Bug 2029 mempage-size is ignored
[osm/RO.git] / RO-VIM-openstack / osm_rovim_openstack / vimconn_openstack.py
1 # -*- coding: utf-8 -*-
2
3 ##
4 # Copyright 2015 Telefonica Investigacion y Desarrollo, S.A.U.
5 # This file is part of openmano
6 # All Rights Reserved.
7 #
8 # Licensed under the Apache License, Version 2.0 (the "License"); you may
9 # not use this file except in compliance with the License. You may obtain
10 # a copy of the License at
11 #
12 # http://www.apache.org/licenses/LICENSE-2.0
13 #
14 # Unless required by applicable law or agreed to in writing, software
15 # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
17 # License for the specific language governing permissions and limitations
18 # under the License.
19 ##
20
21 """
22 osconnector implements all the methods to interact with openstack using the python-neutronclient.
23
24 For the VNF forwarding graph, The OpenStack VIM connector calls the
25 networking-sfc Neutron extension methods, whose resources are mapped
26 to the VIM connector's SFC resources as follows:
27 - Classification (OSM) -> Flow Classifier (Neutron)
28 - Service Function Instance (OSM) -> Port Pair (Neutron)
29 - Service Function (OSM) -> Port Pair Group (Neutron)
30 - Service Function Path (OSM) -> Port Chain (Neutron)
31 """
32
33 import copy
34 from http.client import HTTPException
35 import logging
36 from pprint import pformat
37 import random
38 import re
39 import time
40
41 from cinderclient import client as cClient
42 from glanceclient import client as glClient
43 import glanceclient.exc as gl1Exceptions
44 from keystoneauth1 import session
45 from keystoneauth1.identity import v2, v3
46 import keystoneclient.exceptions as ksExceptions
47 import keystoneclient.v2_0.client as ksClient_v2
48 import keystoneclient.v3.client as ksClient_v3
49 import netaddr
50 from neutronclient.common import exceptions as neExceptions
51 from neutronclient.neutron import client as neClient
52 from novaclient import client as nClient, exceptions as nvExceptions
53 from osm_ro_plugin import vimconn
54 from requests.exceptions import ConnectionError
55 import yaml
56
57 __author__ = "Alfonso Tierno, Gerardo Garcia, Pablo Montes, xFlow Research, Igor D.C., Eduardo Sousa"
58 __date__ = "$22-sep-2017 23:59:59$"
59
60 """contain the openstack virtual machine status to openmano status"""
61 vmStatus2manoFormat = {
62 "ACTIVE": "ACTIVE",
63 "PAUSED": "PAUSED",
64 "SUSPENDED": "SUSPENDED",
65 "SHUTOFF": "INACTIVE",
66 "BUILD": "BUILD",
67 "ERROR": "ERROR",
68 "DELETED": "DELETED",
69 }
70 netStatus2manoFormat = {
71 "ACTIVE": "ACTIVE",
72 "PAUSED": "PAUSED",
73 "INACTIVE": "INACTIVE",
74 "BUILD": "BUILD",
75 "ERROR": "ERROR",
76 "DELETED": "DELETED",
77 }
78
79 supportedClassificationTypes = ["legacy_flow_classifier"]
80
81 # global var to have a timeout creating and deleting volumes
82 volume_timeout = 1800
83 server_timeout = 1800
84
85
86 class SafeDumper(yaml.SafeDumper):
87 def represent_data(self, data):
88 # Openstack APIs use custom subclasses of dict and YAML safe dumper
89 # is designed to not handle that (reference issue 142 of pyyaml)
90 if isinstance(data, dict) and data.__class__ != dict:
91 # A simple solution is to convert those items back to dicts
92 data = dict(data.items())
93
94 return super(SafeDumper, self).represent_data(data)
95
96
97 class vimconnector(vimconn.VimConnector):
98 def __init__(
99 self,
100 uuid,
101 name,
102 tenant_id,
103 tenant_name,
104 url,
105 url_admin=None,
106 user=None,
107 passwd=None,
108 log_level=None,
109 config={},
110 persistent_info={},
111 ):
112 """using common constructor parameters. In this case
113 'url' is the keystone authorization url,
114 'url_admin' is not use
115 """
116 api_version = config.get("APIversion")
117
118 if api_version and api_version not in ("v3.3", "v2.0", "2", "3"):
119 raise vimconn.VimConnException(
120 "Invalid value '{}' for config:APIversion. "
121 "Allowed values are 'v3.3', 'v2.0', '2' or '3'".format(api_version)
122 )
123
124 vim_type = config.get("vim_type")
125
126 if vim_type and vim_type not in ("vio", "VIO"):
127 raise vimconn.VimConnException(
128 "Invalid value '{}' for config:vim_type."
129 "Allowed values are 'vio' or 'VIO'".format(vim_type)
130 )
131
132 if config.get("dataplane_net_vlan_range") is not None:
133 # validate vlan ranges provided by user
134 self._validate_vlan_ranges(
135 config.get("dataplane_net_vlan_range"), "dataplane_net_vlan_range"
136 )
137
138 if config.get("multisegment_vlan_range") is not None:
139 # validate vlan ranges provided by user
140 self._validate_vlan_ranges(
141 config.get("multisegment_vlan_range"), "multisegment_vlan_range"
142 )
143
144 vimconn.VimConnector.__init__(
145 self,
146 uuid,
147 name,
148 tenant_id,
149 tenant_name,
150 url,
151 url_admin,
152 user,
153 passwd,
154 log_level,
155 config,
156 )
157
158 if self.config.get("insecure") and self.config.get("ca_cert"):
159 raise vimconn.VimConnException(
160 "options insecure and ca_cert are mutually exclusive"
161 )
162
163 self.verify = True
164
165 if self.config.get("insecure"):
166 self.verify = False
167
168 if self.config.get("ca_cert"):
169 self.verify = self.config.get("ca_cert")
170
171 if not url:
172 raise TypeError("url param can not be NoneType")
173
174 self.persistent_info = persistent_info
175 self.availability_zone = persistent_info.get("availability_zone", None)
176 self.session = persistent_info.get("session", {"reload_client": True})
177 self.my_tenant_id = self.session.get("my_tenant_id")
178 self.nova = self.session.get("nova")
179 self.neutron = self.session.get("neutron")
180 self.cinder = self.session.get("cinder")
181 self.glance = self.session.get("glance")
182 # self.glancev1 = self.session.get("glancev1")
183 self.keystone = self.session.get("keystone")
184 self.api_version3 = self.session.get("api_version3")
185 self.vim_type = self.config.get("vim_type")
186
187 if self.vim_type:
188 self.vim_type = self.vim_type.upper()
189
190 if self.config.get("use_internal_endpoint"):
191 self.endpoint_type = "internalURL"
192 else:
193 self.endpoint_type = None
194
195 logging.getLogger("urllib3").setLevel(logging.WARNING)
196 logging.getLogger("keystoneauth").setLevel(logging.WARNING)
197 logging.getLogger("novaclient").setLevel(logging.WARNING)
198 self.logger = logging.getLogger("ro.vim.openstack")
199
200 # allow security_groups to be a list or a single string
201 if isinstance(self.config.get("security_groups"), str):
202 self.config["security_groups"] = [self.config["security_groups"]]
203
204 self.security_groups_id = None
205
206 # ###### VIO Specific Changes #########
207 if self.vim_type == "VIO":
208 self.logger = logging.getLogger("ro.vim.vio")
209
210 if log_level:
211 self.logger.setLevel(getattr(logging, log_level))
212
213 def __getitem__(self, index):
214 """Get individuals parameters.
215 Throw KeyError"""
216 if index == "project_domain_id":
217 return self.config.get("project_domain_id")
218 elif index == "user_domain_id":
219 return self.config.get("user_domain_id")
220 else:
221 return vimconn.VimConnector.__getitem__(self, index)
222
223 def __setitem__(self, index, value):
224 """Set individuals parameters and it is marked as dirty so to force connection reload.
225 Throw KeyError"""
226 if index == "project_domain_id":
227 self.config["project_domain_id"] = value
228 elif index == "user_domain_id":
229 self.config["user_domain_id"] = value
230 else:
231 vimconn.VimConnector.__setitem__(self, index, value)
232
233 self.session["reload_client"] = True
234
235 def serialize(self, value):
236 """Serialization of python basic types.
237
238 In the case value is not serializable a message will be logged and a
239 simple representation of the data that cannot be converted back to
240 python is returned.
241 """
242 if isinstance(value, str):
243 return value
244
245 try:
246 return yaml.dump(
247 value, Dumper=SafeDumper, default_flow_style=True, width=256
248 )
249 except yaml.representer.RepresenterError:
250 self.logger.debug(
251 "The following entity cannot be serialized in YAML:\n\n%s\n\n",
252 pformat(value),
253 exc_info=True,
254 )
255
256 return str(value)
257
258 def _reload_connection(self):
259 """Called before any operation, it check if credentials has changed
260 Throw keystoneclient.apiclient.exceptions.AuthorizationFailure
261 """
262 # TODO control the timing and possible token timeout, but it seams that python client does this task for us :-)
263 if self.session["reload_client"]:
264 if self.config.get("APIversion"):
265 self.api_version3 = (
266 self.config["APIversion"] == "v3.3"
267 or self.config["APIversion"] == "3"
268 )
269 else: # get from ending auth_url that end with v3 or with v2.0
270 self.api_version3 = self.url.endswith("/v3") or self.url.endswith(
271 "/v3/"
272 )
273
274 self.session["api_version3"] = self.api_version3
275
276 if self.api_version3:
277 if self.config.get("project_domain_id") or self.config.get(
278 "project_domain_name"
279 ):
280 project_domain_id_default = None
281 else:
282 project_domain_id_default = "default"
283
284 if self.config.get("user_domain_id") or self.config.get(
285 "user_domain_name"
286 ):
287 user_domain_id_default = None
288 else:
289 user_domain_id_default = "default"
290 auth = v3.Password(
291 auth_url=self.url,
292 username=self.user,
293 password=self.passwd,
294 project_name=self.tenant_name,
295 project_id=self.tenant_id,
296 project_domain_id=self.config.get(
297 "project_domain_id", project_domain_id_default
298 ),
299 user_domain_id=self.config.get(
300 "user_domain_id", user_domain_id_default
301 ),
302 project_domain_name=self.config.get("project_domain_name"),
303 user_domain_name=self.config.get("user_domain_name"),
304 )
305 else:
306 auth = v2.Password(
307 auth_url=self.url,
308 username=self.user,
309 password=self.passwd,
310 tenant_name=self.tenant_name,
311 tenant_id=self.tenant_id,
312 )
313
314 sess = session.Session(auth=auth, verify=self.verify)
315 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
316 # Titanium cloud and StarlingX
317 region_name = self.config.get("region_name")
318
319 if self.api_version3:
320 self.keystone = ksClient_v3.Client(
321 session=sess,
322 endpoint_type=self.endpoint_type,
323 region_name=region_name,
324 )
325 else:
326 self.keystone = ksClient_v2.Client(
327 session=sess, endpoint_type=self.endpoint_type
328 )
329
330 self.session["keystone"] = self.keystone
331 # In order to enable microversion functionality an explicit microversion must be specified in "config".
332 # This implementation approach is due to the warning message in
333 # https://developer.openstack.org/api-guide/compute/microversions.html
334 # where it is stated that microversion backwards compatibility is not guaranteed and clients should
335 # always require an specific microversion.
