1 # -*- coding: utf-8 -*-
3 from osm_common
import dbmongo
4 from osm_common
import dbmemory
5 from osm_common
import fslocal
6 from osm_common
import msglocal
7 from osm_common
import msgkafka
12 from random
import choice
as random_choice
13 from uuid
import uuid4
14 from hashlib
import sha256
, md5
15 from osm_common
.dbbase
import DbException
16 from osm_common
.fsbase
import FsException
17 from osm_common
.msgbase
import MsgException
18 from http
import HTTPStatus
20 from copy
import deepcopy
21 from validation
import validate_input
, ValidationError
23 __author__
= "Alfonso Tierno <alfonso.tiernosepulveda@telefonica.com>"
26 class EngineException(Exception):
28 def __init__(self
, message
, http_code
=HTTPStatus
.BAD_REQUEST
):
29 self
.http_code
= http_code
30 Exception.__init
__(self
, message
)
33 def _deep_update(dict_to_change
, dict_reference
):
35 Modifies one dictionary with the information of the other following https://tools.ietf.org/html/rfc7396
36 :param dict_to_change: Ends modified
37 :param dict_reference: reference
40 for k
in dict_reference
:
41 if dict_reference
[k
] is None: # None->Anything
42 if k
in dict_to_change
:
44 elif not isinstance(dict_reference
[k
], dict): # NotDict->Anything
45 dict_to_change
[k
] = dict_reference
[k
]
46 elif k
not in dict_to_change
: # Dict->Empty
47 dict_to_change
[k
] = deepcopy(dict_reference
[k
])
48 _deep_update(dict_to_change
[k
], dict_reference
[k
])
49 elif isinstance(dict_to_change
[k
], dict): # Dict->Dict
50 _deep_update(dict_to_change
[k
], dict_reference
[k
])
52 dict_to_change
[k
] = deepcopy(dict_reference
[k
])
53 _deep_update(dict_to_change
[k
], dict_reference
[k
])
64 self
.logger
= logging
.getLogger("nbi.engine")
66 def start(self
, config
):
68 Connect to database, filesystem storage, and messaging
69 :param config: two level dictionary with configuration. Top level should contain 'database', 'storage',
75 if config
["database"]["driver"] == "mongo":
76 self
.db
= dbmongo
.DbMongo()
77 self
.db
.db_connect(config
["database"])
78 elif config
["database"]["driver"] == "memory":
79 self
.db
= dbmemory
.DbMemory()
80 self
.db
.db_connect(config
["database"])
82 raise EngineException("Invalid configuration param '{}' at '[database]':'driver'".format(
83 config
["database"]["driver"]))
85 if config
["storage"]["driver"] == "local":
86 self
.fs
= fslocal
.FsLocal()
87 self
.fs
.fs_connect(config
["storage"])
89 raise EngineException("Invalid configuration param '{}' at '[storage]':'driver'".format(
90 config
["storage"]["driver"]))
92 if config
["message"]["driver"] == "local":
93 self
.msg
= msglocal
.MsgLocal()
94 self
.msg
.connect(config
["message"])
95 elif config
["message"]["driver"] == "kafka":
96 self
.msg
= msgkafka
.MsgKafka()
97 self
.msg
.connect(config
["message"])
99 raise EngineException("Invalid configuration param '{}' at '[message]':'driver'".format(
100 config
["storage"]["driver"]))
101 except (DbException
, FsException
, MsgException
) as e
:
102 raise EngineException(str(e
), http_code
=e
.http_code
)
107 self
.db
.db_disconnect()
109 self
.fs
.fs_disconnect()
111 self
.fs
.fs_disconnect()
112 except (DbException
, FsException
, MsgException
) as e
:
113 raise EngineException(str(e
), http_code
=e
.http_code
)
115 def authorize(self
, token
):
118 raise EngineException("Needed a token or Authorization http header",
119 http_code
=HTTPStatus
.UNAUTHORIZED
)
120 if token
not in self
.tokens
:
121 raise EngineException("Invalid token or Authorization http header",
122 http_code
=HTTPStatus
.UNAUTHORIZED
)
123 session
= self
.tokens
[token
]
125 if session
["expires"] < now
:
126 del self
.tokens
[token
]
127 raise EngineException("Expired Token or Authorization http header",
128 http_code
=HTTPStatus
.UNAUTHORIZED
)
130 except EngineException
:
131 if self
.config
["global"].get("test.user_not_authorized"):
132 return {"id": "fake-token-id-for-test",
133 "project_id": self
.config
["global"].get("test.project_not_authorized", "admin"),
134 "username": self
.config
["global"]["test.user_not_authorized"]}
138 def new_token(self
, session
, indata
, remote
):
142 # Try using username/password
143 if indata
.get("username"):
144 user_rows
= self
.db
.get_list("users", {"username": indata
.get("username")})
147 user_content
= user_rows
[0]
148 salt
= user_content
["_admin"]["salt"]
149 shadow_password
= sha256(indata
.get("password", "").encode('utf-8') + salt
.encode('utf-8')).hexdigest()
150 if shadow_password
!= user_content
["password"]:
153 raise EngineException("Invalid username/password", http_code
=HTTPStatus
.UNAUTHORIZED
)
155 user_rows
= self
.db
.get_list("users", {"username": session
["username"]})
157 user_content
= user_rows
[0]
159 raise EngineException("Invalid token", http_code
=HTTPStatus
.UNAUTHORIZED
)
161 raise EngineException("Provide credentials: username/password or Authorization Bearer token",
162 http_code
=HTTPStatus
.UNAUTHORIZED
)
164 token_id
= ''.join(random_choice('abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789')
165 for _
in range(0, 32))
166 if indata
.get("project_id"):
