blob: f2f6d22e06e57c8d8627f2dc7afb831c08c3315e [file] [log] [blame]
tierno7edb6752016-03-21 17:37:52 +01001# -*- coding: utf-8 -*-
2
3##
tierno92021022018-09-12 16:29:23 +02004# Copyright 2015 Telefonica Investigacion y Desarrollo, S.A.U.
tierno7edb6752016-03-21 17:37:52 +01005# This file is part of openmano
6# All Rights Reserved.
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License. You may obtain
10# a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
17# License for the specific language governing permissions and limitations
18# under the License.
tierno7edb6752016-03-21 17:37:52 +010019##
20
tierno1ec592d2020-06-16 15:29:47 +000021"""
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +000022osconnector implements all the methods to interact with openstack using the python-neutronclient.
23
24For the VNF forwarding graph, The OpenStack VIM connector calls the
25networking-sfc Neutron extension methods, whose resources are mapped
26to the VIM connector's SFC resources as follows:
27- Classification (OSM) -> Flow Classifier (Neutron)
28- Service Function Instance (OSM) -> Port Pair (Neutron)
29- Service Function (OSM) -> Port Pair Group (Neutron)
30- Service Function Path (OSM) -> Port Chain (Neutron)
tierno1ec592d2020-06-16 15:29:47 +000031"""
tierno7edb6752016-03-21 17:37:52 +010032
sousaedu049cbb12022-01-05 11:39:35 +000033import copy
34from http.client import HTTPException
elumalai8658c2c2022-04-28 19:09:31 +053035import json
tiernoae4a8d12016-07-08 12:30:39 +020036import logging
sousaedu049cbb12022-01-05 11:39:35 +000037from pprint import pformat
garciadeblas2299e3b2017-01-26 14:35:55 +000038import random
kate721d79b2017-06-24 04:21:38 -070039import re
sousaedu049cbb12022-01-05 11:39:35 +000040import time
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +030041from typing import Dict, Optional, Tuple
sousaedu049cbb12022-01-05 11:39:35 +000042
43from cinderclient import client as cClient
tiernob5cef372017-06-19 15:52:22 +020044from glanceclient import client as glClient
tierno7edb6752016-03-21 17:37:52 +010045import glanceclient.exc as gl1Exceptions
sousaedu049cbb12022-01-05 11:39:35 +000046from keystoneauth1 import session
47from keystoneauth1.identity import v2, v3
48import keystoneclient.exceptions as ksExceptions
49import keystoneclient.v2_0.client as ksClient_v2
50import keystoneclient.v3.client as ksClient_v3
51import netaddr
tierno7edb6752016-03-21 17:37:52 +010052from neutronclient.common import exceptions as neExceptions
sousaedu049cbb12022-01-05 11:39:35 +000053from neutronclient.neutron import client as neClient
54from novaclient import client as nClient, exceptions as nvExceptions
55from osm_ro_plugin import vimconn
tierno7edb6752016-03-21 17:37:52 +010056from requests.exceptions import ConnectionError
sousaedu049cbb12022-01-05 11:39:35 +000057import yaml
tierno7edb6752016-03-21 17:37:52 +010058
tierno1ec592d2020-06-16 15:29:47 +000059__author__ = "Alfonso Tierno, Gerardo Garcia, Pablo Montes, xFlow Research, Igor D.C., Eduardo Sousa"
60__date__ = "$22-sep-2017 23:59:59$"
tierno40e1bce2017-08-09 09:12:04 +020061
62"""contain the openstack virtual machine status to openmano status"""
sousaedu80135b92021-02-17 15:05:18 +010063vmStatus2manoFormat = {
64 "ACTIVE": "ACTIVE",
65 "PAUSED": "PAUSED",
66 "SUSPENDED": "SUSPENDED",
67 "SHUTOFF": "INACTIVE",
68 "BUILD": "BUILD",
69 "ERROR": "ERROR",
70 "DELETED": "DELETED",
71}
72netStatus2manoFormat = {
73 "ACTIVE": "ACTIVE",
74 "PAUSED": "PAUSED",
75 "INACTIVE": "INACTIVE",
76 "BUILD": "BUILD",
77 "ERROR": "ERROR",
78 "DELETED": "DELETED",
79}
tierno7edb6752016-03-21 17:37:52 +010080
sousaedu80135b92021-02-17 15:05:18 +010081supportedClassificationTypes = ["legacy_flow_classifier"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +000082
tierno1ec592d2020-06-16 15:29:47 +000083# global var to have a timeout creating and deleting volumes
garciadeblas64b39c52020-05-21 08:07:25 +000084volume_timeout = 1800
85server_timeout = 1800
montesmoreno0c8def02016-12-22 12:16:23 +000086
Anderson Bravalheri0446cd52018-08-17 15:26:19 +010087
88class SafeDumper(yaml.SafeDumper):
89 def represent_data(self, data):
90 # Openstack APIs use custom subclasses of dict and YAML safe dumper
91 # is designed to not handle that (reference issue 142 of pyyaml)
92 if isinstance(data, dict) and data.__class__ != dict:
93 # A simple solution is to convert those items back to dicts
94 data = dict(data.items())
95
96 return super(SafeDumper, self).represent_data(data)
97
98
tierno72774862020-05-04 11:44:15 +000099class vimconnector(vimconn.VimConnector):
sousaedu80135b92021-02-17 15:05:18 +0100100 def __init__(
101 self,
102 uuid,
103 name,
104 tenant_id,
105 tenant_name,
106 url,
107 url_admin=None,
108 user=None,
109 passwd=None,
110 log_level=None,
111 config={},
112 persistent_info={},
113 ):
tierno1ec592d2020-06-16 15:29:47 +0000114 """using common constructor parameters. In this case
tierno7edb6752016-03-21 17:37:52 +0100115 'url' is the keystone authorization url,
116 'url_admin' is not use
tierno1ec592d2020-06-16 15:29:47 +0000117 """
sousaedu80135b92021-02-17 15:05:18 +0100118 api_version = config.get("APIversion")
kate721d79b2017-06-24 04:21:38 -0700119
sousaedu80135b92021-02-17 15:05:18 +0100120 if api_version and api_version not in ("v3.3", "v2.0", "2", "3"):
121 raise vimconn.VimConnException(
122 "Invalid value '{}' for config:APIversion. "
123 "Allowed values are 'v3.3', 'v2.0', '2' or '3'".format(api_version)
124 )
125
126 vim_type = config.get("vim_type")
127
128 if vim_type and vim_type not in ("vio", "VIO"):
129 raise vimconn.VimConnException(
130 "Invalid value '{}' for config:vim_type."
131 "Allowed values are 'vio' or 'VIO'".format(vim_type)
132 )
133
134 if config.get("dataplane_net_vlan_range") is not None:
tierno1ec592d2020-06-16 15:29:47 +0000135 # validate vlan ranges provided by user
sousaedu80135b92021-02-17 15:05:18 +0100136 self._validate_vlan_ranges(
137 config.get("dataplane_net_vlan_range"), "dataplane_net_vlan_range"
138 )
garciadeblasebd66722019-01-31 16:01:31 +0000139
sousaedu80135b92021-02-17 15:05:18 +0100140 if config.get("multisegment_vlan_range") is not None:
tierno1ec592d2020-06-16 15:29:47 +0000141 # validate vlan ranges provided by user
sousaedu80135b92021-02-17 15:05:18 +0100142 self._validate_vlan_ranges(
143 config.get("multisegment_vlan_range"), "multisegment_vlan_range"
144 )
kate721d79b2017-06-24 04:21:38 -0700145
sousaedu80135b92021-02-17 15:05:18 +0100146 vimconn.VimConnector.__init__(
147 self,
148 uuid,
149 name,
150 tenant_id,
151 tenant_name,
152 url,
153 url_admin,
154 user,
155 passwd,
156 log_level,
157 config,
158 )
tiernob3d36742017-03-03 23:51:05 +0100159
tierno4d1ce222018-04-06 10:41:06 +0200160 if self.config.get("insecure") and self.config.get("ca_cert"):
sousaedu80135b92021-02-17 15:05:18 +0100161 raise vimconn.VimConnException(
162 "options insecure and ca_cert are mutually exclusive"
163 )
164
tierno4d1ce222018-04-06 10:41:06 +0200165 self.verify = True
sousaedu80135b92021-02-17 15:05:18 +0100166
tierno4d1ce222018-04-06 10:41:06 +0200167 if self.config.get("insecure"):
168 self.verify = False
sousaedu80135b92021-02-17 15:05:18 +0100169
tierno4d1ce222018-04-06 10:41:06 +0200170 if self.config.get("ca_cert"):
171 self.verify = self.config.get("ca_cert")
tierno4d1ce222018-04-06 10:41:06 +0200172
tierno7edb6752016-03-21 17:37:52 +0100173 if not url:
sousaedu80135b92021-02-17 15:05:18 +0100174 raise TypeError("url param can not be NoneType")
175
tiernob5cef372017-06-19 15:52:22 +0200176 self.persistent_info = persistent_info
sousaedu80135b92021-02-17 15:05:18 +0100177 self.availability_zone = persistent_info.get("availability_zone", None)
178 self.session = persistent_info.get("session", {"reload_client": True})
179 self.my_tenant_id = self.session.get("my_tenant_id")
180 self.nova = self.session.get("nova")
181 self.neutron = self.session.get("neutron")
182 self.cinder = self.session.get("cinder")
183 self.glance = self.session.get("glance")
184 # self.glancev1 = self.session.get("glancev1")
185 self.keystone = self.session.get("keystone")
186 self.api_version3 = self.session.get("api_version3")
kate721d79b2017-06-24 04:21:38 -0700187 self.vim_type = self.config.get("vim_type")
sousaedu80135b92021-02-17 15:05:18 +0100188
kate721d79b2017-06-24 04:21:38 -0700189 if self.vim_type:
190 self.vim_type = self.vim_type.upper()
sousaedu80135b92021-02-17 15:05:18 +0100191
kate721d79b2017-06-24 04:21:38 -0700192 if self.config.get("use_internal_endpoint"):
193 self.endpoint_type = "internalURL"
194 else:
195 self.endpoint_type = None
montesmoreno0c8def02016-12-22 12:16:23 +0000196
sousaedu80135b92021-02-17 15:05:18 +0100197 logging.getLogger("urllib3").setLevel(logging.WARNING)
198 logging.getLogger("keystoneauth").setLevel(logging.WARNING)
199 logging.getLogger("novaclient").setLevel(logging.WARNING)
200 self.logger = logging.getLogger("ro.vim.openstack")
kate721d79b2017-06-24 04:21:38 -0700201
tiernoa05b65a2019-02-01 12:30:27 +0000202 # allow security_groups to be a list or a single string
sousaedu80135b92021-02-17 15:05:18 +0100203 if isinstance(self.config.get("security_groups"), str):
204 self.config["security_groups"] = [self.config["security_groups"]]
205
tiernoa05b65a2019-02-01 12:30:27 +0000206 self.security_groups_id = None
207
tierno1ec592d2020-06-16 15:29:47 +0000208 # ###### VIO Specific Changes #########
kate721d79b2017-06-24 04:21:38 -0700209 if self.vim_type == "VIO":
sousaedu80135b92021-02-17 15:05:18 +0100210 self.logger = logging.getLogger("ro.vim.vio")
kate721d79b2017-06-24 04:21:38 -0700211
tiernofe789902016-09-29 14:20:44 +0000212 if log_level:
tierno1ec592d2020-06-16 15:29:47 +0000213 self.logger.setLevel(getattr(logging, log_level))
tiernof716aea2017-06-21 18:01:40 +0200214
215 def __getitem__(self, index):
216 """Get individuals parameters.
217 Throw KeyError"""
sousaedu80135b92021-02-17 15:05:18 +0100218 if index == "project_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200219 return self.config.get("project_domain_id")
sousaedu80135b92021-02-17 15:05:18 +0100220 elif index == "user_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200221 return self.config.get("user_domain_id")
222 else:
tierno72774862020-05-04 11:44:15 +0000223 return vimconn.VimConnector.__getitem__(self, index)
tiernof716aea2017-06-21 18:01:40 +0200224
225 def __setitem__(self, index, value):
226 """Set individuals parameters and it is marked as dirty so to force connection reload.
227 Throw KeyError"""
sousaedu80135b92021-02-17 15:05:18 +0100228 if index == "project_domain_id":
tiernof716aea2017-06-21 18:01:40 +0200229 self.config["project_domain_id"] = value
sousaedu80135b92021-02-17 15:05:18 +0100230 elif index == "user_domain_id":
tierno1ec592d2020-06-16 15:29:47 +0000231 self.config["user_domain_id"] = value
tiernof716aea2017-06-21 18:01:40 +0200232 else:
tierno72774862020-05-04 11:44:15 +0000233 vimconn.VimConnector.__setitem__(self, index, value)
sousaedu80135b92021-02-17 15:05:18 +0100234
235 self.session["reload_client"] = True
tiernof716aea2017-06-21 18:01:40 +0200236
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100237 def serialize(self, value):
238 """Serialization of python basic types.
239
240 In the case value is not serializable a message will be logged and a
241 simple representation of the data that cannot be converted back to
242 python is returned.
243 """
tierno7d782ef2019-10-04 12:56:31 +0000244 if isinstance(value, str):
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100245 return value
246
247 try:
sousaedu80135b92021-02-17 15:05:18 +0100248 return yaml.dump(
249 value, Dumper=SafeDumper, default_flow_style=True, width=256
250 )
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100251 except yaml.representer.RepresenterError:
sousaedu80135b92021-02-17 15:05:18 +0100252 self.logger.debug(
253 "The following entity cannot be serialized in YAML:\n\n%s\n\n",
254 pformat(value),
255 exc_info=True,
256 )
257
tierno1ec592d2020-06-16 15:29:47 +0000258 return str(value)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +0100259
tierno7edb6752016-03-21 17:37:52 +0100260 def _reload_connection(self):
tierno1ec592d2020-06-16 15:29:47 +0000261 """Called before any operation, it check if credentials has changed
tierno7edb6752016-03-21 17:37:52 +0100262 Throw keystoneclient.apiclient.exceptions.AuthorizationFailure
tierno1ec592d2020-06-16 15:29:47 +0000263 """
264 # TODO control the timing and possible token timeout, but it seams that python client does this task for us :-)
sousaedu80135b92021-02-17 15:05:18 +0100265 if self.session["reload_client"]:
266 if self.config.get("APIversion"):
267 self.api_version3 = (
268 self.config["APIversion"] == "v3.3"
269 or self.config["APIversion"] == "3"
270 )
tiernof716aea2017-06-21 18:01:40 +0200271 else: # get from ending auth_url that end with v3 or with v2.0
sousaedu80135b92021-02-17 15:05:18 +0100272 self.api_version3 = self.url.endswith("/v3") or self.url.endswith(
273 "/v3/"
274 )
275
276 self.session["api_version3"] = self.api_version3
277
tiernof716aea2017-06-21 18:01:40 +0200278 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100279 if self.config.get("project_domain_id") or self.config.get(
280 "project_domain_name"
281 ):
tierno3cb8dc32017-10-24 18:13:19 +0200282 project_domain_id_default = None
283 else:
sousaedu80135b92021-02-17 15:05:18 +0100284 project_domain_id_default = "default"
285
286 if self.config.get("user_domain_id") or self.config.get(
287 "user_domain_name"
288 ):
tierno3cb8dc32017-10-24 18:13:19 +0200289 user_domain_id_default = None
290 else:
sousaedu80135b92021-02-17 15:05:18 +0100291 user_domain_id_default = "default"
292 auth = v3.Password(
293 auth_url=self.url,
294 username=self.user,
295 password=self.passwd,
296 project_name=self.tenant_name,
297 project_id=self.tenant_id,
298 project_domain_id=self.config.get(
299 "project_domain_id", project_domain_id_default
300 ),
301 user_domain_id=self.config.get(
302 "user_domain_id", user_domain_id_default
303 ),
304 project_domain_name=self.config.get("project_domain_name"),
305 user_domain_name=self.config.get("user_domain_name"),
306 )
ahmadsa95baa272016-11-30 09:14:11 +0500307 else:
sousaedu80135b92021-02-17 15:05:18 +0100308 auth = v2.Password(
309 auth_url=self.url,
310 username=self.user,
311 password=self.passwd,
312 tenant_name=self.tenant_name,
313 tenant_id=self.tenant_id,
314 )
315
tierno4d1ce222018-04-06 10:41:06 +0200316 sess = session.Session(auth=auth, verify=self.verify)
tierno1ec592d2020-06-16 15:29:47 +0000317 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
318 # Titanium cloud and StarlingX
sousaedu80135b92021-02-17 15:05:18 +0100319 region_name = self.config.get("region_name")
320
tiernof716aea2017-06-21 18:01:40 +0200321 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100322 self.keystone = ksClient_v3.Client(
323 session=sess,
324 endpoint_type=self.endpoint_type,
325 region_name=region_name,
326 )
tiernof716aea2017-06-21 18:01:40 +0200327 else:
sousaedu80135b92021-02-17 15:05:18 +0100328 self.keystone = ksClient_v2.Client(
329 session=sess, endpoint_type=self.endpoint_type
330 )
331
332 self.session["keystone"] = self.keystone
333 # In order to enable microversion functionality an explicit microversion must be specified in "config".
montesmoreno9317d302017-08-16 12:48:23 +0200334 # This implementation approach is due to the warning message in
335 # https://developer.openstack.org/api-guide/compute/microversions.html
336 # where it is stated that microversion backwards compatibility is not guaranteed and clients should
337 # always require an specific microversion.
sousaedu80135b92021-02-17 15:05:18 +0100338 # To be able to use "device role tagging" functionality define "microversion: 2.32" in datacenter config
montesmoreno9317d302017-08-16 12:48:23 +0200339 version = self.config.get("microversion")
sousaedu80135b92021-02-17 15:05:18 +0100340
montesmoreno9317d302017-08-16 12:48:23 +0200341 if not version:
342 version = "2.1"
sousaedu80135b92021-02-17 15:05:18 +0100343
tierno1ec592d2020-06-16 15:29:47 +0000344 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
345 # Titanium cloud and StarlingX
sousaedu80135b92021-02-17 15:05:18 +0100346 self.nova = self.session["nova"] = nClient.Client(
347 str(version),
348 session=sess,
349 endpoint_type=self.endpoint_type,
350 region_name=region_name,
351 )
352 self.neutron = self.session["neutron"] = neClient.Client(
353 "2.0",
354 session=sess,
355 endpoint_type=self.endpoint_type,
356 region_name=region_name,
357 )
358 self.cinder = self.session["cinder"] = cClient.Client(
359 2,
360 session=sess,
361 endpoint_type=self.endpoint_type,
362 region_name=region_name,
363 )
364
tiernoa05b65a2019-02-01 12:30:27 +0000365 try:
sousaedu80135b92021-02-17 15:05:18 +0100366 self.my_tenant_id = self.session["my_tenant_id"] = sess.get_project_id()
tierno1ec592d2020-06-16 15:29:47 +0000367 except Exception:
tiernoa05b65a2019-02-01 12:30:27 +0000368 self.logger.error("Cannot get project_id from session", exc_info=True)
sousaedu80135b92021-02-17 15:05:18 +0100369
kate721d79b2017-06-24 04:21:38 -0700370 if self.endpoint_type == "internalURL":
371 glance_service_id = self.keystone.services.list(name="glance")[0].id
sousaedu80135b92021-02-17 15:05:18 +0100372 glance_endpoint = self.keystone.endpoints.list(
373 glance_service_id, interface="internal"
374 )[0].url
kate721d79b2017-06-24 04:21:38 -0700375 else:
376 glance_endpoint = None
sousaedu80135b92021-02-17 15:05:18 +0100377
378 self.glance = self.session["glance"] = glClient.Client(
379 2, session=sess, endpoint=glance_endpoint
380 )
tiernoa05b65a2019-02-01 12:30:27 +0000381 # using version 1 of glance client in new_image()
sousaedu80135b92021-02-17 15:05:18 +0100382 # self.glancev1 = self.session["glancev1"] = glClient.Client("1", session=sess,
tierno1beea862018-07-11 15:47:37 +0200383 # endpoint=glance_endpoint)
sousaedu80135b92021-02-17 15:05:18 +0100384 self.session["reload_client"] = False
385 self.persistent_info["session"] = self.session
mirabal29356312017-07-27 12:21:22 +0200386 # add availablity zone info inside self.persistent_info
387 self._set_availablity_zones()
sousaedu80135b92021-02-17 15:05:18 +0100388 self.persistent_info["availability_zone"] = self.availability_zone
389 # force to get again security_groups_ids next time they are needed
390 self.security_groups_id = None
ahmadsa95baa272016-11-30 09:14:11 +0500391
tierno7edb6752016-03-21 17:37:52 +0100392 def __net_os2mano(self, net_list_dict):
tierno1ec592d2020-06-16 15:29:47 +0000393 """Transform the net openstack format to mano format
394 net_list_dict can be a list of dict or a single dict"""
tierno7edb6752016-03-21 17:37:52 +0100395 if type(net_list_dict) is dict:
tierno1ec592d2020-06-16 15:29:47 +0000396 net_list_ = (net_list_dict,)
tierno7edb6752016-03-21 17:37:52 +0100397 elif type(net_list_dict) is list:
tierno1ec592d2020-06-16 15:29:47 +0000398 net_list_ = net_list_dict
tierno7edb6752016-03-21 17:37:52 +0100399 else:
400 raise TypeError("param net_list_dict must be a list or a dictionary")
401 for net in net_list_:
sousaedu80135b92021-02-17 15:05:18 +0100402 if net.get("provider:network_type") == "vlan":
403 net["type"] = "data"
tierno7edb6752016-03-21 17:37:52 +0100404 else:
sousaedu80135b92021-02-17 15:05:18 +0100405 net["type"] = "bridge"
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +0200406
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000407 def __classification_os2mano(self, class_list_dict):
408 """Transform the openstack format (Flow Classifier) to mano format
409 (Classification) class_list_dict can be a list of dict or a single dict
410 """
411 if isinstance(class_list_dict, dict):
412 class_list_ = [class_list_dict]
413 elif isinstance(class_list_dict, list):
414 class_list_ = class_list_dict
415 else:
tierno1ec592d2020-06-16 15:29:47 +0000416 raise TypeError("param class_list_dict must be a list or a dictionary")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000417 for classification in class_list_:
sousaedu80135b92021-02-17 15:05:18 +0100418 id = classification.pop("id")
419 name = classification.pop("name")
420 description = classification.pop("description")
421 project_id = classification.pop("project_id")
422 tenant_id = classification.pop("tenant_id")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000423 original_classification = copy.deepcopy(classification)
424 classification.clear()
sousaedu80135b92021-02-17 15:05:18 +0100425 classification["ctype"] = "legacy_flow_classifier"
426 classification["definition"] = original_classification
427 classification["id"] = id
428 classification["name"] = name
429 classification["description"] = description
430 classification["project_id"] = project_id
431 classification["tenant_id"] = tenant_id
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000432
433 def __sfi_os2mano(self, sfi_list_dict):
434 """Transform the openstack format (Port Pair) to mano format (SFI)
435 sfi_list_dict can be a list of dict or a single dict
436 """
437 if isinstance(sfi_list_dict, dict):
438 sfi_list_ = [sfi_list_dict]
439 elif isinstance(sfi_list_dict, list):
440 sfi_list_ = sfi_list_dict
441 else:
sousaedu80135b92021-02-17 15:05:18 +0100442 raise TypeError("param sfi_list_dict must be a list or a dictionary")
443
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000444 for sfi in sfi_list_:
sousaedu80135b92021-02-17 15:05:18 +0100445 sfi["ingress_ports"] = []
446 sfi["egress_ports"] = []
447
448 if sfi.get("ingress"):
449 sfi["ingress_ports"].append(sfi["ingress"])
450
451 if sfi.get("egress"):
452 sfi["egress_ports"].append(sfi["egress"])
453
454 del sfi["ingress"]
455 del sfi["egress"]
456 params = sfi.get("service_function_parameters")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000457 sfc_encap = False
sousaedu80135b92021-02-17 15:05:18 +0100458
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000459 if params:
sousaedu80135b92021-02-17 15:05:18 +0100460 correlation = params.get("correlation")
461
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000462 if correlation:
463 sfc_encap = True
sousaedu80135b92021-02-17 15:05:18 +0100464
465 sfi["sfc_encap"] = sfc_encap
466 del sfi["service_function_parameters"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000467
468 def __sf_os2mano(self, sf_list_dict):
469 """Transform the openstack format (Port Pair Group) to mano format (SF)
470 sf_list_dict can be a list of dict or a single dict
471 """
472 if isinstance(sf_list_dict, dict):
473 sf_list_ = [sf_list_dict]
474 elif isinstance(sf_list_dict, list):
475 sf_list_ = sf_list_dict
476 else:
sousaedu80135b92021-02-17 15:05:18 +0100477 raise TypeError("param sf_list_dict must be a list or a dictionary")
478
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000479 for sf in sf_list_:
sousaedu80135b92021-02-17 15:05:18 +0100480 del sf["port_pair_group_parameters"]
481 sf["sfis"] = sf["port_pairs"]
482 del sf["port_pairs"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000483
484 def __sfp_os2mano(self, sfp_list_dict):
485 """Transform the openstack format (Port Chain) to mano format (SFP)
486 sfp_list_dict can be a list of dict or a single dict
487 """
488 if isinstance(sfp_list_dict, dict):
489 sfp_list_ = [sfp_list_dict]
490 elif isinstance(sfp_list_dict, list):
491 sfp_list_ = sfp_list_dict
492 else:
sousaedu80135b92021-02-17 15:05:18 +0100493 raise TypeError("param sfp_list_dict must be a list or a dictionary")
494
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000495 for sfp in sfp_list_:
sousaedu80135b92021-02-17 15:05:18 +0100496 params = sfp.pop("chain_parameters")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000497 sfc_encap = False
sousaedu80135b92021-02-17 15:05:18 +0100498
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000499 if params:
sousaedu80135b92021-02-17 15:05:18 +0100500 correlation = params.get("correlation")
501
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000502 if correlation:
503 sfc_encap = True
sousaedu80135b92021-02-17 15:05:18 +0100504
505 sfp["sfc_encap"] = sfc_encap
506 sfp["spi"] = sfp.pop("chain_id")
507 sfp["classifications"] = sfp.pop("flow_classifiers")
508 sfp["service_functions"] = sfp.pop("port_pair_groups")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +0000509
510 # placeholder for now; read TODO note below
511 def _validate_classification(self, type, definition):
512 # only legacy_flow_classifier Type is supported at this point
513 return True
514 # TODO(igordcard): this method should be an abstract method of an
515 # abstract Classification class to be implemented by the specific
516 # Types. Also, abstract vimconnector should call the validation
517 # method before the implemented VIM connectors are called.