336 # To be able to use "device role tagging" functionality define "microversion: 2.32" in datacenter config
337 version = self.config.get("microversion")
338
339 if not version:
340 version = "2.1"
341
342 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River
343 # Titanium cloud and StarlingX
344 self.nova = self.session["nova"] = nClient.Client(
345 str(version),
346 session=sess,
347 endpoint_type=self.endpoint_type,
348 region_name=region_name,
349 )
350 self.neutron = self.session["neutron"] = neClient.Client(
351 "2.0",
352 session=sess,
353 endpoint_type=self.endpoint_type,
354 region_name=region_name,
355 )
356 self.cinder = self.session["cinder"] = cClient.Client(
357 2,
358 session=sess,
359 endpoint_type=self.endpoint_type,
360 region_name=region_name,
361 )
362
363 try:
364 self.my_tenant_id = self.session["my_tenant_id"] = sess.get_project_id()
365 except Exception:
366 self.logger.error("Cannot get project_id from session", exc_info=True)
367
368 if self.endpoint_type == "internalURL":
369 glance_service_id = self.keystone.services.list(name="glance")[0].id
370 glance_endpoint = self.keystone.endpoints.list(
371 glance_service_id, interface="internal"
372 )[0].url
373 else:
374 glance_endpoint = None
375
376 self.glance = self.session["glance"] = glClient.Client(
377 2, session=sess, endpoint=glance_endpoint
378 )
379 # using version 1 of glance client in new_image()
380 # self.glancev1 = self.session["glancev1"] = glClient.Client("1", session=sess,
381 # endpoint=glance_endpoint)
382 self.session["reload_client"] = False
383 self.persistent_info["session"] = self.session
384 # add availablity zone info inside self.persistent_info
385 self._set_availablity_zones()
386 self.persistent_info["availability_zone"] = self.availability_zone
387 # force to get again security_groups_ids next time they are needed
388 self.security_groups_id = None
389
390 def __net_os2mano(self, net_list_dict):
391 """Transform the net openstack format to mano format
392 net_list_dict can be a list of dict or a single dict"""
393 if type(net_list_dict) is dict:
394 net_list_ = (net_list_dict,)
395 elif type(net_list_dict) is list:
396 net_list_ = net_list_dict
397 else:
398 raise TypeError("param net_list_dict must be a list or a dictionary")
399 for net in net_list_:
400 if net.get("provider:network_type") == "vlan":
401 net["type"] = "data"
402 else:
403 net["type"] = "bridge"
404
405 def __classification_os2mano(self, class_list_dict):
406 """Transform the openstack format (Flow Classifier) to mano format
407 (Classification) class_list_dict can be a list of dict or a single dict
408 """
409 if isinstance(class_list_dict, dict):
410 class_list_ = [class_list_dict]
411 elif isinstance(class_list_dict, list):
412 class_list_ = class_list_dict
413 else:
414 raise TypeError("param class_list_dict must be a list or a dictionary")
415 for classification in class_list_:
416 id = classification.pop("id")
417 name = classification.pop("name")
418 description = classification.pop("description")
419 project_id = classification.pop("project_id")
420 tenant_id = classification.pop("tenant_id")
421 original_classification = copy.deepcopy(classification)
422 classification.clear()
423 classification["ctype"] = "legacy_flow_classifier"
424 classification["definition"] = original_classification
425 classification["id"] = id
426 classification["name"] = name
427 classification["description"] = description
428 classification["project_id"] = project_id
429 classification["tenant_id"] = tenant_id
430
431 def __sfi_os2mano(self, sfi_list_dict):
432 """Transform the openstack format (Port Pair) to mano format (SFI)
433 sfi_list_dict can be a list of dict or a single dict
434 """
435 if isinstance(sfi_list_dict, dict):
436 sfi_list_ = [sfi_list_dict]
437 elif isinstance(sfi_list_dict, list):
438 sfi_list_ = sfi_list_dict
439 else:
440 raise TypeError("param sfi_list_dict must be a list or a dictionary")
441
442 for sfi in sfi_list_:
443 sfi["ingress_ports"] = []
444 sfi["egress_ports"] = []
445
446 if sfi.get("ingress"):
447 sfi["ingress_ports"].append(sfi["ingress"])
448
449 if sfi.get("egress"):
450 sfi["egress_ports"].append(sfi["egress"])
451
452 del sfi["ingress"]
453 del sfi["egress"]
454 params = sfi.get("service_function_parameters")
455 sfc_encap = False
456
457 if params:
458 correlation = params.get("correlation")
459
460 if correlation:
461 sfc_encap = True
462
463 sfi["sfc_encap"] = sfc_encap
464 del sfi["service_function_parameters"]
465
466 def __sf_os2mano(self, sf_list_dict):
467 """Transform the openstack format (Port Pair Group) to mano format (SF)
468 sf_list_dict can be a list of dict or a single dict
469 """
470 if isinstance(sf_list_dict, dict):
471 sf_list_ = [sf_list_dict]
472 elif isinstance(sf_list_dict, list):
473 sf_list_ = sf_list_dict
474 else:
475 raise TypeError("param sf_list_dict must be a list or a dictionary")
476
477 for sf in sf_list_:
478 del sf["port_pair_group_parameters"]
479 sf["sfis"] = sf["port_pairs"]
480 del sf["port_pairs"]
481
482 def __sfp_os2mano(self, sfp_list_dict):
483 """Transform the openstack format (Port Chain) to mano format (SFP)
484 sfp_list_dict can be a list of dict or a single dict
485 """
486 if isinstance(sfp_list_dict, dict):
487 sfp_list_ = [sfp_list_dict]
488 elif isinstance(sfp_list_dict, list):
489 sfp_list_ = sfp_list_dict
490 else:
491 raise TypeError("param sfp_list_dict must be a list or a dictionary")
492
493 for sfp in sfp_list_:
494 params = sfp.pop("chain_parameters")
495 sfc_encap = False
496
497 if params:
498 correlation = params.get("correlation")
499
500 if correlation:
501 sfc_encap = True
502
503 sfp["sfc_encap"] = sfc_encap
504 sfp["spi"] = sfp.pop("chain_id")
505 sfp["classifications"] = sfp.pop("flow_classifiers")
506 sfp["service_functions"] = sfp.pop("port_pair_groups")
507
508 # placeholder for now; read TODO note below
509 def _validate_classification(self, type, definition):
510 # only legacy_flow_classifier Type is supported at this point
511 return True
512 # TODO(igordcard): this method should be an abstract method of an
513 # abstract Classification class to be implemented by the specific
514 # Types. Also, abstract vimconnector should call the validation
515 # method before the implemented VIM connectors are called.
516
517 def _format_exception(self, exception):
518 """Transform a keystone, nova, neutron exception into a vimconn exception discovering the cause"""
519 message_error = str(exception)
520 tip = ""
521
522 if isinstance(
523 exception,
524 (
525 neExceptions.NetworkNotFoundClient,
526 nvExceptions.NotFound,
527 ksExceptions.NotFound,
528 gl1Exceptions.HTTPNotFound,
529 ),
530 ):
531 raise vimconn.VimConnNotFoundException(
532 type(exception).__name__ + ": " + message_error
533 )
534 elif isinstance(
535 exception,
536 (
537 HTTPException,
538 gl1Exceptions.HTTPException,
539 gl1Exceptions.CommunicationError,
540 ConnectionError,
541 ksExceptions.ConnectionError,
542 neExceptions.ConnectionFailed,
543 ),
544 ):
545 if type(exception).__name__ == "SSLError":
546 tip = " (maybe option 'insecure' must be added to the VIM)"
547
548 raise vimconn.VimConnConnectionException(
549 "Invalid URL or credentials{}: {}".format(tip, message_error)
550 )
551 elif isinstance(
552 exception,
553 (
554 KeyError,
555 nvExceptions.BadRequest,
556 ksExceptions.BadRequest,
557 ),
558 ):
559 raise vimconn.VimConnException(
560 type(exception).__name__ + ": " + message_error
561 )
562 elif isinstance(
563 exception,
564 (
565 nvExceptions.ClientException,
566 ksExceptions.ClientException,
567 neExceptions.NeutronException,
568 ),
569 ):
570 raise vimconn.VimConnUnexpectedResponse(
571 type(exception).__name__ + ": " + message_error
572 )
573 elif isinstance(exception, nvExceptions.Conflict):
574 raise vimconn.VimConnConflictException(
575 type(exception).__name__ + ": " + message_error
576 )
577 elif isinstance(exception, vimconn.VimConnException):
578 raise exception
579 else: # ()
580 self.logger.error("General Exception " + message_error, exc_info=True)
581
582 raise vimconn.VimConnConnectionException(
583 type(exception).__name__ + ": " + message_error
584 )
585
586 def _get_ids_from_name(self):
587 """
588 Obtain ids from name of tenant and security_groups. Store at self .security_groups_id"
589 :return: None
590 """
591 # get tenant_id if only tenant_name is supplied
592 self._reload_connection()
593
594 if not self.my_tenant_id:
595 raise vimconn.VimConnConnectionException(
596 "Error getting tenant information from name={} id={}".format(
597 self.tenant_name, self.tenant_id
598 )
599 )
600
601 if self.config.get("security_groups") and not self.security_groups_id:
602 # convert from name to id
603 neutron_sg_list = self.neutron.list_security_groups(
604 tenant_id=self.my_tenant_id
605 )["security_groups"]
606
607 self.security_groups_id = []
608 for sg in self.config.get("security_groups"):
609 for neutron_sg in neutron_sg_list:
610 if sg in (neutron_sg["id"], neutron_sg["name"]):
611 self.security_groups_id.append(neutron_sg["id"])
612 break
613 else:
614 self.security_groups_id = None
615
616 raise vimconn.VimConnConnectionException(
617 "Not found security group {} for this tenant".format(sg)
618 )
619
620 def check_vim_connectivity(self):
621 # just get network list to check connectivity and credentials
622 self.get_network_list(filter_dict={})
623
624 def get_tenant_list(self, filter_dict={}):
625 """Obtain tenants of VIM
626 filter_dict can contain the following keys:
627 name: filter by tenant name
628 id: filter by tenant uuid/id
629 <other VIM specific>
630 Returns the tenant list of dictionaries: [{'name':'<name>, 'id':'<id>, ...}, ...]
631 """
632 self.logger.debug("Getting tenants from VIM filter: '%s'", str(filter_dict))
633
634 try:
635 self._reload_connection()
636
637 if self.api_version3:
638 project_class_list = self.keystone.projects.list(
639 name=filter_dict.get("name")
640 )
641 else:
642 project_class_list = self.keystone.tenants.findall(**filter_dict)
643
644 project_list = []
645
646 for project in project_class_list:
647 if filter_dict.get("id") and filter_dict["id"] != project.id:
648 continue
649
650 project_list.append(project.to_dict())
651
652 return project_list
653 except (
654 ksExceptions.ConnectionError,
655 ksExceptions.ClientException,
656 ConnectionError,
657 ) as e:
658 self._format_exception(e)
659
660 def new_tenant(self, tenant_name, tenant_description):
661 """Adds a new tenant to openstack VIM. Returns the tenant identifier"""
662 self.logger.debug("Adding a new tenant name: %s", tenant_name)
663
664 try:
665 self._reload_connection()
666
667 if self.api_version3:
668 project = self.keystone.projects.create(
669 tenant_name,
670 self.config.get("project_domain_id", "default"),
671 description=tenant_description,
672 is_domain=False,
673 )
674 else:
675 project = self.keystone.tenants.create(tenant_name, tenant_description)
676
677 return project.id
678 except (
679 ksExceptions.ConnectionError,
680 ksExceptions.ClientException,
681 ksExceptions.BadRequest,
682 ConnectionError,
683 ) as e:
684 self._format_exception(e)
685
686 def delete_tenant(self, tenant_id):
687 """Delete a tenant from openstack VIM. Returns the old tenant identifier"""
688 self.logger.debug("Deleting tenant %s from VIM", tenant_id)
689
690 try:
691 self._reload_connection()
692
693 if self.api_version3:
694 self.keystone.projects.delete(tenant_id)
695 else:
696 self.keystone.tenants.delete(tenant_id)
697
698 return tenant_id
699 except (
700 ksExceptions.ConnectionError,
701 ksExceptions.ClientException,
702 ksExceptions.NotFound,
703 ConnectionError,
704 ) as e:
705 self._format_exception(e)
706
707 def new_network(
708 self,
709 net_name,
710 net_type,
711 ip_profile=None,
712 shared=False,
713 provider_network_profile=None,
714 ):
715 """Adds a tenant network to VIM
716 Params:
717 'net_name': name of the network
718 'net_type': one of:
719 'bridge': overlay isolated network
720 'data': underlay E-LAN network for Passthrough and SRIOV interfaces
721 'ptp': underlay E-LINE network for Passthrough and SRIOV interfaces.
722 'ip_profile': is a dict containing the IP parameters of the network
723 'ip_version': can be "IPv4" or "IPv6" (Currently only IPv4 is implemented)
724 'subnet_address': ip_prefix_schema, that is X.X.X.X/Y
725 'gateway_address': (Optional) ip_schema, that is X.X.X.X
726 'dns_address': (Optional) comma separated list of ip_schema, e.g. X.X.X.X[,X,X,X,X]
727 'dhcp_enabled': True or False
728 'dhcp_start_address': ip_schema, first IP to grant
729 'dhcp_count': number of IPs to grant.
730 'shared': if this network can be seen/use by other tenants/organization
731 'provider_network_profile': (optional) contains {segmentation-id: vlan, network-type: vlan|vxlan,
732 physical-network: physnet-label}
733 Returns a tuple with the network identifier and created_items, or raises an exception on error
734 created_items can be None or a dictionary where this method can include key-values that will be passed to
735 the method delete_network. Can be used to store created segments, created l2gw connections, etc.
736 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
737 as not present.
