8f96f6b447761b5694b5c386eeb1e9839e55d1c4
[osm/RO.git] / RO-VIM-openstack / osm_rovim_openstack / vimconn_openstack.py
1 # -*- coding: utf-8 -*-
2
3 ##
4 # Copyright 2015 Telefonica Investigacion y Desarrollo, S.A.U.
5 # This file is part of openmano
6 # All Rights Reserved.
7 #
8 # Licensed under the Apache License, Version 2.0 (the "License"); you may
9 # not use this file except in compliance with the License. You may obtain
10 # a copy of the License at
11 #
12 # http://www.apache.org/licenses/LICENSE-2.0
13 #
14 # Unless required by applicable law or agreed to in writing, software
15 # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
17 # License for the specific language governing permissions and limitations
18 # under the License.
19 ##
20
21 """
22 osconnector implements all the methods to interact with openstack using the python-neutronclient.
23
24 For the VNF forwarding graph, The OpenStack VIM connector calls the
25 networking-sfc Neutron extension methods, whose resources are mapped
26 to the VIM connector's SFC resources as follows:
27 - Classification (OSM) -> Flow Classifier (Neutron)
28 - Service Function Instance (OSM) -> Port Pair (Neutron)
29 - Service Function (OSM) -> Port Pair Group (Neutron)
30 - Service Function Path (OSM) -> Port Chain (Neutron)
31 """
32
33 import copy
34 from http.client import HTTPException
35 import logging
36 from pprint import pformat
37 import random
38 import re
39 import time
40
41 from cinderclient import client as cClient
42 from glanceclient import client as glClient
43 import glanceclient.exc as gl1Exceptions
44 from keystoneauth1 import session
45 from keystoneauth1.identity import v2, v3
46 import keystoneclient.exceptions as ksExceptions
47 import keystoneclient.v2_0.client as ksClient_v2
48 import keystoneclient.v3.client as ksClient_v3
49 import netaddr
50 from neutronclient.common import exceptions as neExceptions
51 from neutronclient.neutron import client as neClient
52 from novaclient import client as nClient, exceptions as nvExceptions
53 from osm_ro_plugin import vimconn
54 from requests.exceptions import ConnectionError
55 import yaml
56
57 __author__ = "Alfonso Tierno, Gerardo Garcia, Pablo Montes, xFlow Research, Igor D.C., Eduardo Sousa"
58 __date__ = "$22-sep-2017 23:59:59$"
59
60 """contain the openstack virtual machine status to openmano status"""
61 vmStatus2manoFormat = {
62 "ACTIVE": "ACTIVE",
63 "PAUSED": "PAUSED",
64 "SUSPENDED": "SUSPENDED",
65 "SHUTOFF": "INACTIVE",
66 "BUILD": "BUILD",
67 "ERROR": "ERROR",
68 "DELETED": "DELETED",
69 }
70 netStatus2manoFormat = {
71 "ACTIVE": "ACTIVE",
72 "PAUSED": "PAUSED",
73 "INACTIVE": "INACTIVE",
74 "BUILD": "BUILD",
75 "ERROR": "ERROR",
76 "DELETED": "DELETED",
77 }
78
79 supportedClassificationTypes = ["legacy_flow_classifier"]
80
81 # global var to have a timeout creating and deleting volumes
82 volume_timeout = 1800
83 server_timeout = 1800
84
85
86 class SafeDumper(yaml.SafeDumper):
87 def represent_data(self, data):
88 # Openstack APIs use custom subclasses of dict and YAML safe dumper
89 # is designed to not handle that (reference issue 142 of pyyaml)
90 if isinstance(data, dict) and data.__class__ != dict:
91 # A simple solution is to convert those items back to dicts
92 data = dict(data.items())
93
94 return super(SafeDumper, self).represent_data(data)
95
96
97 class vimconnector(vimconn.VimConnector):
98 def __init__(
99 self,
100 uuid,
101 name,
102 tenant_id,
103 tenant_name,
104 url,
105 url_admin=None,
106 user=None,
107 passwd=None,
108 log_level=None,
109 config={},
110 persistent_info={},
111 ):
112 """using common constructor parameters. In this case
113 'url' is the keystone authorization url,
114 'url_admin' is not use
115 """
116 api_version = config.get("APIversion")
117
118 if api_version and api_version not in ("v3.3", "v2.0", "2", "3"):
119 raise vimconn.VimConnException(
120 "Invalid value '{}' for config:APIversion. "
121 "Allowed values are 'v3.3', 'v2.0', '2' or '3'".format(api_version)
122 )
123
124 vim_type = config.get("vim_type")
125
126 if vim_type and vim_type not in ("vio", "VIO"):
127 raise vimconn.VimConnException(
128 "Invalid value '{}' for config:vim_type."
129 "Allowed values are 'vio' or 'VIO'".format(vim_type)
130 )
131
132 if config.get("dataplane_net_vlan_range") is not None:
133 # validate vlan ranges provided by user
134 self._validate_vlan_ranges(
135 config.get("dataplane_net_vlan_range"), "dataplane_net_vlan_range"
136 )
137
138 if config.get("multisegment_vlan_range") is not None:
139 # validate vlan ranges provided by user
140 self._validate_vlan_ranges(
141 config.get("multisegment_vlan_range"), "multisegment_vlan_range"
142 )
143
144 vimconn.VimConnector.__init__(
145 self,
146 uuid,
147 name,
148 tenant_id,
149 tenant_name,
150 url,
151 url_admin,
152 user,
153 passwd,
154 log_level,
155 config,
156 )
157
158 if self.config.get("insecure") and self.config.get("ca_cert"):
159 raise vimconn.VimConnException(
160 "options insecure and ca_cert are mutually exclusive"
161 )
162
163 self.verify = True
164
165 if self.config.get("insecure"):
166 self.verify = False
167
168 if self.config.get("ca_cert"):
169 self.verify = self.config.get("ca_cert")
170
171 if not url:
172 raise TypeError("url param can not be NoneType")
173
174 self.persistent_info = persistent_info
175 self.availability_zone = persistent_info.get("availability_zone", None)
176 self.session = persistent_info.get("session", {"reload_client": True})
177 self.my_tenant_id = self.session.get("my_tenant_id")
178 self.nova = self.session.get("nova")
179 self.neutron = self.session.get("neutron")
180 self.cinder = self.session.get("cinder")
181 self.glance = self.session.get("glance")
182 # self.glancev1 = self.session.get("glancev1")
183 self.keystone = self.session.get("keystone")
184 self.api_version3 = self.session.get("api_version3")
185 self.vim_type = self.config.get("vim_type")
186
187 if self.vim_type:
188 self.vim_type = self.vim_type.upper()
189
190 if self.config.get("use_internal_endpoint"):
191 self.endpoint_type = "internalURL"
192 else:
193 self.endpoint_type = None
194
195 logging.getLogger("urllib3").setLevel(logging.WARNING)
196 logging.getLogger("keystoneauth").setLevel(logging.WARNING)
197 logging.getLogger("novaclient").setLevel(logging.WARNING)
198 self.logger = logging.getLogger("ro.vim.openstack")
199
200 # allow security_groups to be a list or a single string
201 if isinstance(self.config.get("security_groups"), str):
202 self.config["security_groups"] = [self.config["security_groups"]]
203
204 self.security_groups_id = None
205
206 # ###### VIO Specific Changes #########
207 if self.vim_type == "VIO":
208 self.logger = logging.getLogger("ro.vim.vio")
209
210 if log_level:
211 self.logger.setLevel(getattr(logging, log_level))
212
213 def __getitem__(self, index):
214 """Get individuals parameters.
215 Throw KeyError"""
216 if index == "project_domain_id":
217 return self.config.get("project_domain_id")
218 elif index == "user_domain_id":
219 return self.config.get("user_domain_id")
220 else:
221 return vimconn.VimConnector.__getitem__(self, index)
222
223 def __setitem__(self, index, value):
224 """Set individuals parameters and it is marked as dirty so to force connection reload.
225 Throw KeyError"""
226 if index == "project_domain_id":
227 self.config["project_domain_id"] = value
228 elif index == "user_domain_id":
229 self.config["user_domain_id"] = value
230 else:
231 vimconn.VimConnector.__setitem__(self, index, value)
232
233 self.session["reload_client"] = True
234
235 def serialize(self, value):
236 """Serialization of python basic types.
237
238 In the case value is not serializable a message will be logged and a
239 simple representation of the data that cannot be converted back to
240 python is returned.
241 """
242 if isinstance(value, str):
243 return value
244
245 try:
246 return yaml.dump(
247 value, Dumper=SafeDumper, default_flow_style=True, width=256
248 )
249 except yaml.representer.RepresenterError:
250 self.logger.debug(
251 "The following entity cannot be serialized in YAML:\n\n%s\n\n",
252 pformat(value),
253 exc_info=True,
254 )
255
256 return str(value)
257
258 def _reload_connection(self):
259 """Called before any operation, it check if credentials has changed
260 Throw keystoneclient.apiclient.exceptions.AuthorizationFailure
261 """
262 # TODO control the timing and possible token timeout, but it seams that python client does this task for us :-)
263 if self.session["reload_client"]:
264 if self.config.get("APIversion"):
265 self.api_version3 = (
266 self.config["APIversion"] == "v3.3"
267 or self.config["APIversion"] == "3"
268 )
269 else: # get from ending auth_url that end with v3 or with v2.0
270 self.api_version3 = self.url.endswith("/v3") or self.url.endswith(
271 "/v3/"
272 )
273
274 self.session["api_version3"] = self.api_version3
275
276 if self.api_version3:
277 if self.config.get("project_domain_id") or self.config.get(
278 "project_domain_name"
279 ):
280 project_domain_id_default = None
281 else:
282 project_domain_id_default = "default"
283
284 if self.config.get("user_domain_id") or self.config.get(
285 "user_domain_name"
286 ):
287 user_domain_id_default = None
288 else:
289 user_domain_id_default = "default"
290 auth = v3.Password(
291 auth_url=self.url,
292 username=self.user,
293 password=self.passwd,
294 project_name=self.tenant_name,
295 project_id=self.tenant_id,
296 project_domain_id=self.config.get(
297 "project_domain_id", project_domain_id_default
298 ),
299 user_domain_id=self.config.get(
300 "user_domain_id", user_domain_id_default
301 ),
302 project_domain_name=self.config.get("project_domain_name"),
303 user_domain_name=self.config.get("user_domain_name"),
304 )
305 else:
306 auth = v2.Password(
307 auth_url=self.url,
308 username=self.user,
309 password=self.passwd,
310 tenant_name=self.tenant_name,
311 tenant_id=self.tenant_id,
312 )
313
314 sess = session.Session(auth=auth, verify=self.verify)
315 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
316 # Titanium cloud and StarlingX
317 region_name = self.config.get("region_name")
318
319 if self.api_version3:
320 self.keystone = ksClient_v3.Client(
321 session=sess,
322 endpoint_type=self.endpoint_type,
323 region_name=region_name,
324 )
325 else:
326 self.keystone = ksClient_v2.Client(
327 session=sess, endpoint_type=self.endpoint_type
328 )
329
330 self.session["keystone"] = self.keystone
331 # In order to enable microversion functionality an explicit microversion must be specified in "config".
332 # This implementation approach is due to the warning message in
333 # https://developer.openstack.org/api-guide/compute/microversions.html
334 # where it is stated that microversion backwards compatibility is not guaranteed and clients should
335 # always require an specific microversion.
336 # To be able to use "device role tagging" functionality define "microversion: 2.32" in datacenter config
337 version = self.config.get("microversion")
338
339 if not version:
340 version = "2.1"
341
342 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
343 # Titanium cloud and StarlingX
344 self.nova = self.session["nova"] = nClient.Client(
345 str(version),
346 session=sess,
347 endpoint_type=self.endpoint_type,
348 region_name=region_name,
349 )
350 self.neutron = self.session["neutron"] = neClient.Client(
351 "2.0",
352 session=sess,
353 endpoint_type=self.endpoint_type,
354 region_name=region_name,
355 )
356 self.cinder = self.session["cinder"] = cClient.Client(
357 2,
358 session=sess,
359 endpoint_type=self.endpoint_type,
360 region_name=region_name,
361 )
362
363 try:
364 self.my_tenant_id = self.session["my_tenant_id"] = sess.get_project_id()
365 except Exception:
366 self.logger.error("Cannot get project_id from session", exc_info=True)
367
368 if self.endpoint_type == "internalURL":
369 glance_service_id = self.keystone.services.list(name="glance")[0].id
370 glance_endpoint = self.keystone.endpoints.list(
371 glance_service_id, interface="internal"
372 )[0].url
373 else:
374 glance_endpoint = None
375
376 self.glance = self.session["glance"] = glClient.Client(
377 2, session=sess, endpoint=glance_endpoint
378 )
379 # using version 1 of glance client in new_image()
380 # self.glancev1 = self.session["glancev1"] = glClient.Client("1", session=sess,
381 # endpoint=glance_endpoint)
382 self.session["reload_client"] = False
383 self.persistent_info["session"] = self.session
384 # add availablity zone info inside self.persistent_info
385 self._set_availablity_zones()
386 self.persistent_info["availability_zone"] = self.availability_zone
387 # force to get again security_groups_ids next time they are needed
388 self.security_groups_id = None
389
390 def __net_os2mano(self, net_list_dict):
391 """Transform the net openstack format to mano format
392 net_list_dict can be a list of dict or a single dict"""
393 if type(net_list_dict) is dict:
394 net_list_ = (net_list_dict,)
395 elif type(net_list_dict) is list:
396 net_list_ = net_list_dict
397 else:
398 raise TypeError("param net_list_dict must be a list or a dictionary")
399 for net in net_list_:
400 if net.get("provider:network_type") == "vlan":
401 net["type"] = "data"
402 else:
403 net["type"] = "bridge"
404
405 def __classification_os2mano(self, class_list_dict):
406 """Transform the openstack format (Flow Classifier) to mano format
407 (Classification) class_list_dict can be a list of dict or a single dict
408 """
409 if isinstance(class_list_dict, dict):
410 class_list_ = [class_list_dict]
411 elif isinstance(class_list_dict, list):
412 class_list_ = class_list_dict
413 else:
414 raise TypeError("param class_list_dict must be a list or a dictionary")
415 for classification in class_list_:
416 id = classification.pop("id")
417 name = classification.pop("name")
418 description = classification.pop("description")
419 project_id = classification.pop("project_id")
420 tenant_id = classification.pop("tenant_id")
421 original_classification = copy.deepcopy(classification)
422 classification.clear()
423 classification["ctype"] = "legacy_flow_classifier"
424 classification["definition"] = original_classification
425 classification["id"] = id
426 classification["name"] = name
427 classification["description"] = description
428 classification["project_id"] = project_id
429 classification["tenant_id"] = tenant_id
430
431 def __sfi_os2mano(self, sfi_list_dict):
432 """Transform the openstack format (Port Pair) to mano format (SFI)
433 sfi_list_dict can be a list of dict or a single dict
434 """
435 if isinstance(sfi_list_dict, dict):
436 sfi_list_ = [sfi_list_dict]
437 elif isinstance(sfi_list_dict, list):
438 sfi_list_ = sfi_list_dict
439 else:
440 raise TypeError("param sfi_list_dict must be a list or a dictionary")
441
442 for sfi in sfi_list_:
443 sfi["ingress_ports"] = []
444 sfi["egress_ports"] = []
445
446 if sfi.get("ingress"):
447 sfi["ingress_ports"].append(sfi["ingress"])
448
449 if sfi.get("egress"):
450 sfi["egress_ports"].append(sfi["egress"])
451
452 del sfi["ingress"]
453 del sfi["egress"]
454 params = sfi.get("service_function_parameters")
455 sfc_encap = False
456
457 if params:
458 correlation = params.get("correlation")
459
460 if correlation:
461 sfc_encap = True
462
463 sfi["sfc_encap"] = sfc_encap
464 del sfi["service_function_parameters"]
465
466 def __sf_os2mano(self, sf_list_dict):
467 """Transform the openstack format (Port Pair Group) to mano format (SF)
468 sf_list_dict can be a list of dict or a single dict
469 """
470 if isinstance(sf_list_dict, dict):
471 sf_list_ = [sf_list_dict]
472 elif isinstance(sf_list_dict, list):
473 sf_list_ = sf_list_dict
474 else:
475 raise TypeError("param sf_list_dict must be a list or a dictionary")
476
477 for sf in sf_list_:
478 del sf["port_pair_group_parameters"]
479 sf["sfis"] = sf["port_pairs"]
480 del sf["port_pairs"]
481
482 def __sfp_os2mano(self, sfp_list_dict):
483 """Transform the openstack format (Port Chain) to mano format (SFP)
484 sfp_list_dict can be a list of dict or a single dict
485 """
486 if isinstance(sfp_list_dict, dict):
487 sfp_list_ = [sfp_list_dict]
488 elif isinstance(sfp_list_dict, list):
489 sfp_list_ = sfp_list_dict
490 else:
491 raise TypeError("param sfp_list_dict must be a list or a dictionary")
492
493 for sfp in sfp_list_:
494 params = sfp.pop("chain_parameters")
495 sfc_encap = False
496
497 if params:
498 correlation = params.get("correlation")
499
500 if correlation:
501 sfc_encap = True
502
503 sfp["sfc_encap"] = sfc_encap
504 sfp["spi"] = sfp.pop("chain_id")
505 sfp["classifications"] = sfp.pop("flow_classifiers")
506 sfp["service_functions"] = sfp.pop("port_pair_groups")
507
508 # placeholder for now; read TODO note below
509 def _validate_classification(self, type, definition):
510 # only legacy_flow_classifier Type is supported at this point
511 return True
512 # TODO(igordcard): this method should be an abstract method of an
513 # abstract Classification class to be implemented by the specific
514 # Types. Also, abstract vimconnector should call the validation
515 # method before the implemented VIM connectors are called.