167 project_id
= indata
.get("project_id")
168 if project_id
not in user_content
["projects"]:
169 raise EngineException("project {} not allowed for this user".format(project_id
),
170 http_code
=HTTPStatus
.UNAUTHORIZED
)
172 project_id
= user_content
["projects"][0]
173 if project_id
== "admin":
176 project
= self
.db
.get_one("projects", {"_id": project_id
})
177 session_admin
= project
.get("admin", False)
178 new_session
= {"issued_at": now
, "expires": now
+3600,
179 "_id": token_id
, "id": token_id
, "project_id": project_id
, "username": user_content
["username"],
180 "remote_port": remote
.port
, "admin": session_admin
}
182 new_session
["remote_host"] = remote
.name
184 new_session
["remote_host"] = remote
.ip
186 self
.tokens
[token_id
] = new_session
187 return deepcopy(new_session
)
189 def get_token_list(self
, session
):
191 for token_id
, token_value
in self
.tokens
.items():
192 if token_value
["username"] == session
["username"]:
193 token_list
.append(deepcopy(token_value
))
196 def get_token(self
, session
, token_id
):
197 token_value
= self
.tokens
.get(token_id
)
199 raise EngineException("token not found", http_code
=HTTPStatus
.NOT_FOUND
)
200 if token_value
["username"] != session
["username"] and not session
["admin"]:
201 raise EngineException("needed admin privileges", http_code
=HTTPStatus
.UNAUTHORIZED
)
204 def del_token(self
, token_id
):
206 del self
.tokens
[token_id
]
207 return "token '{}' deleted".format(token_id
)
209 raise EngineException("Token '{}' not found".format(token_id
), http_code
=HTTPStatus
.NOT_FOUND
)
212 def _remove_envelop(item
, indata
=None):
214 Obtain the useful data removing the envelop. It goes throw the vnfd or nsd catalog and returns the
216 :param item: can be vnfds, nsds, users, projects, userDefinedData (initial content of a vnfds, nsds
217 :param indata: Content to be inspected
218 :return: the useful part of indata
220 clean_indata
= indata
224 if clean_indata
.get('vnfd:vnfd-catalog'):
225 clean_indata
= clean_indata
['vnfd:vnfd-catalog']
226 elif clean_indata
.get('vnfd-catalog'):
227 clean_indata
= clean_indata
['vnfd-catalog']
228 if clean_indata
.get('vnfd'):
229 if not isinstance(clean_indata
['vnfd'], list) or len(clean_indata
['vnfd']) != 1:
230 raise EngineException("'vnfd' must be a list only one element")
231 clean_indata
= clean_indata
['vnfd'][0]
233 if clean_indata
.get('nsd:nsd-catalog'):
234 clean_indata
= clean_indata
['nsd:nsd-catalog']
235 elif clean_indata
.get('nsd-catalog'):
236 clean_indata
= clean_indata
['nsd-catalog']
237 if clean_indata
.get('nsd'):
238 if not isinstance(clean_indata
['nsd'], list) or len(clean_indata
['nsd']) != 1:
239 raise EngineException("'nsd' must be a list only one element")
240 clean_indata
= clean_indata
['nsd'][0]
241 elif item
== "userDefinedData":
242 if "userDefinedData" in indata
:
243 clean_indata
= clean_indata
['userDefinedData']
246 def _check_dependencies_on_descriptor(self
, session
, item
, descriptor_id
):
248 Check that the descriptor to be deleded is not a dependency of others
249 :param session: client session information
250 :param item: can be vnfds, nsds
251 :param descriptor_id: id of descriptor to be deleted
252 :return: None or raises exception
255 _filter
= {"constituent-vnfd.ANYINDEX.vnfd-id-ref": descriptor_id
}
256 if self
.get_item_list(session
, "nsds", _filter
):
257 raise EngineException("There are nsd that depends on this VNFD", http_code
=HTTPStatus
.CONFLICT
)
259 _filter
= {"nsdId": descriptor_id
}
260 if self
.get_item_list(session
, "nsrs", _filter
):
261 raise EngineException("There are nsr that depends on this NSD", http_code
=HTTPStatus
.CONFLICT
)
263 def _check_descriptor_dependencies(self
, session
, item
, descriptor
):
265 Check that the dependent descriptors exist on a new descriptor or edition
266 :param session: client session information
267 :param item: can be nsds, nsrs
268 :param descriptor: descriptor to be inserted or edit
269 :return: None or raises exception
272 if not descriptor
.get("constituent-vnfd"):
274 for vnf
in descriptor
["constituent-vnfd"]:
275 vnfd_id
= vnf
["vnfd-id-ref"]
276 if not self
.get_item_list(session
, "vnfds", {"id": vnfd_id
}):
277 raise EngineException("Descriptor error at 'constituent-vnfd':'vnfd-id-ref'='{}' references a non "
278 "existing vnfd".format(vnfd_id
), http_code
=HTTPStatus
.CONFLICT
)
280 if not descriptor
.get("nsdId"):
282 nsd_id
= descriptor
["nsdId"]
283 if not self
.get_item_list(session
, "nsds", {"id": nsd_id
}):
284 raise EngineException("Descriptor error at nsdId='{}' references a non exist nsd".format(nsd_id
),
285 http_code
=HTTPStatus
.CONFLICT
)
287 def _validate_new_data(self
, session
, item
, indata
, id=None, force
=False):
289 if not indata
.get("username"):
290 raise EngineException("missing 'username'", HTTPStatus
.UNPROCESSABLE_ENTITY
)
291 if not indata
.get("password"):
292 raise EngineException("missing 'password'", HTTPStatus
.UNPROCESSABLE_ENTITY
)
293 if not indata
.get("projects"):
294 raise EngineException("missing 'projects'", HTTPStatus
.UNPROCESSABLE_ENTITY
)
