blob: eda56990b459ea33708e6553c6cb6c2cbcc2a613 [file] [log] [blame]
tierno7edb6752016-03-21 17:37:52 +01001# -*- coding: utf-8 -*-
2
3##
tierno92021022018-09-12 16:29:23 +02004# Copyright 2015 Telefonica Investigacion y Desarrollo, S.A.U.
tierno7edb6752016-03-21 17:37:52 +01005# This file is part of openmano
6# All Rights Reserved.
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License. You may obtain
10# a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
17# License for the specific language governing permissions and limitations
18# under the License.
tierno7edb6752016-03-21 17:37:52 +010019##
20
tierno1ec592d2020-06-16 15:29:47 +000021"""
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +000022osconnector implements all the methods to interact with openstack using the python-neutronclient.
23
24For the VNF forwarding graph, The OpenStack VIM connector calls the
25networking-sfc Neutron extension methods, whose resources are mapped
26to the VIM connector's SFC resources as follows:
27- Classification (OSM) -> Flow Classifier (Neutron)
28- Service Function Instance (OSM) -> Port Pair (Neutron)
29- Service Function (OSM) -> Port Pair Group (Neutron)
30- Service Function Path (OSM) -> Port Chain (Neutron)
tierno1ec592d2020-06-16 15:29:47 +000031"""
tierno7edb6752016-03-21 17:37:52 +010032
sousaedu049cbb12022-01-05 11:39:35 +000033import copy
34from http.client import HTTPException
elumalai8658c2c2022-04-28 19:09:31 +053035import json
tiernoae4a8d12016-07-08 12:30:39 +020036import logging
sousaedu049cbb12022-01-05 11:39:35 +000037from pprint import pformat
garciadeblas2299e3b2017-01-26 14:35:55 +000038import random
kate721d79b2017-06-24 04:21:38 -070039import re
sousaedu049cbb12022-01-05 11:39:35 +000040import time
41
42from cinderclient import client as cClient
tiernob5cef372017-06-19 15:52:22 +020043from glanceclient import client as glClient
tierno7edb6752016-03-21 17:37:52 +010044import glanceclient.exc as gl1Exceptions
sousaedu049cbb12022-01-05 11:39:35 +000045from keystoneauth1 import session
46from keystoneauth1.identity import v2, v3
47import keystoneclient.exceptions as ksExceptions
48import keystoneclient.v2_0.client as ksClient_v2
49import keystoneclient.v3.client as ksClient_v3
50import netaddr
tierno7edb6752016-03-21 17:37:52 +010051from neutronclient.common import exceptions as neExceptions
sousaedu049cbb12022-01-05 11:39:35 +000052from neutronclient.neutron import client as neClient
53from novaclient import client as nClient, exceptions as nvExceptions
54from osm_ro_plugin import vimconn
tierno7edb6752016-03-21 17:37:52 +010055from requests.exceptions import ConnectionError
sousaedu049cbb12022-01-05 11:39:35 +000056import yaml
tierno7edb6752016-03-21 17:37:52 +010057
tierno1ec592d2020-06-16 15:29:47 +000058__author__ = "Alfonso Tierno, Gerardo Garcia, Pablo Montes, xFlow Research, Igor D.C., Eduardo Sousa"
59__date__ = "$22-sep-2017 23:59:59$"
tierno40e1bce2017-08-09 09:12:04 +020060
61"""contain the openstack virtual machine status to openmano status"""
sousaedu80135b92021-02-17 15:05:18 +010062vmStatus2manoFormat = {
63 "ACTIVE": "ACTIVE",
64 "PAUSED": "PAUSED",
65 "SUSPENDED": "SUSPENDED",
66 "SHUTOFF": "INACTIVE",
67 "BUILD": "BUILD",
68 "ERROR": "ERROR",
69 "DELETED": "DELETED",
70}
71netStatus2manoFormat = {
72 "ACTIVE": "ACTIVE",
73 "PAUSED": "PAUSED",
74 "INACTIVE": "INACTIVE",
75 "BUILD": "BUILD",
76 "ERROR": "ERROR",
77 "DELETED": "DELETED",
78}
tierno7edb6752016-03-21 17:37:52 +010079
sousaedu80135b92021-02-17 15:05:18 +010080supportedClassificationTypes = ["legacy_flow_classifier"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +000081
tierno1ec592d2020-06-16 15:29:47 +000082# global var to have a timeout creating and deleting volumes
garciadeblas64b39c52020-05-21 08:07:25 +000083volume_timeout = 1800
84server_timeout = 1800
montesmoreno0c8def02016-12-22 12:16:23 +000085
Anderson Bravalheri0446cd52018-08-17 15:26:19 +010086
87class SafeDumper(yaml.SafeDumper):
88 def represent_data(self, data):
89 # Openstack APIs use custom subclasses of dict and YAML safe dumper
90 # is designed to not handle that (reference issue 142 of pyyaml)
91 if isinstance(data, dict) and data.__class__ != dict:
92 # A simple solution is to convert those items back to dicts
93 data = dict(data.items())
94
95 return super(SafeDumper, self).represent_data(data)
96
97
tierno72774862020-05-04 11:44:15 +000098class vimconnector(vimconn.VimConnector):
sousaedu80135b92021-02-17 15:05:18 +010099 def __init__(
100 self,
101 uuid,
102 name,
103 tenant_id,
104 tenant_name,
105 url,
106 url_admin=None,
107 user=None,
108 passwd=None,
109 log_level=None,
110 config={},
111 persistent_info={},
112 ):
tierno1ec592d2020-06-16 15:29:47 +0000113 """using common constructor parameters. In this case
tierno7edb6752016-03-21 17:37:52 +0100114 'url' is the keystone authorization url,
115 'url_admin' is not use
tierno1ec592d2020-06-16 15:29:47 +0000116 """
sousaedu80135b92021-02-17 15:05:18 +0100117 api_version = config.get("APIversion")
kate721d79b2017-06-24 04:21:38 -0700118
sousaedu80135b92021-02-17 15:05:18 +0100119 if api_version and api_version not in ("v3.3", "v2.0", "2", "3"):
120 raise vimconn.VimConnException(
121 "Invalid value '{}' for config:APIversion. "
122 "Allowed values are 'v3.3', 'v2.0', '2' or '3'".format(api_version)
123 )
124
125 vim_type = config.get("vim_type")
126
127 if vim_type and vim_type not in ("vio", "VIO"):
128 raise vimconn.VimConnException(
129 "Invalid value '{}' for config:vim_type."
130 "Allowed values are 'vio' or 'VIO'".format(vim_type)
131 )
132
133 if config.get("dataplane_net_vlan_range") is not None:
tierno1ec592d2020-06-16 15:29:47 +0000134 # validate vlan ranges provided by user
sousaedu80135b92021-02-17 15:05:18 +0100135 self._validate_vlan_ranges(
136 config.get("dataplane_net_vlan_range"), "dataplane_net_vlan_range"
137 )
garciadeblasebd66722019-01-31 16:01:31 +0000138
sousaedu80135b92021-02-17 15:05:18 +0100139 if config.get("multisegment_vlan_range") is not None:
tierno1ec592d2020-06-16 15:29:47 +0000140 # validate vlan ranges provided by user
sousaedu80135b92021-02-17 15:05:18 +0100141 self._validate_vlan_ranges(
142 config.get("multisegment_vlan_range"), "multisegment_vlan_range"
143 )
kate721d79b2017-06-24 04:21:38 -0700144
sousaedu80135b92021-02-17 15:05:18 +0100145 vimconn.VimConnector.__init__(
146 self,
147 uuid,
148 name,
149 tenant_id,
150 tenant_name,
151 url,
152 url_admin,
153 user,
154 passwd,
155 log_level,
156 config,
157 )
tiernob3d36742017-03-03 23:51:05 +0100158
tierno4d1ce222018-04-06 10:41:06 +0200159 if self.config.get("insecure") and self.config.get("ca_cert"):
sousaedu80135b92021-02-17 15:05:18 +0100160 raise vimconn.VimConnException(
161 "options insecure and ca_cert are mutually exclusive"
162 )
163
tierno4d1ce222018-04-06 10:41:06 +0200164 self.verify = True
sousaedu80135b92021-02-17 15:05:18 +0100165
tierno4d1ce222018-04-06 10:41:06 +0200166 if self.config.get("insecure"):
167 self.verify = False
sousaedu80135b92021-02-17 15:05:18 +0100168
tierno4d1ce222018-04-06 10:41:06 +0200169 if self.config.get("ca_cert"):
170 self.verify = self.config.get("ca_cert")
tierno4d1ce222018-04-06 10:41:06 +0200171
tierno7edb6752016-03-21 17:37:52 +0100172 if not url:
sousaedu80135b92021-02-17 15:05:18 +0100173 raise TypeError("url param can not be NoneType")
174
tiernob5cef372017-06-19 15:52:22 +0200175 self.persistent_info = persistent_info
sousaedu80135b92021-02-17 15:05:18 +0100176 self.availability_zone = persistent_info.get("availability_zone", None)
177 self.session = persistent_info.get("session", {"reload_client": True})
178 self.my_tenant_id = self.session.get("my_tenant_id")
179 self.nova = self.session.get("nova")
180 self.neutron = self.session.get("neutron")
181 self.cinder = self.session.get("cinder")
182 self.glance = self.session.get("glance")
183 # self.glancev1 = self.session.get("glancev1")
184 self.keystone = self.session.get("keystone")
185 self.api_version3 = self.session.get("api_version3")
kate721d79b2017-06-24 04:21:38 -0700186 self.vim_type = self.config.get("vim_type")
sousaedu80135b92021-02-17 15:05:18 +0100187
kate721d79b2017-06-24 04:21:38 -0700188 if self.vim_type:
189 self.vim_type = self.vim_type.upper()
sousaedu80135b92021-02-17 15:05:18 +0100190
kate721d79b2017-06-24 04:21:38 -0700191 if self.config.get("use_internal_endpoint"):
192 self.endpoint_type = "internalURL"
193 else:
194 self.endpoint_type = None
montesmoreno0c8def02016-12-22 12:16:23 +0000195
sousaedu80135b92021-02-17 15:05:18 +0100196 logging.getLogger("urllib3").setLevel(logging.WARNING)
197 logging.getLogger("keystoneauth").setLevel(logging.WARNING)
198 logging.getLogger("novaclient").setLevel(logging.WARNING)
199 self.logger = logging.getLogger("ro.vim.openstack")
kate721d79b2017-06-24 04:21:38 -0700200
tiernoa05b65a2019-02-01 12:30:27 +0000201 # allow security_groups to be a list or a single string
sousaedu80135b92021-02-17 15:05:18 +0100202 if isinstance(self.config.get("security_groups"), str):
203 self.config["security_groups"] = [self.config["security_groups"]]
204
tiernoa05b65a2019-02-01 12:30:27 +0000205 self.security_groups_id = None
206
tierno1ec592d2020-06-16 15:29:47 +0000207 # ###### VIO Specific Changes #########
kate721d79b2017-06-24 04:21:38 -0700208 if self.vim_type == "VIO":
sousaedu80135b92021-02-17 15:05:18 +0100209 self.logger = logging.getLogger("ro.vim.vio")
kate721d79b2017-06-24 04:21:38 -0700210
tiernofe789902016-09-29 14:20:44 +0000211 if log_level:
tierno1ec592d2020-06-16 15:29:47 +0000212 self.logger.setLevel(getattr(logging, log_level))
tiernof716aea2017-06-21 18:01:40 +0200213
214 def __getitem__(self, index):
215 """Get individuals parameters.
216 Throw KeyError"""
sousaedu80135b92021-02-17 15:05:18 +0100217 if index == "project_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200218 return self.config.get("project_domain_id")
sousaedu80135b92021-02-17 15:05:18 +0100219 elif index == "user_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200220 return self.config.get("user_domain_id")
221 else:
tierno72774862020-05-04 11:44:15 +0000222 return vimconn.VimConnector.__getitem__(self, index)
tiernof716aea2017-06-21 18:01:40 +0200223
224 def __setitem__(self, index, value):
225 """Set individuals parameters and it is marked as dirty so to force connection reload.
226 Throw KeyError"""
sousaedu80135b92021-02-17 15:05:18 +0100227 if index == "project_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200228 self.config["project_domain_id"] = value
sousaedu80135b92021-02-17 15:05:18 +0100229 elif index == "user_domain_id":
tierno1ec592d2020-06-16 15:29:47 +0000230 self.config["user_domain_id"] = value
tiernof716aea2017-06-21 18:01:40 +0200231 else:
tierno72774862020-05-04 11:44:15 +0000232 vimconn.VimConnector.__setitem__(self, index, value)
sousaedu80135b92021-02-17 15:05:18 +0100233
234 self.session["reload_client"] = True
tiernof716aea2017-06-21 18:01:40 +0200235
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100236 def serialize(self, value):
237 """Serialization of python basic types.
238
239 In the case value is not serializable a message will be logged and a
240 simple representation of the data that cannot be converted back to
241 python is returned.
242 """
tierno7d782ef2019-10-04 12:56:31 +0000243 if isinstance(value, str):
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100244 return value
245
246 try:
sousaedu80135b92021-02-17 15:05:18 +0100247 return yaml.dump(
248 value, Dumper=SafeDumper, default_flow_style=True, width=256
249 )
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100250 except yaml.representer.RepresenterError:
sousaedu80135b92021-02-17 15:05:18 +0100251 self.logger.debug(
252 "The following entity cannot be serialized in YAML:\n\n%s\n\n",
253 pformat(value),
254 exc_info=True,
255 )
256
tierno1ec592d2020-06-16 15:29:47 +0000257 return str(value)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100258
tierno7edb6752016-03-21 17:37:52 +0100259 def _reload_connection(self):
tierno1ec592d2020-06-16 15:29:47 +0000260 """Called before any operation, it check if credentials has changed
tierno7edb6752016-03-21 17:37:52 +0100261 Throw keystoneclient.apiclient.exceptions.AuthorizationFailure
tierno1ec592d2020-06-16 15:29:47 +0000262 """
263 # TODO control the timing and possible token timeout, but it seams that python client does this task for us :-)
sousaedu80135b92021-02-17 15:05:18 +0100264 if self.session["reload_client"]:
265 if self.config.get("APIversion"):
266 self.api_version3 = (
267 self.config["APIversion"] == "v3.3"
268 or self.config["APIversion"] == "3"
269 )
tiernof716aea2017-06-21 18:01:40 +0200270 else: # get from ending auth_url that end with v3 or with v2.0
sousaedu80135b92021-02-17 15:05:18 +0100271 self.api_version3 = self.url.endswith("/v3") or self.url.endswith(
272 "/v3/"
273 )
274
275 self.session["api_version3"] = self.api_version3
276
tiernof716aea2017-06-21 18:01:40 +0200277 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100278 if self.config.get("project_domain_id") or self.config.get(
279 "project_domain_name"
280 ):
tierno3cb8dc32017-10-24 18:13:19 +0200281 project_domain_id_default = None
282 else:
sousaedu80135b92021-02-17 15:05:18 +0100283 project_domain_id_default = "default"
284
285 if self.config.get("user_domain_id") or self.config.get(
286 "user_domain_name"
287 ):
tierno3cb8dc32017-10-24 18:13:19 +0200288 user_domain_id_default = None
289 else:
sousaedu80135b92021-02-17 15:05:18 +0100290 user_domain_id_default = "default"
291 auth = v3.Password(
292 auth_url=self.url,
293 username=self.user,
294 password=self.passwd,
295 project_name=self.tenant_name,
296 project_id=self.tenant_id,
297 project_domain_id=self.config.get(
298 "project_domain_id", project_domain_id_default
299 ),
300 user_domain_id=self.config.get(
301 "user_domain_id", user_domain_id_default
302 ),
303 project_domain_name=self.config.get("project_domain_name"),
304 user_domain_name=self.config.get("user_domain_name"),
305 )
ahmadsa95baa272016-11-30 09:14:11 +0500306 else:
sousaedu80135b92021-02-17 15:05:18 +0100307 auth = v2.Password(
308 auth_url=self.url,
309 username=self.user,
310 password=self.passwd,
311 tenant_name=self.tenant_name,
312 tenant_id=self.tenant_id,
313 )
314
tierno4d1ce222018-04-06 10:41:06 +0200315 sess = session.Session(auth=auth, verify=self.verify)
tierno1ec592d2020-06-16 15:29:47 +0000316 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
317 # Titanium cloud and StarlingX
sousaedu80135b92021-02-17 15:05:18 +0100318 region_name = self.config.get("region_name")
319
tiernof716aea2017-06-21 18:01:40 +0200320 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100321 self.keystone = ksClient_v3.Client(
322 session=sess,
323 endpoint_type=self.endpoint_type,
324 region_name=region_name,
325 )
tiernof716aea2017-06-21 18:01:40 +0200326 else:
sousaedu80135b92021-02-17 15:05:18 +0100327 self.keystone = ksClient_v2.Client(
328 session=sess, endpoint_type=self.endpoint_type
329 )
330
331 self.session["keystone"] = self.keystone
332 # In order to enable microversion functionality an explicit microversion must be specified in "config".
montesmoreno9317d302017-08-16 12:48:23 +0200333 # This implementation approach is due to the warning message in
334 # https://developer.openstack.org/api-guide/compute/microversions.html
335 # where it is stated that microversion backwards compatibility is not guaranteed and clients should
336 # always require an specific microversion.
sousaedu80135b92021-02-17 15:05:18 +0100337 # To be able to use "device role tagging" functionality define "microversion: 2.32" in datacenter config
montesmoreno9317d302017-08-16 12:48:23 +0200338 version = self.config.get("microversion")
sousaedu80135b92021-02-17 15:05:18 +0100339
montesmoreno9317d302017-08-16 12:48:23 +0200340 if not version:
341 version = "2.1"
sousaedu80135b92021-02-17 15:05:18 +0100342
tierno1ec592d2020-06-16 15:29:47 +0000343 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
344 # Titanium cloud and StarlingX
sousaedu80135b92021-02-17 15:05:18 +0100345 self.nova = self.session["nova"] = nClient.Client(
346 str(version),
347 session=sess,
348 endpoint_type=self.endpoint_type,
349 region_name=region_name,
350 )
351 self.neutron = self.session["neutron"] = neClient.Client(
352 "2.0",
353 session=sess,
354 endpoint_type=self.endpoint_type,
355 region_name=region_name,
356 )
357 self.cinder = self.session["cinder"] = cClient.Client(
358 2,
359 session=sess,
360 endpoint_type=self.endpoint_type,
361 region_name=region_name,
362 )
363
tiernoa05b65a2019-02-01 12:30:27 +0000364 try:
sousaedu80135b92021-02-17 15:05:18 +0100365 self.my_tenant_id = self.session["my_tenant_id"] = sess.get_project_id()
tierno1ec592d2020-06-16 15:29:47 +0000366 except Exception:
tiernoa05b65a2019-02-01 12:30:27 +0000367 self.logger.error("Cannot get project_id from session", exc_info=True)
sousaedu80135b92021-02-17 15:05:18 +0100368
kate721d79b2017-06-24 04:21:38 -0700369 if self.endpoint_type == "internalURL":
370 glance_service_id = self.keystone.services.list(name="glance")[0].id
sousaedu80135b92021-02-17 15:05:18 +0100371 glance_endpoint = self.keystone.endpoints.list(
372 glance_service_id, interface="internal"
373 )[0].url
kate721d79b2017-06-24 04:21:38 -0700374 else:
375 glance_endpoint = None
sousaedu80135b92021-02-17 15:05:18 +0100376
377 self.glance = self.session["glance"] = glClient.Client(
378 2, session=sess, endpoint=glance_endpoint
379 )
tiernoa05b65a2019-02-01 12:30:27 +0000380 # using version 1 of glance client in new_image()
sousaedu80135b92021-02-17 15:05:18 +0100381 # self.glancev1 = self.session["glancev1"] = glClient.Client("1", session=sess,
tierno1beea862018-07-11 15:47:37 +0200382 # endpoint=glance_endpoint)
sousaedu80135b92021-02-17 15:05:18 +0100383 self.session["reload_client"] = False
384 self.persistent_info["session"] = self.session
mirabal29356312017-07-27 12:21:22 +0200385 # add availablity zone info inside self.persistent_info
386 self._set_availablity_zones()
sousaedu80135b92021-02-17 15:05:18 +0100387 self.persistent_info["availability_zone"] = self.availability_zone
388 # force to get again security_groups_ids next time they are needed
389 self.security_groups_id = None
ahmadsa95baa272016-11-30 09:14:11 +0500390
tierno7edb6752016-03-21 17:37:52 +0100391 def __net_os2mano(self, net_list_dict):
tierno1ec592d2020-06-16 15:29:47 +0000392 """Transform the net openstack format to mano format
393 net_list_dict can be a list of dict or a single dict"""
tierno7edb6752016-03-21 17:37:52 +0100394 if type(net_list_dict) is dict:
tierno1ec592d2020-06-16 15:29:47 +0000395 net_list_ = (net_list_dict,)
tierno7edb6752016-03-21 17:37:52 +0100396 elif type(net_list_dict) is list:
tierno1ec592d2020-06-16 15:29:47 +0000397 net_list_ = net_list_dict
tierno7edb6752016-03-21 17:37:52 +0100398 else:
399 raise TypeError("param net_list_dict must be a list or a dictionary")
400 for net in net_list_:
sousaedu80135b92021-02-17 15:05:18 +0100401 if net.get("provider:network_type") == "vlan":
402 net["type"] = "data"
tierno7edb6752016-03-21 17:37:52 +0100403 else:
sousaedu80135b92021-02-17 15:05:18 +0100404 net["type"] = "bridge"
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +0200405
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000406 def __classification_os2mano(self, class_list_dict):
407 """Transform the openstack format (Flow Classifier) to mano format
408 (Classification) class_list_dict can be a list of dict or a single dict
409 """
410 if isinstance(class_list_dict, dict):
411 class_list_ = [class_list_dict]
412 elif isinstance(class_list_dict, list):
413 class_list_ = class_list_dict
414 else:
tierno1ec592d2020-06-16 15:29:47 +0000415 raise TypeError("param class_list_dict must be a list or a dictionary")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000416 for classification in class_list_:
sousaedu80135b92021-02-17 15:05:18 +0100417 id = classification.pop("id")
418 name = classification.pop("name")
419 description = classification.pop("description")
420 project_id = classification.pop("project_id")
421 tenant_id = classification.pop("tenant_id")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000422 original_classification = copy.deepcopy(classification)
423 classification.clear()
sousaedu80135b92021-02-17 15:05:18 +0100424 classification["ctype"] = "legacy_flow_classifier"
425 classification["definition"] = original_classification
426 classification["id"] = id
427 classification["name"] = name
428 classification["description"] = description
429 classification["project_id"] = project_id
430 classification["tenant_id"] = tenant_id
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000431
432 def __sfi_os2mano(self, sfi_list_dict):
433 """Transform the openstack format (Port Pair) to mano format (SFI)
434 sfi_list_dict can be a list of dict or a single dict
435 """
436 if isinstance(sfi_list_dict, dict):
437 sfi_list_ = [sfi_list_dict]
438 elif isinstance(sfi_list_dict, list):
439 sfi_list_ = sfi_list_dict
440 else:
sousaedu80135b92021-02-17 15:05:18 +0100441 raise TypeError("param sfi_list_dict must be a list or a dictionary")
442
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000443 for sfi in sfi_list_:
sousaedu80135b92021-02-17 15:05:18 +0100444 sfi["ingress_ports"] = []
445 sfi["egress_ports"] = []
446
447 if sfi.get("ingress"):
448 sfi["ingress_ports"].append(sfi["ingress"])
449
450 if sfi.get("egress"):
451 sfi["egress_ports"].append(sfi["egress"])
452
453 del sfi["ingress"]
454 del sfi["egress"]
455 params = sfi.get("service_function_parameters")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000456 sfc_encap = False
sousaedu80135b92021-02-17 15:05:18 +0100457
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000458 if params:
sousaedu80135b92021-02-17 15:05:18 +0100459 correlation = params.get("correlation")
460
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000461 if correlation:
462 sfc_encap = True
sousaedu80135b92021-02-17 15:05:18 +0100463
464 sfi["sfc_encap"] = sfc_encap
465 del sfi["service_function_parameters"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000466
467 def __sf_os2mano(self, sf_list_dict):
468 """Transform the openstack format (Port Pair Group) to mano format (SF)
469 sf_list_dict can be a list of dict or a single dict
470 """
471 if isinstance(sf_list_dict, dict):
472 sf_list_ = [sf_list_dict]
473 elif isinstance(sf_list_dict, list):
474 sf_list_ = sf_list_dict
475 else:
sousaedu80135b92021-02-17 15:05:18 +0100476 raise TypeError("param sf_list_dict must be a list or a dictionary")
477
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000478 for sf in sf_list_:
sousaedu80135b92021-02-17 15:05:18 +0100479 del sf["port_pair_group_parameters"]
480 sf["sfis"] = sf["port_pairs"]
481 del sf["port_pairs"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000482
483 def __sfp_os2mano(self, sfp_list_dict):
484 """Transform the openstack format (Port Chain) to mano format (SFP)
485 sfp_list_dict can be a list of dict or a single dict
486 """
487 if isinstance(sfp_list_dict, dict):
488 sfp_list_ = [sfp_list_dict]
489 elif isinstance(sfp_list_dict, list):
490 sfp_list_ = sfp_list_dict
491 else:
sousaedu80135b92021-02-17 15:05:18 +0100492 raise TypeError("param sfp_list_dict must be a list or a dictionary")
493
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000494 for sfp in sfp_list_:
sousaedu80135b92021-02-17 15:05:18 +0100495 params = sfp.pop("chain_parameters")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000496 sfc_encap = False
sousaedu80135b92021-02-17 15:05:18 +0100497
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000498 if params:
sousaedu80135b92021-02-17 15:05:18 +0100499 correlation = params.get("correlation")
500
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000501 if correlation:
502 sfc_encap = True
sousaedu80135b92021-02-17 15:05:18 +0100503
504 sfp["sfc_encap"] = sfc_encap
505 sfp["spi"] = sfp.pop("chain_id")
506 sfp["classifications"] = sfp.pop("flow_classifiers")
507 sfp["service_functions"] = sfp.pop("port_pair_groups")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000508
509 # placeholder for now; read TODO note below
510 def _validate_classification(self, type, definition):
511 # only legacy_flow_classifier Type is supported at this point
512 return True
513 # TODO(igordcard): this method should be an abstract method of an
514 # abstract Classification class to be implemented by the specific
515 # Types. Also, abstract vimconnector should call the validation
516 # method before the implemented VIM connectors are called.