516
517 def _format_exception(self, exception):
518 """Transform a keystone, nova, neutron exception into a vimconn exception discovering the cause"""
519 message_error = str(exception)
520 tip = ""
521
522 if isinstance(
523 exception,
524 (
525 neExceptions.NetworkNotFoundClient,
526 nvExceptions.NotFound,
527 ksExceptions.NotFound,
528 gl1Exceptions.HTTPNotFound,
529 ),
530 ):
531 raise vimconn.VimConnNotFoundException(
532 type(exception).__name__ + ": " + message_error
533 )
534 elif isinstance(
535 exception,
536 (
537 HTTPException,
538 gl1Exceptions.HTTPException,
539 gl1Exceptions.CommunicationError,
540 ConnectionError,
541 ksExceptions.ConnectionError,
542 neExceptions.ConnectionFailed,
543 ),
544 ):
545 if type(exception).__name__ == "SSLError":
546 tip = " (maybe option 'insecure' must be added to the VIM)"
547
548 raise vimconn.VimConnConnectionException(
549 "Invalid URL or credentials{}: {}".format(tip, message_error)
550 )
551 elif isinstance(
552 exception,
553 (
554 KeyError,
555 nvExceptions.BadRequest,
556 ksExceptions.BadRequest,
557 ),
558 ):
559 raise vimconn.VimConnException(
560 type(exception).__name__ + ": " + message_error
561 )
562 elif isinstance(
563 exception,
564 (
565 nvExceptions.ClientException,
566 ksExceptions.ClientException,
567 neExceptions.NeutronException,
568 ),
569 ):
570 raise vimconn.VimConnUnexpectedResponse(
571 type(exception).__name__ + ": " + message_error
572 )
573 elif isinstance(exception, nvExceptions.Conflict):
574 raise vimconn.VimConnConflictException(
575 type(exception).__name__ + ": " + message_error
576 )
577 elif isinstance(exception, vimconn.VimConnException):
578 raise exception
579 else: # ()
580 self.logger.error("General Exception " + message_error, exc_info=True)
581
582 raise vimconn.VimConnConnectionException(
583 type(exception).__name__ + ": " + message_error
584 )
585
586 def _get_ids_from_name(self):
587 """
588 Obtain ids from name of tenant and security_groups. Store at self .security_groups_id"
589 :return: None
590 """
591 # get tenant_id if only tenant_name is supplied
592 self._reload_connection()
593
594 if not self.my_tenant_id:
595 raise vimconn.VimConnConnectionException(
596 "Error getting tenant information from name={} id={}".format(
597 self.tenant_name, self.tenant_id
598 )
599 )
600
601 if self.config.get("security_groups") and not self.security_groups_id:
602 # convert from name to id
603 neutron_sg_list = self.neutron.list_security_groups(
604 tenant_id=self.my_tenant_id
605 )["security_groups"]
606
607 self.security_groups_id = []
608 for sg in self.config.get("security_groups"):
609 for neutron_sg in neutron_sg_list:
610 if sg in (neutron_sg["id"], neutron_sg["name"]):
611 self.security_groups_id.append(neutron_sg["id"])
612 break
613 else:
614 self.security_groups_id = None
615
616 raise vimconn.VimConnConnectionException(
617 "Not found security group {} for this tenant".format(sg)
618 )
619
620 def check_vim_connectivity(self):
621 # just get network list to check connectivity and credentials
622 self.get_network_list(filter_dict={})
623
624 def get_tenant_list(self, filter_dict={}):
625 """Obtain tenants of VIM
626 filter_dict can contain the following keys:
627 name: filter by tenant name
628 id: filter by tenant uuid/id
629 <other VIM specific>
630 Returns the tenant list of dictionaries: [{'name':'<name>, 'id':'<id>, ...}, ...]
631 """
632 self.logger.debug("Getting tenants from VIM filter: '%s'", str(filter_dict))
633
634 try:
635 self._reload_connection()
636
637 if self.api_version3:
638 project_class_list = self.keystone.projects.list(
639 name=filter_dict.get("name")
640 )
641 else:
642 project_class_list = self.keystone.tenants.findall(**filter_dict)
643
644 project_list = []
645
646 for project in project_class_list:
647 if filter_dict.get("id") and filter_dict["id"] != project.id:
648 continue
649
650 project_list.append(project.to_dict())
651
652 return project_list
653 except (
654 ksExceptions.ConnectionError,
655 ksExceptions.ClientException,
656 ConnectionError,
657 ) as e:
658 self._format_exception(e)
659
660 def new_tenant(self, tenant_name, tenant_description):
661 """Adds a new tenant to openstack VIM. Returns the tenant identifier"""
662 self.logger.debug("Adding a new tenant name: %s", tenant_name)
663
664 try:
665 self._reload_connection()
666
667 if self.api_version3:
668 project = self.keystone.projects.create(
669 tenant_name,
670 self.config.get("project_domain_id", "default"),
671 description=tenant_description,
672 is_domain=False,
673 )
674 else:
675 project = self.keystone.tenants.create(tenant_name, tenant_description)
676
677 return project.id
678 except (
679 ksExceptions.ConnectionError,
680 ksExceptions.ClientException,
681 ksExceptions.BadRequest,
682 ConnectionError,
683 ) as e:
684 self._format_exception(e)
685
686 def delete_tenant(self, tenant_id):
687 """Delete a tenant from openstack VIM. Returns the old tenant identifier"""
688 self.logger.debug("Deleting tenant %s from VIM", tenant_id)
689
690 try:
691 self._reload_connection()
692
693 if self.api_version3:
694 self.keystone.projects.delete(tenant_id)
695 else:
696 self.keystone.tenants.delete(tenant_id)
697
698 return tenant_id
699 except (
700 ksExceptions.ConnectionError,
701 ksExceptions.ClientException,
702 ksExceptions.NotFound,
703 ConnectionError,
704 ) as e:
705 self._format_exception(e)
706
707 def new_network(
708 self,
709 net_name,
710 net_type,
711 ip_profile=None,
712 shared=False,
713 provider_network_profile=None,
714 ):
715 """Adds a tenant network to VIM
716 Params:
717 'net_name': name of the network
718 'net_type': one of:
719 'bridge': overlay isolated network
720 'data': underlay E-LAN network for Passthrough and SRIOV interfaces
721 'ptp': underlay E-LINE network for Passthrough and SRIOV interfaces.
722 'ip_profile': is a dict containing the IP parameters of the network
723 'ip_version': can be "IPv4" or "IPv6" (Currently only IPv4 is implemented)
724 'subnet_address': ip_prefix_schema, that is X.X.X.X/Y
725 'gateway_address': (Optional) ip_schema, that is X.X.X.X
726 'dns_address': (Optional) comma separated list of ip_schema, e.g. X.X.X.X[,X,X,X,X]
727 'dhcp_enabled': True or False
728 'dhcp_start_address': ip_schema, first IP to grant
729 'dhcp_count': number of IPs to grant.
730 'shared': if this network can be seen/use by other tenants/organization
731 'provider_network_profile': (optional) contains {segmentation-id: vlan, network-type: vlan|vxlan,
732 physical-network: physnet-label}
733 Returns a tuple with the network identifier and created_items, or raises an exception on error
734 created_items can be None or a dictionary where this method can include key-values that will be passed to
735 the method delete_network. Can be used to store created segments, created l2gw connections, etc.
736 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
737 as not present.
738 """
739 self.logger.debug(
740 "Adding a new network to VIM name '%s', type '%s'", net_name, net_type
741 )
742 # self.logger.debug(">>>>>>>>>>>>>>>>>> IP profile %s", str(ip_profile))
743
744 try:
745 vlan = None
746
747 if provider_network_profile:
748 vlan = provider_network_profile.get("segmentation-id")
749
750 new_net = None
751 created_items = {}
752 self._reload_connection()
753 network_dict = {"name": net_name, "admin_state_up": True}
754
755 if net_type in ("data", "ptp"):
756 provider_physical_network = None
757
758 if provider_network_profile and provider_network_profile.get(
759 "physical-network"
760 ):
761 provider_physical_network = provider_network_profile.get(
762 "physical-network"
763 )
764
765 # provider-network must be one of the dataplane_physcial_netowrk if this is a list. If it is string
766 # or not declared, just ignore the checking
767 if (
768 isinstance(
769 self.config.get("dataplane_physical_net"), (tuple, list)
770 )
771 and provider_physical_network
772 not in self.config["dataplane_physical_net"]
773 ):
774 raise vimconn.VimConnConflictException(
775 "Invalid parameter 'provider-network:physical-network' "
776 "for network creation. '{}' is not one of the declared "
777 "list at VIM_config:dataplane_physical_net".format(
778 provider_physical_network
779 )
780 )
781
782 # use the default dataplane_physical_net
783 if not provider_physical_network:
784 provider_physical_network = self.config.get(
785 "dataplane_physical_net"
786 )
787
788 # if it is non empty list, use the first value. If it is a string use the value directly
789 if (
790 isinstance(provider_physical_network, (tuple, list))
791 and provider_physical_network
792 ):
793 provider_physical_network = provider_physical_network[0]
794
795 if not provider_physical_network:
796 raise vimconn.VimConnConflictException(
797 "missing information needed for underlay networks. Provide "
798 "'dataplane_physical_net' configuration at VIM or use the NS "
799 "instantiation parameter 'provider-network.physical-network'"
800 " for the VLD"
801 )
802
803 if not self.config.get("multisegment_support"):
804 network_dict[
805 "provider:physical_network"
806 ] = provider_physical_network
807
808 if (
809 provider_network_profile
810 and "network-type" in provider_network_profile
811 ):
812 network_dict[
813 "provider:network_type"
814 ] = provider_network_profile["network-type"]
815 else:
816 network_dict["provider:network_type"] = self.config.get(
817 "dataplane_network_type", "vlan"
818 )
819
820 if vlan:
821 network_dict["provider:segmentation_id"] = vlan
822 else:
823 # Multi-segment case
824 segment_list = []
825 segment1_dict = {
826 "provider:physical_network": "",
827 "provider:network_type": "vxlan",
828 }
829 segment_list.append(segment1_dict)
830 segment2_dict = {
831 "provider:physical_network": provider_physical_network,
832 "provider:network_type": "vlan",
833 }
834
835 if vlan:
836 segment2_dict["provider:segmentation_id"] = vlan
837 elif self.config.get("multisegment_vlan_range"):
838 vlanID = self._generate_multisegment_vlanID()
839 segment2_dict["provider:segmentation_id"] = vlanID
840
841 # else
842 # raise vimconn.VimConnConflictException(
843 # "You must provide "multisegment_vlan_range" at config dict before creating a multisegment
844 # network")
845 segment_list.append(segment2_dict)
846 network_dict["segments"] = segment_list
847
848 # VIO Specific Changes. It needs a concrete VLAN
849 if self.vim_type == "VIO" and vlan is None:
850 if self.config.get("dataplane_net_vlan_range") is None:
851 raise vimconn.VimConnConflictException(
852 "You must provide 'dataplane_net_vlan_range' in format "
853 "[start_ID - end_ID] at VIM_config for creating underlay "
854 "networks"
855 )
856
857 network_dict["provider:segmentation_id"] = self._generate_vlanID()
858
859 network_dict["shared"] = shared
860
861 if self.config.get("disable_network_port_security"):
862 network_dict["port_security_enabled"] = False
863
864 if self.config.get("neutron_availability_zone_hints"):
865 hints = self.config.get("neutron_availability_zone_hints")
866
867 if isinstance(hints, str):
868 hints = [hints]
869
870 network_dict["availability_zone_hints"] = hints
871
872 new_net = self.neutron.create_network({"network": network_dict})
873 # print new_net
874 # create subnetwork, even if there is no profile
875
876 if not ip_profile:
877 ip_profile = {}
878
879 if not ip_profile.get("subnet_address"):
880 # Fake subnet is required
881 subnet_rand = random.randint(0, 255)
882 ip_profile["subnet_address"] = "192.168.{}.0/24".format(subnet_rand)
883
884 if "ip_version" not in ip_profile:
885 ip_profile["ip_version"] = "IPv4"
886
887 subnet = {
888 "name": net_name + "-subnet",
889 "network_id": new_net["network"]["id"],
890 "ip_version": 4 if ip_profile["ip_version"] == "IPv4" else 6,
891 "cidr": ip_profile["subnet_address"],
892 }
893
894 # Gateway should be set to None if not needed. Otherwise openstack assigns one by default
895 if ip_profile.get("gateway_address"):
896 subnet["gateway_ip"] = ip_profile["gateway_address"]
897 else:
898 subnet["gateway_ip"] = None
899
900 if ip_profile.get("dns_address"):
901 subnet["dns_nameservers"] = ip_profile["dns_address"].split(";")
902
903 if "dhcp_enabled" in ip_profile:
904 subnet["enable_dhcp"] = (
905 False
906 if ip_profile["dhcp_enabled"] == "false"
907 or ip_profile["dhcp_enabled"] is False
908 else True
909 )
910
911 if ip_profile.get("dhcp_start_address"):
912 subnet["allocation_pools"] = []
913 subnet["allocation_pools"].append(dict())
914 subnet["allocation_pools"][0]["start"] = ip_profile[
915 "dhcp_start_address"
916 ]
917
918 if ip_profile.get("dhcp_count"):
919 # parts = ip_profile["dhcp_start_address"].split(".")