295 # check username not exists
296 if self
.db
.get_one(item
, {"username": indata
.get("username")}, fail_on_empty
=False, fail_on_more
=False):
297 raise EngineException("username '{}' exists".format(indata
["username"]), HTTPStatus
.CONFLICT
)
298 elif item
== "projects":
299 if not indata
.get("name"):
300 raise EngineException("missing 'name'")
301 # check name not exists
302 if self
.db
.get_one(item
, {"name": indata
.get("name")}, fail_on_empty
=False, fail_on_more
=False):
303 raise EngineException("name '{}' exists".format(indata
["name"]), HTTPStatus
.CONFLICT
)
304 elif item
in ("vnfds", "nsds"):
305 filter = {"id": indata
["id"]}
307 filter["_id.neq"] = id
308 # TODO add admin to filter, validate rights
309 self
._add
_read
_filter
(session
, item
, filter)
310 if self
.db
.get_one(item
, filter, fail_on_empty
=False):
311 raise EngineException("{} with id '{}' already exists for this tenant".format(item
[:-1], indata
["id"]),
313 # TODO validate with pyangbind. Load and dumps to convert data types
315 # transform constituent-vnfd:member-vnf-index to string
316 if indata
.get("constituent-vnfd"):
317 for constituent_vnfd
in indata
["constituent-vnfd"]:
318 if "member-vnf-index" in constituent_vnfd
:
319 constituent_vnfd
["member-vnf-index"] = str(constituent_vnfd
["member-vnf-index"])
321 if item
== "nsds" and not force
:
322 self
._check
_descriptor
_dependencies
(session
, "nsds", indata
)
323 elif item
== "userDefinedData":
324 # TODO validate userDefinedData is a keypair values
329 elif item
== "vim_accounts" or item
== "sdns":
330 filter = {"name": indata
.get("name")}
332 filter["_id.neq"] = id
333 if self
.db
.get_one(item
, filter, fail_on_empty
=False, fail_on_more
=False):
334 raise EngineException("name '{}' already exists for {}".format(indata
["name"], item
),
337 def _check_ns_operation(self
, session
, nsr
, operation
, indata
):
339 Check that user has enter right parameters for the operation
341 :param operation: it can be: instantiate, terminate, action, TODO: update, heal
342 :param indata: descriptor with the parameters of the operation
345 if operation
== "action":
346 if indata
.get("vnf_member_index"):
347 indata
["member_vnf_index"] = indata
.pop("vnf_member_index") # for backward compatibility
348 for vnf
in nsr
["nsd"]["constituent-vnfd"]:
349 if indata
["member_vnf_index"] == vnf
["member-vnf-index"]:
350 # TODO get vnfd, check primitives
353 raise EngineException("Invalid parameter member_vnf_index='{}' is not one of the nsd "
354 "constituent-vnfd".format(indata
["member_vnf_index"]))
356 def _format_new_data(self
, session
, item
, indata
):
358 if "_admin" not in indata
:
359 indata
["_admin"] = {}
360 indata
["_admin"]["created"] = now
361 indata
["_admin"]["modified"] = now
363 indata
["_id"] = indata
["username"]
365 indata
["_admin"]["salt"] = salt
366 indata
["password"] = sha256(indata
["password"].encode('utf-8') + salt
.encode('utf-8')).hexdigest()
367 elif item
== "projects":
368 indata
["_id"] = indata
["name"]
370 if not indata
.get("_id"):
371 indata
["_id"] = str(uuid4())
372 if item
in ("vnfds", "nsds", "nsrs", "vnfrs"):
373 if not indata
["_admin"].get("projects_read"):
374 indata
["_admin"]["projects_read"] = [session
["project_id"]]
375 if not indata
["_admin"].get("projects_write"):
376 indata
["_admin"]["projects_write"] = [session
["project_id"]]
377 if item
in ("vnfds", "nsds"):
378 indata
["_admin"]["onboardingState"] = "CREATED"
379 indata
["_admin"]["operationalState"] = "DISABLED"
380 indata
["_admin"]["usageSate"] = "NOT_IN_USE"
382 indata
["_admin"]["nsState"] = "NOT_INSTANTIATED"
383 if item
in ("vim_accounts", "sdns"):
384 indata
["_admin"]["operationalState"] = "PROCESSING"
386 def upload_content(self
, session
, item
, _id
, indata
, kwargs
, headers
):
388 Used for receiving content by chunks (with a transaction_id header and/or gzip file. It will store and extract)
389 :param session: session
390 :param item: can be nsds or vnfds
391 :param _id : the nsd,vnfd is already created, this is the id
392 :param indata: http body request
393 :param kwargs: user query string to override parameters. NOT USED
394 :param headers: http request headers
395 :return: True package has is completely uploaded or False if partial content has been uplodaed.
396 Raise exception on error
398 # Check that _id exists and it is valid
399 current_desc
= self
.get_item(session
, item
, _id
)
401 content_range_text
= headers
.get("Content-Range")
402 expected_md5
= headers
.get("Content-File-MD5")
404 content_type
= headers
.get("Content-Type")
405 if content_type
and "application/gzip" in content_type
or "application/x-gzip" in content_type
or \
406 "application/zip" in content_type
:
408 filename
= headers
.get("Content-Filename")
410 filename
= "package.tar.gz" if compressed
else "package"
411 # TODO change to Content-Disposition filename https://tools.ietf.org/html/rfc6266
415 if content_range_text
:
416 content_range
= content_range_text
.replace("-", " ").replace("/", " ").split()
417 if content_range
[0] != "bytes": # TODO check x<y not negative < total....