517
tiernoae4a8d12016-07-08 12:30:39 +0200518 def _format_exception(self, exception):
tierno69647792020-03-05 16:45:48 +0000519 """Transform a keystone, nova, neutron exception into a vimconn exception discovering the cause"""
tierno69647792020-03-05 16:45:48 +0000520 message_error = str(exception)
tierno5ad826a2020-08-11 11:19:44 +0000521 tip = ""
tiernode12f782019-04-05 12:46:42 +0000522
sousaedu80135b92021-02-17 15:05:18 +0100523 if isinstance(
524 exception,
525 (
526 neExceptions.NetworkNotFoundClient,
527 nvExceptions.NotFound,
528 ksExceptions.NotFound,
529 gl1Exceptions.HTTPNotFound,
530 ),
531 ):
532 raise vimconn.VimConnNotFoundException(
533 type(exception).__name__ + ": " + message_error
534 )
535 elif isinstance(
536 exception,
537 (
538 HTTPException,
539 gl1Exceptions.HTTPException,
540 gl1Exceptions.CommunicationError,
541 ConnectionError,
542 ksExceptions.ConnectionError,
543 neExceptions.ConnectionFailed,
544 ),
545 ):
tierno5ad826a2020-08-11 11:19:44 +0000546 if type(exception).__name__ == "SSLError":
547 tip = " (maybe option 'insecure' must be added to the VIM)"
sousaedu80135b92021-02-17 15:05:18 +0100548
549 raise vimconn.VimConnConnectionException(
550 "Invalid URL or credentials{}: {}".format(tip, message_error)
551 )
552 elif isinstance(
553 exception,
554 (
555 KeyError,
556 nvExceptions.BadRequest,
557 ksExceptions.BadRequest,
558 ),
559 ):
560 raise vimconn.VimConnException(
561 type(exception).__name__ + ": " + message_error
562 )
563 elif isinstance(
564 exception,
565 (
566 nvExceptions.ClientException,
567 ksExceptions.ClientException,
568 neExceptions.NeutronException,
569 ),
570 ):
571 raise vimconn.VimConnUnexpectedResponse(
572 type(exception).__name__ + ": " + message_error
573 )
tiernoae4a8d12016-07-08 12:30:39 +0200574 elif isinstance(exception, nvExceptions.Conflict):
sousaedu80135b92021-02-17 15:05:18 +0100575 raise vimconn.VimConnConflictException(
576 type(exception).__name__ + ": " + message_error
577 )
tierno72774862020-05-04 11:44:15 +0000578 elif isinstance(exception, vimconn.VimConnException):
tierno41a69812018-02-16 14:34:33 +0100579 raise exception
tiernof716aea2017-06-21 18:01:40 +0200580 else: # ()
tiernode12f782019-04-05 12:46:42 +0000581 self.logger.error("General Exception " + message_error, exc_info=True)
sousaedu80135b92021-02-17 15:05:18 +0100582
583 raise vimconn.VimConnConnectionException(
584 type(exception).__name__ + ": " + message_error
585 )
tiernoae4a8d12016-07-08 12:30:39 +0200586
tiernoa05b65a2019-02-01 12:30:27 +0000587 def _get_ids_from_name(self):
588 """
589 Obtain ids from name of tenant and security_groups. Store at self .security_groups_id"
590 :return: None
591 """
592 # get tenant_id if only tenant_name is supplied
593 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100594
tiernoa05b65a2019-02-01 12:30:27 +0000595 if not self.my_tenant_id:
sousaedu80135b92021-02-17 15:05:18 +0100596 raise vimconn.VimConnConnectionException(
597 "Error getting tenant information from name={} id={}".format(
598 self.tenant_name, self.tenant_id
599 )
600 )
601
602 if self.config.get("security_groups") and not self.security_groups_id:
tiernoa05b65a2019-02-01 12:30:27 +0000603 # convert from name to id
sousaedu80135b92021-02-17 15:05:18 +0100604 neutron_sg_list = self.neutron.list_security_groups(
605 tenant_id=self.my_tenant_id
606 )["security_groups"]
tiernoa05b65a2019-02-01 12:30:27 +0000607
608 self.security_groups_id = []
sousaedu80135b92021-02-17 15:05:18 +0100609 for sg in self.config.get("security_groups"):
tiernoa05b65a2019-02-01 12:30:27 +0000610 for neutron_sg in neutron_sg_list:
611 if sg in (neutron_sg["id"], neutron_sg["name"]):
612 self.security_groups_id.append(neutron_sg["id"])
613 break
614 else:
615 self.security_groups_id = None
sousaedu80135b92021-02-17 15:05:18 +0100616
617 raise vimconn.VimConnConnectionException(
618 "Not found security group {} for this tenant".format(sg)
619 )
tiernoa05b65a2019-02-01 12:30:27 +0000620
tierno5509c2e2019-07-04 16:23:20 +0000621 def check_vim_connectivity(self):
622 # just get network list to check connectivity and credentials
623 self.get_network_list(filter_dict={})
624
tiernoae4a8d12016-07-08 12:30:39 +0200625 def get_tenant_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +0000626 """Obtain tenants of VIM
tiernoae4a8d12016-07-08 12:30:39 +0200627 filter_dict can contain the following keys:
628 name: filter by tenant name
629 id: filter by tenant uuid/id
630 <other VIM specific>
631 Returns the tenant list of dictionaries: [{'name':'<name>, 'id':'<id>, ...}, ...]
tierno1ec592d2020-06-16 15:29:47 +0000632 """
ahmadsa95baa272016-11-30 09:14:11 +0500633 self.logger.debug("Getting tenants from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +0100634
tiernoae4a8d12016-07-08 12:30:39 +0200635 try:
636 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100637
tiernof716aea2017-06-21 18:01:40 +0200638 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100639 project_class_list = self.keystone.projects.list(
640 name=filter_dict.get("name")
641 )
ahmadsa95baa272016-11-30 09:14:11 +0500642 else:
tiernof716aea2017-06-21 18:01:40 +0200643 project_class_list = self.keystone.tenants.findall(**filter_dict)
sousaedu80135b92021-02-17 15:05:18 +0100644
tierno1ec592d2020-06-16 15:29:47 +0000645 project_list = []
sousaedu80135b92021-02-17 15:05:18 +0100646
ahmadsa95baa272016-11-30 09:14:11 +0500647 for project in project_class_list:
sousaedu80135b92021-02-17 15:05:18 +0100648 if filter_dict.get("id") and filter_dict["id"] != project.id:
tiernof716aea2017-06-21 18:01:40 +0200649 continue
sousaedu80135b92021-02-17 15:05:18 +0100650
ahmadsa95baa272016-11-30 09:14:11 +0500651 project_list.append(project.to_dict())
sousaedu80135b92021-02-17 15:05:18 +0100652
ahmadsa95baa272016-11-30 09:14:11 +0500653 return project_list
sousaedu80135b92021-02-17 15:05:18 +0100654 except (
655 ksExceptions.ConnectionError,
656 ksExceptions.ClientException,
657 ConnectionError,
658 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200659 self._format_exception(e)
660
661 def new_tenant(self, tenant_name, tenant_description):
tierno1ec592d2020-06-16 15:29:47 +0000662 """Adds a new tenant to openstack VIM. Returns the tenant identifier"""
tiernoae4a8d12016-07-08 12:30:39 +0200663 self.logger.debug("Adding a new tenant name: %s", tenant_name)
sousaedu80135b92021-02-17 15:05:18 +0100664
tiernoae4a8d12016-07-08 12:30:39 +0200665 try:
666 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100667
tiernof716aea2017-06-21 18:01:40 +0200668 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100669 project = self.keystone.projects.create(
670 tenant_name,
671 self.config.get("project_domain_id", "default"),
672 description=tenant_description,
673 is_domain=False,
674 )
ahmadsa95baa272016-11-30 09:14:11 +0500675 else:
tiernof716aea2017-06-21 18:01:40 +0200676 project = self.keystone.tenants.create(tenant_name, tenant_description)
sousaedu80135b92021-02-17 15:05:18 +0100677
ahmadsa95baa272016-11-30 09:14:11 +0500678 return project.id
sousaedu80135b92021-02-17 15:05:18 +0100679 except (
680 ksExceptions.ConnectionError,
681 ksExceptions.ClientException,
682 ksExceptions.BadRequest,
683 ConnectionError,
684 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200685 self._format_exception(e)
686
687 def delete_tenant(self, tenant_id):
tierno1ec592d2020-06-16 15:29:47 +0000688 """Delete a tenant from openstack VIM. Returns the old tenant identifier"""
tiernoae4a8d12016-07-08 12:30:39 +0200689 self.logger.debug("Deleting tenant %s from VIM", tenant_id)
sousaedu80135b92021-02-17 15:05:18 +0100690
tiernoae4a8d12016-07-08 12:30:39 +0200691 try:
692 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100693
tiernof716aea2017-06-21 18:01:40 +0200694 if self.api_version3:
ahmadsa95baa272016-11-30 09:14:11 +0500695 self.keystone.projects.delete(tenant_id)
696 else:
697 self.keystone.tenants.delete(tenant_id)
sousaedu80135b92021-02-17 15:05:18 +0100698
tiernoae4a8d12016-07-08 12:30:39 +0200699 return tenant_id
sousaedu80135b92021-02-17 15:05:18 +0100700 except (
701 ksExceptions.ConnectionError,
702 ksExceptions.ClientException,
703 ksExceptions.NotFound,
704 ConnectionError,
705 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200706 self._format_exception(e)
ahmadsa95baa272016-11-30 09:14:11 +0500707
sousaedu80135b92021-02-17 15:05:18 +0100708 def new_network(
709 self,
710 net_name,
711 net_type,
712 ip_profile=None,
713 shared=False,
714 provider_network_profile=None,
715 ):
garciadeblasebd66722019-01-31 16:01:31 +0000716 """Adds a tenant network to VIM
717 Params:
718 'net_name': name of the network
719 'net_type': one of:
720 'bridge': overlay isolated network
721 'data': underlay E-LAN network for Passthrough and SRIOV interfaces
722 'ptp': underlay E-LINE network for Passthrough and SRIOV interfaces.
723 'ip_profile': is a dict containing the IP parameters of the network
724 'ip_version': can be "IPv4" or "IPv6" (Currently only IPv4 is implemented)
725 'subnet_address': ip_prefix_schema, that is X.X.X.X/Y
726 'gateway_address': (Optional) ip_schema, that is X.X.X.X
727 'dns_address': (Optional) comma separated list of ip_schema, e.g. X.X.X.X[,X,X,X,X]
728 'dhcp_enabled': True or False
729 'dhcp_start_address': ip_schema, first IP to grant
730 'dhcp_count': number of IPs to grant.
731 'shared': if this network can be seen/use by other tenants/organization
garciadeblas4af0d542020-02-18 16:01:13 +0100732 'provider_network_profile': (optional) contains {segmentation-id: vlan, network-type: vlan|vxlan,
733 physical-network: physnet-label}
garciadeblasebd66722019-01-31 16:01:31 +0000734 Returns a tuple with the network identifier and created_items, or raises an exception on error
735 created_items can be None or a dictionary where this method can include key-values that will be passed to
736 the method delete_network. Can be used to store created segments, created l2gw connections, etc.
737 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
738 as not present.
739 """
sousaedu80135b92021-02-17 15:05:18 +0100740 self.logger.debug(
741 "Adding a new network to VIM name '%s', type '%s'", net_name, net_type
742 )
garciadeblasebd66722019-01-31 16:01:31 +0000743 # self.logger.debug(">>>>>>>>>>>>>>>>>> IP profile %s", str(ip_profile))
kbsuba85c54d2019-10-17 16:30:32 +0000744
tierno7edb6752016-03-21 17:37:52 +0100745 try:
kbsuba85c54d2019-10-17 16:30:32 +0000746 vlan = None
sousaedu80135b92021-02-17 15:05:18 +0100747
kbsuba85c54d2019-10-17 16:30:32 +0000748 if provider_network_profile:
749 vlan = provider_network_profile.get("segmentation-id")
sousaedu80135b92021-02-17 15:05:18 +0100750
garciadeblasedca7b32016-09-29 14:01:52 +0000751 new_net = None
garciadeblasebd66722019-01-31 16:01:31 +0000752 created_items = {}
tierno7edb6752016-03-21 17:37:52 +0100753 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100754 network_dict = {"name": net_name, "admin_state_up": True}
755
tierno6869ae72020-01-09 17:37:34 +0000756 if net_type in ("data", "ptp"):
757 provider_physical_network = None
sousaedu80135b92021-02-17 15:05:18 +0100758
759 if provider_network_profile and provider_network_profile.get(
760 "physical-network"
761 ):
762 provider_physical_network = provider_network_profile.get(
763 "physical-network"
764 )
765
tierno6869ae72020-01-09 17:37:34 +0000766 # provider-network must be one of the dataplane_physcial_netowrk if this is a list. If it is string
767 # or not declared, just ignore the checking
sousaedu80135b92021-02-17 15:05:18 +0100768 if (
769 isinstance(
770 self.config.get("dataplane_physical_net"), (tuple, list)
771 )
772 and provider_physical_network
773 not in self.config["dataplane_physical_net"]
774 ):
tierno72774862020-05-04 11:44:15 +0000775 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100776 "Invalid parameter 'provider-network:physical-network' "
777 "for network creation. '{}' is not one of the declared "
778 "list at VIM_config:dataplane_physical_net".format(
779 provider_physical_network
780 )
781 )
782
783 # use the default dataplane_physical_net
784 if not provider_physical_network:
785 provider_physical_network = self.config.get(
786 "dataplane_physical_net"
787 )
788
tierno6869ae72020-01-09 17:37:34 +0000789 # if it is non empty list, use the first value. If it is a string use the value directly
sousaedu80135b92021-02-17 15:05:18 +0100790 if (
791 isinstance(provider_physical_network, (tuple, list))
792 and provider_physical_network
793 ):
tierno6869ae72020-01-09 17:37:34 +0000794 provider_physical_network = provider_physical_network[0]
795
796 if not provider_physical_network:
tierno5ad826a2020-08-11 11:19:44 +0000797 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100798 "missing information needed for underlay networks. Provide "
799 "'dataplane_physical_net' configuration at VIM or use the NS "
800 "instantiation parameter 'provider-network.physical-network'"
801 " for the VLD"
802 )
tierno6869ae72020-01-09 17:37:34 +0000803
sousaedu80135b92021-02-17 15:05:18 +0100804 if not self.config.get("multisegment_support"):
805 network_dict[
806 "provider:physical_network"
807 ] = provider_physical_network
808
809 if (
810 provider_network_profile
811 and "network-type" in provider_network_profile
812 ):
813 network_dict[
814 "provider:network_type"
815 ] = provider_network_profile["network-type"]
garciadeblas4af0d542020-02-18 16:01:13 +0100816 else:
sousaedu80135b92021-02-17 15:05:18 +0100817 network_dict["provider:network_type"] = self.config.get(
818 "dataplane_network_type", "vlan"
819 )
820
tierno6869ae72020-01-09 17:37:34 +0000821 if vlan:
822 network_dict["provider:segmentation_id"] = vlan
garciadeblasebd66722019-01-31 16:01:31 +0000823 else:
tierno6869ae72020-01-09 17:37:34 +0000824 # Multi-segment case
garciadeblasebd66722019-01-31 16:01:31 +0000825 segment_list = []
tierno6869ae72020-01-09 17:37:34 +0000826 segment1_dict = {
sousaedu80135b92021-02-17 15:05:18 +0100827 "provider:physical_network": "",
828 "provider:network_type": "vxlan",
tierno6869ae72020-01-09 17:37:34 +0000829 }
garciadeblasebd66722019-01-31 16:01:31 +0000830 segment_list.append(segment1_dict)
tierno6869ae72020-01-09 17:37:34 +0000831 segment2_dict = {
832 "provider:physical_network": provider_physical_network,
sousaedu80135b92021-02-17 15:05:18 +0100833 "provider:network_type": "vlan",
tierno6869ae72020-01-09 17:37:34 +0000834 }
sousaedu80135b92021-02-17 15:05:18 +0100835
tierno6869ae72020-01-09 17:37:34 +0000836 if vlan:
837 segment2_dict["provider:segmentation_id"] = vlan
sousaedu80135b92021-02-17 15:05:18 +0100838 elif self.config.get("multisegment_vlan_range"):
garciadeblasebd66722019-01-31 16:01:31 +0000839 vlanID = self._generate_multisegment_vlanID()
840 segment2_dict["provider:segmentation_id"] = vlanID
sousaedu80135b92021-02-17 15:05:18 +0100841
garciadeblasebd66722019-01-31 16:01:31 +0000842 # else
tierno72774862020-05-04 11:44:15 +0000843 # raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100844 # "You must provide "multisegment_vlan_range" at config dict before creating a multisegment
tierno1ec592d2020-06-16 15:29:47 +0000845 # network")
garciadeblasebd66722019-01-31 16:01:31 +0000846 segment_list.append(segment2_dict)
847 network_dict["segments"] = segment_list
kate721d79b2017-06-24 04:21:38 -0700848
tierno6869ae72020-01-09 17:37:34 +0000849 # VIO Specific Changes. It needs a concrete VLAN
850 if self.vim_type == "VIO" and vlan is None:
sousaedu80135b92021-02-17 15:05:18 +0100851 if self.config.get("dataplane_net_vlan_range") is None:
tierno72774862020-05-04 11:44:15 +0000852 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100853 "You must provide 'dataplane_net_vlan_range' in format "
854 "[start_ID - end_ID] at VIM_config for creating underlay "
855 "networks"
856 )
857
tierno6869ae72020-01-09 17:37:34 +0000858 network_dict["provider:segmentation_id"] = self._generate_vlanID()
kate721d79b2017-06-24 04:21:38 -0700859
garciadeblasebd66722019-01-31 16:01:31 +0000860 network_dict["shared"] = shared
sousaedu80135b92021-02-17 15:05:18 +0100861
anwarsff168192019-05-06 11:23:07 +0530862 if self.config.get("disable_network_port_security"):
863 network_dict["port_security_enabled"] = False
sousaedu80135b92021-02-17 15:05:18 +0100864
sousaedu2aa5f802021-06-17 15:39:29 +0100865 if self.config.get("neutron_availability_zone_hints"):
866 hints = self.config.get("neutron_availability_zone_hints")
867
868 if isinstance(hints, str):
869 hints = [hints]
870
871 network_dict["availability_zone_hints"] = hints
872
sousaedu80135b92021-02-17 15:05:18 +0100873 new_net = self.neutron.create_network({"network": network_dict})
garciadeblasebd66722019-01-31 16:01:31 +0000874 # print new_net
875 # create subnetwork, even if there is no profile
sousaedu80135b92021-02-17 15:05:18 +0100876
garciadeblas9f8456e2016-09-05 05:02:59 +0200877 if not ip_profile:
878 ip_profile = {}
sousaedu80135b92021-02-17 15:05:18 +0100879
880 if not ip_profile.get("subnet_address"):
tierno1ec592d2020-06-16 15:29:47 +0000881 # Fake subnet is required
garciadeblas2299e3b2017-01-26 14:35:55 +0000882 subnet_rand = random.randint(0, 255)
sousaedu80135b92021-02-17 15:05:18 +0100883 ip_profile["subnet_address"] = "192.168.{}.0/24".format(subnet_rand)
884
885 if "ip_version" not in ip_profile:
886 ip_profile["ip_version"] = "IPv4"
887
888 subnet = {
889 "name": net_name + "-subnet",
890 "network_id": new_net["network"]["id"],
891 "ip_version": 4 if ip_profile["ip_version"] == "IPv4" else 6,
892 "cidr": ip_profile["subnet_address"],
893 }
894
tiernoa1fb4462017-06-30 12:25:50 +0200895 # Gateway should be set to None if not needed. Otherwise openstack assigns one by default
sousaedu80135b92021-02-17 15:05:18 +0100896 if ip_profile.get("gateway_address"):
897 subnet["gateway_ip"] = ip_profile["gateway_address"]
tierno55d234c2018-07-04 18:29:21 +0200898 else:
sousaedu80135b92021-02-17 15:05:18 +0100899 subnet["gateway_ip"] = None
900
901 if ip_profile.get("dns_address"):
902 subnet["dns_nameservers"] = ip_profile["dns_address"].split(";")
903
904 if "dhcp_enabled" in ip_profile:
905 subnet["enable_dhcp"] = (
906 False
907 if ip_profile["dhcp_enabled"] == "false"
908 or ip_profile["dhcp_enabled"] is False
909 else True
910 )
911
912 if ip_profile.get("dhcp_start_address"):
913 subnet["allocation_pools"] = []
914 subnet["allocation_pools"].append(dict())
915 subnet["allocation_pools"][0]["start"] = ip_profile[
916 "dhcp_start_address"
917 ]
918
919 if ip_profile.get("dhcp_count"):
920 # parts = ip_profile["dhcp_start_address"].split(".")