518
tiernoae4a8d12016-07-08 12:30:39 +0200519 def _format_exception(self, exception):
tierno69647792020-03-05 16:45:48 +0000520 """Transform a keystone, nova, neutron exception into a vimconn exception discovering the cause"""
tierno69647792020-03-05 16:45:48 +0000521 message_error = str(exception)
tierno5ad826a2020-08-11 11:19:44 +0000522 tip = ""
tiernode12f782019-04-05 12:46:42 +0000523
sousaedu80135b92021-02-17 15:05:18 +0100524 if isinstance(
525 exception,
526 (
527 neExceptions.NetworkNotFoundClient,
528 nvExceptions.NotFound,
529 ksExceptions.NotFound,
530 gl1Exceptions.HTTPNotFound,
531 ),
532 ):
533 raise vimconn.VimConnNotFoundException(
534 type(exception).__name__ + ": " + message_error
535 )
536 elif isinstance(
537 exception,
538 (
539 HTTPException,
540 gl1Exceptions.HTTPException,
541 gl1Exceptions.CommunicationError,
542 ConnectionError,
543 ksExceptions.ConnectionError,
544 neExceptions.ConnectionFailed,
545 ),
546 ):
tierno5ad826a2020-08-11 11:19:44 +0000547 if type(exception).__name__ == "SSLError":
548 tip = " (maybe option 'insecure' must be added to the VIM)"
sousaedu80135b92021-02-17 15:05:18 +0100549
550 raise vimconn.VimConnConnectionException(
551 "Invalid URL or credentials{}: {}".format(tip, message_error)
552 )
553 elif isinstance(
554 exception,
555 (
556 KeyError,
557 nvExceptions.BadRequest,
558 ksExceptions.BadRequest,
559 ),
560 ):
561 raise vimconn.VimConnException(
562 type(exception).__name__ + ": " + message_error
563 )
564 elif isinstance(
565 exception,
566 (
567 nvExceptions.ClientException,
568 ksExceptions.ClientException,
569 neExceptions.NeutronException,
570 ),
571 ):
572 raise vimconn.VimConnUnexpectedResponse(
573 type(exception).__name__ + ": " + message_error
574 )
tiernoae4a8d12016-07-08 12:30:39 +0200575 elif isinstance(exception, nvExceptions.Conflict):
sousaedu80135b92021-02-17 15:05:18 +0100576 raise vimconn.VimConnConflictException(
577 type(exception).__name__ + ": " + message_error
578 )
tierno72774862020-05-04 11:44:15 +0000579 elif isinstance(exception, vimconn.VimConnException):
tierno41a69812018-02-16 14:34:33 +0100580 raise exception
tiernof716aea2017-06-21 18:01:40 +0200581 else: # ()
tiernode12f782019-04-05 12:46:42 +0000582 self.logger.error("General Exception " + message_error, exc_info=True)
sousaedu80135b92021-02-17 15:05:18 +0100583
584 raise vimconn.VimConnConnectionException(
585 type(exception).__name__ + ": " + message_error
586 )
tiernoae4a8d12016-07-08 12:30:39 +0200587
tiernoa05b65a2019-02-01 12:30:27 +0000588 def _get_ids_from_name(self):
589 """
590 Obtain ids from name of tenant and security_groups. Store at self .security_groups_id"
591 :return: None
592 """
593 # get tenant_id if only tenant_name is supplied
594 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100595
tiernoa05b65a2019-02-01 12:30:27 +0000596 if not self.my_tenant_id:
sousaedu80135b92021-02-17 15:05:18 +0100597 raise vimconn.VimConnConnectionException(
598 "Error getting tenant information from name={} id={}".format(
599 self.tenant_name, self.tenant_id
600 )
601 )
602
603 if self.config.get("security_groups") and not self.security_groups_id:
tiernoa05b65a2019-02-01 12:30:27 +0000604 # convert from name to id
sousaedu80135b92021-02-17 15:05:18 +0100605 neutron_sg_list = self.neutron.list_security_groups(
606 tenant_id=self.my_tenant_id
607 )["security_groups"]
tiernoa05b65a2019-02-01 12:30:27 +0000608
609 self.security_groups_id = []
sousaedu80135b92021-02-17 15:05:18 +0100610 for sg in self.config.get("security_groups"):
tiernoa05b65a2019-02-01 12:30:27 +0000611 for neutron_sg in neutron_sg_list:
612 if sg in (neutron_sg["id"], neutron_sg["name"]):
613 self.security_groups_id.append(neutron_sg["id"])
614 break
615 else:
616 self.security_groups_id = None
sousaedu80135b92021-02-17 15:05:18 +0100617
618 raise vimconn.VimConnConnectionException(
619 "Not found security group {} for this tenant".format(sg)
620 )
tiernoa05b65a2019-02-01 12:30:27 +0000621
tierno5509c2e2019-07-04 16:23:20 +0000622 def check_vim_connectivity(self):
623 # just get network list to check connectivity and credentials
624 self.get_network_list(filter_dict={})
625
tiernoae4a8d12016-07-08 12:30:39 +0200626 def get_tenant_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +0000627 """Obtain tenants of VIM
tiernoae4a8d12016-07-08 12:30:39 +0200628 filter_dict can contain the following keys:
629 name: filter by tenant name
630 id: filter by tenant uuid/id
631 <other VIM specific>
632 Returns the tenant list of dictionaries: [{'name':'<name>, 'id':'<id>, ...}, ...]
tierno1ec592d2020-06-16 15:29:47 +0000633 """
ahmadsa95baa272016-11-30 09:14:11 +0500634 self.logger.debug("Getting tenants from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +0100635
tiernoae4a8d12016-07-08 12:30:39 +0200636 try:
637 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100638
tiernof716aea2017-06-21 18:01:40 +0200639 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100640 project_class_list = self.keystone.projects.list(
641 name=filter_dict.get("name")
642 )
ahmadsa95baa272016-11-30 09:14:11 +0500643 else:
tiernof716aea2017-06-21 18:01:40 +0200644 project_class_list = self.keystone.tenants.findall(**filter_dict)
sousaedu80135b92021-02-17 15:05:18 +0100645
tierno1ec592d2020-06-16 15:29:47 +0000646 project_list = []
sousaedu80135b92021-02-17 15:05:18 +0100647
ahmadsa95baa272016-11-30 09:14:11 +0500648 for project in project_class_list:
sousaedu80135b92021-02-17 15:05:18 +0100649 if filter_dict.get("id") and filter_dict["id"] != project.id:
tiernof716aea2017-06-21 18:01:40 +0200650 continue
sousaedu80135b92021-02-17 15:05:18 +0100651
ahmadsa95baa272016-11-30 09:14:11 +0500652 project_list.append(project.to_dict())
sousaedu80135b92021-02-17 15:05:18 +0100653
ahmadsa95baa272016-11-30 09:14:11 +0500654 return project_list
sousaedu80135b92021-02-17 15:05:18 +0100655 except (
656 ksExceptions.ConnectionError,
657 ksExceptions.ClientException,
658 ConnectionError,
659 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200660 self._format_exception(e)
661
662 def new_tenant(self, tenant_name, tenant_description):
tierno1ec592d2020-06-16 15:29:47 +0000663 """Adds a new tenant to openstack VIM. Returns the tenant identifier"""
tiernoae4a8d12016-07-08 12:30:39 +0200664 self.logger.debug("Adding a new tenant name: %s", tenant_name)
sousaedu80135b92021-02-17 15:05:18 +0100665
tiernoae4a8d12016-07-08 12:30:39 +0200666 try:
667 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100668
tiernof716aea2017-06-21 18:01:40 +0200669 if self.api_version3:
sousaedu80135b92021-02-17 15:05:18 +0100670 project = self.keystone.projects.create(
671 tenant_name,
672 self.config.get("project_domain_id", "default"),
673 description=tenant_description,
674 is_domain=False,
675 )
ahmadsa95baa272016-11-30 09:14:11 +0500676 else:
tiernof716aea2017-06-21 18:01:40 +0200677 project = self.keystone.tenants.create(tenant_name, tenant_description)
sousaedu80135b92021-02-17 15:05:18 +0100678
ahmadsa95baa272016-11-30 09:14:11 +0500679 return project.id
sousaedu80135b92021-02-17 15:05:18 +0100680 except (
681 ksExceptions.ConnectionError,
682 ksExceptions.ClientException,
683 ksExceptions.BadRequest,
684 ConnectionError,
685 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200686 self._format_exception(e)
687
688 def delete_tenant(self, tenant_id):
tierno1ec592d2020-06-16 15:29:47 +0000689 """Delete a tenant from openstack VIM. Returns the old tenant identifier"""
tiernoae4a8d12016-07-08 12:30:39 +0200690 self.logger.debug("Deleting tenant %s from VIM", tenant_id)
sousaedu80135b92021-02-17 15:05:18 +0100691
tiernoae4a8d12016-07-08 12:30:39 +0200692 try:
693 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100694
tiernof716aea2017-06-21 18:01:40 +0200695 if self.api_version3:
ahmadsa95baa272016-11-30 09:14:11 +0500696 self.keystone.projects.delete(tenant_id)
697 else:
698 self.keystone.tenants.delete(tenant_id)
sousaedu80135b92021-02-17 15:05:18 +0100699
tiernoae4a8d12016-07-08 12:30:39 +0200700 return tenant_id
sousaedu80135b92021-02-17 15:05:18 +0100701 except (
702 ksExceptions.ConnectionError,
703 ksExceptions.ClientException,
704 ksExceptions.NotFound,
705 ConnectionError,
706 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +0200707 self._format_exception(e)
ahmadsa95baa272016-11-30 09:14:11 +0500708
sousaedu80135b92021-02-17 15:05:18 +0100709 def new_network(
710 self,
711 net_name,
712 net_type,
713 ip_profile=None,
714 shared=False,
715 provider_network_profile=None,
716 ):
garciadeblasebd66722019-01-31 16:01:31 +0000717 """Adds a tenant network to VIM
718 Params:
719 'net_name': name of the network
720 'net_type': one of:
721 'bridge': overlay isolated network
722 'data': underlay E-LAN network for Passthrough and SRIOV interfaces
723 'ptp': underlay E-LINE network for Passthrough and SRIOV interfaces.
724 'ip_profile': is a dict containing the IP parameters of the network
725 'ip_version': can be "IPv4" or "IPv6" (Currently only IPv4 is implemented)
726 'subnet_address': ip_prefix_schema, that is X.X.X.X/Y
727 'gateway_address': (Optional) ip_schema, that is X.X.X.X
728 'dns_address': (Optional) comma separated list of ip_schema, e.g. X.X.X.X[,X,X,X,X]
729 'dhcp_enabled': True or False
730 'dhcp_start_address': ip_schema, first IP to grant
731 'dhcp_count': number of IPs to grant.
732 'shared': if this network can be seen/use by other tenants/organization
garciadeblas4af0d542020-02-18 16:01:13 +0100733 'provider_network_profile': (optional) contains {segmentation-id: vlan, network-type: vlan|vxlan,
734 physical-network: physnet-label}
garciadeblasebd66722019-01-31 16:01:31 +0000735 Returns a tuple with the network identifier and created_items, or raises an exception on error
736 created_items can be None or a dictionary where this method can include key-values that will be passed to
737 the method delete_network. Can be used to store created segments, created l2gw connections, etc.
738 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
739 as not present.
740 """
sousaedu80135b92021-02-17 15:05:18 +0100741 self.logger.debug(
742 "Adding a new network to VIM name '%s', type '%s'", net_name, net_type
743 )
garciadeblasebd66722019-01-31 16:01:31 +0000744 # self.logger.debug(">>>>>>>>>>>>>>>>>> IP profile %s", str(ip_profile))
kbsuba85c54d2019-10-17 16:30:32 +0000745
tierno7edb6752016-03-21 17:37:52 +0100746 try:
kbsuba85c54d2019-10-17 16:30:32 +0000747 vlan = None
sousaedu80135b92021-02-17 15:05:18 +0100748
kbsuba85c54d2019-10-17 16:30:32 +0000749 if provider_network_profile:
750 vlan = provider_network_profile.get("segmentation-id")
sousaedu80135b92021-02-17 15:05:18 +0100751
garciadeblasedca7b32016-09-29 14:01:52 +0000752 new_net = None
garciadeblasebd66722019-01-31 16:01:31 +0000753 created_items = {}
tierno7edb6752016-03-21 17:37:52 +0100754 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +0100755 network_dict = {"name": net_name, "admin_state_up": True}
756
Gabriel Cubab22d91e2022-12-14 18:33:50 -0500757 if net_type in ("data", "ptp") or provider_network_profile:
tierno6869ae72020-01-09 17:37:34 +0000758 provider_physical_network = None
sousaedu80135b92021-02-17 15:05:18 +0100759
760 if provider_network_profile and provider_network_profile.get(
761 "physical-network"
762 ):
763 provider_physical_network = provider_network_profile.get(
764 "physical-network"
765 )
766
tierno6869ae72020-01-09 17:37:34 +0000767 # provider-network must be one of the dataplane_physcial_netowrk if this is a list. If it is string
768 # or not declared, just ignore the checking
sousaedu80135b92021-02-17 15:05:18 +0100769 if (
770 isinstance(
771 self.config.get("dataplane_physical_net"), (tuple, list)
772 )
773 and provider_physical_network
774 not in self.config["dataplane_physical_net"]
775 ):
tierno72774862020-05-04 11:44:15 +0000776 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100777 "Invalid parameter 'provider-network:physical-network' "
778 "for network creation. '{}' is not one of the declared "
779 "list at VIM_config:dataplane_physical_net".format(
780 provider_physical_network
781 )
782 )
783
784 # use the default dataplane_physical_net
785 if not provider_physical_network:
786 provider_physical_network = self.config.get(
787 "dataplane_physical_net"
788 )
789
tierno6869ae72020-01-09 17:37:34 +0000790 # if it is non empty list, use the first value. If it is a string use the value directly
sousaedu80135b92021-02-17 15:05:18 +0100791 if (
792 isinstance(provider_physical_network, (tuple, list))
793 and provider_physical_network
794 ):
tierno6869ae72020-01-09 17:37:34 +0000795 provider_physical_network = provider_physical_network[0]
796
797 if not provider_physical_network:
tierno5ad826a2020-08-11 11:19:44 +0000798 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100799 "missing information needed for underlay networks. Provide "
800 "'dataplane_physical_net' configuration at VIM or use the NS "
801 "instantiation parameter 'provider-network.physical-network'"
802 " for the VLD"
803 )
tierno6869ae72020-01-09 17:37:34 +0000804
sousaedu80135b92021-02-17 15:05:18 +0100805 if not self.config.get("multisegment_support"):
806 network_dict[
807 "provider:physical_network"
808 ] = provider_physical_network
809
810 if (
811 provider_network_profile
812 and "network-type" in provider_network_profile
813 ):
814 network_dict[
815 "provider:network_type"
816 ] = provider_network_profile["network-type"]
garciadeblas4af0d542020-02-18 16:01:13 +0100817 else:
sousaedu80135b92021-02-17 15:05:18 +0100818 network_dict["provider:network_type"] = self.config.get(
819 "dataplane_network_type", "vlan"
820 )
821
tierno6869ae72020-01-09 17:37:34 +0000822 if vlan:
823 network_dict["provider:segmentation_id"] = vlan
garciadeblasebd66722019-01-31 16:01:31 +0000824 else:
tierno6869ae72020-01-09 17:37:34 +0000825 # Multi-segment case
garciadeblasebd66722019-01-31 16:01:31 +0000826 segment_list = []
tierno6869ae72020-01-09 17:37:34 +0000827 segment1_dict = {
sousaedu80135b92021-02-17 15:05:18 +0100828 "provider:physical_network": "",
829 "provider:network_type": "vxlan",
tierno6869ae72020-01-09 17:37:34 +0000830 }
garciadeblasebd66722019-01-31 16:01:31 +0000831 segment_list.append(segment1_dict)
tierno6869ae72020-01-09 17:37:34 +0000832 segment2_dict = {
833 "provider:physical_network": provider_physical_network,
sousaedu80135b92021-02-17 15:05:18 +0100834 "provider:network_type": "vlan",
tierno6869ae72020-01-09 17:37:34 +0000835 }
sousaedu80135b92021-02-17 15:05:18 +0100836
tierno6869ae72020-01-09 17:37:34 +0000837 if vlan:
838 segment2_dict["provider:segmentation_id"] = vlan
sousaedu80135b92021-02-17 15:05:18 +0100839 elif self.config.get("multisegment_vlan_range"):
garciadeblasebd66722019-01-31 16:01:31 +0000840 vlanID = self._generate_multisegment_vlanID()
841 segment2_dict["provider:segmentation_id"] = vlanID
sousaedu80135b92021-02-17 15:05:18 +0100842
garciadeblasebd66722019-01-31 16:01:31 +0000843 # else
tierno72774862020-05-04 11:44:15 +0000844 # raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100845 # "You must provide "multisegment_vlan_range" at config dict before creating a multisegment
tierno1ec592d2020-06-16 15:29:47 +0000846 # network")
garciadeblasebd66722019-01-31 16:01:31 +0000847 segment_list.append(segment2_dict)
848 network_dict["segments"] = segment_list
kate721d79b2017-06-24 04:21:38 -0700849
tierno6869ae72020-01-09 17:37:34 +0000850 # VIO Specific Changes. It needs a concrete VLAN
851 if self.vim_type == "VIO" and vlan is None:
sousaedu80135b92021-02-17 15:05:18 +0100852 if self.config.get("dataplane_net_vlan_range") is None:
tierno72774862020-05-04 11:44:15 +0000853 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +0100854 "You must provide 'dataplane_net_vlan_range' in format "
855 "[start_ID - end_ID] at VIM_config for creating underlay "
856 "networks"
857 )
858
tierno6869ae72020-01-09 17:37:34 +0000859 network_dict["provider:segmentation_id"] = self._generate_vlanID()
kate721d79b2017-06-24 04:21:38 -0700860
garciadeblasebd66722019-01-31 16:01:31 +0000861 network_dict["shared"] = shared
sousaedu80135b92021-02-17 15:05:18 +0100862
anwarsff168192019-05-06 11:23:07 +0530863 if self.config.get("disable_network_port_security"):
864 network_dict["port_security_enabled"] = False
sousaedu80135b92021-02-17 15:05:18 +0100865
sousaedu2aa5f802021-06-17 15:39:29 +0100866 if self.config.get("neutron_availability_zone_hints"):
867 hints = self.config.get("neutron_availability_zone_hints")
868
869 if isinstance(hints, str):
870 hints = [hints]
871
872 network_dict["availability_zone_hints"] = hints
873
sousaedu80135b92021-02-17 15:05:18 +0100874 new_net = self.neutron.create_network({"network": network_dict})
garciadeblasebd66722019-01-31 16:01:31 +0000875 # print new_net
876 # create subnetwork, even if there is no profile
sousaedu80135b92021-02-17 15:05:18 +0100877
garciadeblas9f8456e2016-09-05 05:02:59 +0200878 if not ip_profile:
879 ip_profile = {}
sousaedu80135b92021-02-17 15:05:18 +0100880
881 if not ip_profile.get("subnet_address"):
tierno1ec592d2020-06-16 15:29:47 +0000882 # Fake subnet is required
garciadeblas2299e3b2017-01-26 14:35:55 +0000883 subnet_rand = random.randint(0, 255)
sousaedu80135b92021-02-17 15:05:18 +0100884 ip_profile["subnet_address"] = "192.168.{}.0/24".format(subnet_rand)
885
886 if "ip_version" not in ip_profile:
887 ip_profile["ip_version"] = "IPv4"
888
889 subnet = {
890 "name": net_name + "-subnet",
891 "network_id": new_net["network"]["id"],
892 "ip_version": 4 if ip_profile["ip_version"] == "IPv4" else 6,
893 "cidr": ip_profile["subnet_address"],
894 }
895
tiernoa1fb4462017-06-30 12:25:50 +0200896 # Gateway should be set to None if not needed. Otherwise openstack assigns one by default
sousaedu80135b92021-02-17 15:05:18 +0100897 if ip_profile.get("gateway_address"):
898 subnet["gateway_ip"] = ip_profile["gateway_address"]
tierno55d234c2018-07-04 18:29:21 +0200899 else:
sousaedu80135b92021-02-17 15:05:18 +0100900 subnet["gateway_ip"] = None
901
902 if ip_profile.get("dns_address"):
903 subnet["dns_nameservers"] = ip_profile["dns_address"].split(";")
904
905 if "dhcp_enabled" in ip_profile:
906 subnet["enable_dhcp"] = (
907 False
908 if ip_profile["dhcp_enabled"] == "false"
909 or ip_profile["dhcp_enabled"] is False
910 else True
911 )
912
913 if ip_profile.get("dhcp_start_address"):
914 subnet["allocation_pools"] = []
915 subnet["allocation_pools"].append(dict())
916 subnet["allocation_pools"][0]["start"] = ip_profile[
917 "dhcp_start_address"
918 ]
919
920 if ip_profile.get("dhcp_count"):
921 # parts = ip_profile["dhcp_start_address"].split(".")
