4869da163bb1868d6a4eb158cf878d1d9df5fbad
[osm/RO.git] / RO-VIM-openstack / osm_rovim_openstack / vimconn_openstack.py
1 # -*- coding: utf-8 -*-
2
3 ##
4 # Copyright 2015 Telefonica Investigacion y Desarrollo, S.A.U.
5 # This file is part of openmano
6 # All Rights Reserved.
7 #
8 # Licensed under the Apache License, Version 2.0 (the "License"); you may
9 # not use this file except in compliance with the License. You may obtain
10 # a copy of the License at
11 #
12 # http://www.apache.org/licenses/LICENSE-2.0
13 #
14 # Unless required by applicable law or agreed to in writing, software
15 # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
17 # License for the specific language governing permissions and limitations
18 # under the License.
19 ##
20
21 """
22 osconnector implements all the methods to interact with openstack using the python-neutronclient.
23
24 For the VNF forwarding graph, The OpenStack VIM connector calls the
25 networking-sfc Neutron extension methods, whose resources are mapped
26 to the VIM connector's SFC resources as follows:
27 - Classification (OSM) -> Flow Classifier (Neutron)
28 - Service Function Instance (OSM) -> Port Pair (Neutron)
29 - Service Function (OSM) -> Port Pair Group (Neutron)
30 - Service Function Path (OSM) -> Port Chain (Neutron)
31 """
32
33 from osm_ro_plugin import vimconn
34
35 # import json
36 import logging
37 import netaddr
38 import time
39 import yaml
40 import random
41 import re
42 import copy
43 from pprint import pformat
44 from novaclient import client as nClient, exceptions as nvExceptions
45 from keystoneauth1.identity import v2, v3
46 from keystoneauth1 import session
47 import keystoneclient.exceptions as ksExceptions
48 import keystoneclient.v3.client as ksClient_v3
49 import keystoneclient.v2_0.client as ksClient_v2
50 from glanceclient import client as glClient
51 import glanceclient.exc as gl1Exceptions
52 from cinderclient import client as cClient
53
54 # TODO py3 check that this base exception matches python2 httplib.HTTPException
55 from http.client import HTTPException
56 from neutronclient.neutron import client as neClient
57 from neutronclient.common import exceptions as neExceptions
58 from requests.exceptions import ConnectionError
59
60 __author__ = "Alfonso Tierno, Gerardo Garcia, Pablo Montes, xFlow Research, Igor D.C., Eduardo Sousa"
61 __date__ = "$22-sep-2017 23:59:59$"
62
63 """contain the openstack virtual machine status to openmano status"""
64 vmStatus2manoFormat = {
65 "ACTIVE": "ACTIVE",
66 "PAUSED": "PAUSED",
67 "SUSPENDED": "SUSPENDED",
68 "SHUTOFF": "INACTIVE",
69 "BUILD": "BUILD",
70 "ERROR": "ERROR",
71 "DELETED": "DELETED",
72 }
73 netStatus2manoFormat = {
74 "ACTIVE": "ACTIVE",
75 "PAUSED": "PAUSED",
76 "INACTIVE": "INACTIVE",
77 "BUILD": "BUILD",
78 "ERROR": "ERROR",
79 "DELETED": "DELETED",
80 }
81
82 supportedClassificationTypes = ["legacy_flow_classifier"]
83
84 # global var to have a timeout creating and deleting volumes
85 volume_timeout = 1800
86 server_timeout = 1800
87
88
89 class SafeDumper(yaml.SafeDumper):
90 def represent_data(self, data):
91 # Openstack APIs use custom subclasses of dict and YAML safe dumper
92 # is designed to not handle that (reference issue 142 of pyyaml)
93 if isinstance(data, dict) and data.__class__ != dict:
94 # A simple solution is to convert those items back to dicts
95 data = dict(data.items())
96
97 return super(SafeDumper, self).represent_data(data)
98
99
100 class vimconnector(vimconn.VimConnector):
101 def __init__(
102 self,
103 uuid,
104 name,
105 tenant_id,
106 tenant_name,
107 url,
108 url_admin=None,
109 user=None,
110 passwd=None,
111 log_level=None,
112 config={},
113 persistent_info={},
114 ):
115 """using common constructor parameters. In this case
116 'url' is the keystone authorization url,
117 'url_admin' is not use
118 """
119 api_version = config.get("APIversion")
120
121 if api_version and api_version not in ("v3.3", "v2.0", "2", "3"):
122 raise vimconn.VimConnException(
123 "Invalid value '{}' for config:APIversion. "
124 "Allowed values are 'v3.3', 'v2.0', '2' or '3'".format(api_version)
125 )
126
127 vim_type = config.get("vim_type")
128
129 if vim_type and vim_type not in ("vio", "VIO"):
130 raise vimconn.VimConnException(
131 "Invalid value '{}' for config:vim_type."
132 "Allowed values are 'vio' or 'VIO'".format(vim_type)
133 )
134
135 if config.get("dataplane_net_vlan_range") is not None:
136 # validate vlan ranges provided by user
137 self._validate_vlan_ranges(
138 config.get("dataplane_net_vlan_range"), "dataplane_net_vlan_range"
139 )
140
141 if config.get("multisegment_vlan_range") is not None:
142 # validate vlan ranges provided by user
143 self._validate_vlan_ranges(
144 config.get("multisegment_vlan_range"), "multisegment_vlan_range"
145 )
146
147 vimconn.VimConnector.__init__(
148 self,
149 uuid,
150 name,
151 tenant_id,
152 tenant_name,
153 url,
154 url_admin,
155 user,
156 passwd,
157 log_level,
158 config,
159 )
160
161 if self.config.get("insecure") and self.config.get("ca_cert"):
162 raise vimconn.VimConnException(
163 "options insecure and ca_cert are mutually exclusive"
164 )
165
166 self.verify = True
167
168 if self.config.get("insecure"):
169 self.verify = False
170
171 if self.config.get("ca_cert"):
172 self.verify = self.config.get("ca_cert")
173
174 if not url:
175 raise TypeError("url param can not be NoneType")
176
177 self.persistent_info = persistent_info
178 self.availability_zone = persistent_info.get("availability_zone", None)
179 self.session = persistent_info.get("session", {"reload_client": True})
180 self.my_tenant_id = self.session.get("my_tenant_id")
181 self.nova = self.session.get("nova")
182 self.neutron = self.session.get("neutron")
183 self.cinder = self.session.get("cinder")
184 self.glance = self.session.get("glance")
185 # self.glancev1 = self.session.get("glancev1")
186 self.keystone = self.session.get("keystone")
187 self.api_version3 = self.session.get("api_version3")
188 self.vim_type = self.config.get("vim_type")
189
190 if self.vim_type:
191 self.vim_type = self.vim_type.upper()
192
193 if self.config.get("use_internal_endpoint"):
194 self.endpoint_type = "internalURL"
195 else:
196 self.endpoint_type = None
197
198 logging.getLogger("urllib3").setLevel(logging.WARNING)
199 logging.getLogger("keystoneauth").setLevel(logging.WARNING)
200 logging.getLogger("novaclient").setLevel(logging.WARNING)
201 self.logger = logging.getLogger("ro.vim.openstack")
202
203 # allow security_groups to be a list or a single string
204 if isinstance(self.config.get("security_groups"), str):
205 self.config["security_groups"] = [self.config["security_groups"]]
206
207 self.security_groups_id = None
208
209 # ###### VIO Specific Changes #########
210 if self.vim_type == "VIO":
211 self.logger = logging.getLogger("ro.vim.vio")
212
213 if log_level:
214 self.logger.setLevel(getattr(logging, log_level))
215
216 def __getitem__(self, index):
217 """Get individuals parameters.
218 Throw KeyError"""
219 if index == "project_domain_id":
220 return self.config.get("project_domain_id")
221 elif index == "user_domain_id":
222 return self.config.get("user_domain_id")
223 else:
224 return vimconn.VimConnector.__getitem__(self, index)
225
226 def __setitem__(self, index, value):
227 """Set individuals parameters and it is marked as dirty so to force connection reload.
228 Throw KeyError"""
229 if index == "project_domain_id":
230 self.config["project_domain_id"] = value
231 elif index == "user_domain_id":
232 self.config["user_domain_id"] = value
233 else:
234 vimconn.VimConnector.__setitem__(self, index, value)
235
236 self.session["reload_client"] = True
237
238 def serialize(self, value):
239 """Serialization of python basic types.
240
241 In the case value is not serializable a message will be logged and a
242 simple representation of the data that cannot be converted back to
243 python is returned.
244 """
245 if isinstance(value, str):
246 return value
247
248 try:
249 return yaml.dump(
250 value, Dumper=SafeDumper, default_flow_style=True, width=256
251 )
252 except yaml.representer.RepresenterError:
253 self.logger.debug(
254 "The following entity cannot be serialized in YAML:\n\n%s\n\n",
255 pformat(value),
256 exc_info=True,
257 )
258
259 return str(value)
260
261 def _reload_connection(self):
262 """Called before any operation, it check if credentials has changed
263 Throw keystoneclient.apiclient.exceptions.AuthorizationFailure
264 """
265 # TODO control the timing and possible token timeout, but it seams that python client does this task for us :-)
266 if self.session["reload_client"]:
267 if self.config.get("APIversion"):
268 self.api_version3 = (
269 self.config["APIversion"] == "v3.3"
270 or self.config["APIversion"] == "3"
271 )
272 else: # get from ending auth_url that end with v3 or with v2.0
273 self.api_version3 = self.url.endswith("/v3") or self.url.endswith(
274 "/v3/"
275 )
276
277 self.session["api_version3"] = self.api_version3
278
279 if self.api_version3:
280 if self.config.get("project_domain_id") or self.config.get(
281 "project_domain_name"
282 ):
283 project_domain_id_default = None
284 else:
285 project_domain_id_default = "default"
286
287 if self.config.get("user_domain_id") or self.config.get(
288 "user_domain_name"
289 ):
290 user_domain_id_default = None
291 else:
292 user_domain_id_default = "default"
293 auth = v3.Password(
294 auth_url=self.url,
295 username=self.user,
296 password=self.passwd,
297 project_name=self.tenant_name,
298 project_id=self.tenant_id,
299 project_domain_id=self.config.get(
300 "project_domain_id", project_domain_id_default
301 ),
302 user_domain_id=self.config.get(
303 "user_domain_id", user_domain_id_default
304 ),
305 project_domain_name=self.config.get("project_domain_name"),
306 user_domain_name=self.config.get("user_domain_name"),
307 )
308 else:
309 auth = v2.Password(
310 auth_url=self.url,
311 username=self.user,
312 password=self.passwd,
313 tenant_name=self.tenant_name,
314 tenant_id=self.tenant_id,
315 )
316
317 sess = session.Session(auth=auth, verify=self.verify)
318 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
319 # Titanium cloud and StarlingX
320 region_name = self.config.get("region_name")
321
322 if self.api_version3:
323 self.keystone = ksClient_v3.Client(
324 session=sess,
325 endpoint_type=self.endpoint_type,
326 region_name=region_name,
327 )
328 else:
329 self.keystone = ksClient_v2.Client(
330 session=sess, endpoint_type=self.endpoint_type
331 )
332
333 self.session["keystone"] = self.keystone
334 # In order to enable microversion functionality an explicit microversion must be specified in "config".
335 # This implementation approach is due to the warning message in
336 # https://developer.openstack.org/api-guide/compute/microversions.html
337 # where it is stated that microversion backwards compatibility is not guaranteed and clients should
338 # always require an specific microversion.
339 # To be able to use "device role tagging" functionality define "microversion: 2.32" in datacenter config
340 version = self.config.get("microversion")
341
342 if not version:
343 version = "2.1"
344
345 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
346 # Titanium cloud and StarlingX
347 self.nova = self.session["nova"] = nClient.Client(
348 str(version),
349 session=sess,
350 endpoint_type=self.endpoint_type,
351 region_name=region_name,
352 )
353 self.neutron = self.session["neutron"] = neClient.Client(
354 "2.0",
355 session=sess,
356 endpoint_type=self.endpoint_type,
357 region_name=region_name,
358 )
359 self.cinder = self.session["cinder"] = cClient.Client(
360 2,
361 session=sess,
362 endpoint_type=self.endpoint_type,
363 region_name=region_name,
364 )
365
366 try:
367 self.my_tenant_id = self.session["my_tenant_id"] = sess.get_project_id()
368 except Exception:
369 self.logger.error("Cannot get project_id from session", exc_info=True)
370
371 if self.endpoint_type == "internalURL":
372 glance_service_id = self.keystone.services.list(name="glance")[0].id
373 glance_endpoint = self.keystone.endpoints.list(
374 glance_service_id, interface="internal"
375 )[0].url
376 else:
377 glance_endpoint = None
378
379 self.glance = self.session["glance"] = glClient.Client(
380 2, session=sess, endpoint=glance_endpoint
381 )
382 # using version 1 of glance client in new_image()
383 # self.glancev1 = self.session["glancev1"] = glClient.Client("1", session=sess,
384 # endpoint=glance_endpoint)
385 self.session["reload_client"] = False
386 self.persistent_info["session"] = self.session
387 # add availablity zone info inside self.persistent_info
388 self._set_availablity_zones()
389 self.persistent_info["availability_zone"] = self.availability_zone
390 # force to get again security_groups_ids next time they are needed
391 self.security_groups_id = None
392
393 def __net_os2mano(self, net_list_dict):
394 """Transform the net openstack format to mano format
395 net_list_dict can be a list of dict or a single dict"""
396 if type(net_list_dict) is dict:
397 net_list_ = (net_list_dict,)
398 elif type(net_list_dict) is list:
399 net_list_ = net_list_dict
400 else:
401 raise TypeError("param net_list_dict must be a list or a dictionary")
402 for net in net_list_:
403 if net.get("provider:network_type") == "vlan":
404 net["type"] = "data"
405 else:
406 net["type"] = "bridge"
407
408 def __classification_os2mano(self, class_list_dict):
409 """Transform the openstack format (Flow Classifier) to mano format
410 (Classification) class_list_dict can be a list of dict or a single dict
411 """
412 if isinstance(class_list_dict, dict):
413 class_list_ = [class_list_dict]
414 elif isinstance(class_list_dict, list):
415 class_list_ = class_list_dict
416 else:
417 raise TypeError("param class_list_dict must be a list or a dictionary")
418 for classification in class_list_:
419 id = classification.pop("id")
420 name = classification.pop("name")
421 description = classification.pop("description")
422 project_id = classification.pop("project_id")
423 tenant_id = classification.pop("tenant_id")
424 original_classification = copy.deepcopy(classification)
425 classification.clear()
426 classification["ctype"] = "legacy_flow_classifier"
427 classification["definition"] = original_classification
428 classification["id"] = id
429 classification["name"] = name
430 classification["description"] = description
431 classification["project_id"] = project_id
432 classification["tenant_id"] = tenant_id
433
434 def __sfi_os2mano(self, sfi_list_dict):
435 """Transform the openstack format (Port Pair) to mano format (SFI)
436 sfi_list_dict can be a list of dict or a single dict
437 """
438 if isinstance(sfi_list_dict, dict):
439 sfi_list_ = [sfi_list_dict]
440 elif isinstance(sfi_list_dict, list):
441 sfi_list_ = sfi_list_dict
442 else:
443 raise TypeError("param sfi_list_dict must be a list or a dictionary")
444
445 for sfi in sfi_list_:
446 sfi["ingress_ports"] = []
447 sfi["egress_ports"] = []
448
449 if sfi.get("ingress"):
450 sfi["ingress_ports"].append(sfi["ingress"])
451
452 if sfi.get("egress"):
453 sfi["egress_ports"].append(sfi["egress"])
454
455 del sfi["ingress"]
456 del sfi["egress"]
457 params = sfi.get("service_function_parameters")
458 sfc_encap = False
459
460 if params:
461 correlation = params.get("correlation")
462
463 if correlation:
464 sfc_encap = True
465
466 sfi["sfc_encap"] = sfc_encap
467 del sfi["service_function_parameters"]
468
469 def __sf_os2mano(self, sf_list_dict):
470 """Transform the openstack format (Port Pair Group) to mano format (SF)
471 sf_list_dict can be a list of dict or a single dict
472 """
473 if isinstance(sf_list_dict, dict):
474 sf_list_ = [sf_list_dict]
475 elif isinstance(sf_list_dict, list):
476 sf_list_ = sf_list_dict
477 else:
478 raise TypeError("param sf_list_dict must be a list or a dictionary")
479
480 for sf in sf_list_:
481 del sf["port_pair_group_parameters"]
482 sf["sfis"] = sf["port_pairs"]
483 del sf["port_pairs"]
484
485 def __sfp_os2mano(self, sfp_list_dict):
486 """Transform the openstack format (Port Chain) to mano format (SFP)
487 sfp_list_dict can be a list of dict or a single dict
488 """
489 if isinstance(sfp_list_dict, dict):
490 sfp_list_ = [sfp_list_dict]
491 elif isinstance(sfp_list_dict, list):
492 sfp_list_ = sfp_list_dict
493 else:
494 raise TypeError("param sfp_list_dict must be a list or a dictionary")
495
496 for sfp in sfp_list_:
497 params = sfp.pop("chain_parameters")
498 sfc_encap = False
499
500 if params:
501 correlation = params.get("correlation")
502
503 if correlation:
504 sfc_encap = True
505
506 sfp["sfc_encap"] = sfc_encap
507 sfp["spi"] = sfp.pop("chain_id")
508 sfp["classifications"] = sfp.pop("flow_classifiers")
509 sfp["service_functions"] = sfp.pop("port_pair_groups")
510
511 # placeholder for now; read TODO note below
512 def _validate_classification(self, type, definition):
513 # only legacy_flow_classifier Type is supported at this point
514 return True
515 # TODO(igordcard): this method should be an abstract method of an
516 # abstract Classification class to be implemented by the specific
517 # Types. Also, abstract vimconnector should call the validation
518 # method before the implemented VIM connectors are called.