tierno1ec592d2020-06-16 15:29:47 +0000921 # ip_int = (int(parts[0]) << 24) + (int(parts[1]) << 16) + (int(parts[2]) << 8) + int(parts[3])
sousaedu80135b92021-02-17 15:05:18 +0100922 ip_int = int(netaddr.IPAddress(ip_profile["dhcp_start_address"]))
923 ip_int += ip_profile["dhcp_count"] - 1
garciadeblas9f8456e2016-09-05 05:02:59 +0200924 ip_str = str(netaddr.IPAddress(ip_int))
sousaedu80135b92021-02-17 15:05:18 +0100925 subnet["allocation_pools"][0]["end"] = ip_str
926
tierno1ec592d2020-06-16 15:29:47 +0000927 # self.logger.debug(">>>>>>>>>>>>>>>>>> Subnet: %s", str(subnet))
928 self.neutron.create_subnet({"subnet": subnet})
garciadeblasebd66722019-01-31 16:01:31 +0000929
sousaedu80135b92021-02-17 15:05:18 +0100930 if net_type == "data" and self.config.get("multisegment_support"):
931 if self.config.get("l2gw_support"):
garciadeblasebd66722019-01-31 16:01:31 +0000932 l2gw_list = self.neutron.list_l2_gateways().get("l2_gateways", ())
933 for l2gw in l2gw_list:
tierno1ec592d2020-06-16 15:29:47 +0000934 l2gw_conn = {
935 "l2_gateway_id": l2gw["id"],
936 "network_id": new_net["network"]["id"],
937 "segmentation_id": str(vlanID),
938 }
sousaedu80135b92021-02-17 15:05:18 +0100939 new_l2gw_conn = self.neutron.create_l2_gateway_connection(
940 {"l2_gateway_connection": l2gw_conn}
941 )
942 created_items[
943 "l2gwconn:"
944 + str(new_l2gw_conn["l2_gateway_connection"]["id"])
945 ] = True
946
garciadeblasebd66722019-01-31 16:01:31 +0000947 return new_net["network"]["id"], created_items
tierno41a69812018-02-16 14:34:33 +0100948 except Exception as e:
tierno1ec592d2020-06-16 15:29:47 +0000949 # delete l2gw connections (if any) before deleting the network
garciadeblasebd66722019-01-31 16:01:31 +0000950 for k, v in created_items.items():
951 if not v: # skip already deleted
952 continue
sousaedu80135b92021-02-17 15:05:18 +0100953
garciadeblasebd66722019-01-31 16:01:31 +0000954 try:
955 k_item, _, k_id = k.partition(":")
sousaedu80135b92021-02-17 15:05:18 +0100956
garciadeblasebd66722019-01-31 16:01:31 +0000957 if k_item == "l2gwconn":
958 self.neutron.delete_l2_gateway_connection(k_id)
959 except Exception as e2:
sousaedu80135b92021-02-17 15:05:18 +0100960 self.logger.error(
961 "Error deleting l2 gateway connection: {}: {}".format(
962 type(e2).__name__, e2
963 )
964 )
965
garciadeblasedca7b32016-09-29 14:01:52 +0000966 if new_net:
sousaedu80135b92021-02-17 15:05:18 +0100967 self.neutron.delete_network(new_net["network"]["id"])
968
tiernoae4a8d12016-07-08 12:30:39 +0200969 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +0100970
971 def get_network_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +0000972 """Obtain tenant networks of VIM
tierno7edb6752016-03-21 17:37:52 +0100973 Filter_dict can be:
974 name: network name
975 id: network uuid
976 shared: boolean
977 tenant_id: tenant
978 admin_state_up: boolean
979 status: 'ACTIVE'
980 Returns the network list of dictionaries
tierno1ec592d2020-06-16 15:29:47 +0000981 """
tiernoae4a8d12016-07-08 12:30:39 +0200982 self.logger.debug("Getting network from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +0100983
tierno7edb6752016-03-21 17:37:52 +0100984 try:
985 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +0100986 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +0100987
tierno69b590e2018-03-13 18:52:23 +0100988 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +0100989 # TODO check
990 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
991
tierno69b590e2018-03-13 18:52:23 +0100992 net_dict = self.neutron.list_networks(**filter_dict_os)
tierno00e3df72017-11-29 17:20:13 +0100993 net_list = net_dict["networks"]
tierno7edb6752016-03-21 17:37:52 +0100994 self.__net_os2mano(net_list)
sousaedu80135b92021-02-17 15:05:18 +0100995
tiernoae4a8d12016-07-08 12:30:39 +0200996 return net_list
sousaedu80135b92021-02-17 15:05:18 +0100997 except (
998 neExceptions.ConnectionFailed,
999 ksExceptions.ClientException,
1000 neExceptions.NeutronException,
1001 ConnectionError,
1002 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001003 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001004
tiernoae4a8d12016-07-08 12:30:39 +02001005 def get_network(self, net_id):
tierno1ec592d2020-06-16 15:29:47 +00001006 """Obtain details of network from VIM
1007 Returns the network information from a network id"""
tiernoae4a8d12016-07-08 12:30:39 +02001008 self.logger.debug(" Getting tenant network %s from VIM", net_id)
tierno1ec592d2020-06-16 15:29:47 +00001009 filter_dict = {"id": net_id}
tiernoae4a8d12016-07-08 12:30:39 +02001010 net_list = self.get_network_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01001011
tierno1ec592d2020-06-16 15:29:47 +00001012 if len(net_list) == 0:
sousaedu80135b92021-02-17 15:05:18 +01001013 raise vimconn.VimConnNotFoundException(
1014 "Network '{}' not found".format(net_id)
1015 )
tierno1ec592d2020-06-16 15:29:47 +00001016 elif len(net_list) > 1:
sousaedu80135b92021-02-17 15:05:18 +01001017 raise vimconn.VimConnConflictException(
1018 "Found more than one network with this criteria"
1019 )
1020
tierno7edb6752016-03-21 17:37:52 +01001021 net = net_list[0]
tierno1ec592d2020-06-16 15:29:47 +00001022 subnets = []
1023 for subnet_id in net.get("subnets", ()):
tierno7edb6752016-03-21 17:37:52 +01001024 try:
1025 subnet = self.neutron.show_subnet(subnet_id)
1026 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01001027 self.logger.error(
1028 "osconnector.get_network(): Error getting subnet %s %s"
1029 % (net_id, str(e))
1030 )
tiernoae4a8d12016-07-08 12:30:39 +02001031 subnet = {"id": subnet_id, "fault": str(e)}
sousaedu80135b92021-02-17 15:05:18 +01001032
tierno7edb6752016-03-21 17:37:52 +01001033 subnets.append(subnet)
sousaedu80135b92021-02-17 15:05:18 +01001034
tierno7edb6752016-03-21 17:37:52 +01001035 net["subnets"] = subnets
sousaedu80135b92021-02-17 15:05:18 +01001036 net["encapsulation"] = net.get("provider:network_type")
1037 net["encapsulation_type"] = net.get("provider:network_type")
1038 net["segmentation_id"] = net.get("provider:segmentation_id")
1039 net["encapsulation_id"] = net.get("provider:segmentation_id")
1040
tiernoae4a8d12016-07-08 12:30:39 +02001041 return net
tierno7edb6752016-03-21 17:37:52 +01001042
garciadeblasebd66722019-01-31 16:01:31 +00001043 def delete_network(self, net_id, created_items=None):
1044 """
1045 Removes a tenant network from VIM and its associated elements
1046 :param net_id: VIM identifier of the network, provided by method new_network
1047 :param created_items: dictionary with extra items to be deleted. provided by method new_network
1048 Returns the network identifier or raises an exception upon error or when network is not found
1049 """
tiernoae4a8d12016-07-08 12:30:39 +02001050 self.logger.debug("Deleting network '%s' from VIM", net_id)
sousaedu80135b92021-02-17 15:05:18 +01001051
tierno1ec592d2020-06-16 15:29:47 +00001052 if created_items is None:
garciadeblasebd66722019-01-31 16:01:31 +00001053 created_items = {}
sousaedu80135b92021-02-17 15:05:18 +01001054
tierno7edb6752016-03-21 17:37:52 +01001055 try:
1056 self._reload_connection()
tierno1ec592d2020-06-16 15:29:47 +00001057 # delete l2gw connections (if any) before deleting the network
garciadeblasebd66722019-01-31 16:01:31 +00001058 for k, v in created_items.items():
1059 if not v: # skip already deleted
1060 continue
sousaedu80135b92021-02-17 15:05:18 +01001061
garciadeblasebd66722019-01-31 16:01:31 +00001062 try:
1063 k_item, _, k_id = k.partition(":")
1064 if k_item == "l2gwconn":
1065 self.neutron.delete_l2_gateway_connection(k_id)
1066 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01001067 self.logger.error(
1068 "Error deleting l2 gateway connection: {}: {}".format(
1069 type(e).__name__, e
1070 )
1071 )
1072
tierno1ec592d2020-06-16 15:29:47 +00001073 # delete VM ports attached to this networks before the network
tierno7edb6752016-03-21 17:37:52 +01001074 ports = self.neutron.list_ports(network_id=net_id)
sousaedu80135b92021-02-17 15:05:18 +01001075 for p in ports["ports"]:
tierno7edb6752016-03-21 17:37:52 +01001076 try:
1077 self.neutron.delete_port(p["id"])
1078 except Exception as e:
tiernoae4a8d12016-07-08 12:30:39 +02001079 self.logger.error("Error deleting port %s: %s", p["id"], str(e))
sousaedu80135b92021-02-17 15:05:18 +01001080
tierno7edb6752016-03-21 17:37:52 +01001081 self.neutron.delete_network(net_id)
sousaedu80135b92021-02-17 15:05:18 +01001082
tiernoae4a8d12016-07-08 12:30:39 +02001083 return net_id
sousaedu80135b92021-02-17 15:05:18 +01001084 except (
1085 neExceptions.ConnectionFailed,
1086 neExceptions.NetworkNotFoundClient,
1087 neExceptions.NeutronException,
1088 ksExceptions.ClientException,
1089 neExceptions.NeutronException,
1090 ConnectionError,
1091 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001092 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001093
tiernoae4a8d12016-07-08 12:30:39 +02001094 def refresh_nets_status(self, net_list):
tierno1ec592d2020-06-16 15:29:47 +00001095 """Get the status of the networks
sousaedu80135b92021-02-17 15:05:18 +01001096 Params: the list of network identifiers
1097 Returns a dictionary with:
1098 net_id: #VIM id of this network
1099 status: #Mandatory. Text with one of:
1100 # DELETED (not found at vim)
1101 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
1102 # OTHER (Vim reported other status not understood)
1103 # ERROR (VIM indicates an ERROR status)
1104 # ACTIVE, INACTIVE, DOWN (admin down),
1105 # BUILD (on building process)
1106 #
1107 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
1108 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00001109 """
1110 net_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01001111
tiernoae4a8d12016-07-08 12:30:39 +02001112 for net_id in net_list:
1113 net = {}
sousaedu80135b92021-02-17 15:05:18 +01001114
tiernoae4a8d12016-07-08 12:30:39 +02001115 try:
1116 net_vim = self.get_network(net_id)
sousaedu80135b92021-02-17 15:05:18 +01001117
1118 if net_vim["status"] in netStatus2manoFormat:
1119 net["status"] = netStatus2manoFormat[net_vim["status"]]
tiernoae4a8d12016-07-08 12:30:39 +02001120 else:
1121 net["status"] = "OTHER"
sousaedu80135b92021-02-17 15:05:18 +01001122 net["error_msg"] = "VIM status reported " + net_vim["status"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001123
sousaedu80135b92021-02-17 15:05:18 +01001124 if net["status"] == "ACTIVE" and not net_vim["admin_state_up"]:
1125 net["status"] = "DOWN"
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01001126
sousaedu80135b92021-02-17 15:05:18 +01001127 net["vim_info"] = self.serialize(net_vim)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01001128
sousaedu80135b92021-02-17 15:05:18 +01001129 if net_vim.get("fault"): # TODO
1130 net["error_msg"] = str(net_vim["fault"])
tierno72774862020-05-04 11:44:15 +00001131 except vimconn.VimConnNotFoundException as e:
tiernoae4a8d12016-07-08 12:30:39 +02001132 self.logger.error("Exception getting net status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01001133 net["status"] = "DELETED"
1134 net["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00001135 except vimconn.VimConnException as e:
tiernoae4a8d12016-07-08 12:30:39 +02001136 self.logger.error("Exception getting net status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01001137 net["status"] = "VIM_ERROR"
1138 net["error_msg"] = str(e)
tiernoae4a8d12016-07-08 12:30:39 +02001139 net_dict[net_id] = net
1140 return net_dict
1141
1142 def get_flavor(self, flavor_id):
tierno1ec592d2020-06-16 15:29:47 +00001143 """Obtain flavor details from the VIM. Returns the flavor dict details"""
tiernoae4a8d12016-07-08 12:30:39 +02001144 self.logger.debug("Getting flavor '%s'", flavor_id)
sousaedu80135b92021-02-17 15:05:18 +01001145
tierno7edb6752016-03-21 17:37:52 +01001146 try:
1147 self._reload_connection()
1148 flavor = self.nova.flavors.find(id=flavor_id)
tierno1ec592d2020-06-16 15:29:47 +00001149 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
sousaedu80135b92021-02-17 15:05:18 +01001150
tiernoae4a8d12016-07-08 12:30:39 +02001151 return flavor.to_dict()
sousaedu80135b92021-02-17 15:05:18 +01001152 except (
1153 nvExceptions.NotFound,
1154 nvExceptions.ClientException,
1155 ksExceptions.ClientException,
1156 ConnectionError,
1157 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001158 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001159
tiernocf157a82017-01-30 14:07:06 +01001160 def get_flavor_id_from_data(self, flavor_dict):
1161 """Obtain flavor id that match the flavor description
sousaedu80135b92021-02-17 15:05:18 +01001162 Returns the flavor_id or raises a vimconnNotFoundException
1163 flavor_dict: contains the required ram, vcpus, disk
1164 If 'use_existing_flavors' is set to True at config, the closer flavor that provides same or more ram, vcpus
1165 and disk is returned. Otherwise a flavor with exactly same ram, vcpus and disk is returned or a
1166 vimconnNotFoundException is raised
tiernocf157a82017-01-30 14:07:06 +01001167 """
sousaedu80135b92021-02-17 15:05:18 +01001168 exact_match = False if self.config.get("use_existing_flavors") else True
1169
tiernocf157a82017-01-30 14:07:06 +01001170 try:
1171 self._reload_connection()
tiernoe26fc7a2017-05-30 14:43:03 +02001172 flavor_candidate_id = None
1173 flavor_candidate_data = (10000, 10000, 10000)
sousaedu80135b92021-02-17 15:05:18 +01001174 flavor_target = (
1175 flavor_dict["ram"],
1176 flavor_dict["vcpus"],
1177 flavor_dict["disk"],
sousaedu648ee3d2021-11-22 14:09:15 +00001178 flavor_dict.get("ephemeral", 0),
1179 flavor_dict.get("swap", 0),
sousaedu80135b92021-02-17 15:05:18 +01001180 )
tiernoe26fc7a2017-05-30 14:43:03 +02001181 # numa=None
anwarsae5f52c2019-04-22 10:35:27 +05301182 extended = flavor_dict.get("extended", {})
1183 if extended:
tierno1ec592d2020-06-16 15:29:47 +00001184 # TODO
sousaedu80135b92021-02-17 15:05:18 +01001185 raise vimconn.VimConnNotFoundException(
1186 "Flavor with EPA still not implemented"
1187 )
tiernocf157a82017-01-30 14:07:06 +01001188 # if len(numas) > 1:
tierno72774862020-05-04 11:44:15 +00001189 # raise vimconn.VimConnNotFoundException("Cannot find any flavor with more than one numa")
tiernocf157a82017-01-30 14:07:06 +01001190 # numa=numas[0]
1191 # numas = extended.get("numas")
1192 for flavor in self.nova.flavors.list():
1193 epa = flavor.get_keys()
sousaedu80135b92021-02-17 15:05:18 +01001194
tiernocf157a82017-01-30 14:07:06 +01001195 if epa:
1196 continue
tiernoe26fc7a2017-05-30 14:43:03 +02001197 # TODO
sousaedu80135b92021-02-17 15:05:18 +01001198
sousaedu648ee3d2021-11-22 14:09:15 +00001199 flavor_data = (
1200 flavor.ram,
1201 flavor.vcpus,
1202 flavor.disk,
1203 flavor.ephemeral,
preethika.pebaba1f2022-01-20 07:24:18 +00001204 flavor.swap if isinstance(flavor.swap, int) else 0,
sousaedu648ee3d2021-11-22 14:09:15 +00001205 )
tiernoe26fc7a2017-05-30 14:43:03 +02001206 if flavor_data == flavor_target:
1207 return flavor.id
sousaedu80135b92021-02-17 15:05:18 +01001208 elif (
1209 not exact_match
1210 and flavor_target < flavor_data < flavor_candidate_data
1211 ):
tiernoe26fc7a2017-05-30 14:43:03 +02001212 flavor_candidate_id = flavor.id
1213 flavor_candidate_data = flavor_data
sousaedu80135b92021-02-17 15:05:18 +01001214
tiernoe26fc7a2017-05-30 14:43:03 +02001215 if not exact_match and flavor_candidate_id:
1216 return flavor_candidate_id
sousaedu80135b92021-02-17 15:05:18 +01001217
1218 raise vimconn.VimConnNotFoundException(
1219 "Cannot find any flavor matching '{}'".format(flavor_dict)
1220 )
1221 except (
1222 nvExceptions.NotFound,
1223 nvExceptions.ClientException,
1224 ksExceptions.ClientException,
1225 ConnectionError,
1226 ) as e:
tiernocf157a82017-01-30 14:07:06 +01001227 self._format_exception(e)
1228
anwarsae5f52c2019-04-22 10:35:27 +05301229 def process_resource_quota(self, quota, prefix, extra_specs):
1230 """
1231 :param prefix:
borsatti8a2dda32019-12-18 15:08:57 +00001232 :param extra_specs:
anwarsae5f52c2019-04-22 10:35:27 +05301233 :return:
1234 """
sousaedu80135b92021-02-17 15:05:18 +01001235 if "limit" in quota:
1236 extra_specs["quota:" + prefix + "_limit"] = quota["limit"]
1237
1238 if "reserve" in quota:
1239 extra_specs["quota:" + prefix + "_reservation"] = quota["reserve"]
1240
1241 if "shares" in quota:
anwarsae5f52c2019-04-22 10:35:27 +05301242 extra_specs["quota:" + prefix + "_shares_level"] = "custom"
sousaedu80135b92021-02-17 15:05:18 +01001243 extra_specs["quota:" + prefix + "_shares_share"] = quota["shares"]
anwarsae5f52c2019-04-22 10:35:27 +05301244
tiernoae4a8d12016-07-08 12:30:39 +02001245 def new_flavor(self, flavor_data, change_name_if_used=True):
tierno1ec592d2020-06-16 15:29:47 +00001246 """Adds a tenant flavor to openstack VIM
1247 if change_name_if_used is True, it will change name in case of conflict, because it is not supported name
1248 repetition
tierno7edb6752016-03-21 17:37:52 +01001249 Returns the flavor identifier
tierno1ec592d2020-06-16 15:29:47 +00001250 """
tiernoae4a8d12016-07-08 12:30:39 +02001251 self.logger.debug("Adding flavor '%s'", str(flavor_data))
tierno1ec592d2020-06-16 15:29:47 +00001252 retry = 0
1253 max_retries = 3
tierno7edb6752016-03-21 17:37:52 +01001254 name_suffix = 0
sousaedu80135b92021-02-17 15:05:18 +01001255
anwarsc76a3ee2018-10-04 14:05:32 +05301256 try:
sousaedu80135b92021-02-17 15:05:18 +01001257 name = flavor_data["name"]
tierno1ec592d2020-06-16 15:29:47 +00001258 while retry < max_retries:
1259 retry += 1
anwarsc76a3ee2018-10-04 14:05:32 +05301260 try:
1261 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01001262
anwarsc76a3ee2018-10-04 14:05:32 +05301263 if change_name_if_used:
tierno1ec592d2020-06-16 15:29:47 +00001264 # get used names
1265 fl_names = []
1266 fl = self.nova.flavors.list()
sousaedu80135b92021-02-17 15:05:18 +01001267
anwarsc76a3ee2018-10-04 14:05:32 +05301268 for f in fl:
1269 fl_names.append(f.name)
sousaedu80135b92021-02-17 15:05:18 +01001270
anwarsc76a3ee2018-10-04 14:05:32 +05301271 while name in fl_names:
1272 name_suffix += 1
sousaedu80135b92021-02-17 15:05:18 +01001273 name = flavor_data["name"] + "-" + str(name_suffix)
kate721d79b2017-06-24 04:21:38 -07001274
sousaedu80135b92021-02-17 15:05:18 +01001275 ram = flavor_data.get("ram", 64)
1276 vcpus = flavor_data.get("vcpus", 1)
tierno1ec592d2020-06-16 15:29:47 +00001277 extra_specs = {}
tierno7edb6752016-03-21 17:37:52 +01001278
anwarsc76a3ee2018-10-04 14:05:32 +05301279 extended = flavor_data.get("extended")
1280 if extended:
tierno1ec592d2020-06-16 15:29:47 +00001281 numas = extended.get("numas")
sousaedu80135b92021-02-17 15:05:18 +01001282
anwarsc76a3ee2018-10-04 14:05:32 +05301283 if numas:
1284 numa_nodes = len(numas)
sousaedu80135b92021-02-17 15:05:18 +01001285
anwarsc76a3ee2018-10-04 14:05:32 +05301286 if numa_nodes > 1:
1287 return -1, "Can not add flavor with more than one numa"
sousaedu80135b92021-02-17 15:05:18 +01001288
anwarsae5f52c2019-04-22 10:35:27 +05301289 extra_specs["hw:numa_nodes"] = str(numa_nodes)
1290 extra_specs["hw:mem_page_size"] = "large"
1291 extra_specs["hw:cpu_policy"] = "dedicated"
1292 extra_specs["hw:numa_mempolicy"] = "strict"
sousaedu80135b92021-02-17 15:05:18 +01001293
anwarsc76a3ee2018-10-04 14:05:32 +05301294 if self.vim_type == "VIO":
sousaedu80135b92021-02-17 15:05:18 +01001295 extra_specs[
1296 "vmware:extra_config"
1297 ] = '{"numa.nodeAffinity":"0"}'
anwarsae5f52c2019-04-22 10:35:27 +05301298 extra_specs["vmware:latency_sensitivity_level"] = "high"
sousaedu80135b92021-02-17 15:05:18 +01001299
anwarsc76a3ee2018-10-04 14:05:32 +05301300 for numa in numas:
tierno1ec592d2020-06-16 15:29:47 +00001301 # overwrite ram and vcpus
sousaedu80135b92021-02-17 15:05:18 +01001302 # check if key "memory" is present in numa else use ram value at flavor
1303 if "memory" in numa:
1304 ram = numa["memory"] * 1024
tierno1ec592d2020-06-16 15:29:47 +00001305 # See for reference: https://specs.openstack.org/openstack/nova-specs/specs/mitaka/
1306 # implemented/virt-driver-cpu-thread-pinning.html
garciadeblasfa35a722019-04-11 19:15:49 +02001307 extra_specs["hw:cpu_sockets"] = 1
sousaedu80135b92021-02-17 15:05:18 +01001308
1309 if "paired-threads" in numa:
1310 vcpus = numa["paired-threads"] * 2
1311 # cpu_thread_policy "require" implies that the compute node must have an
tierno1ec592d2020-06-16 15:29:47 +00001312 # STM architecture
anwarsae5f52c2019-04-22 10:35:27 +05301313 extra_specs["hw:cpu_thread_policy"] = "require"
1314 extra_specs["hw:cpu_policy"] = "dedicated"
sousaedu80135b92021-02-17 15:05:18 +01001315 elif "cores" in numa:
1316 vcpus = numa["cores"]
1317 # cpu_thread_policy "prefer" implies that the host must not have an SMT
tierno1ec592d2020-06-16 15:29:47 +00001318 # architecture, or a non-SMT architecture will be emulated
anwarsae5f52c2019-04-22 10:35:27 +05301319 extra_specs["hw:cpu_thread_policy"] = "isolate"
1320 extra_specs["hw:cpu_policy"] = "dedicated"
sousaedu80135b92021-02-17 15:05:18 +01001321 elif "threads" in numa:
1322 vcpus = numa["threads"]
tierno1ec592d2020-06-16 15:29:47 +00001323 # cpu_thread_policy "prefer" implies that the host may or may not have an SMT
1324 # architecture
anwarsae5f52c2019-04-22 10:35:27 +05301325 extra_specs["hw:cpu_thread_policy"] = "prefer"
1326 extra_specs["hw:cpu_policy"] = "dedicated"
anwarsc76a3ee2018-10-04 14:05:32 +05301327 # for interface in numa.get("interfaces",() ):
1328 # if interface["dedicated"]=="yes":
tierno1ec592d2020-06-16 15:29:47 +00001329 # raise vimconn.VimConnException("Passthrough interfaces are not supported
1330 # for the openstack connector", http_code=vimconn.HTTP_Service_Unavailable)
sousaedu80135b92021-02-17 15:05:18 +01001331 # #TODO, add the key 'pci_passthrough:alias"="<label at config>:<number ifaces>"'
tierno1ec592d2020-06-16 15:29:47 +00001332 # when a way to connect it is available
anwarsae5f52c2019-04-22 10:35:27 +05301333 elif extended.get("cpu-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001334 self.process_resource_quota(
1335 extended.get("cpu-quota"), "cpu", extra_specs
1336 )
1337
anwarsae5f52c2019-04-22 10:35:27 +05301338 if extended.get("mem-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001339 self.process_resource_quota(
1340 extended.get("mem-quota"), "memory", extra_specs
1341 )
1342
anwarsae5f52c2019-04-22 10:35:27 +05301343 if extended.get("vif-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001344 self.process_resource_quota(
1345 extended.get("vif-quota"), "vif", extra_specs
1346 )
1347
anwarsae5f52c2019-04-22 10:35:27 +05301348 if extended.get("disk-io-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001349 self.process_resource_quota(
1350 extended.get("disk-io-quota"), "disk_io", extra_specs
1351 )
1352
rodriguezgar0dd83fd2022-05-15 00:42:45 +02001353 # Set the mempage size as specified in the descriptor
1354 if extended.get("mempage-size"):
1355 if extended.get("mempage-size") == "LARGE":
1356 extra_specs["hw:mem_page_size"] = "large"
1357 elif extended.get("mempage-size") == "SMALL":
1358 extra_specs["hw:mem_page_size"] = "small"
1359 elif extended.get("mempage-size") == "SIZE_2MB":
1360 extra_specs["hw:mem_page_size"] = "2MB"
1361 elif extended.get("mempage-size") == "SIZE_1GB":
1362 extra_specs["hw:mem_page_size"] = "1GB"
1363 elif extended.get("mempage-size") == "PREFER_LARGE":
1364 extra_specs["hw:mem_page_size"] = "any"
1365 else:
1366 # The validations in NBI should make reaching here not possible.
1367 # If this message is shown, check validations
1368 self.logger.debug(
1369 "Invalid mempage-size %s. Will be ignored",
1370 extended.get("mempage-size"),
1371 )
tierno1ec592d2020-06-16 15:29:47 +00001372 # create flavor
sousaedu80135b92021-02-17 15:05:18 +01001373 new_flavor = self.nova.flavors.create(
sousaeduf524da82021-11-22 14:02:17 +00001374 name=name,
1375 ram=ram,
1376 vcpus=vcpus,
1377 disk=flavor_data.get("disk", 0),
1378 ephemeral=flavor_data.get("ephemeral", 0),
sousaedu648ee3d2021-11-22 14:09:15 +00001379 swap=flavor_data.get("swap", 0),
sousaedu80135b92021-02-17 15:05:18 +01001380 is_public=flavor_data.get("is_public", True),
1381 )
tierno1ec592d2020-06-16 15:29:47 +00001382 # add metadata
anwarsae5f52c2019-04-22 10:35:27 +05301383 if extra_specs:
1384 new_flavor.set_keys(extra_specs)
sousaedu80135b92021-02-17 15:05:18 +01001385
anwarsc76a3ee2018-10-04 14:05:32 +05301386 return new_flavor.id
1387 except nvExceptions.Conflict as e:
1388 if change_name_if_used and retry < max_retries:
1389 continue
sousaedu80135b92021-02-17 15:05:18 +01001390
anwarsc76a3ee2018-10-04 14:05:32 +05301391 self._format_exception(e)
tierno1ec592d2020-06-16 15:29:47 +00001392 # except nvExceptions.BadRequest as e:
sousaedu80135b92021-02-17 15:05:18 +01001393 except (
1394 ksExceptions.ClientException,
1395 nvExceptions.ClientException,
1396 ConnectionError,
1397 KeyError,
1398 ) as e:
anwarsc76a3ee2018-10-04 14:05:32 +05301399 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001400
tierno1ec592d2020-06-16 15:29:47 +00001401 def delete_flavor(self, flavor_id):
sousaedu80135b92021-02-17 15:05:18 +01001402 """Deletes a tenant flavor from openstack VIM. Returns the old flavor_id"""
tiernoae4a8d12016-07-08 12:30:39 +02001403 try:
1404 self._reload_connection()
1405 self.nova.flavors.delete(flavor_id)
sousaedu80135b92021-02-17 15:05:18 +01001406
tiernoae4a8d12016-07-08 12:30:39 +02001407 return flavor_id
tierno1ec592d2020-06-16 15:29:47 +00001408 # except nvExceptions.BadRequest as e:
sousaedu80135b92021-02-17 15:05:18 +01001409 except (
1410 nvExceptions.NotFound,
1411 ksExceptions.ClientException,
1412 nvExceptions.ClientException,
1413 ConnectionError,
1414 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001415 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001416
tierno1ec592d2020-06-16 15:29:47 +00001417 def new_image(self, image_dict):
1418 """
tiernoae4a8d12016-07-08 12:30:39 +02001419 Adds a tenant image to VIM. imge_dict is a dictionary with:
1420 name: name
1421 disk_format: qcow2, vhd, vmdk, raw (by default), ...