tierno1ec592d2020-06-16 15:29:47 +0000922 # ip_int = (int(parts[0]) << 24) + (int(parts[1]) << 16) + (int(parts[2]) << 8) + int(parts[3])
sousaedu80135b92021-02-17 15:05:18 +0100923 ip_int = int(netaddr.IPAddress(ip_profile["dhcp_start_address"]))
924 ip_int += ip_profile["dhcp_count"] - 1
garciadeblas9f8456e2016-09-05 05:02:59 +0200925 ip_str = str(netaddr.IPAddress(ip_int))
sousaedu80135b92021-02-17 15:05:18 +0100926 subnet["allocation_pools"][0]["end"] = ip_str
927
tierno1ec592d2020-06-16 15:29:47 +0000928 # self.logger.debug(">>>>>>>>>>>>>>>>>> Subnet: %s", str(subnet))
929 self.neutron.create_subnet({"subnet": subnet})
garciadeblasebd66722019-01-31 16:01:31 +0000930
sousaedu80135b92021-02-17 15:05:18 +0100931 if net_type == "data" and self.config.get("multisegment_support"):
932 if self.config.get("l2gw_support"):
garciadeblasebd66722019-01-31 16:01:31 +0000933 l2gw_list = self.neutron.list_l2_gateways().get("l2_gateways", ())
934 for l2gw in l2gw_list:
tierno1ec592d2020-06-16 15:29:47 +0000935 l2gw_conn = {
936 "l2_gateway_id": l2gw["id"],
937 "network_id": new_net["network"]["id"],
938 "segmentation_id": str(vlanID),
939 }
sousaedu80135b92021-02-17 15:05:18 +0100940 new_l2gw_conn = self.neutron.create_l2_gateway_connection(
941 {"l2_gateway_connection": l2gw_conn}
942 )
943 created_items[
944 "l2gwconn:"
945 + str(new_l2gw_conn["l2_gateway_connection"]["id"])
946 ] = True
947
garciadeblasebd66722019-01-31 16:01:31 +0000948 return new_net["network"]["id"], created_items
tierno41a69812018-02-16 14:34:33 +0100949 except Exception as e:
tierno1ec592d2020-06-16 15:29:47 +0000950 # delete l2gw connections (if any) before deleting the network
garciadeblasebd66722019-01-31 16:01:31 +0000951 for k, v in created_items.items():
952 if not v: # skip already deleted
953 continue
sousaedu80135b92021-02-17 15:05:18 +0100954
garciadeblasebd66722019-01-31 16:01:31 +0000955 try:
956 k_item, _, k_id = k.partition(":")
sousaedu80135b92021-02-17 15:05:18 +0100957
garciadeblasebd66722019-01-31 16:01:31 +0000958 if k_item == "l2gwconn":
959 self.neutron.delete_l2_gateway_connection(k_id)
960 except Exception as e2:
sousaedu80135b92021-02-17 15:05:18 +0100961 self.logger.error(
962 "Error deleting l2 gateway connection: {}: {}".format(
963 type(e2).__name__, e2
964 )
965 )
966
garciadeblasedca7b32016-09-29 14:01:52 +0000967 if new_net:
sousaedu80135b92021-02-17 15:05:18 +0100968 self.neutron.delete_network(new_net["network"]["id"])
969
tiernoae4a8d12016-07-08 12:30:39 +0200970 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +0100971
972 def get_network_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +0000973 """Obtain tenant networks of VIM
tierno7edb6752016-03-21 17:37:52 +0100974 Filter_dict can be:
975 name: network name
976 id: network uuid
977 shared: boolean
978 tenant_id: tenant
979 admin_state_up: boolean
980 status: 'ACTIVE'
981 Returns the network list of dictionaries
tierno1ec592d2020-06-16 15:29:47 +0000982 """
tiernoae4a8d12016-07-08 12:30:39 +0200983 self.logger.debug("Getting network from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +0100984
tierno7edb6752016-03-21 17:37:52 +0100985 try:
986 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +0100987 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +0100988
tierno69b590e2018-03-13 18:52:23 +0100989 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +0100990 # TODO check
991 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
992
tierno69b590e2018-03-13 18:52:23 +0100993 net_dict = self.neutron.list_networks(**filter_dict_os)
tierno00e3df72017-11-29 17:20:13 +0100994 net_list = net_dict["networks"]
tierno7edb6752016-03-21 17:37:52 +0100995 self.__net_os2mano(net_list)
sousaedu80135b92021-02-17 15:05:18 +0100996
tiernoae4a8d12016-07-08 12:30:39 +0200997 return net_list
sousaedu80135b92021-02-17 15:05:18 +0100998 except (
999 neExceptions.ConnectionFailed,
1000 ksExceptions.ClientException,
1001 neExceptions.NeutronException,
1002 ConnectionError,
1003 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001004 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001005
tiernoae4a8d12016-07-08 12:30:39 +02001006 def get_network(self, net_id):
tierno1ec592d2020-06-16 15:29:47 +00001007 """Obtain details of network from VIM
1008 Returns the network information from a network id"""
tiernoae4a8d12016-07-08 12:30:39 +02001009 self.logger.debug(" Getting tenant network %s from VIM", net_id)
tierno1ec592d2020-06-16 15:29:47 +00001010 filter_dict = {"id": net_id}
tiernoae4a8d12016-07-08 12:30:39 +02001011 net_list = self.get_network_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01001012
tierno1ec592d2020-06-16 15:29:47 +00001013 if len(net_list) == 0:
sousaedu80135b92021-02-17 15:05:18 +01001014 raise vimconn.VimConnNotFoundException(
1015 "Network '{}' not found".format(net_id)
1016 )
tierno1ec592d2020-06-16 15:29:47 +00001017 elif len(net_list) > 1:
sousaedu80135b92021-02-17 15:05:18 +01001018 raise vimconn.VimConnConflictException(
1019 "Found more than one network with this criteria"
1020 )
1021
tierno7edb6752016-03-21 17:37:52 +01001022 net = net_list[0]
tierno1ec592d2020-06-16 15:29:47 +00001023 subnets = []
1024 for subnet_id in net.get("subnets", ()):
tierno7edb6752016-03-21 17:37:52 +01001025 try:
1026 subnet = self.neutron.show_subnet(subnet_id)
1027 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01001028 self.logger.error(
1029 "osconnector.get_network(): Error getting subnet %s %s"
1030 % (net_id, str(e))
1031 )
tiernoae4a8d12016-07-08 12:30:39 +02001032 subnet = {"id": subnet_id, "fault": str(e)}
sousaedu80135b92021-02-17 15:05:18 +01001033
tierno7edb6752016-03-21 17:37:52 +01001034 subnets.append(subnet)
sousaedu80135b92021-02-17 15:05:18 +01001035
tierno7edb6752016-03-21 17:37:52 +01001036 net["subnets"] = subnets
sousaedu80135b92021-02-17 15:05:18 +01001037 net["encapsulation"] = net.get("provider:network_type")
1038 net["encapsulation_type"] = net.get("provider:network_type")
1039 net["segmentation_id"] = net.get("provider:segmentation_id")
1040 net["encapsulation_id"] = net.get("provider:segmentation_id")
1041
tiernoae4a8d12016-07-08 12:30:39 +02001042 return net
tierno7edb6752016-03-21 17:37:52 +01001043
garciadeblasebd66722019-01-31 16:01:31 +00001044 def delete_network(self, net_id, created_items=None):
1045 """
1046 Removes a tenant network from VIM and its associated elements
1047 :param net_id: VIM identifier of the network, provided by method new_network
1048 :param created_items: dictionary with extra items to be deleted. provided by method new_network
1049 Returns the network identifier or raises an exception upon error or when network is not found
1050 """
tiernoae4a8d12016-07-08 12:30:39 +02001051 self.logger.debug("Deleting network '%s' from VIM", net_id)
sousaedu80135b92021-02-17 15:05:18 +01001052
tierno1ec592d2020-06-16 15:29:47 +00001053 if created_items is None:
garciadeblasebd66722019-01-31 16:01:31 +00001054 created_items = {}
sousaedu80135b92021-02-17 15:05:18 +01001055
tierno7edb6752016-03-21 17:37:52 +01001056 try:
1057 self._reload_connection()
tierno1ec592d2020-06-16 15:29:47 +00001058 # delete l2gw connections (if any) before deleting the network
garciadeblasebd66722019-01-31 16:01:31 +00001059 for k, v in created_items.items():
1060 if not v: # skip already deleted
1061 continue
sousaedu80135b92021-02-17 15:05:18 +01001062
garciadeblasebd66722019-01-31 16:01:31 +00001063 try:
1064 k_item, _, k_id = k.partition(":")
1065 if k_item == "l2gwconn":
1066 self.neutron.delete_l2_gateway_connection(k_id)
1067 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01001068 self.logger.error(
1069 "Error deleting l2 gateway connection: {}: {}".format(
1070 type(e).__name__, e
1071 )
1072 )
1073
tierno1ec592d2020-06-16 15:29:47 +00001074 # delete VM ports attached to this networks before the network
tierno7edb6752016-03-21 17:37:52 +01001075 ports = self.neutron.list_ports(network_id=net_id)
sousaedu80135b92021-02-17 15:05:18 +01001076 for p in ports["ports"]:
tierno7edb6752016-03-21 17:37:52 +01001077 try:
1078 self.neutron.delete_port(p["id"])
1079 except Exception as e:
tiernoae4a8d12016-07-08 12:30:39 +02001080 self.logger.error("Error deleting port %s: %s", p["id"], str(e))
sousaedu80135b92021-02-17 15:05:18 +01001081
tierno7edb6752016-03-21 17:37:52 +01001082 self.neutron.delete_network(net_id)
sousaedu80135b92021-02-17 15:05:18 +01001083
tiernoae4a8d12016-07-08 12:30:39 +02001084 return net_id
sousaedu80135b92021-02-17 15:05:18 +01001085 except (
1086 neExceptions.ConnectionFailed,
1087 neExceptions.NetworkNotFoundClient,
1088 neExceptions.NeutronException,
1089 ksExceptions.ClientException,
1090 neExceptions.NeutronException,
1091 ConnectionError,
1092 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001093 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001094
tiernoae4a8d12016-07-08 12:30:39 +02001095 def refresh_nets_status(self, net_list):
tierno1ec592d2020-06-16 15:29:47 +00001096 """Get the status of the networks
sousaedu80135b92021-02-17 15:05:18 +01001097 Params: the list of network identifiers
1098 Returns a dictionary with:
1099 net_id: #VIM id of this network
1100 status: #Mandatory. Text with one of:
1101 # DELETED (not found at vim)
1102 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
1103 # OTHER (Vim reported other status not understood)
1104 # ERROR (VIM indicates an ERROR status)
1105 # ACTIVE, INACTIVE, DOWN (admin down),
1106 # BUILD (on building process)
1107 #
1108 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
1109 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00001110 """
1111 net_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01001112
tiernoae4a8d12016-07-08 12:30:39 +02001113 for net_id in net_list:
1114 net = {}
sousaedu80135b92021-02-17 15:05:18 +01001115
tiernoae4a8d12016-07-08 12:30:39 +02001116 try:
1117 net_vim = self.get_network(net_id)
sousaedu80135b92021-02-17 15:05:18 +01001118
1119 if net_vim["status"] in netStatus2manoFormat:
1120 net["status"] = netStatus2manoFormat[net_vim["status"]]
tiernoae4a8d12016-07-08 12:30:39 +02001121 else:
1122 net["status"] = "OTHER"
sousaedu80135b92021-02-17 15:05:18 +01001123 net["error_msg"] = "VIM status reported " + net_vim["status"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001124
sousaedu80135b92021-02-17 15:05:18 +01001125 if net["status"] == "ACTIVE" and not net_vim["admin_state_up"]:
1126 net["status"] = "DOWN"
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01001127
sousaedu80135b92021-02-17 15:05:18 +01001128 net["vim_info"] = self.serialize(net_vim)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01001129
sousaedu80135b92021-02-17 15:05:18 +01001130 if net_vim.get("fault"): # TODO
1131 net["error_msg"] = str(net_vim["fault"])
tierno72774862020-05-04 11:44:15 +00001132 except vimconn.VimConnNotFoundException as e:
tiernoae4a8d12016-07-08 12:30:39 +02001133 self.logger.error("Exception getting net status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01001134 net["status"] = "DELETED"
1135 net["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00001136 except vimconn.VimConnException as e:
tiernoae4a8d12016-07-08 12:30:39 +02001137 self.logger.error("Exception getting net status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01001138 net["status"] = "VIM_ERROR"
1139 net["error_msg"] = str(e)
tiernoae4a8d12016-07-08 12:30:39 +02001140 net_dict[net_id] = net
1141 return net_dict
1142
1143 def get_flavor(self, flavor_id):
tierno1ec592d2020-06-16 15:29:47 +00001144 """Obtain flavor details from the VIM. Returns the flavor dict details"""
tiernoae4a8d12016-07-08 12:30:39 +02001145 self.logger.debug("Getting flavor '%s'", flavor_id)
sousaedu80135b92021-02-17 15:05:18 +01001146
tierno7edb6752016-03-21 17:37:52 +01001147 try:
1148 self._reload_connection()
1149 flavor = self.nova.flavors.find(id=flavor_id)
tierno1ec592d2020-06-16 15:29:47 +00001150 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
sousaedu80135b92021-02-17 15:05:18 +01001151
tiernoae4a8d12016-07-08 12:30:39 +02001152 return flavor.to_dict()
sousaedu80135b92021-02-17 15:05:18 +01001153 except (
1154 nvExceptions.NotFound,
1155 nvExceptions.ClientException,
1156 ksExceptions.ClientException,
1157 ConnectionError,
1158 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001159 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001160
tiernocf157a82017-01-30 14:07:06 +01001161 def get_flavor_id_from_data(self, flavor_dict):
1162 """Obtain flavor id that match the flavor description
sousaedu80135b92021-02-17 15:05:18 +01001163 Returns the flavor_id or raises a vimconnNotFoundException
1164 flavor_dict: contains the required ram, vcpus, disk
1165 If 'use_existing_flavors' is set to True at config, the closer flavor that provides same or more ram, vcpus
1166 and disk is returned. Otherwise a flavor with exactly same ram, vcpus and disk is returned or a
1167 vimconnNotFoundException is raised
tiernocf157a82017-01-30 14:07:06 +01001168 """
sousaedu80135b92021-02-17 15:05:18 +01001169 exact_match = False if self.config.get("use_existing_flavors") else True
1170
tiernocf157a82017-01-30 14:07:06 +01001171 try:
1172 self._reload_connection()
tiernoe26fc7a2017-05-30 14:43:03 +02001173 flavor_candidate_id = None
1174 flavor_candidate_data = (10000, 10000, 10000)
sousaedu80135b92021-02-17 15:05:18 +01001175 flavor_target = (
1176 flavor_dict["ram"],
1177 flavor_dict["vcpus"],
1178 flavor_dict["disk"],
sousaedu648ee3d2021-11-22 14:09:15 +00001179 flavor_dict.get("ephemeral", 0),
1180 flavor_dict.get("swap", 0),
sousaedu80135b92021-02-17 15:05:18 +01001181 )
tiernoe26fc7a2017-05-30 14:43:03 +02001182 # numa=None
anwarsae5f52c2019-04-22 10:35:27 +05301183 extended = flavor_dict.get("extended", {})
1184 if extended:
tierno1ec592d2020-06-16 15:29:47 +00001185 # TODO
sousaedu80135b92021-02-17 15:05:18 +01001186 raise vimconn.VimConnNotFoundException(
1187 "Flavor with EPA still not implemented"
1188 )
tiernocf157a82017-01-30 14:07:06 +01001189 # if len(numas) > 1:
tierno72774862020-05-04 11:44:15 +00001190 # raise vimconn.VimConnNotFoundException("Cannot find any flavor with more than one numa")
tiernocf157a82017-01-30 14:07:06 +01001191 # numa=numas[0]
1192 # numas = extended.get("numas")
1193 for flavor in self.nova.flavors.list():
1194 epa = flavor.get_keys()
sousaedu80135b92021-02-17 15:05:18 +01001195
tiernocf157a82017-01-30 14:07:06 +01001196 if epa:
1197 continue
tiernoe26fc7a2017-05-30 14:43:03 +02001198 # TODO
sousaedu80135b92021-02-17 15:05:18 +01001199
sousaedu648ee3d2021-11-22 14:09:15 +00001200 flavor_data = (
1201 flavor.ram,
1202 flavor.vcpus,
1203 flavor.disk,
1204 flavor.ephemeral,
preethika.pebaba1f2022-01-20 07:24:18 +00001205 flavor.swap if isinstance(flavor.swap, int) else 0,
sousaedu648ee3d2021-11-22 14:09:15 +00001206 )
tiernoe26fc7a2017-05-30 14:43:03 +02001207 if flavor_data == flavor_target:
1208 return flavor.id
sousaedu80135b92021-02-17 15:05:18 +01001209 elif (
1210 not exact_match
1211 and flavor_target < flavor_data < flavor_candidate_data
1212 ):
tiernoe26fc7a2017-05-30 14:43:03 +02001213 flavor_candidate_id = flavor.id
1214 flavor_candidate_data = flavor_data
sousaedu80135b92021-02-17 15:05:18 +01001215
tiernoe26fc7a2017-05-30 14:43:03 +02001216 if not exact_match and flavor_candidate_id:
1217 return flavor_candidate_id
sousaedu80135b92021-02-17 15:05:18 +01001218
1219 raise vimconn.VimConnNotFoundException(
1220 "Cannot find any flavor matching '{}'".format(flavor_dict)
1221 )
1222 except (
1223 nvExceptions.NotFound,
1224 nvExceptions.ClientException,
1225 ksExceptions.ClientException,
1226 ConnectionError,
1227 ) as e:
tiernocf157a82017-01-30 14:07:06 +01001228 self._format_exception(e)
1229
anwarsae5f52c2019-04-22 10:35:27 +05301230 def process_resource_quota(self, quota, prefix, extra_specs):
1231 """
1232 :param prefix:
borsatti8a2dda32019-12-18 15:08:57 +00001233 :param extra_specs:
anwarsae5f52c2019-04-22 10:35:27 +05301234 :return:
1235 """
sousaedu80135b92021-02-17 15:05:18 +01001236 if "limit" in quota:
1237 extra_specs["quota:" + prefix + "_limit"] = quota["limit"]
1238
1239 if "reserve" in quota:
1240 extra_specs["quota:" + prefix + "_reservation"] = quota["reserve"]
1241
1242 if "shares" in quota:
anwarsae5f52c2019-04-22 10:35:27 +05301243 extra_specs["quota:" + prefix + "_shares_level"] = "custom"
sousaedu80135b92021-02-17 15:05:18 +01001244 extra_specs["quota:" + prefix + "_shares_share"] = quota["shares"]
anwarsae5f52c2019-04-22 10:35:27 +05301245
tiernoae4a8d12016-07-08 12:30:39 +02001246 def new_flavor(self, flavor_data, change_name_if_used=True):
tierno1ec592d2020-06-16 15:29:47 +00001247 """Adds a tenant flavor to openstack VIM
1248 if change_name_if_used is True, it will change name in case of conflict, because it is not supported name
1249 repetition
tierno7edb6752016-03-21 17:37:52 +01001250 Returns the flavor identifier
tierno1ec592d2020-06-16 15:29:47 +00001251 """
tiernoae4a8d12016-07-08 12:30:39 +02001252 self.logger.debug("Adding flavor '%s'", str(flavor_data))
tierno1ec592d2020-06-16 15:29:47 +00001253 retry = 0
1254 max_retries = 3
tierno7edb6752016-03-21 17:37:52 +01001255 name_suffix = 0
sousaedu80135b92021-02-17 15:05:18 +01001256
anwarsc76a3ee2018-10-04 14:05:32 +05301257 try:
sousaedu80135b92021-02-17 15:05:18 +01001258 name = flavor_data["name"]
tierno1ec592d2020-06-16 15:29:47 +00001259 while retry < max_retries:
1260 retry += 1
anwarsc76a3ee2018-10-04 14:05:32 +05301261 try:
1262 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01001263
anwarsc76a3ee2018-10-04 14:05:32 +05301264 if change_name_if_used:
tierno1ec592d2020-06-16 15:29:47 +00001265 # get used names
1266 fl_names = []
1267 fl = self.nova.flavors.list()
sousaedu80135b92021-02-17 15:05:18 +01001268
anwarsc76a3ee2018-10-04 14:05:32 +05301269 for f in fl:
1270 fl_names.append(f.name)
sousaedu80135b92021-02-17 15:05:18 +01001271
anwarsc76a3ee2018-10-04 14:05:32 +05301272 while name in fl_names:
1273 name_suffix += 1
sousaedu80135b92021-02-17 15:05:18 +01001274 name = flavor_data["name"] + "-" + str(name_suffix)
kate721d79b2017-06-24 04:21:38 -07001275
sousaedu80135b92021-02-17 15:05:18 +01001276 ram = flavor_data.get("ram", 64)
1277 vcpus = flavor_data.get("vcpus", 1)
tierno1ec592d2020-06-16 15:29:47 +00001278 extra_specs = {}
tierno7edb6752016-03-21 17:37:52 +01001279
anwarsc76a3ee2018-10-04 14:05:32 +05301280 extended = flavor_data.get("extended")
1281 if extended:
tierno1ec592d2020-06-16 15:29:47 +00001282 numas = extended.get("numas")
sousaedu80135b92021-02-17 15:05:18 +01001283
anwarsc76a3ee2018-10-04 14:05:32 +05301284 if numas:
1285 numa_nodes = len(numas)
sousaedu80135b92021-02-17 15:05:18 +01001286
anwarsae5f52c2019-04-22 10:35:27 +05301287 extra_specs["hw:numa_nodes"] = str(numa_nodes)
sousaedu80135b92021-02-17 15:05:18 +01001288
anwarsc76a3ee2018-10-04 14:05:32 +05301289 if self.vim_type == "VIO":
sousaedu80135b92021-02-17 15:05:18 +01001290 extra_specs[
1291 "vmware:extra_config"
1292 ] = '{"numa.nodeAffinity":"0"}'
anwarsae5f52c2019-04-22 10:35:27 +05301293 extra_specs["vmware:latency_sensitivity_level"] = "high"
sousaedu80135b92021-02-17 15:05:18 +01001294
anwarsc76a3ee2018-10-04 14:05:32 +05301295 for numa in numas:
sritharan1d129842022-10-13 05:43:13 +00001296 if "id" in numa:
1297 node_id = numa["id"]
1298
1299 if "memory" in numa:
1300 memory_mb = numa["memory"] * 1024
1301 memory = "hw:numa_mem.{}".format(node_id)
1302 extra_specs[memory] = int(memory_mb)
1303
1304 if "vcpu" in numa:
1305 vcpu = numa["vcpu"]
1306 cpu = "hw:numa_cpus.{}".format(node_id)
1307 vcpu = ",".join(map(str, vcpu))
1308 extra_specs[cpu] = vcpu
1309
tierno1ec592d2020-06-16 15:29:47 +00001310 # overwrite ram and vcpus
sousaedu80135b92021-02-17 15:05:18 +01001311 # check if key "memory" is present in numa else use ram value at flavor
tierno1ec592d2020-06-16 15:29:47 +00001312 # See for reference: https://specs.openstack.org/openstack/nova-specs/specs/mitaka/
1313 # implemented/virt-driver-cpu-thread-pinning.html
sritharan1d129842022-10-13 05:43:13 +00001314 extra_specs["hw:cpu_sockets"] = str(numa_nodes)
sousaedu80135b92021-02-17 15:05:18 +01001315
1316 if "paired-threads" in numa:
1317 vcpus = numa["paired-threads"] * 2
1318 # cpu_thread_policy "require" implies that the compute node must have an
tierno1ec592d2020-06-16 15:29:47 +00001319 # STM architecture
anwarsae5f52c2019-04-22 10:35:27 +05301320 extra_specs["hw:cpu_thread_policy"] = "require"
1321 extra_specs["hw:cpu_policy"] = "dedicated"
sousaedu80135b92021-02-17 15:05:18 +01001322 elif "cores" in numa:
1323 vcpus = numa["cores"]
1324 # cpu_thread_policy "prefer" implies that the host must not have an SMT
tierno1ec592d2020-06-16 15:29:47 +00001325 # architecture, or a non-SMT architecture will be emulated
anwarsae5f52c2019-04-22 10:35:27 +05301326 extra_specs["hw:cpu_thread_policy"] = "isolate"
1327 extra_specs["hw:cpu_policy"] = "dedicated"
sousaedu80135b92021-02-17 15:05:18 +01001328 elif "threads" in numa:
1329 vcpus = numa["threads"]
tierno1ec592d2020-06-16 15:29:47 +00001330 # cpu_thread_policy "prefer" implies that the host may or may not have an SMT
1331 # architecture
anwarsae5f52c2019-04-22 10:35:27 +05301332 extra_specs["hw:cpu_thread_policy"] = "prefer"
1333 extra_specs["hw:cpu_policy"] = "dedicated"
anwarsc76a3ee2018-10-04 14:05:32 +05301334 # for interface in numa.get("interfaces",() ):
1335 # if interface["dedicated"]=="yes":
tierno1ec592d2020-06-16 15:29:47 +00001336 # raise vimconn.VimConnException("Passthrough interfaces are not supported
1337 # for the openstack connector", http_code=vimconn.HTTP_Service_Unavailable)
sousaedu80135b92021-02-17 15:05:18 +01001338 # #TODO, add the key 'pci_passthrough:alias"="<label at config>:<number ifaces>"'
tierno1ec592d2020-06-16 15:29:47 +00001339 # when a way to connect it is available
anwarsae5f52c2019-04-22 10:35:27 +05301340 elif extended.get("cpu-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001341 self.process_resource_quota(
1342 extended.get("cpu-quota"), "cpu", extra_specs
1343 )
1344
anwarsae5f52c2019-04-22 10:35:27 +05301345 if extended.get("mem-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001346 self.process_resource_quota(
1347 extended.get("mem-quota"), "memory", extra_specs
1348 )
1349
anwarsae5f52c2019-04-22 10:35:27 +05301350 if extended.get("vif-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001351 self.process_resource_quota(
1352 extended.get("vif-quota"), "vif", extra_specs
1353 )
1354
anwarsae5f52c2019-04-22 10:35:27 +05301355 if extended.get("disk-io-quota"):
sousaedu80135b92021-02-17 15:05:18 +01001356 self.process_resource_quota(
1357 extended.get("disk-io-quota"), "disk_io", extra_specs
1358 )
1359
rodriguezgar0dd83fd2022-05-15 00:42:45 +02001360 # Set the mempage size as specified in the descriptor
1361 if extended.get("mempage-size"):
1362 if extended.get("mempage-size") == "LARGE":
1363 extra_specs["hw:mem_page_size"] = "large"
1364 elif extended.get("mempage-size") == "SMALL":
1365 extra_specs["hw:mem_page_size"] = "small"
1366 elif extended.get("mempage-size") == "SIZE_2MB":
1367 extra_specs["hw:mem_page_size"] = "2MB"
1368 elif extended.get("mempage-size") == "SIZE_1GB":
1369 extra_specs["hw:mem_page_size"] = "1GB"
1370 elif extended.get("mempage-size") == "PREFER_LARGE":
1371 extra_specs["hw:mem_page_size"] = "any"
1372 else:
1373 # The validations in NBI should make reaching here not possible.
1374 # If this message is shown, check validations
1375 self.logger.debug(
1376 "Invalid mempage-size %s. Will be ignored",
1377 extended.get("mempage-size"),
1378 )
sritharan1d129842022-10-13 05:43:13 +00001379 if extended.get("cpu-pinning-policy"):
1380 extra_specs["hw:cpu_policy"] = extended.get(
1381 "cpu-pinning-policy"
1382 ).lower()
1383
1384 # Set the cpu thread pinning policy as specified in the descriptor
1385 if extended.get("cpu-thread-pinning-policy"):
1386 extra_specs["hw:cpu_thread_policy"] = extended.get(
1387 "cpu-thread-pinning-policy"
1388 ).lower()
1389
1390 # Set the mem policy as specified in the descriptor
1391 if extended.get("mem-policy"):
1392 extra_specs["hw:numa_mempolicy"] = extended.get(
1393 "mem-policy"
1394 ).lower()
1395
tierno1ec592d2020-06-16 15:29:47 +00001396 # create flavor
sousaedu80135b92021-02-17 15:05:18 +01001397 new_flavor = self.nova.flavors.create(
sousaeduf524da82021-11-22 14:02:17 +00001398 name=name,
1399 ram=ram,
1400 vcpus=vcpus,
1401 disk=flavor_data.get("disk", 0),
1402 ephemeral=flavor_data.get("ephemeral", 0),
sousaedu648ee3d2021-11-22 14:09:15 +00001403 swap=flavor_data.get("swap", 0),
sousaedu80135b92021-02-17 15:05:18 +01001404 is_public=flavor_data.get("is_public", True),
1405 )
tierno1ec592d2020-06-16 15:29:47 +00001406 # add metadata
anwarsae5f52c2019-04-22 10:35:27 +05301407 if extra_specs:
1408 new_flavor.set_keys(extra_specs)
sousaedu80135b92021-02-17 15:05:18 +01001409
anwarsc76a3ee2018-10-04 14:05:32 +05301410 return new_flavor.id
1411 except nvExceptions.Conflict as e:
1412 if change_name_if_used and retry < max_retries:
1413 continue
sousaedu80135b92021-02-17 15:05:18 +01001414
anwarsc76a3ee2018-10-04 14:05:32 +05301415 self._format_exception(e)
tierno1ec592d2020-06-16 15:29:47 +00001416 # except nvExceptions.BadRequest as e:
sousaedu80135b92021-02-17 15:05:18 +01001417 except (
1418 ksExceptions.ClientException,
1419 nvExceptions.ClientException,
1420 ConnectionError,
1421 KeyError,
1422 ) as e:
anwarsc76a3ee2018-10-04 14:05:32 +05301423 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001424
tierno1ec592d2020-06-16 15:29:47 +00001425 def delete_flavor(self, flavor_id):
sousaedu80135b92021-02-17 15:05:18 +01001426 """Deletes a tenant flavor from openstack VIM. Returns the old flavor_id"""
tiernoae4a8d12016-07-08 12:30:39 +02001427 try:
1428 self._reload_connection()
1429 self.nova.flavors.delete(flavor_id)
sousaedu80135b92021-02-17 15:05:18 +01001430
tiernoae4a8d12016-07-08 12:30:39 +02001431 return flavor_id
tierno1ec592d2020-06-16 15:29:47 +00001432 # except nvExceptions.BadRequest as e:
sousaedu80135b92021-02-17 15:05:18 +01001433 except (
1434 nvExceptions.NotFound,
1435 ksExceptions.ClientException,
1436 nvExceptions.ClientException,
1437 ConnectionError,
1438 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001439 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01001440
tierno1ec592d2020-06-16 15:29:47 +00001441 def new_image(self, image_dict):
1442 """
tiernoae4a8d12016-07-08 12:30:39 +02001443 Adds a tenant image to VIM. imge_dict is a dictionary with:
1444 name: name
1445 disk_format: qcow2, vhd, vmdk, raw (by default), ...