920 # ip_int = (int(parts[0]) << 24) + (int(parts[1]) << 16) + (int(parts[2]) << 8) + int(parts[3])
921 ip_int = int(netaddr.IPAddress(ip_profile["dhcp_start_address"]))
922 ip_int += ip_profile["dhcp_count"] - 1
923 ip_str = str(netaddr.IPAddress(ip_int))
924 subnet["allocation_pools"][0]["end"] = ip_str
925
926 # self.logger.debug(">>>>>>>>>>>>>>>>>> Subnet: %s", str(subnet))
927 self.neutron.create_subnet({"subnet": subnet})
928
929 if net_type == "data" and self.config.get("multisegment_support"):
930 if self.config.get("l2gw_support"):
931 l2gw_list = self.neutron.list_l2_gateways().get("l2_gateways", ())
932 for l2gw in l2gw_list:
933 l2gw_conn = {
934 "l2_gateway_id": l2gw["id"],
935 "network_id": new_net["network"]["id"],
936 "segmentation_id": str(vlanID),
937 }
938 new_l2gw_conn = self.neutron.create_l2_gateway_connection(
939 {"l2_gateway_connection": l2gw_conn}
940 )
941 created_items[
942 "l2gwconn:"
943 + str(new_l2gw_conn["l2_gateway_connection"]["id"])
944 ] = True
945
946 return new_net["network"]["id"], created_items
947 except Exception as e:
948 # delete l2gw connections (if any) before deleting the network
949 for k, v in created_items.items():
950 if not v: # skip already deleted
951 continue
952
953 try:
954 k_item, _, k_id = k.partition(":")
955
956 if k_item == "l2gwconn":
957 self.neutron.delete_l2_gateway_connection(k_id)
958 except Exception as e2:
959 self.logger.error(
960 "Error deleting l2 gateway connection: {}: {}".format(
961 type(e2).__name__, e2
962 )
963 )
964
965 if new_net:
966 self.neutron.delete_network(new_net["network"]["id"])
967
968 self._format_exception(e)
969
970 def get_network_list(self, filter_dict={}):
971 """Obtain tenant networks of VIM
972 Filter_dict can be:
973 name: network name
974 id: network uuid
975 shared: boolean
976 tenant_id: tenant
977 admin_state_up: boolean
978 status: 'ACTIVE'
979 Returns the network list of dictionaries
980 """
981 self.logger.debug("Getting network from VIM filter: '%s'", str(filter_dict))
982
983 try:
984 self._reload_connection()
985 filter_dict_os = filter_dict.copy()
986
987 if self.api_version3 and "tenant_id" in filter_dict_os:
988 # TODO check
989 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
990
991 net_dict = self.neutron.list_networks(**filter_dict_os)
992 net_list = net_dict["networks"]
993 self.__net_os2mano(net_list)
994
995 return net_list
996 except (
997 neExceptions.ConnectionFailed,
998 ksExceptions.ClientException,
999 neExceptions.NeutronException,
1000 ConnectionError,
1001 ) as e:
1002 self._format_exception(e)
1003
1004 def get_network(self, net_id):
1005 """Obtain details of network from VIM
1006 Returns the network information from a network id"""
1007 self.logger.debug(" Getting tenant network %s from VIM", net_id)
1008 filter_dict = {"id": net_id}
1009 net_list = self.get_network_list(filter_dict)
1010
1011 if len(net_list) == 0:
1012 raise vimconn.VimConnNotFoundException(
1013 "Network '{}' not found".format(net_id)
1014 )
1015 elif len(net_list) > 1:
1016 raise vimconn.VimConnConflictException(
1017 "Found more than one network with this criteria"
1018 )
1019
1020 net = net_list[0]
1021 subnets = []
1022 for subnet_id in net.get("subnets", ()):
1023 try:
1024 subnet = self.neutron.show_subnet(subnet_id)
1025 except Exception as e:
1026 self.logger.error(
1027 "osconnector.get_network(): Error getting subnet %s %s"
1028 % (net_id, str(e))
1029 )
1030 subnet = {"id": subnet_id, "fault": str(e)}
1031
1032 subnets.append(subnet)
1033
1034 net["subnets"] = subnets
1035 net["encapsulation"] = net.get("provider:network_type")
1036 net["encapsulation_type"] = net.get("provider:network_type")
1037 net["segmentation_id"] = net.get("provider:segmentation_id")
1038 net["encapsulation_id"] = net.get("provider:segmentation_id")
1039
1040 return net
1041
1042 def delete_network(self, net_id, created_items=None):
1043 """
1044 Removes a tenant network from VIM and its associated elements
1045 :param net_id: VIM identifier of the network, provided by method new_network
1046 :param created_items: dictionary with extra items to be deleted. provided by method new_network
1047 Returns the network identifier or raises an exception upon error or when network is not found
1048 """
1049 self.logger.debug("Deleting network '%s' from VIM", net_id)
1050
1051 if created_items is None:
1052 created_items = {}
1053
1054 try:
1055 self._reload_connection()
1056 # delete l2gw connections (if any) before deleting the network
1057 for k, v in created_items.items():
1058 if not v: # skip already deleted
1059 continue
1060
1061 try:
1062 k_item, _, k_id = k.partition(":")
1063 if k_item == "l2gwconn":
1064 self.neutron.delete_l2_gateway_connection(k_id)
1065 except Exception as e:
1066 self.logger.error(
1067 "Error deleting l2 gateway connection: {}: {}".format(
1068 type(e).__name__, e
1069 )
1070 )
1071
1072 # delete VM ports attached to this networks before the network
1073 ports = self.neutron.list_ports(network_id=net_id)
1074 for p in ports["ports"]:
1075 try:
1076 self.neutron.delete_port(p["id"])
1077 except Exception as e:
1078 self.logger.error("Error deleting port %s: %s", p["id"], str(e))
1079
1080 self.neutron.delete_network(net_id)
1081
1082 return net_id
1083 except (
1084 neExceptions.ConnectionFailed,
1085 neExceptions.NetworkNotFoundClient,
1086 neExceptions.NeutronException,
1087 ksExceptions.ClientException,
1088 neExceptions.NeutronException,
1089 ConnectionError,
1090 ) as e:
1091 self._format_exception(e)
1092
1093 def refresh_nets_status(self, net_list):
1094 """Get the status of the networks
1095 Params: the list of network identifiers
1096 Returns a dictionary with:
1097 net_id: #VIM id of this network
1098 status: #Mandatory. Text with one of:
1099 # DELETED (not found at vim)
1100 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
1101 # OTHER (Vim reported other status not understood)
1102 # ERROR (VIM indicates an ERROR status)
1103 # ACTIVE, INACTIVE, DOWN (admin down),
1104 # BUILD (on building process)
1105 #
1106 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
1107 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
1108 """
1109 net_dict = {}
1110
1111 for net_id in net_list:
1112 net = {}
1113
1114 try:
1115 net_vim = self.get_network(net_id)
1116
1117 if net_vim["status"] in netStatus2manoFormat:
1118 net["status"] = netStatus2manoFormat[net_vim["status"]]
1119 else:
1120 net["status"] = "OTHER"
1121 net["error_msg"] = "VIM status reported " + net_vim["status"]
1122
1123 if net["status"] == "ACTIVE" and not net_vim["admin_state_up"]:
1124 net["status"] = "DOWN"
1125
1126 net["vim_info"] = self.serialize(net_vim)
1127
1128 if net_vim.get("fault"): # TODO
1129 net["error_msg"] = str(net_vim["fault"])
1130 except vimconn.VimConnNotFoundException as e:
1131 self.logger.error("Exception getting net status: %s", str(e))
1132 net["status"] = "DELETED"
1133 net["error_msg"] = str(e)
1134 except vimconn.VimConnException as e:
1135 self.logger.error("Exception getting net status: %s", str(e))
1136 net["status"] = "VIM_ERROR"
1137 net["error_msg"] = str(e)
1138 net_dict[net_id] = net
1139 return net_dict
1140
1141 def get_flavor(self, flavor_id):
1142 """Obtain flavor details from the VIM. Returns the flavor dict details"""
1143 self.logger.debug("Getting flavor '%s'", flavor_id)
1144
1145 try:
1146 self._reload_connection()
1147 flavor = self.nova.flavors.find(id=flavor_id)
1148 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
1149
1150 return flavor.to_dict()
1151 except (
1152 nvExceptions.NotFound,
1153 nvExceptions.ClientException,
1154 ksExceptions.ClientException,
1155 ConnectionError,
1156 ) as e:
1157 self._format_exception(e)
1158
1159 def get_flavor_id_from_data(self, flavor_dict):
1160 """Obtain flavor id that match the flavor description
1161 Returns the flavor_id or raises a vimconnNotFoundException
1162 flavor_dict: contains the required ram, vcpus, disk
1163 If 'use_existing_flavors' is set to True at config, the closer flavor that provides same or more ram, vcpus
1164 and disk is returned. Otherwise a flavor with exactly same ram, vcpus and disk is returned or a
1165 vimconnNotFoundException is raised
1166 """
1167 exact_match = False if self.config.get("use_existing_flavors") else True
1168
1169 try:
1170 self._reload_connection()
1171 flavor_candidate_id = None
1172 flavor_candidate_data = (10000, 10000, 10000)
1173 flavor_target = (
1174 flavor_dict["ram"],
1175 flavor_dict["vcpus"],
1176 flavor_dict["disk"],
1177 flavor_dict.get("ephemeral", 0),
1178 flavor_dict.get("swap", 0),
1179 )
1180 # numa=None
1181 extended = flavor_dict.get("extended", {})
1182 if extended:
1183 # TODO
1184 raise vimconn.VimConnNotFoundException(
1185 "Flavor with EPA still not implemented"
1186 )
1187 # if len(numas) > 1:
1188 # raise vimconn.VimConnNotFoundException("Cannot find any flavor with more than one numa")
1189 # numa=numas[0]
1190 # numas = extended.get("numas")
1191 for flavor in self.nova.flavors.list():
1192 epa = flavor.get_keys()
1193
1194 if epa:
1195 continue
1196 # TODO
1197
1198 flavor_data = (
1199 flavor.ram,
1200 flavor.vcpus,
1201 flavor.disk,
1202 flavor.ephemeral,
1203 flavor.swap if isinstance(flavor.swap, int) else 0,
1204 )
1205 if flavor_data == flavor_target:
1206 return flavor.id
1207 elif (
1208 not exact_match
1209 and flavor_target < flavor_data < flavor_candidate_data
1210 ):
1211 flavor_candidate_id = flavor.id
1212 flavor_candidate_data = flavor_data
1213
1214 if not exact_match and flavor_candidate_id:
1215 return flavor_candidate_id
1216
1217 raise vimconn.VimConnNotFoundException(
1218 "Cannot find any flavor matching '{}'".format(flavor_dict)
1219 )
1220 except (
1221 nvExceptions.NotFound,
1222 nvExceptions.ClientException,
1223 ksExceptions.ClientException,
1224 ConnectionError,
1225 ) as e:
1226 self._format_exception(e)
1227
1228 def process_resource_quota(self, quota, prefix, extra_specs):
1229 """
1230 :param prefix:
1231 :param extra_specs:
1232 :return:
1233 """
1234 if "limit" in quota:
1235 extra_specs["quota:" + prefix + "_limit"] = quota["limit"]
1236
1237 if "reserve" in quota:
1238 extra_specs["quota:" + prefix + "_reservation"] = quota["reserve"]
1239
1240 if "shares" in quota:
1241 extra_specs["quota:" + prefix + "_shares_level"] = "custom"
1242 extra_specs["quota:" + prefix + "_shares_share"] = quota["shares"]
1243
1244 def new_flavor(self, flavor_data, change_name_if_used=True):
1245 """Adds a tenant flavor to openstack VIM
1246 if change_name_if_used is True, it will change name in case of conflict, because it is not supported name
1247 repetition
1248 Returns the flavor identifier
1249 """
1250 self.logger.debug("Adding flavor '%s'", str(flavor_data))
1251 retry = 0
1252 max_retries = 3
1253 name_suffix = 0
1254
1255 try:
1256 name = flavor_data["name"]
1257 while retry < max_retries:
1258 retry += 1
1259 try:
1260 self._reload_connection()
1261
1262 if change_name_if_used:
1263 # get used names
1264 fl_names = []
1265 fl = self.nova.flavors.list()
1266
1267 for f in fl:
1268 fl_names.append(f.name)
1269
1270 while name in fl_names:
1271 name_suffix += 1
1272 name = flavor_data["name"] + "-" + str(name_suffix)
1273
1274 ram = flavor_data.get("ram", 64)
1275 vcpus = flavor_data.get("vcpus", 1)
1276 extra_specs = {}
1277
1278 extended = flavor_data.get("extended")
1279 if extended:
1280 numas = extended.get("numas")
1281
1282 if numas:
1283 numa_nodes = len(numas)
1284
1285 if numa_nodes > 1:
1286 return -1, "Can not add flavor with more than one numa"
1287
1288 extra_specs["hw:numa_nodes"] = str(numa_nodes)
1289 extra_specs["hw:mem_page_size"] = "large"
1290 extra_specs["hw:cpu_policy"] = "dedicated"
1291 extra_specs["hw:numa_mempolicy"] = "strict"
1292
1293 if self.vim_type == "VIO":
1294 extra_specs[
1295 "vmware:extra_config"
1296 ] = '{"numa.nodeAffinity":"0"}'
1297 extra_specs["vmware:latency_sensitivity_level"] = "high"
1298
1299 for numa in numas:
1300 # overwrite ram and vcpus
1301 # check if key "memory" is present in numa else use ram value at flavor
1302 if "memory" in numa:
1303 ram = numa["memory"] * 1024
1304 # See for reference: https://specs.openstack.org/openstack/nova-specs/specs/mitaka/
1305 # implemented/virt-driver-cpu-thread-pinning.html
1306 extra_specs["hw:cpu_sockets"] = 1
1307
1308 if "paired-threads" in numa:
1309 vcpus = numa["paired-threads"] * 2
1310 # cpu_thread_policy "require" implies that the compute node must have an
1311 # STM architecture
1312 extra_specs["hw:cpu_thread_policy"] = "require"
1313 extra_specs["hw:cpu_policy"] = "dedicated"
1314 elif "cores" in numa:
1315 vcpus = numa["cores"]
1316 # cpu_thread_policy "prefer" implies that the host must not have an SMT
1317 # architecture, or a non-SMT architecture will be emulated
1318 extra_specs["hw:cpu_thread_policy"] = "isolate"
1319 extra_specs["hw:cpu_policy"] = "dedicated"
1320 elif "threads" in numa:
1321 vcpus = numa["threads"]
1322 # cpu_thread_policy "prefer" implies that the host may or may not have an SMT
1323 # architecture
1324 extra_specs["hw:cpu_thread_policy"] = "prefer"
1325 extra_specs["hw:cpu_policy"] = "dedicated"
1326 # for interface in numa.get("interfaces",() ):
1327 # if interface["dedicated"]=="yes":
1328 # raise vimconn.VimConnException("Passthrough interfaces are not supported
1329 # for the openstack connector", http_code=vimconn.HTTP_Service_Unavailable)
1330 # #TODO, add the key 'pci_passthrough:alias"="<label at config>:<number ifaces>"'
1331 # when a way to connect it is available
1332 elif extended.get("cpu-quota"):
1333 self.process_resource_quota(
1334 extended.get("cpu-quota"), "cpu", extra_specs
1335 )
1336
1337 if extended.get("mem-quota"):
1338 self.process_resource_quota(
1339 extended.get("mem-quota"), "memory", extra_specs
1340 )
1341
1342 if extended.get("vif-quota"):
1343 self.process_resource_quota(
1344 extended.get("vif-quota"), "vif", extra_specs
1345 )
1346
1347 if extended.get("disk-io-quota"):
1348 self.process_resource_quota(
1349 extended.get("disk-io-quota"), "disk_io", extra_specs
1350 )
1351
1352 # create flavor
1353 new_flavor = self.nova.flavors.create(
1354 name=name,
1355 ram=ram,
1356 vcpus=vcpus,
1357 disk=flavor_data.get("disk", 0),
1358 ephemeral=flavor_data.get("ephemeral", 0),
1359 swap=flavor_data.get("swap", 0),
1360 is_public=flavor_data.get("is_public", True),
1361 )
1362 # add metadata
1363 if extra_specs:
1364 new_flavor.set_keys(extra_specs)
1365
1366 return new_flavor.id
1367 except nvExceptions.Conflict as e:
1368 if change_name_if_used and retry < max_retries:
1369 continue
1370
1371 self._format_exception(e)
1372 # except nvExceptions.BadRequest as e:
1373 except (
1374 ksExceptions.ClientException,
1375 nvExceptions.ClientException,
1376 ConnectionError,
1377 KeyError,
1378 ) as e:
1379 self._format_exception(e)
1380
1381 def delete_flavor(self, flavor_id):
1382 """Deletes a tenant flavor from openstack VIM. Returns the old flavor_id"""
1383 try:
1384 self._reload_connection()
1385 self.nova.flavors.delete(flavor_id)
1386
1387 return flavor_id
1388 # except nvExceptions.BadRequest as e:
1389 except (
1390 nvExceptions.NotFound,
1391 ksExceptions.ClientException,
1392 nvExceptions.ClientException,
1393 ConnectionError,
1394 ) as e:
1395 self._format_exception(e)
1396
1397 def new_image(self, image_dict):
1398 """
1399 Adds a tenant image to VIM. imge_dict is a dictionary with:
1400 name: name
1401 disk_format: qcow2, vhd, vmdk, raw (by default), ...