419 start
= int(content_range
[1])
420 end
= int(content_range
[2]) + 1
421 total
= int(content_range
[3])
426 if not self
.fs
.file_exists(_id
, 'dir'):
427 raise EngineException("invalid Transaction-Id header", HTTPStatus
.NOT_FOUND
)
429 self
.fs
.file_delete(_id
, ignore_non_exist
=True)
432 storage
= self
.fs
.get_params()
433 storage
["folder"] = _id
435 file_path
= (_id
, filename
)
436 if self
.fs
.file_exists(file_path
, 'file'):
437 file_size
= self
.fs
.file_size(file_path
)
440 if file_size
!= start
:
441 raise EngineException("invalid Content-Range start sequence, expected '{}' but received '{}'".format(
442 file_size
, start
), HTTPStatus
.REQUESTED_RANGE_NOT_SATISFIABLE
)
443 file_pkg
= self
.fs
.file_open(file_path
, 'a+b')
444 if isinstance(indata
, dict):
445 indata_text
= yaml
.safe_dump(indata
, indent
=4, default_flow_style
=False)
446 file_pkg
.write(indata_text
.encode(encoding
="utf-8"))
450 indata_text
= indata
.read(4096)
451 indata_len
+= len(indata_text
)
454 file_pkg
.write(indata_text
)
455 if content_range_text
:
456 if indata_len
!= end
-start
:
457 raise EngineException("Mismatch between Content-Range header {}-{} and body length of {}".format(
458 start
, end
-1, indata_len
), HTTPStatus
.REQUESTED_RANGE_NOT_SATISFIABLE
)
460 # TODO update to UPLOADING
467 chunk_data
= file_pkg
.read(1024)
469 file_md5
.update(chunk_data
)
470 chunk_data
= file_pkg
.read(1024)
471 if expected_md5
!= file_md5
.hexdigest():
472 raise EngineException("Error, MD5 mismatch", HTTPStatus
.CONFLICT
)
474 if compressed
== "gzip":
475 tar
= tarfile
.open(mode
='r', fileobj
=file_pkg
)
476 descriptor_file_name
= None
478 tarname
= tarinfo
.name
479 tarname_path
= tarname
.split("/")
480 if not tarname_path
[0] or ".." in tarname_path
: # if start with "/" means absolute path
481 raise EngineException("Absolute path or '..' are not allowed for package descriptor tar.gz")
482 if len(tarname_path
) == 1 and not tarinfo
.isdir():
483 raise EngineException("All files must be inside a dir for package descriptor tar.gz")
484 if tarname
.endswith(".yaml") or tarname
.endswith(".json") or tarname
.endswith(".yml"):
485 storage
["pkg-dir"] = tarname_path
[0]
486 if len(tarname_path
) == 2:
487 if descriptor_file_name
:
488 raise EngineException(
489 "Found more than one descriptor file at package descriptor tar.gz")
490 descriptor_file_name
= tarname
491 if not descriptor_file_name
:
492 raise EngineException("Not found any descriptor file at package descriptor tar.gz")
493 storage
["descriptor"] = descriptor_file_name
494 storage
["zipfile"] = filename
495 self
.fs
.file_extract(tar
, _id
)
496 with self
.fs
.file_open((_id
, descriptor_file_name
), "r") as descriptor_file
:
497 content
= descriptor_file
.read()
499 content
= file_pkg
.read()
500 storage
["descriptor"] = descriptor_file_name
= filename
502 if descriptor_file_name
.endswith(".json"):
503 error_text
= "Invalid json format "
504 indata
= json
.load(content
)
506 error_text
= "Invalid yaml format "
507 indata
= yaml
.load(content
)
509 current_desc
["_admin"]["storage"] = storage
510 current_desc
["_admin"]["onboardingState"] = "ONBOARDED"
511 current_desc
["_admin"]["operationalState"] = "ENABLED"
513 self
._edit
_item
(session
, item
, _id
, current_desc
, indata
, kwargs
)
514 # TODO if descriptor has changed because kwargs update content and remove cached zip
515 # TODO if zip is not present creates one
518 except EngineException
:
521 raise EngineException("invalid Content-Range header format. Expected 'bytes start-end/total'",
522 HTTPStatus
.REQUESTED_RANGE_NOT_SATISFIABLE
)
524 raise EngineException("invalid upload transaction sequence: '{}'".format(e
), HTTPStatus
.BAD_REQUEST
)
525 except tarfile
.ReadError
as e
:
526 raise EngineException("invalid file content {}".format(e
), HTTPStatus
.BAD_REQUEST
)
527 except (ValueError, yaml
.YAMLError
) as e
:
528 raise EngineException(error_text
+ str(e
))
533 def new_nsr(self
, session
, ns_request
):
535 Creates a new nsr into database. It also creates needed vnfrs
536 :param session: contains the used login username and working project
537 :param ns_request: params to be used for the nsr
538 :return: the _id of nsr descriptor stored at database
544 step
= "getting nsd id='{}' from database".format(ns_request
.get("nsdId"))
545 nsd
= self
.get_item(session
, "nsds", ns_request
["nsdId"])
546 nsr_id
= str(uuid4())
548 step
= "filling nsr from input data"
550 "name": ns_request
["nsName"],
551 "name-ref": ns_request
["nsName"],
552 "short-name": ns_request
["nsName"],
553 "admin-status": "ENABLED",
555 "datacenter": ns_request
["vimAccountId"],
556 "resource-orchestrator": "osmopenmano",
557 "description": ns_request
.get("nsDescription", ""),
558 "constituent-vnfr-ref": [],
560 "operational-status": "init", # typedef ns-operational-