519
520 def _format_exception(self, exception):
521 """Transform a keystone, nova, neutron exception into a vimconn exception discovering the cause"""
522 message_error = str(exception)
523 tip = ""
524
525 if isinstance(
526 exception,
527 (
528 neExceptions.NetworkNotFoundClient,
529 nvExceptions.NotFound,
530 ksExceptions.NotFound,
531 gl1Exceptions.HTTPNotFound,
532 ),
533 ):
534 raise vimconn.VimConnNotFoundException(
535 type(exception).__name__ + ": " + message_error
536 )
537 elif isinstance(
538 exception,
539 (
540 HTTPException,
541 gl1Exceptions.HTTPException,
542 gl1Exceptions.CommunicationError,
543 ConnectionError,
544 ksExceptions.ConnectionError,
545 neExceptions.ConnectionFailed,
546 ),
547 ):
548 if type(exception).__name__ == "SSLError":
549 tip = " (maybe option 'insecure' must be added to the VIM)"
550
551 raise vimconn.VimConnConnectionException(
552 "Invalid URL or credentials{}: {}".format(tip, message_error)
553 )
554 elif isinstance(
555 exception,
556 (
557 KeyError,
558 nvExceptions.BadRequest,
559 ksExceptions.BadRequest,
560 ),
561 ):
562 raise vimconn.VimConnException(
563 type(exception).__name__ + ": " + message_error
564 )
565 elif isinstance(
566 exception,
567 (
568 nvExceptions.ClientException,
569 ksExceptions.ClientException,
570 neExceptions.NeutronException,
571 ),
572 ):
573 raise vimconn.VimConnUnexpectedResponse(
574 type(exception).__name__ + ": " + message_error
575 )
576 elif isinstance(exception, nvExceptions.Conflict):
577 raise vimconn.VimConnConflictException(
578 type(exception).__name__ + ": " + message_error
579 )
580 elif isinstance(exception, vimconn.VimConnException):
581 raise exception
582 else: # ()
583 self.logger.error("General Exception " + message_error, exc_info=True)
584
585 raise vimconn.VimConnConnectionException(
586 type(exception).__name__ + ": " + message_error
587 )
588
589 def _get_ids_from_name(self):
590 """
591 Obtain ids from name of tenant and security_groups. Store at self .security_groups_id"
592 :return: None
593 """
594 # get tenant_id if only tenant_name is supplied
595 self._reload_connection()
596
597 if not self.my_tenant_id:
598 raise vimconn.VimConnConnectionException(
599 "Error getting tenant information from name={} id={}".format(
600 self.tenant_name, self.tenant_id
601 )
602 )
603
604 if self.config.get("security_groups") and not self.security_groups_id:
605 # convert from name to id
606 neutron_sg_list = self.neutron.list_security_groups(
607 tenant_id=self.my_tenant_id
608 )["security_groups"]
609
610 self.security_groups_id = []
611 for sg in self.config.get("security_groups"):
612 for neutron_sg in neutron_sg_list:
613 if sg in (neutron_sg["id"], neutron_sg["name"]):
614 self.security_groups_id.append(neutron_sg["id"])
615 break
616 else:
617 self.security_groups_id = None
618
619 raise vimconn.VimConnConnectionException(
620 "Not found security group {} for this tenant".format(sg)
621 )
622
623 def check_vim_connectivity(self):
624 # just get network list to check connectivity and credentials
625 self.get_network_list(filter_dict={})
626
627 def get_tenant_list(self, filter_dict={}):
628 """Obtain tenants of VIM
629 filter_dict can contain the following keys:
630 name: filter by tenant name
631 id: filter by tenant uuid/id
632 <other VIM specific>
633 Returns the tenant list of dictionaries: [{'name':'<name>, 'id':'<id>, ...}, ...]
634 """
635 self.logger.debug("Getting tenants from VIM filter: '%s'", str(filter_dict))
636
637 try:
638 self._reload_connection()
639
640 if self.api_version3:
641 project_class_list = self.keystone.projects.list(
642 name=filter_dict.get("name")
643 )
644 else:
645 project_class_list = self.keystone.tenants.findall(**filter_dict)
646
647 project_list = []
648
649 for project in project_class_list:
650 if filter_dict.get("id") and filter_dict["id"] != project.id:
651 continue
652
653 project_list.append(project.to_dict())
654
655 return project_list
656 except (
657 ksExceptions.ConnectionError,
658 ksExceptions.ClientException,
659 ConnectionError,
660 ) as e:
661 self._format_exception(e)
662
663 def new_tenant(self, tenant_name, tenant_description):
664 """Adds a new tenant to openstack VIM. Returns the tenant identifier"""
665 self.logger.debug("Adding a new tenant name: %s", tenant_name)
666
667 try:
668 self._reload_connection()
669
670 if self.api_version3:
671 project = self.keystone.projects.create(
672 tenant_name,
673 self.config.get("project_domain_id", "default"),
674 description=tenant_description,
675 is_domain=False,
676 )
677 else:
678 project = self.keystone.tenants.create(tenant_name, tenant_description)
679
680 return project.id
681 except (
682 ksExceptions.ConnectionError,
683 ksExceptions.ClientException,
684 ksExceptions.BadRequest,
685 ConnectionError,
686 ) as e:
687 self._format_exception(e)
688
689 def delete_tenant(self, tenant_id):
690 """Delete a tenant from openstack VIM. Returns the old tenant identifier"""
691 self.logger.debug("Deleting tenant %s from VIM", tenant_id)
692
693 try:
694 self._reload_connection()
695
696 if self.api_version3:
697 self.keystone.projects.delete(tenant_id)
698 else:
699 self.keystone.tenants.delete(tenant_id)
700
701 return tenant_id
702 except (
703 ksExceptions.ConnectionError,
704 ksExceptions.ClientException,
705 ksExceptions.NotFound,
706 ConnectionError,
707 ) as e:
708 self._format_exception(e)
709
710 def new_network(
711 self,
712 net_name,
713 net_type,
714 ip_profile=None,
715 shared=False,
716 provider_network_profile=None,
717 ):
718 """Adds a tenant network to VIM
719 Params:
720 'net_name': name of the network
721 'net_type': one of:
722 'bridge': overlay isolated network
723 'data': underlay E-LAN network for Passthrough and SRIOV interfaces
724 'ptp': underlay E-LINE network for Passthrough and SRIOV interfaces.
725 'ip_profile': is a dict containing the IP parameters of the network
726 'ip_version': can be "IPv4" or "IPv6" (Currently only IPv4 is implemented)
727 'subnet_address': ip_prefix_schema, that is X.X.X.X/Y
728 'gateway_address': (Optional) ip_schema, that is X.X.X.X
729 'dns_address': (Optional) comma separated list of ip_schema, e.g. X.X.X.X[,X,X,X,X]
730 'dhcp_enabled': True or False
731 'dhcp_start_address': ip_schema, first IP to grant
732 'dhcp_count': number of IPs to grant.
733 'shared': if this network can be seen/use by other tenants/organization
734 'provider_network_profile': (optional) contains {segmentation-id: vlan, network-type: vlan|vxlan,
735 physical-network: physnet-label}
736 Returns a tuple with the network identifier and created_items, or raises an exception on error
737 created_items can be None or a dictionary where this method can include key-values that will be passed to
738 the method delete_network. Can be used to store created segments, created l2gw connections, etc.
739 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
740 as not present.
741 """
742 self.logger.debug(
743 "Adding a new network to VIM name '%s', type '%s'", net_name, net_type
744 )
745 # self.logger.debug(">>>>>>>>>>>>>>>>>> IP profile %s", str(ip_profile))
746
747 try:
748 vlan = None
749
750 if provider_network_profile:
751 vlan = provider_network_profile.get("segmentation-id")
752
753 new_net = None
754 created_items = {}
755 self._reload_connection()
756 network_dict = {"name": net_name, "admin_state_up": True}
757
758 if net_type in ("data", "ptp"):
759 provider_physical_network = None
760
761 if provider_network_profile and provider_network_profile.get(
762 "physical-network"
763 ):
764 provider_physical_network = provider_network_profile.get(
765 "physical-network"
766 )
767
768 # provider-network must be one of the dataplane_physcial_netowrk if this is a list. If it is string
769 # or not declared, just ignore the checking
770 if (
771 isinstance(
772 self.config.get("dataplane_physical_net"), (tuple, list)
773 )
774 and provider_physical_network
775 not in self.config["dataplane_physical_net"]
776 ):
777 raise vimconn.VimConnConflictException(
778 "Invalid parameter 'provider-network:physical-network' "
779 "for network creation. '{}' is not one of the declared "
780 "list at VIM_config:dataplane_physical_net".format(
781 provider_physical_network
782 )
783 )
784
785 # use the default dataplane_physical_net
786 if not provider_physical_network:
787 provider_physical_network = self.config.get(
788 "dataplane_physical_net"
789 )
790
791 # if it is non empty list, use the first value. If it is a string use the value directly
792 if (
793 isinstance(provider_physical_network, (tuple, list))
794 and provider_physical_network
795 ):
796 provider_physical_network = provider_physical_network[0]
797
798 if not provider_physical_network:
799 raise vimconn.VimConnConflictException(
800 "missing information needed for underlay networks. Provide "
801 "'dataplane_physical_net' configuration at VIM or use the NS "
802 "instantiation parameter 'provider-network.physical-network'"
803 " for the VLD"
804 )
805
806 if not self.config.get("multisegment_support"):
807 network_dict[
808 "provider:physical_network"
809 ] = provider_physical_network
810
811 if (
812 provider_network_profile
813 and "network-type" in provider_network_profile
814 ):
815 network_dict[
816 "provider:network_type"
817 ] = provider_network_profile["network-type"]
818 else:
819 network_dict["provider:network_type"] = self.config.get(
820 "dataplane_network_type", "vlan"
821 )
822
823 if vlan:
824 network_dict["provider:segmentation_id"] = vlan
825 else:
826 # Multi-segment case
827 segment_list = []
828 segment1_dict = {
829 "provider:physical_network": "",
830 "provider:network_type": "vxlan",
831 }
832 segment_list.append(segment1_dict)
833 segment2_dict = {
834 "provider:physical_network": provider_physical_network,
835 "provider:network_type": "vlan",
836 }
837
838 if vlan:
839 segment2_dict["provider:segmentation_id"] = vlan
840 elif self.config.get("multisegment_vlan_range"):
841 vlanID = self._generate_multisegment_vlanID()
842 segment2_dict["provider:segmentation_id"] = vlanID
843
844 # else
845 # raise vimconn.VimConnConflictException(
846 # "You must provide "multisegment_vlan_range" at config dict before creating a multisegment
847 # network")
848 segment_list.append(segment2_dict)
849 network_dict["segments"] = segment_list
850
851 # VIO Specific Changes. It needs a concrete VLAN
852 if self.vim_type == "VIO" and vlan is None:
853 if self.config.get("dataplane_net_vlan_range") is None:
854 raise vimconn.VimConnConflictException(
855 "You must provide 'dataplane_net_vlan_range' in format "
856 "[start_ID - end_ID] at VIM_config for creating underlay "
857 "networks"
858 )
859
860 network_dict["provider:segmentation_id"] = self._generate_vlanID()
861
862 network_dict["shared"] = shared
863
864 if self.config.get("disable_network_port_security"):
865 network_dict["port_security_enabled"] = False
866
867 if self.config.get("neutron_availability_zone_hints"):
868 hints = self.config.get("neutron_availability_zone_hints")
869
870 if isinstance(hints, str):
871 hints = [hints]
872
873 network_dict["availability_zone_hints"] = hints
874
875 new_net = self.neutron.create_network({"network": network_dict})
876 # print new_net
877 # create subnetwork, even if there is no profile
878
879 if not ip_profile:
880 ip_profile = {}
881
882 if not ip_profile.get("subnet_address"):
883 # Fake subnet is required
884 subnet_rand = random.randint(0, 255)
885 ip_profile["subnet_address"] = "192.168.{}.0/24".format(subnet_rand)
886
887 if "ip_version" not in ip_profile:
888 ip_profile["ip_version"] = "IPv4"
889
890 subnet = {
891 "name": net_name + "-subnet",
892 "network_id": new_net["network"]["id"],
893 "ip_version": 4 if ip_profile["ip_version"] == "IPv4" else 6,
894 "cidr": ip_profile["subnet_address"],
895 }
896
897 # Gateway should be set to None if not needed. Otherwise openstack assigns one by default
898 if ip_profile.get("gateway_address"):
899 subnet["gateway_ip"] = ip_profile["gateway_address"]
900 else:
901 subnet["gateway_ip"] = None
902
903 if ip_profile.get("dns_address"):
904 subnet["dns_nameservers"] = ip_profile["dns_address"].split(";")
905
906 if "dhcp_enabled" in ip_profile:
907 subnet["enable_dhcp"] = (
908 False
909 if ip_profile["dhcp_enabled"] == "false"
910 or ip_profile["dhcp_enabled"] is False
911 else True
912 )
913
914 if ip_profile.get("dhcp_start_address"):
915 subnet["allocation_pools"] = []
916 subnet["allocation_pools"].append(dict())
917 subnet["allocation_pools"][0]["start"] = ip_profile[
918 "dhcp_start_address"
919 ]
920
921 if ip_profile.get("dhcp_count"):
922 # parts = ip_profile["dhcp_start_address"].split(".")