1402 location: path or URI
1403 public: "yes" or "no"
1404 metadata: metadata of the image
1405 Returns the image_id
1406 """
1407 retry = 0
1408 max_retries = 3
1409
1410 while retry < max_retries:
1411 retry += 1
1412 try:
1413 self._reload_connection()
1414
1415 # determine format http://docs.openstack.org/developer/glance/formats.html
1416 if "disk_format" in image_dict:
1417 disk_format = image_dict["disk_format"]
1418 else: # autodiscover based on extension
1419 if image_dict["location"].endswith(".qcow2"):
1420 disk_format = "qcow2"
1421 elif image_dict["location"].endswith(".vhd"):
1422 disk_format = "vhd"
1423 elif image_dict["location"].endswith(".vmdk"):
1424 disk_format = "vmdk"
1425 elif image_dict["location"].endswith(".vdi"):
1426 disk_format = "vdi"
1427 elif image_dict["location"].endswith(".iso"):
1428 disk_format = "iso"
1429 elif image_dict["location"].endswith(".aki"):
1430 disk_format = "aki"
1431 elif image_dict["location"].endswith(".ari"):
1432 disk_format = "ari"
1433 elif image_dict["location"].endswith(".ami"):
1434 disk_format = "ami"
1435 else:
1436 disk_format = "raw"
1437
1438 self.logger.debug(
1439 "new_image: '%s' loading from '%s'",
1440 image_dict["name"],
1441 image_dict["location"],
1442 )
1443 if self.vim_type == "VIO":
1444 container_format = "bare"
1445 if "container_format" in image_dict:
1446 container_format = image_dict["container_format"]
1447
1448 new_image = self.glance.images.create(
1449 name=image_dict["name"],
1450 container_format=container_format,
1451 disk_format=disk_format,
1452 )
1453 else:
1454 new_image = self.glance.images.create(name=image_dict["name"])
1455
1456 if image_dict["location"].startswith("http"):
1457 # TODO there is not a method to direct download. It must be downloaded locally with requests
1458 raise vimconn.VimConnNotImplemented("Cannot create image from URL")
1459 else: # local path
1460 with open(image_dict["location"]) as fimage:
1461 self.glance.images.upload(new_image.id, fimage)
1462 # new_image = self.glancev1.images.create(name=image_dict["name"], is_public=
1463 # image_dict.get("public","yes")=="yes",
1464 # container_format="bare", data=fimage, disk_format=disk_format)
1465
1466 metadata_to_load = image_dict.get("metadata")
1467
1468 # TODO location is a reserved word for current openstack versions. fixed for VIO please check
1469 # for openstack
1470 if self.vim_type == "VIO":
1471 metadata_to_load["upload_location"] = image_dict["location"]
1472 else:
1473 metadata_to_load["location"] = image_dict["location"]
1474
1475 self.glance.images.update(new_image.id, **metadata_to_load)
1476
1477 return new_image.id
1478 except (
1479 nvExceptions.Conflict,
1480 ksExceptions.ClientException,
1481 nvExceptions.ClientException,
1482 ) as e:
1483 self._format_exception(e)
1484 except (
1485 HTTPException,
1486 gl1Exceptions.HTTPException,
1487 gl1Exceptions.CommunicationError,
1488 ConnectionError,
1489 ) as e:
1490 if retry == max_retries:
1491 continue
1492
1493 self._format_exception(e)
1494 except IOError as e: # can not open the file
1495 raise vimconn.VimConnConnectionException(
1496 "{}: {} for {}".format(type(e).__name__, e, image_dict["location"]),
1497 http_code=vimconn.HTTP_Bad_Request,
1498 )
1499
1500 def delete_image(self, image_id):
1501 """Deletes a tenant image from openstack VIM. Returns the old id"""
1502 try:
1503 self._reload_connection()
1504 self.glance.images.delete(image_id)
1505
1506 return image_id
1507 except (
1508 nvExceptions.NotFound,
1509 ksExceptions.ClientException,
1510 nvExceptions.ClientException,
1511 gl1Exceptions.CommunicationError,
1512 gl1Exceptions.HTTPNotFound,
1513 ConnectionError,
1514 ) as e: # TODO remove
1515 self._format_exception(e)
1516
1517 def get_image_id_from_path(self, path):
1518 """Get the image id from image path in the VIM database. Returns the image_id"""
1519 try:
1520 self._reload_connection()
1521 images = self.glance.images.list()
1522
1523 for image in images:
1524 if image.metadata.get("location") == path:
1525 return image.id
1526
1527 raise vimconn.VimConnNotFoundException(
1528 "image with location '{}' not found".format(path)
1529 )
1530 except (
1531 ksExceptions.ClientException,
1532 nvExceptions.ClientException,
1533 gl1Exceptions.CommunicationError,
1534 ConnectionError,
1535 ) as e:
1536 self._format_exception(e)
1537
1538 def get_image_list(self, filter_dict={}):
1539 """Obtain tenant images from VIM
1540 Filter_dict can be:
1541 id: image id
1542 name: image name
1543 checksum: image checksum
1544 Returns the image list of dictionaries:
1545 [{<the fields at Filter_dict plus some VIM specific>}, ...]
1546 List can be empty
1547 """
1548 self.logger.debug("Getting image list from VIM filter: '%s'", str(filter_dict))
1549
1550 try:
1551 self._reload_connection()
1552 # filter_dict_os = filter_dict.copy()
1553 # First we filter by the available filter fields: name, id. The others are removed.
1554 image_list = self.glance.images.list()
1555 filtered_list = []
1556
1557 for image in image_list:
1558 try:
1559 if filter_dict.get("name") and image["name"] != filter_dict["name"]:
1560 continue
1561
1562 if filter_dict.get("id") and image["id"] != filter_dict["id"]:
1563 continue
1564
1565 if (
1566 filter_dict.get("checksum")
1567 and image["checksum"] != filter_dict["checksum"]
1568 ):
1569 continue
1570
1571 filtered_list.append(image.copy())
1572 except gl1Exceptions.HTTPNotFound:
1573 pass
1574
1575 return filtered_list
1576 except (
1577 ksExceptions.ClientException,
1578 nvExceptions.ClientException,
1579 gl1Exceptions.CommunicationError,
1580 ConnectionError,
1581 ) as e:
1582 self._format_exception(e)
1583
1584 def __wait_for_vm(self, vm_id, status):
1585 """wait until vm is in the desired status and return True.
1586 If the VM gets in ERROR status, return false.
1587 If the timeout is reached generate an exception"""
1588 elapsed_time = 0
1589 while elapsed_time < server_timeout:
1590 vm_status = self.nova.servers.get(vm_id).status
1591
1592 if vm_status == status:
1593 return True
1594
1595 if vm_status == "ERROR":
1596 return False
1597
1598 time.sleep(5)
1599 elapsed_time += 5
1600
1601 # if we exceeded the timeout rollback
1602 if elapsed_time >= server_timeout:
1603 raise vimconn.VimConnException(
1604 "Timeout waiting for instance " + vm_id + " to get " + status,
1605 http_code=vimconn.HTTP_Request_Timeout,
1606 )
1607
1608 def _get_openstack_availablity_zones(self):
1609 """
1610 Get from openstack availability zones available
1611 :return:
1612 """
1613 try:
1614 openstack_availability_zone = self.nova.availability_zones.list()
1615 openstack_availability_zone = [
1616 str(zone.zoneName)
1617 for zone in openstack_availability_zone
1618 if zone.zoneName != "internal"
1619 ]
1620
1621 return openstack_availability_zone
1622 except Exception:
1623 return None
1624
1625 def _set_availablity_zones(self):
1626 """
1627 Set vim availablity zone
1628 :return:
1629 """
1630 if "availability_zone" in self.config:
1631 vim_availability_zones = self.config.get("availability_zone")
1632
1633 if isinstance(vim_availability_zones, str):
1634 self.availability_zone = [vim_availability_zones]
1635 elif isinstance(vim_availability_zones, list):
1636 self.availability_zone = vim_availability_zones
1637 else:
1638 self.availability_zone = self._get_openstack_availablity_zones()
1639
1640 def _get_vm_availability_zone(
1641 self, availability_zone_index, availability_zone_list
1642 ):
1643 """
1644 Return thge availability zone to be used by the created VM.
1645 :return: The VIM availability zone to be used or None
1646 """
1647 if availability_zone_index is None:
1648 if not self.config.get("availability_zone"):
1649 return None
1650 elif isinstance(self.config.get("availability_zone"), str):
1651 return self.config["availability_zone"]
1652 else:
1653 # TODO consider using a different parameter at config for default AV and AV list match
1654 return self.config["availability_zone"][0]
1655
1656 vim_availability_zones = self.availability_zone
1657 # check if VIM offer enough availability zones describe in the VNFD
1658 if vim_availability_zones and len(availability_zone_list) <= len(
1659 vim_availability_zones
1660 ):
1661 # check if all the names of NFV AV match VIM AV names
1662 match_by_index = False
1663 for av in availability_zone_list:
1664 if av not in vim_availability_zones:
1665 match_by_index = True
1666 break
1667
1668 if match_by_index:
1669 return vim_availability_zones[availability_zone_index]
1670 else:
1671 return availability_zone_list[availability_zone_index]
1672 else:
1673 raise vimconn.VimConnConflictException(
1674 "No enough availability zones at VIM for this deployment"
1675 )
1676
1677 def new_vminstance(
1678 self,
1679 name,
1680 description,
1681 start,
1682 image_id,
1683 flavor_id,
1684 affinity_group_list,
1685 net_list,
1686 cloud_config=None,
1687 disk_list=None,
1688 availability_zone_index=None,
1689 availability_zone_list=None,
1690 ):
1691 """Adds a VM instance to VIM
1692 Params:
1693 start: indicates if VM must start or boot in pause mode. Ignored
1694 image_id,flavor_id: image and flavor uuid
1695 affinity_group_list: list of affinity groups, each one is a dictionary.
1696 Ignore if empty.
1697 net_list: list of interfaces, each one is a dictionary with:
1698 name:
1699 net_id: network uuid to connect
1700 vpci: virtual vcpi to assign, ignored because openstack lack #TODO
1701 model: interface model, ignored #TODO
1702 mac_address: used for SR-IOV ifaces #TODO for other types
1703 use: 'data', 'bridge', 'mgmt'
1704 type: 'virtual', 'PCI-PASSTHROUGH'('PF'), 'SR-IOV'('VF'), 'VFnotShared'
1705 vim_id: filled/added by this function
1706 floating_ip: True/False (or it can be None)
1707 port_security: True/False
1708 'cloud_config': (optional) dictionary with:
1709 'key-pairs': (optional) list of strings with the public key to be inserted to the default user
1710 'users': (optional) list of users to be inserted, each item is a dict with:
1711 'name': (mandatory) user name,
1712 'key-pairs': (optional) list of strings with the public key to be inserted to the user
1713 'user-data': (optional) string is a text script to be passed directly to cloud-init
1714 'config-files': (optional). List of files to be transferred. Each item is a dict with:
1715 'dest': (mandatory) string with the destination absolute path
1716 'encoding': (optional, by default text). Can be one of:
1717 'b64', 'base64', 'gz', 'gz+b64', 'gz+base64', 'gzip+b64', 'gzip+base64'
1718 'content' (mandatory): string with the content of the file
1719 'permissions': (optional) string with file permissions, typically octal notation '0644'
1720 'owner': (optional) file owner, string with the format 'owner:group'
1721 'boot-data-drive': boolean to indicate if user-data must be passed using a boot drive (hard disk)
1722 'disk_list': (optional) list with additional disks to the VM. Each item is a dict with:
1723 'image_id': (optional). VIM id of an existing image. If not provided an empty disk must be mounted
1724 'size': (mandatory) string with the size of the disk in GB
1725 'vim_id' (optional) should use this existing volume id
1726 availability_zone_index: Index of availability_zone_list to use for this this VM. None if not AV required
1727 availability_zone_list: list of availability zones given by user in the VNFD descriptor. Ignore if
1728 availability_zone_index is None
1729 #TODO ip, security groups
1730 Returns a tuple with the instance identifier and created_items or raises an exception on error
1731 created_items can be None or a dictionary where this method can include key-values that will be passed to
1732 the method delete_vminstance and action_vminstance. Can be used to store created ports, volumes, etc.
1733 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
1734 as not present.