561 "config-status": "init", # typedef config-states
562 "detailed-status": "scheduled",
564 "orchestration-progress": {},
565 # {"networks": {"active": 0, "total": 0}, "vms": {"active": 0, "total": 0}},
568 "nsd-name-ref": nsd
["name"],
569 "operational-events": [], # "id", "timestamp", "description", "event",
570 "nsd-ref": nsd
["id"],
571 "instantiate_params": ns_request
,
572 "ns-instance-config-ref": nsr_id
,
575 # "input-parameter": xpath, value,
576 "ssh-authorized-key": ns_request
.get("key-pair-ref"),
578 ns_request
["nsr_id"] = nsr_id
582 for member_vnf
in nsd
["constituent-vnfd"]:
583 vnfd_id
= member_vnf
["vnfd-id-ref"]
584 step
= "getting vnfd id='{}' constituent-vnfd='{}' from database".format(
585 member_vnf
["vnfd-id-ref"], member_vnf
["member-vnf-index"])
586 if vnfd_id
not in needed_vnfds
:
588 vnf_filter
= {"id": vnfd_id
}
589 self
._add
_read
_filter
(session
, "vnfds", vnf_filter
)
590 vnfd
= self
.db
.get_one("vnfds", vnf_filter
)
592 needed_vnfds
[vnfd_id
] = vnfd
594 vnfd
= needed_vnfds
[vnfd_id
]
595 step
= "filling vnfr vnfd-id='{}' constituent-vnfd='{}'".format(
596 member_vnf
["vnfd-id-ref"], member_vnf
["member-vnf-index"])
597 vnfr_id
= str(uuid4())
601 "nsr-id-ref": nsr_id
,
602 "member-vnf-index-ref": member_vnf
["member-vnf-index"],
604 # "vnfd": vnfd, # at OSM model.but removed to avoid data duplication TODO: revise
606 "vnfd-id": vnfd
["_id"], # not at OSM model, but useful
607 "vim-account-id": None,
609 "connection-point": [],
610 "ip-address": None, # mgmt-interface filled by LCM
612 for cp
in vnfd
.get("connection-point", ()):
615 "connection-point-id": cp
.get("id"),
617 # "ip-address", "mac-address" # filled by LCM
618 # vim-id # TODO it would be nice having a vim port id
620 vnfr_descriptor
["connection-point"].append(vnf_cp
)
621 for vdu
in vnfd
["vdu"]:
622 vdur_id
= str(uuid4())
625 "vdu-id-ref": vdu
["id"],
626 "ip-address": None, # mgmt-interface filled by LCM
627 # "vim-id", "flavor-id", "image-id", "management-ip" # filled by LCM
628 "internal-connection-point": [],
630 # TODO volumes: name, volume-id
631 for icp
in vdu
.get("internal-connection-point", ()):
634 "connection-point-id": icp
["id"],
635 "name": icp
.get("name"),
636 # "ip-address", "mac-address" # filled by LCM
637 # vim-id # TODO it would be nice having a vim port id
639 vdur
["internal-connection-point"].append(vdu_icp
)
640 vnfr_descriptor
["vdur"].append(vdur
)
642 step
= "creating vnfr vnfd-id='{}' constituent-vnfd='{}' at database".format(
643 member_vnf
["vnfd-id-ref"], member_vnf
["member-vnf-index"])
644 self
._format
_new
_data
(session
, "vnfrs", vnfr_descriptor
)
645 self
.db
.create("vnfrs", vnfr_descriptor
)
646 rollback
.append({"session": session
, "item": "vnfrs", "_id": vnfr_id
, "force": True})
647 nsr_descriptor
["constituent-vnfr-ref"].append(vnfr_id
)
649 step
= "creating nsr at database"
650 self
._format
_new
_data
(session
, "nsrs", nsr_descriptor
)
651 self
.db
.create("nsrs", nsr_descriptor
)
653 except Exception as e
:
654 raise EngineException("Error {}: {}".format(step
, e
))
655 for rollback_item
in rollback
:
657 self
.engine
.del_item(**rollback
)
658 except Exception as e2
:
659 self
.logger
.error("Rollback Exception {}: {}".format(rollback
, e2
))
662 def _update_descriptor(desc
, kwargs
):
664 Update descriptor with the kwargs. It contains dot separated keys
665 :param desc: dictionary to be updated
666 :param kwargs: plain dictionary to be used for updating.
672 for k
, v
in kwargs
.items():
673 update_content
= desc
677 if kitem_old
is not None:
678 update_content
= update_content
[kitem_old
]
679 if isinstance(update_content
, dict):
681 elif isinstance(update_content
, list):
682 kitem_old
= int(kitem
)
684 raise EngineException(
685 "Invalid query string '{}'. Descriptor is not a list nor dict at '{}'".format(k
, kitem
))
686 update_content
[kitem_old
] = v
688 raise EngineException(
689 "Invalid query string '{}'. Descriptor does not contain '{}'".format(k
, kitem_old
))
691 raise EngineException("Invalid query string '{}'. Expected integer index list instead of '{}'".format(
694 raise EngineException(
695 "Invalid query string '{}'. Index '{}' out of range".format(k
, kitem_old
))
697 def new_item(self
, session
, item
, indata
={}, kwargs
=None, headers
={}, force
=False):
699 Creates a new entry into database. For nsds and vnfds it creates an almost empty DISABLED entry,
700 that must be completed with a call to method upload_content
701 :param session: contains the used login username and working project
702 :param item: it can be: users, projects, vim_accounts, sdns, nsrs, nsds, vnfds
703 :param indata: data to be inserted
704 :param kwargs: used to override the indata descriptor
705 :param headers: http request headers
706 :param force: If True avoid some dependence checks
707 :return: _id: identity of the inserted data.