1422 location: path or URI
1423 public: "yes" or "no"
1424 metadata: metadata of the image
1425 Returns the image_id
tierno1ec592d2020-06-16 15:29:47 +00001426 """
1427 retry = 0
1428 max_retries = 3
sousaedu80135b92021-02-17 15:05:18 +01001429
tierno1ec592d2020-06-16 15:29:47 +00001430 while retry < max_retries:
1431 retry += 1
tierno7edb6752016-03-21 17:37:52 +01001432 try:
1433 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01001434
tierno1ec592d2020-06-16 15:29:47 +00001435 # determine format http://docs.openstack.org/developer/glance/formats.html
tierno7edb6752016-03-21 17:37:52 +01001436 if "disk_format" in image_dict:
tierno1ec592d2020-06-16 15:29:47 +00001437 disk_format = image_dict["disk_format"]
1438 else: # autodiscover based on extension
sousaedu80135b92021-02-17 15:05:18 +01001439 if image_dict["location"].endswith(".qcow2"):
tierno1ec592d2020-06-16 15:29:47 +00001440 disk_format = "qcow2"
sousaedu80135b92021-02-17 15:05:18 +01001441 elif image_dict["location"].endswith(".vhd"):
tierno1ec592d2020-06-16 15:29:47 +00001442 disk_format = "vhd"
sousaedu80135b92021-02-17 15:05:18 +01001443 elif image_dict["location"].endswith(".vmdk"):
tierno1ec592d2020-06-16 15:29:47 +00001444 disk_format = "vmdk"
sousaedu80135b92021-02-17 15:05:18 +01001445 elif image_dict["location"].endswith(".vdi"):
tierno1ec592d2020-06-16 15:29:47 +00001446 disk_format = "vdi"
sousaedu80135b92021-02-17 15:05:18 +01001447 elif image_dict["location"].endswith(".iso"):
tierno1ec592d2020-06-16 15:29:47 +00001448 disk_format = "iso"
sousaedu80135b92021-02-17 15:05:18 +01001449 elif image_dict["location"].endswith(".aki"):
tierno1ec592d2020-06-16 15:29:47 +00001450 disk_format = "aki"
sousaedu80135b92021-02-17 15:05:18 +01001451 elif image_dict["location"].endswith(".ari"):
tierno1ec592d2020-06-16 15:29:47 +00001452 disk_format = "ari"
sousaedu80135b92021-02-17 15:05:18 +01001453 elif image_dict["location"].endswith(".ami"):
tierno1ec592d2020-06-16 15:29:47 +00001454 disk_format = "ami"
tierno7edb6752016-03-21 17:37:52 +01001455 else:
tierno1ec592d2020-06-16 15:29:47 +00001456 disk_format = "raw"
sousaedu80135b92021-02-17 15:05:18 +01001457
1458 self.logger.debug(
1459 "new_image: '%s' loading from '%s'",
1460 image_dict["name"],
1461 image_dict["location"],
1462 )
shashankjain3c83a212018-10-04 13:05:46 +05301463 if self.vim_type == "VIO":
1464 container_format = "bare"
sousaedu80135b92021-02-17 15:05:18 +01001465 if "container_format" in image_dict:
1466 container_format = image_dict["container_format"]
1467
1468 new_image = self.glance.images.create(
1469 name=image_dict["name"],
1470 container_format=container_format,
1471 disk_format=disk_format,
1472 )
shashankjain3c83a212018-10-04 13:05:46 +05301473 else:
sousaedu80135b92021-02-17 15:05:18 +01001474 new_image = self.glance.images.create(name=image_dict["name"])
1475
1476 if image_dict["location"].startswith("http"):
tierno1beea862018-07-11 15:47:37 +02001477 # TODO there is not a method to direct download. It must be downloaded locally with requests
tierno72774862020-05-04 11:44:15 +00001478 raise vimconn.VimConnNotImplemented("Cannot create image from URL")
tierno1ec592d2020-06-16 15:29:47 +00001479 else: # local path
sousaedu80135b92021-02-17 15:05:18 +01001480 with open(image_dict["location"]) as fimage:
tierno1beea862018-07-11 15:47:37 +02001481 self.glance.images.upload(new_image.id, fimage)
sousaedu80135b92021-02-17 15:05:18 +01001482 # new_image = self.glancev1.images.create(name=image_dict["name"], is_public=
1483 # image_dict.get("public","yes")=="yes",
tierno1beea862018-07-11 15:47:37 +02001484 # container_format="bare", data=fimage, disk_format=disk_format)
sousaedu80135b92021-02-17 15:05:18 +01001485
1486 metadata_to_load = image_dict.get("metadata")
1487
1488 # TODO location is a reserved word for current openstack versions. fixed for VIO please check
tierno1ec592d2020-06-16 15:29:47 +00001489 # for openstack
shashankjain3c83a212018-10-04 13:05:46 +05301490 if self.vim_type == "VIO":
sousaedu80135b92021-02-17 15:05:18 +01001491 metadata_to_load["upload_location"] = image_dict["location"]
shashankjain3c83a212018-10-04 13:05:46 +05301492 else:
sousaedu80135b92021-02-17 15:05:18 +01001493 metadata_to_load["location"] = image_dict["location"]
1494
tierno1beea862018-07-11 15:47:37 +02001495 self.glance.images.update(new_image.id, **metadata_to_load)
sousaedu80135b92021-02-17 15:05:18 +01001496
tiernoae4a8d12016-07-08 12:30:39 +02001497 return new_image.id
sousaedu80135b92021-02-17 15:05:18 +01001498 except (
1499 nvExceptions.Conflict,
1500 ksExceptions.ClientException,
1501 nvExceptions.ClientException,
1502 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001503 self._format_exception(e)
sousaedu80135b92021-02-17 15:05:18 +01001504 except (
1505 HTTPException,
1506 gl1Exceptions.HTTPException,
1507 gl1Exceptions.CommunicationError,
1508 ConnectionError,
1509 ) as e:
tierno1ec592d2020-06-16 15:29:47 +00001510 if retry == max_retries:
tiernoae4a8d12016-07-08 12:30:39 +02001511 continue
sousaedu80135b92021-02-17 15:05:18 +01001512
tiernoae4a8d12016-07-08 12:30:39 +02001513 self._format_exception(e)
tierno1ec592d2020-06-16 15:29:47 +00001514 except IOError as e: # can not open the file
sousaedu80135b92021-02-17 15:05:18 +01001515 raise vimconn.VimConnConnectionException(
1516 "{}: {} for {}".format(type(e).__name__, e, image_dict["location"]),
1517 http_code=vimconn.HTTP_Bad_Request,
1518 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001519
tiernoae4a8d12016-07-08 12:30:39 +02001520 def delete_image(self, image_id):
sousaedu80135b92021-02-17 15:05:18 +01001521 """Deletes a tenant image from openstack VIM. Returns the old id"""
tiernoae4a8d12016-07-08 12:30:39 +02001522 try:
1523 self._reload_connection()
tierno1beea862018-07-11 15:47:37 +02001524 self.glance.images.delete(image_id)
sousaedu80135b92021-02-17 15:05:18 +01001525
tiernoae4a8d12016-07-08 12:30:39 +02001526 return image_id
sousaedu80135b92021-02-17 15:05:18 +01001527 except (
1528 nvExceptions.NotFound,
1529 ksExceptions.ClientException,
1530 nvExceptions.ClientException,
1531 gl1Exceptions.CommunicationError,
1532 gl1Exceptions.HTTPNotFound,
1533 ConnectionError,
1534 ) as e: # TODO remove
tiernoae4a8d12016-07-08 12:30:39 +02001535 self._format_exception(e)
1536
1537 def get_image_id_from_path(self, path):
tierno1ec592d2020-06-16 15:29:47 +00001538 """Get the image id from image path in the VIM database. Returns the image_id"""
tiernoae4a8d12016-07-08 12:30:39 +02001539 try:
1540 self._reload_connection()
tierno1beea862018-07-11 15:47:37 +02001541 images = self.glance.images.list()
sousaedu80135b92021-02-17 15:05:18 +01001542
tiernoae4a8d12016-07-08 12:30:39 +02001543 for image in images:
tierno1ec592d2020-06-16 15:29:47 +00001544 if image.metadata.get("location") == path:
tiernoae4a8d12016-07-08 12:30:39 +02001545 return image.id
sousaedu80135b92021-02-17 15:05:18 +01001546
1547 raise vimconn.VimConnNotFoundException(
1548 "image with location '{}' not found".format(path)
1549 )
1550 except (
1551 ksExceptions.ClientException,
1552 nvExceptions.ClientException,
1553 gl1Exceptions.CommunicationError,
1554 ConnectionError,
1555 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001556 self._format_exception(e)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001557
garciadeblasb69fa9f2016-09-28 12:04:10 +02001558 def get_image_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +00001559 """Obtain tenant images from VIM
garciadeblasb69fa9f2016-09-28 12:04:10 +02001560 Filter_dict can be:
1561 id: image id
1562 name: image name
1563 checksum: image checksum
1564 Returns the image list of dictionaries:
1565 [{<the fields at Filter_dict plus some VIM specific>}, ...]
1566 List can be empty
tierno1ec592d2020-06-16 15:29:47 +00001567 """
garciadeblasb69fa9f2016-09-28 12:04:10 +02001568 self.logger.debug("Getting image list from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +01001569
garciadeblasb69fa9f2016-09-28 12:04:10 +02001570 try:
1571 self._reload_connection()
tierno1ec592d2020-06-16 15:29:47 +00001572 # filter_dict_os = filter_dict.copy()
1573 # First we filter by the available filter fields: name, id. The others are removed.
tierno1beea862018-07-11 15:47:37 +02001574 image_list = self.glance.images.list()
garciadeblasb69fa9f2016-09-28 12:04:10 +02001575 filtered_list = []
sousaedu80135b92021-02-17 15:05:18 +01001576
garciadeblasb69fa9f2016-09-28 12:04:10 +02001577 for image in image_list:
tierno3cb8dc32017-10-24 18:13:19 +02001578 try:
tierno1beea862018-07-11 15:47:37 +02001579 if filter_dict.get("name") and image["name"] != filter_dict["name"]:
1580 continue
sousaedu80135b92021-02-17 15:05:18 +01001581
tierno1beea862018-07-11 15:47:37 +02001582 if filter_dict.get("id") and image["id"] != filter_dict["id"]:
1583 continue
sousaedu80135b92021-02-17 15:05:18 +01001584
1585 if (
1586 filter_dict.get("checksum")
1587 and image["checksum"] != filter_dict["checksum"]
1588 ):
tierno1beea862018-07-11 15:47:37 +02001589 continue
1590
1591 filtered_list.append(image.copy())
tierno3cb8dc32017-10-24 18:13:19 +02001592 except gl1Exceptions.HTTPNotFound:
1593 pass
sousaedu80135b92021-02-17 15:05:18 +01001594
garciadeblasb69fa9f2016-09-28 12:04:10 +02001595 return filtered_list
sousaedu80135b92021-02-17 15:05:18 +01001596 except (
1597 ksExceptions.ClientException,
1598 nvExceptions.ClientException,
1599 gl1Exceptions.CommunicationError,
1600 ConnectionError,
1601 ) as e:
garciadeblasb69fa9f2016-09-28 12:04:10 +02001602 self._format_exception(e)
1603
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001604 def __wait_for_vm(self, vm_id, status):
1605 """wait until vm is in the desired status and return True.
1606 If the VM gets in ERROR status, return false.
1607 If the timeout is reached generate an exception"""
1608 elapsed_time = 0
1609 while elapsed_time < server_timeout:
1610 vm_status = self.nova.servers.get(vm_id).status
sousaedu80135b92021-02-17 15:05:18 +01001611
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001612 if vm_status == status:
1613 return True
sousaedu80135b92021-02-17 15:05:18 +01001614
1615 if vm_status == "ERROR":
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001616 return False
sousaedu80135b92021-02-17 15:05:18 +01001617
tierno1df468d2018-07-06 14:25:16 +02001618 time.sleep(5)
1619 elapsed_time += 5
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001620
1621 # if we exceeded the timeout rollback
1622 if elapsed_time >= server_timeout:
sousaedu80135b92021-02-17 15:05:18 +01001623 raise vimconn.VimConnException(
1624 "Timeout waiting for instance " + vm_id + " to get " + status,
1625 http_code=vimconn.HTTP_Request_Timeout,
1626 )
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001627
mirabal29356312017-07-27 12:21:22 +02001628 def _get_openstack_availablity_zones(self):
1629 """
1630 Get from openstack availability zones available
1631 :return:
1632 """
1633 try:
1634 openstack_availability_zone = self.nova.availability_zones.list()
sousaedu80135b92021-02-17 15:05:18 +01001635 openstack_availability_zone = [
1636 str(zone.zoneName)
1637 for zone in openstack_availability_zone
1638 if zone.zoneName != "internal"
1639 ]
1640
mirabal29356312017-07-27 12:21:22 +02001641 return openstack_availability_zone
tierno1ec592d2020-06-16 15:29:47 +00001642 except Exception:
mirabal29356312017-07-27 12:21:22 +02001643 return None
1644
1645 def _set_availablity_zones(self):
1646 """
1647 Set vim availablity zone
1648 :return:
1649 """
sousaedu80135b92021-02-17 15:05:18 +01001650 if "availability_zone" in self.config:
1651 vim_availability_zones = self.config.get("availability_zone")
mirabal29356312017-07-27 12:21:22 +02001652
mirabal29356312017-07-27 12:21:22 +02001653 if isinstance(vim_availability_zones, str):
1654 self.availability_zone = [vim_availability_zones]
1655 elif isinstance(vim_availability_zones, list):
1656 self.availability_zone = vim_availability_zones
1657 else:
1658 self.availability_zone = self._get_openstack_availablity_zones()
1659
sousaedu80135b92021-02-17 15:05:18 +01001660 def _get_vm_availability_zone(
1661 self, availability_zone_index, availability_zone_list
1662 ):
mirabal29356312017-07-27 12:21:22 +02001663 """
tierno5a3273c2017-08-29 11:43:46 +02001664 Return thge availability zone to be used by the created VM.
1665 :return: The VIM availability zone to be used or None
mirabal29356312017-07-27 12:21:22 +02001666 """
tierno5a3273c2017-08-29 11:43:46 +02001667 if availability_zone_index is None:
sousaedu80135b92021-02-17 15:05:18 +01001668 if not self.config.get("availability_zone"):
tierno5a3273c2017-08-29 11:43:46 +02001669 return None
sousaedu80135b92021-02-17 15:05:18 +01001670 elif isinstance(self.config.get("availability_zone"), str):
1671 return self.config["availability_zone"]
tierno5a3273c2017-08-29 11:43:46 +02001672 else:
1673 # TODO consider using a different parameter at config for default AV and AV list match
sousaedu80135b92021-02-17 15:05:18 +01001674 return self.config["availability_zone"][0]
mirabal29356312017-07-27 12:21:22 +02001675
tierno5a3273c2017-08-29 11:43:46 +02001676 vim_availability_zones = self.availability_zone
1677 # check if VIM offer enough availability zones describe in the VNFD
sousaedu80135b92021-02-17 15:05:18 +01001678 if vim_availability_zones and len(availability_zone_list) <= len(
1679 vim_availability_zones
1680 ):
tierno5a3273c2017-08-29 11:43:46 +02001681 # check if all the names of NFV AV match VIM AV names
1682 match_by_index = False
1683 for av in availability_zone_list:
1684 if av not in vim_availability_zones:
1685 match_by_index = True
1686 break
sousaedu80135b92021-02-17 15:05:18 +01001687
tierno5a3273c2017-08-29 11:43:46 +02001688 if match_by_index:
1689 return vim_availability_zones[availability_zone_index]
1690 else:
1691 return availability_zone_list[availability_zone_index]
mirabal29356312017-07-27 12:21:22 +02001692 else:
sousaedu80135b92021-02-17 15:05:18 +01001693 raise vimconn.VimConnConflictException(
1694 "No enough availability zones at VIM for this deployment"
1695 )
mirabal29356312017-07-27 12:21:22 +02001696
sousaedu80135b92021-02-17 15:05:18 +01001697 def new_vminstance(
1698 self,
1699 name,
1700 description,
1701 start,
1702 image_id,
1703 flavor_id,
Alexis Romerob70f4ed2022-03-11 18:00:49 +01001704 affinity_group_list,
sousaedu80135b92021-02-17 15:05:18 +01001705 net_list,
1706 cloud_config=None,
1707 disk_list=None,
1708 availability_zone_index=None,
1709 availability_zone_list=None,
1710 ):
tierno98e909c2017-10-14 13:27:03 +02001711 """Adds a VM instance to VIM
tierno7edb6752016-03-21 17:37:52 +01001712 Params:
1713 start: indicates if VM must start or boot in pause mode. Ignored
Alexis Romerob70f4ed2022-03-11 18:00:49 +01001714 image_id,flavor_id: image and flavor uuid
1715 affinity_group_list: list of affinity groups, each one is a dictionary.
1716 Ignore if empty.
tierno7edb6752016-03-21 17:37:52 +01001717 net_list: list of interfaces, each one is a dictionary with:
1718 name:
1719 net_id: network uuid to connect
1720 vpci: virtual vcpi to assign, ignored because openstack lack #TODO
1721 model: interface model, ignored #TODO
1722 mac_address: used for SR-IOV ifaces #TODO for other types
1723 use: 'data', 'bridge', 'mgmt'
tierno66eba6e2017-11-10 17:09:18 +01001724 type: 'virtual', 'PCI-PASSTHROUGH'('PF'), 'SR-IOV'('VF'), 'VFnotShared'
tierno7edb6752016-03-21 17:37:52 +01001725 vim_id: filled/added by this function
ahmadsaf853d452016-12-22 11:33:47 +05001726 floating_ip: True/False (or it can be None)
tierno70eeb182020-10-19 16:38:00 +00001727 port_security: True/False
tierno41a69812018-02-16 14:34:33 +01001728 'cloud_config': (optional) dictionary with:
tierno1d213f42020-04-24 14:02:51 +00001729 'key-pairs': (optional) list of strings with the public key to be inserted to the default user
1730 'users': (optional) list of users to be inserted, each item is a dict with:
1731 'name': (mandatory) user name,
1732 'key-pairs': (optional) list of strings with the public key to be inserted to the user
1733 'user-data': (optional) string is a text script to be passed directly to cloud-init
1734 'config-files': (optional). List of files to be transferred. Each item is a dict with:
1735 'dest': (mandatory) string with the destination absolute path
1736 'encoding': (optional, by default text). Can be one of:
1737 'b64', 'base64', 'gz', 'gz+b64', 'gz+base64', 'gzip+b64', 'gzip+base64'
1738 'content' (mandatory): string with the content of the file
1739 'permissions': (optional) string with file permissions, typically octal notation '0644'
1740 'owner': (optional) file owner, string with the format 'owner:group'
1741 'boot-data-drive': boolean to indicate if user-data must be passed using a boot drive (hard disk)
mirabal29356312017-07-27 12:21:22 +02001742 'disk_list': (optional) list with additional disks to the VM. Each item is a dict with:
1743 'image_id': (optional). VIM id of an existing image. If not provided an empty disk must be mounted
1744 'size': (mandatory) string with the size of the disk in GB
tierno1df468d2018-07-06 14:25:16 +02001745 'vim_id' (optional) should use this existing volume id
tierno5a3273c2017-08-29 11:43:46 +02001746 availability_zone_index: Index of availability_zone_list to use for this this VM. None if not AV required
1747 availability_zone_list: list of availability zones given by user in the VNFD descriptor. Ignore if
1748 availability_zone_index is None
tierno7edb6752016-03-21 17:37:52 +01001749 #TODO ip, security groups
tierno98e909c2017-10-14 13:27:03 +02001750 Returns a tuple with the instance identifier and created_items or raises an exception on error
1751 created_items can be None or a dictionary where this method can include key-values that will be passed to
1752 the method delete_vminstance and action_vminstance. Can be used to store created ports, volumes, etc.
1753 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
1754 as not present.
1755 """
sousaedu80135b92021-02-17 15:05:18 +01001756 self.logger.debug(
1757 "new_vminstance input: image='%s' flavor='%s' nics='%s'",
1758 image_id,
1759 flavor_id,
1760 str(net_list),
1761 )
1762
tierno7edb6752016-03-21 17:37:52 +01001763 try:
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001764 server = None
tierno98e909c2017-10-14 13:27:03 +02001765 created_items = {}
tiernob0b9dab2017-10-14 14:25:20 +02001766 # metadata = {}
tierno98e909c2017-10-14 13:27:03 +02001767 net_list_vim = []
tierno1ec592d2020-06-16 15:29:47 +00001768 external_network = []
1769 # ^list of external networks to be connected to instance, later on used to create floating_ip
sousaedu80135b92021-02-17 15:05:18 +01001770 no_secured_ports = [] # List of port-is with port-security disabled
tierno7edb6752016-03-21 17:37:52 +01001771 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01001772 # metadata_vpci = {} # For a specific neutron plugin
tiernob84cbdc2017-07-07 14:30:30 +02001773 block_device_mapping = None
tiernoa05b65a2019-02-01 12:30:27 +00001774
tierno7edb6752016-03-21 17:37:52 +01001775 for net in net_list:
sousaedu80135b92021-02-17 15:05:18 +01001776 if not net.get("net_id"): # skip non connected iface
tierno7edb6752016-03-21 17:37:52 +01001777 continue
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001778
tiernoa05b65a2019-02-01 12:30:27 +00001779 port_dict = {
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001780 "network_id": net["net_id"],
1781 "name": net.get("name"),
sousaedu80135b92021-02-17 15:05:18 +01001782 "admin_state_up": True,
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001783 }
sousaedu80135b92021-02-17 15:05:18 +01001784
1785 if (
1786 self.config.get("security_groups")
1787 and net.get("port_security") is not False
1788 and not self.config.get("no_port_security_extension")
1789 ):
tiernoa05b65a2019-02-01 12:30:27 +00001790 if not self.security_groups_id:
1791 self._get_ids_from_name()
sousaedu80135b92021-02-17 15:05:18 +01001792
tiernoa05b65a2019-02-01 12:30:27 +00001793 port_dict["security_groups"] = self.security_groups_id
1794
tierno1ec592d2020-06-16 15:29:47 +00001795 if net["type"] == "virtual":
tiernob0b9dab2017-10-14 14:25:20 +02001796 pass
1797 # if "vpci" in net:
1798 # metadata_vpci[ net["net_id"] ] = [[ net["vpci"], "" ]]
tierno66eba6e2017-11-10 17:09:18 +01001799 elif net["type"] == "VF" or net["type"] == "SR-IOV": # for VF
tiernob0b9dab2017-10-14 14:25:20 +02001800 # if "vpci" in net:
1801 # if "VF" not in metadata_vpci:
1802 # metadata_vpci["VF"]=[]
1803 # metadata_vpci["VF"].append([ net["vpci"], "" ])
tierno1ec592d2020-06-16 15:29:47 +00001804 port_dict["binding:vnic_type"] = "direct"
sousaedu80135b92021-02-17 15:05:18 +01001805
tiernob0b9dab2017-10-14 14:25:20 +02001806 # VIO specific Changes
kate721d79b2017-06-24 04:21:38 -07001807 if self.vim_type == "VIO":
tiernob0b9dab2017-10-14 14:25:20 +02001808 # Need to create port with port_security_enabled = False and no-security-groups
tierno1ec592d2020-06-16 15:29:47 +00001809 port_dict["port_security_enabled"] = False
1810 port_dict["provider_security_groups"] = []
1811 port_dict["security_groups"] = []
sousaedu80135b92021-02-17 15:05:18 +01001812 else: # For PT PCI-PASSTHROUGH
tiernob0b9dab2017-10-14 14:25:20 +02001813 # if "vpci" in net:
1814 # if "PF" not in metadata_vpci:
1815 # metadata_vpci["PF"]=[]
1816 # metadata_vpci["PF"].append([ net["vpci"], "" ])
tierno1ec592d2020-06-16 15:29:47 +00001817 port_dict["binding:vnic_type"] = "direct-physical"
sousaedu80135b92021-02-17 15:05:18 +01001818
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001819 if not port_dict["name"]:
tierno1ec592d2020-06-16 15:29:47 +00001820 port_dict["name"] = name
sousaedu80135b92021-02-17 15:05:18 +01001821
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001822 if net.get("mac_address"):
tierno1ec592d2020-06-16 15:29:47 +00001823 port_dict["mac_address"] = net["mac_address"]
sousaedu80135b92021-02-17 15:05:18 +01001824
tierno41a69812018-02-16 14:34:33 +01001825 if net.get("ip_address"):
sousaedu80135b92021-02-17 15:05:18 +01001826 port_dict["fixed_ips"] = [{"ip_address": net["ip_address"]}]
1827 # TODO add "subnet_id": <subnet_id>
1828
tierno1ec592d2020-06-16 15:29:47 +00001829 new_port = self.neutron.create_port({"port": port_dict})
tierno00e3df72017-11-29 17:20:13 +01001830 created_items["port:" + str(new_port["port"]["id"])] = True
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001831 net["mac_adress"] = new_port["port"]["mac_address"]
1832 net["vim_id"] = new_port["port"]["id"]
tiernob84cbdc2017-07-07 14:30:30 +02001833 # if try to use a network without subnetwork, it will return a emtpy list
1834 fixed_ips = new_port["port"].get("fixed_ips")
sousaedu80135b92021-02-17 15:05:18 +01001835
tiernob84cbdc2017-07-07 14:30:30 +02001836 if fixed_ips:
1837 net["ip"] = fixed_ips[0].get("ip_address")
1838 else:
1839 net["ip"] = None
montesmoreno994a29d2017-08-22 11:23:06 +02001840
1841 port = {"port-id": new_port["port"]["id"]}
1842 if float(self.nova.api_version.get_string()) >= 2.32:
1843 port["tag"] = new_port["port"]["name"]
sousaedu80135b92021-02-17 15:05:18 +01001844
montesmoreno994a29d2017-08-22 11:23:06 +02001845 net_list_vim.append(port)
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02001846
sousaedu80135b92021-02-17 15:05:18 +01001847 if net.get("floating_ip", False):
1848 net["exit_on_floating_ip_error"] = True
ahmadsaf853d452016-12-22 11:33:47 +05001849 external_network.append(net)
sousaedu80135b92021-02-17 15:05:18 +01001850 elif net["use"] == "mgmt" and self.config.get("use_floating_ip"):
1851 net["exit_on_floating_ip_error"] = False
tiernof8383b82017-01-18 15:49:48 +01001852 external_network.append(net)
sousaedu80135b92021-02-17 15:05:18 +01001853 net["floating_ip"] = self.config.get("use_floating_ip")
tiernof8383b82017-01-18 15:49:48 +01001854
tierno1ec592d2020-06-16 15:29:47 +00001855 # If port security is disabled when the port has not yet been attached to the VM, then all vm traffic
1856 # is dropped.