1735 """
1736 self.logger.debug(
1737 "new_vminstance input: image='%s' flavor='%s' nics='%s'",
1738 image_id,
1739 flavor_id,
1740 str(net_list),
1741 )
1742
1743 try:
1744 server = None
1745 created_items = {}
1746 # metadata = {}
1747 net_list_vim = []
1748 external_network = []
1749 # ^list of external networks to be connected to instance, later on used to create floating_ip
1750 no_secured_ports = [] # List of port-is with port-security disabled
1751 self._reload_connection()
1752 # metadata_vpci = {} # For a specific neutron plugin
1753 block_device_mapping = None
1754
1755 for net in net_list:
1756 if not net.get("net_id"): # skip non connected iface
1757 continue
1758
1759 port_dict = {
1760 "network_id": net["net_id"],
1761 "name": net.get("name"),
1762 "admin_state_up": True,
1763 }
1764
1765 if (
1766 self.config.get("security_groups")
1767 and net.get("port_security") is not False
1768 and not self.config.get("no_port_security_extension")
1769 ):
1770 if not self.security_groups_id:
1771 self._get_ids_from_name()
1772
1773 port_dict["security_groups"] = self.security_groups_id
1774
1775 if net["type"] == "virtual":
1776 pass
1777 # if "vpci" in net:
1778 # metadata_vpci[ net["net_id"] ] = [[ net["vpci"], "" ]]
1779 elif net["type"] == "VF" or net["type"] == "SR-IOV": # for VF
1780 # if "vpci" in net:
1781 # if "VF" not in metadata_vpci:
1782 # metadata_vpci["VF"]=[]
1783 # metadata_vpci["VF"].append([ net["vpci"], "" ])
1784 port_dict["binding:vnic_type"] = "direct"
1785
1786 # VIO specific Changes
1787 if self.vim_type == "VIO":
1788 # Need to create port with port_security_enabled = False and no-security-groups
1789 port_dict["port_security_enabled"] = False
1790 port_dict["provider_security_groups"] = []
1791 port_dict["security_groups"] = []
1792 else: # For PT PCI-PASSTHROUGH
1793 # if "vpci" in net:
1794 # if "PF" not in metadata_vpci:
1795 # metadata_vpci["PF"]=[]
1796 # metadata_vpci["PF"].append([ net["vpci"], "" ])
1797 port_dict["binding:vnic_type"] = "direct-physical"
1798
1799 if not port_dict["name"]:
1800 port_dict["name"] = name
1801
1802 if net.get("mac_address"):
1803 port_dict["mac_address"] = net["mac_address"]
1804
1805 if net.get("ip_address"):
1806 port_dict["fixed_ips"] = [{"ip_address": net["ip_address"]}]
1807 # TODO add "subnet_id": <subnet_id>
1808
1809 new_port = self.neutron.create_port({"port": port_dict})
1810 created_items["port:" + str(new_port["port"]["id"])] = True
1811 net["mac_adress"] = new_port["port"]["mac_address"]
1812 net["vim_id"] = new_port["port"]["id"]
1813 # if try to use a network without subnetwork, it will return a emtpy list
1814 fixed_ips = new_port["port"].get("fixed_ips")
1815
1816 if fixed_ips:
1817 net["ip"] = fixed_ips[0].get("ip_address")
1818 else:
1819 net["ip"] = None
1820
1821 port = {"port-id": new_port["port"]["id"]}
1822 if float(self.nova.api_version.get_string()) >= 2.32:
1823 port["tag"] = new_port["port"]["name"]
1824
1825 net_list_vim.append(port)
1826
1827 if net.get("floating_ip", False):
1828 net["exit_on_floating_ip_error"] = True
1829 external_network.append(net)
1830 elif net["use"] == "mgmt" and self.config.get("use_floating_ip"):
1831 net["exit_on_floating_ip_error"] = False
1832 external_network.append(net)
1833 net["floating_ip"] = self.config.get("use_floating_ip")
1834
1835 # If port security is disabled when the port has not yet been attached to the VM, then all vm traffic
1836 # is dropped.
1837 # As a workaround we wait until the VM is active and then disable the port-security
1838 if net.get("port_security") is False and not self.config.get(
1839 "no_port_security_extension"
1840 ):
1841 no_secured_ports.append(
1842 (
1843 new_port["port"]["id"],
1844 net.get("port_security_disable_strategy"),
1845 )
1846 )
1847
1848 # if metadata_vpci:
1849 # metadata = {"pci_assignement": json.dumps(metadata_vpci)}
1850 # if len(metadata["pci_assignement"]) >255:
1851 # #limit the metadata size
1852 # #metadata["pci_assignement"] = metadata["pci_assignement"][0:255]
1853 # self.logger.warn("Metadata deleted since it exceeds the expected length (255) ")
1854 # metadata = {}
1855
1856 self.logger.debug(
1857 "name '%s' image_id '%s'flavor_id '%s' net_list_vim '%s' description '%s'",
1858 name,
1859 image_id,
1860 flavor_id,
1861 str(net_list_vim),
1862 description,
1863 )
1864
1865 # cloud config
1866 config_drive, userdata = self._create_user_data(cloud_config)
1867
1868 # Create additional volumes in case these are present in disk_list
1869 base_disk_index = ord("b")
1870 boot_volume_id = None
1871 if disk_list:
1872 block_device_mapping = {}
1873 for disk in disk_list:
1874 if disk.get("vim_id"):
1875 block_device_mapping["_vd" + chr(base_disk_index)] = disk[
1876 "vim_id"
1877 ]
1878 else:
1879 if "image_id" in disk:
1880 base_disk_index = ord("a")
1881 volume = self.cinder.volumes.create(
1882 size=disk["size"],
1883 name=name + "_vd" + chr(base_disk_index),
1884 imageRef=disk["image_id"],
1885 )
1886 boot_volume_id = volume.id
1887 else:
1888 volume = self.cinder.volumes.create(
1889 size=disk["size"],
1890 name=name + "_vd" + chr(base_disk_index),
1891 )
1892
1893 created_items["volume:" + str(volume.id)] = True
1894 block_device_mapping["_vd" + chr(base_disk_index)] = volume.id
1895
1896 base_disk_index += 1
1897
1898 # Wait until created volumes are with status available
1899 elapsed_time = 0
1900 while elapsed_time < volume_timeout:
1901 for created_item in created_items:
1902 v, _, volume_id = created_item.partition(":")
1903 if v == "volume":
1904 if self.cinder.volumes.get(volume_id).status != "available":
1905 break
1906 else: # all ready: break from while
1907 break
1908
1909 time.sleep(5)
1910 elapsed_time += 5
1911
1912 # If we exceeded the timeout rollback
1913 if elapsed_time >= volume_timeout:
1914 raise vimconn.VimConnException(
1915 "Timeout creating volumes for instance " + name,
1916 http_code=vimconn.HTTP_Request_Timeout,
1917 )
1918 if boot_volume_id:
1919 self.cinder.volumes.set_bootable(boot_volume_id, True)
1920
1921 # get availability Zone
1922 vm_av_zone = self._get_vm_availability_zone(
1923 availability_zone_index, availability_zone_list
1924 )
1925
1926 # Manage affinity groups/server groups
1927 server_group_id = None
1928 scheduller_hints = {}
1929
1930 if affinity_group_list:
1931 # Only first id on the list will be used. Openstack restriction
1932 server_group_id = affinity_group_list[0]["affinity_group_id"]
1933 scheduller_hints["group"] = server_group_id
1934
1935 self.logger.debug(
1936 "nova.servers.create({}, {}, {}, nics={}, security_groups={}, "
1937 "availability_zone={}, key_name={}, userdata={}, config_drive={}, "
1938 "block_device_mapping={}, server_group={})".format(
1939 name,
1940 image_id,
1941 flavor_id,
1942 net_list_vim,
1943 self.config.get("security_groups"),
1944 vm_av_zone,
1945 self.config.get("keypair"),
1946 userdata,
1947 config_drive,
1948 block_device_mapping,
1949 server_group_id,
1950 )
1951 )
1952 server = self.nova.servers.create(
1953 name,
1954 image_id,
1955 flavor_id,
1956 nics=net_list_vim,
1957 security_groups=self.config.get("security_groups"),
1958 # TODO remove security_groups in future versions. Already at neutron port
1959 availability_zone=vm_av_zone,
1960 key_name=self.config.get("keypair"),
1961 userdata=userdata,
1962 config_drive=config_drive,
1963 block_device_mapping=block_device_mapping,
1964 scheduler_hints=scheduller_hints,
1965 ) # , description=description)
1966
1967 vm_start_time = time.time()
1968 # Previously mentioned workaround to wait until the VM is active and then disable the port-security
1969 if no_secured_ports:
1970 self.__wait_for_vm(server.id, "ACTIVE")
1971
1972 for port in no_secured_ports:
1973 port_update = {
1974 "port": {"port_security_enabled": False, "security_groups": None}
1975 }
1976
1977 if port[1] == "allow-address-pairs":
1978 port_update = {
1979 "port": {"allowed_address_pairs": [{"ip_address": "0.0.0.0/0"}]}
1980 }
1981
1982 try:
1983 self.neutron.update_port(port[0], port_update)
1984 except Exception:
1985 raise vimconn.VimConnException(
1986 "It was not possible to disable port security for port {}".format(
1987 port[0]
1988 )
1989 )
1990
1991 # print "DONE :-)", server
1992
1993 # pool_id = None
1994 for floating_network in external_network:
1995 try:
1996 assigned = False
1997 floating_ip_retries = 3
1998 # In case of RO in HA there can be conflicts, two RO trying to assign same floating IP, so retry
1999 # several times
2000 while not assigned:
2001 floating_ips = self.neutron.list_floatingips().get(
2002 "floatingips", ()
2003 )
2004 random.shuffle(floating_ips) # randomize
2005 for fip in floating_ips:
2006 if (
2007 fip.get("port_id")
2008 or fip.get("tenant_id") != server.tenant_id
2009 ):
2010 continue
2011
2012 if isinstance(floating_network["floating_ip"], str):
2013 if (
2014 fip.get("floating_network_id")
2015 != floating_network["floating_ip"]
2016 ):
2017 continue
2018
2019 free_floating_ip = fip["id"]
2020 break
2021 else:
2022 if (
2023 isinstance(floating_network["floating_ip"], str)
2024 and floating_network["floating_ip"].lower() != "true"
2025 ):
2026 pool_id = floating_network["floating_ip"]
2027 else:
2028 # Find the external network
2029 external_nets = list()
2030
2031 for net in self.neutron.list_networks()["networks"]:
2032 if net["router:external"]:
2033 external_nets.append(net)
2034
2035 if len(external_nets) == 0:
2036 raise vimconn.VimConnException(
2037 "Cannot create floating_ip automatically since "
2038 "no external network is present",
2039 http_code=vimconn.HTTP_Conflict,
2040 )
2041
2042 if len(external_nets) > 1:
2043 raise vimconn.VimConnException(
2044 "Cannot create floating_ip automatically since "
2045 "multiple external networks are present",
2046 http_code=vimconn.HTTP_Conflict,
2047 )
2048
2049 pool_id = external_nets[0].get("id")
2050
2051 param = {
2052 "floatingip": {
2053 "floating_network_id": pool_id,
2054 "tenant_id": server.tenant_id,
2055 }
2056 }
2057
2058 try:
2059 # self.logger.debug("Creating floating IP")
2060 new_floating_ip = self.neutron.create_floatingip(param)
2061 free_floating_ip = new_floating_ip["floatingip"]["id"]
2062 created_items[
2063 "floating_ip:" + str(free_floating_ip)
2064 ] = True
2065 except Exception as e:
2066 raise vimconn.VimConnException(
2067 type(e).__name__
2068 + ": Cannot create new floating_ip "
2069 + str(e),
2070 http_code=vimconn.HTTP_Conflict,
2071 )
2072
2073 try:
2074 # for race condition ensure not already assigned
2075 fip = self.neutron.show_floatingip(free_floating_ip)
2076
2077 if fip["floatingip"]["port_id"]:
2078 continue
2079
2080 # the vim_id key contains the neutron.port_id
2081 self.neutron.update_floatingip(
2082 free_floating_ip,
2083 {"floatingip": {"port_id": floating_network["vim_id"]}},
2084 )
2085 # for race condition ensure not re-assigned to other VM after 5 seconds
2086 time.sleep(5)
2087 fip = self.neutron.show_floatingip(free_floating_ip)
2088
2089 if (
2090 fip["floatingip"]["port_id"]
2091 != floating_network["vim_id"]
2092 ):
2093 self.logger.error(
2094 "floating_ip {} re-assigned to other port".format(
2095 free_floating_ip
2096 )
2097 )
2098 continue
2099
2100 self.logger.debug(
2101 "Assigned floating_ip {} to VM {}".format(
2102 free_floating_ip, server.id
2103 )
2104 )
2105 assigned = True
2106 except Exception as e:
2107 # openstack need some time after VM creation to assign an IP. So retry if fails
2108 vm_status = self.nova.servers.get(server.id).status
2109
2110 if vm_status not in ("ACTIVE", "ERROR"):
2111 if time.time() - vm_start_time < server_timeout:
2112 time.sleep(5)
2113 continue
2114 elif floating_ip_retries > 0:
2115 floating_ip_retries -= 1
2116 continue
2117
2118 raise vimconn.VimConnException(
2119 "Cannot create floating_ip: {} {}".format(
2120 type(e).__name__, e
2121 ),
2122 http_code=vimconn.HTTP_Conflict,
2123 )
2124
2125 except Exception as e:
2126 if not floating_network["exit_on_floating_ip_error"]:
2127 self.logger.error("Cannot create floating_ip. %s", str(e))
2128 continue
2129
2130 raise
2131
2132 return server.id, created_items
2133 # except nvExceptions.NotFound as e:
2134 # error_value=-vimconn.HTTP_Not_Found
2135 # error_text= "vm instance %s not found" % vm_id
2136 # except TypeError as e:
2137 # raise vimconn.VimConnException(type(e).__name__ + ": "+ str(e), http_code=vimconn.HTTP_Bad_Request)
2138
2139 except Exception as e:
2140 server_id = None
2141 if server:
2142 server_id = server.id
2143
2144 try:
2145 self.delete_vminstance(server_id, created_items)
2146 except Exception as e2:
2147 self.logger.error("new_vminstance rollback fail {}".format(e2))
2148
2149 self._format_exception(e)
2150
2151 def get_vminstance(self, vm_id):
2152 """Returns the VM instance information from VIM"""
2153 # self.logger.debug("Getting VM from VIM")
2154 try:
2155 self._reload_connection()
2156 server = self.nova.servers.find(id=vm_id)
2157 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
2158
2159 return server.to_dict()
2160 except (
2161 ksExceptions.ClientException,
2162 nvExceptions.ClientException,
2163 nvExceptions.NotFound,
2164 ConnectionError,
2165 ) as e:
2166 self._format_exception(e)
2167
2168 def get_vminstance_console(self, vm_id, console_type="vnc"):
2169 """
2170 Get a console for the virtual machine
2171 Params:
2172 vm_id: uuid of the VM
2173 console_type, can be:
2174 "novnc" (by default), "xvpvnc" for VNC types,
2175 "rdp-html5" for RDP types, "spice-html5" for SPICE types
2176 Returns dict with the console parameters:
2177 protocol: ssh, ftp, http, https, ...