1446 location: path or URI
1447 public: "yes" or "no"
1448 metadata: metadata of the image
1449 Returns the image_id
tierno1ec592d2020-06-16 15:29:47 +00001450 """
1451 retry = 0
1452 max_retries = 3
sousaedu80135b92021-02-17 15:05:18 +01001453
tierno1ec592d2020-06-16 15:29:47 +00001454 while retry < max_retries:
1455 retry += 1
tierno7edb6752016-03-21 17:37:52 +01001456 try:
1457 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01001458
tierno1ec592d2020-06-16 15:29:47 +00001459 # determine format http://docs.openstack.org/developer/glance/formats.html
tierno7edb6752016-03-21 17:37:52 +01001460 if "disk_format" in image_dict:
tierno1ec592d2020-06-16 15:29:47 +00001461 disk_format = image_dict["disk_format"]
1462 else: # autodiscover based on extension
sousaedu80135b92021-02-17 15:05:18 +01001463 if image_dict["location"].endswith(".qcow2"):
tierno1ec592d2020-06-16 15:29:47 +00001464 disk_format = "qcow2"
sousaedu80135b92021-02-17 15:05:18 +01001465 elif image_dict["location"].endswith(".vhd"):
tierno1ec592d2020-06-16 15:29:47 +00001466 disk_format = "vhd"
sousaedu80135b92021-02-17 15:05:18 +01001467 elif image_dict["location"].endswith(".vmdk"):
tierno1ec592d2020-06-16 15:29:47 +00001468 disk_format = "vmdk"
sousaedu80135b92021-02-17 15:05:18 +01001469 elif image_dict["location"].endswith(".vdi"):
tierno1ec592d2020-06-16 15:29:47 +00001470 disk_format = "vdi"
sousaedu80135b92021-02-17 15:05:18 +01001471 elif image_dict["location"].endswith(".iso"):
tierno1ec592d2020-06-16 15:29:47 +00001472 disk_format = "iso"
sousaedu80135b92021-02-17 15:05:18 +01001473 elif image_dict["location"].endswith(".aki"):
tierno1ec592d2020-06-16 15:29:47 +00001474 disk_format = "aki"
sousaedu80135b92021-02-17 15:05:18 +01001475 elif image_dict["location"].endswith(".ari"):
tierno1ec592d2020-06-16 15:29:47 +00001476 disk_format = "ari"
sousaedu80135b92021-02-17 15:05:18 +01001477 elif image_dict["location"].endswith(".ami"):
tierno1ec592d2020-06-16 15:29:47 +00001478 disk_format = "ami"
tierno7edb6752016-03-21 17:37:52 +01001479 else:
tierno1ec592d2020-06-16 15:29:47 +00001480 disk_format = "raw"
sousaedu80135b92021-02-17 15:05:18 +01001481
1482 self.logger.debug(
1483 "new_image: '%s' loading from '%s'",
1484 image_dict["name"],
1485 image_dict["location"],
1486 )
shashankjain3c83a212018-10-04 13:05:46 +05301487 if self.vim_type == "VIO":
1488 container_format = "bare"
sousaedu80135b92021-02-17 15:05:18 +01001489 if "container_format" in image_dict:
1490 container_format = image_dict["container_format"]
1491
1492 new_image = self.glance.images.create(
1493 name=image_dict["name"],
1494 container_format=container_format,
1495 disk_format=disk_format,
1496 )
shashankjain3c83a212018-10-04 13:05:46 +05301497 else:
sousaedu80135b92021-02-17 15:05:18 +01001498 new_image = self.glance.images.create(name=image_dict["name"])
1499
1500 if image_dict["location"].startswith("http"):
tierno1beea862018-07-11 15:47:37 +02001501 # TODO there is not a method to direct download. It must be downloaded locally with requests
tierno72774862020-05-04 11:44:15 +00001502 raise vimconn.VimConnNotImplemented("Cannot create image from URL")
tierno1ec592d2020-06-16 15:29:47 +00001503 else: # local path
sousaedu80135b92021-02-17 15:05:18 +01001504 with open(image_dict["location"]) as fimage:
tierno1beea862018-07-11 15:47:37 +02001505 self.glance.images.upload(new_image.id, fimage)
sousaedu80135b92021-02-17 15:05:18 +01001506 # new_image = self.glancev1.images.create(name=image_dict["name"], is_public=
1507 # image_dict.get("public","yes")=="yes",
tierno1beea862018-07-11 15:47:37 +02001508 # container_format="bare", data=fimage, disk_format=disk_format)
sousaedu80135b92021-02-17 15:05:18 +01001509
1510 metadata_to_load = image_dict.get("metadata")
1511
1512 # TODO location is a reserved word for current openstack versions. fixed for VIO please check
tierno1ec592d2020-06-16 15:29:47 +00001513 # for openstack
shashankjain3c83a212018-10-04 13:05:46 +05301514 if self.vim_type == "VIO":
sousaedu80135b92021-02-17 15:05:18 +01001515 metadata_to_load["upload_location"] = image_dict["location"]
shashankjain3c83a212018-10-04 13:05:46 +05301516 else:
sousaedu80135b92021-02-17 15:05:18 +01001517 metadata_to_load["location"] = image_dict["location"]
1518
tierno1beea862018-07-11 15:47:37 +02001519 self.glance.images.update(new_image.id, **metadata_to_load)
sousaedu80135b92021-02-17 15:05:18 +01001520
tiernoae4a8d12016-07-08 12:30:39 +02001521 return new_image.id
sousaedu80135b92021-02-17 15:05:18 +01001522 except (
1523 nvExceptions.Conflict,
1524 ksExceptions.ClientException,
1525 nvExceptions.ClientException,
1526 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001527 self._format_exception(e)
sousaedu80135b92021-02-17 15:05:18 +01001528 except (
1529 HTTPException,
1530 gl1Exceptions.HTTPException,
1531 gl1Exceptions.CommunicationError,
1532 ConnectionError,
1533 ) as e:
tierno1ec592d2020-06-16 15:29:47 +00001534 if retry == max_retries:
tiernoae4a8d12016-07-08 12:30:39 +02001535 continue
sousaedu80135b92021-02-17 15:05:18 +01001536
tiernoae4a8d12016-07-08 12:30:39 +02001537 self._format_exception(e)
tierno1ec592d2020-06-16 15:29:47 +00001538 except IOError as e: # can not open the file
sousaedu80135b92021-02-17 15:05:18 +01001539 raise vimconn.VimConnConnectionException(
1540 "{}: {} for {}".format(type(e).__name__, e, image_dict["location"]),
1541 http_code=vimconn.HTTP_Bad_Request,
1542 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001543
tiernoae4a8d12016-07-08 12:30:39 +02001544 def delete_image(self, image_id):
sousaedu80135b92021-02-17 15:05:18 +01001545 """Deletes a tenant image from openstack VIM. Returns the old id"""
tiernoae4a8d12016-07-08 12:30:39 +02001546 try:
1547 self._reload_connection()
tierno1beea862018-07-11 15:47:37 +02001548 self.glance.images.delete(image_id)
sousaedu80135b92021-02-17 15:05:18 +01001549
tiernoae4a8d12016-07-08 12:30:39 +02001550 return image_id
sousaedu80135b92021-02-17 15:05:18 +01001551 except (
1552 nvExceptions.NotFound,
1553 ksExceptions.ClientException,
1554 nvExceptions.ClientException,
1555 gl1Exceptions.CommunicationError,
1556 gl1Exceptions.HTTPNotFound,
1557 ConnectionError,
1558 ) as e: # TODO remove
tiernoae4a8d12016-07-08 12:30:39 +02001559 self._format_exception(e)
1560
1561 def get_image_id_from_path(self, path):
tierno1ec592d2020-06-16 15:29:47 +00001562 """Get the image id from image path in the VIM database. Returns the image_id"""
tiernoae4a8d12016-07-08 12:30:39 +02001563 try:
1564 self._reload_connection()
tierno1beea862018-07-11 15:47:37 +02001565 images = self.glance.images.list()
sousaedu80135b92021-02-17 15:05:18 +01001566
tiernoae4a8d12016-07-08 12:30:39 +02001567 for image in images:
tierno1ec592d2020-06-16 15:29:47 +00001568 if image.metadata.get("location") == path:
tiernoae4a8d12016-07-08 12:30:39 +02001569 return image.id
sousaedu80135b92021-02-17 15:05:18 +01001570
1571 raise vimconn.VimConnNotFoundException(
1572 "image with location '{}' not found".format(path)
1573 )
1574 except (
1575 ksExceptions.ClientException,
1576 nvExceptions.ClientException,
1577 gl1Exceptions.CommunicationError,
1578 ConnectionError,
1579 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02001580 self._format_exception(e)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00001581
garciadeblasb69fa9f2016-09-28 12:04:10 +02001582 def get_image_list(self, filter_dict={}):
tierno1ec592d2020-06-16 15:29:47 +00001583 """Obtain tenant images from VIM
garciadeblasb69fa9f2016-09-28 12:04:10 +02001584 Filter_dict can be:
1585 id: image id
1586 name: image name
1587 checksum: image checksum
1588 Returns the image list of dictionaries:
1589 [{<the fields at Filter_dict plus some VIM specific>}, ...]
1590 List can be empty
tierno1ec592d2020-06-16 15:29:47 +00001591 """
garciadeblasb69fa9f2016-09-28 12:04:10 +02001592 self.logger.debug("Getting image list from VIM filter: '%s'", str(filter_dict))
sousaedu80135b92021-02-17 15:05:18 +01001593
garciadeblasb69fa9f2016-09-28 12:04:10 +02001594 try:
1595 self._reload_connection()
tierno1ec592d2020-06-16 15:29:47 +00001596 # filter_dict_os = filter_dict.copy()
1597 # First we filter by the available filter fields: name, id. The others are removed.
tierno1beea862018-07-11 15:47:37 +02001598 image_list = self.glance.images.list()
garciadeblasb69fa9f2016-09-28 12:04:10 +02001599 filtered_list = []
sousaedu80135b92021-02-17 15:05:18 +01001600
garciadeblasb69fa9f2016-09-28 12:04:10 +02001601 for image in image_list:
tierno3cb8dc32017-10-24 18:13:19 +02001602 try:
tierno1beea862018-07-11 15:47:37 +02001603 if filter_dict.get("name") and image["name"] != filter_dict["name"]:
1604 continue
sousaedu80135b92021-02-17 15:05:18 +01001605
tierno1beea862018-07-11 15:47:37 +02001606 if filter_dict.get("id") and image["id"] != filter_dict["id"]:
1607 continue
sousaedu80135b92021-02-17 15:05:18 +01001608
1609 if (
1610 filter_dict.get("checksum")
1611 and image["checksum"] != filter_dict["checksum"]
1612 ):
tierno1beea862018-07-11 15:47:37 +02001613 continue
1614
1615 filtered_list.append(image.copy())
tierno3cb8dc32017-10-24 18:13:19 +02001616 except gl1Exceptions.HTTPNotFound:
1617 pass
sousaedu80135b92021-02-17 15:05:18 +01001618
garciadeblasb69fa9f2016-09-28 12:04:10 +02001619 return filtered_list
sousaedu80135b92021-02-17 15:05:18 +01001620 except (
1621 ksExceptions.ClientException,
1622 nvExceptions.ClientException,
1623 gl1Exceptions.CommunicationError,
1624 ConnectionError,
1625 ) as e:
garciadeblasb69fa9f2016-09-28 12:04:10 +02001626 self._format_exception(e)
1627
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001628 def __wait_for_vm(self, vm_id, status):
1629 """wait until vm is in the desired status and return True.
1630 If the VM gets in ERROR status, return false.
1631 If the timeout is reached generate an exception"""
1632 elapsed_time = 0
1633 while elapsed_time < server_timeout:
1634 vm_status = self.nova.servers.get(vm_id).status
sousaedu80135b92021-02-17 15:05:18 +01001635
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001636 if vm_status == status:
1637 return True
sousaedu80135b92021-02-17 15:05:18 +01001638
1639 if vm_status == "ERROR":
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001640 return False
sousaedu80135b92021-02-17 15:05:18 +01001641
tierno1df468d2018-07-06 14:25:16 +02001642 time.sleep(5)
1643 elapsed_time += 5
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001644
1645 # if we exceeded the timeout rollback
1646 if elapsed_time >= server_timeout:
sousaedu80135b92021-02-17 15:05:18 +01001647 raise vimconn.VimConnException(
1648 "Timeout waiting for instance " + vm_id + " to get " + status,
1649 http_code=vimconn.HTTP_Request_Timeout,
1650 )
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02001651
mirabal29356312017-07-27 12:21:22 +02001652 def _get_openstack_availablity_zones(self):
1653 """
1654 Get from openstack availability zones available
1655 :return:
1656 """
1657 try:
1658 openstack_availability_zone = self.nova.availability_zones.list()
sousaedu80135b92021-02-17 15:05:18 +01001659 openstack_availability_zone = [
1660 str(zone.zoneName)
1661 for zone in openstack_availability_zone
1662 if zone.zoneName != "internal"
1663 ]
1664
mirabal29356312017-07-27 12:21:22 +02001665 return openstack_availability_zone
tierno1ec592d2020-06-16 15:29:47 +00001666 except Exception:
mirabal29356312017-07-27 12:21:22 +02001667 return None
1668
1669 def _set_availablity_zones(self):
1670 """
1671 Set vim availablity zone
1672 :return:
1673 """
sousaedu80135b92021-02-17 15:05:18 +01001674 if "availability_zone" in self.config:
1675 vim_availability_zones = self.config.get("availability_zone")
mirabal29356312017-07-27 12:21:22 +02001676
mirabal29356312017-07-27 12:21:22 +02001677 if isinstance(vim_availability_zones, str):
1678 self.availability_zone = [vim_availability_zones]
1679 elif isinstance(vim_availability_zones, list):
1680 self.availability_zone = vim_availability_zones
1681 else:
1682 self.availability_zone = self._get_openstack_availablity_zones()
1683
sousaedu80135b92021-02-17 15:05:18 +01001684 def _get_vm_availability_zone(
1685 self, availability_zone_index, availability_zone_list
1686 ):
mirabal29356312017-07-27 12:21:22 +02001687 """
tierno5a3273c2017-08-29 11:43:46 +02001688 Return thge availability zone to be used by the created VM.
1689 :return: The VIM availability zone to be used or None
mirabal29356312017-07-27 12:21:22 +02001690 """
tierno5a3273c2017-08-29 11:43:46 +02001691 if availability_zone_index is None:
sousaedu80135b92021-02-17 15:05:18 +01001692 if not self.config.get("availability_zone"):
tierno5a3273c2017-08-29 11:43:46 +02001693 return None
sousaedu80135b92021-02-17 15:05:18 +01001694 elif isinstance(self.config.get("availability_zone"), str):
1695 return self.config["availability_zone"]
tierno5a3273c2017-08-29 11:43:46 +02001696 else:
1697 # TODO consider using a different parameter at config for default AV and AV list match
sousaedu80135b92021-02-17 15:05:18 +01001698 return self.config["availability_zone"][0]
mirabal29356312017-07-27 12:21:22 +02001699
tierno5a3273c2017-08-29 11:43:46 +02001700 vim_availability_zones = self.availability_zone
1701 # check if VIM offer enough availability zones describe in the VNFD
sousaedu80135b92021-02-17 15:05:18 +01001702 if vim_availability_zones and len(availability_zone_list) <= len(
1703 vim_availability_zones
1704 ):
tierno5a3273c2017-08-29 11:43:46 +02001705 # check if all the names of NFV AV match VIM AV names
1706 match_by_index = False
1707 for av in availability_zone_list:
1708 if av not in vim_availability_zones:
1709 match_by_index = True
1710 break
sousaedu80135b92021-02-17 15:05:18 +01001711
tierno5a3273c2017-08-29 11:43:46 +02001712 if match_by_index:
1713 return vim_availability_zones[availability_zone_index]
1714 else:
1715 return availability_zone_list[availability_zone_index]
mirabal29356312017-07-27 12:21:22 +02001716 else:
sousaedu80135b92021-02-17 15:05:18 +01001717 raise vimconn.VimConnConflictException(
1718 "No enough availability zones at VIM for this deployment"
1719 )
mirabal29356312017-07-27 12:21:22 +02001720
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03001721 def _prepare_port_dict_security_groups(self, net: dict, port_dict: dict) -> None:
1722 """Fill up the security_groups in the port_dict.
1723
1724 Args:
1725 net (dict): Network details
1726 port_dict (dict): Port details
1727
1728 """
1729 if (
1730 self.config.get("security_groups")
1731 and net.get("port_security") is not False
1732 and not self.config.get("no_port_security_extension")
1733 ):
1734 if not self.security_groups_id:
1735 self._get_ids_from_name()
1736
1737 port_dict["security_groups"] = self.security_groups_id
1738
1739 def _prepare_port_dict_binding(self, net: dict, port_dict: dict) -> None:
1740 """Fill up the network binding depending on network type in the port_dict.
1741
1742 Args:
1743 net (dict): Network details
1744 port_dict (dict): Port details
1745
1746 """
1747 if not net.get("type"):
1748 raise vimconn.VimConnException("Type is missing in the network details.")
1749
1750 if net["type"] == "virtual":
1751 pass
1752
1753 # For VF
1754 elif net["type"] == "VF" or net["type"] == "SR-IOV":
1755 port_dict["binding:vnic_type"] = "direct"
1756
1757 # VIO specific Changes
1758 if self.vim_type == "VIO":
1759 # Need to create port with port_security_enabled = False and no-security-groups
1760 port_dict["port_security_enabled"] = False
1761 port_dict["provider_security_groups"] = []
1762 port_dict["security_groups"] = []
1763
1764 else:
1765 # For PT PCI-PASSTHROUGH
1766 port_dict["binding:vnic_type"] = "direct-physical"
1767
1768 @staticmethod
1769 def _set_fixed_ip(new_port: dict, net: dict) -> None:
1770 """Set the "ip" parameter in net dictionary.
1771
1772 Args:
1773 new_port (dict): New created port
1774 net (dict): Network details
1775
1776 """
1777 fixed_ips = new_port["port"].get("fixed_ips")
1778
1779 if fixed_ips:
1780 net["ip"] = fixed_ips[0].get("ip_address")
1781 else:
1782 net["ip"] = None
1783
1784 @staticmethod
1785 def _prepare_port_dict_mac_ip_addr(net: dict, port_dict: dict) -> None:
1786 """Fill up the mac_address and fixed_ips in port_dict.
1787
1788 Args:
1789 net (dict): Network details
1790 port_dict (dict): Port details
1791
1792 """
1793 if net.get("mac_address"):
1794 port_dict["mac_address"] = net["mac_address"]
1795
1796 if net.get("ip_address"):
1797 port_dict["fixed_ips"] = [{"ip_address": net["ip_address"]}]
1798 # TODO add "subnet_id": <subnet_id>
1799
1800 def _create_new_port(self, port_dict: dict, created_items: dict, net: dict) -> Dict:
1801 """Create new port using neutron.
1802
1803 Args:
1804 port_dict (dict): Port details
1805 created_items (dict): All created items
1806 net (dict): Network details
1807
1808 Returns:
1809 new_port (dict): New created port
1810
1811 """
1812 new_port = self.neutron.create_port({"port": port_dict})
1813 created_items["port:" + str(new_port["port"]["id"])] = True
1814 net["mac_adress"] = new_port["port"]["mac_address"]
1815 net["vim_id"] = new_port["port"]["id"]
1816
1817 return new_port
1818
1819 def _create_port(
1820 self, net: dict, name: str, created_items: dict
1821 ) -> Tuple[dict, dict]:
1822 """Create port using net details.
1823
1824 Args:
1825 net (dict): Network details
1826 name (str): Name to be used as network name if net dict does not include name
1827 created_items (dict): All created items
1828
1829 Returns:
1830 new_port, port New created port, port dictionary
1831
1832 """
1833
1834 port_dict = {
1835 "network_id": net["net_id"],
1836 "name": net.get("name"),
1837 "admin_state_up": True,
1838 }
1839
1840 if not port_dict["name"]:
1841 port_dict["name"] = name
1842
1843 self._prepare_port_dict_security_groups(net, port_dict)
1844
1845 self._prepare_port_dict_binding(net, port_dict)
1846
1847 vimconnector._prepare_port_dict_mac_ip_addr(net, port_dict)
1848
1849 new_port = self._create_new_port(port_dict, created_items, net)
1850
1851 vimconnector._set_fixed_ip(new_port, net)
1852
1853 port = {"port-id": new_port["port"]["id"]}
1854
1855 if float(self.nova.api_version.get_string()) >= 2.32:
1856 port["tag"] = new_port["port"]["name"]
1857
1858 return new_port, port
1859
1860 def _prepare_network_for_vminstance(
1861 self,
1862 name: str,
1863 net_list: list,
1864 created_items: dict,
1865 net_list_vim: list,
1866 external_network: list,
1867 no_secured_ports: list,
1868 ) -> None:
1869 """Create port and fill up net dictionary for new VM instance creation.
1870
1871 Args:
1872 name (str): Name of network
1873 net_list (list): List of networks
1874 created_items (dict): All created items belongs to a VM
1875 net_list_vim (list): List of ports
1876 external_network (list): List of external-networks
1877 no_secured_ports (list): Port security disabled ports
1878 """
1879
1880 self._reload_connection()
1881
1882 for net in net_list:
1883 # Skip non-connected iface
1884 if not net.get("net_id"):
1885 continue
1886
1887 new_port, port = self._create_port(net, name, created_items)
1888
1889 net_list_vim.append(port)
1890
1891 if net.get("floating_ip", False):
1892 net["exit_on_floating_ip_error"] = True
1893 external_network.append(net)
1894
1895 elif net["use"] == "mgmt" and self.config.get("use_floating_ip"):
1896 net["exit_on_floating_ip_error"] = False
1897 external_network.append(net)
1898 net["floating_ip"] = self.config.get("use_floating_ip")
1899
1900 # If port security is disabled when the port has not yet been attached to the VM, then all vm traffic
1901 # is dropped. As a workaround we wait until the VM is active and then disable the port-security
1902 if net.get("port_security") is False and not self.config.get(
1903 "no_port_security_extension"
1904 ):
1905 no_secured_ports.append(
1906 (
1907 new_port["port"]["id"],
1908 net.get("port_security_disable_strategy"),
1909 )
1910 )
1911
1912 def _prepare_persistent_root_volumes(
1913 self,
1914 name: str,
1915 vm_av_zone: list,
1916 disk: dict,
1917 base_disk_index: int,
1918 block_device_mapping: dict,
1919 existing_vim_volumes: list,
1920 created_items: dict,
1921 ) -> Optional[str]:
1922 """Prepare persistent root volumes for new VM instance.
1923
1924 Args:
1925 name (str): Name of VM instance
1926 vm_av_zone (list): List of availability zones
1927 disk (dict): Disk details
1928 base_disk_index (int): Disk index
1929 block_device_mapping (dict): Block device details
1930 existing_vim_volumes (list): Existing disk details
1931 created_items (dict): All created items belongs to VM
1932
1933 Returns:
1934 boot_volume_id (str): ID of boot volume
1935
1936 """
1937 # Disk may include only vim_volume_id or only vim_id."
1938 # Use existing persistent root volume finding with volume_id or vim_id
1939 key_id = "vim_volume_id" if "vim_volume_id" in disk.keys() else "vim_id"
1940
1941 if disk.get(key_id):
1942 block_device_mapping["vd" + chr(base_disk_index)] = disk[key_id]
1943 existing_vim_volumes.append({"id": disk[key_id]})
1944
1945 else:
1946 # Create persistent root volume
1947 volume = self.cinder.volumes.create(
1948 size=disk["size"],
1949 name=name + "vd" + chr(base_disk_index),
1950 imageRef=disk["image_id"],
1951 # Make sure volume is in the same AZ as the VM to be attached to
1952 availability_zone=vm_av_zone,
1953 )
1954 boot_volume_id = volume.id
1955 created_items["volume:" + str(volume.id)] = True
1956 block_device_mapping["vd" + chr(base_disk_index)] = volume.id
1957
1958 return boot_volume_id
1959
1960 def _prepare_non_root_persistent_volumes(
1961 self,
1962 name: str,
1963 disk: dict,
1964 vm_av_zone: list,
1965 block_device_mapping: dict,
1966 base_disk_index: int,
1967 existing_vim_volumes: list,
1968 created_items: dict,
1969 ) -> None:
1970 """Prepare persistent volumes for new VM instance.
1971
1972 Args:
1973 name (str): Name of VM instance
1974 disk (dict): Disk details
1975 vm_av_zone (list): List of availability zones
1976 block_device_mapping (dict): Block device details
1977 base_disk_index (int): Disk index
1978 existing_vim_volumes (list): Existing disk details
1979 created_items (dict): All created items belongs to VM
1980 """
1981 # Non-root persistent volumes
1982 # Disk may include only vim_volume_id or only vim_id."
1983 key_id = "vim_volume_id" if "vim_volume_id" in disk.keys() else "vim_id"
1984
1985 if disk.get(key_id):
1986 # Use existing persistent volume
1987 block_device_mapping["vd" + chr(base_disk_index)] = disk[key_id]
1988 existing_vim_volumes.append({"id": disk[key_id]})
1989
1990 else:
1991 # Create persistent volume
1992 volume = self.cinder.volumes.create(
1993 size=disk["size"],
1994 name=name + "vd" + chr(base_disk_index),
1995 # Make sure volume is in the same AZ as the VM to be attached to
1996 availability_zone=vm_av_zone,
1997 )
1998 created_items["volume:" + str(volume.id)] = True
1999 block_device_mapping["vd" + chr(base_disk_index)] = volume.id
2000
2001 def _wait_for_created_volumes_availability(
2002 self, elapsed_time: int, created_items: dict
2003 ) -> Optional[int]:
2004 """Wait till created volumes become available.