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001857 # As a workaround we wait until the VM is active and then disable the port-security
sousaedu80135b92021-02-17 15:05:18 +01001858 if net.get("port_security") is False and not self.config.get(
1859 "no_port_security_extension"
1860 ):
1861 no_secured_ports.append(
1862 (
1863 new_port["port"]["id"],
1864 net.get("port_security_disable_strategy"),
1865 )
1866 )
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001867
tiernob0b9dab2017-10-14 14:25:20 +02001868 # if metadata_vpci:
1869 # metadata = {"pci_assignement": json.dumps(metadata_vpci)}
1870 # if len(metadata["pci_assignement"]) >255:
1871 # #limit the metadata size
1872 # #metadata["pci_assignement"] = metadata["pci_assignement"][0:255]
1873 # self.logger.warn("Metadata deleted since it exceeds the expected length (255) ")
1874 # metadata = {}
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001875
sousaedu80135b92021-02-17 15:05:18 +01001876 self.logger.debug(
1877 "name '%s' image_id '%s'flavor_id '%s' net_list_vim '%s' description '%s'",
1878 name,
1879 image_id,
1880 flavor_id,
1881 str(net_list_vim),
1882 description,
1883 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001884
tierno98e909c2017-10-14 13:27:03 +02001885 # cloud config
tierno0a1437e2017-10-02 00:17:43 +02001886 config_drive, userdata = self._create_user_data(cloud_config)
montesmoreno0c8def02016-12-22 12:16:23 +00001887
Alexis Romero247cc432022-05-12 13:23:25 +02001888 # get availability Zone
1889 vm_av_zone = self._get_vm_availability_zone(
1890 availability_zone_index, availability_zone_list
1891 )
1892
tierno98e909c2017-10-14 13:27:03 +02001893 # Create additional volumes in case these are present in disk_list
palaciosj8f2060b2022-02-24 12:05:59 +00001894 existing_vim_volumes = []
sousaedu80135b92021-02-17 15:05:18 +01001895 base_disk_index = ord("b")
aticig179e0022022-03-29 13:15:45 +03001896 boot_volume_id = None
tierno1df468d2018-07-06 14:25:16 +02001897 if disk_list:
tiernob84cbdc2017-07-07 14:30:30 +02001898 block_device_mapping = {}
montesmoreno0c8def02016-12-22 12:16:23 +00001899 for disk in disk_list:
aticigcf14bb12022-05-19 13:03:17 +03001900 if "image_id" in disk:
1901 # persistent root volume
1902 base_disk_index = ord("a")
1903 image_id = ""
aticig343c5202022-06-25 23:31:19 +03001904 # use existing persistent root volume
aticigcf14bb12022-05-19 13:03:17 +03001905 if disk.get("vim_volume_id"):
aticigcf14bb12022-05-19 13:03:17 +03001906 block_device_mapping["vd" + chr(base_disk_index)] = disk[
1907 "vim_volume_id"
1908 ]
1909 existing_vim_volumes.append({"id": disk["vim_volume_id"]})
aticig343c5202022-06-25 23:31:19 +03001910 # use existing persistent root volume
1911 elif disk.get("vim_id"):
1912 block_device_mapping["vd" + chr(base_disk_index)] = disk[
1913 "vim_id"
1914 ]
1915 existing_vim_volumes.append({"id": disk["vim_id"]})
aticigcf14bb12022-05-19 13:03:17 +03001916 else:
1917 # create persistent root volume
sousaedu80135b92021-02-17 15:05:18 +01001918 volume = self.cinder.volumes.create(
1919 size=disk["size"],
aticigcf14bb12022-05-19 13:03:17 +03001920 name=name + "vd" + chr(base_disk_index),
sousaedu80135b92021-02-17 15:05:18 +01001921 imageRef=disk["image_id"],
Alexis Romero247cc432022-05-12 13:23:25 +02001922 # Make sure volume is in the same AZ as the VM to be attached to
1923 availability_zone=vm_av_zone,
sousaedu80135b92021-02-17 15:05:18 +01001924 )
aticig179e0022022-03-29 13:15:45 +03001925 boot_volume_id = volume.id
aticigcf14bb12022-05-19 13:03:17 +03001926 created_items["volume:" + str(volume.id)] = True
1927 block_device_mapping[
1928 "vd" + chr(base_disk_index)
1929 ] = volume.id
1930 else:
1931 # non-root persistent volume
aticig343c5202022-06-25 23:31:19 +03001932 key_id = (
1933 "vim_volume_id"
1934 if "vim_volume_id" in disk.keys()
1935 else "vim_id"
1936 )
1937 if disk.get(key_id):
aticigcf14bb12022-05-19 13:03:17 +03001938 # use existing persistent volume
1939 block_device_mapping["vd" + chr(base_disk_index)] = disk[
aticig343c5202022-06-25 23:31:19 +03001940 key_id
aticigcf14bb12022-05-19 13:03:17 +03001941 ]
aticig343c5202022-06-25 23:31:19 +03001942 existing_vim_volumes.append({"id": disk[key_id]})
tierno1df468d2018-07-06 14:25:16 +02001943 else:
aticigcf14bb12022-05-19 13:03:17 +03001944 # create persistent volume
sousaedu80135b92021-02-17 15:05:18 +01001945 volume = self.cinder.volumes.create(
1946 size=disk["size"],
aticigcf14bb12022-05-19 13:03:17 +03001947 name=name + "vd" + chr(base_disk_index),
Alexis Romero247cc432022-05-12 13:23:25 +02001948 # Make sure volume is in the same AZ as the VM to be attached to
1949 availability_zone=vm_av_zone,
sousaedu80135b92021-02-17 15:05:18 +01001950 )
aticigcf14bb12022-05-19 13:03:17 +03001951 created_items["volume:" + str(volume.id)] = True
1952 block_device_mapping[
1953 "vd" + chr(base_disk_index)
1954 ] = volume.id
sousaedu80135b92021-02-17 15:05:18 +01001955
montesmoreno0c8def02016-12-22 12:16:23 +00001956 base_disk_index += 1
1957
tierno1df468d2018-07-06 14:25:16 +02001958 # Wait until created volumes are with status available
montesmoreno0c8def02016-12-22 12:16:23 +00001959 elapsed_time = 0
tierno1df468d2018-07-06 14:25:16 +02001960 while elapsed_time < volume_timeout:
1961 for created_item in created_items:
1962 v, _, volume_id = created_item.partition(":")
sousaedu80135b92021-02-17 15:05:18 +01001963 if v == "volume":
1964 if self.cinder.volumes.get(volume_id).status != "available":
tierno1df468d2018-07-06 14:25:16 +02001965 break
1966 else: # all ready: break from while
1967 break
sousaedu80135b92021-02-17 15:05:18 +01001968
tierno1df468d2018-07-06 14:25:16 +02001969 time.sleep(5)
1970 elapsed_time += 5
sousaedu80135b92021-02-17 15:05:18 +01001971
palaciosj8f2060b2022-02-24 12:05:59 +00001972 # Wait until existing volumes in vim are with status available
1973 while elapsed_time < volume_timeout:
1974 for volume in existing_vim_volumes:
1975 if self.cinder.volumes.get(volume["id"]).status != "available":
1976 break
1977 else: # all ready: break from while
1978 break
1979
1980 time.sleep(5)
1981 elapsed_time += 5
1982
tiernob0b9dab2017-10-14 14:25:20 +02001983 # If we exceeded the timeout rollback
montesmoreno0c8def02016-12-22 12:16:23 +00001984 if elapsed_time >= volume_timeout:
sousaedu80135b92021-02-17 15:05:18 +01001985 raise vimconn.VimConnException(
1986 "Timeout creating volumes for instance " + name,
1987 http_code=vimconn.HTTP_Request_Timeout,
1988 )
aticig179e0022022-03-29 13:15:45 +03001989 if boot_volume_id:
1990 self.cinder.volumes.set_bootable(boot_volume_id, True)
montesmoreno0c8def02016-12-22 12:16:23 +00001991
Alexis Romerob70f4ed2022-03-11 18:00:49 +01001992 # Manage affinity groups/server groups
1993 server_group_id = None
1994 scheduller_hints = {}
1995
1996 if affinity_group_list:
1997 # Only first id on the list will be used. Openstack restriction
1998 server_group_id = affinity_group_list[0]["affinity_group_id"]
1999 scheduller_hints["group"] = server_group_id
2000
sousaedu80135b92021-02-17 15:05:18 +01002001 self.logger.debug(
2002 "nova.servers.create({}, {}, {}, nics={}, security_groups={}, "
2003 "availability_zone={}, key_name={}, userdata={}, config_drive={}, "
Alexis Romerob70f4ed2022-03-11 18:00:49 +01002004 "block_device_mapping={}, server_group={})".format(
sousaedu80135b92021-02-17 15:05:18 +01002005 name,
2006 image_id,
2007 flavor_id,
2008 net_list_vim,
2009 self.config.get("security_groups"),
2010 vm_av_zone,
2011 self.config.get("keypair"),
2012 userdata,
2013 config_drive,
2014 block_device_mapping,
Alexis Romerob70f4ed2022-03-11 18:00:49 +01002015 server_group_id,
sousaedu80135b92021-02-17 15:05:18 +01002016 )
2017 )
2018 server = self.nova.servers.create(
aticigcf14bb12022-05-19 13:03:17 +03002019 name=name,
2020 image=image_id,
2021 flavor=flavor_id,
sousaedu80135b92021-02-17 15:05:18 +01002022 nics=net_list_vim,
2023 security_groups=self.config.get("security_groups"),
2024 # TODO remove security_groups in future versions. Already at neutron port
2025 availability_zone=vm_av_zone,
2026 key_name=self.config.get("keypair"),
2027 userdata=userdata,
2028 config_drive=config_drive,
2029 block_device_mapping=block_device_mapping,
Alexis Romerob70f4ed2022-03-11 18:00:49 +01002030 scheduler_hints=scheduller_hints,
sousaedu80135b92021-02-17 15:05:18 +01002031 ) # , description=description)
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002032
tierno326fd5e2018-02-22 11:58:59 +01002033 vm_start_time = time.time()
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002034 # Previously mentioned workaround to wait until the VM is active and then disable the port-security
2035 if no_secured_ports:
sousaedu80135b92021-02-17 15:05:18 +01002036 self.__wait_for_vm(server.id, "ACTIVE")
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002037
bravof7a1f5252020-10-20 10:27:42 -03002038 for port in no_secured_ports:
2039 port_update = {
sousaedu80135b92021-02-17 15:05:18 +01002040 "port": {"port_security_enabled": False, "security_groups": None}
bravof7a1f5252020-10-20 10:27:42 -03002041 }
2042
2043 if port[1] == "allow-address-pairs":
2044 port_update = {
sousaedu80135b92021-02-17 15:05:18 +01002045 "port": {"allowed_address_pairs": [{"ip_address": "0.0.0.0/0"}]}
bravof7a1f5252020-10-20 10:27:42 -03002046 }
2047
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002048 try:
bravof7a1f5252020-10-20 10:27:42 -03002049 self.neutron.update_port(port[0], port_update)
tierno1ec592d2020-06-16 15:29:47 +00002050 except Exception:
bravof7a1f5252020-10-20 10:27:42 -03002051 raise vimconn.VimConnException(
sousaedu80135b92021-02-17 15:05:18 +01002052 "It was not possible to disable port security for port {}".format(
2053 port[0]
2054 )
bravof7a1f5252020-10-20 10:27:42 -03002055 )
2056
tierno98e909c2017-10-14 13:27:03 +02002057 # print "DONE :-)", server
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002058
tierno4d1ce222018-04-06 10:41:06 +02002059 # pool_id = None
ahmadsaf853d452016-12-22 11:33:47 +05002060 for floating_network in external_network:
tiernof8383b82017-01-18 15:49:48 +01002061 try:
tiernof8383b82017-01-18 15:49:48 +01002062 assigned = False
tiernocb66c7e2020-07-22 10:42:58 +00002063 floating_ip_retries = 3
2064 # In case of RO in HA there can be conflicts, two RO trying to assign same floating IP, so retry
2065 # several times
tierno98e909c2017-10-14 13:27:03 +02002066 while not assigned:
sousaedu80135b92021-02-17 15:05:18 +01002067 floating_ips = self.neutron.list_floatingips().get(
2068 "floatingips", ()
2069 )
2070 random.shuffle(floating_ips) # randomize
tiernocb66c7e2020-07-22 10:42:58 +00002071 for fip in floating_ips:
sousaedu80135b92021-02-17 15:05:18 +01002072 if (
2073 fip.get("port_id")
2074 or fip.get("tenant_id") != server.tenant_id
2075 ):
tierno326fd5e2018-02-22 11:58:59 +01002076 continue
sousaedu80135b92021-02-17 15:05:18 +01002077
2078 if isinstance(floating_network["floating_ip"], str):
2079 if (
2080 fip.get("floating_network_id")
2081 != floating_network["floating_ip"]
2082 ):
tierno326fd5e2018-02-22 11:58:59 +01002083 continue
sousaedu80135b92021-02-17 15:05:18 +01002084
tiernocb66c7e2020-07-22 10:42:58 +00002085 free_floating_ip = fip["id"]
2086 break
tiernof8383b82017-01-18 15:49:48 +01002087 else:
sousaedu80135b92021-02-17 15:05:18 +01002088 if (
2089 isinstance(floating_network["floating_ip"], str)
2090 and floating_network["floating_ip"].lower() != "true"
2091 ):
2092 pool_id = floating_network["floating_ip"]
tierno326fd5e2018-02-22 11:58:59 +01002093 else:
tierno4d1ce222018-04-06 10:41:06 +02002094 # Find the external network
tierno326fd5e2018-02-22 11:58:59 +01002095 external_nets = list()
sousaedu80135b92021-02-17 15:05:18 +01002096
2097 for net in self.neutron.list_networks()["networks"]:
2098 if net["router:external"]:
tierno1ec592d2020-06-16 15:29:47 +00002099 external_nets.append(net)
tiernof8383b82017-01-18 15:49:48 +01002100
tierno326fd5e2018-02-22 11:58:59 +01002101 if len(external_nets) == 0:
tierno1ec592d2020-06-16 15:29:47 +00002102 raise vimconn.VimConnException(
sousaedu80135b92021-02-17 15:05:18 +01002103 "Cannot create floating_ip automatically since "
2104 "no external network is present",
2105 http_code=vimconn.HTTP_Conflict,
2106 )
2107
tierno326fd5e2018-02-22 11:58:59 +01002108 if len(external_nets) > 1:
tierno1ec592d2020-06-16 15:29:47 +00002109 raise vimconn.VimConnException(
sousaedu80135b92021-02-17 15:05:18 +01002110 "Cannot create floating_ip automatically since "
2111 "multiple external networks are present",
2112 http_code=vimconn.HTTP_Conflict,
2113 )
tiernof8383b82017-01-18 15:49:48 +01002114
sousaedu80135b92021-02-17 15:05:18 +01002115 pool_id = external_nets[0].get("id")
2116
2117 param = {
2118 "floatingip": {
2119 "floating_network_id": pool_id,
2120 "tenant_id": server.tenant_id,
2121 }
2122 }
2123
ahmadsaf853d452016-12-22 11:33:47 +05002124 try:
tierno4d1ce222018-04-06 10:41:06 +02002125 # self.logger.debug("Creating floating IP")
tiernof8383b82017-01-18 15:49:48 +01002126 new_floating_ip = self.neutron.create_floatingip(param)
sousaedu80135b92021-02-17 15:05:18 +01002127 free_floating_ip = new_floating_ip["floatingip"]["id"]
2128 created_items[
2129 "floating_ip:" + str(free_floating_ip)
2130 ] = True
ahmadsaf853d452016-12-22 11:33:47 +05002131 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01002132 raise vimconn.VimConnException(
2133 type(e).__name__
2134 + ": Cannot create new floating_ip "
2135 + str(e),
2136 http_code=vimconn.HTTP_Conflict,
2137 )
tierno326fd5e2018-02-22 11:58:59 +01002138
tiernocb66c7e2020-07-22 10:42:58 +00002139 try:
2140 # for race condition ensure not already assigned
2141 fip = self.neutron.show_floatingip(free_floating_ip)
sousaedu80135b92021-02-17 15:05:18 +01002142
2143 if fip["floatingip"]["port_id"]:
tiernocb66c7e2020-07-22 10:42:58 +00002144 continue
sousaedu80135b92021-02-17 15:05:18 +01002145
tiernocb66c7e2020-07-22 10:42:58 +00002146 # the vim_id key contains the neutron.port_id
sousaedu80135b92021-02-17 15:05:18 +01002147 self.neutron.update_floatingip(
2148 free_floating_ip,
2149 {"floatingip": {"port_id": floating_network["vim_id"]}},
2150 )
tiernocb66c7e2020-07-22 10:42:58 +00002151 # for race condition ensure not re-assigned to other VM after 5 seconds
2152 time.sleep(5)
2153 fip = self.neutron.show_floatingip(free_floating_ip)
sousaedu80135b92021-02-17 15:05:18 +01002154
2155 if (
2156 fip["floatingip"]["port_id"]
2157 != floating_network["vim_id"]
2158 ):
2159 self.logger.error(
2160 "floating_ip {} re-assigned to other port".format(
2161 free_floating_ip
2162 )
2163 )
tiernocb66c7e2020-07-22 10:42:58 +00002164 continue
sousaedu80135b92021-02-17 15:05:18 +01002165
2166 self.logger.debug(
2167 "Assigned floating_ip {} to VM {}".format(
2168 free_floating_ip, server.id
2169 )
2170 )
tiernocb66c7e2020-07-22 10:42:58 +00002171 assigned = True
2172 except Exception as e:
2173 # openstack need some time after VM creation to assign an IP. So retry if fails
2174 vm_status = self.nova.servers.get(server.id).status
sousaedu80135b92021-02-17 15:05:18 +01002175
2176 if vm_status not in ("ACTIVE", "ERROR"):
tiernocb66c7e2020-07-22 10:42:58 +00002177 if time.time() - vm_start_time < server_timeout:
2178 time.sleep(5)
2179 continue
2180 elif floating_ip_retries > 0:
2181 floating_ip_retries -= 1
2182 continue
sousaedu80135b92021-02-17 15:05:18 +01002183
tiernocb66c7e2020-07-22 10:42:58 +00002184 raise vimconn.VimConnException(
sousaedu80135b92021-02-17 15:05:18 +01002185 "Cannot create floating_ip: {} {}".format(
2186 type(e).__name__, e
2187 ),
2188 http_code=vimconn.HTTP_Conflict,
2189 )
tierno326fd5e2018-02-22 11:58:59 +01002190
tiernof8383b82017-01-18 15:49:48 +01002191 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01002192 if not floating_network["exit_on_floating_ip_error"]:
tiernocb66c7e2020-07-22 10:42:58 +00002193 self.logger.error("Cannot create floating_ip. %s", str(e))
tiernof8383b82017-01-18 15:49:48 +01002194 continue
sousaedu80135b92021-02-17 15:05:18 +01002195
tiernof8383b82017-01-18 15:49:48 +01002196 raise
montesmoreno2a1fc4e2017-01-09 16:46:04 +00002197
tierno98e909c2017-10-14 13:27:03 +02002198 return server.id, created_items
tierno1ec592d2020-06-16 15:29:47 +00002199 # except nvExceptions.NotFound as e:
2200 # error_value=-vimconn.HTTP_Not_Found
2201 # error_text= "vm instance %s not found" % vm_id
2202 # except TypeError as e:
2203 # raise vimconn.VimConnException(type(e).__name__ + ": "+ str(e), http_code=vimconn.HTTP_Bad_Request)
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002204
2205 except Exception as e:
tierno98e909c2017-10-14 13:27:03 +02002206 server_id = None
2207 if server:
2208 server_id = server.id
sousaedu80135b92021-02-17 15:05:18 +01002209
tierno98e909c2017-10-14 13:27:03 +02002210 try:
2211 self.delete_vminstance(server_id, created_items)
2212 except Exception as e2:
2213 self.logger.error("new_vminstance rollback fail {}".format(e2))
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002214
tiernoae4a8d12016-07-08 12:30:39 +02002215 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01002216
tierno1ec592d2020-06-16 15:29:47 +00002217 def get_vminstance(self, vm_id):
2218 """Returns the VM instance information from VIM"""
2219 # self.logger.debug("Getting VM from VIM")
tierno7edb6752016-03-21 17:37:52 +01002220 try:
2221 self._reload_connection()
2222 server = self.nova.servers.find(id=vm_id)
tierno1ec592d2020-06-16 15:29:47 +00002223 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
sousaedu80135b92021-02-17 15:05:18 +01002224
tiernoae4a8d12016-07-08 12:30:39 +02002225 return server.to_dict()
sousaedu80135b92021-02-17 15:05:18 +01002226 except (
2227 ksExceptions.ClientException,
2228 nvExceptions.ClientException,
2229 nvExceptions.NotFound,
2230 ConnectionError,
2231 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002232 self._format_exception(e)
2233
tierno1ec592d2020-06-16 15:29:47 +00002234 def get_vminstance_console(self, vm_id, console_type="vnc"):
2235 """
tierno7edb6752016-03-21 17:37:52 +01002236 Get a console for the virtual machine
2237 Params:
2238 vm_id: uuid of the VM
2239 console_type, can be:
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002240 "novnc" (by default), "xvpvnc" for VNC types,
tierno7edb6752016-03-21 17:37:52 +01002241 "rdp-html5" for RDP types, "spice-html5" for SPICE types
tiernoae4a8d12016-07-08 12:30:39 +02002242 Returns dict with the console parameters:
2243 protocol: ssh, ftp, http, https, ...