2178 server: usually ip address
2179 port: the http, ssh, ... port
2180 suffix: extra text, e.g. the http path and query string
2181 """
2182 self.logger.debug("Getting VM CONSOLE from VIM")
2183
2184 try:
2185 self._reload_connection()
2186 server = self.nova.servers.find(id=vm_id)
2187
2188 if console_type is None or console_type == "novnc":
2189 console_dict = server.get_vnc_console("novnc")
2190 elif console_type == "xvpvnc":
2191 console_dict = server.get_vnc_console(console_type)
2192 elif console_type == "rdp-html5":
2193 console_dict = server.get_rdp_console(console_type)
2194 elif console_type == "spice-html5":
2195 console_dict = server.get_spice_console(console_type)
2196 else:
2197 raise vimconn.VimConnException(
2198 "console type '{}' not allowed".format(console_type),
2199 http_code=vimconn.HTTP_Bad_Request,
2200 )
2201
2202 console_dict1 = console_dict.get("console")
2203
2204 if console_dict1:
2205 console_url = console_dict1.get("url")
2206
2207 if console_url:
2208 # parse console_url
2209 protocol_index = console_url.find("//")
2210 suffix_index = (
2211 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2212 )
2213 port_index = (
2214 console_url[protocol_index + 2 : suffix_index].find(":")
2215 + protocol_index
2216 + 2
2217 )
2218
2219 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
2220 return (
2221 -vimconn.HTTP_Internal_Server_Error,
2222 "Unexpected response from VIM",
2223 )
2224
2225 console_dict = {
2226 "protocol": console_url[0:protocol_index],
2227 "server": console_url[protocol_index + 2 : port_index],
2228 "port": console_url[port_index:suffix_index],
2229 "suffix": console_url[suffix_index + 1 :],
2230 }
2231 protocol_index += 2
2232
2233 return console_dict
2234 raise vimconn.VimConnUnexpectedResponse("Unexpected response from VIM")
2235 except (
2236 nvExceptions.NotFound,
2237 ksExceptions.ClientException,
2238 nvExceptions.ClientException,
2239 nvExceptions.BadRequest,
2240 ConnectionError,
2241 ) as e:
2242 self._format_exception(e)
2243
2244 def delete_vminstance(self, vm_id, created_items=None):
2245 """Removes a VM instance from VIM. Returns the old identifier"""
2246 # print "osconnector: Getting VM from VIM"
2247 if created_items is None:
2248 created_items = {}
2249
2250 try:
2251 self._reload_connection()
2252 # delete VM ports attached to this networks before the virtual machine
2253 for k, v in created_items.items():
2254 if not v: # skip already deleted
2255 continue
2256
2257 try:
2258 k_item, _, k_id = k.partition(":")
2259 if k_item == "port":
2260 self.neutron.delete_port(k_id)
2261 except Exception as e:
2262 self.logger.error(
2263 "Error deleting port: {}: {}".format(type(e).__name__, e)
2264 )
2265
2266 # #commented because detaching the volumes makes the servers.delete not work properly ?!?
2267 # #dettach volumes attached
2268 # server = self.nova.servers.get(vm_id)
2269 # volumes_attached_dict = server._info["os-extended-volumes:volumes_attached"] #volume["id"]
2270 # #for volume in volumes_attached_dict:
2271 # # self.cinder.volumes.detach(volume["id"])
2272
2273 if vm_id:
2274 self.nova.servers.delete(vm_id)
2275
2276 # delete volumes. Although having detached, they should have in active status before deleting
2277 # we ensure in this loop
2278 keep_waiting = True
2279 elapsed_time = 0
2280
2281 while keep_waiting and elapsed_time < volume_timeout:
2282 keep_waiting = False
2283
2284 for k, v in created_items.items():
2285 if not v: # skip already deleted
2286 continue
2287
2288 try:
2289 k_item, _, k_id = k.partition(":")
2290 if k_item == "volume":
2291 if self.cinder.volumes.get(k_id).status != "available":
2292 keep_waiting = True
2293 else:
2294 self.cinder.volumes.delete(k_id)
2295 created_items[k] = None
2296 elif k_item == "floating_ip": # floating ip
2297 self.neutron.delete_floatingip(k_id)
2298 created_items[k] = None
2299
2300 except Exception as e:
2301 self.logger.error("Error deleting {}: {}".format(k, e))
2302
2303 if keep_waiting:
2304 time.sleep(1)
2305 elapsed_time += 1
2306
2307 return None
2308 except (
2309 nvExceptions.NotFound,
2310 ksExceptions.ClientException,
2311 nvExceptions.ClientException,
2312 ConnectionError,
2313 ) as e:
2314 self._format_exception(e)
2315
2316 def refresh_vms_status(self, vm_list):
2317 """Get the status of the virtual machines and their interfaces/ports
2318 Params: the list of VM identifiers
2319 Returns a dictionary with:
2320 vm_id: #VIM id of this Virtual Machine
2321 status: #Mandatory. Text with one of:
2322 # DELETED (not found at vim)
2323 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
2324 # OTHER (Vim reported other status not understood)
2325 # ERROR (VIM indicates an ERROR status)
2326 # ACTIVE, PAUSED, SUSPENDED, INACTIVE (not running),
2327 # CREATING (on building process), ERROR
2328 # ACTIVE:NoMgmtIP (Active but any of its interface has an IP address
2329 #
2330 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
2331 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2332 interfaces:
2333 - vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2334 mac_address: #Text format XX:XX:XX:XX:XX:XX
2335 vim_net_id: #network id where this interface is connected
2336 vim_interface_id: #interface/port VIM id
2337 ip_address: #null, or text with IPv4, IPv6 address
2338 compute_node: #identification of compute node where PF,VF interface is allocated
2339 pci: #PCI address of the NIC that hosts the PF,VF
2340 vlan: #physical VLAN used for VF
2341 """
2342 vm_dict = {}
2343 self.logger.debug(
2344 "refresh_vms status: Getting tenant VM instance information from VIM"
2345 )
2346
2347 for vm_id in vm_list:
2348 vm = {}
2349
2350 try:
2351 vm_vim = self.get_vminstance(vm_id)
2352
2353 if vm_vim["status"] in vmStatus2manoFormat:
2354 vm["status"] = vmStatus2manoFormat[vm_vim["status"]]
2355 else:
2356 vm["status"] = "OTHER"
2357 vm["error_msg"] = "VIM status reported " + vm_vim["status"]
2358
2359 vm_vim.pop("OS-EXT-SRV-ATTR:user_data", None)
2360 vm_vim.pop("user_data", None)
2361 vm["vim_info"] = self.serialize(vm_vim)
2362
2363 vm["interfaces"] = []
2364 if vm_vim.get("fault"):
2365 vm["error_msg"] = str(vm_vim["fault"])
2366
2367 # get interfaces
2368 try:
2369 self._reload_connection()
2370 port_dict = self.neutron.list_ports(device_id=vm_id)
2371
2372 for port in port_dict["ports"]:
2373 interface = {}
2374 interface["vim_info"] = self.serialize(port)
2375 interface["mac_address"] = port.get("mac_address")
2376 interface["vim_net_id"] = port["network_id"]
2377 interface["vim_interface_id"] = port["id"]
2378 # check if OS-EXT-SRV-ATTR:host is there,
2379 # in case of non-admin credentials, it will be missing
2380
2381 if vm_vim.get("OS-EXT-SRV-ATTR:host"):
2382 interface["compute_node"] = vm_vim["OS-EXT-SRV-ATTR:host"]
2383
2384 interface["pci"] = None
2385
2386 # check if binding:profile is there,
2387 # in case of non-admin credentials, it will be missing
2388 if port.get("binding:profile"):
2389 if port["binding:profile"].get("pci_slot"):
2390 # TODO: At the moment sr-iov pci addresses are converted to PF pci addresses by setting
2391 # the slot to 0x00
2392 # TODO: This is just a workaround valid for niantinc. Find a better way to do so
2393 # CHANGE DDDD:BB:SS.F to DDDD:BB:00.(F%2) assuming there are 2 ports per nic
2394 pci = port["binding:profile"]["pci_slot"]
2395 # interface["pci"] = pci[:-4] + "00." + str(int(pci[-1]) % 2)
2396 interface["pci"] = pci
2397
2398 interface["vlan"] = None
2399
2400 if port.get("binding:vif_details"):
2401 interface["vlan"] = port["binding:vif_details"].get("vlan")
2402
2403 # Get vlan from network in case not present in port for those old openstacks and cases where
2404 # it is needed vlan at PT
2405 if not interface["vlan"]:
2406 # if network is of type vlan and port is of type direct (sr-iov) then set vlan id
2407 network = self.neutron.show_network(port["network_id"])
2408
2409 if (
2410 network["network"].get("provider:network_type")
2411 == "vlan"
2412 ):
2413 # and port.get("binding:vnic_type") in ("direct", "direct-physical"):
2414 interface["vlan"] = network["network"].get(
2415 "provider:segmentation_id"
2416 )
2417
2418 ips = []
2419 # look for floating ip address
2420 try:
2421 floating_ip_dict = self.neutron.list_floatingips(
2422 port_id=port["id"]
2423 )
2424
2425 if floating_ip_dict.get("floatingips"):
2426 ips.append(
2427 floating_ip_dict["floatingips"][0].get(
2428 "floating_ip_address"
2429 )
2430 )
2431 except Exception:
2432 pass
2433
2434 for subnet in port["fixed_ips"]:
2435 ips.append(subnet["ip_address"])
2436
2437 interface["ip_address"] = ";".join(ips)
2438 vm["interfaces"].append(interface)
2439 except Exception as e:
2440 self.logger.error(
2441 "Error getting vm interface information {}: {}".format(
2442 type(e).__name__, e
2443 ),
2444 exc_info=True,
2445 )
2446 except vimconn.VimConnNotFoundException as e:
2447 self.logger.error("Exception getting vm status: %s", str(e))
2448 vm["status"] = "DELETED"
2449 vm["error_msg"] = str(e)
2450 except vimconn.VimConnException as e:
2451 self.logger.error("Exception getting vm status: %s", str(e))
2452 vm["status"] = "VIM_ERROR"
2453 vm["error_msg"] = str(e)
2454
2455 vm_dict[vm_id] = vm
2456
2457 return vm_dict
2458
2459 def action_vminstance(self, vm_id, action_dict, created_items={}):
2460 """Send and action over a VM instance from VIM
2461 Returns None or the console dict if the action was successfully sent to the VIM"""
2462 self.logger.debug("Action over VM '%s': %s", vm_id, str(action_dict))
2463
2464 try:
2465 self._reload_connection()
2466 server = self.nova.servers.find(id=vm_id)
2467
2468 if "start" in action_dict:
2469 if action_dict["start"] == "rebuild":
2470 server.rebuild()
2471 else:
2472 if server.status == "PAUSED":
2473 server.unpause()
2474 elif server.status == "SUSPENDED":
2475 server.resume()
2476 elif server.status == "SHUTOFF":
2477 server.start()
2478 elif "pause" in action_dict:
2479 server.pause()
2480 elif "resume" in action_dict:
2481 server.resume()
2482 elif "shutoff" in action_dict or "shutdown" in action_dict:
2483 server.stop()
2484 elif "forceOff" in action_dict:
2485 server.stop() # TODO
2486 elif "terminate" in action_dict:
2487 server.delete()
2488 elif "createImage" in action_dict:
2489 server.create_image()
2490 # "path":path_schema,
2491 # "description":description_schema,
2492 # "name":name_schema,
2493 # "metadata":metadata_schema,
2494 # "imageRef": id_schema,
2495 # "disk": {"oneOf":[{"type": "null"}, {"type":"string"}] },
2496 elif "rebuild" in action_dict:
2497 server.rebuild(server.image["id"])
2498 elif "reboot" in action_dict:
2499 server.reboot() # reboot_type="SOFT"
2500 elif "console" in action_dict:
2501 console_type = action_dict["console"]
2502
2503 if console_type is None or console_type == "novnc":
2504 console_dict = server.get_vnc_console("novnc")
2505 elif console_type == "xvpvnc":
2506 console_dict = server.get_vnc_console(console_type)
2507 elif console_type == "rdp-html5":
2508 console_dict = server.get_rdp_console(console_type)
2509 elif console_type == "spice-html5":
2510 console_dict = server.get_spice_console(console_type)
2511 else:
2512 raise vimconn.VimConnException(
2513 "console type '{}' not allowed".format(console_type),
2514 http_code=vimconn.HTTP_Bad_Request,
2515 )
2516
2517 try:
2518 console_url = console_dict["console"]["url"]
2519 # parse console_url
2520 protocol_index = console_url.find("//")
2521 suffix_index = (
2522 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2523 )
2524 port_index = (
2525 console_url[protocol_index + 2 : suffix_index].find(":")
2526 + protocol_index
2527 + 2
2528 )
2529
2530 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
2531 raise vimconn.VimConnException(
2532 "Unexpected response from VIM " + str(console_dict)
2533 )
2534
2535 console_dict2 = {
2536 "protocol": console_url[0:protocol_index],
2537 "server": console_url[protocol_index + 2 : port_index],
2538 "port": int(console_url[port_index + 1 : suffix_index]),
2539 "suffix": console_url[suffix_index + 1 :],
2540 }
2541
2542 return console_dict2
2543 except Exception:
2544 raise vimconn.VimConnException(
2545 "Unexpected response from VIM " + str(console_dict)
2546 )
2547
2548 return None
2549 except (
2550 ksExceptions.ClientException,
2551 nvExceptions.ClientException,
2552 nvExceptions.NotFound,
2553 ConnectionError,
2554 ) as e:
2555 self._format_exception(e)
2556 # TODO insert exception vimconn.HTTP_Unauthorized
2557
2558 # ###### VIO Specific Changes #########
2559 def _generate_vlanID(self):
2560 """
2561 Method to get unused vlanID
2562 Args:
2563 None
2564 Returns:
2565 vlanID
2566 """
2567 # Get used VLAN IDs
2568 usedVlanIDs = []
2569 networks = self.get_network_list()
2570
2571 for net in networks:
2572 if net.get("provider:segmentation_id"):
2573 usedVlanIDs.append(net.get("provider:segmentation_id"))
2574
2575 used_vlanIDs = set(usedVlanIDs)
2576
2577 # find unused VLAN ID
2578 for vlanID_range in self.config.get("dataplane_net_vlan_range"):
2579 try:
2580 start_vlanid, end_vlanid = map(
2581 int, vlanID_range.replace(" ", "").split("-")
2582 )
2583
2584 for vlanID in range(start_vlanid, end_vlanid + 1):
2585 if vlanID not in used_vlanIDs:
2586 return vlanID
2587 except Exception as exp:
2588 raise vimconn.VimConnException(
2589 "Exception {} occurred while generating VLAN ID.".format(exp)
2590 )
2591 else:
2592 raise vimconn.VimConnConflictException(
2593 "Unable to create the SRIOV VLAN network. All given Vlan IDs {} are in use.".format(
2594 self.config.get("dataplane_net_vlan_range")
2595 )
2596 )
2597
2598 def _generate_multisegment_vlanID(self):
2599 """
2600 Method to get unused vlanID
2601 Args:
2602 None
2603 Returns:
2604 vlanID
2605 """
2606 # Get used VLAN IDs
2607 usedVlanIDs = []
2608 networks = self.get_network_list()
2609 for net in networks:
2610 if net.get("provider:network_type") == "vlan" and net.get(
2611 "provider:segmentation_id"
2612 ):
2613 usedVlanIDs.append(net.get("provider:segmentation_id"))
2614 elif net.get("segments"):
2615 for segment in net.get("segments"):
2616 if segment.get("provider:network_type") == "vlan" and segment.get(
2617 "provider:segmentation_id"
2618 ):
2619 usedVlanIDs.append(segment.get("provider:segmentation_id"))
2620
2621 used_vlanIDs = set(usedVlanIDs)
2622
2623 # find unused VLAN ID
2624 for vlanID_range in self.config.get("multisegment_vlan_range"):