2005
2006 Args:
2007 elapsed_time (int): Passed time while waiting
2008 created_items (dict): All created items belongs to VM
2009
2010 Returns:
2011 elapsed_time (int): Time spent while waiting
2012
2013 """
2014
2015 while elapsed_time < volume_timeout:
2016 for created_item in created_items:
2017 v, _, volume_id = created_item.partition(":")
2018 if v == "volume":
2019 if self.cinder.volumes.get(volume_id).status != "available":
2020 break
2021 else:
2022 # All ready: break from while
2023 break
2024
2025 time.sleep(5)
2026 elapsed_time += 5
2027
2028 return elapsed_time
2029
2030 def _wait_for_existing_volumes_availability(
2031 self, elapsed_time: int, existing_vim_volumes: list
2032 ) -> Optional[int]:
2033 """Wait till existing volumes become available.
2034
2035 Args:
2036 elapsed_time (int): Passed time while waiting
2037 existing_vim_volumes (list): Existing volume details
2038
2039 Returns:
2040 elapsed_time (int): Time spent while waiting
2041
2042 """
2043
2044 while elapsed_time < volume_timeout:
2045 for volume in existing_vim_volumes:
2046 if self.cinder.volumes.get(volume["id"]).status != "available":
2047 break
2048 else: # all ready: break from while
2049 break
2050
2051 time.sleep(5)
2052 elapsed_time += 5
2053
2054 return elapsed_time
2055
2056 def _prepare_disk_for_vminstance(
2057 self,
2058 name: str,
2059 existing_vim_volumes: list,
2060 created_items: dict,
2061 vm_av_zone: list,
2062 disk_list: list = None,
2063 ) -> None:
2064 """Prepare all volumes for new VM instance.
2065
2066 Args:
2067 name (str): Name of Instance
2068 existing_vim_volumes (list): List of existing volumes
2069 created_items (dict): All created items belongs to VM
2070 vm_av_zone (list): VM availability zone
2071 disk_list (list): List of disks
2072
2073 """
2074 # Create additional volumes in case these are present in disk_list
2075 base_disk_index = ord("b")
2076 boot_volume_id = None
2077 elapsed_time = 0
2078
2079 block_device_mapping = {}
2080 for disk in disk_list:
2081 if "image_id" in disk:
2082 # Root persistent volume
2083 base_disk_index = ord("a")
2084 boot_volume_id = self._prepare_persistent_root_volumes(
2085 name=name,
2086 vm_av_zone=vm_av_zone,
2087 disk=disk,
2088 base_disk_index=base_disk_index,
2089 block_device_mapping=block_device_mapping,
2090 existing_vim_volumes=existing_vim_volumes,
2091 created_items=created_items,
2092 )
2093 else:
2094 # Non-root persistent volume
2095 self._prepare_non_root_persistent_volumes(
2096 name=name,
2097 disk=disk,
2098 vm_av_zone=vm_av_zone,
2099 block_device_mapping=block_device_mapping,
2100 base_disk_index=base_disk_index,
2101 existing_vim_volumes=existing_vim_volumes,
2102 created_items=created_items,
2103 )
2104 base_disk_index += 1
2105
2106 # Wait until created volumes are with status available
2107 elapsed_time = self._wait_for_created_volumes_availability(
2108 elapsed_time, created_items
2109 )
2110 # Wait until existing volumes in vim are with status available
2111 elapsed_time = self._wait_for_existing_volumes_availability(
2112 elapsed_time, existing_vim_volumes
2113 )
2114 # If we exceeded the timeout rollback
2115 if elapsed_time >= volume_timeout:
2116 raise vimconn.VimConnException(
2117 "Timeout creating volumes for instance " + name,
2118 http_code=vimconn.HTTP_Request_Timeout,
2119 )
2120 if boot_volume_id:
2121 self.cinder.volumes.set_bootable(boot_volume_id, True)
2122
2123 def _find_the_external_network_for_floating_ip(self):
2124 """Get the external network ip in order to create floating IP.
2125
2126 Returns:
2127 pool_id (str): External network pool ID
2128
2129 """
2130
2131 # Find the external network
2132 external_nets = list()
2133
2134 for net in self.neutron.list_networks()["networks"]:
2135 if net["router:external"]:
2136 external_nets.append(net)
2137
2138 if len(external_nets) == 0:
2139 raise vimconn.VimConnException(
2140 "Cannot create floating_ip automatically since "
2141 "no external network is present",
2142 http_code=vimconn.HTTP_Conflict,
2143 )
2144
2145 if len(external_nets) > 1:
2146 raise vimconn.VimConnException(
2147 "Cannot create floating_ip automatically since "
2148 "multiple external networks are present",
2149 http_code=vimconn.HTTP_Conflict,
2150 )
2151
2152 # Pool ID
2153 return external_nets[0].get("id")
2154
2155 def _neutron_create_float_ip(self, param: dict, created_items: dict) -> None:
2156 """Trigger neutron to create a new floating IP using external network ID.
2157
2158 Args:
2159 param (dict): Input parameters to create a floating IP
2160 created_items (dict): All created items belongs to new VM instance
2161
2162 Raises:
2163
2164 VimConnException
2165 """
2166 try:
2167 self.logger.debug("Creating floating IP")
2168 new_floating_ip = self.neutron.create_floatingip(param)
2169 free_floating_ip = new_floating_ip["floatingip"]["id"]
2170 created_items["floating_ip:" + str(free_floating_ip)] = True
2171
2172 except Exception as e:
2173 raise vimconn.VimConnException(
2174 type(e).__name__ + ": Cannot create new floating_ip " + str(e),
2175 http_code=vimconn.HTTP_Conflict,
2176 )
2177
2178 def _create_floating_ip(
2179 self, floating_network: dict, server: object, created_items: dict
2180 ) -> None:
2181 """Get the available Pool ID and create a new floating IP.
2182
2183 Args:
2184 floating_network (dict): Dict including external network ID
2185 server (object): Server object
2186 created_items (dict): All created items belongs to new VM instance
2187
2188 """
2189
2190 # Pool_id is available
2191 if (
2192 isinstance(floating_network["floating_ip"], str)
2193 and floating_network["floating_ip"].lower() != "true"
2194 ):
2195 pool_id = floating_network["floating_ip"]
2196
2197 # Find the Pool_id
2198 else:
2199 pool_id = self._find_the_external_network_for_floating_ip()
2200
2201 param = {
2202 "floatingip": {
2203 "floating_network_id": pool_id,
2204 "tenant_id": server.tenant_id,
2205 }
2206 }
2207
2208 self._neutron_create_float_ip(param, created_items)
2209
2210 def _find_floating_ip(
2211 self,
2212 server: object,
2213 floating_ips: list,
2214 floating_network: dict,
2215 ) -> Optional[str]:
2216 """Find the available free floating IPs if there are.
2217
2218 Args:
2219 server (object): Server object
2220 floating_ips (list): List of floating IPs
2221 floating_network (dict): Details of floating network such as ID
2222
2223 Returns:
2224 free_floating_ip (str): Free floating ip address
2225
2226 """
2227 for fip in floating_ips:
2228 if fip.get("port_id") or fip.get("tenant_id") != server.tenant_id:
2229 continue
2230
2231 if isinstance(floating_network["floating_ip"], str):
2232 if fip.get("floating_network_id") != floating_network["floating_ip"]:
2233 continue
2234
2235 return fip["id"]
2236
2237 def _assign_floating_ip(
2238 self, free_floating_ip: str, floating_network: dict
2239 ) -> Dict:
2240 """Assign the free floating ip address to port.
2241
2242 Args:
2243 free_floating_ip (str): Floating IP to be assigned
2244 floating_network (dict): ID of floating network
2245
2246 Returns:
2247 fip (dict) (dict): Floating ip details
2248
2249 """
2250 # The vim_id key contains the neutron.port_id
2251 self.neutron.update_floatingip(
2252 free_floating_ip,
2253 {"floatingip": {"port_id": floating_network["vim_id"]}},
2254 )
2255 # For race condition ensure not re-assigned to other VM after 5 seconds
2256 time.sleep(5)
2257
2258 return self.neutron.show_floatingip(free_floating_ip)
2259
2260 def _get_free_floating_ip(
Gulsum Aticic21d7e92022-12-12 19:21:25 +03002261 self, server: object, floating_network: dict
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002262 ) -> Optional[str]:
2263 """Get the free floating IP address.
2264
2265 Args:
2266 server (object): Server Object
2267 floating_network (dict): Floating network details
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002268
2269 Returns:
2270 free_floating_ip (str): Free floating ip addr
2271
2272 """
2273
2274 floating_ips = self.neutron.list_floatingips().get("floatingips", ())
2275
2276 # Randomize
2277 random.shuffle(floating_ips)
2278
Gulsum Aticic21d7e92022-12-12 19:21:25 +03002279 return self._find_floating_ip(server, floating_ips, floating_network)
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002280
2281 def _prepare_external_network_for_vminstance(
2282 self,
2283 external_network: list,
2284 server: object,
2285 created_items: dict,
2286 vm_start_time: float,
2287 ) -> None:
2288 """Assign floating IP address for VM instance.
2289
2290 Args:
2291 external_network (list): ID of External network
2292 server (object): Server Object
2293 created_items (dict): All created items belongs to new VM instance
2294 vm_start_time (float): Time as a floating point number expressed in seconds since the epoch, in UTC
2295
2296 Raises:
2297 VimConnException
2298
2299 """
2300 for floating_network in external_network:
2301 try:
2302 assigned = False
2303 floating_ip_retries = 3
2304 # In case of RO in HA there can be conflicts, two RO trying to assign same floating IP, so retry
2305 # several times
2306 while not assigned:
2307 free_floating_ip = self._get_free_floating_ip(
Gulsum Aticic21d7e92022-12-12 19:21:25 +03002308 server, floating_network
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002309 )
2310
2311 if not free_floating_ip:
2312 self._create_floating_ip(
2313 floating_network, server, created_items
2314 )
2315
2316 try:
2317 # For race condition ensure not already assigned
2318 fip = self.neutron.show_floatingip(free_floating_ip)
2319
2320 if fip["floatingip"].get("port_id"):
2321 continue
2322
2323 # Assign floating ip
2324 fip = self._assign_floating_ip(
2325 free_floating_ip, floating_network
2326 )
2327
2328 if fip["floatingip"]["port_id"] != floating_network["vim_id"]:
2329 self.logger.warning(
2330 "floating_ip {} re-assigned to other port".format(
2331 free_floating_ip
2332 )
2333 )
2334 continue
2335
2336 self.logger.debug(
2337 "Assigned floating_ip {} to VM {}".format(
2338 free_floating_ip, server.id
2339 )
2340 )
2341
2342 assigned = True
2343
2344 except Exception as e:
2345 # Openstack need some time after VM creation to assign an IP. So retry if fails
2346 vm_status = self.nova.servers.get(server.id).status
2347
2348 if vm_status not in ("ACTIVE", "ERROR"):
2349 if time.time() - vm_start_time < server_timeout:
2350 time.sleep(5)
2351 continue
2352 elif floating_ip_retries > 0:
2353 floating_ip_retries -= 1
2354 continue
2355
2356 raise vimconn.VimConnException(
2357 "Cannot create floating_ip: {} {}".format(
2358 type(e).__name__, e
2359 ),
2360 http_code=vimconn.HTTP_Conflict,
2361 )
2362
2363 except Exception as e:
2364 if not floating_network["exit_on_floating_ip_error"]:
2365 self.logger.error("Cannot create floating_ip. %s", str(e))
2366 continue
2367
2368 raise
2369
2370 def _update_port_security_for_vminstance(
2371 self,
2372 no_secured_ports: list,
2373 server: object,
2374 ) -> None:
2375 """Updates the port security according to no_secured_ports list.
2376
2377 Args:
2378 no_secured_ports (list): List of ports that security will be disabled
2379 server (object): Server Object
2380
2381 Raises:
2382 VimConnException
2383
2384 """
2385 # Wait until the VM is active and then disable the port-security
2386 if no_secured_ports:
2387 self.__wait_for_vm(server.id, "ACTIVE")
2388
2389 for port in no_secured_ports:
2390 port_update = {
2391 "port": {"port_security_enabled": False, "security_groups": None}
2392 }
2393
2394 if port[1] == "allow-address-pairs":
2395 port_update = {
2396 "port": {"allowed_address_pairs": [{"ip_address": "0.0.0.0/0"}]}
2397 }
2398
2399 try:
2400 self.neutron.update_port(port[0], port_update)
2401
2402 except Exception:
2403 raise vimconn.VimConnException(
2404 "It was not possible to disable port security for port {}".format(
2405 port[0]
2406 )
2407 )
2408
sousaedu80135b92021-02-17 15:05:18 +01002409 def new_vminstance(
2410 self,
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002411 name: str,
2412 description: str,
2413 start: bool,
2414 image_id: str,
2415 flavor_id: str,
2416 affinity_group_list: list,
2417 net_list: list,
sousaedu80135b92021-02-17 15:05:18 +01002418 cloud_config=None,
2419 disk_list=None,
2420 availability_zone_index=None,
2421 availability_zone_list=None,
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002422 ) -> tuple:
2423 """Adds a VM instance to VIM.
2424
2425 Args:
2426 name (str): name of VM
2427 description (str): description
2428 start (bool): indicates if VM must start or boot in pause mode. Ignored
2429 image_id (str) image uuid
2430 flavor_id (str) flavor uuid
2431 affinity_group_list (list): list of affinity groups, each one is a dictionary.Ignore if empty.
2432 net_list (list): list of interfaces, each one is a dictionary with:
2433 name: name of network
2434 net_id: network uuid to connect
2435 vpci: virtual vcpi to assign, ignored because openstack lack #TODO
2436 model: interface model, ignored #TODO
2437 mac_address: used for SR-IOV ifaces #TODO for other types
2438 use: 'data', 'bridge', 'mgmt'
2439 type: 'virtual', 'PCI-PASSTHROUGH'('PF'), 'SR-IOV'('VF'), 'VFnotShared'
2440 vim_id: filled/added by this function
2441 floating_ip: True/False (or it can be None)
2442 port_security: True/False
2443 cloud_config (dict): (optional) dictionary with:
2444 key-pairs: (optional) list of strings with the public key to be inserted to the default user
2445 users: (optional) list of users to be inserted, each item is a dict with:
2446 name: (mandatory) user name,
2447 key-pairs: (optional) list of strings with the public key to be inserted to the user
2448 user-data: (optional) string is a text script to be passed directly to cloud-init
2449 config-files: (optional). List of files to be transferred. Each item is a dict with:
2450 dest: (mandatory) string with the destination absolute path
2451 encoding: (optional, by default text). Can be one of:
tierno1d213f42020-04-24 14:02:51 +00002452 'b64', 'base64', 'gz', 'gz+b64', 'gz+base64', 'gzip+b64', 'gzip+base64'
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002453 content : (mandatory) string with the content of the file
2454 permissions: (optional) string with file permissions, typically octal notation '0644'
2455 owner: (optional) file owner, string with the format 'owner:group'
2456 boot-data-drive: boolean to indicate if user-data must be passed using a boot drive (hard disk)
2457 disk_list: (optional) list with additional disks to the VM. Each item is a dict with:
2458 image_id: (optional). VIM id of an existing image. If not provided an empty disk must be mounted
2459 size: (mandatory) string with the size of the disk in GB
2460 vim_id: (optional) should use this existing volume id
2461 availability_zone_index: Index of availability_zone_list to use for this this VM. None if not AV required
2462 availability_zone_list: list of availability zones given by user in the VNFD descriptor. Ignore if
tierno5a3273c2017-08-29 11:43:46 +02002463 availability_zone_index is None
tierno7edb6752016-03-21 17:37:52 +01002464 #TODO ip, security groups
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002465
2466 Returns:
2467 A tuple with the instance identifier and created_items or raises an exception on error
tierno98e909c2017-10-14 13:27:03 +02002468 created_items can be None or a dictionary where this method can include key-values that will be passed to
2469 the method delete_vminstance and action_vminstance. Can be used to store created ports, volumes, etc.
2470 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
2471 as not present.
2472 """
sousaedu80135b92021-02-17 15:05:18 +01002473 self.logger.debug(
2474 "new_vminstance input: image='%s' flavor='%s' nics='%s'",
2475 image_id,
2476 flavor_id,
2477 str(net_list),
2478 )
2479
tierno7edb6752016-03-21 17:37:52 +01002480 try:
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002481 server = None
tierno98e909c2017-10-14 13:27:03 +02002482 created_items = {}
tierno98e909c2017-10-14 13:27:03 +02002483 net_list_vim = []
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002484 # list of external networks to be connected to instance, later on used to create floating_ip
tierno1ec592d2020-06-16 15:29:47 +00002485 external_network = []
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002486 # List of ports with port-security disabled
2487 no_secured_ports = []
tiernob84cbdc2017-07-07 14:30:30 +02002488 block_device_mapping = None
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002489 existing_vim_volumes = []
2490 server_group_id = None
2491 scheduller_hints = {}
tiernoa05b65a2019-02-01 12:30:27 +00002492
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002493 # Check the Openstack Connection
2494 self._reload_connection()
Pablo Montes Moreno3be0b2a2017-03-30 13:22:15 +02002495
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002496 # Prepare network list
2497 self._prepare_network_for_vminstance(
2498 name=name,
2499 net_list=net_list,
2500 created_items=created_items,
2501 net_list_vim=net_list_vim,
2502 external_network=external_network,
2503 no_secured_ports=no_secured_ports,
sousaedu80135b92021-02-17 15:05:18 +01002504 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002505
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002506 # Cloud config
tierno0a1437e2017-10-02 00:17:43 +02002507 config_drive, userdata = self._create_user_data(cloud_config)
montesmoreno0c8def02016-12-22 12:16:23 +00002508
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002509 # Get availability Zone
Alexis Romero247cc432022-05-12 13:23:25 +02002510 vm_av_zone = self._get_vm_availability_zone(
2511 availability_zone_index, availability_zone_list
2512 )
2513
tierno1df468d2018-07-06 14:25:16 +02002514 if disk_list:
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002515 # Prepare disks
2516 self._prepare_disk_for_vminstance(
2517 name=name,
2518 existing_vim_volumes=existing_vim_volumes,
2519 created_items=created_items,
2520 vm_av_zone=vm_av_zone,
2521 disk_list=disk_list,
2522 )
Alexis Romerob70f4ed2022-03-11 18:00:49 +01002523
2524 if affinity_group_list:
2525 # Only first id on the list will be used. Openstack restriction
2526 server_group_id = affinity_group_list[0]["affinity_group_id"]
2527 scheduller_hints["group"] = server_group_id
2528
sousaedu80135b92021-02-17 15:05:18 +01002529 self.logger.debug(
2530 "nova.servers.create({}, {}, {}, nics={}, security_groups={}, "
2531 "availability_zone={}, key_name={}, userdata={}, config_drive={}, "
Alexis Romerob70f4ed2022-03-11 18:00:49 +01002532 "block_device_mapping={}, server_group={})".format(
sousaedu80135b92021-02-17 15:05:18 +01002533 name,
2534 image_id,
2535 flavor_id,
2536 net_list_vim,
2537 self.config.get("security_groups"),
2538 vm_av_zone,
2539 self.config.get("keypair"),
2540 userdata,
2541 config_drive,
2542 block_device_mapping,
Alexis Romerob70f4ed2022-03-11 18:00:49 +01002543 server_group_id,
sousaedu80135b92021-02-17 15:05:18 +01002544 )
2545 )
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002546
2547 # Create VM
sousaedu80135b92021-02-17 15:05:18 +01002548 server = self.nova.servers.create(
aticigcf14bb12022-05-19 13:03:17 +03002549 name=name,
2550 image=image_id,
2551 flavor=flavor_id,
sousaedu80135b92021-02-17 15:05:18 +01002552 nics=net_list_vim,
2553 security_groups=self.config.get("security_groups"),
2554 # TODO remove security_groups in future versions. Already at neutron port
2555 availability_zone=vm_av_zone,
2556 key_name=self.config.get("keypair"),
2557 userdata=userdata,
2558 config_drive=config_drive,
2559 block_device_mapping=block_device_mapping,
Alexis Romerob70f4ed2022-03-11 18:00:49 +01002560 scheduler_hints=scheduller_hints,
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002561 )
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002562
tierno326fd5e2018-02-22 11:58:59 +01002563 vm_start_time = time.time()
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002564
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002565 self._update_port_security_for_vminstance(no_secured_ports, server)
bravof7a1f5252020-10-20 10:27:42 -03002566
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002567 self._prepare_external_network_for_vminstance(
2568 external_network=external_network,
2569 server=server,
2570 created_items=created_items,
2571 vm_start_time=vm_start_time,
2572 )
montesmoreno2a1fc4e2017-01-09 16:46:04 +00002573
tierno98e909c2017-10-14 13:27:03 +02002574 return server.id, created_items
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002575
2576 except Exception as e:
tierno98e909c2017-10-14 13:27:03 +02002577 server_id = None
2578 if server:
2579 server_id = server.id
sousaedu80135b92021-02-17 15:05:18 +01002580
tierno98e909c2017-10-14 13:27:03 +02002581 try:
2582 self.delete_vminstance(server_id, created_items)
Gulsum Atici4eaf1ad2022-10-27 15:18:27 +03002583
tierno98e909c2017-10-14 13:27:03 +02002584 except Exception as e2:
2585 self.logger.error("new_vminstance rollback fail {}".format(e2))
Pablo Montes Moreno6a7785b2017-07-03 10:44:30 +02002586
tiernoae4a8d12016-07-08 12:30:39 +02002587 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01002588
tierno1ec592d2020-06-16 15:29:47 +00002589 def get_vminstance(self, vm_id):
2590 """Returns the VM instance information from VIM"""
2591 # self.logger.debug("Getting VM from VIM")
tierno7edb6752016-03-21 17:37:52 +01002592 try:
2593 self._reload_connection()
2594 server = self.nova.servers.find(id=vm_id)
tierno1ec592d2020-06-16 15:29:47 +00002595 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
sousaedu80135b92021-02-17 15:05:18 +01002596
tiernoae4a8d12016-07-08 12:30:39 +02002597 return server.to_dict()
sousaedu80135b92021-02-17 15:05:18 +01002598 except (
2599 ksExceptions.ClientException,
2600 nvExceptions.ClientException,
2601 nvExceptions.NotFound,
2602 ConnectionError,
2603 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002604 self._format_exception(e)
2605
tierno1ec592d2020-06-16 15:29:47 +00002606 def get_vminstance_console(self, vm_id, console_type="vnc"):
2607 """
tierno7edb6752016-03-21 17:37:52 +01002608 Get a console for the virtual machine
2609 Params:
2610 vm_id: uuid of the VM
2611 console_type, can be:
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002612 "novnc" (by default), "xvpvnc" for VNC types,
tierno7edb6752016-03-21 17:37:52 +01002613 "rdp-html5" for RDP types, "spice-html5" for SPICE types
tiernoae4a8d12016-07-08 12:30:39 +02002614 Returns dict with the console parameters:
2615 protocol: ssh, ftp, http, https, ...
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002616 server: usually ip address
2617 port: the http, ssh, ... port
2618 suffix: extra text, e.g. the http path and query string
tierno1ec592d2020-06-16 15:29:47 +00002619 """
tiernoae4a8d12016-07-08 12:30:39 +02002620 self.logger.debug("Getting VM CONSOLE from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002621
tierno7edb6752016-03-21 17:37:52 +01002622 try:
2623 self._reload_connection()
2624 server = self.nova.servers.find(id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002625
tierno1ec592d2020-06-16 15:29:47 +00002626 if console_type is None or console_type == "novnc":
tierno7edb6752016-03-21 17:37:52 +01002627 console_dict = server.get_vnc_console("novnc")
2628 elif console_type == "xvpvnc":
2629 console_dict = server.get_vnc_console(console_type)
2630 elif console_type == "rdp-html5":
2631 console_dict = server.get_rdp_console(console_type)
2632 elif console_type == "spice-html5":
2633 console_dict = server.get_spice_console(console_type)
2634 else:
sousaedu80135b92021-02-17 15:05:18 +01002635 raise vimconn.VimConnException(
2636 "console type '{}' not allowed".format(console_type),
2637 http_code=vimconn.HTTP_Bad_Request,
2638 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002639
tierno7edb6752016-03-21 17:37:52 +01002640 console_dict1 = console_dict.get("console")
sousaedu80135b92021-02-17 15:05:18 +01002641
tierno7edb6752016-03-21 17:37:52 +01002642 if console_dict1:
2643 console_url = console_dict1.get("url")
sousaedu80135b92021-02-17 15:05:18 +01002644
tierno7edb6752016-03-21 17:37:52 +01002645 if console_url:
tierno1ec592d2020-06-16 15:29:47 +00002646 # parse console_url
tierno7edb6752016-03-21 17:37:52 +01002647 protocol_index = console_url.find("//")
sousaedu80135b92021-02-17 15:05:18 +01002648 suffix_index = (
2649 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2650 )
2651 port_index = (
2652 console_url[protocol_index + 2 : suffix_index].find(":")
2653 + protocol_index
2654 + 2
2655 )
2656
tierno1ec592d2020-06-16 15:29:47 +00002657 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
sousaedu80135b92021-02-17 15:05:18 +01002658 return (
2659 -vimconn.HTTP_Internal_Server_Error,
2660 "Unexpected response from VIM",
2661 )
2662
2663 console_dict = {
2664 "protocol": console_url[0:protocol_index],
2665 "server": console_url[protocol_index + 2 : port_index],
2666 "port": console_url[port_index:suffix_index],
2667 "suffix": console_url[suffix_index + 1 :],
2668 }
tierno7edb6752016-03-21 17:37:52 +01002669 protocol_index += 2
sousaedu80135b92021-02-17 15:05:18 +01002670
tiernoae4a8d12016-07-08 12:30:39 +02002671 return console_dict
tierno72774862020-05-04 11:44:15 +00002672 raise vimconn.VimConnUnexpectedResponse("Unexpected response from VIM")
sousaedu80135b92021-02-17 15:05:18 +01002673 except (
2674 nvExceptions.NotFound,
2675 ksExceptions.ClientException,
2676 nvExceptions.ClientException,
2677 nvExceptions.BadRequest,
2678 ConnectionError,
2679 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002680 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01002681
Gulsum Atici75f36542022-11-21 14:11:02 +03002682 def _delete_ports_by_id_wth_neutron(self, k_id: str) -> None:
2683 """Neutron delete ports by id.