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002244 server: usually ip address
2245 port: the http, ssh, ... port
2246 suffix: extra text, e.g. the http path and query string
tierno1ec592d2020-06-16 15:29:47 +00002247 """
tiernoae4a8d12016-07-08 12:30:39 +02002248 self.logger.debug("Getting VM CONSOLE from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002249
tierno7edb6752016-03-21 17:37:52 +01002250 try:
2251 self._reload_connection()
2252 server = self.nova.servers.find(id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002253
tierno1ec592d2020-06-16 15:29:47 +00002254 if console_type is None or console_type == "novnc":
tierno7edb6752016-03-21 17:37:52 +01002255 console_dict = server.get_vnc_console("novnc")
2256 elif console_type == "xvpvnc":
2257 console_dict = server.get_vnc_console(console_type)
2258 elif console_type == "rdp-html5":
2259 console_dict = server.get_rdp_console(console_type)
2260 elif console_type == "spice-html5":
2261 console_dict = server.get_spice_console(console_type)
2262 else:
sousaedu80135b92021-02-17 15:05:18 +01002263 raise vimconn.VimConnException(
2264 "console type '{}' not allowed".format(console_type),
2265 http_code=vimconn.HTTP_Bad_Request,
2266 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002267
tierno7edb6752016-03-21 17:37:52 +01002268 console_dict1 = console_dict.get("console")
sousaedu80135b92021-02-17 15:05:18 +01002269
tierno7edb6752016-03-21 17:37:52 +01002270 if console_dict1:
2271 console_url = console_dict1.get("url")
sousaedu80135b92021-02-17 15:05:18 +01002272
tierno7edb6752016-03-21 17:37:52 +01002273 if console_url:
tierno1ec592d2020-06-16 15:29:47 +00002274 # parse console_url
tierno7edb6752016-03-21 17:37:52 +01002275 protocol_index = console_url.find("//")
sousaedu80135b92021-02-17 15:05:18 +01002276 suffix_index = (
2277 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2278 )
2279 port_index = (
2280 console_url[protocol_index + 2 : suffix_index].find(":")
2281 + protocol_index
2282 + 2
2283 )
2284
tierno1ec592d2020-06-16 15:29:47 +00002285 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
sousaedu80135b92021-02-17 15:05:18 +01002286 return (
2287 -vimconn.HTTP_Internal_Server_Error,
2288 "Unexpected response from VIM",
2289 )
2290
2291 console_dict = {
2292 "protocol": console_url[0:protocol_index],
2293 "server": console_url[protocol_index + 2 : port_index],
2294 "port": console_url[port_index:suffix_index],
2295 "suffix": console_url[suffix_index + 1 :],
2296 }
tierno7edb6752016-03-21 17:37:52 +01002297 protocol_index += 2
sousaedu80135b92021-02-17 15:05:18 +01002298
tiernoae4a8d12016-07-08 12:30:39 +02002299 return console_dict
tierno72774862020-05-04 11:44:15 +00002300 raise vimconn.VimConnUnexpectedResponse("Unexpected response from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002301 except (
2302 nvExceptions.NotFound,
2303 ksExceptions.ClientException,
2304 nvExceptions.ClientException,
2305 nvExceptions.BadRequest,
2306 ConnectionError,
2307 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002308 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01002309
palaciosj8f2060b2022-02-24 12:05:59 +00002310 def delete_vminstance(self, vm_id, created_items=None, volumes_to_hold=None):
sousaedu80135b92021-02-17 15:05:18 +01002311 """Removes a VM instance from VIM. Returns the old identifier"""
tierno1ec592d2020-06-16 15:29:47 +00002312 # print "osconnector: Getting VM from VIM"
2313 if created_items is None:
tierno98e909c2017-10-14 13:27:03 +02002314 created_items = {}
sousaedu80135b92021-02-17 15:05:18 +01002315
tierno7edb6752016-03-21 17:37:52 +01002316 try:
2317 self._reload_connection()
tierno98e909c2017-10-14 13:27:03 +02002318 # delete VM ports attached to this networks before the virtual machine
2319 for k, v in created_items.items():
2320 if not v: # skip already deleted
2321 continue
sousaedu80135b92021-02-17 15:05:18 +01002322
tierno7edb6752016-03-21 17:37:52 +01002323 try:
tiernoad6bdd42018-01-10 10:43:46 +01002324 k_item, _, k_id = k.partition(":")
2325 if k_item == "port":
aticig36cad662022-06-22 22:03:37 +03002326 port_dict = self.neutron.list_ports()
aticigfe575722022-06-07 15:00:35 +03002327 existing_ports = [
2328 port["id"] for port in port_dict["ports"] if port_dict
2329 ]
2330 if k_id in existing_ports:
2331 self.neutron.delete_port(k_id)
tierno7edb6752016-03-21 17:37:52 +01002332 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01002333 self.logger.error(
2334 "Error deleting port: {}: {}".format(type(e).__name__, e)
2335 )
montesmoreno0c8def02016-12-22 12:16:23 +00002336
tierno98e909c2017-10-14 13:27:03 +02002337 # #commented because detaching the volumes makes the servers.delete not work properly ?!?
2338 # #dettach volumes attached
2339 # server = self.nova.servers.get(vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002340 # volumes_attached_dict = server._info["os-extended-volumes:volumes_attached"] #volume["id"]
tierno98e909c2017-10-14 13:27:03 +02002341 # #for volume in volumes_attached_dict:
sousaedu80135b92021-02-17 15:05:18 +01002342 # # self.cinder.volumes.detach(volume["id"])
montesmoreno0c8def02016-12-22 12:16:23 +00002343
tierno98e909c2017-10-14 13:27:03 +02002344 if vm_id:
2345 self.nova.servers.delete(vm_id)
montesmoreno0c8def02016-12-22 12:16:23 +00002346
tierno98e909c2017-10-14 13:27:03 +02002347 # delete volumes. Although having detached, they should have in active status before deleting
2348 # we ensure in this loop
montesmoreno0c8def02016-12-22 12:16:23 +00002349 keep_waiting = True
2350 elapsed_time = 0
sousaedu80135b92021-02-17 15:05:18 +01002351
montesmoreno0c8def02016-12-22 12:16:23 +00002352 while keep_waiting and elapsed_time < volume_timeout:
2353 keep_waiting = False
sousaedu80135b92021-02-17 15:05:18 +01002354
tierno98e909c2017-10-14 13:27:03 +02002355 for k, v in created_items.items():
2356 if not v: # skip already deleted
2357 continue
sousaedu80135b92021-02-17 15:05:18 +01002358
tierno98e909c2017-10-14 13:27:03 +02002359 try:
tiernoad6bdd42018-01-10 10:43:46 +01002360 k_item, _, k_id = k.partition(":")
2361 if k_item == "volume":
sousaedu80135b92021-02-17 15:05:18 +01002362 if self.cinder.volumes.get(k_id).status != "available":
tierno98e909c2017-10-14 13:27:03 +02002363 keep_waiting = True
2364 else:
palaciosj8f2060b2022-02-24 12:05:59 +00002365 if k_id not in volumes_to_hold:
2366 self.cinder.volumes.delete(k_id)
2367 created_items[k] = None
tiernocb66c7e2020-07-22 10:42:58 +00002368 elif k_item == "floating_ip": # floating ip
2369 self.neutron.delete_floatingip(k_id)
2370 created_items[k] = None
2371
tierno98e909c2017-10-14 13:27:03 +02002372 except Exception as e:
tiernocb66c7e2020-07-22 10:42:58 +00002373 self.logger.error("Error deleting {}: {}".format(k, e))
sousaedu80135b92021-02-17 15:05:18 +01002374
montesmoreno0c8def02016-12-22 12:16:23 +00002375 if keep_waiting:
2376 time.sleep(1)
2377 elapsed_time += 1
sousaedu80135b92021-02-17 15:05:18 +01002378
tierno98e909c2017-10-14 13:27:03 +02002379 return None
sousaedu80135b92021-02-17 15:05:18 +01002380 except (
2381 nvExceptions.NotFound,
2382 ksExceptions.ClientException,
2383 nvExceptions.ClientException,
2384 ConnectionError,
2385 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002386 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01002387
tiernoae4a8d12016-07-08 12:30:39 +02002388 def refresh_vms_status(self, vm_list):
tierno1ec592d2020-06-16 15:29:47 +00002389 """Get the status of the virtual machines and their interfaces/ports
sousaedu80135b92021-02-17 15:05:18 +01002390 Params: the list of VM identifiers
2391 Returns a dictionary with:
2392 vm_id: #VIM id of this Virtual Machine
2393 status: #Mandatory. Text with one of:
2394 # DELETED (not found at vim)
2395 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
2396 # OTHER (Vim reported other status not understood)
2397 # ERROR (VIM indicates an ERROR status)
2398 # ACTIVE, PAUSED, SUSPENDED, INACTIVE (not running),
2399 # CREATING (on building process), ERROR
2400 # ACTIVE:NoMgmtIP (Active but any of its interface has an IP address
2401 #
2402 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
2403 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2404 interfaces:
2405 - vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2406 mac_address: #Text format XX:XX:XX:XX:XX:XX
2407 vim_net_id: #network id where this interface is connected
2408 vim_interface_id: #interface/port VIM id
2409 ip_address: #null, or text with IPv4, IPv6 address
2410 compute_node: #identification of compute node where PF,VF interface is allocated
2411 pci: #PCI address of the NIC that hosts the PF,VF
2412 vlan: #physical VLAN used for VF
tierno1ec592d2020-06-16 15:29:47 +00002413 """
2414 vm_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01002415 self.logger.debug(
2416 "refresh_vms status: Getting tenant VM instance information from VIM"
2417 )
2418
tiernoae4a8d12016-07-08 12:30:39 +02002419 for vm_id in vm_list:
tierno1ec592d2020-06-16 15:29:47 +00002420 vm = {}
sousaedu80135b92021-02-17 15:05:18 +01002421
tiernoae4a8d12016-07-08 12:30:39 +02002422 try:
2423 vm_vim = self.get_vminstance(vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002424
2425 if vm_vim["status"] in vmStatus2manoFormat:
2426 vm["status"] = vmStatus2manoFormat[vm_vim["status"]]
tierno7edb6752016-03-21 17:37:52 +01002427 else:
sousaedu80135b92021-02-17 15:05:18 +01002428 vm["status"] = "OTHER"
2429 vm["error_msg"] = "VIM status reported " + vm_vim["status"]
2430
tierno70eeb182020-10-19 16:38:00 +00002431 vm_vim.pop("OS-EXT-SRV-ATTR:user_data", None)
2432 vm_vim.pop("user_data", None)
sousaedu80135b92021-02-17 15:05:18 +01002433 vm["vim_info"] = self.serialize(vm_vim)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002434
tiernoae4a8d12016-07-08 12:30:39 +02002435 vm["interfaces"] = []
sousaedu80135b92021-02-17 15:05:18 +01002436 if vm_vim.get("fault"):
2437 vm["error_msg"] = str(vm_vim["fault"])
2438
tierno1ec592d2020-06-16 15:29:47 +00002439 # get interfaces
tierno7edb6752016-03-21 17:37:52 +01002440 try:
tiernoae4a8d12016-07-08 12:30:39 +02002441 self._reload_connection()
tiernob42fd9b2018-06-20 10:44:32 +02002442 port_dict = self.neutron.list_ports(device_id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002443
tiernoae4a8d12016-07-08 12:30:39 +02002444 for port in port_dict["ports"]:
tierno1ec592d2020-06-16 15:29:47 +00002445 interface = {}
sousaedu80135b92021-02-17 15:05:18 +01002446 interface["vim_info"] = self.serialize(port)
tiernoae4a8d12016-07-08 12:30:39 +02002447 interface["mac_address"] = port.get("mac_address")
2448 interface["vim_net_id"] = port["network_id"]
2449 interface["vim_interface_id"] = port["id"]
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002450 # check if OS-EXT-SRV-ATTR:host is there,
Mike Marchetti5b9da422017-05-02 15:35:47 -04002451 # in case of non-admin credentials, it will be missing
sousaedu80135b92021-02-17 15:05:18 +01002452
2453 if vm_vim.get("OS-EXT-SRV-ATTR:host"):
2454 interface["compute_node"] = vm_vim["OS-EXT-SRV-ATTR:host"]
2455
tierno867ffe92017-03-27 12:50:34 +02002456 interface["pci"] = None
Mike Marchetti5b9da422017-05-02 15:35:47 -04002457
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002458 # check if binding:profile is there,
Mike Marchetti5b9da422017-05-02 15:35:47 -04002459 # in case of non-admin credentials, it will be missing
sousaedu80135b92021-02-17 15:05:18 +01002460 if port.get("binding:profile"):
2461 if port["binding:profile"].get("pci_slot"):
tierno1ec592d2020-06-16 15:29:47 +00002462 # TODO: At the moment sr-iov pci addresses are converted to PF pci addresses by setting
2463 # the slot to 0x00
Mike Marchetti5b9da422017-05-02 15:35:47 -04002464 # TODO: This is just a workaround valid for niantinc. Find a better way to do so
2465 # CHANGE DDDD:BB:SS.F to DDDD:BB:00.(F%2) assuming there are 2 ports per nic
sousaedu80135b92021-02-17 15:05:18 +01002466 pci = port["binding:profile"]["pci_slot"]
Mike Marchetti5b9da422017-05-02 15:35:47 -04002467 # interface["pci"] = pci[:-4] + "00." + str(int(pci[-1]) % 2)
2468 interface["pci"] = pci
sousaedu80135b92021-02-17 15:05:18 +01002469
tierno867ffe92017-03-27 12:50:34 +02002470 interface["vlan"] = None
sousaedu80135b92021-02-17 15:05:18 +01002471
2472 if port.get("binding:vif_details"):
2473 interface["vlan"] = port["binding:vif_details"].get("vlan")
2474
tierno1dfe9932020-06-18 08:50:10 +00002475 # Get vlan from network in case not present in port for those old openstacks and cases where
2476 # it is needed vlan at PT
2477 if not interface["vlan"]:
2478 # if network is of type vlan and port is of type direct (sr-iov) then set vlan id
2479 network = self.neutron.show_network(port["network_id"])
sousaedu80135b92021-02-17 15:05:18 +01002480
2481 if (
2482 network["network"].get("provider:network_type")
2483 == "vlan"
2484 ):
tierno1dfe9932020-06-18 08:50:10 +00002485 # and port.get("binding:vnic_type") in ("direct", "direct-physical"):
sousaedu80135b92021-02-17 15:05:18 +01002486 interface["vlan"] = network["network"].get(
2487 "provider:segmentation_id"
2488 )
2489
tierno1ec592d2020-06-16 15:29:47 +00002490 ips = []
2491 # look for floating ip address
tiernob42fd9b2018-06-20 10:44:32 +02002492 try:
sousaedu80135b92021-02-17 15:05:18 +01002493 floating_ip_dict = self.neutron.list_floatingips(
2494 port_id=port["id"]
2495 )
2496
tiernob42fd9b2018-06-20 10:44:32 +02002497 if floating_ip_dict.get("floatingips"):
sousaedu80135b92021-02-17 15:05:18 +01002498 ips.append(
2499 floating_ip_dict["floatingips"][0].get(
2500 "floating_ip_address"
2501 )
2502 )
tiernob42fd9b2018-06-20 10:44:32 +02002503 except Exception:
2504 pass
tierno7edb6752016-03-21 17:37:52 +01002505
tiernoae4a8d12016-07-08 12:30:39 +02002506 for subnet in port["fixed_ips"]:
2507 ips.append(subnet["ip_address"])
sousaedu80135b92021-02-17 15:05:18 +01002508
tiernoae4a8d12016-07-08 12:30:39 +02002509 interface["ip_address"] = ";".join(ips)
2510 vm["interfaces"].append(interface)
2511 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01002512 self.logger.error(
2513 "Error getting vm interface information {}: {}".format(
2514 type(e).__name__, e
2515 ),
2516 exc_info=True,
2517 )
tierno72774862020-05-04 11:44:15 +00002518 except vimconn.VimConnNotFoundException as e:
tiernoae4a8d12016-07-08 12:30:39 +02002519 self.logger.error("Exception getting vm status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01002520 vm["status"] = "DELETED"
2521 vm["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00002522 except vimconn.VimConnException as e:
tiernoae4a8d12016-07-08 12:30:39 +02002523 self.logger.error("Exception getting vm status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01002524 vm["status"] = "VIM_ERROR"
2525 vm["error_msg"] = str(e)
2526
tiernoae4a8d12016-07-08 12:30:39 +02002527 vm_dict[vm_id] = vm
sousaedu80135b92021-02-17 15:05:18 +01002528
tiernoae4a8d12016-07-08 12:30:39 +02002529 return vm_dict
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002530
tierno98e909c2017-10-14 13:27:03 +02002531 def action_vminstance(self, vm_id, action_dict, created_items={}):
tierno1ec592d2020-06-16 15:29:47 +00002532 """Send and action over a VM instance from VIM
2533 Returns None or the console dict if the action was successfully sent to the VIM"""
tiernoae4a8d12016-07-08 12:30:39 +02002534 self.logger.debug("Action over VM '%s': %s", vm_id, str(action_dict))
sousaedu80135b92021-02-17 15:05:18 +01002535
tierno7edb6752016-03-21 17:37:52 +01002536 try:
2537 self._reload_connection()
2538 server = self.nova.servers.find(id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002539
tierno7edb6752016-03-21 17:37:52 +01002540 if "start" in action_dict:
tierno1ec592d2020-06-16 15:29:47 +00002541 if action_dict["start"] == "rebuild":
tierno7edb6752016-03-21 17:37:52 +01002542 server.rebuild()
2543 else:
tierno1ec592d2020-06-16 15:29:47 +00002544 if server.status == "PAUSED":
tierno7edb6752016-03-21 17:37:52 +01002545 server.unpause()
tierno1ec592d2020-06-16 15:29:47 +00002546 elif server.status == "SUSPENDED":
tierno7edb6752016-03-21 17:37:52 +01002547 server.resume()
tierno1ec592d2020-06-16 15:29:47 +00002548 elif server.status == "SHUTOFF":
tierno7edb6752016-03-21 17:37:52 +01002549 server.start()
k4.rahul78f474e2022-05-02 15:47:57 +00002550 else:
2551 self.logger.debug(
2552 "ERROR : Instance is not in SHUTOFF/PAUSE/SUSPEND state"
2553 )
2554 raise vimconn.VimConnException(
2555 "Cannot 'start' instance while it is in active state",
2556 http_code=vimconn.HTTP_Bad_Request,
2557 )
2558
tierno7edb6752016-03-21 17:37:52 +01002559 elif "pause" in action_dict:
2560 server.pause()
2561 elif "resume" in action_dict:
2562 server.resume()
2563 elif "shutoff" in action_dict or "shutdown" in action_dict:
k4.rahul78f474e2022-05-02 15:47:57 +00002564 self.logger.debug("server status %s", server.status)
2565 if server.status == "ACTIVE":
2566 server.stop()
2567 else:
2568 self.logger.debug("ERROR: VM is not in Active state")
2569 raise vimconn.VimConnException(
2570 "VM is not in active state, stop operation is not allowed",
2571 http_code=vimconn.HTTP_Bad_Request,
2572 )
tierno7edb6752016-03-21 17:37:52 +01002573 elif "forceOff" in action_dict:
tierno1ec592d2020-06-16 15:29:47 +00002574 server.stop() # TODO
tierno7edb6752016-03-21 17:37:52 +01002575 elif "terminate" in action_dict:
2576 server.delete()
2577 elif "createImage" in action_dict:
2578 server.create_image()
tierno1ec592d2020-06-16 15:29:47 +00002579 # "path":path_schema,
2580 # "description":description_schema,
2581 # "name":name_schema,
2582 # "metadata":metadata_schema,
2583 # "imageRef": id_schema,
2584 # "disk": {"oneOf":[{"type": "null"}, {"type":"string"}] },
tierno7edb6752016-03-21 17:37:52 +01002585 elif "rebuild" in action_dict:
sousaedu80135b92021-02-17 15:05:18 +01002586 server.rebuild(server.image["id"])
tierno7edb6752016-03-21 17:37:52 +01002587 elif "reboot" in action_dict:
sousaedu80135b92021-02-17 15:05:18 +01002588 server.reboot() # reboot_type="SOFT"
tierno7edb6752016-03-21 17:37:52 +01002589 elif "console" in action_dict:
2590 console_type = action_dict["console"]
sousaedu80135b92021-02-17 15:05:18 +01002591
tierno1ec592d2020-06-16 15:29:47 +00002592 if console_type is None or console_type == "novnc":
tierno7edb6752016-03-21 17:37:52 +01002593 console_dict = server.get_vnc_console("novnc")
2594 elif console_type == "xvpvnc":
2595 console_dict = server.get_vnc_console(console_type)
2596 elif console_type == "rdp-html5":
2597 console_dict = server.get_rdp_console(console_type)
2598 elif console_type == "spice-html5":
2599 console_dict = server.get_spice_console(console_type)
2600 else:
sousaedu80135b92021-02-17 15:05:18 +01002601 raise vimconn.VimConnException(
2602 "console type '{}' not allowed".format(console_type),
2603 http_code=vimconn.HTTP_Bad_Request,
2604 )
2605
tierno7edb6752016-03-21 17:37:52 +01002606 try:
2607 console_url = console_dict["console"]["url"]
tierno1ec592d2020-06-16 15:29:47 +00002608 # parse console_url
tierno7edb6752016-03-21 17:37:52 +01002609 protocol_index = console_url.find("//")
sousaedu80135b92021-02-17 15:05:18 +01002610 suffix_index = (
2611 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2612 )
2613 port_index = (
2614 console_url[protocol_index + 2 : suffix_index].find(":")
2615 + protocol_index
2616 + 2
2617 )
2618
tierno1ec592d2020-06-16 15:29:47 +00002619 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
sousaedu80135b92021-02-17 15:05:18 +01002620 raise vimconn.VimConnException(
2621 "Unexpected response from VIM " + str(console_dict)
2622 )
2623
2624 console_dict2 = {
2625 "protocol": console_url[0:protocol_index],
2626 "server": console_url[protocol_index + 2 : port_index],
2627 "port": int(console_url[port_index + 1 : suffix_index]),
2628 "suffix": console_url[suffix_index + 1 :],
2629 }
2630
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002631 return console_dict2
tierno1ec592d2020-06-16 15:29:47 +00002632 except Exception:
sousaedu80135b92021-02-17 15:05:18 +01002633 raise vimconn.VimConnException(
2634 "Unexpected response from VIM " + str(console_dict)
2635 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002636
tierno98e909c2017-10-14 13:27:03 +02002637 return None
sousaedu80135b92021-02-17 15:05:18 +01002638 except (
2639 ksExceptions.ClientException,
2640 nvExceptions.ClientException,
2641 nvExceptions.NotFound,
2642 ConnectionError,
2643 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002644 self._format_exception(e)
tierno1ec592d2020-06-16 15:29:47 +00002645 # TODO insert exception vimconn.HTTP_Unauthorized
tiernoae4a8d12016-07-08 12:30:39 +02002646
tierno1ec592d2020-06-16 15:29:47 +00002647 # ###### VIO Specific Changes #########
garciadeblasebd66722019-01-31 16:01:31 +00002648 def _generate_vlanID(self):
kate721d79b2017-06-24 04:21:38 -07002649 """
sousaedu80135b92021-02-17 15:05:18 +01002650 Method to get unused vlanID
kate721d79b2017-06-24 04:21:38 -07002651 Args:
2652 None
2653 Returns:
2654 vlanID
2655 """
tierno1ec592d2020-06-16 15:29:47 +00002656 # Get used VLAN IDs
kate721d79b2017-06-24 04:21:38 -07002657 usedVlanIDs = []
2658 networks = self.get_network_list()
sousaedu80135b92021-02-17 15:05:18 +01002659
kate721d79b2017-06-24 04:21:38 -07002660 for net in networks:
sousaedu80135b92021-02-17 15:05:18 +01002661 if net.get("provider:segmentation_id"):
2662 usedVlanIDs.append(net.get("provider:segmentation_id"))
2663
kate721d79b2017-06-24 04:21:38 -07002664 used_vlanIDs = set(usedVlanIDs)
2665
tierno1ec592d2020-06-16 15:29:47 +00002666 # find unused VLAN ID
sousaedu80135b92021-02-17 15:05:18 +01002667 for vlanID_range in self.config.get("dataplane_net_vlan_range"):
kate721d79b2017-06-24 04:21:38 -07002668 try:
sousaedu80135b92021-02-17 15:05:18 +01002669 start_vlanid, end_vlanid = map(
2670 int, vlanID_range.replace(" ", "").split("-")
2671 )
2672
tierno7d782ef2019-10-04 12:56:31 +00002673 for vlanID in range(start_vlanid, end_vlanid + 1):
kate721d79b2017-06-24 04:21:38 -07002674 if vlanID not in used_vlanIDs:
2675 return vlanID
2676 except Exception as exp:
sousaedu80135b92021-02-17 15:05:18 +01002677 raise vimconn.VimConnException(
2678 "Exception {} occurred while generating VLAN ID.".format(exp)
2679 )
kate721d79b2017-06-24 04:21:38 -07002680 else:
tierno1ec592d2020-06-16 15:29:47 +00002681 raise vimconn.VimConnConflictException(
2682 "Unable to create the SRIOV VLAN network. All given Vlan IDs {} are in use.".format(
sousaedu80135b92021-02-17 15:05:18 +01002683 self.config.get("dataplane_net_vlan_range")
2684 )
2685 )
kate721d79b2017-06-24 04:21:38 -07002686
garciadeblasebd66722019-01-31 16:01:31 +00002687 def _generate_multisegment_vlanID(self):
2688 """
sousaedu80135b92021-02-17 15:05:18 +01002689 Method to get unused vlanID
2690 Args:
2691 None
2692 Returns:
2693 vlanID
garciadeblasebd66722019-01-31 16:01:31 +00002694 """
tierno6869ae72020-01-09 17:37:34 +00002695 # Get used VLAN IDs
garciadeblasebd66722019-01-31 16:01:31 +00002696 usedVlanIDs = []
2697 networks = self.get_network_list()
2698 for net in networks:
sousaedu80135b92021-02-17 15:05:18 +01002699 if net.get("provider:network_type") == "vlan" and net.get(
2700 "provider:segmentation_id"
2701 ):
2702 usedVlanIDs.append(net.get("provider:segmentation_id"))
2703 elif net.get("segments"):
2704 for segment in net.get("segments"):
2705 if segment.get("provider:network_type") == "vlan" and segment.get(
2706 "provider:segmentation_id"
2707 ):
2708 usedVlanIDs.append(segment.get("provider:segmentation_id"))
2709
garciadeblasebd66722019-01-31 16:01:31 +00002710 used_vlanIDs = set(usedVlanIDs)
2711
tierno6869ae72020-01-09 17:37:34 +00002712 # find unused VLAN ID
sousaedu80135b92021-02-17 15:05:18 +01002713 for vlanID_range in self.config.get("multisegment_vlan_range"):
garciadeblasebd66722019-01-31 16:01:31 +00002714 try:
sousaedu80135b92021-02-17 15:05:18 +01002715 start_vlanid, end_vlanid = map(
2716 int, vlanID_range.replace(" ", "").split("-")
2717 )
2718
tierno7d782ef2019-10-04 12:56:31 +00002719 for vlanID in range(start_vlanid, end_vlanid + 1):
garciadeblasebd66722019-01-31 16:01:31 +00002720 if vlanID not in used_vlanIDs:
2721 return vlanID
2722 except Exception as exp:
sousaedu80135b92021-02-17 15:05:18 +01002723 raise vimconn.VimConnException(
2724 "Exception {} occurred while generating VLAN ID.".format(exp)
2725 )
garciadeblasebd66722019-01-31 16:01:31 +00002726 else:
tierno1ec592d2020-06-16 15:29:47 +00002727 raise vimconn.VimConnConflictException(
2728 "Unable to create the VLAN segment. All VLAN IDs {} are in use.".format(
sousaedu80135b92021-02-17 15:05:18 +01002729 self.config.get("multisegment_vlan_range")
2730 )
2731 )
garciadeblasebd66722019-01-31 16:01:31 +00002732
2733 def _validate_vlan_ranges(self, input_vlan_range, text_vlan_range):
kate721d79b2017-06-24 04:21:38 -07002734 """
2735 Method to validate user given vlanID ranges
2736 Args: None
2737 Returns: None
2738 """
garciadeblasebd66722019-01-31 16:01:31 +00002739 for vlanID_range in input_vlan_range:
kate721d79b2017-06-24 04:21:38 -07002740 vlan_range = vlanID_range.replace(" ", "")
tierno1ec592d2020-06-16 15:29:47 +00002741 # validate format
sousaedu80135b92021-02-17 15:05:18 +01002742 vlanID_pattern = r"(\d)*-(\d)*$"
kate721d79b2017-06-24 04:21:38 -07002743 match_obj = re.match(vlanID_pattern, vlan_range)
2744 if not match_obj:
tierno1ec592d2020-06-16 15:29:47 +00002745 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01002746 "Invalid VLAN range for {}: {}.You must provide "
2747 "'{}' in format [start_ID - end_ID].".format(
2748 text_vlan_range, vlanID_range, text_vlan_range
2749 )
2750 )
kate721d79b2017-06-24 04:21:38 -07002751
tierno1ec592d2020-06-16 15:29:47 +00002752 start_vlanid, end_vlanid = map(int, vlan_range.split("-"))
2753 if start_vlanid <= 0:
2754 raise vimconn.VimConnConflictException(
2755 "Invalid VLAN range for {}: {}. Start ID can not be zero. For VLAN "
sousaedu80135b92021-02-17 15:05:18 +01002756 "networks valid IDs are 1 to 4094 ".format(
2757 text_vlan_range, vlanID_range
2758 )
2759 )
2760
tierno1ec592d2020-06-16 15:29:47 +00002761 if end_vlanid > 4094:
2762 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01002763 "Invalid VLAN range for {}: {}. End VLAN ID can not be "
2764 "greater than 4094. For VLAN networks valid IDs are 1 to 4094 ".format(
2765 text_vlan_range, vlanID_range
2766 )
2767 )
kate721d79b2017-06-24 04:21:38 -07002768
2769 if start_vlanid > end_vlanid:
tierno1ec592d2020-06-16 15:29:47 +00002770 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01002771 "Invalid VLAN range for {}: {}. You must provide '{}'"
2772 " in format start_ID - end_ID and start_ID < end_ID ".format(
2773 text_vlan_range, vlanID_range, text_vlan_range
2774 )
2775 )
kate721d79b2017-06-24 04:21:38 -07002776
tierno1ec592d2020-06-16 15:29:47 +00002777 # NOT USED FUNCTIONS
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002778
tiernoae4a8d12016-07-08 12:30:39 +02002779 def new_external_port(self, port_data):
tierno1ec592d2020-06-16 15:29:47 +00002780 """Adds a external port to VIM
sousaedu80135b92021-02-17 15:05:18 +01002781 Returns the port identifier"""
tierno1ec592d2020-06-16 15:29:47 +00002782 # TODO openstack if needed
sousaedu80135b92021-02-17 15:05:18 +01002783 return (
2784 -vimconn.HTTP_Internal_Server_Error,
2785 "osconnector.new_external_port() not implemented",
2786 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002787
tiernoae4a8d12016-07-08 12:30:39 +02002788 def connect_port_network(self, port_id, network_id, admin=False):
tierno1ec592d2020-06-16 15:29:47 +00002789 """Connects a external port to a network
sousaedu80135b92021-02-17 15:05:18 +01002790 Returns status code of the VIM response"""
tierno1ec592d2020-06-16 15:29:47 +00002791 # TODO openstack if needed
sousaedu80135b92021-02-17 15:05:18 +01002792 return (
2793 -vimconn.HTTP_Internal_Server_Error,
2794 "osconnector.connect_port_network() not implemented",
2795 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002796
tiernoae4a8d12016-07-08 12:30:39 +02002797 def new_user(self, user_name, user_passwd, tenant_id=None):
tierno1ec592d2020-06-16 15:29:47 +00002798 """Adds a new user to openstack VIM
sousaedu80135b92021-02-17 15:05:18 +01002799 Returns the user identifier"""
tiernoae4a8d12016-07-08 12:30:39 +02002800 self.logger.debug("osconnector: Adding a new user to VIM")
sousaedu80135b92021-02-17 15:05:18 +01002801
tiernoae4a8d12016-07-08 12:30:39 +02002802 try:
2803 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01002804 user = self.keystone.users.create(
2805 user_name, password=user_passwd, default_project=tenant_id
2806 )
tierno1ec592d2020-06-16 15:29:47 +00002807 # self.keystone.tenants.add_user(self.k_creds["username"], #role)
sousaedu80135b92021-02-17 15:05:18 +01002808
tiernoae4a8d12016-07-08 12:30:39 +02002809 return user.id
2810 except ksExceptions.ConnectionError as e:
tierno1ec592d2020-06-16 15:29:47 +00002811 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002812 error_text = (
2813 type(e).__name__
2814 + ": "
2815 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2816 )
tierno1ec592d2020-06-16 15:29:47 +00002817 except ksExceptions.ClientException as e: # TODO remove
2818 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002819 error_text = (
2820 type(e).__name__
2821 + ": "
2822 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2823 )
2824
tierno1ec592d2020-06-16 15:29:47 +00002825 # TODO insert exception vimconn.HTTP_Unauthorized
2826 # if reaching here is because an exception
tierno9c5c8322018-03-23 15:44:03 +01002827 self.logger.debug("new_user " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01002828
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002829 return error_value, error_text
tiernoae4a8d12016-07-08 12:30:39 +02002830
2831 def delete_user(self, user_id):
tierno1ec592d2020-06-16 15:29:47 +00002832 """Delete a user from openstack VIM
sousaedu80135b92021-02-17 15:05:18 +01002833 Returns the user identifier"""
tiernoae4a8d12016-07-08 12:30:39 +02002834 if self.debug:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002835 print("osconnector: Deleting a user from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002836
tiernoae4a8d12016-07-08 12:30:39 +02002837 try:
2838 self._reload_connection()
2839 self.keystone.users.delete(user_id)
sousaedu80135b92021-02-17 15:05:18 +01002840
tiernoae4a8d12016-07-08 12:30:39 +02002841 return 1, user_id
2842 except ksExceptions.ConnectionError as e:
tierno1ec592d2020-06-16 15:29:47 +00002843 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002844 error_text = (
2845 type(e).__name__
2846 + ": "
2847 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2848 )
tiernoae4a8d12016-07-08 12:30:39 +02002849 except ksExceptions.NotFound as e:
tierno1ec592d2020-06-16 15:29:47 +00002850 error_value = -vimconn.HTTP_Not_Found
sousaedu80135b92021-02-17 15:05:18 +01002851 error_text = (
2852 type(e).__name__
2853 + ": "
2854 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2855 )
tierno1ec592d2020-06-16 15:29:47 +00002856 except ksExceptions.ClientException as e: # TODO remove
2857 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002858 error_text = (
2859 type(e).__name__
2860 + ": "
2861 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2862 )
2863
tierno1ec592d2020-06-16 15:29:47 +00002864 # TODO insert exception vimconn.HTTP_Unauthorized
2865 # if reaching here is because an exception
2866 self.logger.debug("delete_tenant " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01002867
tiernoae4a8d12016-07-08 12:30:39 +02002868 return error_value, error_text
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002869
tierno7edb6752016-03-21 17:37:52 +01002870 def get_hosts_info(self):
tierno1ec592d2020-06-16 15:29:47 +00002871 """Get the information of deployed hosts
2872 Returns the hosts content"""
tierno7edb6752016-03-21 17:37:52 +01002873 if self.debug:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002874 print("osconnector: Getting Host info from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002875
tierno7edb6752016-03-21 17:37:52 +01002876 try:
tierno1ec592d2020-06-16 15:29:47 +00002877 h_list = []
tierno7edb6752016-03-21 17:37:52 +01002878 self._reload_connection()
2879 hypervisors = self.nova.hypervisors.list()
sousaedu80135b92021-02-17 15:05:18 +01002880
tierno7edb6752016-03-21 17:37:52 +01002881 for hype in hypervisors:
tierno1ec592d2020-06-16 15:29:47 +00002882 h_list.append(hype.to_dict())
sousaedu80135b92021-02-17 15:05:18 +01002883
tierno1ec592d2020-06-16 15:29:47 +00002884 return 1, {"hosts": h_list}
tierno7edb6752016-03-21 17:37:52 +01002885 except nvExceptions.NotFound as e:
tierno1ec592d2020-06-16 15:29:47 +00002886 error_value = -vimconn.HTTP_Not_Found
sousaedu80135b92021-02-17 15:05:18 +01002887 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
tierno7edb6752016-03-21 17:37:52 +01002888 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
tierno1ec592d2020-06-16 15:29:47 +00002889 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002890 error_text = (
2891 type(e).__name__
2892 + ": "
2893 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2894 )
2895
tierno1ec592d2020-06-16 15:29:47 +00002896 # TODO insert exception vimconn.HTTP_Unauthorized
2897 # if reaching here is because an exception
tierno9c5c8322018-03-23 15:44:03 +01002898 self.logger.debug("get_hosts_info " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01002899
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002900 return error_value, error_text
tierno7edb6752016-03-21 17:37:52 +01002901
2902 def get_hosts(self, vim_tenant):
tierno1ec592d2020-06-16 15:29:47 +00002903 """Get the hosts and deployed instances
2904 Returns the hosts content"""
tierno7edb6752016-03-21 17:37:52 +01002905 r, hype_dict = self.get_hosts_info()
sousaedu80135b92021-02-17 15:05:18 +01002906
tierno1ec592d2020-06-16 15:29:47 +00002907 if r < 0:
tierno7edb6752016-03-21 17:37:52 +01002908 return r, hype_dict
sousaedu80135b92021-02-17 15:05:18 +01002909
tierno7edb6752016-03-21 17:37:52 +01002910 hypervisors = hype_dict["hosts"]
sousaedu80135b92021-02-17 15:05:18 +01002911
tierno7edb6752016-03-21 17:37:52 +01002912 try:
2913 servers = self.nova.servers.list()
2914 for hype in hypervisors:
2915 for server in servers:
sousaedu80135b92021-02-17 15:05:18 +01002916 if (
2917 server.to_dict()["OS-EXT-SRV-ATTR:hypervisor_hostname"]
2918 == hype["hypervisor_hostname"]
2919 ):
2920 if "vm" in hype:
2921 hype["vm"].append(server.id)
tierno7edb6752016-03-21 17:37:52 +01002922 else:
sousaedu80135b92021-02-17 15:05:18 +01002923 hype["vm"] = [server.id]
2924
tierno7edb6752016-03-21 17:37:52 +01002925 return 1, hype_dict
2926 except nvExceptions.NotFound as e:
tierno1ec592d2020-06-16 15:29:47 +00002927 error_value = -vimconn.HTTP_Not_Found
sousaedu80135b92021-02-17 15:05:18 +01002928 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
tierno7edb6752016-03-21 17:37:52 +01002929 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
tierno1ec592d2020-06-16 15:29:47 +00002930 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01002931 error_text = (
2932 type(e).__name__
2933 + ": "
2934 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2935 )
2936
tierno1ec592d2020-06-16 15:29:47 +00002937 # TODO insert exception vimconn.HTTP_Unauthorized
2938 # if reaching here is because an exception
tierno9c5c8322018-03-23 15:44:03 +01002939 self.logger.debug("get_hosts " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01002940
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002941 return error_value, error_text
tierno7edb6752016-03-21 17:37:52 +01002942
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002943 def new_classification(self, name, ctype, definition):
sousaedu80135b92021-02-17 15:05:18 +01002944 self.logger.debug(
2945 "Adding a new (Traffic) Classification to VIM, named %s", name
2946 )
2947
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002948 try:
2949 new_class = None
2950 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01002951
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002952 if ctype not in supportedClassificationTypes:
tierno72774862020-05-04 11:44:15 +00002953 raise vimconn.VimConnNotSupportedException(
sousaedu80135b92021-02-17 15:05:18 +01002954 "OpenStack VIM connector does not support provided "
2955 "Classification Type {}, supported ones are: {}".format(
2956 ctype, supportedClassificationTypes
2957 )
2958 )
2959
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002960 if not self._validate_classification(ctype, definition):
tierno72774862020-05-04 11:44:15 +00002961 raise vimconn.VimConnException(
sousaedu80135b92021-02-17 15:05:18 +01002962 "Incorrect Classification definition for the type specified."
2963 )
tierno7edb6752016-03-21 17:37:52 +01002964
sousaedu80135b92021-02-17 15:05:18 +01002965 classification_dict = definition
2966 classification_dict["name"] = name
Igor D.Ccaadc442017-11-06 12:48:48 +00002967 new_class = self.neutron.create_sfc_flow_classifier(
sousaedu80135b92021-02-17 15:05:18 +01002968 {"flow_classifier": classification_dict}
2969 )
2970
2971 return new_class["flow_classifier"]["id"]
2972 except (
2973 neExceptions.ConnectionFailed,
2974 ksExceptions.ClientException,
2975 neExceptions.NeutronException,
2976 ConnectionError,
2977 ) as e:
2978 self.logger.error("Creation of Classification failed.")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002979 self._format_exception(e)
2980
2981 def get_classification(self, class_id):
2982 self.logger.debug(" Getting Classification %s from VIM", class_id)
2983 filter_dict = {"id": class_id}
2984 class_list = self.get_classification_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01002985
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002986 if len(class_list) == 0:
tierno72774862020-05-04 11:44:15 +00002987 raise vimconn.VimConnNotFoundException(
sousaedu80135b92021-02-17 15:05:18 +01002988 "Classification '{}' not found".format(class_id)
2989 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002990 elif len(class_list) > 1:
tierno72774862020-05-04 11:44:15 +00002991 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01002992 "Found more than one Classification with this criteria"
2993 )
2994
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002995 classification = class_list[0]
sousaedu80135b92021-02-17 15:05:18 +01002996
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002997 return classification
2998
2999 def get_classification_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01003000 self.logger.debug(
3001 "Getting Classifications from VIM filter: '%s'", str(filter_dict)
3002 )
3003
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003004 try:
tierno69b590e2018-03-13 18:52:23 +01003005 filter_dict_os = filter_dict.copy()
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003006 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01003007
tierno69b590e2018-03-13 18:52:23 +01003008 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01003009 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3010
Igor D.Ccaadc442017-11-06 12:48:48 +00003011 classification_dict = self.neutron.list_sfc_flow_classifiers(
sousaedu80135b92021-02-17 15:05:18 +01003012 **filter_dict_os
3013 )
tierno69b590e2018-03-13 18:52:23 +01003014 classification_list = classification_dict["flow_classifiers"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003015 self.__classification_os2mano(classification_list)
sousaedu80135b92021-02-17 15:05:18 +01003016
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003017 return classification_list
sousaedu80135b92021-02-17 15:05:18 +01003018 except (
3019 neExceptions.ConnectionFailed,
3020 ksExceptions.ClientException,
3021 neExceptions.NeutronException,
3022 ConnectionError,
3023 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003024 self._format_exception(e)
3025
3026 def delete_classification(self, class_id):
3027 self.logger.debug("Deleting Classification '%s' from VIM", class_id)
sousaedu80135b92021-02-17 15:05:18 +01003028
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003029 try:
3030 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003031 self.neutron.delete_sfc_flow_classifier(class_id)
sousaedu80135b92021-02-17 15:05:18 +01003032
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003033 return class_id
sousaedu80135b92021-02-17 15:05:18 +01003034 except (
3035 neExceptions.ConnectionFailed,
3036 neExceptions.NeutronException,
3037 ksExceptions.ClientException,
3038 neExceptions.NeutronException,
3039 ConnectionError,
3040 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003041 self._format_exception(e)
3042
3043 def new_sfi(self, name, ingress_ports, egress_ports, sfc_encap=True):
sousaedu80135b92021-02-17 15:05:18 +01003044 self.logger.debug(
3045 "Adding a new Service Function Instance to VIM, named '%s'", name
3046 )
3047
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003048 try:
3049 new_sfi = None
3050 self._reload_connection()
3051 correlation = None
sousaedu80135b92021-02-17 15:05:18 +01003052
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003053 if sfc_encap:
sousaedu80135b92021-02-17 15:05:18 +01003054 correlation = "nsh"
3055
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003056 if len(ingress_ports) != 1:
tierno72774862020-05-04 11:44:15 +00003057 raise vimconn.VimConnNotSupportedException(
sousaedu80135b92021-02-17 15:05:18 +01003058 "OpenStack VIM connector can only have 1 ingress port per SFI"
3059 )
3060
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003061 if len(egress_ports) != 1:
tierno72774862020-05-04 11:44:15 +00003062 raise vimconn.VimConnNotSupportedException(
sousaedu80135b92021-02-17 15:05:18 +01003063 "OpenStack VIM connector can only have 1 egress port per SFI"
3064 )
3065
3066 sfi_dict = {
3067 "name": name,
3068 "ingress": ingress_ports[0],
3069 "egress": egress_ports[0],
3070 "service_function_parameters": {"correlation": correlation},
3071 }
3072 new_sfi = self.neutron.create_sfc_port_pair({"port_pair": sfi_dict})
3073
3074 return new_sfi["port_pair"]["id"]
3075 except (
3076 neExceptions.ConnectionFailed,
3077 ksExceptions.ClientException,
3078 neExceptions.NeutronException,
3079 ConnectionError,
3080 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003081 if new_sfi:
3082 try:
sousaedu80135b92021-02-17 15:05:18 +01003083 self.neutron.delete_sfc_port_pair(new_sfi["port_pair"]["id"])
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003084 except Exception:
3085 self.logger.error(
sousaedu80135b92021-02-17 15:05:18 +01003086 "Creation of Service Function Instance failed, with "
3087 "subsequent deletion failure as well."
3088 )
3089
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003090 self._format_exception(e)
3091
3092 def get_sfi(self, sfi_id):
sousaedu80135b92021-02-17 15:05:18 +01003093 self.logger.debug("Getting Service Function Instance %s from VIM", sfi_id)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003094 filter_dict = {"id": sfi_id}
3095 sfi_list = self.get_sfi_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01003096
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003097 if len(sfi_list) == 0:
sousaedu80135b92021-02-17 15:05:18 +01003098 raise vimconn.VimConnNotFoundException(
3099 "Service Function Instance '{}' not found".format(sfi_id)
3100 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003101 elif len(sfi_list) > 1:
tierno72774862020-05-04 11:44:15 +00003102 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003103 "Found more than one Service Function Instance with this criteria"
3104 )
3105
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003106 sfi = sfi_list[0]
sousaedu80135b92021-02-17 15:05:18 +01003107
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003108 return sfi
3109
3110 def get_sfi_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01003111 self.logger.debug(
3112 "Getting Service Function Instances from VIM filter: '%s'", str(filter_dict)
3113 )
3114
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003115 try:
3116 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +01003117 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +01003118
tierno69b590e2018-03-13 18:52:23 +01003119 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01003120 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3121
tierno69b590e2018-03-13 18:52:23 +01003122 sfi_dict = self.neutron.list_sfc_port_pairs(**filter_dict_os)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003123 sfi_list = sfi_dict["port_pairs"]
3124 self.__sfi_os2mano(sfi_list)
sousaedu80135b92021-02-17 15:05:18 +01003125
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003126 return sfi_list
sousaedu80135b92021-02-17 15:05:18 +01003127 except (
3128 neExceptions.ConnectionFailed,
3129 ksExceptions.ClientException,
3130 neExceptions.NeutronException,
3131 ConnectionError,
3132 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003133 self._format_exception(e)
3134
3135 def delete_sfi(self, sfi_id):
sousaedu80135b92021-02-17 15:05:18 +01003136 self.logger.debug("Deleting Service Function Instance '%s' from VIM", sfi_id)
3137
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003138 try:
3139 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003140 self.neutron.delete_sfc_port_pair(sfi_id)
sousaedu80135b92021-02-17 15:05:18 +01003141
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003142 return sfi_id
sousaedu80135b92021-02-17 15:05:18 +01003143 except (
3144 neExceptions.ConnectionFailed,
3145 neExceptions.NeutronException,
3146 ksExceptions.ClientException,
3147 neExceptions.NeutronException,
3148 ConnectionError,
3149 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003150 self._format_exception(e)
3151
3152 def new_sf(self, name, sfis, sfc_encap=True):
tierno7d782ef2019-10-04 12:56:31 +00003153 self.logger.debug("Adding a new Service Function to VIM, named '%s'", name)
sousaedu80135b92021-02-17 15:05:18 +01003154
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003155 try:
3156 new_sf = None
3157 self._reload_connection()
tierno9c5c8322018-03-23 15:44:03 +01003158 # correlation = None
3159 # if sfc_encap:
sousaedu80135b92021-02-17 15:05:18 +01003160 # correlation = "nsh"
3161
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003162 for instance in sfis:
3163 sfi = self.get_sfi(instance)
sousaedu80135b92021-02-17 15:05:18 +01003164
3165 if sfi.get("sfc_encap") != sfc_encap:
tierno72774862020-05-04 11:44:15 +00003166 raise vimconn.VimConnNotSupportedException(
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003167 "OpenStack VIM connector requires all SFIs of the "
sousaedu80135b92021-02-17 15:05:18 +01003168 "same SF to share the same SFC Encapsulation"
3169 )
3170
3171 sf_dict = {"name": name, "port_pairs": sfis}
3172 new_sf = self.neutron.create_sfc_port_pair_group(
3173 {"port_pair_group": sf_dict}
3174 )
3175
3176 return new_sf["port_pair_group"]["id"]
3177 except (
3178 neExceptions.ConnectionFailed,
3179 ksExceptions.ClientException,
3180 neExceptions.NeutronException,
3181 ConnectionError,
3182 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003183 if new_sf:
3184 try:
Igor D.Ccaadc442017-11-06 12:48:48 +00003185 self.neutron.delete_sfc_port_pair_group(
sousaedu80135b92021-02-17 15:05:18 +01003186 new_sf["port_pair_group"]["id"]
3187 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003188 except Exception:
3189 self.logger.error(
sousaedu80135b92021-02-17 15:05:18 +01003190 "Creation of Service Function failed, with "
3191 "subsequent deletion failure as well."