738 """
739 self.logger.debug(
740 "Adding a new network to VIM name '%s', type '%s'", net_name, net_type
741 )
742 # self.logger.debug(">>>>>>>>>>>>>>>>>> IP profile %s", str(ip_profile))
743
744 try:
745 vlan = None
746
747 if provider_network_profile:
748 vlan = provider_network_profile.get("segmentation-id")
749
750 new_net = None
751 created_items = {}
752 self._reload_connection()
753 network_dict = {"name": net_name, "admin_state_up": True}
754
755 if net_type in ("data", "ptp"):
756 provider_physical_network = None
757
758 if provider_network_profile and provider_network_profile.get(
759 "physical-network"
760 ):
761 provider_physical_network = provider_network_profile.get(
762 "physical-network"
763 )
764
765 # provider-network must be one of the dataplane_physcial_netowrk if this is a list. If it is string
766 # or not declared, just ignore the checking
767 if (
768 isinstance(
769 self.config.get("dataplane_physical_net"), (tuple, list)
770 )
771 and provider_physical_network
772 not in self.config["dataplane_physical_net"]
773 ):
774 raise vimconn.VimConnConflictException(
775 "Invalid parameter 'provider-network:physical-network' "
776 "for network creation. '{}' is not one of the declared "
777 "list at VIM_config:dataplane_physical_net".format(
778 provider_physical_network
779 )
780 )
781
782 # use the default dataplane_physical_net
783 if not provider_physical_network:
784 provider_physical_network = self.config.get(
785 "dataplane_physical_net"
786 )
787
788 # if it is non empty list, use the first value. If it is a string use the value directly
789 if (
790 isinstance(provider_physical_network, (tuple, list))
791 and provider_physical_network
792 ):
793 provider_physical_network = provider_physical_network[0]
794
795 if not provider_physical_network:
796 raise vimconn.VimConnConflictException(
797 "missing information needed for underlay networks. Provide "
798 "'dataplane_physical_net' configuration at VIM or use the NS "
799 "instantiation parameter 'provider-network.physical-network'"
800 " for the VLD"
801 )
802
803 if not self.config.get("multisegment_support"):
804 network_dict[
805 "provider:physical_network"
806 ] = provider_physical_network
807
808 if (
809 provider_network_profile
810 and "network-type" in provider_network_profile
811 ):
812 network_dict[
813 "provider:network_type"
814 ] = provider_network_profile["network-type"]
815 else:
816 network_dict["provider:network_type"] = self.config.get(
817 "dataplane_network_type", "vlan"
818 )
819
820 if vlan:
821 network_dict["provider:segmentation_id"] = vlan
822 else:
823 # Multi-segment case
824 segment_list = []
825 segment1_dict = {
826 "provider:physical_network": "",
827 "provider:network_type": "vxlan",
828 }
829 segment_list.append(segment1_dict)
830 segment2_dict = {
831 "provider:physical_network": provider_physical_network,
832 "provider:network_type": "vlan",
833 }
834
835 if vlan:
836 segment2_dict["provider:segmentation_id"] = vlan
837 elif self.config.get("multisegment_vlan_range"):
838 vlanID = self._generate_multisegment_vlanID()
839 segment2_dict["provider:segmentation_id"] = vlanID
840
841 # else
842 # raise vimconn.VimConnConflictException(
843 # "You must provide "multisegment_vlan_range" at config dict before creating a multisegment
844 # network")
845 segment_list.append(segment2_dict)
846 network_dict["segments"] = segment_list
847
848 # VIO Specific Changes. It needs a concrete VLAN
849 if self.vim_type == "VIO" and vlan is None:
850 if self.config.get("dataplane_net_vlan_range") is None:
851 raise vimconn.VimConnConflictException(
852 "You must provide 'dataplane_net_vlan_range' in format "
853 "[start_ID - end_ID] at VIM_config for creating underlay "
854 "networks"
855 )
856
857 network_dict["provider:segmentation_id"] = self._generate_vlanID()
858
859 network_dict["shared"] = shared
860
861 if self.config.get("disable_network_port_security"):
862 network_dict["port_security_enabled"] = False
863
864 if self.config.get("neutron_availability_zone_hints"):
865 hints = self.config.get("neutron_availability_zone_hints")
866
867 if isinstance(hints, str):
868 hints = [hints]
869
870 network_dict["availability_zone_hints"] = hints
871
872 new_net = self.neutron.create_network({"network": network_dict})
873 # print new_net
874 # create subnetwork, even if there is no profile
875
876 if not ip_profile:
877 ip_profile = {}
878
879 if not ip_profile.get("subnet_address"):
880 # Fake subnet is required
881 subnet_rand = random.randint(0, 255)
882 ip_profile["subnet_address"] = "192.168.{}.0/24".format(subnet_rand)
883
884 if "ip_version" not in ip_profile:
885 ip_profile["ip_version"] = "IPv4"
886
887 subnet = {
888 "name": net_name + "-subnet",
889 "network_id": new_net["network"]["id"],
890 "ip_version": 4 if ip_profile["ip_version"] == "IPv4" else 6,
891 "cidr": ip_profile["subnet_address"],
892 }
893
894 # Gateway should be set to None if not needed. Otherwise openstack assigns one by default
895 if ip_profile.get("gateway_address"):
896 subnet["gateway_ip"] = ip_profile["gateway_address"]
897 else:
898 subnet["gateway_ip"] = None
899
900 if ip_profile.get("dns_address"):
901 subnet["dns_nameservers"] = ip_profile["dns_address"].split(";")
902
903 if "dhcp_enabled" in ip_profile:
904 subnet["enable_dhcp"] = (
905 False
906 if ip_profile["dhcp_enabled"] == "false"
907 or ip_profile["dhcp_enabled"] is False
908 else True
909 )
910
911 if ip_profile.get("dhcp_start_address"):
912 subnet["allocation_pools"] = []
913 subnet["allocation_pools"].append(dict())
914 subnet["allocation_pools"][0]["start"] = ip_profile[
915 "dhcp_start_address"
916 ]
917
918 if ip_profile.get("dhcp_count"):
919 # parts = ip_profile["dhcp_start_address"].split(".")
920 # ip_int = (int(parts[0]) << 24) + (int(parts[1]) << 16) + (int(parts[2]) << 8) + int(parts[3])
921 ip_int = int(netaddr.IPAddress(ip_profile["dhcp_start_address"]))
922 ip_int += ip_profile["dhcp_count"] - 1
923 ip_str = str(netaddr.IPAddress(ip_int))
924 subnet["allocation_pools"][0]["end"] = ip_str
925
926 # self.logger.debug(">>>>>>>>>>>>>>>>>> Subnet: %s", str(subnet))
927 self.neutron.create_subnet({"subnet": subnet})
928
929 if net_type == "data" and self.config.get("multisegment_support"):
930 if self.config.get("l2gw_support"):
931 l2gw_list = self.neutron.list_l2_gateways().get("l2_gateways", ())
932 for l2gw in l2gw_list:
933 l2gw_conn = {
934 "l2_gateway_id": l2gw["id"],
935 "network_id": new_net["network"]["id"],
936 "segmentation_id": str(vlanID),
937 }
938 new_l2gw_conn = self.neutron.create_l2_gateway_connection(
939 {"l2_gateway_connection": l2gw_conn}
940 )
941 created_items[
942 "l2gwconn:"
943 + str(new_l2gw_conn["l2_gateway_connection"]["id"])
944 ] = True
945
946 return new_net["network"]["id"], created_items
947 except Exception as e:
948 # delete l2gw connections (if any) before deleting the network
949 for k, v in created_items.items():
950 if not v: # skip already deleted
951 continue
952
953 try:
954 k_item, _, k_id = k.partition(":")
955
956 if k_item == "l2gwconn":
957 self.neutron.delete_l2_gateway_connection(k_id)
958 except Exception as e2:
959 self.logger.error(
960 "Error deleting l2 gateway connection: {}: {}".format(
961 type(e2).__name__, e2
962 )
963 )
964
965 if new_net:
966 self.neutron.delete_network(new_net["network"]["id"])
967
968 self._format_exception(e)
969
970 def get_network_list(self, filter_dict={}):
971 """Obtain tenant networks of VIM
972 Filter_dict can be:
973 name: network name
974 id: network uuid
975 shared: boolean
976 tenant_id: tenant
977 admin_state_up: boolean
978 status: 'ACTIVE'
979 Returns the network list of dictionaries
980 """
981 self.logger.debug("Getting network from VIM filter: '%s'", str(filter_dict))
982
983 try:
984 self._reload_connection()
985 filter_dict_os = filter_dict.copy()
986
987 if self.api_version3 and "tenant_id" in filter_dict_os:
988 # TODO check
989 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
990
991 net_dict = self.neutron.list_networks(**filter_dict_os)
992 net_list = net_dict["networks"]
993 self.__net_os2mano(net_list)
994
995 return net_list
996 except (
997 neExceptions.ConnectionFailed,
998 ksExceptions.ClientException,
999 neExceptions.NeutronException,
1000 ConnectionError,
1001 ) as e:
1002 self._format_exception(e)
1003
1004 def get_network(self, net_id):
1005 """Obtain details of network from VIM
1006 Returns the network information from a network id"""
1007 self.logger.debug(" Getting tenant network %s from VIM", net_id)
1008 filter_dict = {"id": net_id}
1009 net_list = self.get_network_list(filter_dict)
1010
1011 if len(net_list) == 0:
1012 raise vimconn.VimConnNotFoundException(
1013 "Network '{}' not found".format(net_id)
1014 )
1015 elif len(net_list) > 1:
1016 raise vimconn.VimConnConflictException(
1017 "Found more than one network with this criteria"
1018 )
1019
1020 net = net_list[0]
1021 subnets = []
1022 for subnet_id in net.get("subnets", ()):
1023 try:
1024 subnet = self.neutron.show_subnet(subnet_id)
1025 except Exception as e:
1026 self.logger.error(
1027 "osconnector.get_network(): Error getting subnet %s %s"
1028 % (net_id, str(e))
1029 )
1030 subnet = {"id": subnet_id, "fault": str(e)}
1031
1032 subnets.append(subnet)
1033
1034 net["subnets"] = subnets
1035 net["encapsulation"] = net.get("provider:network_type")
1036 net["encapsulation_type"] = net.get("provider:network_type")
1037 net["segmentation_id"] = net.get("provider:segmentation_id")
1038 net["encapsulation_id"] = net.get("provider:segmentation_id")
1039
1040 return net
1041
1042 def delete_network(self, net_id, created_items=None):
1043 """
1044 Removes a tenant network from VIM and its associated elements
1045 :param net_id: VIM identifier of the network, provided by method new_network
1046 :param created_items: dictionary with extra items to be deleted. provided by method new_network
1047 Returns the network identifier or raises an exception upon error or when network is not found
1048 """
1049 self.logger.debug("Deleting network '%s' from VIM", net_id)
1050
1051 if created_items is None:
1052 created_items = {}
1053
1054 try:
1055 self._reload_connection()
1056 # delete l2gw connections (if any) before deleting the network
1057 for k, v in created_items.items():
1058 if not v: # skip already deleted
1059 continue
1060
1061 try:
1062 k_item, _, k_id = k.partition(":")
1063 if k_item == "l2gwconn":
1064 self.neutron.delete_l2_gateway_connection(k_id)
1065 except Exception as e:
1066 self.logger.error(
1067 "Error deleting l2 gateway connection: {}: {}".format(
1068 type(e).__name__, e
1069 )
1070 )
1071
1072 # delete VM ports attached to this networks before the network
1073 ports = self.neutron.list_ports(network_id=net_id)
1074 for p in ports["ports"]:
1075 try:
1076 self.neutron.delete_port(p["id"])
1077 except Exception as e:
1078 self.logger.error("Error deleting port %s: %s", p["id"], str(e))
1079
1080 self.neutron.delete_network(net_id)
1081
1082 return net_id
1083 except (
1084 neExceptions.ConnectionFailed,