712 if item
in ("nsds", "vnfds"):
713 item_envelop
= "userDefinedData"
714 content
= self
._remove
_envelop
(item_envelop
, indata
)
716 # Override descriptor with query string kwargs
717 self
._update
_descriptor
(content
, kwargs
)
718 if not indata
and item
not in ("nsds", "vnfds"):
719 raise EngineException("Empty payload")
721 validate_input(content
, item
, new
=True)
724 # in this case the input descriptor is not the data to be stored
725 return self
.new_nsr(session
, ns_request
=content
)
727 self
._validate
_new
_data
(session
, item_envelop
, content
, force
)
728 if item
in ("nsds", "vnfds"):
729 content
= {"_admin": {"userDefinedData": content
}}
730 self
._format
_new
_data
(session
, item
, content
)
731 _id
= self
.db
.create(item
, content
)
733 if item
== "vim_accounts":
734 msg_data
= self
.db
.get_one(item
, {"_id": _id
})
735 msg_data
.pop("_admin", None)
736 self
.msg
.write("vim_account", "create", msg_data
)
738 msg_data
= self
.db
.get_one(item
, {"_id": _id
})
739 msg_data
.pop("_admin", None)
740 self
.msg
.write("sdn", "create", msg_data
)
742 except ValidationError
as e
:
743 raise EngineException(e
, HTTPStatus
.UNPROCESSABLE_ENTITY
)
745 def new_nslcmop(self
, session
, nsInstanceId
, operation
, params
):
751 "operationState": "PROCESSING", # COMPLETED,PARTIALLY_COMPLETED,FAILED_TEMP,FAILED,ROLLING_BACK,ROLLED_BACK
752 "statusEnteredTime": now
,
753 "nsInstanceId": nsInstanceId
,
754 "lcmOperationType": operation
,
756 "isAutomaticInvocation": False,
757 "operationParams": params
,
758 "isCancelPending": False,
760 "self": "/osm/nslcm/v1/ns_lcm_op_occs/" + _id
,
761 "nsInstance": "/osm/nslcm/v1/ns_instances/" + nsInstanceId
,
766 def ns_operation(self
, session
, nsInstanceId
, operation
, indata
, kwargs
=None):
768 Performs a new operation over a ns
769 :param session: contains the used login username and working project
770 :param nsInstanceId: _id of the nsr to perform the operation
771 :param operation: it can be: instantiate, terminate, action, TODO: update, heal
772 :param indata: descriptor with the parameters of the operation
773 :param kwargs: used to override the indata descriptor
774 :return: id of the nslcmops
777 # Override descriptor with query string kwargs
778 self
._update
_descriptor
(indata
, kwargs
)
779 validate_input(indata
, "ns_" + operation
, new
=True)
781 nsr
= self
.get_item(session
, "nsrs", nsInstanceId
)
782 if not nsr
["_admin"].get("nsState") or nsr
["_admin"]["nsState"] == "NOT_INSTANTIATED":
783 if operation
== "terminate" and indata
.get("autoremove"):
784 # NSR must be deleted
785 return self
.del_item(session
, "nsrs", nsInstanceId
)
786 if operation
!= "instantiate":
787 raise EngineException("ns_instance '{}' cannot be '{}' because it is not instantiated".format(
788 nsInstanceId
, operation
), HTTPStatus
.CONFLICT
)
790 if operation
== "instantiate" and not indata
.get("force"):
791 raise EngineException("ns_instance '{}' cannot be '{}' because it is already instantiated".format(
792 nsInstanceId
, operation
), HTTPStatus
.CONFLICT
)
793 indata
["nsInstanceId"] = nsInstanceId
794 self
._check
_ns
_operation
(session
, nsr
, operation
, indata
)
795 nslcmop
= self
.new_nslcmop(session
, nsInstanceId
, operation
, indata
)
796 self
._format
_new
_data
(session
, "nslcmops", nslcmop
)
797 _id
= self
.db
.create("nslcmops", nslcmop
)
799 self
.msg
.write("ns", operation
, nslcmop
)
801 except ValidationError
as e
:
802 raise EngineException(e
, HTTPStatus
.UNPROCESSABLE_ENTITY
)
803 # except DbException as e:
804 # raise EngineException("Cannot get ns_instance '{}': {}".format(e), HTTPStatus.NOT_FOUND)
806 def _add_read_filter(self
, session
, item
, filter):
807 if session
["project_id"] == "admin": # allows all
810 filter["username"] = session
["username"]
811 elif item
in ("vnfds", "nsds", "nsrs"):
812 filter["_admin.projects_read.cont"] = ["ANY", session
["project_id"]]
814 def _add_delete_filter(self
, session
, item
, filter):
815 if session
["project_id"] != "admin" and item
in ("users", "projects"):
816 raise EngineException("Only admin users can perform this task", http_code
=HTTPStatus
.FORBIDDEN
)
818 if filter.get("_id") == session
["username"] or filter.get("username") == session
["username"]:
819 raise EngineException("You cannot delete your own user", http_code
=HTTPStatus
.CONFLICT
)
820 elif item
== "project":
821 if filter.get("_id") == session
["project_id"]:
822 raise EngineException("You cannot delete your own project", http_code
=HTTPStatus
.CONFLICT
)
823 elif item
in ("vnfds", "nsds") and session
["project_id"] != "admin":
824 filter["_admin.projects_write.cont"] = ["ANY", session
["project_id"]]