923 # ip_int = (int(parts[0]) << 24) + (int(parts[1]) << 16) + (int(parts[2]) << 8) + int(parts[3])
924 ip_int = int(netaddr.IPAddress(ip_profile["dhcp_start_address"]))
925 ip_int += ip_profile["dhcp_count"] - 1
926 ip_str = str(netaddr.IPAddress(ip_int))
927 subnet["allocation_pools"][0]["end"] = ip_str
928
929 # self.logger.debug(">>>>>>>>>>>>>>>>>> Subnet: %s", str(subnet))
930 self.neutron.create_subnet({"subnet": subnet})
931
932 if net_type == "data" and self.config.get("multisegment_support"):
933 if self.config.get("l2gw_support"):
934 l2gw_list = self.neutron.list_l2_gateways().get("l2_gateways", ())
935 for l2gw in l2gw_list:
936 l2gw_conn = {
937 "l2_gateway_id": l2gw["id"],
938 "network_id": new_net["network"]["id"],
939 "segmentation_id": str(vlanID),
940 }
941 new_l2gw_conn = self.neutron.create_l2_gateway_connection(
942 {"l2_gateway_connection": l2gw_conn}
943 )
944 created_items[
945 "l2gwconn:"
946 + str(new_l2gw_conn["l2_gateway_connection"]["id"])
947 ] = True
948
949 return new_net["network"]["id"], created_items
950 except Exception as e:
951 # delete l2gw connections (if any) before deleting the network
952 for k, v in created_items.items():
953 if not v: # skip already deleted
954 continue
955
956 try:
957 k_item, _, k_id = k.partition(":")
958
959 if k_item == "l2gwconn":
960 self.neutron.delete_l2_gateway_connection(k_id)
961 except Exception as e2:
962 self.logger.error(
963 "Error deleting l2 gateway connection: {}: {}".format(
964 type(e2).__name__, e2
965 )
966 )
967
968 if new_net:
969 self.neutron.delete_network(new_net["network"]["id"])
970
971 self._format_exception(e)
972
973 def get_network_list(self, filter_dict={}):
974 """Obtain tenant networks of VIM
975 Filter_dict can be:
976 name: network name
977 id: network uuid
978 shared: boolean
979 tenant_id: tenant
980 admin_state_up: boolean
981 status: 'ACTIVE'
982 Returns the network list of dictionaries
983 """
984 self.logger.debug("Getting network from VIM filter: '%s'", str(filter_dict))
985
986 try:
987 self._reload_connection()
988 filter_dict_os = filter_dict.copy()
989
990 if self.api_version3 and "tenant_id" in filter_dict_os:
991 # TODO check
992 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
993
994 net_dict = self.neutron.list_networks(**filter_dict_os)
995 net_list = net_dict["networks"]
996 self.__net_os2mano(net_list)
997
998 return net_list
999 except (
1000 neExceptions.ConnectionFailed,
1001 ksExceptions.ClientException,
1002 neExceptions.NeutronException,
1003 ConnectionError,
1004 ) as e:
1005 self._format_exception(e)
1006
1007 def get_network(self, net_id):
1008 """Obtain details of network from VIM
1009 Returns the network information from a network id"""
1010 self.logger.debug(" Getting tenant network %s from VIM", net_id)
1011 filter_dict = {"id": net_id}
1012 net_list = self.get_network_list(filter_dict)
1013
1014 if len(net_list) == 0:
1015 raise vimconn.VimConnNotFoundException(
1016 "Network '{}' not found".format(net_id)
1017 )
1018 elif len(net_list) > 1:
1019 raise vimconn.VimConnConflictException(
1020 "Found more than one network with this criteria"
1021 )
1022
1023 net = net_list[0]
1024 subnets = []
1025 for subnet_id in net.get("subnets", ()):
1026 try:
1027 subnet = self.neutron.show_subnet(subnet_id)
1028 except Exception as e:
1029 self.logger.error(
1030 "osconnector.get_network(): Error getting subnet %s %s"
1031 % (net_id, str(e))
1032 )
1033 subnet = {"id": subnet_id, "fault": str(e)}
1034
1035 subnets.append(subnet)
1036
1037 net["subnets"] = subnets
1038 net["encapsulation"] = net.get("provider:network_type")
1039 net["encapsulation_type"] = net.get("provider:network_type")
1040 net["segmentation_id"] = net.get("provider:segmentation_id")
1041 net["encapsulation_id"] = net.get("provider:segmentation_id")
1042
1043 return net
1044
1045 def delete_network(self, net_id, created_items=None):
1046 """
1047 Removes a tenant network from VIM and its associated elements
1048 :param net_id: VIM identifier of the network, provided by method new_network
1049 :param created_items: dictionary with extra items to be deleted. provided by method new_network
1050 Returns the network identifier or raises an exception upon error or when network is not found
1051 """
1052 self.logger.debug("Deleting network '%s' from VIM", net_id)
1053
1054 if created_items is None:
1055 created_items = {}
1056
1057 try:
1058 self._reload_connection()
1059 # delete l2gw connections (if any) before deleting the network
1060 for k, v in created_items.items():
1061 if not v: # skip already deleted
1062 continue
1063
1064 try:
1065 k_item, _, k_id = k.partition(":")
1066 if k_item == "l2gwconn":
1067 self.neutron.delete_l2_gateway_connection(k_id)
1068 except Exception as e:
1069 self.logger.error(
1070 "Error deleting l2 gateway connection: {}: {}".format(
1071 type(e).__name__, e
1072 )
1073 )
1074
1075 # delete VM ports attached to this networks before the network
1076 ports = self.neutron.list_ports(network_id=net_id)
1077 for p in ports["ports"]:
1078 try:
1079 self.neutron.delete_port(p["id"])
1080 except Exception as e:
1081 self.logger.error("Error deleting port %s: %s", p["id"], str(e))
1082
1083 self.neutron.delete_network(net_id)
1084
1085 return net_id
1086 except (
1087 neExceptions.ConnectionFailed,
1088 neExceptions.NetworkNotFoundClient,
1089 neExceptions.NeutronException,
1090 ksExceptions.ClientException,
1091 neExceptions.NeutronException,
1092 ConnectionError,
1093 ) as e:
1094 self._format_exception(e)
1095
1096 def refresh_nets_status(self, net_list):
1097 """Get the status of the networks
1098 Params: the list of network identifiers
1099 Returns a dictionary with:
1100 net_id: #VIM id of this network
1101 status: #Mandatory. Text with one of:
1102 # DELETED (not found at vim)
1103 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
1104 # OTHER (Vim reported other status not understood)
1105 # ERROR (VIM indicates an ERROR status)
1106 # ACTIVE, INACTIVE, DOWN (admin down),
1107 # BUILD (on building process)
1108 #
1109 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
1110 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
1111 """
1112 net_dict = {}
1113
1114 for net_id in net_list:
1115 net = {}
1116
1117 try:
1118 net_vim = self.get_network(net_id)
1119
1120 if net_vim["status"] in netStatus2manoFormat:
1121 net["status"] = netStatus2manoFormat[net_vim["status"]]
1122 else:
1123 net["status"] = "OTHER"
1124 net["error_msg"] = "VIM status reported " + net_vim["status"]
1125
1126 if net["status"] == "ACTIVE" and not net_vim["admin_state_up"]:
1127 net["status"] = "DOWN"
1128
1129 net["vim_info"] = self.serialize(net_vim)
1130
1131 if net_vim.get("fault"): # TODO
1132 net["error_msg"] = str(net_vim["fault"])
1133 except vimconn.VimConnNotFoundException as e:
1134 self.logger.error("Exception getting net status: %s", str(e))
1135 net["status"] = "DELETED"
1136 net["error_msg"] = str(e)
1137 except vimconn.VimConnException as e:
1138 self.logger.error("Exception getting net status: %s", str(e))
1139 net["status"] = "VIM_ERROR"
1140 net["error_msg"] = str(e)
1141 net_dict[net_id] = net
1142 return net_dict
1143
1144 def get_flavor(self, flavor_id):
1145 """Obtain flavor details from the VIM. Returns the flavor dict details"""
1146 self.logger.debug("Getting flavor '%s'", flavor_id)
1147
1148 try:
1149 self._reload_connection()
1150 flavor = self.nova.flavors.find(id=flavor_id)
1151 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
1152
1153 return flavor.to_dict()
1154 except (
1155 nvExceptions.NotFound,
1156 nvExceptions.ClientException,
1157 ksExceptions.ClientException,
1158 ConnectionError,
1159 ) as e:
1160 self._format_exception(e)
1161
1162 def get_flavor_id_from_data(self, flavor_dict):
1163 """Obtain flavor id that match the flavor description
1164 Returns the flavor_id or raises a vimconnNotFoundException
1165 flavor_dict: contains the required ram, vcpus, disk
1166 If 'use_existing_flavors' is set to True at config, the closer flavor that provides same or more ram, vcpus
1167 and disk is returned. Otherwise a flavor with exactly same ram, vcpus and disk is returned or a
1168 vimconnNotFoundException is raised
1169 """
1170 exact_match = False if self.config.get("use_existing_flavors") else True
1171
1172 try:
1173 self._reload_connection()
1174 flavor_candidate_id = None
1175 flavor_candidate_data = (10000, 10000, 10000)
1176 flavor_target = (
1177 flavor_dict["ram"],
1178 flavor_dict["vcpus"],
1179 flavor_dict["disk"],
1180 flavor_dict.get("ephemeral", 0),
1181 flavor_dict.get("swap", 0),
1182 )
1183 # numa=None
1184 extended = flavor_dict.get("extended", {})
1185 if extended:
1186 # TODO
1187 raise vimconn.VimConnNotFoundException(
1188 "Flavor with EPA still not implemented"
1189 )
1190 # if len(numas) > 1:
1191 # raise vimconn.VimConnNotFoundException("Cannot find any flavor with more than one numa")
1192 # numa=numas[0]
1193 # numas = extended.get("numas")
1194 for flavor in self.nova.flavors.list():
1195 epa = flavor.get_keys()
1196
1197 if epa:
1198 continue
1199 # TODO
1200
1201 flavor_data = (
1202 flavor.ram,
1203 flavor.vcpus,
1204 flavor.disk,
1205 flavor.ephemeral,
1206 flavor.swap,
1207 )
1208 if flavor_data == flavor_target:
1209 return flavor.id
1210 elif (
1211 not exact_match
1212 and flavor_target < flavor_data < flavor_candidate_data
1213 ):
1214 flavor_candidate_id = flavor.id
1215 flavor_candidate_data = flavor_data
1216
1217 if not exact_match and flavor_candidate_id:
1218 return flavor_candidate_id
1219
1220 raise vimconn.VimConnNotFoundException(
1221 "Cannot find any flavor matching '{}'".format(flavor_dict)
1222 )
1223 except (
1224 nvExceptions.NotFound,
1225 nvExceptions.ClientException,
1226 ksExceptions.ClientException,
1227 ConnectionError,
1228 ) as e:
1229 self._format_exception(e)
1230
1231 def process_resource_quota(self, quota, prefix, extra_specs):
1232 """
1233 :param prefix:
1234 :param extra_specs:
1235 :return:
1236 """
1237 if "limit" in quota:
1238 extra_specs["quota:" + prefix + "_limit"] = quota["limit"]
1239
1240 if "reserve" in quota:
1241 extra_specs["quota:" + prefix + "_reservation"] = quota["reserve"]
1242
1243 if "shares" in quota:
1244 extra_specs["quota:" + prefix + "_shares_level"] = "custom"
1245 extra_specs["quota:" + prefix + "_shares_share"] = quota["shares"]
1246
1247 def new_flavor(self, flavor_data, change_name_if_used=True):
1248 """Adds a tenant flavor to openstack VIM
1249 if change_name_if_used is True, it will change name in case of conflict, because it is not supported name
1250 repetition
1251 Returns the flavor identifier
1252 """
1253 self.logger.debug("Adding flavor '%s'", str(flavor_data))
1254 retry = 0
1255 max_retries = 3
1256 name_suffix = 0
1257
1258 try:
1259 name = flavor_data["name"]
1260 while retry < max_retries:
1261 retry += 1
1262 try:
1263 self._reload_connection()
1264
1265 if change_name_if_used:
1266 # get used names
1267 fl_names = []
1268 fl = self.nova.flavors.list()
1269
1270 for f in fl:
1271 fl_names.append(f.name)
1272
1273 while name in fl_names:
1274 name_suffix += 1
1275 name = flavor_data["name"] + "-" + str(name_suffix)
1276
1277 ram = flavor_data.get("ram", 64)
1278 vcpus = flavor_data.get("vcpus", 1)
1279 extra_specs = {}
1280
1281 extended = flavor_data.get("extended")
1282 if extended:
1283 numas = extended.get("numas")
1284
1285 if numas:
1286 numa_nodes = len(numas)
1287
1288 if numa_nodes > 1:
1289 return -1, "Can not add flavor with more than one numa"
1290
1291 extra_specs["hw:numa_nodes"] = str(numa_nodes)
1292 extra_specs["hw:mem_page_size"] = "large"
1293 extra_specs["hw:cpu_policy"] = "dedicated"
1294 extra_specs["hw:numa_mempolicy"] = "strict"
1295
1296 if self.vim_type == "VIO":
1297 extra_specs[
1298 "vmware:extra_config"
1299 ] = '{"numa.nodeAffinity":"0"}'
1300 extra_specs["vmware:latency_sensitivity_level"] = "high"
1301
1302 for numa in numas:
1303 # overwrite ram and vcpus
1304 # check if key "memory" is present in numa else use ram value at flavor
1305 if "memory" in numa:
1306 ram = numa["memory"] * 1024
1307 # See for reference: https://specs.openstack.org/openstack/nova-specs/specs/mitaka/
1308 # implemented/virt-driver-cpu-thread-pinning.html
1309 extra_specs["hw:cpu_sockets"] = 1
1310
1311 if "paired-threads" in numa:
1312 vcpus = numa["paired-threads"] * 2
1313 # cpu_thread_policy "require" implies that the compute node must have an
1314 # STM architecture
1315 extra_specs["hw:cpu_thread_policy"] = "require"
1316 extra_specs["hw:cpu_policy"] = "dedicated"
1317 elif "cores" in numa:
1318 vcpus = numa["cores"]
1319 # cpu_thread_policy "prefer" implies that the host must not have an SMT
1320 # architecture, or a non-SMT architecture will be emulated
1321 extra_specs["hw:cpu_thread_policy"] = "isolate"
1322 extra_specs["hw:cpu_policy"] = "dedicated"
1323 elif "threads" in numa:
1324 vcpus = numa["threads"]
1325 # cpu_thread_policy "prefer" implies that the host may or may not have an SMT
1326 # architecture
1327 extra_specs["hw:cpu_thread_policy"] = "prefer"
1328 extra_specs["hw:cpu_policy"] = "dedicated"
1329 # for interface in numa.get("interfaces",() ):
1330 # if interface["dedicated"]=="yes":
1331 # raise vimconn.VimConnException("Passthrough interfaces are not supported
1332 # for the openstack connector", http_code=vimconn.HTTP_Service_Unavailable)
1333 # #TODO, add the key 'pci_passthrough:alias"="<label at config>:<number ifaces>"'
1334 # when a way to connect it is available
1335 elif extended.get("cpu-quota"):
1336 self.process_resource_quota(
1337 extended.get("cpu-quota"), "cpu", extra_specs
1338 )
1339
1340 if extended.get("mem-quota"):
1341 self.process_resource_quota(
1342 extended.get("mem-quota"), "memory", extra_specs
1343 )
1344
1345 if extended.get("vif-quota"):
1346 self.process_resource_quota(
1347 extended.get("vif-quota"), "vif", extra_specs
1348 )
1349
1350 if extended.get("disk-io-quota"):
1351 self.process_resource_quota(
1352 extended.get("disk-io-quota"), "disk_io", extra_specs
1353 )
1354
1355 # create flavor
1356 new_flavor = self.nova.flavors.create(
1357 name=name,
1358 ram=ram,
1359 vcpus=vcpus,
1360 disk=flavor_data.get("disk", 0),
1361 ephemeral=flavor_data.get("ephemeral", 0),
1362 swap=flavor_data.get("swap", 0),
1363 is_public=flavor_data.get("is_public", True),
1364 )
1365 # add metadata
1366 if extra_specs:
1367 new_flavor.set_keys(extra_specs)
1368
1369 return new_flavor.id
1370 except nvExceptions.Conflict as e:
1371 if change_name_if_used and retry < max_retries:
1372 continue
1373
1374 self._format_exception(e)
1375 # except nvExceptions.BadRequest as e:
1376 except (
1377 ksExceptions.ClientException,
1378 nvExceptions.ClientException,
1379 ConnectionError,
1380 KeyError,
1381 ) as e:
1382 self._format_exception(e)
1383
1384 def delete_flavor(self, flavor_id):
1385 """Deletes a tenant flavor from openstack VIM. Returns the old flavor_id"""
1386 try:
1387 self._reload_connection()
1388 self.nova.flavors.delete(flavor_id)
1389
1390 return flavor_id
1391 # except nvExceptions.BadRequest as e:
1392 except (
1393 nvExceptions.NotFound,
1394 ksExceptions.ClientException,
1395 nvExceptions.ClientException,
1396 ConnectionError,
1397 ) as e:
1398 self._format_exception(e)
1399
1400 def new_image(self, image_dict):
1401 """
1402 Adds a tenant image to VIM. imge_dict is a dictionary with:
1403 name: name
1404 disk_format: qcow2, vhd, vmdk, raw (by default), ...