2625 try:
2626 start_vlanid, end_vlanid = map(
2627 int, vlanID_range.replace(" ", "").split("-")
2628 )
2629
2630 for vlanID in range(start_vlanid, end_vlanid + 1):
2631 if vlanID not in used_vlanIDs:
2632 return vlanID
2633 except Exception as exp:
2634 raise vimconn.VimConnException(
2635 "Exception {} occurred while generating VLAN ID.".format(exp)
2636 )
2637 else:
2638 raise vimconn.VimConnConflictException(
2639 "Unable to create the VLAN segment. All VLAN IDs {} are in use.".format(
2640 self.config.get("multisegment_vlan_range")
2641 )
2642 )
2643
2644 def _validate_vlan_ranges(self, input_vlan_range, text_vlan_range):
2645 """
2646 Method to validate user given vlanID ranges
2647 Args: None
2648 Returns: None
2649 """
2650 for vlanID_range in input_vlan_range:
2651 vlan_range = vlanID_range.replace(" ", "")
2652 # validate format
2653 vlanID_pattern = r"(\d)*-(\d)*$"
2654 match_obj = re.match(vlanID_pattern, vlan_range)
2655 if not match_obj:
2656 raise vimconn.VimConnConflictException(
2657 "Invalid VLAN range for {}: {}.You must provide "
2658 "'{}' in format [start_ID - end_ID].".format(
2659 text_vlan_range, vlanID_range, text_vlan_range
2660 )
2661 )
2662
2663 start_vlanid, end_vlanid = map(int, vlan_range.split("-"))
2664 if start_vlanid <= 0:
2665 raise vimconn.VimConnConflictException(
2666 "Invalid VLAN range for {}: {}. Start ID can not be zero. For VLAN "
2667 "networks valid IDs are 1 to 4094 ".format(
2668 text_vlan_range, vlanID_range
2669 )
2670 )
2671
2672 if end_vlanid > 4094:
2673 raise vimconn.VimConnConflictException(
2674 "Invalid VLAN range for {}: {}. End VLAN ID can not be "
2675 "greater than 4094. For VLAN networks valid IDs are 1 to 4094 ".format(
2676 text_vlan_range, vlanID_range
2677 )
2678 )
2679
2680 if start_vlanid > end_vlanid:
2681 raise vimconn.VimConnConflictException(
2682 "Invalid VLAN range for {}: {}. You must provide '{}'"
2683 " in format start_ID - end_ID and start_ID < end_ID ".format(
2684 text_vlan_range, vlanID_range, text_vlan_range
2685 )
2686 )
2687
2688 # NOT USED FUNCTIONS
2689
2690 def new_external_port(self, port_data):
2691 """Adds a external port to VIM
2692 Returns the port identifier"""
2693 # TODO openstack if needed
2694 return (
2695 -vimconn.HTTP_Internal_Server_Error,
2696 "osconnector.new_external_port() not implemented",
2697 )
2698
2699 def connect_port_network(self, port_id, network_id, admin=False):
2700 """Connects a external port to a network
2701 Returns status code of the VIM response"""
2702 # TODO openstack if needed
2703 return (
2704 -vimconn.HTTP_Internal_Server_Error,
2705 "osconnector.connect_port_network() not implemented",
2706 )
2707
2708 def new_user(self, user_name, user_passwd, tenant_id=None):
2709 """Adds a new user to openstack VIM
2710 Returns the user identifier"""
2711 self.logger.debug("osconnector: Adding a new user to VIM")
2712
2713 try:
2714 self._reload_connection()
2715 user = self.keystone.users.create(
2716 user_name, password=user_passwd, default_project=tenant_id
2717 )
2718 # self.keystone.tenants.add_user(self.k_creds["username"], #role)
2719
2720 return user.id
2721 except ksExceptions.ConnectionError as e:
2722 error_value = -vimconn.HTTP_Bad_Request
2723 error_text = (
2724 type(e).__name__
2725 + ": "
2726 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2727 )
2728 except ksExceptions.ClientException as e: # TODO remove
2729 error_value = -vimconn.HTTP_Bad_Request
2730 error_text = (
2731 type(e).__name__
2732 + ": "
2733 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2734 )
2735
2736 # TODO insert exception vimconn.HTTP_Unauthorized
2737 # if reaching here is because an exception
2738 self.logger.debug("new_user " + error_text)
2739
2740 return error_value, error_text
2741
2742 def delete_user(self, user_id):
2743 """Delete a user from openstack VIM
2744 Returns the user identifier"""
2745 if self.debug:
2746 print("osconnector: Deleting a user from VIM")
2747
2748 try:
2749 self._reload_connection()
2750 self.keystone.users.delete(user_id)
2751
2752 return 1, user_id
2753 except ksExceptions.ConnectionError as e:
2754 error_value = -vimconn.HTTP_Bad_Request
2755 error_text = (
2756 type(e).__name__
2757 + ": "
2758 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2759 )
2760 except ksExceptions.NotFound as e:
2761 error_value = -vimconn.HTTP_Not_Found
2762 error_text = (
2763 type(e).__name__
2764 + ": "
2765 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2766 )
2767 except ksExceptions.ClientException as e: # TODO remove
2768 error_value = -vimconn.HTTP_Bad_Request
2769 error_text = (
2770 type(e).__name__
2771 + ": "
2772 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2773 )
2774
2775 # TODO insert exception vimconn.HTTP_Unauthorized
2776 # if reaching here is because an exception
2777 self.logger.debug("delete_tenant " + error_text)
2778
2779 return error_value, error_text
2780
2781 def get_hosts_info(self):
2782 """Get the information of deployed hosts
2783 Returns the hosts content"""
2784 if self.debug:
2785 print("osconnector: Getting Host info from VIM")
2786
2787 try:
2788 h_list = []
2789 self._reload_connection()
2790 hypervisors = self.nova.hypervisors.list()
2791
2792 for hype in hypervisors:
2793 h_list.append(hype.to_dict())
2794
2795 return 1, {"hosts": h_list}
2796 except nvExceptions.NotFound as e:
2797 error_value = -vimconn.HTTP_Not_Found
2798 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
2799 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
2800 error_value = -vimconn.HTTP_Bad_Request
2801 error_text = (
2802 type(e).__name__
2803 + ": "
2804 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2805 )
2806
2807 # TODO insert exception vimconn.HTTP_Unauthorized
2808 # if reaching here is because an exception
2809 self.logger.debug("get_hosts_info " + error_text)
2810
2811 return error_value, error_text
2812
2813 def get_hosts(self, vim_tenant):
2814 """Get the hosts and deployed instances
2815 Returns the hosts content"""
2816 r, hype_dict = self.get_hosts_info()
2817
2818 if r < 0:
2819 return r, hype_dict
2820
2821 hypervisors = hype_dict["hosts"]
2822
2823 try:
2824 servers = self.nova.servers.list()
2825 for hype in hypervisors:
2826 for server in servers:
2827 if (
2828 server.to_dict()["OS-EXT-SRV-ATTR:hypervisor_hostname"]
2829 == hype["hypervisor_hostname"]
2830 ):
2831 if "vm" in hype:
2832 hype["vm"].append(server.id)
2833 else:
2834 hype["vm"] = [server.id]
2835
2836 return 1, hype_dict
2837 except nvExceptions.NotFound as e:
2838 error_value = -vimconn.HTTP_Not_Found
2839 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
2840 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
2841 error_value = -vimconn.HTTP_Bad_Request
2842 error_text = (
2843 type(e).__name__
2844 + ": "
2845 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2846 )
2847
2848 # TODO insert exception vimconn.HTTP_Unauthorized
2849 # if reaching here is because an exception
2850 self.logger.debug("get_hosts " + error_text)
2851
2852 return error_value, error_text
2853
2854 def new_classification(self, name, ctype, definition):
2855 self.logger.debug(
2856 "Adding a new (Traffic) Classification to VIM, named %s", name
2857 )
2858
2859 try:
2860 new_class = None
2861 self._reload_connection()
2862
2863 if ctype not in supportedClassificationTypes:
2864 raise vimconn.VimConnNotSupportedException(
2865 "OpenStack VIM connector does not support provided "
2866 "Classification Type {}, supported ones are: {}".format(
2867 ctype, supportedClassificationTypes
2868 )
2869 )
2870
2871 if not self._validate_classification(ctype, definition):
2872 raise vimconn.VimConnException(
2873 "Incorrect Classification definition for the type specified."
2874 )
2875
2876 classification_dict = definition
2877 classification_dict["name"] = name
2878 new_class = self.neutron.create_sfc_flow_classifier(
2879 {"flow_classifier": classification_dict}
2880 )
2881
2882 return new_class["flow_classifier"]["id"]
2883 except (
2884 neExceptions.ConnectionFailed,
2885 ksExceptions.ClientException,
2886 neExceptions.NeutronException,
2887 ConnectionError,
2888 ) as e:
2889 self.logger.error("Creation of Classification failed.")
2890 self._format_exception(e)
2891
2892 def get_classification(self, class_id):
2893 self.logger.debug(" Getting Classification %s from VIM", class_id)
2894 filter_dict = {"id": class_id}
2895 class_list = self.get_classification_list(filter_dict)
2896
2897 if len(class_list) == 0:
2898 raise vimconn.VimConnNotFoundException(
2899 "Classification '{}' not found".format(class_id)
2900 )
2901 elif len(class_list) > 1:
2902 raise vimconn.VimConnConflictException(
2903 "Found more than one Classification with this criteria"
2904 )
2905
2906 classification = class_list[0]
2907
2908 return classification
2909
2910 def get_classification_list(self, filter_dict={}):
2911 self.logger.debug(
2912 "Getting Classifications from VIM filter: '%s'", str(filter_dict)
2913 )
2914
2915 try:
2916 filter_dict_os = filter_dict.copy()
2917 self._reload_connection()
2918
2919 if self.api_version3 and "tenant_id" in filter_dict_os:
2920 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
2921
2922 classification_dict = self.neutron.list_sfc_flow_classifiers(
2923 **filter_dict_os
2924 )
2925 classification_list = classification_dict["flow_classifiers"]
2926 self.__classification_os2mano(classification_list)
2927
2928 return classification_list
2929 except (
2930 neExceptions.ConnectionFailed,
2931 ksExceptions.ClientException,
2932 neExceptions.NeutronException,
2933 ConnectionError,
2934 ) as e:
2935 self._format_exception(e)
2936
2937 def delete_classification(self, class_id):
2938 self.logger.debug("Deleting Classification '%s' from VIM", class_id)
2939
2940 try:
2941 self._reload_connection()
2942 self.neutron.delete_sfc_flow_classifier(class_id)
2943
2944 return class_id
2945 except (
2946 neExceptions.ConnectionFailed,
2947 neExceptions.NeutronException,
2948 ksExceptions.ClientException,
2949 neExceptions.NeutronException,
2950 ConnectionError,
2951 ) as e:
2952 self._format_exception(e)
2953
2954 def new_sfi(self, name, ingress_ports, egress_ports, sfc_encap=True):
2955 self.logger.debug(
2956 "Adding a new Service Function Instance to VIM, named '%s'", name
2957 )
2958
2959 try:
2960 new_sfi = None
2961 self._reload_connection()
2962 correlation = None
2963
2964 if sfc_encap:
2965 correlation = "nsh"
2966
2967 if len(ingress_ports) != 1:
2968 raise vimconn.VimConnNotSupportedException(
2969 "OpenStack VIM connector can only have 1 ingress port per SFI"
2970 )
2971
2972 if len(egress_ports) != 1:
2973 raise vimconn.VimConnNotSupportedException(
2974 "OpenStack VIM connector can only have 1 egress port per SFI"
2975 )
2976
2977 sfi_dict = {
2978 "name": name,
2979 "ingress": ingress_ports[0],
2980 "egress": egress_ports[0],
2981 "service_function_parameters": {"correlation": correlation},
2982 }
2983 new_sfi = self.neutron.create_sfc_port_pair({"port_pair": sfi_dict})
2984
2985 return new_sfi["port_pair"]["id"]
2986 except (
2987 neExceptions.ConnectionFailed,
2988 ksExceptions.ClientException,
2989 neExceptions.NeutronException,
2990 ConnectionError,
2991 ) as e:
2992 if new_sfi:
2993 try:
2994 self.neutron.delete_sfc_port_pair(new_sfi["port_pair"]["id"])
2995 except Exception:
2996 self.logger.error(
2997 "Creation of Service Function Instance failed, with "
2998 "subsequent deletion failure as well."
2999 )
3000
3001 self._format_exception(e)
3002
3003 def get_sfi(self, sfi_id):
3004 self.logger.debug("Getting Service Function Instance %s from VIM", sfi_id)
3005 filter_dict = {"id": sfi_id}
3006 sfi_list = self.get_sfi_list(filter_dict)
3007
3008 if len(sfi_list) == 0:
3009 raise vimconn.VimConnNotFoundException(
3010 "Service Function Instance '{}' not found".format(sfi_id)
3011 )
3012 elif len(sfi_list) > 1:
3013 raise vimconn.VimConnConflictException(
3014 "Found more than one Service Function Instance with this criteria"
3015 )
3016
3017 sfi = sfi_list[0]
3018
3019 return sfi
3020
3021 def get_sfi_list(self, filter_dict={}):
3022 self.logger.debug(
3023 "Getting Service Function Instances from VIM filter: '%s'", str(filter_dict)
3024 )
3025
3026 try:
3027 self._reload_connection()
3028 filter_dict_os = filter_dict.copy()
3029
3030 if self.api_version3 and "tenant_id" in filter_dict_os:
3031 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3032
3033 sfi_dict = self.neutron.list_sfc_port_pairs(**filter_dict_os)
3034 sfi_list = sfi_dict["port_pairs"]
3035 self.__sfi_os2mano(sfi_list)
3036
3037 return sfi_list
3038 except (
3039 neExceptions.ConnectionFailed,
3040 ksExceptions.ClientException,
3041 neExceptions.NeutronException,
3042 ConnectionError,
3043 ) as e:
3044 self._format_exception(e)
3045
3046 def delete_sfi(self, sfi_id):
3047 self.logger.debug("Deleting Service Function Instance '%s' from VIM", sfi_id)
3048
3049 try:
3050 self._reload_connection()
3051 self.neutron.delete_sfc_port_pair(sfi_id)
3052
3053 return sfi_id
3054 except (
3055 neExceptions.ConnectionFailed,
3056 neExceptions.NeutronException,
3057 ksExceptions.ClientException,
3058 neExceptions.NeutronException,
3059 ConnectionError,
3060 ) as e:
3061 self._format_exception(e)
3062
3063 def new_sf(self, name, sfis, sfc_encap=True):
3064 self.logger.debug("Adding a new Service Function to VIM, named '%s'", name)
3065
3066 try:
3067 new_sf = None
3068 self._reload_connection()
3069 # correlation = None
3070 # if sfc_encap:
3071 # correlation = "nsh"
3072
3073 for instance in sfis:
3074 sfi = self.get_sfi(instance)
3075
3076 if sfi.get("sfc_encap") != sfc_encap:
3077 raise vimconn.VimConnNotSupportedException(
3078 "OpenStack VIM connector requires all SFIs of the "
3079 "same SF to share the same SFC Encapsulation"
3080 )
3081
3082 sf_dict = {"name": name, "port_pairs": sfis}
3083 new_sf = self.neutron.create_sfc_port_pair_group(
3084 {"port_pair_group": sf_dict}
3085 )
3086
3087 return new_sf["port_pair_group"]["id"]
3088 except (
3089 neExceptions.ConnectionFailed,
3090 ksExceptions.ClientException,
3091 neExceptions.NeutronException,
3092 ConnectionError,
3093 ) as e:
3094 if new_sf:
3095 try:
3096 self.neutron.delete_sfc_port_pair_group(
3097 new_sf["port_pair_group"]["id"]
3098 )
3099 except Exception:
3100 self.logger.error(
3101 "Creation of Service Function failed, with "
3102 "subsequent deletion failure as well."