3192 )
3193
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003194 self._format_exception(e)
3195
3196 def get_sf(self, sf_id):
3197 self.logger.debug("Getting Service Function %s from VIM", sf_id)
3198 filter_dict = {"id": sf_id}
3199 sf_list = self.get_sf_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01003200
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003201 if len(sf_list) == 0:
tierno72774862020-05-04 11:44:15 +00003202 raise vimconn.VimConnNotFoundException(
sousaedu80135b92021-02-17 15:05:18 +01003203 "Service Function '{}' not found".format(sf_id)
3204 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003205 elif len(sf_list) > 1:
tierno72774862020-05-04 11:44:15 +00003206 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003207 "Found more than one Service Function with this criteria"
3208 )
3209
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003210 sf = sf_list[0]
sousaedu80135b92021-02-17 15:05:18 +01003211
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003212 return sf
3213
3214 def get_sf_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01003215 self.logger.debug(
3216 "Getting Service Function from VIM filter: '%s'", str(filter_dict)
3217 )
3218
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003219 try:
3220 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +01003221 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +01003222
tierno69b590e2018-03-13 18:52:23 +01003223 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01003224 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3225
tierno69b590e2018-03-13 18:52:23 +01003226 sf_dict = self.neutron.list_sfc_port_pair_groups(**filter_dict_os)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003227 sf_list = sf_dict["port_pair_groups"]
3228 self.__sf_os2mano(sf_list)
sousaedu80135b92021-02-17 15:05:18 +01003229
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003230 return sf_list
sousaedu80135b92021-02-17 15:05:18 +01003231 except (
3232 neExceptions.ConnectionFailed,
3233 ksExceptions.ClientException,
3234 neExceptions.NeutronException,
3235 ConnectionError,
3236 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003237 self._format_exception(e)
3238
3239 def delete_sf(self, sf_id):
3240 self.logger.debug("Deleting Service Function '%s' from VIM", sf_id)
sousaedu80135b92021-02-17 15:05:18 +01003241
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003242 try:
3243 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003244 self.neutron.delete_sfc_port_pair_group(sf_id)
sousaedu80135b92021-02-17 15:05:18 +01003245
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003246 return sf_id
sousaedu80135b92021-02-17 15:05:18 +01003247 except (
3248 neExceptions.ConnectionFailed,
3249 neExceptions.NeutronException,
3250 ksExceptions.ClientException,
3251 neExceptions.NeutronException,
3252 ConnectionError,
3253 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003254 self._format_exception(e)
3255
3256 def new_sfp(self, name, classifications, sfs, sfc_encap=True, spi=None):
tierno7d782ef2019-10-04 12:56:31 +00003257 self.logger.debug("Adding a new Service Function Path to VIM, named '%s'", name)
sousaedu80135b92021-02-17 15:05:18 +01003258
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003259 try:
3260 new_sfp = None
3261 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003262 # In networking-sfc the MPLS encapsulation is legacy
3263 # should be used when no full SFC Encapsulation is intended
sousaedu80135b92021-02-17 15:05:18 +01003264 correlation = "mpls"
3265
Igor D.Ccaadc442017-11-06 12:48:48 +00003266 if sfc_encap:
sousaedu80135b92021-02-17 15:05:18 +01003267 correlation = "nsh"
3268
3269 sfp_dict = {
3270 "name": name,
3271 "flow_classifiers": classifications,
3272 "port_pair_groups": sfs,
3273 "chain_parameters": {"correlation": correlation},
3274 }
3275
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003276 if spi:
sousaedu80135b92021-02-17 15:05:18 +01003277 sfp_dict["chain_id"] = spi
3278
3279 new_sfp = self.neutron.create_sfc_port_chain({"port_chain": sfp_dict})
3280
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003281 return new_sfp["port_chain"]["id"]
sousaedu80135b92021-02-17 15:05:18 +01003282 except (
3283 neExceptions.ConnectionFailed,
3284 ksExceptions.ClientException,
3285 neExceptions.NeutronException,
3286 ConnectionError,
3287 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003288 if new_sfp:
3289 try:
sousaedu80135b92021-02-17 15:05:18 +01003290 self.neutron.delete_sfc_port_chain(new_sfp["port_chain"]["id"])
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003291 except Exception:
3292 self.logger.error(
sousaedu80135b92021-02-17 15:05:18 +01003293 "Creation of Service Function Path failed, with "
3294 "subsequent deletion failure as well."
3295 )
3296
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003297 self._format_exception(e)
3298
3299 def get_sfp(self, sfp_id):
3300 self.logger.debug(" Getting Service Function Path %s from VIM", sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003301
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003302 filter_dict = {"id": sfp_id}
3303 sfp_list = self.get_sfp_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01003304
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003305 if len(sfp_list) == 0:
tierno72774862020-05-04 11:44:15 +00003306 raise vimconn.VimConnNotFoundException(
sousaedu80135b92021-02-17 15:05:18 +01003307 "Service Function Path '{}' not found".format(sfp_id)
3308 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003309 elif len(sfp_list) > 1:
tierno72774862020-05-04 11:44:15 +00003310 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003311 "Found more than one Service Function Path with this criteria"
3312 )
3313
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003314 sfp = sfp_list[0]
sousaedu80135b92021-02-17 15:05:18 +01003315
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003316 return sfp
3317
3318 def get_sfp_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01003319 self.logger.debug(
3320 "Getting Service Function Paths from VIM filter: '%s'", str(filter_dict)
3321 )
3322
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003323 try:
3324 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +01003325 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +01003326
tierno69b590e2018-03-13 18:52:23 +01003327 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01003328 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3329
tierno69b590e2018-03-13 18:52:23 +01003330 sfp_dict = self.neutron.list_sfc_port_chains(**filter_dict_os)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003331 sfp_list = sfp_dict["port_chains"]
3332 self.__sfp_os2mano(sfp_list)
sousaedu80135b92021-02-17 15:05:18 +01003333
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003334 return sfp_list
sousaedu80135b92021-02-17 15:05:18 +01003335 except (
3336 neExceptions.ConnectionFailed,
3337 ksExceptions.ClientException,
3338 neExceptions.NeutronException,
3339 ConnectionError,
3340 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003341 self._format_exception(e)
3342
3343 def delete_sfp(self, sfp_id):
tierno7d782ef2019-10-04 12:56:31 +00003344 self.logger.debug("Deleting Service Function Path '%s' from VIM", sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003345
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003346 try:
3347 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003348 self.neutron.delete_sfc_port_chain(sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003349
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003350 return sfp_id
sousaedu80135b92021-02-17 15:05:18 +01003351 except (
3352 neExceptions.ConnectionFailed,
3353 neExceptions.NeutronException,
3354 ksExceptions.ClientException,
3355 neExceptions.NeutronException,
3356 ConnectionError,
3357 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003358 self._format_exception(e)
borsatti8a2dda32019-12-18 15:08:57 +00003359
borsatti8a2dda32019-12-18 15:08:57 +00003360 def refresh_sfps_status(self, sfp_list):
tierno1ec592d2020-06-16 15:29:47 +00003361 """Get the status of the service function path
sousaedu80135b92021-02-17 15:05:18 +01003362 Params: the list of sfp identifiers
3363 Returns a dictionary with:
3364 vm_id: #VIM id of this service function path
3365 status: #Mandatory. Text with one of:
3366 # DELETED (not found at vim)
3367 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3368 # OTHER (Vim reported other status not understood)
3369 # ERROR (VIM indicates an ERROR status)
3370 # ACTIVE,
3371 # CREATING (on building process)
3372 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3373 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)F
tierno1ec592d2020-06-16 15:29:47 +00003374 """
3375 sfp_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01003376 self.logger.debug(
3377 "refresh_sfps status: Getting tenant SFP information from VIM"
3378 )
3379
borsatti8a2dda32019-12-18 15:08:57 +00003380 for sfp_id in sfp_list:
tierno1ec592d2020-06-16 15:29:47 +00003381 sfp = {}
sousaedu80135b92021-02-17 15:05:18 +01003382
borsatti8a2dda32019-12-18 15:08:57 +00003383 try:
3384 sfp_vim = self.get_sfp(sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003385
3386 if sfp_vim["spi"]:
3387 sfp["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003388 else:
sousaedu80135b92021-02-17 15:05:18 +01003389 sfp["status"] = "OTHER"
3390 sfp["error_msg"] = "VIM status reported " + sfp["status"]
borsatti8a2dda32019-12-18 15:08:57 +00003391
sousaedu80135b92021-02-17 15:05:18 +01003392 sfp["vim_info"] = self.serialize(sfp_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003393
sousaedu80135b92021-02-17 15:05:18 +01003394 if sfp_vim.get("fault"):
3395 sfp["error_msg"] = str(sfp_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003396 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003397 self.logger.error("Exception getting sfp status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003398 sfp["status"] = "DELETED"
3399 sfp["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003400 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003401 self.logger.error("Exception getting sfp status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003402 sfp["status"] = "VIM_ERROR"
3403 sfp["error_msg"] = str(e)
3404
borsatti8a2dda32019-12-18 15:08:57 +00003405 sfp_dict[sfp_id] = sfp
sousaedu80135b92021-02-17 15:05:18 +01003406
borsatti8a2dda32019-12-18 15:08:57 +00003407 return sfp_dict
3408
borsatti8a2dda32019-12-18 15:08:57 +00003409 def refresh_sfis_status(self, sfi_list):
tierno1ec592d2020-06-16 15:29:47 +00003410 """Get the status of the service function instances
sousaedu80135b92021-02-17 15:05:18 +01003411 Params: the list of sfi identifiers
3412 Returns a dictionary with:
3413 vm_id: #VIM id of this service function instance
3414 status: #Mandatory. Text with one of:
3415 # DELETED (not found at vim)
3416 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3417 # OTHER (Vim reported other status not understood)
3418 # ERROR (VIM indicates an ERROR status)
3419 # ACTIVE,
3420 # CREATING (on building process)
3421 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3422 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00003423 """
3424 sfi_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01003425 self.logger.debug(
3426 "refresh_sfis status: Getting tenant sfi information from VIM"
3427 )
3428
borsatti8a2dda32019-12-18 15:08:57 +00003429 for sfi_id in sfi_list:
tierno1ec592d2020-06-16 15:29:47 +00003430 sfi = {}
sousaedu80135b92021-02-17 15:05:18 +01003431
borsatti8a2dda32019-12-18 15:08:57 +00003432 try:
3433 sfi_vim = self.get_sfi(sfi_id)
sousaedu80135b92021-02-17 15:05:18 +01003434
borsatti8a2dda32019-12-18 15:08:57 +00003435 if sfi_vim:
sousaedu80135b92021-02-17 15:05:18 +01003436 sfi["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003437 else:
sousaedu80135b92021-02-17 15:05:18 +01003438 sfi["status"] = "OTHER"
3439 sfi["error_msg"] = "VIM status reported " + sfi["status"]
borsatti8a2dda32019-12-18 15:08:57 +00003440
sousaedu80135b92021-02-17 15:05:18 +01003441 sfi["vim_info"] = self.serialize(sfi_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003442
sousaedu80135b92021-02-17 15:05:18 +01003443 if sfi_vim.get("fault"):
3444 sfi["error_msg"] = str(sfi_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003445 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003446 self.logger.error("Exception getting sfi status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003447 sfi["status"] = "DELETED"
3448 sfi["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003449 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003450 self.logger.error("Exception getting sfi status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003451 sfi["status"] = "VIM_ERROR"
3452 sfi["error_msg"] = str(e)
3453
borsatti8a2dda32019-12-18 15:08:57 +00003454 sfi_dict[sfi_id] = sfi
sousaedu80135b92021-02-17 15:05:18 +01003455
borsatti8a2dda32019-12-18 15:08:57 +00003456 return sfi_dict
3457
borsatti8a2dda32019-12-18 15:08:57 +00003458 def refresh_sfs_status(self, sf_list):
tierno1ec592d2020-06-16 15:29:47 +00003459 """Get the status of the service functions
sousaedu80135b92021-02-17 15:05:18 +01003460 Params: the list of sf identifiers
3461 Returns a dictionary with:
3462 vm_id: #VIM id of this service function
3463 status: #Mandatory. Text with one of:
3464 # DELETED (not found at vim)
3465 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3466 # OTHER (Vim reported other status not understood)
3467 # ERROR (VIM indicates an ERROR status)
3468 # ACTIVE,
3469 # CREATING (on building process)
3470 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3471 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00003472 """
3473 sf_dict = {}
borsatti8a2dda32019-12-18 15:08:57 +00003474 self.logger.debug("refresh_sfs status: Getting tenant sf information from VIM")
sousaedu80135b92021-02-17 15:05:18 +01003475
borsatti8a2dda32019-12-18 15:08:57 +00003476 for sf_id in sf_list:
tierno1ec592d2020-06-16 15:29:47 +00003477 sf = {}
sousaedu80135b92021-02-17 15:05:18 +01003478
borsatti8a2dda32019-12-18 15:08:57 +00003479 try:
3480 sf_vim = self.get_sf(sf_id)
sousaedu80135b92021-02-17 15:05:18 +01003481
borsatti8a2dda32019-12-18 15:08:57 +00003482 if sf_vim:
sousaedu80135b92021-02-17 15:05:18 +01003483 sf["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003484 else:
sousaedu80135b92021-02-17 15:05:18 +01003485 sf["status"] = "OTHER"
3486 sf["error_msg"] = "VIM status reported " + sf_vim["status"]
borsatti8a2dda32019-12-18 15:08:57 +00003487
sousaedu80135b92021-02-17 15:05:18 +01003488 sf["vim_info"] = self.serialize(sf_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003489
sousaedu80135b92021-02-17 15:05:18 +01003490 if sf_vim.get("fault"):
3491 sf["error_msg"] = str(sf_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003492 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003493 self.logger.error("Exception getting sf status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003494 sf["status"] = "DELETED"
3495 sf["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003496 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003497 self.logger.error("Exception getting sf status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003498 sf["status"] = "VIM_ERROR"
3499 sf["error_msg"] = str(e)
3500
borsatti8a2dda32019-12-18 15:08:57 +00003501 sf_dict[sf_id] = sf
sousaedu80135b92021-02-17 15:05:18 +01003502
borsatti8a2dda32019-12-18 15:08:57 +00003503 return sf_dict
3504
borsatti8a2dda32019-12-18 15:08:57 +00003505 def refresh_classifications_status(self, classification_list):
tierno1ec592d2020-06-16 15:29:47 +00003506 """Get the status of the classifications
sousaedu80135b92021-02-17 15:05:18 +01003507 Params: the list of classification identifiers
3508 Returns a dictionary with:
3509 vm_id: #VIM id of this classifier
3510 status: #Mandatory. Text with one of:
3511 # DELETED (not found at vim)
3512 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3513 # OTHER (Vim reported other status not understood)
3514 # ERROR (VIM indicates an ERROR status)
3515 # ACTIVE,
3516 # CREATING (on building process)
3517 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3518 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00003519 """
3520 classification_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01003521 self.logger.debug(
3522 "refresh_classifications status: Getting tenant classification information from VIM"
3523 )
3524
borsatti8a2dda32019-12-18 15:08:57 +00003525 for classification_id in classification_list:
tierno1ec592d2020-06-16 15:29:47 +00003526 classification = {}
sousaedu80135b92021-02-17 15:05:18 +01003527
borsatti8a2dda32019-12-18 15:08:57 +00003528 try:
3529 classification_vim = self.get_classification(classification_id)
sousaedu80135b92021-02-17 15:05:18 +01003530
borsatti8a2dda32019-12-18 15:08:57 +00003531 if classification_vim:
sousaedu80135b92021-02-17 15:05:18 +01003532 classification["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003533 else:
sousaedu80135b92021-02-17 15:05:18 +01003534 classification["status"] = "OTHER"
3535 classification["error_msg"] = (
3536 "VIM status reported " + classification["status"]
3537 )
borsatti8a2dda32019-12-18 15:08:57 +00003538
sousaedu80135b92021-02-17 15:05:18 +01003539 classification["vim_info"] = self.serialize(classification_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003540
sousaedu80135b92021-02-17 15:05:18 +01003541 if classification_vim.get("fault"):
3542 classification["error_msg"] = str(classification_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003543 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003544 self.logger.error("Exception getting classification status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003545 classification["status"] = "DELETED"
3546 classification["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003547 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003548 self.logger.error("Exception getting classification status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003549 classification["status"] = "VIM_ERROR"
3550 classification["error_msg"] = str(e)
3551
borsatti8a2dda32019-12-18 15:08:57 +00003552 classification_dict[classification_id] = classification
sousaedu80135b92021-02-17 15:05:18 +01003553
borsatti8a2dda32019-12-18 15:08:57 +00003554 return classification_dict
Alexis Romerob70f4ed2022-03-11 18:00:49 +01003555
3556 def new_affinity_group(self, affinity_group_data):
3557 """Adds a server group to VIM
3558 affinity_group_data contains a dictionary with information, keys:
3559 name: name in VIM for the server group
3560 type: affinity or anti-affinity
3561 scope: Only nfvi-node allowed
3562 Returns the server group identifier"""
3563 self.logger.debug("Adding Server Group '%s'", str(affinity_group_data))
3564
3565 try:
3566 name = affinity_group_data["name"]
3567 policy = affinity_group_data["type"]
3568
3569 self._reload_connection()
3570 new_server_group = self.nova.server_groups.create(name, policy)
3571
3572 return new_server_group.id
3573 except (
3574 ksExceptions.ClientException,
3575 nvExceptions.ClientException,
3576 ConnectionError,
3577 KeyError,
3578 ) as e:
3579 self._format_exception(e)
3580
3581 def get_affinity_group(self, affinity_group_id):
3582 """Obtain server group details from the VIM. Returns the server group detais as a dict"""
3583 self.logger.debug("Getting flavor '%s'", affinity_group_id)
3584 try:
3585 self._reload_connection()
3586 server_group = self.nova.server_groups.find(id=affinity_group_id)
3587
3588 return server_group.to_dict()
3589 except (
3590 nvExceptions.NotFound,
3591 nvExceptions.ClientException,
3592 ksExceptions.ClientException,
3593 ConnectionError,
3594 ) as e:
3595 self._format_exception(e)
3596
3597 def delete_affinity_group(self, affinity_group_id):
3598 """Deletes a server group from the VIM. Returns the old affinity_group_id"""
3599 self.logger.debug("Getting server group '%s'", affinity_group_id)
3600 try:
3601 self._reload_connection()
3602 self.nova.server_groups.delete(affinity_group_id)
3603
3604 return affinity_group_id
3605 except (
3606 nvExceptions.NotFound,
3607 ksExceptions.ClientException,
3608 nvExceptions.ClientException,
3609 ConnectionError,
3610 ) as e:
3611 self._format_exception(e)
elumalai8658c2c2022-04-28 19:09:31 +05303612
3613 def get_vdu_state(self, vm_id):
3614 """
3615 Getting the state of a vdu
3616 param:
3617 vm_id: ID of an instance
3618 """
3619 self.logger.debug("Getting the status of VM")
3620 self.logger.debug("VIM VM ID %s", vm_id)
3621 self._reload_connection()
3622 server = self.nova.servers.find(id=vm_id)
3623 server_dict = server.to_dict()
3624 vdu_data = [
3625 server_dict["status"],
3626 server_dict["flavor"]["id"],
3627 server_dict["OS-EXT-SRV-ATTR:host"],
3628 server_dict["OS-EXT-AZ:availability_zone"],
3629 ]
3630 self.logger.debug("vdu_data %s", vdu_data)
3631 return vdu_data
3632
3633 def check_compute_availability(self, host, server_flavor_details):
3634 self._reload_connection()
3635 hypervisor_search = self.nova.hypervisors.search(
3636 hypervisor_match=host, servers=True
3637 )
3638 for hypervisor in hypervisor_search:
3639 hypervisor_id = hypervisor.to_dict()["id"]
3640 hypervisor_details = self.nova.hypervisors.get(hypervisor=hypervisor_id)
3641 hypervisor_dict = hypervisor_details.to_dict()
3642 hypervisor_temp = json.dumps(hypervisor_dict)
3643 hypervisor_json = json.loads(hypervisor_temp)
3644 resources_available = [
3645 hypervisor_json["free_ram_mb"],
3646 hypervisor_json["disk_available_least"],
3647 hypervisor_json["vcpus"] - hypervisor_json["vcpus_used"],
3648 ]
3649 compute_available = all(
3650 x > y for x, y in zip(resources_available, server_flavor_details)
3651 )
3652 if compute_available:
3653 return host
3654
3655 def check_availability_zone(
3656 self, old_az, server_flavor_details, old_host, host=None
3657 ):
3658 self._reload_connection()
3659 az_check = {"zone_check": False, "compute_availability": None}
3660 aggregates_list = self.nova.aggregates.list()
3661 for aggregate in aggregates_list:
3662 aggregate_details = aggregate.to_dict()
3663 aggregate_temp = json.dumps(aggregate_details)
3664 aggregate_json = json.loads(aggregate_temp)
3665 if aggregate_json["availability_zone"] == old_az:
3666 hosts_list = aggregate_json["hosts"]
3667 if host is not None:
3668 if host in hosts_list:
3669 az_check["zone_check"] = True
3670 available_compute_id = self.check_compute_availability(
3671 host, server_flavor_details
3672 )
3673 if available_compute_id is not None:
3674 az_check["compute_availability"] = available_compute_id
3675 else:
3676 for check_host in hosts_list:
3677 if check_host != old_host:
3678 available_compute_id = self.check_compute_availability(
3679 check_host, server_flavor_details
3680 )
3681 if available_compute_id is not None:
3682 az_check["zone_check"] = True
3683 az_check["compute_availability"] = available_compute_id
3684 break
3685 else:
3686 az_check["zone_check"] = True
3687 return az_check
3688
3689 def migrate_instance(self, vm_id, compute_host=None):
3690 """
3691 Migrate a vdu
3692 param:
3693 vm_id: ID of an instance
3694 compute_host: Host to migrate the vdu to
3695 """
3696 self._reload_connection()
3697 vm_state = False
3698 instance_state = self.get_vdu_state(vm_id)
3699 server_flavor_id = instance_state[1]
3700 server_hypervisor_name = instance_state[2]
3701 server_availability_zone = instance_state[3]
3702 try:
3703 server_flavor = self.nova.flavors.find(id=server_flavor_id).to_dict()
3704 server_flavor_details = [
3705 server_flavor["ram"],
3706 server_flavor["disk"],
3707 server_flavor["vcpus"],
3708 ]
3709 if compute_host == server_hypervisor_name:
3710 raise vimconn.VimConnException(
3711 "Unable to migrate instance '{}' to the same host '{}'".format(
3712 vm_id, compute_host
3713 ),
3714 http_code=vimconn.HTTP_Bad_Request,
3715 )
3716 az_status = self.check_availability_zone(
3717 server_availability_zone,
3718 server_flavor_details,
3719 server_hypervisor_name,
3720 compute_host,
3721 )
3722 availability_zone_check = az_status["zone_check"]
3723 available_compute_id = az_status.get("compute_availability")
3724
3725 if availability_zone_check is False:
3726 raise vimconn.VimConnException(
3727 "Unable to migrate instance '{}' to a different availability zone".format(
3728 vm_id
3729 ),
3730 http_code=vimconn.HTTP_Bad_Request,
3731 )
3732 if available_compute_id is not None:
3733 self.nova.servers.live_migrate(
3734 server=vm_id,
3735 host=available_compute_id,
3736 block_migration=True,
3737 disk_over_commit=False,
3738 )
3739 state = "MIGRATING"
3740 changed_compute_host = ""
3741 if state == "MIGRATING":
3742 vm_state = self.__wait_for_vm(vm_id, "ACTIVE")
3743 changed_compute_host = self.get_vdu_state(vm_id)[2]
3744 if vm_state and changed_compute_host == available_compute_id:
3745 self.logger.debug(
3746 "Instance '{}' migrated to the new compute host '{}'".format(
3747 vm_id, changed_compute_host
3748 )
3749 )
3750 return state, available_compute_id
3751 else:
3752 raise vimconn.VimConnException(
3753 "Migration Failed. Instance '{}' not moved to the new host {}".format(
3754 vm_id, available_compute_id
3755 ),
3756 http_code=vimconn.HTTP_Bad_Request,
3757 )
3758 else:
3759 raise vimconn.VimConnException(
3760 "Compute '{}' not available or does not have enough resources to migrate the instance".format(
3761 available_compute_id
3762 ),
3763 http_code=vimconn.HTTP_Bad_Request,
3764 )
3765 except (
3766 nvExceptions.BadRequest,
3767 nvExceptions.ClientException,
3768 nvExceptions.NotFound,
3769 ) as e:
3770 self._format_exception(e)
sritharan29a4c1a2022-05-05 12:15:04 +00003771
3772 def resize_instance(self, vm_id, new_flavor_id):
3773 """
3774 For resizing the vm based on the given
3775 flavor details
3776 param:
3777 vm_id : ID of an instance
3778 new_flavor_id : Flavor id to be resized
3779 Return the status of a resized instance
3780 """
3781 self._reload_connection()
3782 self.logger.debug("resize the flavor of an instance")
3783 instance_status, old_flavor_id, compute_host, az = self.get_vdu_state(vm_id)
3784 old_flavor_disk = self.nova.flavors.find(id=old_flavor_id).to_dict()["disk"]
3785 new_flavor_disk = self.nova.flavors.find(id=new_flavor_id).to_dict()["disk"]
3786 try:
3787 if instance_status == "ACTIVE" or instance_status == "SHUTOFF":
3788 if old_flavor_disk > new_flavor_disk:
3789 raise nvExceptions.BadRequest(
3790 400,
3791 message="Server disk resize failed. Resize to lower disk flavor is not allowed",
3792 )
3793 else:
3794 self.nova.servers.resize(server=vm_id, flavor=new_flavor_id)
3795 vm_state = self.__wait_for_vm(vm_id, "VERIFY_RESIZE")
3796 if vm_state:
3797 instance_resized_status = self.confirm_resize(vm_id)
3798 return instance_resized_status
3799 else:
3800 raise nvExceptions.BadRequest(
3801 409,
3802 message="Cannot 'resize' vm_state is in ERROR",
3803 )
3804
3805 else:
3806 self.logger.debug("ERROR : Instance is not in ACTIVE or SHUTOFF state")
3807 raise nvExceptions.BadRequest(
3808 409,
3809 message="Cannot 'resize' instance while it is in vm_state resized",
3810 )
3811 except (
3812 nvExceptions.BadRequest,
3813 nvExceptions.ClientException,
3814 nvExceptions.NotFound,
3815 ) as e:
3816 self._format_exception(e)
3817
3818 def confirm_resize(self, vm_id):
3819 """
3820 Confirm the resize of an instance
3821 param:
3822 vm_id: ID of an instance
3823 """
3824 self._reload_connection()
3825 self.nova.servers.confirm_resize(server=vm_id)
3826 if self.get_vdu_state(vm_id)[0] == "VERIFY_RESIZE":
3827 self.__wait_for_vm(vm_id, "ACTIVE")
3828 instance_status = self.get_vdu_state(vm_id)[0]
3829 return instance_status