1405 location: path or URI
1406 public: "yes" or "no"
1407 metadata: metadata of the image
1408 Returns the image_id
1409 """
1410 retry = 0
1411 max_retries = 3
1412
1413 while retry < max_retries:
1414 retry += 1
1415 try:
1416 self._reload_connection()
1417
1418 # determine format http://docs.openstack.org/developer/glance/formats.html
1419 if "disk_format" in image_dict:
1420 disk_format = image_dict["disk_format"]
1421 else: # autodiscover based on extension
1422 if image_dict["location"].endswith(".qcow2"):
1423 disk_format = "qcow2"
1424 elif image_dict["location"].endswith(".vhd"):
1425 disk_format = "vhd"
1426 elif image_dict["location"].endswith(".vmdk"):
1427 disk_format = "vmdk"
1428 elif image_dict["location"].endswith(".vdi"):
1429 disk_format = "vdi"
1430 elif image_dict["location"].endswith(".iso"):
1431 disk_format = "iso"
1432 elif image_dict["location"].endswith(".aki"):
1433 disk_format = "aki"
1434 elif image_dict["location"].endswith(".ari"):
1435 disk_format = "ari"
1436 elif image_dict["location"].endswith(".ami"):
1437 disk_format = "ami"
1438 else:
1439 disk_format = "raw"
1440
1441 self.logger.debug(
1442 "new_image: '%s' loading from '%s'",
1443 image_dict["name"],
1444 image_dict["location"],
1445 )
1446 if self.vim_type == "VIO":
1447 container_format = "bare"
1448 if "container_format" in image_dict:
1449 container_format = image_dict["container_format"]
1450
1451 new_image = self.glance.images.create(
1452 name=image_dict["name"],
1453 container_format=container_format,
1454 disk_format=disk_format,
1455 )
1456 else:
1457 new_image = self.glance.images.create(name=image_dict["name"])
1458
1459 if image_dict["location"].startswith("http"):
1460 # TODO there is not a method to direct download. It must be downloaded locally with requests
1461 raise vimconn.VimConnNotImplemented("Cannot create image from URL")
1462 else: # local path
1463 with open(image_dict["location"]) as fimage:
1464 self.glance.images.upload(new_image.id, fimage)
1465 # new_image = self.glancev1.images.create(name=image_dict["name"], is_public=
1466 # image_dict.get("public","yes")=="yes",
1467 # container_format="bare", data=fimage, disk_format=disk_format)
1468
1469 metadata_to_load = image_dict.get("metadata")
1470
1471 # TODO location is a reserved word for current openstack versions. fixed for VIO please check
1472 # for openstack
1473 if self.vim_type == "VIO":
1474 metadata_to_load["upload_location"] = image_dict["location"]
1475 else:
1476 metadata_to_load["location"] = image_dict["location"]
1477
1478 self.glance.images.update(new_image.id, **metadata_to_load)
1479
1480 return new_image.id
1481 except (
1482 nvExceptions.Conflict,
1483 ksExceptions.ClientException,
1484 nvExceptions.ClientException,
1485 ) as e:
1486 self._format_exception(e)
1487 except (
1488 HTTPException,
1489 gl1Exceptions.HTTPException,
1490 gl1Exceptions.CommunicationError,
1491 ConnectionError,
1492 ) as e:
1493 if retry == max_retries:
1494 continue
1495
1496 self._format_exception(e)
1497 except IOError as e: # can not open the file
1498 raise vimconn.VimConnConnectionException(
1499 "{}: {} for {}".format(type(e).__name__, e, image_dict["location"]),
1500 http_code=vimconn.HTTP_Bad_Request,
1501 )
1502
1503 def delete_image(self, image_id):
1504 """Deletes a tenant image from openstack VIM. Returns the old id"""
1505 try:
1506 self._reload_connection()
1507 self.glance.images.delete(image_id)
1508
1509 return image_id
1510 except (
1511 nvExceptions.NotFound,
1512 ksExceptions.ClientException,
1513 nvExceptions.ClientException,
1514 gl1Exceptions.CommunicationError,
1515 gl1Exceptions.HTTPNotFound,
1516 ConnectionError,
1517 ) as e: # TODO remove
1518 self._format_exception(e)
1519
1520 def get_image_id_from_path(self, path):
1521 """Get the image id from image path in the VIM database. Returns the image_id"""
1522 try:
1523 self._reload_connection()
1524 images = self.glance.images.list()
1525
1526 for image in images:
1527 if image.metadata.get("location") == path:
1528 return image.id
1529
1530 raise vimconn.VimConnNotFoundException(
1531 "image with location '{}' not found".format(path)
1532 )
1533 except (
1534 ksExceptions.ClientException,
1535 nvExceptions.ClientException,
1536 gl1Exceptions.CommunicationError,
1537 ConnectionError,
1538 ) as e:
1539 self._format_exception(e)
1540
1541 def get_image_list(self, filter_dict={}):
1542 """Obtain tenant images from VIM
1543 Filter_dict can be:
1544 id: image id
1545 name: image name
1546 checksum: image checksum
1547 Returns the image list of dictionaries:
1548 [{<the fields at Filter_dict plus some VIM specific>}, ...]
1549 List can be empty
1550 """
1551 self.logger.debug("Getting image list from VIM filter: '%s'", str(filter_dict))
1552
1553 try:
1554 self._reload_connection()
1555 # filter_dict_os = filter_dict.copy()
1556 # First we filter by the available filter fields: name, id. The others are removed.
1557 image_list = self.glance.images.list()
1558 filtered_list = []
1559
1560 for image in image_list:
1561 try:
1562 if filter_dict.get("name") and image["name"] != filter_dict["name"]:
1563 continue
1564
1565 if filter_dict.get("id") and image["id"] != filter_dict["id"]:
1566 continue
1567
1568 if (
1569 filter_dict.get("checksum")
1570 and image["checksum"] != filter_dict["checksum"]
1571 ):
1572 continue
1573
1574 filtered_list.append(image.copy())
1575 except gl1Exceptions.HTTPNotFound:
1576 pass
1577
1578 return filtered_list
1579 except (
1580 ksExceptions.ClientException,
1581 nvExceptions.ClientException,
1582 gl1Exceptions.CommunicationError,
1583 ConnectionError,
1584 ) as e:
1585 self._format_exception(e)
1586
1587 def __wait_for_vm(self, vm_id, status):
1588 """wait until vm is in the desired status and return True.
1589 If the VM gets in ERROR status, return false.
1590 If the timeout is reached generate an exception"""
1591 elapsed_time = 0
1592 while elapsed_time < server_timeout:
1593 vm_status = self.nova.servers.get(vm_id).status
1594
1595 if vm_status == status:
1596 return True
1597
1598 if vm_status == "ERROR":
1599 return False
1600
1601 time.sleep(5)
1602 elapsed_time += 5
1603
1604 # if we exceeded the timeout rollback
1605 if elapsed_time >= server_timeout:
1606 raise vimconn.VimConnException(
1607 "Timeout waiting for instance " + vm_id + " to get " + status,
1608 http_code=vimconn.HTTP_Request_Timeout,
1609 )
1610
1611 def _get_openstack_availablity_zones(self):
1612 """
1613 Get from openstack availability zones available
1614 :return:
1615 """
1616 try:
1617 openstack_availability_zone = self.nova.availability_zones.list()
1618 openstack_availability_zone = [
1619 str(zone.zoneName)
1620 for zone in openstack_availability_zone
1621 if zone.zoneName != "internal"
1622 ]
1623
1624 return openstack_availability_zone
1625 except Exception:
1626 return None
1627
1628 def _set_availablity_zones(self):
1629 """
1630 Set vim availablity zone
1631 :return:
1632 """
1633 if "availability_zone" in self.config:
1634 vim_availability_zones = self.config.get("availability_zone")
1635
1636 if isinstance(vim_availability_zones, str):
1637 self.availability_zone = [vim_availability_zones]
1638 elif isinstance(vim_availability_zones, list):
1639 self.availability_zone = vim_availability_zones
1640 else:
1641 self.availability_zone = self._get_openstack_availablity_zones()
1642
1643 def _get_vm_availability_zone(
1644 self, availability_zone_index, availability_zone_list
1645 ):
1646 """
1647 Return thge availability zone to be used by the created VM.
1648 :return: The VIM availability zone to be used or None
1649 """
1650 if availability_zone_index is None:
1651 if not self.config.get("availability_zone"):
1652 return None
1653 elif isinstance(self.config.get("availability_zone"), str):
1654 return self.config["availability_zone"]
1655 else:
1656 # TODO consider using a different parameter at config for default AV and AV list match
1657 return self.config["availability_zone"][0]
1658
1659 vim_availability_zones = self.availability_zone
1660 # check if VIM offer enough availability zones describe in the VNFD
1661 if vim_availability_zones and len(availability_zone_list) <= len(
1662 vim_availability_zones
1663 ):
1664 # check if all the names of NFV AV match VIM AV names
1665 match_by_index = False
1666 for av in availability_zone_list:
1667 if av not in vim_availability_zones:
1668 match_by_index = True
1669 break
1670
1671 if match_by_index:
1672 return vim_availability_zones[availability_zone_index]
1673 else:
1674 return availability_zone_list[availability_zone_index]
1675 else:
1676 raise vimconn.VimConnConflictException(
1677 "No enough availability zones at VIM for this deployment"
1678 )
1679
1680 def new_vminstance(
1681 self,
1682 name,
1683 description,
1684 start,
1685 image_id,
1686 flavor_id,
1687 net_list,
1688 cloud_config=None,
1689 disk_list=None,
1690 availability_zone_index=None,
1691 availability_zone_list=None,
1692 ):
1693 """Adds a VM instance to VIM
1694 Params:
1695 start: indicates if VM must start or boot in pause mode. Ignored
1696 image_id,flavor_id: iamge and flavor uuid
1697 net_list: list of interfaces, each one is a dictionary with:
1698 name:
1699 net_id: network uuid to connect
1700 vpci: virtual vcpi to assign, ignored because openstack lack #TODO
1701 model: interface model, ignored #TODO
1702 mac_address: used for SR-IOV ifaces #TODO for other types
1703 use: 'data', 'bridge', 'mgmt'
1704 type: 'virtual', 'PCI-PASSTHROUGH'('PF'), 'SR-IOV'('VF'), 'VFnotShared'
1705 vim_id: filled/added by this function
1706 floating_ip: True/False (or it can be None)
1707 port_security: True/False
1708 'cloud_config': (optional) dictionary with:
1709 'key-pairs': (optional) list of strings with the public key to be inserted to the default user
1710 'users': (optional) list of users to be inserted, each item is a dict with:
1711 'name': (mandatory) user name,
1712 'key-pairs': (optional) list of strings with the public key to be inserted to the user
1713 'user-data': (optional) string is a text script to be passed directly to cloud-init
1714 'config-files': (optional). List of files to be transferred. Each item is a dict with:
1715 'dest': (mandatory) string with the destination absolute path
1716 'encoding': (optional, by default text). Can be one of:
1717 'b64', 'base64', 'gz', 'gz+b64', 'gz+base64', 'gzip+b64', 'gzip+base64'
1718 'content' (mandatory): string with the content of the file
1719 'permissions': (optional) string with file permissions, typically octal notation '0644'
1720 'owner': (optional) file owner, string with the format 'owner:group'
1721 'boot-data-drive': boolean to indicate if user-data must be passed using a boot drive (hard disk)
1722 'disk_list': (optional) list with additional disks to the VM. Each item is a dict with:
1723 'image_id': (optional). VIM id of an existing image. If not provided an empty disk must be mounted
1724 'size': (mandatory) string with the size of the disk in GB
1725 'vim_id' (optional) should use this existing volume id
1726 availability_zone_index: Index of availability_zone_list to use for this this VM. None if not AV required
1727 availability_zone_list: list of availability zones given by user in the VNFD descriptor. Ignore if
1728 availability_zone_index is None
1729 #TODO ip, security groups
1730 Returns a tuple with the instance identifier and created_items or raises an exception on error
1731 created_items can be None or a dictionary where this method can include key-values that will be passed to
1732 the method delete_vminstance and action_vminstance. Can be used to store created ports, volumes, etc.