1085 neExceptions.NetworkNotFoundClient,
1086 neExceptions.NeutronException,
1087 ksExceptions.ClientException,
1088 neExceptions.NeutronException,
1089 ConnectionError,
1090 ) as e:
1091 self._format_exception(e)
1092
1093 def refresh_nets_status(self, net_list):
1094 """Get the status of the networks
1095 Params: the list of network identifiers
1096 Returns a dictionary with:
1097 net_id: #VIM id of this network
1098 status: #Mandatory. Text with one of:
1099 # DELETED (not found at vim)
1100 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
1101 # OTHER (Vim reported other status not understood)
1102 # ERROR (VIM indicates an ERROR status)
1103 # ACTIVE, INACTIVE, DOWN (admin down),
1104 # BUILD (on building process)
1105 #
1106 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
1107 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
1108 """
1109 net_dict = {}
1110
1111 for net_id in net_list:
1112 net = {}
1113
1114 try:
1115 net_vim = self.get_network(net_id)
1116
1117 if net_vim["status"] in netStatus2manoFormat:
1118 net["status"] = netStatus2manoFormat[net_vim["status"]]
1119 else:
1120 net["status"] = "OTHER"
1121 net["error_msg"] = "VIM status reported " + net_vim["status"]
1122
1123 if net["status"] == "ACTIVE" and not net_vim["admin_state_up"]:
1124 net["status"] = "DOWN"
1125
1126 net["vim_info"] = self.serialize(net_vim)
1127
1128 if net_vim.get("fault"): # TODO
1129 net["error_msg"] = str(net_vim["fault"])
1130 except vimconn.VimConnNotFoundException as e:
1131 self.logger.error("Exception getting net status: %s", str(e))
1132 net["status"] = "DELETED"
1133 net["error_msg"] = str(e)
1134 except vimconn.VimConnException as e:
1135 self.logger.error("Exception getting net status: %s", str(e))
1136 net["status"] = "VIM_ERROR"
1137 net["error_msg"] = str(e)
1138 net_dict[net_id] = net
1139 return net_dict
1140
1141 def get_flavor(self, flavor_id):
1142 """Obtain flavor details from the VIM. Returns the flavor dict details"""
1143 self.logger.debug("Getting flavor '%s'", flavor_id)
1144
1145 try:
1146 self._reload_connection()
1147 flavor = self.nova.flavors.find(id=flavor_id)
1148 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
1149
1150 return flavor.to_dict()
1151 except (
1152 nvExceptions.NotFound,
1153 nvExceptions.ClientException,
1154 ksExceptions.ClientException,
1155 ConnectionError,
1156 ) as e:
1157 self._format_exception(e)
1158
1159 def get_flavor_id_from_data(self, flavor_dict):
1160 """Obtain flavor id that match the flavor description
1161 Returns the flavor_id or raises a vimconnNotFoundException
1162 flavor_dict: contains the required ram, vcpus, disk
1163 If 'use_existing_flavors' is set to True at config, the closer flavor that provides same or more ram, vcpus
1164 and disk is returned. Otherwise a flavor with exactly same ram, vcpus and disk is returned or a
1165 vimconnNotFoundException is raised
1166 """
1167 exact_match = False if self.config.get("use_existing_flavors") else True
1168
1169 try:
1170 self._reload_connection()
1171 flavor_candidate_id = None
1172 flavor_candidate_data = (10000, 10000, 10000)
1173 flavor_target = (
1174 flavor_dict["ram"],
1175 flavor_dict["vcpus"],
1176 flavor_dict["disk"],
1177 flavor_dict.get("ephemeral", 0),
1178 flavor_dict.get("swap", 0),
1179 )
1180 # numa=None
1181 extended = flavor_dict.get("extended", {})
1182 if extended:
1183 # TODO
1184 raise vimconn.VimConnNotFoundException(
1185 "Flavor with EPA still not implemented"
1186 )
1187 # if len(numas) > 1:
1188 # raise vimconn.VimConnNotFoundException("Cannot find any flavor with more than one numa")
1189 # numa=numas[0]
1190 # numas = extended.get("numas")
1191 for flavor in self.nova.flavors.list():
1192 epa = flavor.get_keys()
1193
1194 if epa:
1195 continue
1196 # TODO
1197
1198 flavor_data = (
1199 flavor.ram,
1200 flavor.vcpus,
1201 flavor.disk,
1202 flavor.ephemeral,
1203 flavor.swap if isinstance(flavor.swap, int) else 0,
1204 )
1205 if flavor_data == flavor_target:
1206 return flavor.id
1207 elif (
1208 not exact_match
1209 and flavor_target < flavor_data < flavor_candidate_data
1210 ):
1211 flavor_candidate_id = flavor.id
1212 flavor_candidate_data = flavor_data
1213
1214 if not exact_match and flavor_candidate_id:
1215 return flavor_candidate_id
1216
1217 raise vimconn.VimConnNotFoundException(
1218 "Cannot find any flavor matching '{}'".format(flavor_dict)
1219 )
1220 except (
1221 nvExceptions.NotFound,
1222 nvExceptions.ClientException,
1223 ksExceptions.ClientException,
1224 ConnectionError,
1225 ) as e:
1226 self._format_exception(e)
1227
1228 def process_resource_quota(self, quota, prefix, extra_specs):
1229 """
1230 :param prefix:
1231 :param extra_specs:
1232 :return:
1233 """
1234 if "limit" in quota:
1235 extra_specs["quota:" + prefix + "_limit"] = quota["limit"]
1236
1237 if "reserve" in quota:
1238 extra_specs["quota:" + prefix + "_reservation"] = quota["reserve"]
1239
1240 if "shares" in quota:
1241 extra_specs["quota:" + prefix + "_shares_level"] = "custom"
1242 extra_specs["quota:" + prefix + "_shares_share"] = quota["shares"]
1243
1244 def new_flavor(self, flavor_data, change_name_if_used=True):
1245 """Adds a tenant flavor to openstack VIM
1246 if change_name_if_used is True, it will change name in case of conflict, because it is not supported name
1247 repetition
1248 Returns the flavor identifier
1249 """
1250 self.logger.debug("Adding flavor '%s'", str(flavor_data))
1251 retry = 0
1252 max_retries = 3
1253 name_suffix = 0
1254
1255 try:
1256 name = flavor_data["name"]
1257 while retry < max_retries:
1258 retry += 1
1259 try:
1260 self._reload_connection()
1261
1262 if change_name_if_used:
1263 # get used names
1264 fl_names = []
1265 fl = self.nova.flavors.list()
1266
1267 for f in fl:
1268 fl_names.append(f.name)
1269
1270 while name in fl_names:
1271 name_suffix += 1
1272 name = flavor_data["name"] + "-" + str(name_suffix)
1273
1274 ram = flavor_data.get("ram", 64)
1275 vcpus = flavor_data.get("vcpus", 1)
1276 extra_specs = {}
1277
1278 extended = flavor_data.get("extended")
1279 if extended:
1280 numas = extended.get("numas")
1281
1282 if numas:
1283 numa_nodes = len(numas)
1284
1285 if numa_nodes > 1:
1286 return -1, "Can not add flavor with more than one numa"
1287
1288 extra_specs["hw:numa_nodes"] = str(numa_nodes)
1289 extra_specs["hw:mem_page_size"] = "large"
1290 extra_specs["hw:cpu_policy"] = "dedicated"
1291 extra_specs["hw:numa_mempolicy"] = "strict"
1292
1293 if self.vim_type == "VIO":
1294 extra_specs[
1295 "vmware:extra_config"
1296 ] = '{"numa.nodeAffinity":"0"}'
1297 extra_specs["vmware:latency_sensitivity_level"] = "high"
1298
1299 for numa in numas:
1300 # overwrite ram and vcpus
1301 # check if key "memory" is present in numa else use ram value at flavor
1302 if "memory" in numa:
1303 ram = numa["memory"] * 1024
1304 # See for reference: https://specs.openstack.org/openstack/nova-specs/specs/mitaka/
1305 # implemented/virt-driver-cpu-thread-pinning.html
1306 extra_specs["hw:cpu_sockets"] = 1
1307
1308 if "paired-threads" in numa:
1309 vcpus = numa["paired-threads"] * 2
1310 # cpu_thread_policy "require" implies that the compute node must have an
1311 # STM architecture
1312 extra_specs["hw:cpu_thread_policy"] = "require"
1313 extra_specs["hw:cpu_policy"] = "dedicated"
1314 elif "cores" in numa:
1315 vcpus = numa["cores"]
1316 # cpu_thread_policy "prefer" implies that the host must not have an SMT
1317 # architecture, or a non-SMT architecture will be emulated
1318 extra_specs["hw:cpu_thread_policy"] = "isolate"
1319 extra_specs["hw:cpu_policy"] = "dedicated"
1320 elif "threads" in numa:
1321 vcpus = numa["threads"]
1322 # cpu_thread_policy "prefer" implies that the host may or may not have an SMT
1323 # architecture
1324 extra_specs["hw:cpu_thread_policy"] = "prefer"
1325 extra_specs["hw:cpu_policy"] = "dedicated"
1326 # for interface in numa.get("interfaces",() ):
1327 # if interface["dedicated"]=="yes":
1328 # raise vimconn.VimConnException("Passthrough interfaces are not supported
1329 # for the openstack connector", http_code=vimconn.HTTP_Service_Unavailable)
1330 # #TODO, add the key 'pci_passthrough:alias"="<label at config>:<number ifaces>"'
1331 # when a way to connect it is available
1332 elif extended.get("cpu-quota"):
1333 self.process_resource_quota(
1334 extended.get("cpu-quota"), "cpu", extra_specs
1335 )
1336
1337 if extended.get("mem-quota"):
1338 self.process_resource_quota(
1339 extended.get("mem-quota"), "memory", extra_specs
1340 )
1341
1342 if extended.get("vif-quota"):
1343 self.process_resource_quota(
1344 extended.get("vif-quota"), "vif", extra_specs
1345 )
1346
1347 if extended.get("disk-io-quota"):
1348 self.process_resource_quota(
1349 extended.get("disk-io-quota"), "disk_io", extra_specs
1350 )
1351
1352 # Set the mempage size as specified in the descriptor
1353 if extended.get("mempage-size"):
1354 if extended.get("mempage-size") == "LARGE":
1355 extra_specs["hw:mem_page_size"] = "large"
1356 elif extended.get("mempage-size") == "SMALL":
1357 extra_specs["hw:mem_page_size"] = "small"
1358 elif extended.get("mempage-size") == "SIZE_2MB":
1359 extra_specs["hw:mem_page_size"] = "2MB"
1360 elif extended.get("mempage-size") == "SIZE_1GB":
1361 extra_specs["hw:mem_page_size"] = "1GB"
1362 elif extended.get("mempage-size") == "PREFER_LARGE":
1363 extra_specs["hw:mem_page_size"] = "any"
1364 else:
1365 # The validations in NBI should make reaching here not possible.
1366 # If this message is shown, check validations
1367 self.logger.debug(
1368 "Invalid mempage-size %s. Will be ignored",
1369 extended.get("mempage-size"),
1370 )
1371
1372 # create flavor
1373 new_flavor = self.nova.flavors.create(
1374 name=name,
1375 ram=ram,
1376 vcpus=vcpus,
1377 disk=flavor_data.get("disk", 0),
1378 ephemeral=flavor_data.get("ephemeral", 0),
1379 swap=flavor_data.get("swap", 0),
1380 is_public=flavor_data.get("is_public", True),
1381 )
1382 # add metadata
1383 if extra_specs:
1384 new_flavor.set_keys(extra_specs)
1385
1386 return new_flavor.id
1387 except nvExceptions.Conflict as e:
1388 if change_name_if_used and retry < max_retries:
1389 continue
1390
1391 self._format_exception(e)
1392 # except nvExceptions.BadRequest as e:
1393 except (
1394 ksExceptions.ClientException,
1395 nvExceptions.ClientException,
1396 ConnectionError,
1397 KeyError,
1398 ) as e:
1399 self._format_exception(e)
1400
1401 def delete_flavor(self, flavor_id):
1402 """Deletes a tenant flavor from openstack VIM. Returns the old flavor_id"""
1403 try:
1404 self._reload_connection()
1405 self.nova.flavors.delete(flavor_id)
1406
1407 return flavor_id
1408 # except nvExceptions.BadRequest as e:
1409 except (
1410 nvExceptions.NotFound,
1411 ksExceptions.ClientException,
1412 nvExceptions.ClientException,
1413 ConnectionError,
1414 ) as e:
1415 self._format_exception(e)
1416
1417 def new_image(self, image_dict):
1418 """
1419 Adds a tenant image to VIM. imge_dict is a dictionary with:
1420 name: name
1421 disk_format: qcow2, vhd, vmdk, raw (by default), ...