3103 )
3104
3105 self._format_exception(e)
3106
3107 def get_sf(self, sf_id):
3108 self.logger.debug("Getting Service Function %s from VIM", sf_id)
3109 filter_dict = {"id": sf_id}
3110 sf_list = self.get_sf_list(filter_dict)
3111
3112 if len(sf_list) == 0:
3113 raise vimconn.VimConnNotFoundException(
3114 "Service Function '{}' not found".format(sf_id)
3115 )
3116 elif len(sf_list) > 1:
3117 raise vimconn.VimConnConflictException(
3118 "Found more than one Service Function with this criteria"
3119 )
3120
3121 sf = sf_list[0]
3122
3123 return sf
3124
3125 def get_sf_list(self, filter_dict={}):
3126 self.logger.debug(
3127 "Getting Service Function from VIM filter: '%s'", str(filter_dict)
3128 )
3129
3130 try:
3131 self._reload_connection()
3132 filter_dict_os = filter_dict.copy()
3133
3134 if self.api_version3 and "tenant_id" in filter_dict_os:
3135 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3136
3137 sf_dict = self.neutron.list_sfc_port_pair_groups(**filter_dict_os)
3138 sf_list = sf_dict["port_pair_groups"]
3139 self.__sf_os2mano(sf_list)
3140
3141 return sf_list
3142 except (
3143 neExceptions.ConnectionFailed,
3144 ksExceptions.ClientException,
3145 neExceptions.NeutronException,
3146 ConnectionError,
3147 ) as e:
3148 self._format_exception(e)
3149
3150 def delete_sf(self, sf_id):
3151 self.logger.debug("Deleting Service Function '%s' from VIM", sf_id)
3152
3153 try:
3154 self._reload_connection()
3155 self.neutron.delete_sfc_port_pair_group(sf_id)
3156
3157 return sf_id
3158 except (
3159 neExceptions.ConnectionFailed,
3160 neExceptions.NeutronException,
3161 ksExceptions.ClientException,
3162 neExceptions.NeutronException,
3163 ConnectionError,
3164 ) as e:
3165 self._format_exception(e)
3166
3167 def new_sfp(self, name, classifications, sfs, sfc_encap=True, spi=None):
3168 self.logger.debug("Adding a new Service Function Path to VIM, named '%s'", name)
3169
3170 try:
3171 new_sfp = None
3172 self._reload_connection()
3173 # In networking-sfc the MPLS encapsulation is legacy
3174 # should be used when no full SFC Encapsulation is intended
3175 correlation = "mpls"
3176
3177 if sfc_encap:
3178 correlation = "nsh"
3179
3180 sfp_dict = {
3181 "name": name,
3182 "flow_classifiers": classifications,
3183 "port_pair_groups": sfs,
3184 "chain_parameters": {"correlation": correlation},
3185 }
3186
3187 if spi:
3188 sfp_dict["chain_id"] = spi
3189
3190 new_sfp = self.neutron.create_sfc_port_chain({"port_chain": sfp_dict})
3191
3192 return new_sfp["port_chain"]["id"]
3193 except (
3194 neExceptions.ConnectionFailed,
3195 ksExceptions.ClientException,
3196 neExceptions.NeutronException,
3197 ConnectionError,
3198 ) as e:
3199 if new_sfp:
3200 try:
3201 self.neutron.delete_sfc_port_chain(new_sfp["port_chain"]["id"])
3202 except Exception:
3203 self.logger.error(
3204 "Creation of Service Function Path failed, with "
3205 "subsequent deletion failure as well."
3206 )
3207
3208 self._format_exception(e)
3209
3210 def get_sfp(self, sfp_id):
3211 self.logger.debug(" Getting Service Function Path %s from VIM", sfp_id)
3212
3213 filter_dict = {"id": sfp_id}
3214 sfp_list = self.get_sfp_list(filter_dict)
3215
3216 if len(sfp_list) == 0:
3217 raise vimconn.VimConnNotFoundException(
3218 "Service Function Path '{}' not found".format(sfp_id)
3219 )
3220 elif len(sfp_list) > 1:
3221 raise vimconn.VimConnConflictException(
3222 "Found more than one Service Function Path with this criteria"
3223 )
3224
3225 sfp = sfp_list[0]
3226
3227 return sfp
3228
3229 def get_sfp_list(self, filter_dict={}):
3230 self.logger.debug(
3231 "Getting Service Function Paths from VIM filter: '%s'", str(filter_dict)
3232 )
3233
3234 try:
3235 self._reload_connection()
3236 filter_dict_os = filter_dict.copy()
3237
3238 if self.api_version3 and "tenant_id" in filter_dict_os:
3239 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3240
3241 sfp_dict = self.neutron.list_sfc_port_chains(**filter_dict_os)
3242 sfp_list = sfp_dict["port_chains"]
3243 self.__sfp_os2mano(sfp_list)
3244
3245 return sfp_list
3246 except (
3247 neExceptions.ConnectionFailed,
3248 ksExceptions.ClientException,
3249 neExceptions.NeutronException,
3250 ConnectionError,
3251 ) as e:
3252 self._format_exception(e)
3253
3254 def delete_sfp(self, sfp_id):
3255 self.logger.debug("Deleting Service Function Path '%s' from VIM", sfp_id)
3256
3257 try:
3258 self._reload_connection()
3259 self.neutron.delete_sfc_port_chain(sfp_id)
3260
3261 return sfp_id
3262 except (
3263 neExceptions.ConnectionFailed,
3264 neExceptions.NeutronException,
3265 ksExceptions.ClientException,
3266 neExceptions.NeutronException,
3267 ConnectionError,
3268 ) as e:
3269 self._format_exception(e)
3270
3271 def refresh_sfps_status(self, sfp_list):
3272 """Get the status of the service function path
3273 Params: the list of sfp identifiers
3274 Returns a dictionary with:
3275 vm_id: #VIM id of this service function path
3276 status: #Mandatory. Text with one of:
3277 # DELETED (not found at vim)
3278 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3279 # OTHER (Vim reported other status not understood)
3280 # ERROR (VIM indicates an ERROR status)
3281 # ACTIVE,
3282 # CREATING (on building process)
3283 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3284 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)F
3285 """
3286 sfp_dict = {}
3287 self.logger.debug(
3288 "refresh_sfps status: Getting tenant SFP information from VIM"
3289 )
3290
3291 for sfp_id in sfp_list:
3292 sfp = {}
3293
3294 try:
3295 sfp_vim = self.get_sfp(sfp_id)
3296
3297 if sfp_vim["spi"]:
3298 sfp["status"] = vmStatus2manoFormat["ACTIVE"]
3299 else:
3300 sfp["status"] = "OTHER"
3301 sfp["error_msg"] = "VIM status reported " + sfp["status"]
3302
3303 sfp["vim_info"] = self.serialize(sfp_vim)
3304
3305 if sfp_vim.get("fault"):
3306 sfp["error_msg"] = str(sfp_vim["fault"])
3307 except vimconn.VimConnNotFoundException as e:
3308 self.logger.error("Exception getting sfp status: %s", str(e))
3309 sfp["status"] = "DELETED"
3310 sfp["error_msg"] = str(e)
3311 except vimconn.VimConnException as e:
3312 self.logger.error("Exception getting sfp status: %s", str(e))
3313 sfp["status"] = "VIM_ERROR"
3314 sfp["error_msg"] = str(e)
3315
3316 sfp_dict[sfp_id] = sfp
3317
3318 return sfp_dict
3319
3320 def refresh_sfis_status(self, sfi_list):
3321 """Get the status of the service function instances
3322 Params: the list of sfi identifiers
3323 Returns a dictionary with:
3324 vm_id: #VIM id of this service function instance
3325 status: #Mandatory. Text with one of:
3326 # DELETED (not found at vim)
3327 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3328 # OTHER (Vim reported other status not understood)
3329 # ERROR (VIM indicates an ERROR status)
3330 # ACTIVE,
3331 # CREATING (on building process)
3332 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3333 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
3334 """
3335 sfi_dict = {}
3336 self.logger.debug(
3337 "refresh_sfis status: Getting tenant sfi information from VIM"
3338 )
3339
3340 for sfi_id in sfi_list:
3341 sfi = {}
3342
3343 try:
3344 sfi_vim = self.get_sfi(sfi_id)
3345
3346 if sfi_vim:
3347 sfi["status"] = vmStatus2manoFormat["ACTIVE"]
3348 else:
3349 sfi["status"] = "OTHER"
3350 sfi["error_msg"] = "VIM status reported " + sfi["status"]
3351
3352 sfi["vim_info"] = self.serialize(sfi_vim)
3353
3354 if sfi_vim.get("fault"):
3355 sfi["error_msg"] = str(sfi_vim["fault"])
3356 except vimconn.VimConnNotFoundException as e:
3357 self.logger.error("Exception getting sfi status: %s", str(e))
3358 sfi["status"] = "DELETED"
3359 sfi["error_msg"] = str(e)
3360 except vimconn.VimConnException as e:
3361 self.logger.error("Exception getting sfi status: %s", str(e))
3362 sfi["status"] = "VIM_ERROR"
3363 sfi["error_msg"] = str(e)
3364
3365 sfi_dict[sfi_id] = sfi
3366
3367 return sfi_dict
3368
3369 def refresh_sfs_status(self, sf_list):
3370 """Get the status of the service functions
3371 Params: the list of sf identifiers
3372 Returns a dictionary with:
3373 vm_id: #VIM id of this service function
3374 status: #Mandatory. Text with one of:
3375 # DELETED (not found at vim)
3376 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3377 # OTHER (Vim reported other status not understood)
3378 # ERROR (VIM indicates an ERROR status)
3379 # ACTIVE,
3380 # CREATING (on building process)
3381 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3382 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
3383 """
3384 sf_dict = {}
3385 self.logger.debug("refresh_sfs status: Getting tenant sf information from VIM")
3386
3387 for sf_id in sf_list:
3388 sf = {}
3389
3390 try:
3391 sf_vim = self.get_sf(sf_id)
3392
3393 if sf_vim:
3394 sf["status"] = vmStatus2manoFormat["ACTIVE"]
3395 else:
3396 sf["status"] = "OTHER"
3397 sf["error_msg"] = "VIM status reported " + sf_vim["status"]
3398
3399 sf["vim_info"] = self.serialize(sf_vim)
3400
3401 if sf_vim.get("fault"):
3402 sf["error_msg"] = str(sf_vim["fault"])
3403 except vimconn.VimConnNotFoundException as e:
3404 self.logger.error("Exception getting sf status: %s", str(e))
3405 sf["status"] = "DELETED"
3406 sf["error_msg"] = str(e)
3407 except vimconn.VimConnException as e:
3408 self.logger.error("Exception getting sf status: %s", str(e))
3409 sf["status"] = "VIM_ERROR"
3410 sf["error_msg"] = str(e)
3411
3412 sf_dict[sf_id] = sf
3413
3414 return sf_dict
3415
3416 def refresh_classifications_status(self, classification_list):
3417 """Get the status of the classifications
3418 Params: the list of classification identifiers
3419 Returns a dictionary with:
3420 vm_id: #VIM id of this classifier
3421 status: #Mandatory. Text with one of:
3422 # DELETED (not found at vim)
3423 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3424 # OTHER (Vim reported other status not understood)
3425 # ERROR (VIM indicates an ERROR status)
3426 # ACTIVE,
3427 # CREATING (on building process)
3428 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3429 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
3430 """
3431 classification_dict = {}
3432 self.logger.debug(
3433 "refresh_classifications status: Getting tenant classification information from VIM"
3434 )
3435
3436 for classification_id in classification_list:
3437 classification = {}
3438
3439 try:
3440 classification_vim = self.get_classification(classification_id)
3441
3442 if classification_vim:
3443 classification["status"] = vmStatus2manoFormat["ACTIVE"]
3444 else:
3445 classification["status"] = "OTHER"
3446 classification["error_msg"] = (
3447 "VIM status reported " + classification["status"]
3448 )
3449
3450 classification["vim_info"] = self.serialize(classification_vim)
3451
3452 if classification_vim.get("fault"):
3453 classification["error_msg"] = str(classification_vim["fault"])
3454 except vimconn.VimConnNotFoundException as e:
3455 self.logger.error("Exception getting classification status: %s", str(e))
3456 classification["status"] = "DELETED"
3457 classification["error_msg"] = str(e)
3458 except vimconn.VimConnException as e:
3459 self.logger.error("Exception getting classification status: %s", str(e))
3460 classification["status"] = "VIM_ERROR"
3461 classification["error_msg"] = str(e)
3462
3463 classification_dict[classification_id] = classification
3464
3465 return classification_dict
3466
3467 def new_affinity_group(self, affinity_group_data):
3468 """Adds a server group to VIM
3469 affinity_group_data contains a dictionary with information, keys:
3470 name: name in VIM for the server group
3471 type: affinity or anti-affinity
3472 scope: Only nfvi-node allowed
3473 Returns the server group identifier"""
3474 self.logger.debug("Adding Server Group '%s'", str(affinity_group_data))
3475
3476 try:
3477 name = affinity_group_data["name"]
3478 policy = affinity_group_data["type"]
3479
3480 self._reload_connection()
3481 new_server_group = self.nova.server_groups.create(name, policy)
3482
3483 return new_server_group.id
3484 except (
3485 ksExceptions.ClientException,
3486 nvExceptions.ClientException,
3487 ConnectionError,
3488 KeyError,
3489 ) as e:
3490 self._format_exception(e)
3491
3492 def get_affinity_group(self, affinity_group_id):
3493 """Obtain server group details from the VIM. Returns the server group detais as a dict"""
3494 self.logger.debug("Getting flavor '%s'", affinity_group_id)
3495 try:
3496 self._reload_connection()
3497 server_group = self.nova.server_groups.find(id=affinity_group_id)
3498
3499 return server_group.to_dict()
3500 except (
3501 nvExceptions.NotFound,
3502 nvExceptions.ClientException,
3503 ksExceptions.ClientException,
3504 ConnectionError,
3505 ) as e:
3506 self._format_exception(e)
3507
3508 def delete_affinity_group(self, affinity_group_id):
3509 """Deletes a server group from the VIM. Returns the old affinity_group_id"""
3510 self.logger.debug("Getting server group '%s'", affinity_group_id)
3511 try:
3512 self._reload_connection()
3513 self.nova.server_groups.delete(affinity_group_id)
3514
3515 return affinity_group_id
3516 except (
3517 nvExceptions.NotFound,
3518 ksExceptions.ClientException,
3519 nvExceptions.ClientException,
3520 ConnectionError,
3521 ) as e:
3522 self._format_exception(e)