1733 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
1734 as not present.
1735 """
1736 self.logger.debug(
1737 "new_vminstance input: image='%s' flavor='%s' nics='%s'",
1738 image_id,
1739 flavor_id,
1740 str(net_list),
1741 )
1742
1743 try:
1744 server = None
1745 created_items = {}
1746 # metadata = {}
1747 net_list_vim = []
1748 external_network = []
1749 # ^list of external networks to be connected to instance, later on used to create floating_ip
1750 no_secured_ports = [] # List of port-is with port-security disabled
1751 self._reload_connection()
1752 # metadata_vpci = {} # For a specific neutron plugin
1753 block_device_mapping = None
1754
1755 for net in net_list:
1756 if not net.get("net_id"): # skip non connected iface
1757 continue
1758
1759 port_dict = {
1760 "network_id": net["net_id"],
1761 "name": net.get("name"),
1762 "admin_state_up": True,
1763 }
1764
1765 if (
1766 self.config.get("security_groups")
1767 and net.get("port_security") is not False
1768 and not self.config.get("no_port_security_extension")
1769 ):
1770 if not self.security_groups_id:
1771 self._get_ids_from_name()
1772
1773 port_dict["security_groups"] = self.security_groups_id
1774
1775 if net["type"] == "virtual":
1776 pass
1777 # if "vpci" in net:
1778 # metadata_vpci[ net["net_id"] ] = [[ net["vpci"], "" ]]
1779 elif net["type"] == "VF" or net["type"] == "SR-IOV": # for VF
1780 # if "vpci" in net:
1781 # if "VF" not in metadata_vpci:
1782 # metadata_vpci["VF"]=[]
1783 # metadata_vpci["VF"].append([ net["vpci"], "" ])
1784 port_dict["binding:vnic_type"] = "direct"
1785
1786 # VIO specific Changes
1787 if self.vim_type == "VIO":
1788 # Need to create port with port_security_enabled = False and no-security-groups
1789 port_dict["port_security_enabled"] = False
1790 port_dict["provider_security_groups"] = []
1791 port_dict["security_groups"] = []
1792 else: # For PT PCI-PASSTHROUGH
1793 # if "vpci" in net:
1794 # if "PF" not in metadata_vpci:
1795 # metadata_vpci["PF"]=[]
1796 # metadata_vpci["PF"].append([ net["vpci"], "" ])
1797 port_dict["binding:vnic_type"] = "direct-physical"
1798
1799 if not port_dict["name"]:
1800 port_dict["name"] = name
1801
1802 if net.get("mac_address"):
1803 port_dict["mac_address"] = net["mac_address"]
1804
1805 if net.get("ip_address"):
1806 port_dict["fixed_ips"] = [{"ip_address": net["ip_address"]}]
1807 # TODO add "subnet_id": <subnet_id>
1808
1809 new_port = self.neutron.create_port({"port": port_dict})
1810 created_items["port:" + str(new_port["port"]["id"])] = True
1811 net["mac_adress"] = new_port["port"]["mac_address"]
1812 net["vim_id"] = new_port["port"]["id"]
1813 # if try to use a network without subnetwork, it will return a emtpy list
1814 fixed_ips = new_port["port"].get("fixed_ips")
1815
1816 if fixed_ips:
1817 net["ip"] = fixed_ips[0].get("ip_address")
1818 else:
1819 net["ip"] = None
1820
1821 port = {"port-id": new_port["port"]["id"]}
1822 if float(self.nova.api_version.get_string()) >= 2.32:
1823 port["tag"] = new_port["port"]["name"]
1824
1825 net_list_vim.append(port)
1826
1827 if net.get("floating_ip", False):
1828 net["exit_on_floating_ip_error"] = True
1829 external_network.append(net)
1830 elif net["use"] == "mgmt" and self.config.get("use_floating_ip"):
1831 net["exit_on_floating_ip_error"] = False
1832 external_network.append(net)
1833 net["floating_ip"] = self.config.get("use_floating_ip")
1834
1835 # If port security is disabled when the port has not yet been attached to the VM, then all vm traffic
1836 # is dropped.
1837 # As a workaround we wait until the VM is active and then disable the port-security
1838 if net.get("port_security") is False and not self.config.get(
1839 "no_port_security_extension"
1840 ):
1841 no_secured_ports.append(
1842 (
1843 new_port["port"]["id"],
1844 net.get("port_security_disable_strategy"),
1845 )
1846 )
1847
1848 # if metadata_vpci:
1849 # metadata = {"pci_assignement": json.dumps(metadata_vpci)}
1850 # if len(metadata["pci_assignement"]) >255:
1851 # #limit the metadata size
1852 # #metadata["pci_assignement"] = metadata["pci_assignement"][0:255]
1853 # self.logger.warn("Metadata deleted since it exceeds the expected length (255) ")
1854 # metadata = {}
1855
1856 self.logger.debug(
1857 "name '%s' image_id '%s'flavor_id '%s' net_list_vim '%s' description '%s'",
1858 name,
1859 image_id,
1860 flavor_id,
1861 str(net_list_vim),
1862 description,
1863 )
1864
1865 # cloud config
1866 config_drive, userdata = self._create_user_data(cloud_config)
1867
1868 # Create additional volumes in case these are present in disk_list
1869 base_disk_index = ord("b")
1870 if disk_list:
1871 block_device_mapping = {}
1872 for disk in disk_list:
1873 if disk.get("vim_id"):
1874 block_device_mapping["_vd" + chr(base_disk_index)] = disk[
1875 "vim_id"
1876 ]
1877 else:
1878 if "image_id" in disk:
1879 volume = self.cinder.volumes.create(
1880 size=disk["size"],
1881 name=name + "_vd" + chr(base_disk_index),
1882 imageRef=disk["image_id"],
1883 )
1884 else:
1885 volume = self.cinder.volumes.create(
1886 size=disk["size"],
1887 name=name + "_vd" + chr(base_disk_index),
1888 )
1889
1890 created_items["volume:" + str(volume.id)] = True
1891 block_device_mapping["_vd" + chr(base_disk_index)] = volume.id
1892
1893 base_disk_index += 1
1894
1895 # Wait until created volumes are with status available
1896 elapsed_time = 0
1897 while elapsed_time < volume_timeout:
1898 for created_item in created_items:
1899 v, _, volume_id = created_item.partition(":")
1900 if v == "volume":
1901 if self.cinder.volumes.get(volume_id).status != "available":
1902 break
1903 else: # all ready: break from while
1904 break
1905
1906 time.sleep(5)
1907 elapsed_time += 5
1908
1909 # If we exceeded the timeout rollback
1910 if elapsed_time >= volume_timeout:
1911 raise vimconn.VimConnException(
1912 "Timeout creating volumes for instance " + name,
1913 http_code=vimconn.HTTP_Request_Timeout,
1914 )
1915
1916 # get availability Zone
1917 vm_av_zone = self._get_vm_availability_zone(
1918 availability_zone_index, availability_zone_list
1919 )
1920
1921 self.logger.debug(
1922 "nova.servers.create({}, {}, {}, nics={}, security_groups={}, "
1923 "availability_zone={}, key_name={}, userdata={}, config_drive={}, "
1924 "block_device_mapping={})".format(
1925 name,
1926 image_id,
1927 flavor_id,
1928 net_list_vim,
1929 self.config.get("security_groups"),
1930 vm_av_zone,
1931 self.config.get("keypair"),
1932 userdata,
1933 config_drive,
1934 block_device_mapping,
1935 )
1936 )
1937 server = self.nova.servers.create(
1938 name,
1939 image_id,
1940 flavor_id,
1941 nics=net_list_vim,
1942 security_groups=self.config.get("security_groups"),
1943 # TODO remove security_groups in future versions. Already at neutron port
1944 availability_zone=vm_av_zone,
1945 key_name=self.config.get("keypair"),
1946 userdata=userdata,
1947 config_drive=config_drive,
1948 block_device_mapping=block_device_mapping,
1949 ) # , description=description)
1950
1951 vm_start_time = time.time()
1952 # Previously mentioned workaround to wait until the VM is active and then disable the port-security
1953 if no_secured_ports:
1954 self.__wait_for_vm(server.id, "ACTIVE")
1955
1956 for port in no_secured_ports:
1957 port_update = {
1958 "port": {"port_security_enabled": False, "security_groups": None}
1959 }
1960
1961 if port[1] == "allow-address-pairs":
1962 port_update = {
1963 "port": {"allowed_address_pairs": [{"ip_address": "0.0.0.0/0"}]}
1964 }
1965
1966 try:
1967 self.neutron.update_port(port[0], port_update)
1968 except Exception:
1969 raise vimconn.VimConnException(
1970 "It was not possible to disable port security for port {}".format(
1971 port[0]
1972 )
1973 )
1974
1975 # print "DONE :-)", server
1976
1977 # pool_id = None
1978 for floating_network in external_network:
1979 try:
1980 assigned = False
1981 floating_ip_retries = 3
1982 # In case of RO in HA there can be conflicts, two RO trying to assign same floating IP, so retry
1983 # several times
1984 while not assigned:
1985 floating_ips = self.neutron.list_floatingips().get(
1986 "floatingips", ()
1987 )
1988 random.shuffle(floating_ips) # randomize
1989 for fip in floating_ips:
1990 if (
1991 fip.get("port_id")
1992 or fip.get("tenant_id") != server.tenant_id
1993 ):
1994 continue
1995
1996 if isinstance(floating_network["floating_ip"], str):
1997 if (
1998 fip.get("floating_network_id")
1999 != floating_network["floating_ip"]
2000 ):
2001 continue
2002
2003 free_floating_ip = fip["id"]
2004 break
2005 else:
2006 if (
2007 isinstance(floating_network["floating_ip"], str)
2008 and floating_network["floating_ip"].lower() != "true"
2009 ):
2010 pool_id = floating_network["floating_ip"]
2011 else:
2012 # Find the external network
2013 external_nets = list()
2014
2015 for net in self.neutron.list_networks()["networks"]:
2016 if net["router:external"]:
2017 external_nets.append(net)
2018
2019 if len(external_nets) == 0:
2020 raise vimconn.VimConnException(
2021 "Cannot create floating_ip automatically since "
2022 "no external network is present",
2023 http_code=vimconn.HTTP_Conflict,
2024 )
2025
2026 if len(external_nets) > 1:
2027 raise vimconn.VimConnException(
2028 "Cannot create floating_ip automatically since "
2029 "multiple external networks are present",
2030 http_code=vimconn.HTTP_Conflict,
2031 )
2032
2033 pool_id = external_nets[0].get("id")
2034
2035 param = {
2036 "floatingip": {
2037 "floating_network_id": pool_id,
2038 "tenant_id": server.tenant_id,
2039 }
2040 }
2041
2042 try:
2043 # self.logger.debug("Creating floating IP")
2044 new_floating_ip = self.neutron.create_floatingip(param)
2045 free_floating_ip = new_floating_ip["floatingip"]["id"]
2046 created_items[
2047 "floating_ip:" + str(free_floating_ip)
2048 ] = True
2049 except Exception as e:
2050 raise vimconn.VimConnException(
2051 type(e).__name__
2052 + ": Cannot create new floating_ip "
2053 + str(e),
2054 http_code=vimconn.HTTP_Conflict,
2055 )
2056
2057 try:
2058 # for race condition ensure not already assigned
2059 fip = self.neutron.show_floatingip(free_floating_ip)
2060
2061 if fip["floatingip"]["port_id"]:
2062 continue
2063
2064 # the vim_id key contains the neutron.port_id
2065 self.neutron.update_floatingip(
2066 free_floating_ip,
2067 {"floatingip": {"port_id": floating_network["vim_id"]}},
2068 )
2069 # for race condition ensure not re-assigned to other VM after 5 seconds
2070 time.sleep(5)
2071 fip = self.neutron.show_floatingip(free_floating_ip)
2072
2073 if (
2074 fip["floatingip"]["port_id"]
2075 != floating_network["vim_id"]
2076 ):
2077 self.logger.error(
2078 "floating_ip {} re-assigned to other port".format(
2079 free_floating_ip
2080 )
2081 )
2082 continue
2083
2084 self.logger.debug(
2085 "Assigned floating_ip {} to VM {}".format(
2086 free_floating_ip, server.id
2087 )
2088 )
2089 assigned = True
2090 except Exception as e:
2091 # openstack need some time after VM creation to assign an IP. So retry if fails
2092 vm_status = self.nova.servers.get(server.id).status
2093
2094 if vm_status not in ("ACTIVE", "ERROR"):
2095 if time.time() - vm_start_time < server_timeout:
2096 time.sleep(5)
2097 continue
2098 elif floating_ip_retries > 0:
2099 floating_ip_retries -= 1
2100 continue
2101
2102 raise vimconn.VimConnException(
2103 "Cannot create floating_ip: {} {}".format(
2104 type(e).__name__, e
2105 ),
2106 http_code=vimconn.HTTP_Conflict,
2107 )
2108
2109 except Exception as e:
2110 if not floating_network["exit_on_floating_ip_error"]:
2111 self.logger.error("Cannot create floating_ip. %s", str(e))
2112 continue
2113
2114 raise
2115
2116 return server.id, created_items
2117 # except nvExceptions.NotFound as e:
2118 # error_value=-vimconn.HTTP_Not_Found
2119 # error_text= "vm instance %s not found" % vm_id
2120 # except TypeError as e:
2121 # raise vimconn.VimConnException(type(e).__name__ + ": "+ str(e), http_code=vimconn.HTTP_Bad_Request)
2122
2123 except Exception as e:
2124 server_id = None
2125 if server:
2126 server_id = server.id
2127
2128 try:
2129 self.delete_vminstance(server_id, created_items)
2130 except Exception as e2:
2131 self.logger.error("new_vminstance rollback fail {}".format(e2))
2132
2133 self._format_exception(e)
2134
2135 def get_vminstance(self, vm_id):
2136 """Returns the VM instance information from VIM"""
2137 # self.logger.debug("Getting VM from VIM")
2138 try:
2139 self._reload_connection()
2140 server = self.nova.servers.find(id=vm_id)
2141 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
2142
2143 return server.to_dict()
2144 except (
2145 ksExceptions.ClientException,
2146 nvExceptions.ClientException,
2147 nvExceptions.NotFound,
2148 ConnectionError,
2149 ) as e:
2150 self._format_exception(e)
2151
2152 def get_vminstance_console(self, vm_id, console_type="vnc"):
2153 """
2154 Get a console for the virtual machine
2155 Params:
2156 vm_id: uuid of the VM
2157 console_type, can be:
2158 "novnc" (by default), "xvpvnc" for VNC types,
2159 "rdp-html5" for RDP types, "spice-html5" for SPICE types
2160 Returns dict with the console parameters:
2161 protocol: ssh, ftp, http, https, ...