1422 location: path or URI
1423 public: "yes" or "no"
1424 metadata: metadata of the image
1425 Returns the image_id
1426 """
1427 retry = 0
1428 max_retries = 3
1429
1430 while retry < max_retries:
1431 retry += 1
1432 try:
1433 self._reload_connection()
1434
1435 # determine format http://docs.openstack.org/developer/glance/formats.html
1436 if "disk_format" in image_dict:
1437 disk_format = image_dict["disk_format"]
1438 else: # autodiscover based on extension
1439 if image_dict["location"].endswith(".qcow2"):
1440 disk_format = "qcow2"
1441 elif image_dict["location"].endswith(".vhd"):
1442 disk_format = "vhd"
1443 elif image_dict["location"].endswith(".vmdk"):
1444 disk_format = "vmdk"
1445 elif image_dict["location"].endswith(".vdi"):
1446 disk_format = "vdi"
1447 elif image_dict["location"].endswith(".iso"):
1448 disk_format = "iso"
1449 elif image_dict["location"].endswith(".aki"):
1450 disk_format = "aki"
1451 elif image_dict["location"].endswith(".ari"):
1452 disk_format = "ari"
1453 elif image_dict["location"].endswith(".ami"):
1454 disk_format = "ami"
1455 else:
1456 disk_format = "raw"
1457
1458 self.logger.debug(
1459 "new_image: '%s' loading from '%s'",
1460 image_dict["name"],
1461 image_dict["location"],
1462 )
1463 if self.vim_type == "VIO":
1464 container_format = "bare"
1465 if "container_format" in image_dict:
1466 container_format = image_dict["container_format"]
1467
1468 new_image = self.glance.images.create(
1469 name=image_dict["name"],
1470 container_format=container_format,
1471 disk_format=disk_format,
1472 )
1473 else:
1474 new_image = self.glance.images.create(name=image_dict["name"])
1475
1476 if image_dict["location"].startswith("http"):
1477 # TODO there is not a method to direct download. It must be downloaded locally with requests
1478 raise vimconn.VimConnNotImplemented("Cannot create image from URL")
1479 else: # local path
1480 with open(image_dict["location"]) as fimage:
1481 self.glance.images.upload(new_image.id, fimage)
1482 # new_image = self.glancev1.images.create(name=image_dict["name"], is_public=
1483 # image_dict.get("public","yes")=="yes",
1484 # container_format="bare", data=fimage, disk_format=disk_format)
1485
1486 metadata_to_load = image_dict.get("metadata")
1487
1488 # TODO location is a reserved word for current openstack versions. fixed for VIO please check
1489 # for openstack
1490 if self.vim_type == "VIO":
1491 metadata_to_load["upload_location"] = image_dict["location"]
1492 else:
1493 metadata_to_load["location"] = image_dict["location"]
1494
1495 self.glance.images.update(new_image.id, **metadata_to_load)
1496
1497 return new_image.id
1498 except (
1499 nvExceptions.Conflict,
1500 ksExceptions.ClientException,
1501 nvExceptions.ClientException,
1502 ) as e:
1503 self._format_exception(e)
1504 except (
1505 HTTPException,
1506 gl1Exceptions.HTTPException,
1507 gl1Exceptions.CommunicationError,
1508 ConnectionError,
1509 ) as e:
1510 if retry == max_retries:
1511 continue
1512
1513 self._format_exception(e)
1514 except IOError as e: # can not open the file
1515 raise vimconn.VimConnConnectionException(
1516 "{}: {} for {}".format(type(e).__name__, e, image_dict["location"]),
1517 http_code=vimconn.HTTP_Bad_Request,
1518 )
1519
1520 def delete_image(self, image_id):
1521 """Deletes a tenant image from openstack VIM. Returns the old id"""
1522 try:
1523 self._reload_connection()
1524 self.glance.images.delete(image_id)
1525
1526 return image_id
1527 except (
1528 nvExceptions.NotFound,
1529 ksExceptions.ClientException,
1530 nvExceptions.ClientException,
1531 gl1Exceptions.CommunicationError,
1532 gl1Exceptions.HTTPNotFound,
1533 ConnectionError,
1534 ) as e: # TODO remove
1535 self._format_exception(e)
1536
1537 def get_image_id_from_path(self, path):
1538 """Get the image id from image path in the VIM database. Returns the image_id"""
1539 try:
1540 self._reload_connection()
1541 images = self.glance.images.list()
1542
1543 for image in images:
1544 if image.metadata.get("location") == path:
1545 return image.id
1546
1547 raise vimconn.VimConnNotFoundException(
1548 "image with location '{}' not found".format(path)
1549 )
1550 except (
1551 ksExceptions.ClientException,
1552 nvExceptions.ClientException,
1553 gl1Exceptions.CommunicationError,
1554 ConnectionError,
1555 ) as e:
1556 self._format_exception(e)
1557
1558 def get_image_list(self, filter_dict={}):
1559 """Obtain tenant images from VIM
1560 Filter_dict can be:
1561 id: image id
1562 name: image name
1563 checksum: image checksum
1564 Returns the image list of dictionaries:
1565 [{<the fields at Filter_dict plus some VIM specific>}, ...]
1566 List can be empty
1567 """
1568 self.logger.debug("Getting image list from VIM filter: '%s'", str(filter_dict))
1569
1570 try:
1571 self._reload_connection()
1572 # filter_dict_os = filter_dict.copy()
1573 # First we filter by the available filter fields: name, id. The others are removed.
1574 image_list = self.glance.images.list()
1575 filtered_list = []
1576
1577 for image in image_list:
1578 try:
1579 if filter_dict.get("name") and image["name"] != filter_dict["name"]:
1580 continue
1581
1582 if filter_dict.get("id") and image["id"] != filter_dict["id"]:
1583 continue
1584
1585 if (
1586 filter_dict.get("checksum")
1587 and image["checksum"] != filter_dict["checksum"]
1588 ):
1589 continue
1590
1591 filtered_list.append(image.copy())
1592 except gl1Exceptions.HTTPNotFound:
1593 pass
1594
1595 return filtered_list
1596 except (
1597 ksExceptions.ClientException,
1598 nvExceptions.ClientException,
1599 gl1Exceptions.CommunicationError,
1600 ConnectionError,
1601 ) as e:
1602 self._format_exception(e)
1603
1604 def __wait_for_vm(self, vm_id, status):
1605 """wait until vm is in the desired status and return True.
1606 If the VM gets in ERROR status, return false.
1607 If the timeout is reached generate an exception"""
1608 elapsed_time = 0
1609 while elapsed_time < server_timeout:
1610 vm_status = self.nova.servers.get(vm_id).status
1611
1612 if vm_status == status:
1613 return True
1614
1615 if vm_status == "ERROR":
1616 return False
1617
1618 time.sleep(5)
1619 elapsed_time += 5
1620
1621 # if we exceeded the timeout rollback
1622 if elapsed_time >= server_timeout:
1623 raise vimconn.VimConnException(
1624 "Timeout waiting for instance " + vm_id + " to get " + status,
1625 http_code=vimconn.HTTP_Request_Timeout,
1626 )
1627
1628 def _get_openstack_availablity_zones(self):
1629 """
1630 Get from openstack availability zones available
1631 :return:
1632 """
1633 try:
1634 openstack_availability_zone = self.nova.availability_zones.list()
1635 openstack_availability_zone = [
1636 str(zone.zoneName)
1637 for zone in openstack_availability_zone
1638 if zone.zoneName != "internal"
1639 ]
1640
1641 return openstack_availability_zone
1642 except Exception:
1643 return None
1644
1645 def _set_availablity_zones(self):
1646 """
1647 Set vim availablity zone
1648 :return:
1649 """
1650 if "availability_zone" in self.config:
1651 vim_availability_zones = self.config.get("availability_zone")
1652
1653 if isinstance(vim_availability_zones, str):
1654 self.availability_zone = [vim_availability_zones]
1655 elif isinstance(vim_availability_zones, list):
1656 self.availability_zone = vim_availability_zones
1657 else:
1658 self.availability_zone = self._get_openstack_availablity_zones()
1659
1660 def _get_vm_availability_zone(
1661 self, availability_zone_index, availability_zone_list
1662 ):
1663 """
1664 Return thge availability zone to be used by the created VM.
1665 :return: The VIM availability zone to be used or None
1666 """
1667 if availability_zone_index is None:
1668 if not self.config.get("availability_zone"):
1669 return None
1670 elif isinstance(self.config.get("availability_zone"), str):
1671 return self.config["availability_zone"]
1672 else:
1673 # TODO consider using a different parameter at config for default AV and AV list match
1674 return self.config["availability_zone"][0]
1675
1676 vim_availability_zones = self.availability_zone
1677 # check if VIM offer enough availability zones describe in the VNFD
1678 if vim_availability_zones and len(availability_zone_list) <= len(
1679 vim_availability_zones
1680 ):
1681 # check if all the names of NFV AV match VIM AV names
1682 match_by_index = False
1683 for av in availability_zone_list:
1684 if av not in vim_availability_zones:
1685 match_by_index = True
1686 break
1687
1688 if match_by_index:
1689 return vim_availability_zones[availability_zone_index]
1690 else:
1691 return availability_zone_list[availability_zone_index]
1692 else:
1693 raise vimconn.VimConnConflictException(
1694 "No enough availability zones at VIM for this deployment"
1695 )
1696
1697 def new_vminstance(
1698 self,
1699 name,
1700 description,
1701 start,
1702 image_id,
1703 flavor_id,
1704 affinity_group_list,
1705 net_list,
1706 cloud_config=None,
1707 disk_list=None,
1708 availability_zone_index=None,
1709 availability_zone_list=None,
1710 ):
1711 """Adds a VM instance to VIM
1712 Params:
1713 start: indicates if VM must start or boot in pause mode. Ignored
1714 image_id,flavor_id: image and flavor uuid
1715 affinity_group_list: list of affinity groups, each one is a dictionary.
1716 Ignore if empty.
1717 net_list: list of interfaces, each one is a dictionary with:
1718 name:
1719 net_id: network uuid to connect
1720 vpci: virtual vcpi to assign, ignored because openstack lack #TODO
1721 model: interface model, ignored #TODO
1722 mac_address: used for SR-IOV ifaces #TODO for other types
1723 use: 'data', 'bridge', 'mgmt'
1724 type: 'virtual', 'PCI-PASSTHROUGH'('PF'), 'SR-IOV'('VF'), 'VFnotShared'
1725 vim_id: filled/added by this function
1726 floating_ip: True/False (or it can be None)
1727 port_security: True/False
1728 'cloud_config': (optional) dictionary with:
1729 'key-pairs': (optional) list of strings with the public key to be inserted to the default user
1730 'users': (optional) list of users to be inserted, each item is a dict with:
1731 'name': (mandatory) user name,
1732 'key-pairs': (optional) list of strings with the public key to be inserted to the user
1733 'user-data': (optional) string is a text script to be passed directly to cloud-init
1734 'config-files': (optional). List of files to be transferred. Each item is a dict with:
1735 'dest': (mandatory) string with the destination absolute path
1736 'encoding': (optional, by default text). Can be one of:
1737 'b64', 'base64', 'gz', 'gz+b64', 'gz+base64', 'gzip+b64', 'gzip+base64'
1738 'content' (mandatory): string with the content of the file
1739 'permissions': (optional) string with file permissions, typically octal notation '0644'
1740 'owner': (optional) file owner, string with the format 'owner:group'
1741 'boot-data-drive': boolean to indicate if user-data must be passed using a boot drive (hard disk)
1742 'disk_list': (optional) list with additional disks to the VM. Each item is a dict with:
1743 'image_id': (optional). VIM id of an existing image. If not provided an empty disk must be mounted
1744 'size': (mandatory) string with the size of the disk in GB
1745 'vim_id' (optional) should use this existing volume id
1746 availability_zone_index: Index of availability_zone_list to use for this this VM. None if not AV required
1747 availability_zone_list: list of availability zones given by user in the VNFD descriptor. Ignore if
1748 availability_zone_index is None
1749 #TODO ip, security groups
1750 Returns a tuple with the instance identifier and created_items or raises an exception on error
1751 created_items can be None or a dictionary where this method can include key-values that will be passed to
1752 the method delete_vminstance and action_vminstance. Can be used to store created ports, volumes, etc.
1753 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
1754 as not present.
1755 """
1756 self.logger.debug(
1757 "new_vminstance input: image='%s' flavor='%s' nics='%s'",
1758 image_id,
1759 flavor_id,
1760 str(net_list),
1761 )
1762
1763 try:
1764 server = None
1765 created_items = {}
1766 # metadata = {}
1767 net_list_vim = []
1768 external_network = []
1769 # ^list of external networks to be connected to instance, later on used to create floating_ip
1770 no_secured_ports = [] # List of port-is with port-security disabled
1771 self._reload_connection()
1772 # metadata_vpci = {} # For a specific neutron plugin
1773 block_device_mapping = None
1774
1775 for net in net_list:
1776 if not net.get("net_id"): # skip non connected iface
1777 continue
1778
1779 port_dict = {
1780 "network_id": net["net_id"],
1781 "name": net.get("name"),
1782 "admin_state_up": True,
1783 }
1784
1785 if (
1786 self.config.get("security_groups")
1787 and net.get("port_security") is not False
1788 and not self.config.get("no_port_security_extension")
1789 ):
1790 if not self.security_groups_id:
1791 self._get_ids_from_name()
1792
1793 port_dict["security_groups"] = self.security_groups_id
1794
1795 if net["type"] == "virtual":
1796 pass
1797 # if "vpci" in net:
1798 # metadata_vpci[ net["net_id"] ] = [[ net["vpci"], "" ]]
1799 elif net["type"] == "VF" or net["type"] == "SR-IOV": # for VF
1800 # if "vpci" in net:
1801 # if "VF" not in metadata_vpci:
1802 # metadata_vpci["VF"]=[]
1803 # metadata_vpci["VF"].append([ net["vpci"], "" ])
1804 port_dict["binding:vnic_type"] = "direct"
1805
1806 # VIO specific Changes
1807 if self.vim_type == "VIO":
1808 # Need to create port with port_security_enabled = False and no-security-groups
1809 port_dict["port_security_enabled"] = False
1810 port_dict["provider_security_groups"] = []
1811 port_dict["security_groups"] = []
1812 else: # For PT PCI-PASSTHROUGH
1813 # if "vpci" in net:
1814 # if "PF" not in metadata_vpci:
1815 # metadata_vpci["PF"]=[]
1816 # metadata_vpci["PF"].append([ net["vpci"], "" ])
1817 port_dict["binding:vnic_type"] = "direct-physical"
1818
1819 if not port_dict["name"]:
1820 port_dict["name"] = name
1821
1822 if net.get("mac_address"):
1823 port_dict["mac_address"] = net["mac_address"]
1824
1825 if net.get("ip_address"):
1826 port_dict["fixed_ips"] = [{"ip_address": net["ip_address"]}]
1827 # TODO add "subnet_id": <subnet_id>
1828
1829 new_port = self.neutron.create_port({"port": port_dict})
1830 created_items["port:" + str(new_port["port"]["id"])] = True
1831 net["mac_adress"] = new_port["port"]["mac_address"]
1832 net["vim_id"] = new_port["port"]["id"]
1833 # if try to use a network without subnetwork, it will return a emtpy list
1834 fixed_ips = new_port["port"].get("fixed_ips")
1835
1836 if fixed_ips:
1837 net["ip"] = fixed_ips[0].get("ip_address")
1838 else:
1839 net["ip"] = None
1840
1841 port = {"port-id": new_port["port"]["id"]}
1842 if float(self.nova.api_version.get_string()) >= 2.32:
1843 port["tag"] = new_port["port"]["name"]
1844
1845 net_list_vim.append(port)
1846
1847 if net.get("floating_ip", False):
1848 net["exit_on_floating_ip_error"] = True
1849 external_network.append(net)
1850 elif net["use"] == "mgmt" and self.config.get("use_floating_ip"):
1851 net["exit_on_floating_ip_error"] = False
1852 external_network.append(net)
1853 net["floating_ip"] = self.config.get("use_floating_ip")
1854
1855 # If port security is disabled when the port has not yet been attached to the VM, then all vm traffic
1856 # is dropped.
