2496 | |
| 2497 | classification['vim_info'] = self.serialize(classification_vim) |
| 2498 | |
| 2499 | if classification_vim.get('fault'): |
| 2500 | classification['error_msg'] = str(classification_vim['fault']) |
| 2501 | |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2502 | except vimconn.VimConnNotFoundException as e: |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2503 | self.logger.error("Exception getting classification status: %s", str(e)) |
| 2504 | classification['status'] = "DELETED" |
| 2505 | classification['error_msg'] = str(e) |
| tierno | 7277486 | 2020-05-04 11:44:15 +0000 | [diff] [blame] | 2506 | except vimconn.VimConnException as e: |
| borsatti | 8a2dda3 | 2019-12-18 15:08:57 +0000 | [diff] [blame] | 2507 | self.logger.error("Exception getting classification status: %s", str(e)) |
| 2508 | classification['status'] = "VIM_ERROR" |
| 2509 | classification['error_msg'] = str(e) |
| 2510 | classification_dict[classification_id] = classification |
| 2511 | return classification_dict |