2162 server: usually ip address
2163 port: the http, ssh, ... port
2164 suffix: extra text, e.g. the http path and query string
2165 """
2166 self.logger.debug("Getting VM CONSOLE from VIM")
2167
2168 try:
2169 self._reload_connection()
2170 server = self.nova.servers.find(id=vm_id)
2171
2172 if console_type is None or console_type == "novnc":
2173 console_dict = server.get_vnc_console("novnc")
2174 elif console_type == "xvpvnc":
2175 console_dict = server.get_vnc_console(console_type)
2176 elif console_type == "rdp-html5":
2177 console_dict = server.get_rdp_console(console_type)
2178 elif console_type == "spice-html5":
2179 console_dict = server.get_spice_console(console_type)
2180 else:
2181 raise vimconn.VimConnException(
2182 "console type '{}' not allowed".format(console_type),
2183 http_code=vimconn.HTTP_Bad_Request,
2184 )
2185
2186 console_dict1 = console_dict.get("console")
2187
2188 if console_dict1:
2189 console_url = console_dict1.get("url")
2190
2191 if console_url:
2192 # parse console_url
2193 protocol_index = console_url.find("//")
2194 suffix_index = (
2195 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2196 )
2197 port_index = (
2198 console_url[protocol_index + 2 : suffix_index].find(":")
2199 + protocol_index
2200 + 2
2201 )
2202
2203 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
2204 return (
2205 -vimconn.HTTP_Internal_Server_Error,
2206 "Unexpected response from VIM",
2207 )
2208
2209 console_dict = {
2210 "protocol": console_url[0:protocol_index],
2211 "server": console_url[protocol_index + 2 : port_index],
2212 "port": console_url[port_index:suffix_index],
2213 "suffix": console_url[suffix_index + 1 :],
2214 }
2215 protocol_index += 2
2216
2217 return console_dict
2218 raise vimconn.VimConnUnexpectedResponse("Unexpected response from VIM")
2219 except (
2220 nvExceptions.NotFound,
2221 ksExceptions.ClientException,
2222 nvExceptions.ClientException,
2223 nvExceptions.BadRequest,
2224 ConnectionError,
2225 ) as e:
2226 self._format_exception(e)
2227
2228 def delete_vminstance(self, vm_id, created_items=None):
2229 """Removes a VM instance from VIM. Returns the old identifier"""
2230 # print "osconnector: Getting VM from VIM"
2231 if created_items is None:
2232 created_items = {}
2233
2234 try:
2235 self._reload_connection()
2236 # delete VM ports attached to this networks before the virtual machine
2237 for k, v in created_items.items():
2238 if not v: # skip already deleted
2239 continue
2240
2241 try:
2242 k_item, _, k_id = k.partition(":")
2243 if k_item == "port":
2244 self.neutron.delete_port(k_id)
2245 except Exception as e:
2246 self.logger.error(
2247 "Error deleting port: {}: {}".format(type(e).__name__, e)
2248 )
2249
2250 # #commented because detaching the volumes makes the servers.delete not work properly ?!?
2251 # #dettach volumes attached
2252 # server = self.nova.servers.get(vm_id)
2253 # volumes_attached_dict = server._info["os-extended-volumes:volumes_attached"] #volume["id"]
2254 # #for volume in volumes_attached_dict:
2255 # # self.cinder.volumes.detach(volume["id"])
2256
2257 if vm_id:
2258 self.nova.servers.delete(vm_id)
2259
2260 # delete volumes. Although having detached, they should have in active status before deleting
2261 # we ensure in this loop
2262 keep_waiting = True
2263 elapsed_time = 0
2264
2265 while keep_waiting and elapsed_time < volume_timeout:
2266 keep_waiting = False
2267
2268 for k, v in created_items.items():
2269 if not v: # skip already deleted
2270 continue
2271
2272 try:
2273 k_item, _, k_id = k.partition(":")
2274 if k_item == "volume":
2275 if self.cinder.volumes.get(k_id).status != "available":
2276 keep_waiting = True
2277 else:
2278 self.cinder.volumes.delete(k_id)
2279 created_items[k] = None
2280 elif k_item == "floating_ip": # floating ip
2281 self.neutron.delete_floatingip(k_id)
2282 created_items[k] = None
2283
2284 except Exception as e:
2285 self.logger.error("Error deleting {}: {}".format(k, e))
2286
2287 if keep_waiting:
2288 time.sleep(1)
2289 elapsed_time += 1
2290
2291 return None
2292 except (
2293 nvExceptions.NotFound,
2294 ksExceptions.ClientException,
2295 nvExceptions.ClientException,
2296 ConnectionError,
2297 ) as e:
2298 self._format_exception(e)
2299
2300 def refresh_vms_status(self, vm_list):
2301 """Get the status of the virtual machines and their interfaces/ports
2302 Params: the list of VM identifiers
2303 Returns a dictionary with:
2304 vm_id: #VIM id of this Virtual Machine
2305 status: #Mandatory. Text with one of:
2306 # DELETED (not found at vim)
2307 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
2308 # OTHER (Vim reported other status not understood)
2309 # ERROR (VIM indicates an ERROR status)
2310 # ACTIVE, PAUSED, SUSPENDED, INACTIVE (not running),
2311 # CREATING (on building process), ERROR
2312 # ACTIVE:NoMgmtIP (Active but any of its interface has an IP address
2313 #
2314 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
2315 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2316 interfaces:
2317 - vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2318 mac_address: #Text format XX:XX:XX:XX:XX:XX
2319 vim_net_id: #network id where this interface is connected
2320 vim_interface_id: #interface/port VIM id
2321 ip_address: #null, or text with IPv4, IPv6 address
2322 compute_node: #identification of compute node where PF,VF interface is allocated
2323 pci: #PCI address of the NIC that hosts the PF,VF
2324 vlan: #physical VLAN used for VF
2325 """
2326 vm_dict = {}
2327 self.logger.debug(
2328 "refresh_vms status: Getting tenant VM instance information from VIM"
2329 )
2330
2331 for vm_id in vm_list:
2332 vm = {}
2333
2334 try:
2335 vm_vim = self.get_vminstance(vm_id)
2336
2337 if vm_vim["status"] in vmStatus2manoFormat:
2338 vm["status"] = vmStatus2manoFormat[vm_vim["status"]]
2339 else:
2340 vm["status"] = "OTHER"
2341 vm["error_msg"] = "VIM status reported " + vm_vim["status"]
2342
2343 vm_vim.pop("OS-EXT-SRV-ATTR:user_data", None)
2344 vm_vim.pop("user_data", None)
2345 vm["vim_info"] = self.serialize(vm_vim)
2346
2347 vm["interfaces"] = []
2348 if vm_vim.get("fault"):
2349 vm["error_msg"] = str(vm_vim["fault"])
2350
2351 # get interfaces
2352 try:
2353 self._reload_connection()
2354 port_dict = self.neutron.list_ports(device_id=vm_id)
2355
2356 for port in port_dict["ports"]:
2357 interface = {}
2358 interface["vim_info"] = self.serialize(port)
2359 interface["mac_address"] = port.get("mac_address")
2360 interface["vim_net_id"] = port["network_id"]
2361 interface["vim_interface_id"] = port["id"]
2362 # check if OS-EXT-SRV-ATTR:host is there,
2363 # in case of non-admin credentials, it will be missing
2364
2365 if vm_vim.get("OS-EXT-SRV-ATTR:host"):
2366 interface["compute_node"] = vm_vim["OS-EXT-SRV-ATTR:host"]
2367
2368 interface["pci"] = None
2369
2370 # check if binding:profile is there,
2371 # in case of non-admin credentials, it will be missing
2372 if port.get("binding:profile"):
2373 if port["binding:profile"].get("pci_slot"):
2374 # TODO: At the moment sr-iov pci addresses are converted to PF pci addresses by setting
2375 # the slot to 0x00
2376 # TODO: This is just a workaround valid for niantinc. Find a better way to do so
2377 # CHANGE DDDD:BB:SS.F to DDDD:BB:00.(F%2) assuming there are 2 ports per nic
2378 pci = port["binding:profile"]["pci_slot"]
2379 # interface["pci"] = pci[:-4] + "00." + str(int(pci[-1]) % 2)
2380 interface["pci"] = pci
2381
2382 interface["vlan"] = None
2383
2384 if port.get("binding:vif_details"):
2385 interface["vlan"] = port["binding:vif_details"].get("vlan")
2386
2387 # Get vlan from network in case not present in port for those old openstacks and cases where
2388 # it is needed vlan at PT
2389 if not interface["vlan"]:
2390 # if network is of type vlan and port is of type direct (sr-iov) then set vlan id
2391 network = self.neutron.show_network(port["network_id"])
2392
2393 if (
2394 network["network"].get("provider:network_type")
2395 == "vlan"
2396 ):
2397 # and port.get("binding:vnic_type") in ("direct", "direct-physical"):
2398 interface["vlan"] = network["network"].get(
2399 "provider:segmentation_id"
2400 )
2401
2402 ips = []
2403 # look for floating ip address
2404 try:
2405 floating_ip_dict = self.neutron.list_floatingips(
2406 port_id=port["id"]
2407 )
2408
2409 if floating_ip_dict.get("floatingips"):
2410 ips.append(
2411 floating_ip_dict["floatingips"][0].get(
2412 "floating_ip_address"
2413 )
2414 )
2415 except Exception:
2416 pass
2417
2418 for subnet in port["fixed_ips"]:
2419 ips.append(subnet["ip_address"])
2420
2421 interface["ip_address"] = ";".join(ips)
2422 vm["interfaces"].append(interface)
2423 except Exception as e:
2424 self.logger.error(
2425 "Error getting vm interface information {}: {}".format(
2426 type(e).__name__, e
2427 ),
2428 exc_info=True,
2429 )
2430 except vimconn.VimConnNotFoundException as e:
2431 self.logger.error("Exception getting vm status: %s", str(e))
2432 vm["status"] = "DELETED"
2433 vm["error_msg"] = str(e)
2434 except vimconn.VimConnException as e:
2435 self.logger.error("Exception getting vm status: %s", str(e))
2436 vm["status"] = "VIM_ERROR"
2437 vm["error_msg"] = str(e)
2438
2439 vm_dict[vm_id] = vm
2440
2441 return vm_dict
2442
2443 def action_vminstance(self, vm_id, action_dict, created_items={}):
2444 """Send and action over a VM instance from VIM
2445 Returns None or the console dict if the action was successfully sent to the VIM"""
2446 self.logger.debug("Action over VM '%s': %s", vm_id, str(action_dict))
2447
2448 try:
2449 self._reload_connection()
2450 server = self.nova.servers.find(id=vm_id)
2451
2452 if "start" in action_dict:
2453 if action_dict["start"] == "rebuild":
2454 server.rebuild()
2455 else:
2456 if server.status == "PAUSED":
2457 server.unpause()
2458 elif server.status == "SUSPENDED":
2459 server.resume()
2460 elif server.status == "SHUTOFF":
2461 server.start()
2462 elif "pause" in action_dict:
2463 server.pause()
2464 elif "resume" in action_dict:
2465 server.resume()
2466 elif "shutoff" in action_dict or "shutdown" in action_dict:
2467 server.stop()
2468 elif "forceOff" in action_dict:
2469 server.stop() # TODO
2470 elif "terminate" in action_dict:
2471 server.delete()
2472 elif "createImage" in action_dict:
2473 server.create_image()
2474 # "path":path_schema,
2475 # "description":description_schema,
2476 # "name":name_schema,
2477 # "metadata":metadata_schema,
2478 # "imageRef": id_schema,
2479 # "disk": {"oneOf":[{"type": "null"}, {"type":"string"}] },
2480 elif "rebuild" in action_dict:
2481 server.rebuild(server.image["id"])
2482 elif "reboot" in action_dict:
2483 server.reboot() # reboot_type="SOFT"
2484 elif "console" in action_dict:
2485 console_type = action_dict["console"]
2486
2487 if console_type is None or console_type == "novnc":
2488 console_dict = server.get_vnc_console("novnc")
2489 elif console_type == "xvpvnc":
2490 console_dict = server.get_vnc_console(console_type)
2491 elif console_type == "rdp-html5":
2492 console_dict = server.get_rdp_console(console_type)
2493 elif console_type == "spice-html5":
2494 console_dict = server.get_spice_console(console_type)
2495 else:
2496 raise vimconn.VimConnException(
2497 "console type '{}' not allowed".format(console_type),
2498 http_code=vimconn.HTTP_Bad_Request,
2499 )
2500
2501 try:
2502 console_url = console_dict["console"]["url"]
2503 # parse console_url
2504 protocol_index = console_url.find("//")
2505 suffix_index = (
2506 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2507 )
2508 port_index = (
2509 console_url[protocol_index + 2 : suffix_index].find(":")
2510 + protocol_index
2511 + 2
2512 )
2513
2514 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
2515 raise vimconn.VimConnException(
2516 "Unexpected response from VIM " + str(console_dict)
2517 )
2518
2519 console_dict2 = {
2520 "protocol": console_url[0:protocol_index],
2521 "server": console_url[protocol_index + 2 : port_index],
2522 "port": int(console_url[port_index + 1 : suffix_index]),
2523 "suffix": console_url[suffix_index + 1 :],
2524 }
2525
2526 return console_dict2
2527 except Exception:
2528 raise vimconn.VimConnException(
2529 "Unexpected response from VIM " + str(console_dict)
2530 )
2531
2532 return None
2533 except (
2534 ksExceptions.ClientException,
2535 nvExceptions.ClientException,
2536 nvExceptions.NotFound,
2537 ConnectionError,
2538 ) as e:
2539 self._format_exception(e)
2540 # TODO insert exception vimconn.HTTP_Unauthorized
2541
2542 # ###### VIO Specific Changes #########
2543 def _generate_vlanID(self):
2544 """
2545 Method to get unused vlanID
2546 Args:
2547 None
2548 Returns:
2549 vlanID
2550 """
2551 # Get used VLAN IDs
2552 usedVlanIDs = []
2553 networks = self.get_network_list()
2554
2555 for net in networks:
2556 if net.get("provider:segmentation_id"):
2557 usedVlanIDs.append(net.get("provider:segmentation_id"))
2558
2559 used_vlanIDs = set(usedVlanIDs)
2560