1857 # As a workaround we wait until the VM is active and then disable the port-security
1858 if net.get("port_security") is False and not self.config.get(
1859 "no_port_security_extension"
1860 ):
1861 no_secured_ports.append(
1862 (
1863 new_port["port"]["id"],
1864 net.get("port_security_disable_strategy"),
1865 )
1866 )
1867
1868 # if metadata_vpci:
1869 # metadata = {"pci_assignement": json.dumps(metadata_vpci)}
1870 # if len(metadata["pci_assignement"]) >255:
1871 # #limit the metadata size
1872 # #metadata["pci_assignement"] = metadata["pci_assignement"][0:255]
1873 # self.logger.warn("Metadata deleted since it exceeds the expected length (255) ")
1874 # metadata = {}
1875
1876 self.logger.debug(
1877 "name '%s' image_id '%s'flavor_id '%s' net_list_vim '%s' description '%s'",
1878 name,
1879 image_id,
1880 flavor_id,
1881 str(net_list_vim),
1882 description,
1883 )
1884
1885 # cloud config
1886 config_drive, userdata = self._create_user_data(cloud_config)
1887
1888 # get availability Zone
1889 vm_av_zone = self._get_vm_availability_zone(
1890 availability_zone_index, availability_zone_list
1891 )
1892
1893 # Create additional volumes in case these are present in disk_list
1894 existing_vim_volumes = []
1895 base_disk_index = ord("b")
1896 boot_volume_id = None
1897 if disk_list:
1898 block_device_mapping = {}
1899 for disk in disk_list:
1900 if disk.get("vim_id"):
1901 block_device_mapping["_vd" + chr(base_disk_index)] = disk[
1902 "vim_id"
1903 ]
1904 existing_vim_volumes.append({"id": disk["vim_id"]})
1905 else:
1906 if "image_id" in disk:
1907 base_disk_index = ord("a")
1908 volume = self.cinder.volumes.create(
1909 size=disk["size"],
1910 name=name + "_vd" + chr(base_disk_index),
1911 imageRef=disk["image_id"],
1912 # Make sure volume is in the same AZ as the VM to be attached to
1913 availability_zone=vm_av_zone,
1914 )
1915 boot_volume_id = volume.id
1916 else:
1917 volume = self.cinder.volumes.create(
1918 size=disk["size"],
1919 name=name + "_vd" + chr(base_disk_index),
1920 # Make sure volume is in the same AZ as the VM to be attached to
1921 availability_zone=vm_av_zone,
1922 )
1923
1924 created_items["volume:" + str(volume.id)] = True
1925 block_device_mapping["_vd" + chr(base_disk_index)] = volume.id
1926
1927 base_disk_index += 1
1928
1929 # Wait until created volumes are with status available
1930 elapsed_time = 0
1931 while elapsed_time < volume_timeout:
1932 for created_item in created_items:
1933 v, _, volume_id = created_item.partition(":")
1934 if v == "volume":
1935 if self.cinder.volumes.get(volume_id).status != "available":
1936 break
1937 else: # all ready: break from while
1938 break
1939
1940 time.sleep(5)
1941 elapsed_time += 5
1942
1943 # Wait until existing volumes in vim are with status available
1944 while elapsed_time < volume_timeout:
1945 for volume in existing_vim_volumes:
1946 if self.cinder.volumes.get(volume["id"]).status != "available":
1947 break
1948 else: # all ready: break from while
1949 break
1950
1951 time.sleep(5)
1952 elapsed_time += 5
1953
1954 # If we exceeded the timeout rollback
1955 if elapsed_time >= volume_timeout:
1956 raise vimconn.VimConnException(
1957 "Timeout creating volumes for instance " + name,
1958 http_code=vimconn.HTTP_Request_Timeout,
1959 )
1960 if boot_volume_id:
1961 self.cinder.volumes.set_bootable(boot_volume_id, True)
1962
1963 # Manage affinity groups/server groups
1964 server_group_id = None
1965 scheduller_hints = {}
1966
1967 if affinity_group_list:
1968 # Only first id on the list will be used. Openstack restriction
1969 server_group_id = affinity_group_list[0]["affinity_group_id"]
1970 scheduller_hints["group"] = server_group_id
1971
1972 self.logger.debug(
1973 "nova.servers.create({}, {}, {}, nics={}, security_groups={}, "
1974 "availability_zone={}, key_name={}, userdata={}, config_drive={}, "
1975 "block_device_mapping={}, server_group={})".format(
1976 name,
1977 image_id,
1978 flavor_id,
1979 net_list_vim,
1980 self.config.get("security_groups"),
1981 vm_av_zone,
1982 self.config.get("keypair"),
1983 userdata,
1984 config_drive,
1985 block_device_mapping,
1986 server_group_id,
1987 )
1988 )
1989 server = self.nova.servers.create(
1990 name,
1991 image_id,
1992 flavor_id,
1993 nics=net_list_vim,
1994 security_groups=self.config.get("security_groups"),
1995 # TODO remove security_groups in future versions. Already at neutron port
1996 availability_zone=vm_av_zone,
1997 key_name=self.config.get("keypair"),
1998 userdata=userdata,
1999 config_drive=config_drive,
2000 block_device_mapping=block_device_mapping,
2001 scheduler_hints=scheduller_hints,
2002 ) # , description=description)
2003
2004 vm_start_time = time.time()
2005 # Previously mentioned workaround to wait until the VM is active and then disable the port-security
2006 if no_secured_ports:
2007 self.__wait_for_vm(server.id, "ACTIVE")
2008
2009 for port in no_secured_ports:
2010 port_update = {
2011 "port": {"port_security_enabled": False, "security_groups": None}
2012 }
2013
2014 if port[1] == "allow-address-pairs":
2015 port_update = {
2016 "port": {"allowed_address_pairs": [{"ip_address": "0.0.0.0/0"}]}
2017 }
2018
2019 try:
2020 self.neutron.update_port(port[0], port_update)
2021 except Exception:
2022 raise vimconn.VimConnException(
2023 "It was not possible to disable port security for port {}".format(
2024 port[0]
2025 )
2026 )
2027
2028 # print "DONE :-)", server
2029
2030 # pool_id = None
2031 for floating_network in external_network:
2032 try:
2033 assigned = False
2034 floating_ip_retries = 3
2035 # In case of RO in HA there can be conflicts, two RO trying to assign same floating IP, so retry
2036 # several times
2037 while not assigned:
2038 floating_ips = self.neutron.list_floatingips().get(
2039 "floatingips", ()
2040 )
2041 random.shuffle(floating_ips) # randomize
2042 for fip in floating_ips:
2043 if (
2044 fip.get("port_id")
2045 or fip.get("tenant_id") != server.tenant_id
2046 ):
2047 continue
2048
2049 if isinstance(floating_network["floating_ip"], str):
2050 if (
2051 fip.get("floating_network_id")
2052 != floating_network["floating_ip"]
2053 ):
2054 continue
2055
2056 free_floating_ip = fip["id"]
2057 break
2058 else:
2059 if (
2060 isinstance(floating_network["floating_ip"], str)
2061 and floating_network["floating_ip"].lower() != "true"
2062 ):
2063 pool_id = floating_network["floating_ip"]
2064 else:
2065 # Find the external network
2066 external_nets = list()
2067
2068 for net in self.neutron.list_networks()["networks"]:
2069 if net["router:external"]:
2070 external_nets.append(net)
2071
2072 if len(external_nets) == 0:
2073 raise vimconn.VimConnException(
2074 "Cannot create floating_ip automatically since "
2075 "no external network is present",
2076 http_code=vimconn.HTTP_Conflict,
2077 )
2078
2079 if len(external_nets) > 1:
2080 raise vimconn.VimConnException(
2081 "Cannot create floating_ip automatically since "
2082 "multiple external networks are present",
2083 http_code=vimconn.HTTP_Conflict,
2084 )
2085
2086 pool_id = external_nets[0].get("id")
2087
2088 param = {
2089 "floatingip": {
2090 "floating_network_id": pool_id,
2091 "tenant_id": server.tenant_id,
2092 }
2093 }
2094
2095 try:
2096 # self.logger.debug("Creating floating IP")
2097 new_floating_ip = self.neutron.create_floatingip(param)
2098 free_floating_ip = new_floating_ip["floatingip"]["id"]
2099 created_items[
2100 "floating_ip:" + str(free_floating_ip)
2101 ] = True
2102 except Exception as e:
2103 raise vimconn.VimConnException(
2104 type(e).__name__
2105 + ": Cannot create new floating_ip "
2106 + str(e),
2107 http_code=vimconn.HTTP_Conflict,
2108 )
2109
2110 try:
2111 # for race condition ensure not already assigned
2112 fip = self.neutron.show_floatingip(free_floating_ip)
2113
2114 if fip["floatingip"]["port_id"]:
2115 continue
2116
2117 # the vim_id key contains the neutron.port_id
2118 self.neutron.update_floatingip(
2119 free_floating_ip,
2120 {"floatingip": {"port_id": floating_network["vim_id"]}},
2121 )
2122 # for race condition ensure not re-assigned to other VM after 5 seconds
2123 time.sleep(5)
2124 fip = self.neutron.show_floatingip(free_floating_ip)
2125
2126 if (
2127 fip["floatingip"]["port_id"]
2128 != floating_network["vim_id"]
2129 ):
2130 self.logger.error(
2131 "floating_ip {} re-assigned to other port".format(
2132 free_floating_ip
2133 )
2134 )
2135 continue
2136
2137 self.logger.debug(
2138 "Assigned floating_ip {} to VM {}".format(
2139 free_floating_ip, server.id
2140 )
2141 )
2142 assigned = True
2143 except Exception as e:
2144 # openstack need some time after VM creation to assign an IP. So retry if fails
2145 vm_status = self.nova.servers.get(server.id).status
2146
2147 if vm_status not in ("ACTIVE", "ERROR"):
2148 if time.time() - vm_start_time < server_timeout:
2149 time.sleep(5)
2150 continue
2151 elif floating_ip_retries > 0:
2152 floating_ip_retries -= 1
2153 continue
2154
2155 raise vimconn.VimConnException(
2156 "Cannot create floating_ip: {} {}".format(
2157 type(e).__name__, e
2158 ),
2159 http_code=vimconn.HTTP_Conflict,
2160 )
2161
2162 except Exception as e:
2163 if not floating_network["exit_on_floating_ip_error"]:
2164 self.logger.error("Cannot create floating_ip. %s", str(e))
2165 continue
2166
2167 raise
2168
2169 return server.id, created_items
2170 # except nvExceptions.NotFound as e:
2171 # error_value=-vimconn.HTTP_Not_Found
2172 # error_text= "vm instance %s not found" % vm_id
2173 # except TypeError as e:
2174 # raise vimconn.VimConnException(type(e).__name__ + ": "+ str(e), http_code=vimconn.HTTP_Bad_Request)
2175
2176 except Exception as e:
2177 server_id = None
2178 if server:
2179 server_id = server.id
2180
2181 try:
2182 self.delete_vminstance(server_id, created_items)
2183 except Exception as e2:
2184 self.logger.error("new_vminstance rollback fail {}".format(e2))
2185
2186 self._format_exception(e)
2187
2188 def get_vminstance(self, vm_id):
2189 """Returns the VM instance information from VIM"""
2190 # self.logger.debug("Getting VM from VIM")
2191 try:
2192 self._reload_connection()
2193 server = self.nova.servers.find(id=vm_id)
2194 # TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
2195
2196 return server.to_dict()
2197 except (
2198 ksExceptions.ClientException,
2199 nvExceptions.ClientException,
2200 nvExceptions.NotFound,
2201 ConnectionError,
2202 ) as e:
2203 self._format_exception(e)
2204
2205 def get_vminstance_console(self, vm_id, console_type="vnc"):
2206 """
2207 Get a console for the virtual machine
2208 Params:
2209 vm_id: uuid of the VM
2210 console_type, can be:
2211 "novnc" (by default), "xvpvnc" for VNC types,
2212 "rdp-html5" for RDP types, "spice-html5" for SPICE types
2213 Returns dict with the console parameters:
2214 protocol: ssh, ftp, http, https, ...