826 def get_file(self
, session
, item
, _id
, path
=None, accept_header
=None):
828 Return the file content of a vnfd or nsd
829 :param session: contains the used login username and working project
830 :param item: it can be vnfds or nsds
831 :param _id: Identity of the vnfd, ndsd
832 :param path: artifact path or "$DESCRIPTOR" or None
833 :param accept_header: Content of Accept header. Must contain applition/zip or/and text/plain
834 :return: opened file or raises an exception
836 accept_text
= accept_zip
= False
838 if 'text/plain' in accept_header
or '*/*' in accept_header
:
840 if 'application/zip' in accept_header
or '*/*' in accept_header
:
842 if not accept_text
and not accept_zip
:
843 raise EngineException("provide request header 'Accept' with 'application/zip' or 'text/plain'",
844 http_code
=HTTPStatus
.NOT_ACCEPTABLE
)
846 content
= self
.get_item(session
, item
, _id
)
847 if content
["_admin"]["onboardingState"] != "ONBOARDED":
848 raise EngineException("Cannot get content because this resource is not at 'ONBOARDED' state. "
849 "onboardingState is {}".format(content
["_admin"]["onboardingState"]),
850 http_code
=HTTPStatus
.CONFLICT
)
851 storage
= content
["_admin"]["storage"]
852 if path
is not None and path
!= "$DESCRIPTOR": # artifacts
853 if not storage
.get('pkg-dir'):
854 raise EngineException("Packages does not contains artifacts", http_code
=HTTPStatus
.BAD_REQUEST
)
855 if self
.fs
.file_exists((storage
['folder'], storage
['pkg-dir'], *path
), 'dir'):
856 folder_content
= self
.fs
.dir_ls((storage
['folder'], storage
['pkg-dir'], *path
))
857 return folder_content
, "text/plain"
858 # TODO manage folders in http
860 return self
.fs
.file_open((storage
['folder'], storage
['pkg-dir'], *path
), "rb"),\
861 "application/octet-stream"
863 # pkgtype accept ZIP TEXT -> result
864 # manyfiles yes X -> zip
866 # onefile yes no -> zip
869 if accept_text
and (not storage
.get('pkg-dir') or path
== "$DESCRIPTOR"):
870 return self
.fs
.file_open((storage
['folder'], storage
['descriptor']), "r"), "text/plain"
871 elif storage
.get('pkg-dir') and not accept_zip
:
872 raise EngineException("Packages that contains several files need to be retrieved with 'application/zip'"
873 "Accept header", http_code
=HTTPStatus
.NOT_ACCEPTABLE
)
875 if not storage
.get('zipfile'):
876 # TODO generate zipfile if not present
877 raise EngineException("Only allowed 'text/plain' Accept header for this descriptor. To be solved in "
878 "future versions", http_code
=HTTPStatus
.NOT_ACCEPTABLE
)
879 return self
.fs
.file_open((storage
['folder'], storage
['zipfile']), "rb"), "application/zip"
881 def get_item_list(self
, session
, item
, filter={}):
884 :param session: contains the used login username and working project
885 :param item: it can be: users, projects, vnfds, nsds, ...
886 :param filter: filter of data to be applied
887 :return: The list, it can be empty if no one match the filter.
889 # TODO add admin to filter, validate rights
890 # TODO transform data for SOL005 URL requests. Transform filtering
891 # TODO implement "field-type" query string SOL005
893 self
._add
_read
_filter
(session
, item
, filter)
894 return self
.db
.get_list(item
, filter)
896 def get_item(self
, session
, item
, _id
):
898 Get complete information on an items
899 :param session: contains the used login username and working project
900 :param item: it can be: users, projects, vnfds, nsds,
901 :param _id: server id of the item
902 :return: dictionary, raise exception if not found.
904 filter = {"_id": _id
}
905 # TODO add admin to filter, validate rights
906 # TODO transform data for SOL005 URL requests
907 self
._add
_read
_filter
(session
, item
, filter)
908 return self
.db
.get_one(item
, filter)
910 def del_item_list(self
, session
, item
, filter={}):
912 Delete a list of items
913 :param session: contains the used login username and working project
914 :param item: it can be: users, projects, vnfds, nsds, ...
915 :param filter: filter of data to be applied
916 :return: The deleted list, it can be empty if no one match the filter.
918 # TODO add admin to filter, validate rights
919 self
._add
_read
_filter
(session
, item
, filter)
920 return self
.db
.del_list(item
, filter)
922 def del_item(self
, session
, item
, _id
, force
=False):
924 Delete item by its internal id
925 :param session: contains the used login username and working project
926 :param item: it can be: users, projects, vnfds, nsds, ...
927 :param _id: server id of the item
928 :param force: indicates if deletion must be forced in case of conflict
929 :return: dictionary with deleted item _id. It raises exception if not found.