2684 Args:
2685 k_id (str): Port id in the VIM
2686 """
2687 try:
2688 port_dict = self.neutron.list_ports()
2689 existing_ports = [port["id"] for port in port_dict["ports"] if port_dict]
2690
2691 if k_id in existing_ports:
2692 self.neutron.delete_port(k_id)
2693
2694 except Exception as e:
2695 self.logger.error("Error deleting port: {}: {}".format(type(e).__name__, e))
2696
2697 def _delete_volumes_by_id_wth_cinder(
2698 self, k: str, k_id: str, volumes_to_hold: list, created_items: dict
2699 ) -> bool:
2700 """Cinder delete volume by id.
2701 Args:
2702 k (str): Full item name in created_items
2703 k_id (str): ID of floating ip in VIM
2704 volumes_to_hold (list): Volumes not to delete
2705 created_items (dict): All created items belongs to VM
2706 """
2707 try:
2708 if k_id in volumes_to_hold:
2709 return
2710
2711 if self.cinder.volumes.get(k_id).status != "available":
2712 return True
2713
2714 else:
2715 self.cinder.volumes.delete(k_id)
2716 created_items[k] = None
2717
2718 except Exception as e:
2719 self.logger.error(
2720 "Error deleting volume: {}: {}".format(type(e).__name__, e)
2721 )
2722
2723 def _delete_floating_ip_by_id(self, k: str, k_id: str, created_items: dict) -> None:
2724 """Neutron delete floating ip by id.
2725 Args:
2726 k (str): Full item name in created_items
2727 k_id (str): ID of floating ip in VIM
2728 created_items (dict): All created items belongs to VM
2729 """
2730 try:
2731 self.neutron.delete_floatingip(k_id)
2732 created_items[k] = None
2733
2734 except Exception as e:
2735 self.logger.error(
2736 "Error deleting floating ip: {}: {}".format(type(e).__name__, e)
2737 )
2738
2739 @staticmethod
2740 def _get_item_name_id(k: str) -> Tuple[str, str]:
2741 k_item, _, k_id = k.partition(":")
2742 return k_item, k_id
2743
2744 def _delete_vm_ports_attached_to_network(self, created_items: dict) -> None:
2745 """Delete VM ports attached to the networks before deleting virtual machine.
2746 Args:
2747 created_items (dict): All created items belongs to VM
2748 """
2749
2750 for k, v in created_items.items():
2751 if not v: # skip already deleted
2752 continue
2753
2754 try:
2755 k_item, k_id = self._get_item_name_id(k)
2756 if k_item == "port":
2757 self._delete_ports_by_id_wth_neutron(k_id)
2758
2759 except Exception as e:
2760 self.logger.error(
2761 "Error deleting port: {}: {}".format(type(e).__name__, e)
2762 )
2763
2764 def _delete_created_items(
2765 self, created_items: dict, volumes_to_hold: list, keep_waiting: bool
2766 ) -> bool:
2767 """Delete Volumes and floating ip if they exist in created_items."""
2768 for k, v in created_items.items():
2769 if not v: # skip already deleted
2770 continue
2771
2772 try:
2773 k_item, k_id = self._get_item_name_id(k)
2774
2775 if k_item == "volume":
2776 unavailable_vol = self._delete_volumes_by_id_wth_cinder(
2777 k, k_id, volumes_to_hold, created_items
2778 )
2779
2780 if unavailable_vol:
2781 keep_waiting = True
2782
2783 elif k_item == "floating_ip":
2784 self._delete_floating_ip_by_id(k, k_id, created_items)
2785
2786 except Exception as e:
2787 self.logger.error("Error deleting {}: {}".format(k, e))
2788
2789 return keep_waiting
2790
2791 def delete_vminstance(
2792 self, vm_id: str, created_items: dict = None, volumes_to_hold: list = None
2793 ) -> None:
2794 """Removes a VM instance from VIM. Returns the old identifier.
2795 Args:
2796 vm_id (str): Identifier of VM instance
2797 created_items (dict): All created items belongs to VM
2798 volumes_to_hold (list): Volumes_to_hold
2799 """
tierno1ec592d2020-06-16 15:29:47 +00002800 if created_items is None:
tierno98e909c2017-10-14 13:27:03 +02002801 created_items = {}
Gulsum Atici75f36542022-11-21 14:11:02 +03002802 if volumes_to_hold is None:
2803 volumes_to_hold = []
sousaedu80135b92021-02-17 15:05:18 +01002804
tierno7edb6752016-03-21 17:37:52 +01002805 try:
2806 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01002807
Gulsum Atici75f36542022-11-21 14:11:02 +03002808 # Delete VM ports attached to the networks before the virtual machine
2809 if created_items:
2810 self._delete_vm_ports_attached_to_network(created_items)
montesmoreno0c8def02016-12-22 12:16:23 +00002811
tierno98e909c2017-10-14 13:27:03 +02002812 if vm_id:
2813 self.nova.servers.delete(vm_id)
montesmoreno0c8def02016-12-22 12:16:23 +00002814
Gulsum Atici75f36542022-11-21 14:11:02 +03002815 # Although having detached, volumes should have in active status before deleting.
2816 # We ensure in this loop
montesmoreno0c8def02016-12-22 12:16:23 +00002817 keep_waiting = True
2818 elapsed_time = 0
sousaedu80135b92021-02-17 15:05:18 +01002819
montesmoreno0c8def02016-12-22 12:16:23 +00002820 while keep_waiting and elapsed_time < volume_timeout:
2821 keep_waiting = False
sousaedu80135b92021-02-17 15:05:18 +01002822
Gulsum Atici75f36542022-11-21 14:11:02 +03002823 # Delete volumes and floating IP.
2824 keep_waiting = self._delete_created_items(
2825 created_items, volumes_to_hold, keep_waiting
2826 )
sousaedu80135b92021-02-17 15:05:18 +01002827
montesmoreno0c8def02016-12-22 12:16:23 +00002828 if keep_waiting:
2829 time.sleep(1)
2830 elapsed_time += 1
sousaedu80135b92021-02-17 15:05:18 +01002831
sousaedu80135b92021-02-17 15:05:18 +01002832 except (
2833 nvExceptions.NotFound,
2834 ksExceptions.ClientException,
2835 nvExceptions.ClientException,
2836 ConnectionError,
2837 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02002838 self._format_exception(e)
tierno7edb6752016-03-21 17:37:52 +01002839
tiernoae4a8d12016-07-08 12:30:39 +02002840 def refresh_vms_status(self, vm_list):
tierno1ec592d2020-06-16 15:29:47 +00002841 """Get the status of the virtual machines and their interfaces/ports
sousaedu80135b92021-02-17 15:05:18 +01002842 Params: the list of VM identifiers
2843 Returns a dictionary with:
2844 vm_id: #VIM id of this Virtual Machine
2845 status: #Mandatory. Text with one of:
2846 # DELETED (not found at vim)
2847 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
2848 # OTHER (Vim reported other status not understood)
2849 # ERROR (VIM indicates an ERROR status)
2850 # ACTIVE, PAUSED, SUSPENDED, INACTIVE (not running),
2851 # CREATING (on building process), ERROR
2852 # ACTIVE:NoMgmtIP (Active but any of its interface has an IP address
2853 #
2854 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
2855 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2856 interfaces:
2857 - vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2858 mac_address: #Text format XX:XX:XX:XX:XX:XX
2859 vim_net_id: #network id where this interface is connected
2860 vim_interface_id: #interface/port VIM id
2861 ip_address: #null, or text with IPv4, IPv6 address
2862 compute_node: #identification of compute node where PF,VF interface is allocated
2863 pci: #PCI address of the NIC that hosts the PF,VF
2864 vlan: #physical VLAN used for VF
tierno1ec592d2020-06-16 15:29:47 +00002865 """
2866 vm_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01002867 self.logger.debug(
2868 "refresh_vms status: Getting tenant VM instance information from VIM"
2869 )
2870
tiernoae4a8d12016-07-08 12:30:39 +02002871 for vm_id in vm_list:
tierno1ec592d2020-06-16 15:29:47 +00002872 vm = {}
sousaedu80135b92021-02-17 15:05:18 +01002873
tiernoae4a8d12016-07-08 12:30:39 +02002874 try:
2875 vm_vim = self.get_vminstance(vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002876
2877 if vm_vim["status"] in vmStatus2manoFormat:
2878 vm["status"] = vmStatus2manoFormat[vm_vim["status"]]
tierno7edb6752016-03-21 17:37:52 +01002879 else:
sousaedu80135b92021-02-17 15:05:18 +01002880 vm["status"] = "OTHER"
2881 vm["error_msg"] = "VIM status reported " + vm_vim["status"]
2882
tierno70eeb182020-10-19 16:38:00 +00002883 vm_vim.pop("OS-EXT-SRV-ATTR:user_data", None)
2884 vm_vim.pop("user_data", None)
sousaedu80135b92021-02-17 15:05:18 +01002885 vm["vim_info"] = self.serialize(vm_vim)
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002886
tiernoae4a8d12016-07-08 12:30:39 +02002887 vm["interfaces"] = []
sousaedu80135b92021-02-17 15:05:18 +01002888 if vm_vim.get("fault"):
2889 vm["error_msg"] = str(vm_vim["fault"])
2890
tierno1ec592d2020-06-16 15:29:47 +00002891 # get interfaces
tierno7edb6752016-03-21 17:37:52 +01002892 try:
tiernoae4a8d12016-07-08 12:30:39 +02002893 self._reload_connection()
tiernob42fd9b2018-06-20 10:44:32 +02002894 port_dict = self.neutron.list_ports(device_id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002895
tiernoae4a8d12016-07-08 12:30:39 +02002896 for port in port_dict["ports"]:
tierno1ec592d2020-06-16 15:29:47 +00002897 interface = {}
sousaedu80135b92021-02-17 15:05:18 +01002898 interface["vim_info"] = self.serialize(port)
tiernoae4a8d12016-07-08 12:30:39 +02002899 interface["mac_address"] = port.get("mac_address")
2900 interface["vim_net_id"] = port["network_id"]
2901 interface["vim_interface_id"] = port["id"]
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002902 # check if OS-EXT-SRV-ATTR:host is there,
Mike Marchetti5b9da422017-05-02 15:35:47 -04002903 # in case of non-admin credentials, it will be missing
sousaedu80135b92021-02-17 15:05:18 +01002904
2905 if vm_vim.get("OS-EXT-SRV-ATTR:host"):
2906 interface["compute_node"] = vm_vim["OS-EXT-SRV-ATTR:host"]
2907
tierno867ffe92017-03-27 12:50:34 +02002908 interface["pci"] = None
Mike Marchetti5b9da422017-05-02 15:35:47 -04002909
Anderson Bravalheri0446cd52018-08-17 15:26:19 +01002910 # check if binding:profile is there,
Mike Marchetti5b9da422017-05-02 15:35:47 -04002911 # in case of non-admin credentials, it will be missing
sousaedu80135b92021-02-17 15:05:18 +01002912 if port.get("binding:profile"):
2913 if port["binding:profile"].get("pci_slot"):
tierno1ec592d2020-06-16 15:29:47 +00002914 # TODO: At the moment sr-iov pci addresses are converted to PF pci addresses by setting
2915 # the slot to 0x00
Mike Marchetti5b9da422017-05-02 15:35:47 -04002916 # TODO: This is just a workaround valid for niantinc. Find a better way to do so
2917 # CHANGE DDDD:BB:SS.F to DDDD:BB:00.(F%2) assuming there are 2 ports per nic
sousaedu80135b92021-02-17 15:05:18 +01002918 pci = port["binding:profile"]["pci_slot"]
Mike Marchetti5b9da422017-05-02 15:35:47 -04002919 # interface["pci"] = pci[:-4] + "00." + str(int(pci[-1]) % 2)
2920 interface["pci"] = pci
sousaedu80135b92021-02-17 15:05:18 +01002921
tierno867ffe92017-03-27 12:50:34 +02002922 interface["vlan"] = None
sousaedu80135b92021-02-17 15:05:18 +01002923
2924 if port.get("binding:vif_details"):
2925 interface["vlan"] = port["binding:vif_details"].get("vlan")
2926
tierno1dfe9932020-06-18 08:50:10 +00002927 # Get vlan from network in case not present in port for those old openstacks and cases where
2928 # it is needed vlan at PT
2929 if not interface["vlan"]:
2930 # if network is of type vlan and port is of type direct (sr-iov) then set vlan id
2931 network = self.neutron.show_network(port["network_id"])
sousaedu80135b92021-02-17 15:05:18 +01002932
2933 if (
2934 network["network"].get("provider:network_type")
2935 == "vlan"
2936 ):
tierno1dfe9932020-06-18 08:50:10 +00002937 # and port.get("binding:vnic_type") in ("direct", "direct-physical"):
sousaedu80135b92021-02-17 15:05:18 +01002938 interface["vlan"] = network["network"].get(
2939 "provider:segmentation_id"
2940 )
2941
tierno1ec592d2020-06-16 15:29:47 +00002942 ips = []
2943 # look for floating ip address
tiernob42fd9b2018-06-20 10:44:32 +02002944 try:
sousaedu80135b92021-02-17 15:05:18 +01002945 floating_ip_dict = self.neutron.list_floatingips(
2946 port_id=port["id"]
2947 )
2948
tiernob42fd9b2018-06-20 10:44:32 +02002949 if floating_ip_dict.get("floatingips"):
sousaedu80135b92021-02-17 15:05:18 +01002950 ips.append(
2951 floating_ip_dict["floatingips"][0].get(
2952 "floating_ip_address"
2953 )
2954 )
tiernob42fd9b2018-06-20 10:44:32 +02002955 except Exception:
2956 pass
tierno7edb6752016-03-21 17:37:52 +01002957
tiernoae4a8d12016-07-08 12:30:39 +02002958 for subnet in port["fixed_ips"]:
2959 ips.append(subnet["ip_address"])
sousaedu80135b92021-02-17 15:05:18 +01002960
tiernoae4a8d12016-07-08 12:30:39 +02002961 interface["ip_address"] = ";".join(ips)
2962 vm["interfaces"].append(interface)
2963 except Exception as e:
sousaedu80135b92021-02-17 15:05:18 +01002964 self.logger.error(
2965 "Error getting vm interface information {}: {}".format(
2966 type(e).__name__, e
2967 ),
2968 exc_info=True,
2969 )
tierno72774862020-05-04 11:44:15 +00002970 except vimconn.VimConnNotFoundException as e:
tiernoae4a8d12016-07-08 12:30:39 +02002971 self.logger.error("Exception getting vm status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01002972 vm["status"] = "DELETED"
2973 vm["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00002974 except vimconn.VimConnException as e:
tiernoae4a8d12016-07-08 12:30:39 +02002975 self.logger.error("Exception getting vm status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01002976 vm["status"] = "VIM_ERROR"
2977 vm["error_msg"] = str(e)
2978
tiernoae4a8d12016-07-08 12:30:39 +02002979 vm_dict[vm_id] = vm
sousaedu80135b92021-02-17 15:05:18 +01002980
tiernoae4a8d12016-07-08 12:30:39 +02002981 return vm_dict
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00002982
tierno98e909c2017-10-14 13:27:03 +02002983 def action_vminstance(self, vm_id, action_dict, created_items={}):
tierno1ec592d2020-06-16 15:29:47 +00002984 """Send and action over a VM instance from VIM
Gulsum Aticibb0b7b92023-02-13 21:45:08 +03002985 Returns None or the console dict if the action was successfully sent to the VIM
2986 """
tiernoae4a8d12016-07-08 12:30:39 +02002987 self.logger.debug("Action over VM '%s': %s", vm_id, str(action_dict))
sousaedu80135b92021-02-17 15:05:18 +01002988
tierno7edb6752016-03-21 17:37:52 +01002989 try:
2990 self._reload_connection()
2991 server = self.nova.servers.find(id=vm_id)
sousaedu80135b92021-02-17 15:05:18 +01002992
tierno7edb6752016-03-21 17:37:52 +01002993 if "start" in action_dict:
tierno1ec592d2020-06-16 15:29:47 +00002994 if action_dict["start"] == "rebuild":
tierno7edb6752016-03-21 17:37:52 +01002995 server.rebuild()
2996 else:
tierno1ec592d2020-06-16 15:29:47 +00002997 if server.status == "PAUSED":
tierno7edb6752016-03-21 17:37:52 +01002998 server.unpause()
tierno1ec592d2020-06-16 15:29:47 +00002999 elif server.status == "SUSPENDED":
tierno7edb6752016-03-21 17:37:52 +01003000 server.resume()
tierno1ec592d2020-06-16 15:29:47 +00003001 elif server.status == "SHUTOFF":
tierno7edb6752016-03-21 17:37:52 +01003002 server.start()
k4.rahul78f474e2022-05-02 15:47:57 +00003003 else:
3004 self.logger.debug(
3005 "ERROR : Instance is not in SHUTOFF/PAUSE/SUSPEND state"
3006 )
3007 raise vimconn.VimConnException(
3008 "Cannot 'start' instance while it is in active state",
3009 http_code=vimconn.HTTP_Bad_Request,
3010 )
3011
tierno7edb6752016-03-21 17:37:52 +01003012 elif "pause" in action_dict:
3013 server.pause()
3014 elif "resume" in action_dict:
3015 server.resume()
3016 elif "shutoff" in action_dict or "shutdown" in action_dict:
k4.rahul78f474e2022-05-02 15:47:57 +00003017 self.logger.debug("server status %s", server.status)
3018 if server.status == "ACTIVE":
3019 server.stop()
3020 else:
3021 self.logger.debug("ERROR: VM is not in Active state")
3022 raise vimconn.VimConnException(
3023 "VM is not in active state, stop operation is not allowed",
3024 http_code=vimconn.HTTP_Bad_Request,
3025 )
tierno7edb6752016-03-21 17:37:52 +01003026 elif "forceOff" in action_dict:
tierno1ec592d2020-06-16 15:29:47 +00003027 server.stop() # TODO
tierno7edb6752016-03-21 17:37:52 +01003028 elif "terminate" in action_dict:
3029 server.delete()
3030 elif "createImage" in action_dict:
3031 server.create_image()
tierno1ec592d2020-06-16 15:29:47 +00003032 # "path":path_schema,
3033 # "description":description_schema,
3034 # "name":name_schema,
3035 # "metadata":metadata_schema,
3036 # "imageRef": id_schema,
3037 # "disk": {"oneOf":[{"type": "null"}, {"type":"string"}] },
tierno7edb6752016-03-21 17:37:52 +01003038 elif "rebuild" in action_dict:
sousaedu80135b92021-02-17 15:05:18 +01003039 server.rebuild(server.image["id"])
tierno7edb6752016-03-21 17:37:52 +01003040 elif "reboot" in action_dict:
sousaedu80135b92021-02-17 15:05:18 +01003041 server.reboot() # reboot_type="SOFT"
tierno7edb6752016-03-21 17:37:52 +01003042 elif "console" in action_dict:
3043 console_type = action_dict["console"]
sousaedu80135b92021-02-17 15:05:18 +01003044
tierno1ec592d2020-06-16 15:29:47 +00003045 if console_type is None or console_type == "novnc":
tierno7edb6752016-03-21 17:37:52 +01003046 console_dict = server.get_vnc_console("novnc")
3047 elif console_type == "xvpvnc":
3048 console_dict = server.get_vnc_console(console_type)
3049 elif console_type == "rdp-html5":
3050 console_dict = server.get_rdp_console(console_type)
3051 elif console_type == "spice-html5":
3052 console_dict = server.get_spice_console(console_type)
3053 else:
sousaedu80135b92021-02-17 15:05:18 +01003054 raise vimconn.VimConnException(
3055 "console type '{}' not allowed".format(console_type),
3056 http_code=vimconn.HTTP_Bad_Request,
3057 )
3058
tierno7edb6752016-03-21 17:37:52 +01003059 try:
3060 console_url = console_dict["console"]["url"]
tierno1ec592d2020-06-16 15:29:47 +00003061 # parse console_url
tierno7edb6752016-03-21 17:37:52 +01003062 protocol_index = console_url.find("//")
sousaedu80135b92021-02-17 15:05:18 +01003063 suffix_index = (
3064 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
3065 )
3066 port_index = (
3067 console_url[protocol_index + 2 : suffix_index].find(":")
3068 + protocol_index
3069 + 2
3070 )
3071
tierno1ec592d2020-06-16 15:29:47 +00003072 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
sousaedu80135b92021-02-17 15:05:18 +01003073 raise vimconn.VimConnException(
3074 "Unexpected response from VIM " + str(console_dict)
3075 )
3076
3077 console_dict2 = {
3078 "protocol": console_url[0:protocol_index],
3079 "server": console_url[protocol_index + 2 : port_index],
3080 "port": int(console_url[port_index + 1 : suffix_index]),
3081 "suffix": console_url[suffix_index + 1 :],
3082 }
3083
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003084 return console_dict2
tierno1ec592d2020-06-16 15:29:47 +00003085 except Exception:
sousaedu80135b92021-02-17 15:05:18 +01003086 raise vimconn.VimConnException(
3087 "Unexpected response from VIM " + str(console_dict)
3088 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003089
tierno98e909c2017-10-14 13:27:03 +02003090 return None
sousaedu80135b92021-02-17 15:05:18 +01003091 except (
3092 ksExceptions.ClientException,
3093 nvExceptions.ClientException,
3094 nvExceptions.NotFound,
3095 ConnectionError,
3096 ) as e:
tiernoae4a8d12016-07-08 12:30:39 +02003097 self._format_exception(e)
tierno1ec592d2020-06-16 15:29:47 +00003098 # TODO insert exception vimconn.HTTP_Unauthorized
tiernoae4a8d12016-07-08 12:30:39 +02003099
tierno1ec592d2020-06-16 15:29:47 +00003100 # ###### VIO Specific Changes #########
garciadeblasebd66722019-01-31 16:01:31 +00003101 def _generate_vlanID(self):
kate721d79b2017-06-24 04:21:38 -07003102 """
sousaedu80135b92021-02-17 15:05:18 +01003103 Method to get unused vlanID
kate721d79b2017-06-24 04:21:38 -07003104 Args:
3105 None
3106 Returns:
3107 vlanID
3108 """
tierno1ec592d2020-06-16 15:29:47 +00003109 # Get used VLAN IDs
kate721d79b2017-06-24 04:21:38 -07003110 usedVlanIDs = []
3111 networks = self.get_network_list()
sousaedu80135b92021-02-17 15:05:18 +01003112
kate721d79b2017-06-24 04:21:38 -07003113 for net in networks:
sousaedu80135b92021-02-17 15:05:18 +01003114 if net.get("provider:segmentation_id"):
3115 usedVlanIDs.append(net.get("provider:segmentation_id"))
3116
kate721d79b2017-06-24 04:21:38 -07003117 used_vlanIDs = set(usedVlanIDs)
3118
tierno1ec592d2020-06-16 15:29:47 +00003119 # find unused VLAN ID
sousaedu80135b92021-02-17 15:05:18 +01003120 for vlanID_range in self.config.get("dataplane_net_vlan_range"):
kate721d79b2017-06-24 04:21:38 -07003121 try:
sousaedu80135b92021-02-17 15:05:18 +01003122 start_vlanid, end_vlanid = map(
3123 int, vlanID_range.replace(" ", "").split("-")
3124 )
3125
tierno7d782ef2019-10-04 12:56:31 +00003126 for vlanID in range(start_vlanid, end_vlanid + 1):
kate721d79b2017-06-24 04:21:38 -07003127 if vlanID not in used_vlanIDs:
3128 return vlanID
3129 except Exception as exp:
sousaedu80135b92021-02-17 15:05:18 +01003130 raise vimconn.VimConnException(
3131 "Exception {} occurred while generating VLAN ID.".format(exp)
3132 )
kate721d79b2017-06-24 04:21:38 -07003133 else:
tierno1ec592d2020-06-16 15:29:47 +00003134 raise vimconn.VimConnConflictException(
3135 "Unable to create the SRIOV VLAN network. All given Vlan IDs {} are in use.".format(
sousaedu80135b92021-02-17 15:05:18 +01003136 self.config.get("dataplane_net_vlan_range")
3137 )
3138 )
kate721d79b2017-06-24 04:21:38 -07003139
garciadeblasebd66722019-01-31 16:01:31 +00003140 def _generate_multisegment_vlanID(self):
3141 """
sousaedu80135b92021-02-17 15:05:18 +01003142 Method to get unused vlanID
3143 Args:
3144 None
3145 Returns:
3146 vlanID
garciadeblasebd66722019-01-31 16:01:31 +00003147 """
tierno6869ae72020-01-09 17:37:34 +00003148 # Get used VLAN IDs
garciadeblasebd66722019-01-31 16:01:31 +00003149 usedVlanIDs = []
3150 networks = self.get_network_list()
3151 for net in networks:
sousaedu80135b92021-02-17 15:05:18 +01003152 if net.get("provider:network_type") == "vlan" and net.get(
3153 "provider:segmentation_id"
3154 ):
3155 usedVlanIDs.append(net.get("provider:segmentation_id"))
3156 elif net.get("segments"):
3157 for segment in net.get("segments"):
3158 if segment.get("provider:network_type") == "vlan" and segment.get(
3159 "provider:segmentation_id"
3160 ):
3161 usedVlanIDs.append(segment.get("provider:segmentation_id"))
3162
garciadeblasebd66722019-01-31 16:01:31 +00003163 used_vlanIDs = set(usedVlanIDs)
3164
tierno6869ae72020-01-09 17:37:34 +00003165 # find unused VLAN ID
sousaedu80135b92021-02-17 15:05:18 +01003166 for vlanID_range in self.config.get("multisegment_vlan_range"):
garciadeblasebd66722019-01-31 16:01:31 +00003167 try:
sousaedu80135b92021-02-17 15:05:18 +01003168 start_vlanid, end_vlanid = map(
3169 int, vlanID_range.replace(" ", "").split("-")
3170 )
3171
tierno7d782ef2019-10-04 12:56:31 +00003172 for vlanID in range(start_vlanid, end_vlanid + 1):
garciadeblasebd66722019-01-31 16:01:31 +00003173 if vlanID not in used_vlanIDs:
3174 return vlanID
3175 except Exception as exp:
sousaedu80135b92021-02-17 15:05:18 +01003176 raise vimconn.VimConnException(
3177 "Exception {} occurred while generating VLAN ID.".format(exp)
3178 )
garciadeblasebd66722019-01-31 16:01:31 +00003179 else:
tierno1ec592d2020-06-16 15:29:47 +00003180 raise vimconn.VimConnConflictException(
3181 "Unable to create the VLAN segment. All VLAN IDs {} are in use.".format(
sousaedu80135b92021-02-17 15:05:18 +01003182 self.config.get("multisegment_vlan_range")
3183 )
3184 )
garciadeblasebd66722019-01-31 16:01:31 +00003185
3186 def _validate_vlan_ranges(self, input_vlan_range, text_vlan_range):
kate721d79b2017-06-24 04:21:38 -07003187 """
3188 Method to validate user given vlanID ranges
3189 Args: None
3190 Returns: None
3191 """
garciadeblasebd66722019-01-31 16:01:31 +00003192 for vlanID_range in input_vlan_range:
kate721d79b2017-06-24 04:21:38 -07003193 vlan_range = vlanID_range.replace(" ", "")
tierno1ec592d2020-06-16 15:29:47 +00003194 # validate format
sousaedu80135b92021-02-17 15:05:18 +01003195 vlanID_pattern = r"(\d)*-(\d)*$"
kate721d79b2017-06-24 04:21:38 -07003196 match_obj = re.match(vlanID_pattern, vlan_range)
3197 if not match_obj:
tierno1ec592d2020-06-16 15:29:47 +00003198 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003199 "Invalid VLAN range for {}: {}.You must provide "
3200 "'{}' in format [start_ID - end_ID].".format(
3201 text_vlan_range, vlanID_range, text_vlan_range
3202 )
3203 )
kate721d79b2017-06-24 04:21:38 -07003204
tierno1ec592d2020-06-16 15:29:47 +00003205 start_vlanid, end_vlanid = map(int, vlan_range.split("-"))
3206 if start_vlanid <= 0:
3207 raise vimconn.VimConnConflictException(
3208 "Invalid VLAN range for {}: {}. Start ID can not be zero. For VLAN "
sousaedu80135b92021-02-17 15:05:18 +01003209 "networks valid IDs are 1 to 4094 ".format(
3210 text_vlan_range, vlanID_range
3211 )
3212 )
3213
tierno1ec592d2020-06-16 15:29:47 +00003214 if end_vlanid > 4094:
3215 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003216 "Invalid VLAN range for {}: {}. End VLAN ID can not be "
3217 "greater than 4094. For VLAN networks valid IDs are 1 to 4094 ".format(
3218 text_vlan_range, vlanID_range
3219 )
3220 )
kate721d79b2017-06-24 04:21:38 -07003221
3222 if start_vlanid > end_vlanid:
tierno1ec592d2020-06-16 15:29:47 +00003223 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003224 "Invalid VLAN range for {}: {}. You must provide '{}'"
3225 " in format start_ID - end_ID and start_ID < end_ID ".format(
3226 text_vlan_range, vlanID_range, text_vlan_range
3227 )
3228 )
kate721d79b2017-06-24 04:21:38 -07003229
tierno1ec592d2020-06-16 15:29:47 +00003230 # NOT USED FUNCTIONS
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003231
tiernoae4a8d12016-07-08 12:30:39 +02003232 def new_external_port(self, port_data):
tierno1ec592d2020-06-16 15:29:47 +00003233 """Adds a external port to VIM
sousaedu80135b92021-02-17 15:05:18 +01003234 Returns the port identifier"""