2561 # find unused VLAN ID
2562 for vlanID_range in self.config.get("dataplane_net_vlan_range"):
2563 try:
2564 start_vlanid, end_vlanid = map(
2565 int, vlanID_range.replace(" ", "").split("-")
2566 )
2567
2568 for vlanID in range(start_vlanid, end_vlanid + 1):
2569 if vlanID not in used_vlanIDs:
2570 return vlanID
2571 except Exception as exp:
2572 raise vimconn.VimConnException(
2573 "Exception {} occurred while generating VLAN ID.".format(exp)
2574 )
2575 else:
2576 raise vimconn.VimConnConflictException(
2577 "Unable to create the SRIOV VLAN network. All given Vlan IDs {} are in use.".format(
2578 self.config.get("dataplane_net_vlan_range")
2579 )
2580 )
2581
2582 def _generate_multisegment_vlanID(self):
2583 """
2584 Method to get unused vlanID
2585 Args:
2586 None
2587 Returns:
2588 vlanID
2589 """
2590 # Get used VLAN IDs
2591 usedVlanIDs = []
2592 networks = self.get_network_list()
2593 for net in networks:
2594 if net.get("provider:network_type") == "vlan" and net.get(
2595 "provider:segmentation_id"
2596 ):
2597 usedVlanIDs.append(net.get("provider:segmentation_id"))
2598 elif net.get("segments"):
2599 for segment in net.get("segments"):
2600 if segment.get("provider:network_type") == "vlan" and segment.get(
2601 "provider:segmentation_id"
2602 ):
2603 usedVlanIDs.append(segment.get("provider:segmentation_id"))
2604
2605 used_vlanIDs = set(usedVlanIDs)
2606
2607 # find unused VLAN ID
2608 for vlanID_range in self.config.get("multisegment_vlan_range"):
2609 try:
2610 start_vlanid, end_vlanid = map(
2611 int, vlanID_range.replace(" ", "").split("-")
2612 )
2613
2614 for vlanID in range(start_vlanid, end_vlanid + 1):
2615 if vlanID not in used_vlanIDs:
2616 return vlanID
2617 except Exception as exp:
2618 raise vimconn.VimConnException(
2619 "Exception {} occurred while generating VLAN ID.".format(exp)
2620 )
2621 else:
2622 raise vimconn.VimConnConflictException(
2623 "Unable to create the VLAN segment. All VLAN IDs {} are in use.".format(
2624 self.config.get("multisegment_vlan_range")
2625 )
2626 )
2627
2628 def _validate_vlan_ranges(self, input_vlan_range, text_vlan_range):
2629 """
2630 Method to validate user given vlanID ranges
2631 Args: None
2632 Returns: None
2633 """
2634 for vlanID_range in input_vlan_range:
2635 vlan_range = vlanID_range.replace(" ", "")
2636 # validate format
2637 vlanID_pattern = r"(\d)*-(\d)*$"
2638 match_obj = re.match(vlanID_pattern, vlan_range)
2639 if not match_obj:
2640 raise vimconn.VimConnConflictException(
2641 "Invalid VLAN range for {}: {}.You must provide "
2642 "'{}' in format [start_ID - end_ID].".format(
2643 text_vlan_range, vlanID_range, text_vlan_range
2644 )
2645 )
2646
2647 start_vlanid, end_vlanid = map(int, vlan_range.split("-"))
2648 if start_vlanid <= 0:
2649 raise vimconn.VimConnConflictException(
2650 "Invalid VLAN range for {}: {}. Start ID can not be zero. For VLAN "
2651 "networks valid IDs are 1 to 4094 ".format(
2652 text_vlan_range, vlanID_range
2653 )
2654 )
2655
2656 if end_vlanid > 4094:
2657 raise vimconn.VimConnConflictException(
2658 "Invalid VLAN range for {}: {}. End VLAN ID can not be "
2659 "greater than 4094. For VLAN networks valid IDs are 1 to 4094 ".format(
2660 text_vlan_range, vlanID_range
2661 )
2662 )
2663
2664 if start_vlanid > end_vlanid:
2665 raise vimconn.VimConnConflictException(
2666 "Invalid VLAN range for {}: {}. You must provide '{}'"
2667 " in format start_ID - end_ID and start_ID < end_ID ".format(
2668 text_vlan_range, vlanID_range, text_vlan_range
2669 )
2670 )
2671
2672 # NOT USED FUNCTIONS
2673
2674 def new_external_port(self, port_data):
2675 """Adds a external port to VIM
2676 Returns the port identifier"""
2677 # TODO openstack if needed
2678 return (
2679 -vimconn.HTTP_Internal_Server_Error,
2680 "osconnector.new_external_port() not implemented",
2681 )
2682
2683 def connect_port_network(self, port_id, network_id, admin=False):
2684 """Connects a external port to a network
2685 Returns status code of the VIM response"""
2686 # TODO openstack if needed
2687 return (
2688 -vimconn.HTTP_Internal_Server_Error,
2689 "osconnector.connect_port_network() not implemented",
2690 )
2691
2692 def new_user(self, user_name, user_passwd, tenant_id=None):
2693 """Adds a new user to openstack VIM
2694 Returns the user identifier"""
2695 self.logger.debug("osconnector: Adding a new user to VIM")
2696
2697 try:
2698 self._reload_connection()
2699 user = self.keystone.users.create(
2700 user_name, password=user_passwd, default_project=tenant_id
2701 )
2702 # self.keystone.tenants.add_user(self.k_creds["username"], #role)
2703
2704 return user.id
2705 except ksExceptions.ConnectionError as e:
2706 error_value = -vimconn.HTTP_Bad_Request
2707 error_text = (
2708 type(e).__name__
2709 + ": "
2710 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2711 )
2712 except ksExceptions.ClientException as e: # TODO remove
2713 error_value = -vimconn.HTTP_Bad_Request
2714 error_text = (
2715 type(e).__name__
2716 + ": "
2717 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2718 )
2719
2720 # TODO insert exception vimconn.HTTP_Unauthorized
2721 # if reaching here is because an exception
2722 self.logger.debug("new_user " + error_text)
2723
2724 return error_value, error_text
2725
2726 def delete_user(self, user_id):
2727 """Delete a user from openstack VIM
2728 Returns the user identifier"""
2729 if self.debug:
2730 print("osconnector: Deleting a user from VIM")
2731
2732 try:
2733 self._reload_connection()
2734 self.keystone.users.delete(user_id)
2735
2736 return 1, user_id
2737 except ksExceptions.ConnectionError as e:
2738 error_value = -vimconn.HTTP_Bad_Request
2739 error_text = (
2740 type(e).__name__
2741 + ": "
2742 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2743 )
2744 except ksExceptions.NotFound as e:
2745 error_value = -vimconn.HTTP_Not_Found
2746 error_text = (
2747 type(e).__name__
2748 + ": "
2749 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2750 )
2751 except ksExceptions.ClientException as e: # TODO remove
2752 error_value = -vimconn.HTTP_Bad_Request
2753 error_text = (
2754 type(e).__name__
2755 + ": "
2756 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2757 )
2758
2759 # TODO insert exception vimconn.HTTP_Unauthorized
2760 # if reaching here is because an exception
2761 self.logger.debug("delete_tenant " + error_text)
2762
2763 return error_value, error_text
2764
2765 def get_hosts_info(self):
2766 """Get the information of deployed hosts
2767 Returns the hosts content"""
2768 if self.debug:
2769 print("osconnector: Getting Host info from VIM")
2770
2771 try:
2772 h_list = []
2773 self._reload_connection()
2774 hypervisors = self.nova.hypervisors.list()
2775
2776 for hype in hypervisors:
2777 h_list.append(hype.to_dict())
2778
2779 return 1, {"hosts": h_list}
2780 except nvExceptions.NotFound as e:
2781 error_value = -vimconn.HTTP_Not_Found
2782 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
2783 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
2784 error_value = -vimconn.HTTP_Bad_Request
2785 error_text = (
2786 type(e).__name__
2787 + ": "
2788 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2789 )
2790
2791 # TODO insert exception vimconn.HTTP_Unauthorized
2792 # if reaching here is because an exception
2793 self.logger.debug("get_hosts_info " + error_text)
2794
2795 return error_value, error_text
2796
2797 def get_hosts(self, vim_tenant):
2798 """Get the hosts and deployed instances
2799 Returns the hosts content"""
2800 r, hype_dict = self.get_hosts_info()
2801
2802 if r < 0:
2803 return r, hype_dict
2804
2805 hypervisors = hype_dict["hosts"]
2806
2807 try:
2808 servers = self.nova.servers.list()
2809 for hype in hypervisors:
2810 for server in servers:
2811 if (
2812 server.to_dict()["OS-EXT-SRV-ATTR:hypervisor_hostname"]
2813 == hype["hypervisor_hostname"]
2814 ):
2815 if "vm" in hype:
2816 hype["vm"].append(server.id)
2817 else:
2818 hype["vm"] = [server.id]
2819
2820 return 1, hype_dict
2821 except nvExceptions.NotFound as e:
2822 error_value = -vimconn.HTTP_Not_Found
2823 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
2824 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
2825 error_value = -vimconn.HTTP_Bad_Request
2826 error_text = (
2827 type(e).__name__
2828 + ": "
2829 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2830 )
2831
2832 # TODO insert exception vimconn.HTTP_Unauthorized
2833 # if reaching here is because an exception
2834 self.logger.debug("get_hosts " + error_text)
2835
2836 return error_value, error_text
2837
2838 def new_classification(self, name, ctype, definition):
2839 self.logger.debug(
2840 "Adding a new (Traffic) Classification to VIM, named %s", name
2841 )
2842
2843 try:
2844 new_class = None
2845 self._reload_connection()
2846
2847 if ctype not in supportedClassificationTypes:
2848 raise vimconn.VimConnNotSupportedException(
2849 "OpenStack VIM connector does not support provided "
2850 "Classification Type {}, supported ones are: {}".format(
2851 ctype, supportedClassificationTypes
2852 )
2853 )
2854
2855 if not self._validate_classification(ctype, definition):
2856 raise vimconn.VimConnException(
2857 "Incorrect Classification definition for the type specified."
2858 )
2859
2860 classification_dict = definition
2861 classification_dict["name"] = name
2862 new_class = self.neutron.create_sfc_flow_classifier(
2863 {"flow_classifier": classification_dict}
2864 )
2865
2866 return new_class["flow_classifier"]["id"]
2867 except (
2868 neExceptions.ConnectionFailed,
2869 ksExceptions.ClientException,
2870 neExceptions.NeutronException,
2871 ConnectionError,
2872 ) as e:
2873 self.logger.error("Creation of Classification failed.")
2874 self._format_exception(e)
2875
2876 def get_classification(self, class_id):
2877 self.logger.debug(" Getting Classification %s from VIM", class_id)
2878 filter_dict = {"id": class_id}
2879 class_list = self.get_classification_list(filter_dict)
2880
2881 if len(class_list) == 0:
2882 raise vimconn.VimConnNotFoundException(
2883 "Classification '{}' not found".format(class_id)
2884 )
2885 elif len(class_list) > 1:
2886 raise vimconn.VimConnConflictException(
2887 "Found more than one Classification with this criteria"
2888 )
2889
2890 classification = class_list[0]
2891
2892 return classification
2893
2894 def get_classification_list(self, filter_dict={}):
2895 self.logger.debug(
2896 "Getting Classifications from VIM filter: '%s'", str(filter_dict)
2897 )
2898
2899 try:
2900 filter_dict_os = filter_dict.copy()
2901 self._reload_connection()
2902
2903 if self.api_version3 and "tenant_id" in filter_dict_os:
2904 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
2905
2906 classification_dict = self.neutron.list_sfc_flow_classifiers(
2907 **filter_dict_os
2908 )
2909 classification_list = classification_dict["flow_classifiers"]
2910 self.__classification_os2mano(classification_list)
2911
2912 return classification_list
2913 except (
2914 neExceptions.ConnectionFailed,
2915 ksExceptions.ClientException,
2916 neExceptions.NeutronException,
2917 ConnectionError,
2918 ) as e:
2919 self._format_exception(e)
2920
2921 def delete_classification(self, class_id):
2922 self.logger.debug("Deleting Classification '%s' from VIM", class_id)
2923
2924 try:
2925 self._reload_connection()
2926 self.neutron.delete_sfc_flow_classifier(class_id)
2927
2928 return class_id
2929 except (
2930 neExceptions.ConnectionFailed,
2931 neExceptions.NeutronException,
2932 ksExceptions.ClientException,
2933 neExceptions.NeutronException,
2934 ConnectionError,
2935 ) as e:
2936 self._format_exception(e)
2937
2938 def new_sfi(self, name, ingress_ports, egress_ports, sfc_encap=True):
2939 self.logger.debug(
2940 "Adding a new Service Function Instance to VIM, named '%s'", name
2941 )
2942
2943 try:
2944 new_sfi = None
2945 self._reload_connection()
2946 correlation = None
2947
2948 if sfc_encap:
2949 correlation = "nsh"
2950
2951 if len(ingress_ports) != 1:
2952 raise vimconn.VimConnNotSupportedException(
2953 "OpenStack VIM connector can only have 1 ingress port per SFI"
2954 )
2955
2956 if len(egress_ports) != 1:
2957 raise vimconn.VimConnNotSupportedException(
2958 "OpenStack VIM connector can only have 1 egress port per SFI"
2959 )
2960
2961 sfi_dict = {
2962 "name": name,
2963 "ingress": ingress_ports[0],
2964 "egress": egress_ports[0],
2965 "service_function_parameters": {"correlation": correlation},
2966 }
2967 new_sfi = self.neutron.create_sfc_port_pair({"port_pair": sfi_dict})
2968
2969 return new_sfi["port_pair"]["id"]
2970 except (
2971 neExceptions.ConnectionFailed,
2972 ksExceptions.ClientException,
2973 neExceptions.NeutronException,
2974 ConnectionError,
2975 ) as e:
2976 if new_sfi:
2977 try:
2978 self.neutron.delete_sfc_port_pair(new_sfi["port_pair"]["id"])
2979 except Exception:
2980 self.logger.error(
2981 "Creation of Service Function Instance failed, with "
2982 "subsequent deletion failure as well."