931 # TODO add admin to filter, validate rights
932 # data = self.get_item(item, _id)
933 filter = {"_id": _id
}
934 self
._add
_delete
_filter
(session
, item
, filter)
935 if item
in ("vnfds", "nsds") and not force
:
936 descriptor
= self
.get_item(session
, item
, _id
)
937 descriptor_id
= descriptor
.get("id")
939 self
._check
_dependencies
_on
_descriptor
(session
, item
, descriptor_id
)
942 nsr
= self
.db
.get_one(item
, filter)
943 if nsr
["_admin"].get("nsState") == "INSTANTIATED" and not force
:
944 raise EngineException("nsr '{}' cannot be deleted because it is in 'INSTANTIATED' state. "
945 "Launch 'terminate' operation first; or force deletion".format(_id
),
946 http_code
=HTTPStatus
.CONFLICT
)
947 v
= self
.db
.del_one(item
, {"_id": _id
})
948 self
.db
.del_list("nslcmops", {"nsInstanceId": _id
})
949 self
.db
.del_list("vnfrs", {"nsr-id-ref": _id
})
950 self
.msg
.write("ns", "deleted", {"_id": _id
})
952 if item
in ("vim_accounts", "sdns") and not force
:
953 self
.db
.set_one(item
, {"_id": _id
}, {"_admin.to_delete": True}) # TODO change status
954 if item
== "vim_accounts":
955 self
.msg
.write("vim_account", "delete", {"_id": _id
})
957 self
.msg
.write("sdn", "delete", {"_id": _id
})
958 return {"deleted": 1} # TODO indicate an offline operation to return 202 ACCEPTED
960 v
= self
.db
.del_one(item
, filter)
961 if item
in ("vnfds", "nsds"):
962 self
.fs
.file_delete(_id
, ignore_non_exist
=True)
963 if item
in ("vim_accounts", "sdns", "vnfds", "nsds"):
964 self
.msg
.write(item
[:-1], "deleted", {"_id": _id
})
969 Prune database not needed content
972 return self
.db
.del_list("nsrs", {"_admin.to_delete": True})
974 def create_admin(self
):
976 Creates a new user admin/admin into database if database is empty. Useful for initialization
977 :return: _id identity of the inserted data, or None
979 users
= self
.db
.get_one("users", fail_on_empty
=False, fail_on_more
=False)
982 # raise EngineException("Unauthorized. Database users is not empty", HTTPStatus.UNAUTHORIZED)
983 indata
= {"username": "admin", "password": "admin", "projects": ["admin"]}
984 fake_session
= {"project_id": "admin", "username": "admin"}
985 self
._format
_new
_data
(fake_session
, "users", indata
)
986 _id
= self
.db
.create("users", indata
)
989 def init_db(self
, target_version
='1.0'):
991 Init database if empty. If not empty it checks that database version is ok.
992 If empty, it creates a new user admin/admin at 'users' and a new entry at 'version'
993 :return: None if ok, exception if error or if the version is different.
995 version
= self
.db
.get_one("version", fail_on_empty
=False, fail_on_more
=False)
999 # create database version
1001 "_id": '1.0', # version text
1002 "version": 1000, # version number
1003 "date": "2018-04-12", # version date
1004 "description": "initial design", # changes in this version
1005 'status': 'ENABLED' # ENABLED, DISABLED (migration in process), ERROR,
1007 self
.db
.create("version", version_data
)
1008 elif version
["_id"] != target_version
:
1009 # TODO implement migration process
1010 raise EngineException("Wrong database version '{}'. Expected '{}'".format(
1011 version
["_id"], target_version
), HTTPStatus
.INTERNAL_SERVER_ERROR
)
1012 elif version
["status"] != 'ENABLED':
1013 raise EngineException("Wrong database status '{}'".format(
1014 version
["status"]), HTTPStatus
.INTERNAL_SERVER_ERROR
)
1017 def _edit_item(self
, session
, item
, id, content
, indata
={}, kwargs
=None, force
=False):
1019 indata
= self
._remove
_envelop
(item
, indata
)
1021 # Override descriptor with query string kwargs
1024 for k
, v
in kwargs
.items():
1025 update_content
= indata
1027 klist
= k
.split(".")
1029 if kitem_old
is not None:
1030 update_content
= update_content
[kitem_old
]
1031 if isinstance(update_content
, dict):
1033 elif isinstance(update_content
, list):
1034 kitem_old
= int(kitem
)
1036 raise EngineException(
1037 "Invalid query string '{}'. Descriptor is not a list nor dict at '{}'".format(k
, kitem
))
1038 update_content
[kitem_old
] = v
1040 raise EngineException(
1041 "Invalid query string '{}'. Descriptor does not contain '{}'".format(k
, kitem_old
))
1043 raise EngineException("Invalid query string '{}'. Expected integer index list instead of '{}'".format(
1046 raise EngineException(
1047 "Invalid query string '{}'. Index '{}' out of range".format(k
, kitem_old
))
1049 validate_input(indata
, item
, new
=False)
1050 except ValidationError
as e
:
1051 raise EngineException(e
, HTTPStatus
.UNPROCESSABLE_ENTITY
)
1053 _deep_update(content
, indata
)
1054 self
._validate
_new
_data
(session
, item
, content
, id, force
)
1055 # self._format_new_data(session, item, content)
1056 self
.db
.replace(item
, id, content
)
1057 if item
in ("vim_accounts", "sdns"):
1058 indata
.pop("_admin", None)
1060 if item
== "vim_accounts":
1061 self
.msg
.write("vim_account", "edit", indata
)
1062 elif item
== "sdns":
1063 self
.msg
.write("sdn", "edit", indata
)
1066 def edit_item(self
, session
, item
, _id
, indata
={}, kwargs
=None, force
=False):
1068 Update an existing entry at database
1069 :param session: contains the used login username and working project
1070 :param item: it can be: users, projects, vnfds, nsds, ...
1071 :param _id: identifier to be updated
1072 :param indata: data to be inserted
1073 :param kwargs: used to override the indata descriptor
1074 :param force: If True avoid some dependence checks
1075 :return: dictionary, raise exception if not found.
1078 content
= self
.get_item(session
, item
, _id
)
1079 return self
._edit
_item
(session
, item
, _id
, content
, indata
, kwargs
, force
)