tierno1ec592d2020-06-16 15:29:47 +00003235 # TODO openstack if needed
sousaedu80135b92021-02-17 15:05:18 +01003236 return (
3237 -vimconn.HTTP_Internal_Server_Error,
3238 "osconnector.new_external_port() not implemented",
3239 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003240
tiernoae4a8d12016-07-08 12:30:39 +02003241 def connect_port_network(self, port_id, network_id, admin=False):
tierno1ec592d2020-06-16 15:29:47 +00003242 """Connects a external port to a network
sousaedu80135b92021-02-17 15:05:18 +01003243 Returns status code of the VIM response"""
tierno1ec592d2020-06-16 15:29:47 +00003244 # TODO openstack if needed
sousaedu80135b92021-02-17 15:05:18 +01003245 return (
3246 -vimconn.HTTP_Internal_Server_Error,
3247 "osconnector.connect_port_network() not implemented",
3248 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003249
tiernoae4a8d12016-07-08 12:30:39 +02003250 def new_user(self, user_name, user_passwd, tenant_id=None):
tierno1ec592d2020-06-16 15:29:47 +00003251 """Adds a new user to openstack VIM
sousaedu80135b92021-02-17 15:05:18 +01003252 Returns the user identifier"""
tiernoae4a8d12016-07-08 12:30:39 +02003253 self.logger.debug("osconnector: Adding a new user to VIM")
sousaedu80135b92021-02-17 15:05:18 +01003254
tiernoae4a8d12016-07-08 12:30:39 +02003255 try:
3256 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01003257 user = self.keystone.users.create(
3258 user_name, password=user_passwd, default_project=tenant_id
3259 )
tierno1ec592d2020-06-16 15:29:47 +00003260 # self.keystone.tenants.add_user(self.k_creds["username"], #role)
sousaedu80135b92021-02-17 15:05:18 +01003261
tiernoae4a8d12016-07-08 12:30:39 +02003262 return user.id
3263 except ksExceptions.ConnectionError as e:
tierno1ec592d2020-06-16 15:29:47 +00003264 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01003265 error_text = (
3266 type(e).__name__
3267 + ": "
3268 + (str(e) if len(e.args) == 0 else str(e.args[0]))
3269 )
tierno1ec592d2020-06-16 15:29:47 +00003270 except ksExceptions.ClientException as e: # TODO remove
3271 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01003272 error_text = (
3273 type(e).__name__
3274 + ": "
3275 + (str(e) if len(e.args) == 0 else str(e.args[0]))
3276 )
3277
tierno1ec592d2020-06-16 15:29:47 +00003278 # TODO insert exception vimconn.HTTP_Unauthorized
3279 # if reaching here is because an exception
tierno9c5c8322018-03-23 15:44:03 +01003280 self.logger.debug("new_user " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01003281
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003282 return error_value, error_text
tiernoae4a8d12016-07-08 12:30:39 +02003283
3284 def delete_user(self, user_id):
tierno1ec592d2020-06-16 15:29:47 +00003285 """Delete a user from openstack VIM
sousaedu80135b92021-02-17 15:05:18 +01003286 Returns the user identifier"""
tiernoae4a8d12016-07-08 12:30:39 +02003287 if self.debug:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003288 print("osconnector: Deleting a user from VIM")
sousaedu80135b92021-02-17 15:05:18 +01003289
tiernoae4a8d12016-07-08 12:30:39 +02003290 try:
3291 self._reload_connection()
3292 self.keystone.users.delete(user_id)
sousaedu80135b92021-02-17 15:05:18 +01003293
tiernoae4a8d12016-07-08 12:30:39 +02003294 return 1, user_id
3295 except ksExceptions.ConnectionError as e:
tierno1ec592d2020-06-16 15:29:47 +00003296 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01003297 error_text = (
3298 type(e).__name__
3299 + ": "
3300 + (str(e) if len(e.args) == 0 else str(e.args[0]))
3301 )
tiernoae4a8d12016-07-08 12:30:39 +02003302 except ksExceptions.NotFound as e:
tierno1ec592d2020-06-16 15:29:47 +00003303 error_value = -vimconn.HTTP_Not_Found
sousaedu80135b92021-02-17 15:05:18 +01003304 error_text = (
3305 type(e).__name__
3306 + ": "
3307 + (str(e) if len(e.args) == 0 else str(e.args[0]))
3308 )
tierno1ec592d2020-06-16 15:29:47 +00003309 except ksExceptions.ClientException as e: # TODO remove
3310 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01003311 error_text = (
3312 type(e).__name__
3313 + ": "
3314 + (str(e) if len(e.args) == 0 else str(e.args[0]))
3315 )
3316
tierno1ec592d2020-06-16 15:29:47 +00003317 # TODO insert exception vimconn.HTTP_Unauthorized
3318 # if reaching here is because an exception
3319 self.logger.debug("delete_tenant " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01003320
tiernoae4a8d12016-07-08 12:30:39 +02003321 return error_value, error_text
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003322
tierno7edb6752016-03-21 17:37:52 +01003323 def get_hosts_info(self):
tierno1ec592d2020-06-16 15:29:47 +00003324 """Get the information of deployed hosts
3325 Returns the hosts content"""
tierno7edb6752016-03-21 17:37:52 +01003326 if self.debug:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003327 print("osconnector: Getting Host info from VIM")
sousaedu80135b92021-02-17 15:05:18 +01003328
tierno7edb6752016-03-21 17:37:52 +01003329 try:
tierno1ec592d2020-06-16 15:29:47 +00003330 h_list = []
tierno7edb6752016-03-21 17:37:52 +01003331 self._reload_connection()
3332 hypervisors = self.nova.hypervisors.list()
sousaedu80135b92021-02-17 15:05:18 +01003333
tierno7edb6752016-03-21 17:37:52 +01003334 for hype in hypervisors:
tierno1ec592d2020-06-16 15:29:47 +00003335 h_list.append(hype.to_dict())
sousaedu80135b92021-02-17 15:05:18 +01003336
tierno1ec592d2020-06-16 15:29:47 +00003337 return 1, {"hosts": h_list}
tierno7edb6752016-03-21 17:37:52 +01003338 except nvExceptions.NotFound as e:
tierno1ec592d2020-06-16 15:29:47 +00003339 error_value = -vimconn.HTTP_Not_Found
sousaedu80135b92021-02-17 15:05:18 +01003340 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
tierno7edb6752016-03-21 17:37:52 +01003341 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
tierno1ec592d2020-06-16 15:29:47 +00003342 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01003343 error_text = (
3344 type(e).__name__
3345 + ": "
3346 + (str(e) if len(e.args) == 0 else str(e.args[0]))
3347 )
3348
tierno1ec592d2020-06-16 15:29:47 +00003349 # TODO insert exception vimconn.HTTP_Unauthorized
3350 # if reaching here is because an exception
tierno9c5c8322018-03-23 15:44:03 +01003351 self.logger.debug("get_hosts_info " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01003352
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003353 return error_value, error_text
tierno7edb6752016-03-21 17:37:52 +01003354
3355 def get_hosts(self, vim_tenant):
tierno1ec592d2020-06-16 15:29:47 +00003356 """Get the hosts and deployed instances
3357 Returns the hosts content"""
tierno7edb6752016-03-21 17:37:52 +01003358 r, hype_dict = self.get_hosts_info()
sousaedu80135b92021-02-17 15:05:18 +01003359
tierno1ec592d2020-06-16 15:29:47 +00003360 if r < 0:
tierno7edb6752016-03-21 17:37:52 +01003361 return r, hype_dict
sousaedu80135b92021-02-17 15:05:18 +01003362
tierno7edb6752016-03-21 17:37:52 +01003363 hypervisors = hype_dict["hosts"]
sousaedu80135b92021-02-17 15:05:18 +01003364
tierno7edb6752016-03-21 17:37:52 +01003365 try:
3366 servers = self.nova.servers.list()
3367 for hype in hypervisors:
3368 for server in servers:
sousaedu80135b92021-02-17 15:05:18 +01003369 if (
3370 server.to_dict()["OS-EXT-SRV-ATTR:hypervisor_hostname"]
3371 == hype["hypervisor_hostname"]
3372 ):
3373 if "vm" in hype:
3374 hype["vm"].append(server.id)
tierno7edb6752016-03-21 17:37:52 +01003375 else:
sousaedu80135b92021-02-17 15:05:18 +01003376 hype["vm"] = [server.id]
3377
tierno7edb6752016-03-21 17:37:52 +01003378 return 1, hype_dict
3379 except nvExceptions.NotFound as e:
tierno1ec592d2020-06-16 15:29:47 +00003380 error_value = -vimconn.HTTP_Not_Found
sousaedu80135b92021-02-17 15:05:18 +01003381 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
tierno7edb6752016-03-21 17:37:52 +01003382 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
tierno1ec592d2020-06-16 15:29:47 +00003383 error_value = -vimconn.HTTP_Bad_Request
sousaedu80135b92021-02-17 15:05:18 +01003384 error_text = (
3385 type(e).__name__
3386 + ": "
3387 + (str(e) if len(e.args) == 0 else str(e.args[0]))
3388 )
3389
tierno1ec592d2020-06-16 15:29:47 +00003390 # TODO insert exception vimconn.HTTP_Unauthorized
3391 # if reaching here is because an exception
tierno9c5c8322018-03-23 15:44:03 +01003392 self.logger.debug("get_hosts " + error_text)
sousaedu80135b92021-02-17 15:05:18 +01003393
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003394 return error_value, error_text
tierno7edb6752016-03-21 17:37:52 +01003395
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003396 def new_classification(self, name, ctype, definition):
sousaedu80135b92021-02-17 15:05:18 +01003397 self.logger.debug(
3398 "Adding a new (Traffic) Classification to VIM, named %s", name
3399 )
3400
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003401 try:
3402 new_class = None
3403 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01003404
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003405 if ctype not in supportedClassificationTypes:
tierno72774862020-05-04 11:44:15 +00003406 raise vimconn.VimConnNotSupportedException(
sousaedu80135b92021-02-17 15:05:18 +01003407 "OpenStack VIM connector does not support provided "
3408 "Classification Type {}, supported ones are: {}".format(
3409 ctype, supportedClassificationTypes
3410 )
3411 )
3412
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003413 if not self._validate_classification(ctype, definition):
tierno72774862020-05-04 11:44:15 +00003414 raise vimconn.VimConnException(
sousaedu80135b92021-02-17 15:05:18 +01003415 "Incorrect Classification definition for the type specified."
3416 )
tierno7edb6752016-03-21 17:37:52 +01003417
sousaedu80135b92021-02-17 15:05:18 +01003418 classification_dict = definition
3419 classification_dict["name"] = name
Igor D.Ccaadc442017-11-06 12:48:48 +00003420 new_class = self.neutron.create_sfc_flow_classifier(
sousaedu80135b92021-02-17 15:05:18 +01003421 {"flow_classifier": classification_dict}
3422 )
3423
3424 return new_class["flow_classifier"]["id"]
3425 except (
3426 neExceptions.ConnectionFailed,
3427 ksExceptions.ClientException,
3428 neExceptions.NeutronException,
3429 ConnectionError,
3430 ) as e:
3431 self.logger.error("Creation of Classification failed.")
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003432 self._format_exception(e)
3433
3434 def get_classification(self, class_id):
3435 self.logger.debug(" Getting Classification %s from VIM", class_id)
3436 filter_dict = {"id": class_id}
3437 class_list = self.get_classification_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01003438
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003439 if len(class_list) == 0:
tierno72774862020-05-04 11:44:15 +00003440 raise vimconn.VimConnNotFoundException(
sousaedu80135b92021-02-17 15:05:18 +01003441 "Classification '{}' not found".format(class_id)
3442 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003443 elif len(class_list) > 1:
tierno72774862020-05-04 11:44:15 +00003444 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003445 "Found more than one Classification with this criteria"
3446 )
3447
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003448 classification = class_list[0]
sousaedu80135b92021-02-17 15:05:18 +01003449
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003450 return classification
3451
3452 def get_classification_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01003453 self.logger.debug(
3454 "Getting Classifications from VIM filter: '%s'", str(filter_dict)
3455 )
3456
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003457 try:
tierno69b590e2018-03-13 18:52:23 +01003458 filter_dict_os = filter_dict.copy()
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003459 self._reload_connection()
sousaedu80135b92021-02-17 15:05:18 +01003460
tierno69b590e2018-03-13 18:52:23 +01003461 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01003462 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3463
Igor D.Ccaadc442017-11-06 12:48:48 +00003464 classification_dict = self.neutron.list_sfc_flow_classifiers(
sousaedu80135b92021-02-17 15:05:18 +01003465 **filter_dict_os
3466 )
tierno69b590e2018-03-13 18:52:23 +01003467 classification_list = classification_dict["flow_classifiers"]
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003468 self.__classification_os2mano(classification_list)
sousaedu80135b92021-02-17 15:05:18 +01003469
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003470 return classification_list
sousaedu80135b92021-02-17 15:05:18 +01003471 except (
3472 neExceptions.ConnectionFailed,
3473 ksExceptions.ClientException,
3474 neExceptions.NeutronException,
3475 ConnectionError,
3476 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003477 self._format_exception(e)
3478
3479 def delete_classification(self, class_id):
3480 self.logger.debug("Deleting Classification '%s' from VIM", class_id)
sousaedu80135b92021-02-17 15:05:18 +01003481
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003482 try:
3483 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003484 self.neutron.delete_sfc_flow_classifier(class_id)
sousaedu80135b92021-02-17 15:05:18 +01003485
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003486 return class_id
sousaedu80135b92021-02-17 15:05:18 +01003487 except (
3488 neExceptions.ConnectionFailed,
3489 neExceptions.NeutronException,
3490 ksExceptions.ClientException,
3491 neExceptions.NeutronException,
3492 ConnectionError,
3493 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003494 self._format_exception(e)
3495
3496 def new_sfi(self, name, ingress_ports, egress_ports, sfc_encap=True):
sousaedu80135b92021-02-17 15:05:18 +01003497 self.logger.debug(
3498 "Adding a new Service Function Instance to VIM, named '%s'", name
3499 )
3500
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003501 try:
3502 new_sfi = None
3503 self._reload_connection()
3504 correlation = None
sousaedu80135b92021-02-17 15:05:18 +01003505
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003506 if sfc_encap:
sousaedu80135b92021-02-17 15:05:18 +01003507 correlation = "nsh"
3508
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003509 if len(ingress_ports) != 1:
tierno72774862020-05-04 11:44:15 +00003510 raise vimconn.VimConnNotSupportedException(
sousaedu80135b92021-02-17 15:05:18 +01003511 "OpenStack VIM connector can only have 1 ingress port per SFI"
3512 )
3513
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003514 if len(egress_ports) != 1:
tierno72774862020-05-04 11:44:15 +00003515 raise vimconn.VimConnNotSupportedException(
sousaedu80135b92021-02-17 15:05:18 +01003516 "OpenStack VIM connector can only have 1 egress port per SFI"
3517 )
3518
3519 sfi_dict = {
3520 "name": name,
3521 "ingress": ingress_ports[0],
3522 "egress": egress_ports[0],
3523 "service_function_parameters": {"correlation": correlation},
3524 }
3525 new_sfi = self.neutron.create_sfc_port_pair({"port_pair": sfi_dict})
3526
3527 return new_sfi["port_pair"]["id"]
3528 except (
3529 neExceptions.ConnectionFailed,
3530 ksExceptions.ClientException,
3531 neExceptions.NeutronException,
3532 ConnectionError,
3533 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003534 if new_sfi:
3535 try:
sousaedu80135b92021-02-17 15:05:18 +01003536 self.neutron.delete_sfc_port_pair(new_sfi["port_pair"]["id"])
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003537 except Exception:
3538 self.logger.error(
sousaedu80135b92021-02-17 15:05:18 +01003539 "Creation of Service Function Instance failed, with "
3540 "subsequent deletion failure as well."
3541 )
3542
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003543 self._format_exception(e)
3544
3545 def get_sfi(self, sfi_id):
sousaedu80135b92021-02-17 15:05:18 +01003546 self.logger.debug("Getting Service Function Instance %s from VIM", sfi_id)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003547 filter_dict = {"id": sfi_id}
3548 sfi_list = self.get_sfi_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01003549
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003550 if len(sfi_list) == 0:
sousaedu80135b92021-02-17 15:05:18 +01003551 raise vimconn.VimConnNotFoundException(
3552 "Service Function Instance '{}' not found".format(sfi_id)
3553 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003554 elif len(sfi_list) > 1:
tierno72774862020-05-04 11:44:15 +00003555 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003556 "Found more than one Service Function Instance with this criteria"
3557 )
3558
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003559 sfi = sfi_list[0]
sousaedu80135b92021-02-17 15:05:18 +01003560
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003561 return sfi
3562
3563 def get_sfi_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01003564 self.logger.debug(
3565 "Getting Service Function Instances from VIM filter: '%s'", str(filter_dict)
3566 )
3567
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003568 try:
3569 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +01003570 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +01003571
tierno69b590e2018-03-13 18:52:23 +01003572 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01003573 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3574
tierno69b590e2018-03-13 18:52:23 +01003575 sfi_dict = self.neutron.list_sfc_port_pairs(**filter_dict_os)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003576 sfi_list = sfi_dict["port_pairs"]
3577 self.__sfi_os2mano(sfi_list)
sousaedu80135b92021-02-17 15:05:18 +01003578
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003579 return sfi_list
sousaedu80135b92021-02-17 15:05:18 +01003580 except (
3581 neExceptions.ConnectionFailed,
3582 ksExceptions.ClientException,
3583 neExceptions.NeutronException,
3584 ConnectionError,
3585 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003586 self._format_exception(e)
3587
3588 def delete_sfi(self, sfi_id):
sousaedu80135b92021-02-17 15:05:18 +01003589 self.logger.debug("Deleting Service Function Instance '%s' from VIM", sfi_id)
3590
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003591 try:
3592 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003593 self.neutron.delete_sfc_port_pair(sfi_id)
sousaedu80135b92021-02-17 15:05:18 +01003594
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003595 return sfi_id
sousaedu80135b92021-02-17 15:05:18 +01003596 except (
3597 neExceptions.ConnectionFailed,
3598 neExceptions.NeutronException,
3599 ksExceptions.ClientException,
3600 neExceptions.NeutronException,
3601 ConnectionError,
3602 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003603 self._format_exception(e)
3604
3605 def new_sf(self, name, sfis, sfc_encap=True):
tierno7d782ef2019-10-04 12:56:31 +00003606 self.logger.debug("Adding a new Service Function to VIM, named '%s'", name)
sousaedu80135b92021-02-17 15:05:18 +01003607
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003608 try:
3609 new_sf = None
3610 self._reload_connection()
tierno9c5c8322018-03-23 15:44:03 +01003611 # correlation = None
3612 # if sfc_encap:
sousaedu80135b92021-02-17 15:05:18 +01003613 # correlation = "nsh"
3614
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003615 for instance in sfis:
3616 sfi = self.get_sfi(instance)
sousaedu80135b92021-02-17 15:05:18 +01003617
3618 if sfi.get("sfc_encap") != sfc_encap:
tierno72774862020-05-04 11:44:15 +00003619 raise vimconn.VimConnNotSupportedException(
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003620 "OpenStack VIM connector requires all SFIs of the "
sousaedu80135b92021-02-17 15:05:18 +01003621 "same SF to share the same SFC Encapsulation"
3622 )
3623
3624 sf_dict = {"name": name, "port_pairs": sfis}
3625 new_sf = self.neutron.create_sfc_port_pair_group(
3626 {"port_pair_group": sf_dict}
3627 )
3628
3629 return new_sf["port_pair_group"]["id"]
3630 except (
3631 neExceptions.ConnectionFailed,
3632 ksExceptions.ClientException,
3633 neExceptions.NeutronException,
3634 ConnectionError,
3635 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003636 if new_sf:
3637 try:
Igor D.Ccaadc442017-11-06 12:48:48 +00003638 self.neutron.delete_sfc_port_pair_group(
sousaedu80135b92021-02-17 15:05:18 +01003639 new_sf["port_pair_group"]["id"]
3640 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003641 except Exception:
3642 self.logger.error(
sousaedu80135b92021-02-17 15:05:18 +01003643 "Creation of Service Function failed, with "
3644 "subsequent deletion failure as well."
3645 )
3646
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003647 self._format_exception(e)
3648
3649 def get_sf(self, sf_id):
3650 self.logger.debug("Getting Service Function %s from VIM", sf_id)
3651 filter_dict = {"id": sf_id}
3652 sf_list = self.get_sf_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01003653
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003654 if len(sf_list) == 0:
tierno72774862020-05-04 11:44:15 +00003655 raise vimconn.VimConnNotFoundException(
sousaedu80135b92021-02-17 15:05:18 +01003656 "Service Function '{}' not found".format(sf_id)
3657 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003658 elif len(sf_list) > 1:
tierno72774862020-05-04 11:44:15 +00003659 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003660 "Found more than one Service Function with this criteria"
3661 )
3662
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003663 sf = sf_list[0]
sousaedu80135b92021-02-17 15:05:18 +01003664
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003665 return sf
3666
3667 def get_sf_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01003668 self.logger.debug(
3669 "Getting Service Function from VIM filter: '%s'", str(filter_dict)
3670 )
3671
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003672 try:
3673 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +01003674 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +01003675
tierno69b590e2018-03-13 18:52:23 +01003676 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01003677 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3678
tierno69b590e2018-03-13 18:52:23 +01003679 sf_dict = self.neutron.list_sfc_port_pair_groups(**filter_dict_os)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003680 sf_list = sf_dict["port_pair_groups"]
3681 self.__sf_os2mano(sf_list)
sousaedu80135b92021-02-17 15:05:18 +01003682
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003683 return sf_list
sousaedu80135b92021-02-17 15:05:18 +01003684 except (
3685 neExceptions.ConnectionFailed,
3686 ksExceptions.ClientException,
3687 neExceptions.NeutronException,
3688 ConnectionError,
3689 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003690 self._format_exception(e)
3691
3692 def delete_sf(self, sf_id):
3693 self.logger.debug("Deleting Service Function '%s' from VIM", sf_id)
sousaedu80135b92021-02-17 15:05:18 +01003694
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003695 try:
3696 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003697 self.neutron.delete_sfc_port_pair_group(sf_id)
sousaedu80135b92021-02-17 15:05:18 +01003698
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003699 return sf_id
sousaedu80135b92021-02-17 15:05:18 +01003700 except (
3701 neExceptions.ConnectionFailed,
3702 neExceptions.NeutronException,
3703 ksExceptions.ClientException,
3704 neExceptions.NeutronException,
3705 ConnectionError,
3706 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003707 self._format_exception(e)
3708
3709 def new_sfp(self, name, classifications, sfs, sfc_encap=True, spi=None):
tierno7d782ef2019-10-04 12:56:31 +00003710 self.logger.debug("Adding a new Service Function Path to VIM, named '%s'", name)
sousaedu80135b92021-02-17 15:05:18 +01003711
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003712 try:
3713 new_sfp = None
3714 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003715 # In networking-sfc the MPLS encapsulation is legacy
3716 # should be used when no full SFC Encapsulation is intended
sousaedu80135b92021-02-17 15:05:18 +01003717 correlation = "mpls"
3718
Igor D.Ccaadc442017-11-06 12:48:48 +00003719 if sfc_encap:
sousaedu80135b92021-02-17 15:05:18 +01003720 correlation = "nsh"
3721
3722 sfp_dict = {
3723 "name": name,
3724 "flow_classifiers": classifications,
3725 "port_pair_groups": sfs,
3726 "chain_parameters": {"correlation": correlation},
3727 }
3728
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003729 if spi:
sousaedu80135b92021-02-17 15:05:18 +01003730 sfp_dict["chain_id"] = spi
3731
3732 new_sfp = self.neutron.create_sfc_port_chain({"port_chain": sfp_dict})
3733
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003734 return new_sfp["port_chain"]["id"]
sousaedu80135b92021-02-17 15:05:18 +01003735 except (
3736 neExceptions.ConnectionFailed,
3737 ksExceptions.ClientException,
3738 neExceptions.NeutronException,
3739 ConnectionError,
3740 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003741 if new_sfp:
3742 try:
sousaedu80135b92021-02-17 15:05:18 +01003743 self.neutron.delete_sfc_port_chain(new_sfp["port_chain"]["id"])
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003744 except Exception:
3745 self.logger.error(
sousaedu80135b92021-02-17 15:05:18 +01003746 "Creation of Service Function Path failed, with "
3747 "subsequent deletion failure as well."