2983 )
2984
2985 self._format_exception(e)
2986
2987 def get_sfi(self, sfi_id):
2988 self.logger.debug("Getting Service Function Instance %s from VIM", sfi_id)
2989 filter_dict = {"id": sfi_id}
2990 sfi_list = self.get_sfi_list(filter_dict)
2991
2992 if len(sfi_list) == 0:
2993 raise vimconn.VimConnNotFoundException(
2994 "Service Function Instance '{}' not found".format(sfi_id)
2995 )
2996 elif len(sfi_list) > 1:
2997 raise vimconn.VimConnConflictException(
2998 "Found more than one Service Function Instance with this criteria"
2999 )
3000
3001 sfi = sfi_list[0]
3002
3003 return sfi
3004
3005 def get_sfi_list(self, filter_dict={}):
3006 self.logger.debug(
3007 "Getting Service Function Instances from VIM filter: '%s'", str(filter_dict)
3008 )
3009
3010 try:
3011 self._reload_connection()
3012 filter_dict_os = filter_dict.copy()
3013
3014 if self.api_version3 and "tenant_id" in filter_dict_os:
3015 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3016
3017 sfi_dict = self.neutron.list_sfc_port_pairs(**filter_dict_os)
3018 sfi_list = sfi_dict["port_pairs"]
3019 self.__sfi_os2mano(sfi_list)
3020
3021 return sfi_list
3022 except (
3023 neExceptions.ConnectionFailed,
3024 ksExceptions.ClientException,
3025 neExceptions.NeutronException,
3026 ConnectionError,
3027 ) as e:
3028 self._format_exception(e)
3029
3030 def delete_sfi(self, sfi_id):
3031 self.logger.debug("Deleting Service Function Instance '%s' from VIM", sfi_id)
3032
3033 try:
3034 self._reload_connection()
3035 self.neutron.delete_sfc_port_pair(sfi_id)
3036
3037 return sfi_id
3038 except (
3039 neExceptions.ConnectionFailed,
3040 neExceptions.NeutronException,
3041 ksExceptions.ClientException,
3042 neExceptions.NeutronException,
3043 ConnectionError,
3044 ) as e:
3045 self._format_exception(e)
3046
3047 def new_sf(self, name, sfis, sfc_encap=True):
3048 self.logger.debug("Adding a new Service Function to VIM, named '%s'", name)
3049
3050 try:
3051 new_sf = None
3052 self._reload_connection()
3053 # correlation = None
3054 # if sfc_encap:
3055 # correlation = "nsh"
3056
3057 for instance in sfis:
3058 sfi = self.get_sfi(instance)
3059
3060 if sfi.get("sfc_encap") != sfc_encap:
3061 raise vimconn.VimConnNotSupportedException(
3062 "OpenStack VIM connector requires all SFIs of the "
3063 "same SF to share the same SFC Encapsulation"
3064 )
3065
3066 sf_dict = {"name": name, "port_pairs": sfis}
3067 new_sf = self.neutron.create_sfc_port_pair_group(
3068 {"port_pair_group": sf_dict}
3069 )
3070
3071 return new_sf["port_pair_group"]["id"]
3072 except (
3073 neExceptions.ConnectionFailed,
3074 ksExceptions.ClientException,
3075 neExceptions.NeutronException,
3076 ConnectionError,
3077 ) as e:
3078 if new_sf:
3079 try:
3080 self.neutron.delete_sfc_port_pair_group(
3081 new_sf["port_pair_group"]["id"]
3082 )
3083 except Exception:
3084 self.logger.error(
3085 "Creation of Service Function failed, with "
3086 "subsequent deletion failure as well."
3087 )
3088
3089 self._format_exception(e)
3090
3091 def get_sf(self, sf_id):
3092 self.logger.debug("Getting Service Function %s from VIM", sf_id)
3093 filter_dict = {"id": sf_id}
3094 sf_list = self.get_sf_list(filter_dict)
3095
3096 if len(sf_list) == 0:
3097 raise vimconn.VimConnNotFoundException(
3098 "Service Function '{}' not found".format(sf_id)
3099 )
3100 elif len(sf_list) > 1:
3101 raise vimconn.VimConnConflictException(
3102 "Found more than one Service Function with this criteria"
3103 )
3104
3105 sf = sf_list[0]
3106
3107 return sf
3108
3109 def get_sf_list(self, filter_dict={}):
3110 self.logger.debug(
3111 "Getting Service Function from VIM filter: '%s'", str(filter_dict)
3112 )
3113
3114 try:
3115 self._reload_connection()
3116 filter_dict_os = filter_dict.copy()
3117
3118 if self.api_version3 and "tenant_id" in filter_dict_os:
3119 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3120
3121 sf_dict = self.neutron.list_sfc_port_pair_groups(**filter_dict_os)
3122 sf_list = sf_dict["port_pair_groups"]
3123 self.__sf_os2mano(sf_list)
3124
3125 return sf_list
3126 except (
3127 neExceptions.ConnectionFailed,
3128 ksExceptions.ClientException,
3129 neExceptions.NeutronException,
3130 ConnectionError,
3131 ) as e:
3132 self._format_exception(e)
3133
3134 def delete_sf(self, sf_id):
3135 self.logger.debug("Deleting Service Function '%s' from VIM", sf_id)
3136
3137 try:
3138 self._reload_connection()
3139 self.neutron.delete_sfc_port_pair_group(sf_id)
3140
3141 return sf_id
3142 except (
3143 neExceptions.ConnectionFailed,
3144 neExceptions.NeutronException,
3145 ksExceptions.ClientException,
3146 neExceptions.NeutronException,
3147 ConnectionError,
3148 ) as e:
3149 self._format_exception(e)
3150
3151 def new_sfp(self, name, classifications, sfs, sfc_encap=True, spi=None):
3152 self.logger.debug("Adding a new Service Function Path to VIM, named '%s'", name)
3153
3154 try:
3155 new_sfp = None
3156 self._reload_connection()
3157 # In networking-sfc the MPLS encapsulation is legacy
3158 # should be used when no full SFC Encapsulation is intended
3159 correlation = "mpls"
3160
3161 if sfc_encap:
3162 correlation = "nsh"
3163
3164 sfp_dict = {
3165 "name": name,
3166 "flow_classifiers": classifications,
3167 "port_pair_groups": sfs,
3168 "chain_parameters": {"correlation": correlation},
3169 }
3170
3171 if spi:
3172 sfp_dict["chain_id"] = spi
3173
3174 new_sfp = self.neutron.create_sfc_port_chain({"port_chain": sfp_dict})
3175
3176 return new_sfp["port_chain"]["id"]
3177 except (
3178 neExceptions.ConnectionFailed,
3179 ksExceptions.ClientException,
3180 neExceptions.NeutronException,
3181 ConnectionError,
3182 ) as e:
3183 if new_sfp:
3184 try:
3185 self.neutron.delete_sfc_port_chain(new_sfp["port_chain"]["id"])
3186 except Exception:
3187 self.logger.error(
3188 "Creation of Service Function Path failed, with "
3189 "subsequent deletion failure as well."
3190 )
3191
3192 self._format_exception(e)
3193
3194 def get_sfp(self, sfp_id):
3195 self.logger.debug(" Getting Service Function Path %s from VIM", sfp_id)
3196
3197 filter_dict = {"id": sfp_id}
3198 sfp_list = self.get_sfp_list(filter_dict)
3199
3200 if len(sfp_list) == 0:
3201 raise vimconn.VimConnNotFoundException(
3202 "Service Function Path '{}' not found".format(sfp_id)
3203 )
3204 elif len(sfp_list) > 1:
3205 raise vimconn.VimConnConflictException(
3206 "Found more than one Service Function Path with this criteria"
3207 )
3208
3209 sfp = sfp_list[0]
3210
3211 return sfp
3212
3213 def get_sfp_list(self, filter_dict={}):
3214 self.logger.debug(
3215 "Getting Service Function Paths from VIM filter: '%s'", str(filter_dict)
3216 )
3217
3218 try:
3219 self._reload_connection()
3220 filter_dict_os = filter_dict.copy()
3221
3222 if self.api_version3 and "tenant_id" in filter_dict_os:
3223 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3224
3225 sfp_dict = self.neutron.list_sfc_port_chains(**filter_dict_os)
3226 sfp_list = sfp_dict["port_chains"]
3227 self.__sfp_os2mano(sfp_list)
3228
3229 return sfp_list
3230 except (
3231 neExceptions.ConnectionFailed,
3232 ksExceptions.ClientException,
3233 neExceptions.NeutronException,
3234 ConnectionError,
3235 ) as e:
3236 self._format_exception(e)
3237
3238 def delete_sfp(self, sfp_id):
3239 self.logger.debug("Deleting Service Function Path '%s' from VIM", sfp_id)
3240
3241 try:
3242 self._reload_connection()
3243 self.neutron.delete_sfc_port_chain(sfp_id)
3244
3245 return sfp_id
3246 except (
3247 neExceptions.ConnectionFailed,
3248 neExceptions.NeutronException,
3249 ksExceptions.ClientException,
3250 neExceptions.NeutronException,
3251 ConnectionError,
3252 ) as e:
3253 self._format_exception(e)
3254
3255 def refresh_sfps_status(self, sfp_list):
3256 """Get the status of the service function path
3257 Params: the list of sfp identifiers
3258 Returns a dictionary with:
3259 vm_id: #VIM id of this service function path
3260 status: #Mandatory. Text with one of:
3261 # DELETED (not found at vim)
3262 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3263 # OTHER (Vim reported other status not understood)
3264 # ERROR (VIM indicates an ERROR status)
3265 # ACTIVE,
3266 # CREATING (on building process)
3267 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3268 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)F
3269 """
3270 sfp_dict = {}
3271 self.logger.debug(
3272 "refresh_sfps status: Getting tenant SFP information from VIM"
3273 )
3274
3275 for sfp_id in sfp_list:
3276 sfp = {}
3277
3278 try:
3279 sfp_vim = self.get_sfp(sfp_id)
3280
3281 if sfp_vim["spi"]:
3282 sfp["status"] = vmStatus2manoFormat["ACTIVE"]
3283 else:
3284 sfp["status"] = "OTHER"
3285 sfp["error_msg"] = "VIM status reported " + sfp["status"]
3286
3287 sfp["vim_info"] = self.serialize(sfp_vim)
3288
3289 if sfp_vim.get("fault"):
3290 sfp["error_msg"] = str(sfp_vim["fault"])
3291 except vimconn.VimConnNotFoundException as e:
3292 self.logger.error("Exception getting sfp status: %s", str(e))
3293 sfp["status"] = "DELETED"
3294 sfp["error_msg"] = str(e)
3295 except vimconn.VimConnException as e:
3296 self.logger.error("Exception getting sfp status: %s", str(e))
3297 sfp["status"] = "VIM_ERROR"
3298 sfp["error_msg"] = str(e)
3299
3300 sfp_dict[sfp_id] = sfp
3301
3302 return sfp_dict
3303
3304 def refresh_sfis_status(self, sfi_list):
3305 """Get the status of the service function instances
3306 Params: the list of sfi identifiers
3307 Returns a dictionary with:
3308 vm_id: #VIM id of this service function instance
3309 status: #Mandatory. Text with one of:
3310 # DELETED (not found at vim)
3311 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3312 # OTHER (Vim reported other status not understood)
3313 # ERROR (VIM indicates an ERROR status)
3314 # ACTIVE,
3315 # CREATING (on building process)
3316 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3317 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
3318 """
3319 sfi_dict = {}
3320 self.logger.debug(
3321 "refresh_sfis status: Getting tenant sfi information from VIM"
3322 )
3323
3324 for sfi_id in sfi_list:
3325 sfi = {}
3326
3327 try:
3328 sfi_vim = self.get_sfi(sfi_id)
3329
3330 if sfi_vim:
3331 sfi["status"] = vmStatus2manoFormat["ACTIVE"]
3332 else:
3333 sfi["status"] = "OTHER"
3334 sfi["error_msg"] = "VIM status reported " + sfi["status"]
3335
3336 sfi["vim_info"] = self.serialize(sfi_vim)
3337
3338 if sfi_vim.get("fault"):
3339 sfi["error_msg"] = str(sfi_vim["fault"])
3340 except vimconn.VimConnNotFoundException as e:
3341 self.logger.error("Exception getting sfi status: %s", str(e))
3342 sfi["status"] = "DELETED"
3343 sfi["error_msg"] = str(e)
3344 except vimconn.VimConnException as e:
3345 self.logger.error("Exception getting sfi status: %s", str(e))
3346 sfi["status"] = "VIM_ERROR"
3347 sfi["error_msg"] = str(e)
3348
3349 sfi_dict[sfi_id] = sfi
3350
3351 return sfi_dict
3352
3353 def refresh_sfs_status(self, sf_list):
3354 """Get the status of the service functions
3355 Params: the list of sf identifiers
3356 Returns a dictionary with:
3357 vm_id: #VIM id of this service function
3358 status: #Mandatory. Text with one of:
3359 # DELETED (not found at vim)
3360 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3361 # OTHER (Vim reported other status not understood)
3362 # ERROR (VIM indicates an ERROR status)
3363 # ACTIVE,
3364 # CREATING (on building process)
3365 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3366 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
3367 """
3368 sf_dict = {}
3369 self.logger.debug("refresh_sfs status: Getting tenant sf information from VIM")
3370
3371 for sf_id in sf_list:
3372 sf = {}
3373
3374 try:
3375 sf_vim = self.get_sf(sf_id)
3376
3377 if sf_vim:
3378 sf["status"] = vmStatus2manoFormat["ACTIVE"]
3379 else:
3380 sf["status"] = "OTHER"
3381 sf["error_msg"] = "VIM status reported " + sf_vim["status"]
3382
3383 sf["vim_info"] = self.serialize(sf_vim)
3384
3385 if sf_vim.get("fault"):
3386 sf["error_msg"] = str(sf_vim["fault"])
3387 except vimconn.VimConnNotFoundException as e:
3388 self.logger.error("Exception getting sf status: %s", str(e))
3389 sf["status"] = "DELETED"
3390 sf["error_msg"] = str(e)
3391 except vimconn.VimConnException as e:
3392 self.logger.error("Exception getting sf status: %s", str(e))
3393 sf["status"] = "VIM_ERROR"
3394 sf["error_msg"] = str(e)
3395
3396 sf_dict[sf_id] = sf
3397
3398 return sf_dict
3399
3400 def refresh_classifications_status(self, classification_list):
3401 """Get the status of the classifications
3402 Params: the list of classification identifiers
3403 Returns a dictionary with:
3404 vm_id: #VIM id of this classifier
3405 status: #Mandatory. Text with one of:
3406 # DELETED (not found at vim)
3407 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3408 # OTHER (Vim reported other status not understood)
3409 # ERROR (VIM indicates an ERROR status)
3410 # ACTIVE,
3411 # CREATING (on building process)
3412 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3413 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
3414 """
3415 classification_dict = {}
3416 self.logger.debug(
3417 "refresh_classifications status: Getting tenant classification information from VIM"
3418 )
3419
3420 for classification_id in classification_list:
3421 classification = {}
3422
3423 try:
3424 classification_vim = self.get_classification(classification_id)
3425
3426 if classification_vim:
3427 classification["status"] = vmStatus2manoFormat["ACTIVE"]
3428 else:
3429 classification["status"] = "OTHER"
3430 classification["error_msg"] = (
3431 "VIM status reported " + classification["status"]
3432 )
3433
3434 classification["vim_info"] = self.serialize(classification_vim)
3435
3436 if classification_vim.get("fault"):
3437 classification["error_msg"] = str(classification_vim["fault"])
3438 except vimconn.VimConnNotFoundException as e:
3439 self.logger.error("Exception getting classification status: %s", str(e))
3440 classification["status"] = "DELETED"
3441 classification["error_msg"] = str(e)
3442 except vimconn.VimConnException as e:
3443 self.logger.error("Exception getting classification status: %s", str(e))
3444 classification["status"] = "VIM_ERROR"
3445 classification["error_msg"] = str(e)
3446
3447 classification_dict[classification_id] = classification
3448
3449 return classification_dict