2215 server: usually ip address
2216 port: the http, ssh, ... port
2217 suffix: extra text, e.g. the http path and query string
2218 """
2219 self.logger.debug("Getting VM CONSOLE from VIM")
2220
2221 try:
2222 self._reload_connection()
2223 server = self.nova.servers.find(id=vm_id)
2224
2225 if console_type is None or console_type == "novnc":
2226 console_dict = server.get_vnc_console("novnc")
2227 elif console_type == "xvpvnc":
2228 console_dict = server.get_vnc_console(console_type)
2229 elif console_type == "rdp-html5":
2230 console_dict = server.get_rdp_console(console_type)
2231 elif console_type == "spice-html5":
2232 console_dict = server.get_spice_console(console_type)
2233 else:
2234 raise vimconn.VimConnException(
2235 "console type '{}' not allowed".format(console_type),
2236 http_code=vimconn.HTTP_Bad_Request,
2237 )
2238
2239 console_dict1 = console_dict.get("console")
2240
2241 if console_dict1:
2242 console_url = console_dict1.get("url")
2243
2244 if console_url:
2245 # parse console_url
2246 protocol_index = console_url.find("//")
2247 suffix_index = (
2248 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2249 )
2250 port_index = (
2251 console_url[protocol_index + 2 : suffix_index].find(":")
2252 + protocol_index
2253 + 2
2254 )
2255
2256 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
2257 return (
2258 -vimconn.HTTP_Internal_Server_Error,
2259 "Unexpected response from VIM",
2260 )
2261
2262 console_dict = {
2263 "protocol": console_url[0:protocol_index],
2264 "server": console_url[protocol_index + 2 : port_index],
2265 "port": console_url[port_index:suffix_index],
2266 "suffix": console_url[suffix_index + 1 :],
2267 }
2268 protocol_index += 2
2269
2270 return console_dict
2271 raise vimconn.VimConnUnexpectedResponse("Unexpected response from VIM")
2272 except (
2273 nvExceptions.NotFound,
2274 ksExceptions.ClientException,
2275 nvExceptions.ClientException,
2276 nvExceptions.BadRequest,
2277 ConnectionError,
2278 ) as e:
2279 self._format_exception(e)
2280
2281 def delete_vminstance(self, vm_id, created_items=None, volumes_to_hold=None):
2282 """Removes a VM instance from VIM. Returns the old identifier"""
2283 # print "osconnector: Getting VM from VIM"
2284 if created_items is None:
2285 created_items = {}
2286
2287 try:
2288 self._reload_connection()
2289 # delete VM ports attached to this networks before the virtual machine
2290 for k, v in created_items.items():
2291 if not v: # skip already deleted
2292 continue
2293
2294 try:
2295 k_item, _, k_id = k.partition(":")
2296 if k_item == "port":
2297 self.neutron.delete_port(k_id)
2298 except Exception as e:
2299 self.logger.error(
2300 "Error deleting port: {}: {}".format(type(e).__name__, e)
2301 )
2302
2303 # #commented because detaching the volumes makes the servers.delete not work properly ?!?
2304 # #dettach volumes attached
2305 # server = self.nova.servers.get(vm_id)
2306 # volumes_attached_dict = server._info["os-extended-volumes:volumes_attached"] #volume["id"]
2307 # #for volume in volumes_attached_dict:
2308 # # self.cinder.volumes.detach(volume["id"])
2309
2310 if vm_id:
2311 self.nova.servers.delete(vm_id)
2312
2313 # delete volumes. Although having detached, they should have in active status before deleting
2314 # we ensure in this loop
2315 keep_waiting = True
2316 elapsed_time = 0
2317
2318 while keep_waiting and elapsed_time < volume_timeout:
2319 keep_waiting = False
2320
2321 for k, v in created_items.items():
2322 if not v: # skip already deleted
2323 continue
2324
2325 try:
2326 k_item, _, k_id = k.partition(":")
2327 if k_item == "volume":
2328 if self.cinder.volumes.get(k_id).status != "available":
2329 keep_waiting = True
2330 else:
2331 if k_id not in volumes_to_hold:
2332 self.cinder.volumes.delete(k_id)
2333 created_items[k] = None
2334 elif k_item == "floating_ip": # floating ip
2335 self.neutron.delete_floatingip(k_id)
2336 created_items[k] = None
2337
2338 except Exception as e:
2339 self.logger.error("Error deleting {}: {}".format(k, e))
2340
2341 if keep_waiting:
2342 time.sleep(1)
2343 elapsed_time += 1
2344
2345 return None
2346 except (
2347 nvExceptions.NotFound,
2348 ksExceptions.ClientException,
2349 nvExceptions.ClientException,
2350 ConnectionError,
2351 ) as e:
2352 self._format_exception(e)
2353
2354 def refresh_vms_status(self, vm_list):
2355 """Get the status of the virtual machines and their interfaces/ports
2356 Params: the list of VM identifiers
2357 Returns a dictionary with:
2358 vm_id: #VIM id of this Virtual Machine
2359 status: #Mandatory. Text with one of:
2360 # DELETED (not found at vim)
2361 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
2362 # OTHER (Vim reported other status not understood)
2363 # ERROR (VIM indicates an ERROR status)
2364 # ACTIVE, PAUSED, SUSPENDED, INACTIVE (not running),
2365 # CREATING (on building process), ERROR
2366 # ACTIVE:NoMgmtIP (Active but any of its interface has an IP address
2367 #
2368 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
2369 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2370 interfaces:
2371 - vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
2372 mac_address: #Text format XX:XX:XX:XX:XX:XX
2373 vim_net_id: #network id where this interface is connected
2374 vim_interface_id: #interface/port VIM id
2375 ip_address: #null, or text with IPv4, IPv6 address
2376 compute_node: #identification of compute node where PF,VF interface is allocated
2377 pci: #PCI address of the NIC that hosts the PF,VF
2378 vlan: #physical VLAN used for VF
2379 """
2380 vm_dict = {}
2381 self.logger.debug(
2382 "refresh_vms status: Getting tenant VM instance information from VIM"
2383 )
2384
2385 for vm_id in vm_list:
2386 vm = {}
2387
2388 try:
2389 vm_vim = self.get_vminstance(vm_id)
2390
2391 if vm_vim["status"] in vmStatus2manoFormat:
2392 vm["status"] = vmStatus2manoFormat[vm_vim["status"]]
2393 else:
2394 vm["status"] = "OTHER"
2395 vm["error_msg"] = "VIM status reported " + vm_vim["status"]
2396
2397 vm_vim.pop("OS-EXT-SRV-ATTR:user_data", None)
2398 vm_vim.pop("user_data", None)
2399 vm["vim_info"] = self.serialize(vm_vim)
2400
2401 vm["interfaces"] = []
2402 if vm_vim.get("fault"):
2403 vm["error_msg"] = str(vm_vim["fault"])
2404
2405 # get interfaces
2406 try:
2407 self._reload_connection()
2408 port_dict = self.neutron.list_ports(device_id=vm_id)
2409
2410 for port in port_dict["ports"]:
2411 interface = {}
2412 interface["vim_info"] = self.serialize(port)
2413 interface["mac_address"] = port.get("mac_address")
2414 interface["vim_net_id"] = port["network_id"]
2415 interface["vim_interface_id"] = port["id"]
2416 # check if OS-EXT-SRV-ATTR:host is there,
2417 # in case of non-admin credentials, it will be missing
2418
2419 if vm_vim.get("OS-EXT-SRV-ATTR:host"):
2420 interface["compute_node"] = vm_vim["OS-EXT-SRV-ATTR:host"]
2421
2422 interface["pci"] = None
2423
2424 # check if binding:profile is there,
2425 # in case of non-admin credentials, it will be missing
2426 if port.get("binding:profile"):
2427 if port["binding:profile"].get("pci_slot"):
2428 # TODO: At the moment sr-iov pci addresses are converted to PF pci addresses by setting
2429 # the slot to 0x00
2430 # TODO: This is just a workaround valid for niantinc. Find a better way to do so
2431 # CHANGE DDDD:BB:SS.F to DDDD:BB:00.(F%2) assuming there are 2 ports per nic
2432 pci = port["binding:profile"]["pci_slot"]
2433 # interface["pci"] = pci[:-4] + "00." + str(int(pci[-1]) % 2)
2434 interface["pci"] = pci
2435
2436 interface["vlan"] = None
2437
2438 if port.get("binding:vif_details"):
2439 interface["vlan"] = port["binding:vif_details"].get("vlan")
2440
2441 # Get vlan from network in case not present in port for those old openstacks and cases where
2442 # it is needed vlan at PT
2443 if not interface["vlan"]:
2444 # if network is of type vlan and port is of type direct (sr-iov) then set vlan id
2445 network = self.neutron.show_network(port["network_id"])
2446
2447 if (
2448 network["network"].get("provider:network_type")
2449 == "vlan"
2450 ):
2451 # and port.get("binding:vnic_type") in ("direct", "direct-physical"):
2452 interface["vlan"] = network["network"].get(
2453 "provider:segmentation_id"
2454 )
2455
2456 ips = []
2457 # look for floating ip address
2458 try:
2459 floating_ip_dict = self.neutron.list_floatingips(
2460 port_id=port["id"]
2461 )
2462
2463 if floating_ip_dict.get("floatingips"):
2464 ips.append(
2465 floating_ip_dict["floatingips"][0].get(
2466 "floating_ip_address"
2467 )
2468 )
2469 except Exception:
2470 pass
2471
2472 for subnet in port["fixed_ips"]:
2473 ips.append(subnet["ip_address"])
2474
2475 interface["ip_address"] = ";".join(ips)
2476 vm["interfaces"].append(interface)
2477 except Exception as e:
2478 self.logger.error(
2479 "Error getting vm interface information {}: {}".format(
2480 type(e).__name__, e
2481 ),
2482 exc_info=True,
2483 )
2484 except vimconn.VimConnNotFoundException as e:
2485 self.logger.error("Exception getting vm status: %s", str(e))
2486 vm["status"] = "DELETED"
2487 vm["error_msg"] = str(e)
2488 except vimconn.VimConnException as e:
2489 self.logger.error("Exception getting vm status: %s", str(e))
2490 vm["status"] = "VIM_ERROR"
2491 vm["error_msg"] = str(e)
2492
2493 vm_dict[vm_id] = vm
2494
2495 return vm_dict
2496
2497 def action_vminstance(self, vm_id, action_dict, created_items={}):
2498 """Send and action over a VM instance from VIM
2499 Returns None or the console dict if the action was successfully sent to the VIM"""
2500 self.logger.debug("Action over VM '%s': %s", vm_id, str(action_dict))
2501
2502 try:
2503 self._reload_connection()
2504 server = self.nova.servers.find(id=vm_id)
2505
2506 if "start" in action_dict:
2507 if action_dict["start"] == "rebuild":
2508 server.rebuild()
2509 else:
2510 if server.status == "PAUSED":
2511 server.unpause()
2512 elif server.status == "SUSPENDED":
2513 server.resume()
2514 elif server.status == "SHUTOFF":
2515 server.start()
2516 elif "pause" in action_dict:
2517 server.pause()
2518 elif "resume" in action_dict:
2519 server.resume()
2520 elif "shutoff" in action_dict or "shutdown" in action_dict:
2521 server.stop()
2522 elif "forceOff" in action_dict:
2523 server.stop() # TODO
2524 elif "terminate" in action_dict:
2525 server.delete()
2526 elif "createImage" in action_dict:
2527 server.create_image()
2528 # "path":path_schema,
2529 # "description":description_schema,
2530 # "name":name_schema,
2531 # "metadata":metadata_schema,
2532 # "imageRef": id_schema,
2533 # "disk": {"oneOf":[{"type": "null"}, {"type":"string"}] },
2534 elif "rebuild" in action_dict:
2535 server.rebuild(server.image["id"])
2536 elif "reboot" in action_dict:
2537 server.reboot() # reboot_type="SOFT"
2538 elif "console" in action_dict:
2539 console_type = action_dict["console"]
2540
2541 if console_type is None or console_type == "novnc":
2542 console_dict = server.get_vnc_console("novnc")
2543 elif console_type == "xvpvnc":
2544 console_dict = server.get_vnc_console(console_type)
2545 elif console_type == "rdp-html5":
2546 console_dict = server.get_rdp_console(console_type)
2547 elif console_type == "spice-html5":
2548 console_dict = server.get_spice_console(console_type)
2549 else:
2550 raise vimconn.VimConnException(
2551 "console type '{}' not allowed".format(console_type),
2552 http_code=vimconn.HTTP_Bad_Request,
2553 )
2554
2555 try:
2556 console_url = console_dict["console"]["url"]
2557 # parse console_url
2558 protocol_index = console_url.find("//")
2559 suffix_index = (
2560 console_url[protocol_index + 2 :].find("/") + protocol_index + 2
2561 )
2562 port_index = (
2563 console_url[protocol_index + 2 : suffix_index].find(":")
2564 + protocol_index
2565 + 2
2566 )
2567
2568 if protocol_index < 0 or port_index < 0 or suffix_index < 0:
2569 raise vimconn.VimConnException(
2570 "Unexpected response from VIM " + str(console_dict)
2571 )
2572
2573 console_dict2 = {
2574 "protocol": console_url[0:protocol_index],