3748 )
3749
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003750 self._format_exception(e)
3751
3752 def get_sfp(self, sfp_id):
3753 self.logger.debug(" Getting Service Function Path %s from VIM", sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003754
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003755 filter_dict = {"id": sfp_id}
3756 sfp_list = self.get_sfp_list(filter_dict)
sousaedu80135b92021-02-17 15:05:18 +01003757
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003758 if len(sfp_list) == 0:
tierno72774862020-05-04 11:44:15 +00003759 raise vimconn.VimConnNotFoundException(
sousaedu80135b92021-02-17 15:05:18 +01003760 "Service Function Path '{}' not found".format(sfp_id)
3761 )
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003762 elif len(sfp_list) > 1:
tierno72774862020-05-04 11:44:15 +00003763 raise vimconn.VimConnConflictException(
sousaedu80135b92021-02-17 15:05:18 +01003764 "Found more than one Service Function Path with this criteria"
3765 )
3766
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003767 sfp = sfp_list[0]
sousaedu80135b92021-02-17 15:05:18 +01003768
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003769 return sfp
3770
3771 def get_sfp_list(self, filter_dict={}):
sousaedu80135b92021-02-17 15:05:18 +01003772 self.logger.debug(
3773 "Getting Service Function Paths from VIM filter: '%s'", str(filter_dict)
3774 )
3775
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003776 try:
3777 self._reload_connection()
tierno69b590e2018-03-13 18:52:23 +01003778 filter_dict_os = filter_dict.copy()
sousaedu80135b92021-02-17 15:05:18 +01003779
tierno69b590e2018-03-13 18:52:23 +01003780 if self.api_version3 and "tenant_id" in filter_dict_os:
sousaedu80135b92021-02-17 15:05:18 +01003781 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3782
tierno69b590e2018-03-13 18:52:23 +01003783 sfp_dict = self.neutron.list_sfc_port_chains(**filter_dict_os)
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003784 sfp_list = sfp_dict["port_chains"]
3785 self.__sfp_os2mano(sfp_list)
sousaedu80135b92021-02-17 15:05:18 +01003786
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003787 return sfp_list
sousaedu80135b92021-02-17 15:05:18 +01003788 except (
3789 neExceptions.ConnectionFailed,
3790 ksExceptions.ClientException,
3791 neExceptions.NeutronException,
3792 ConnectionError,
3793 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003794 self._format_exception(e)
3795
3796 def delete_sfp(self, sfp_id):
tierno7d782ef2019-10-04 12:56:31 +00003797 self.logger.debug("Deleting Service Function Path '%s' from VIM", sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003798
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003799 try:
3800 self._reload_connection()
Igor D.Ccaadc442017-11-06 12:48:48 +00003801 self.neutron.delete_sfc_port_chain(sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003802
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003803 return sfp_id
sousaedu80135b92021-02-17 15:05:18 +01003804 except (
3805 neExceptions.ConnectionFailed,
3806 neExceptions.NeutronException,
3807 ksExceptions.ClientException,
3808 neExceptions.NeutronException,
3809 ConnectionError,
3810 ) as e:
Igor Duarte Cardoso3cf9bcd2017-08-14 16:39:34 +00003811 self._format_exception(e)
borsatti8a2dda32019-12-18 15:08:57 +00003812
borsatti8a2dda32019-12-18 15:08:57 +00003813 def refresh_sfps_status(self, sfp_list):
tierno1ec592d2020-06-16 15:29:47 +00003814 """Get the status of the service function path
sousaedu80135b92021-02-17 15:05:18 +01003815 Params: the list of sfp identifiers
3816 Returns a dictionary with:
3817 vm_id: #VIM id of this service function path
3818 status: #Mandatory. Text with one of:
3819 # DELETED (not found at vim)
3820 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3821 # OTHER (Vim reported other status not understood)
3822 # ERROR (VIM indicates an ERROR status)
3823 # ACTIVE,
3824 # CREATING (on building process)
3825 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3826 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)F
tierno1ec592d2020-06-16 15:29:47 +00003827 """
3828 sfp_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01003829 self.logger.debug(
3830 "refresh_sfps status: Getting tenant SFP information from VIM"
3831 )
3832
borsatti8a2dda32019-12-18 15:08:57 +00003833 for sfp_id in sfp_list:
tierno1ec592d2020-06-16 15:29:47 +00003834 sfp = {}
sousaedu80135b92021-02-17 15:05:18 +01003835
borsatti8a2dda32019-12-18 15:08:57 +00003836 try:
3837 sfp_vim = self.get_sfp(sfp_id)
sousaedu80135b92021-02-17 15:05:18 +01003838
3839 if sfp_vim["spi"]:
3840 sfp["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003841 else:
sousaedu80135b92021-02-17 15:05:18 +01003842 sfp["status"] = "OTHER"
3843 sfp["error_msg"] = "VIM status reported " + sfp["status"]
borsatti8a2dda32019-12-18 15:08:57 +00003844
sousaedu80135b92021-02-17 15:05:18 +01003845 sfp["vim_info"] = self.serialize(sfp_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003846
sousaedu80135b92021-02-17 15:05:18 +01003847 if sfp_vim.get("fault"):
3848 sfp["error_msg"] = str(sfp_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003849 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003850 self.logger.error("Exception getting sfp status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003851 sfp["status"] = "DELETED"
3852 sfp["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003853 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003854 self.logger.error("Exception getting sfp status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003855 sfp["status"] = "VIM_ERROR"
3856 sfp["error_msg"] = str(e)
3857
borsatti8a2dda32019-12-18 15:08:57 +00003858 sfp_dict[sfp_id] = sfp
sousaedu80135b92021-02-17 15:05:18 +01003859
borsatti8a2dda32019-12-18 15:08:57 +00003860 return sfp_dict
3861
borsatti8a2dda32019-12-18 15:08:57 +00003862 def refresh_sfis_status(self, sfi_list):
tierno1ec592d2020-06-16 15:29:47 +00003863 """Get the status of the service function instances
sousaedu80135b92021-02-17 15:05:18 +01003864 Params: the list of sfi identifiers
3865 Returns a dictionary with:
3866 vm_id: #VIM id of this service function instance
3867 status: #Mandatory. Text with one of:
3868 # DELETED (not found at vim)
3869 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3870 # OTHER (Vim reported other status not understood)
3871 # ERROR (VIM indicates an ERROR status)
3872 # ACTIVE,
3873 # CREATING (on building process)
3874 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3875 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00003876 """
3877 sfi_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01003878 self.logger.debug(
3879 "refresh_sfis status: Getting tenant sfi information from VIM"
3880 )
3881
borsatti8a2dda32019-12-18 15:08:57 +00003882 for sfi_id in sfi_list:
tierno1ec592d2020-06-16 15:29:47 +00003883 sfi = {}
sousaedu80135b92021-02-17 15:05:18 +01003884
borsatti8a2dda32019-12-18 15:08:57 +00003885 try:
3886 sfi_vim = self.get_sfi(sfi_id)
sousaedu80135b92021-02-17 15:05:18 +01003887
borsatti8a2dda32019-12-18 15:08:57 +00003888 if sfi_vim:
sousaedu80135b92021-02-17 15:05:18 +01003889 sfi["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003890 else:
sousaedu80135b92021-02-17 15:05:18 +01003891 sfi["status"] = "OTHER"
3892 sfi["error_msg"] = "VIM status reported " + sfi["status"]
borsatti8a2dda32019-12-18 15:08:57 +00003893
sousaedu80135b92021-02-17 15:05:18 +01003894 sfi["vim_info"] = self.serialize(sfi_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003895
sousaedu80135b92021-02-17 15:05:18 +01003896 if sfi_vim.get("fault"):
3897 sfi["error_msg"] = str(sfi_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003898 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003899 self.logger.error("Exception getting sfi status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003900 sfi["status"] = "DELETED"
3901 sfi["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003902 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003903 self.logger.error("Exception getting sfi status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003904 sfi["status"] = "VIM_ERROR"
3905 sfi["error_msg"] = str(e)
3906
borsatti8a2dda32019-12-18 15:08:57 +00003907 sfi_dict[sfi_id] = sfi
sousaedu80135b92021-02-17 15:05:18 +01003908
borsatti8a2dda32019-12-18 15:08:57 +00003909 return sfi_dict
3910
borsatti8a2dda32019-12-18 15:08:57 +00003911 def refresh_sfs_status(self, sf_list):
tierno1ec592d2020-06-16 15:29:47 +00003912 """Get the status of the service functions
sousaedu80135b92021-02-17 15:05:18 +01003913 Params: the list of sf identifiers
3914 Returns a dictionary with:
3915 vm_id: #VIM id of this service function
3916 status: #Mandatory. Text with one of:
3917 # DELETED (not found at vim)
3918 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3919 # OTHER (Vim reported other status not understood)
3920 # ERROR (VIM indicates an ERROR status)
3921 # ACTIVE,
3922 # CREATING (on building process)
3923 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3924 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00003925 """
3926 sf_dict = {}
borsatti8a2dda32019-12-18 15:08:57 +00003927 self.logger.debug("refresh_sfs status: Getting tenant sf information from VIM")
sousaedu80135b92021-02-17 15:05:18 +01003928
borsatti8a2dda32019-12-18 15:08:57 +00003929 for sf_id in sf_list:
tierno1ec592d2020-06-16 15:29:47 +00003930 sf = {}
sousaedu80135b92021-02-17 15:05:18 +01003931
borsatti8a2dda32019-12-18 15:08:57 +00003932 try:
3933 sf_vim = self.get_sf(sf_id)
sousaedu80135b92021-02-17 15:05:18 +01003934
borsatti8a2dda32019-12-18 15:08:57 +00003935 if sf_vim:
sousaedu80135b92021-02-17 15:05:18 +01003936 sf["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003937 else:
sousaedu80135b92021-02-17 15:05:18 +01003938 sf["status"] = "OTHER"
3939 sf["error_msg"] = "VIM status reported " + sf_vim["status"]
borsatti8a2dda32019-12-18 15:08:57 +00003940
sousaedu80135b92021-02-17 15:05:18 +01003941 sf["vim_info"] = self.serialize(sf_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003942
sousaedu80135b92021-02-17 15:05:18 +01003943 if sf_vim.get("fault"):
3944 sf["error_msg"] = str(sf_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003945 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003946 self.logger.error("Exception getting sf status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003947 sf["status"] = "DELETED"
3948 sf["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00003949 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003950 self.logger.error("Exception getting sf status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003951 sf["status"] = "VIM_ERROR"
3952 sf["error_msg"] = str(e)
3953
borsatti8a2dda32019-12-18 15:08:57 +00003954 sf_dict[sf_id] = sf
sousaedu80135b92021-02-17 15:05:18 +01003955
borsatti8a2dda32019-12-18 15:08:57 +00003956 return sf_dict
3957
borsatti8a2dda32019-12-18 15:08:57 +00003958 def refresh_classifications_status(self, classification_list):
tierno1ec592d2020-06-16 15:29:47 +00003959 """Get the status of the classifications
sousaedu80135b92021-02-17 15:05:18 +01003960 Params: the list of classification identifiers
3961 Returns a dictionary with:
3962 vm_id: #VIM id of this classifier
3963 status: #Mandatory. Text with one of:
3964 # DELETED (not found at vim)
3965 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3966 # OTHER (Vim reported other status not understood)
3967 # ERROR (VIM indicates an ERROR status)
3968 # ACTIVE,
3969 # CREATING (on building process)
3970 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3971 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
tierno1ec592d2020-06-16 15:29:47 +00003972 """
3973 classification_dict = {}
sousaedu80135b92021-02-17 15:05:18 +01003974 self.logger.debug(
3975 "refresh_classifications status: Getting tenant classification information from VIM"
3976 )
3977
borsatti8a2dda32019-12-18 15:08:57 +00003978 for classification_id in classification_list:
tierno1ec592d2020-06-16 15:29:47 +00003979 classification = {}
sousaedu80135b92021-02-17 15:05:18 +01003980
borsatti8a2dda32019-12-18 15:08:57 +00003981 try:
3982 classification_vim = self.get_classification(classification_id)
sousaedu80135b92021-02-17 15:05:18 +01003983
borsatti8a2dda32019-12-18 15:08:57 +00003984 if classification_vim:
sousaedu80135b92021-02-17 15:05:18 +01003985 classification["status"] = vmStatus2manoFormat["ACTIVE"]
borsatti8a2dda32019-12-18 15:08:57 +00003986 else:
sousaedu80135b92021-02-17 15:05:18 +01003987 classification["status"] = "OTHER"
3988 classification["error_msg"] = (
3989 "VIM status reported " + classification["status"]
3990 )
borsatti8a2dda32019-12-18 15:08:57 +00003991
sousaedu80135b92021-02-17 15:05:18 +01003992 classification["vim_info"] = self.serialize(classification_vim)
borsatti8a2dda32019-12-18 15:08:57 +00003993
sousaedu80135b92021-02-17 15:05:18 +01003994 if classification_vim.get("fault"):
3995 classification["error_msg"] = str(classification_vim["fault"])
tierno72774862020-05-04 11:44:15 +00003996 except vimconn.VimConnNotFoundException as e:
borsatti8a2dda32019-12-18 15:08:57 +00003997 self.logger.error("Exception getting classification status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01003998 classification["status"] = "DELETED"
3999 classification["error_msg"] = str(e)
tierno72774862020-05-04 11:44:15 +00004000 except vimconn.VimConnException as e:
borsatti8a2dda32019-12-18 15:08:57 +00004001 self.logger.error("Exception getting classification status: %s", str(e))
sousaedu80135b92021-02-17 15:05:18 +01004002 classification["status"] = "VIM_ERROR"
4003 classification["error_msg"] = str(e)
4004
borsatti8a2dda32019-12-18 15:08:57 +00004005 classification_dict[classification_id] = classification
sousaedu80135b92021-02-17 15:05:18 +01004006
borsatti8a2dda32019-12-18 15:08:57 +00004007 return classification_dict
Alexis Romerob70f4ed2022-03-11 18:00:49 +01004008
4009 def new_affinity_group(self, affinity_group_data):
4010 """Adds a server group to VIM
4011 affinity_group_data contains a dictionary with information, keys:
4012 name: name in VIM for the server group
4013 type: affinity or anti-affinity
4014 scope: Only nfvi-node allowed
4015 Returns the server group identifier"""
4016 self.logger.debug("Adding Server Group '%s'", str(affinity_group_data))
4017
4018 try:
4019 name = affinity_group_data["name"]
4020 policy = affinity_group_data["type"]
4021
4022 self._reload_connection()
4023 new_server_group = self.nova.server_groups.create(name, policy)
4024
4025 return new_server_group.id
4026 except (
4027 ksExceptions.ClientException,
4028 nvExceptions.ClientException,
4029 ConnectionError,
4030 KeyError,
4031 ) as e:
4032 self._format_exception(e)
4033
4034 def get_affinity_group(self, affinity_group_id):
4035 """Obtain server group details from the VIM. Returns the server group detais as a dict"""
4036 self.logger.debug("Getting flavor '%s'", affinity_group_id)
4037 try:
4038 self._reload_connection()
4039 server_group = self.nova.server_groups.find(id=affinity_group_id)
4040
4041 return server_group.to_dict()
4042 except (
4043 nvExceptions.NotFound,
4044 nvExceptions.ClientException,
4045 ksExceptions.ClientException,
4046 ConnectionError,
4047 ) as e:
4048 self._format_exception(e)
4049
4050 def delete_affinity_group(self, affinity_group_id):
4051 """Deletes a server group from the VIM. Returns the old affinity_group_id"""
4052 self.logger.debug("Getting server group '%s'", affinity_group_id)
4053 try:
4054 self._reload_connection()
4055 self.nova.server_groups.delete(affinity_group_id)
4056
4057 return affinity_group_id
4058 except (
4059 nvExceptions.NotFound,
4060 ksExceptions.ClientException,
4061 nvExceptions.ClientException,
4062 ConnectionError,
4063 ) as e:
4064 self._format_exception(e)
elumalai8658c2c2022-04-28 19:09:31 +05304065
4066 def get_vdu_state(self, vm_id):
4067 """
4068 Getting the state of a vdu
4069 param:
4070 vm_id: ID of an instance
4071 """
4072 self.logger.debug("Getting the status of VM")
4073 self.logger.debug("VIM VM ID %s", vm_id)
4074 self._reload_connection()
4075 server = self.nova.servers.find(id=vm_id)
4076 server_dict = server.to_dict()
4077 vdu_data = [
4078 server_dict["status"],
4079 server_dict["flavor"]["id"],
4080 server_dict["OS-EXT-SRV-ATTR:host"],
4081 server_dict["OS-EXT-AZ:availability_zone"],
4082 ]
4083 self.logger.debug("vdu_data %s", vdu_data)
4084 return vdu_data
4085
4086 def check_compute_availability(self, host, server_flavor_details):
4087 self._reload_connection()
4088 hypervisor_search = self.nova.hypervisors.search(
4089 hypervisor_match=host, servers=True
4090 )
4091 for hypervisor in hypervisor_search:
4092 hypervisor_id = hypervisor.to_dict()["id"]
4093 hypervisor_details = self.nova.hypervisors.get(hypervisor=hypervisor_id)
4094 hypervisor_dict = hypervisor_details.to_dict()
4095 hypervisor_temp = json.dumps(hypervisor_dict)
4096 hypervisor_json = json.loads(hypervisor_temp)
4097 resources_available = [
4098 hypervisor_json["free_ram_mb"],
4099 hypervisor_json["disk_available_least"],
4100 hypervisor_json["vcpus"] - hypervisor_json["vcpus_used"],
4101 ]
4102 compute_available = all(
4103 x > y for x, y in zip(resources_available, server_flavor_details)
4104 )
4105 if compute_available:
4106 return host
4107
4108 def check_availability_zone(
4109 self, old_az, server_flavor_details, old_host, host=None
4110 ):
4111 self._reload_connection()
4112 az_check = {"zone_check": False, "compute_availability": None}
4113 aggregates_list = self.nova.aggregates.list()
4114 for aggregate in aggregates_list:
4115 aggregate_details = aggregate.to_dict()
4116 aggregate_temp = json.dumps(aggregate_details)
4117 aggregate_json = json.loads(aggregate_temp)
4118 if aggregate_json["availability_zone"] == old_az:
4119 hosts_list = aggregate_json["hosts"]
4120 if host is not None:
4121 if host in hosts_list:
4122 az_check["zone_check"] = True
4123 available_compute_id = self.check_compute_availability(
4124 host, server_flavor_details
4125 )
4126 if available_compute_id is not None:
4127 az_check["compute_availability"] = available_compute_id
4128 else:
4129 for check_host in hosts_list:
4130 if check_host != old_host:
4131 available_compute_id = self.check_compute_availability(
4132 check_host, server_flavor_details
4133 )
4134 if available_compute_id is not None:
4135 az_check["zone_check"] = True
4136 az_check["compute_availability"] = available_compute_id
4137 break
4138 else:
4139 az_check["zone_check"] = True
4140 return az_check
4141
4142 def migrate_instance(self, vm_id, compute_host=None):
4143 """
4144 Migrate a vdu
4145 param:
4146 vm_id: ID of an instance
4147 compute_host: Host to migrate the vdu to
4148 """
4149 self._reload_connection()
4150 vm_state = False
4151 instance_state = self.get_vdu_state(vm_id)
4152 server_flavor_id = instance_state[1]
4153 server_hypervisor_name = instance_state[2]
4154 server_availability_zone = instance_state[3]
4155 try:
4156 server_flavor = self.nova.flavors.find(id=server_flavor_id).to_dict()
4157 server_flavor_details = [
4158 server_flavor["ram"],
4159 server_flavor["disk"],
4160 server_flavor["vcpus"],
4161 ]
4162 if compute_host == server_hypervisor_name:
4163 raise vimconn.VimConnException(
4164 "Unable to migrate instance '{}' to the same host '{}'".format(
4165 vm_id, compute_host
4166 ),
4167 http_code=vimconn.HTTP_Bad_Request,
4168 )
4169 az_status = self.check_availability_zone(
4170 server_availability_zone,
4171 server_flavor_details,
4172 server_hypervisor_name,
4173 compute_host,
4174 )
4175 availability_zone_check = az_status["zone_check"]
4176 available_compute_id = az_status.get("compute_availability")
4177
4178 if availability_zone_check is False:
4179 raise vimconn.VimConnException(
4180 "Unable to migrate instance '{}' to a different availability zone".format(
4181 vm_id
4182 ),
4183 http_code=vimconn.HTTP_Bad_Request,
4184 )
4185 if available_compute_id is not None:
4186 self.nova.servers.live_migrate(
4187 server=vm_id,
4188 host=available_compute_id,
4189 block_migration=True,
4190 disk_over_commit=False,
4191 )
4192 state = "MIGRATING"
4193 changed_compute_host = ""
4194 if state == "MIGRATING":
4195 vm_state = self.__wait_for_vm(vm_id, "ACTIVE")
4196 changed_compute_host = self.get_vdu_state(vm_id)[2]
4197 if vm_state and changed_compute_host == available_compute_id:
4198 self.logger.debug(
4199 "Instance '{}' migrated to the new compute host '{}'".format(
4200 vm_id, changed_compute_host
4201 )
4202 )
4203 return state, available_compute_id
4204 else:
4205 raise vimconn.VimConnException(
4206 "Migration Failed. Instance '{}' not moved to the new host {}".format(
4207 vm_id, available_compute_id
4208 ),
4209 http_code=vimconn.HTTP_Bad_Request,
4210 )
4211 else:
4212 raise vimconn.VimConnException(
4213 "Compute '{}' not available or does not have enough resources to migrate the instance".format(
4214 available_compute_id
4215 ),
4216 http_code=vimconn.HTTP_Bad_Request,
4217 )
4218 except (
4219 nvExceptions.BadRequest,
4220 nvExceptions.ClientException,
4221 nvExceptions.NotFound,
4222 ) as e:
4223 self._format_exception(e)
sritharan29a4c1a2022-05-05 12:15:04 +00004224
4225 def resize_instance(self, vm_id, new_flavor_id):
4226 """
4227 For resizing the vm based on the given
4228 flavor details
4229 param:
4230 vm_id : ID of an instance
4231 new_flavor_id : Flavor id to be resized
4232 Return the status of a resized instance
4233 """
4234 self._reload_connection()
4235 self.logger.debug("resize the flavor of an instance")
4236 instance_status, old_flavor_id, compute_host, az = self.get_vdu_state(vm_id)
4237 old_flavor_disk = self.nova.flavors.find(id=old_flavor_id).to_dict()["disk"]
4238 new_flavor_disk = self.nova.flavors.find(id=new_flavor_id).to_dict()["disk"]
4239 try:
4240 if instance_status == "ACTIVE" or instance_status == "SHUTOFF":
4241 if old_flavor_disk > new_flavor_disk:
4242 raise nvExceptions.BadRequest(
4243 400,
4244 message="Server disk resize failed. Resize to lower disk flavor is not allowed",
4245 )
4246 else:
4247 self.nova.servers.resize(server=vm_id, flavor=new_flavor_id)
4248 vm_state = self.__wait_for_vm(vm_id, "VERIFY_RESIZE")
4249 if vm_state:
4250 instance_resized_status = self.confirm_resize(vm_id)
4251 return instance_resized_status
4252 else:
4253 raise nvExceptions.BadRequest(
4254 409,
4255 message="Cannot 'resize' vm_state is in ERROR",
4256 )
4257
4258 else:
4259 self.logger.debug("ERROR : Instance is not in ACTIVE or SHUTOFF state")
4260 raise nvExceptions.BadRequest(
4261 409,
4262 message="Cannot 'resize' instance while it is in vm_state resized",
4263 )
4264 except (
4265 nvExceptions.BadRequest,
4266 nvExceptions.ClientException,
4267 nvExceptions.NotFound,
4268 ) as e:
4269 self._format_exception(e)
4270
4271 def confirm_resize(self, vm_id):
4272 """
4273 Confirm the resize of an instance
4274 param:
4275 vm_id: ID of an instance
4276 """
4277 self._reload_connection()
4278 self.nova.servers.confirm_resize(server=vm_id)
4279 if self.get_vdu_state(vm_id)[0] == "VERIFY_RESIZE":
4280 self.__wait_for_vm(vm_id, "ACTIVE")
4281 instance_status = self.get_vdu_state(vm_id)[0]
4282 return instance_status