2575 "server": console_url[protocol_index + 2 : port_index],
2576 "port": int(console_url[port_index + 1 : suffix_index]),
2577 "suffix": console_url[suffix_index + 1 :],
2578 }
2579
2580 return console_dict2
2581 except Exception:
2582 raise vimconn.VimConnException(
2583 "Unexpected response from VIM " + str(console_dict)
2584 )
2585
2586 return None
2587 except (
2588 ksExceptions.ClientException,
2589 nvExceptions.ClientException,
2590 nvExceptions.NotFound,
2591 ConnectionError,
2592 ) as e:
2593 self._format_exception(e)
2594 # TODO insert exception vimconn.HTTP_Unauthorized
2595
2596 # ###### VIO Specific Changes #########
2597 def _generate_vlanID(self):
2598 """
2599 Method to get unused vlanID
2600 Args:
2601 None
2602 Returns:
2603 vlanID
2604 """
2605 # Get used VLAN IDs
2606 usedVlanIDs = []
2607 networks = self.get_network_list()
2608
2609 for net in networks:
2610 if net.get("provider:segmentation_id"):
2611 usedVlanIDs.append(net.get("provider:segmentation_id"))
2612
2613 used_vlanIDs = set(usedVlanIDs)
2614
2615 # find unused VLAN ID
2616 for vlanID_range in self.config.get("dataplane_net_vlan_range"):
2617 try:
2618 start_vlanid, end_vlanid = map(
2619 int, vlanID_range.replace(" ", "").split("-")
2620 )
2621
2622 for vlanID in range(start_vlanid, end_vlanid + 1):
2623 if vlanID not in used_vlanIDs:
2624 return vlanID
2625 except Exception as exp:
2626 raise vimconn.VimConnException(
2627 "Exception {} occurred while generating VLAN ID.".format(exp)
2628 )
2629 else:
2630 raise vimconn.VimConnConflictException(
2631 "Unable to create the SRIOV VLAN network. All given Vlan IDs {} are in use.".format(
2632 self.config.get("dataplane_net_vlan_range")
2633 )
2634 )
2635
2636 def _generate_multisegment_vlanID(self):
2637 """
2638 Method to get unused vlanID
2639 Args:
2640 None
2641 Returns:
2642 vlanID
2643 """
2644 # Get used VLAN IDs
2645 usedVlanIDs = []
2646 networks = self.get_network_list()
2647 for net in networks:
2648 if net.get("provider:network_type") == "vlan" and net.get(
2649 "provider:segmentation_id"
2650 ):
2651 usedVlanIDs.append(net.get("provider:segmentation_id"))
2652 elif net.get("segments"):
2653 for segment in net.get("segments"):
2654 if segment.get("provider:network_type") == "vlan" and segment.get(
2655 "provider:segmentation_id"
2656 ):
2657 usedVlanIDs.append(segment.get("provider:segmentation_id"))
2658
2659 used_vlanIDs = set(usedVlanIDs)
2660
2661 # find unused VLAN ID
2662 for vlanID_range in self.config.get("multisegment_vlan_range"):
2663 try:
2664 start_vlanid, end_vlanid = map(
2665 int, vlanID_range.replace(" ", "").split("-")
2666 )
2667
2668 for vlanID in range(start_vlanid, end_vlanid + 1):
2669 if vlanID not in used_vlanIDs:
2670 return vlanID
2671 except Exception as exp:
2672 raise vimconn.VimConnException(
2673 "Exception {} occurred while generating VLAN ID.".format(exp)
2674 )
2675 else:
2676 raise vimconn.VimConnConflictException(
2677 "Unable to create the VLAN segment. All VLAN IDs {} are in use.".format(
2678 self.config.get("multisegment_vlan_range")
2679 )
2680 )
2681
2682 def _validate_vlan_ranges(self, input_vlan_range, text_vlan_range):
2683 """
2684 Method to validate user given vlanID ranges
2685 Args: None
2686 Returns: None
2687 """
2688 for vlanID_range in input_vlan_range:
2689 vlan_range = vlanID_range.replace(" ", "")
2690 # validate format
2691 vlanID_pattern = r"(\d)*-(\d)*$"
2692 match_obj = re.match(vlanID_pattern, vlan_range)
2693 if not match_obj:
2694 raise vimconn.VimConnConflictException(
2695 "Invalid VLAN range for {}: {}.You must provide "
2696 "'{}' in format [start_ID - end_ID].".format(
2697 text_vlan_range, vlanID_range, text_vlan_range
2698 )
2699 )
2700
2701 start_vlanid, end_vlanid = map(int, vlan_range.split("-"))
2702 if start_vlanid <= 0:
2703 raise vimconn.VimConnConflictException(
2704 "Invalid VLAN range for {}: {}. Start ID can not be zero. For VLAN "
2705 "networks valid IDs are 1 to 4094 ".format(
2706 text_vlan_range, vlanID_range
2707 )
2708 )
2709
2710 if end_vlanid > 4094:
2711 raise vimconn.VimConnConflictException(
2712 "Invalid VLAN range for {}: {}. End VLAN ID can not be "
2713 "greater than 4094. For VLAN networks valid IDs are 1 to 4094 ".format(
2714 text_vlan_range, vlanID_range
2715 )
2716 )
2717
2718 if start_vlanid > end_vlanid:
2719 raise vimconn.VimConnConflictException(
2720 "Invalid VLAN range for {}: {}. You must provide '{}'"
2721 " in format start_ID - end_ID and start_ID < end_ID ".format(
2722 text_vlan_range, vlanID_range, text_vlan_range
2723 )
2724 )
2725
2726 # NOT USED FUNCTIONS
2727
2728 def new_external_port(self, port_data):
2729 """Adds a external port to VIM
2730 Returns the port identifier"""
2731 # TODO openstack if needed
2732 return (
2733 -vimconn.HTTP_Internal_Server_Error,
2734 "osconnector.new_external_port() not implemented",
2735 )
2736
2737 def connect_port_network(self, port_id, network_id, admin=False):
2738 """Connects a external port to a network
2739 Returns status code of the VIM response"""
2740 # TODO openstack if needed
2741 return (
2742 -vimconn.HTTP_Internal_Server_Error,
2743 "osconnector.connect_port_network() not implemented",
2744 )
2745
2746 def new_user(self, user_name, user_passwd, tenant_id=None):
2747 """Adds a new user to openstack VIM
2748 Returns the user identifier"""
2749 self.logger.debug("osconnector: Adding a new user to VIM")
2750
2751 try:
2752 self._reload_connection()
2753 user = self.keystone.users.create(
2754 user_name, password=user_passwd, default_project=tenant_id
2755 )
2756 # self.keystone.tenants.add_user(self.k_creds["username"], #role)
2757
2758 return user.id
2759 except ksExceptions.ConnectionError as e:
2760 error_value = -vimconn.HTTP_Bad_Request
2761 error_text = (
2762 type(e).__name__
2763 + ": "
2764 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2765 )
2766 except ksExceptions.ClientException as e: # TODO remove
2767 error_value = -vimconn.HTTP_Bad_Request
2768 error_text = (
2769 type(e).__name__
2770 + ": "
2771 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2772 )
2773
2774 # TODO insert exception vimconn.HTTP_Unauthorized
2775 # if reaching here is because an exception
2776 self.logger.debug("new_user " + error_text)
2777
2778 return error_value, error_text
2779
2780 def delete_user(self, user_id):
2781 """Delete a user from openstack VIM
2782 Returns the user identifier"""
2783 if self.debug:
2784 print("osconnector: Deleting a user from VIM")
2785
2786 try:
2787 self._reload_connection()
2788 self.keystone.users.delete(user_id)
2789
2790 return 1, user_id
2791 except ksExceptions.ConnectionError as e:
2792 error_value = -vimconn.HTTP_Bad_Request
2793 error_text = (
2794 type(e).__name__
2795 + ": "
2796 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2797 )
2798 except ksExceptions.NotFound as e:
2799 error_value = -vimconn.HTTP_Not_Found
2800 error_text = (
2801 type(e).__name__
2802 + ": "
2803 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2804 )
2805 except ksExceptions.ClientException as e: # TODO remove
2806 error_value = -vimconn.HTTP_Bad_Request
2807 error_text = (
2808 type(e).__name__
2809 + ": "
2810 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2811 )
2812
2813 # TODO insert exception vimconn.HTTP_Unauthorized
2814 # if reaching here is because an exception
2815 self.logger.debug("delete_tenant " + error_text)
2816
2817 return error_value, error_text
2818
2819 def get_hosts_info(self):
2820 """Get the information of deployed hosts
2821 Returns the hosts content"""
2822 if self.debug:
2823 print("osconnector: Getting Host info from VIM")
2824
2825 try:
2826 h_list = []
2827 self._reload_connection()
2828 hypervisors = self.nova.hypervisors.list()
2829
2830 for hype in hypervisors:
2831 h_list.append(hype.to_dict())
2832
2833 return 1, {"hosts": h_list}
2834 except nvExceptions.NotFound as e:
2835 error_value = -vimconn.HTTP_Not_Found
2836 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
2837 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
2838 error_value = -vimconn.HTTP_Bad_Request
2839 error_text = (
2840 type(e).__name__
2841 + ": "
2842 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2843 )
2844
2845 # TODO insert exception vimconn.HTTP_Unauthorized
2846 # if reaching here is because an exception
2847 self.logger.debug("get_hosts_info " + error_text)
2848
2849 return error_value, error_text
2850
2851 def get_hosts(self, vim_tenant):
2852 """Get the hosts and deployed instances
2853 Returns the hosts content"""
2854 r, hype_dict = self.get_hosts_info()
2855
2856 if r < 0:
2857 return r, hype_dict
2858
2859 hypervisors = hype_dict["hosts"]
2860
2861 try:
2862 servers = self.nova.servers.list()
2863 for hype in hypervisors:
2864 for server in servers:
2865 if (
2866 server.to_dict()["OS-EXT-SRV-ATTR:hypervisor_hostname"]
2867 == hype["hypervisor_hostname"]
2868 ):
2869 if "vm" in hype:
2870 hype["vm"].append(server.id)
2871 else:
2872 hype["vm"] = [server.id]
2873
2874 return 1, hype_dict
2875 except nvExceptions.NotFound as e:
2876 error_value = -vimconn.HTTP_Not_Found
2877 error_text = str(e) if len(e.args) == 0 else str(e.args[0])
2878 except (ksExceptions.ClientException, nvExceptions.ClientException) as e:
2879 error_value = -vimconn.HTTP_Bad_Request
2880 error_text = (
2881 type(e).__name__
2882 + ": "
2883 + (str(e) if len(e.args) == 0 else str(e.args[0]))
2884 )
2885
2886 # TODO insert exception vimconn.HTTP_Unauthorized
2887 # if reaching here is because an exception
2888 self.logger.debug("get_hosts " + error_text)
2889
2890 return error_value, error_text
2891
2892 def new_classification(self, name, ctype, definition):
2893 self.logger.debug(
2894 "Adding a new (Traffic) Classification to VIM, named %s", name
2895 )
2896
2897 try:
2898 new_class = None
2899 self._reload_connection()
2900
2901 if ctype not in supportedClassificationTypes:
2902 raise vimconn.VimConnNotSupportedException(
2903 "OpenStack VIM connector does not support provided "
2904 "Classification Type {}, supported ones are: {}".format(
2905 ctype, supportedClassificationTypes
2906 )
2907 )
2908
2909 if not self._validate_classification(ctype, definition):
2910 raise vimconn.VimConnException(
2911 "Incorrect Classification definition for the type specified."
2912 )
2913
2914 classification_dict = definition
2915 classification_dict["name"] = name
2916 new_class = self.neutron.create_sfc_flow_classifier(
2917 {"flow_classifier": classification_dict}
2918 )
2919
2920 return new_class["flow_classifier"]["id"]
2921 except (
2922 neExceptions.ConnectionFailed,
2923 ksExceptions.ClientException,
2924 neExceptions.NeutronException,
2925 ConnectionError,
2926 ) as e:
2927 self.logger.error("Creation of Classification failed.")
2928 self._format_exception(e)
2929
2930 def get_classification(self, class_id):
2931 self.logger.debug(" Getting Classification %s from VIM", class_id)
2932 filter_dict = {"id": class_id}
2933 class_list = self.get_classification_list(filter_dict)
2934
2935 if len(class_list) == 0:
2936 raise vimconn.VimConnNotFoundException(
2937 "Classification '{}' not found".format(class_id)
2938 )
2939 elif len(class_list) > 1:
2940 raise vimconn.VimConnConflictException(
2941 "Found more than one Classification with this criteria"
2942 )
2943
2944 classification = class_list[0]
2945
2946 return classification
2947
2948 def get_classification_list(self, filter_dict={}):
2949 self.logger.debug(
2950 "Getting Classifications from VIM filter: '%s'", str(filter_dict)
2951 )
2952
2953 try:
2954 filter_dict_os = filter_dict.copy()
2955 self._reload_connection()
2956
2957 if self.api_version3 and "tenant_id" in filter_dict_os:
2958 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
2959
2960 classification_dict = self.neutron.list_sfc_flow_classifiers(
2961 **filter_dict_os
2962 )
2963 classification_list = classification_dict["flow_classifiers"]
2964 self.__classification_os2mano(classification_list)
2965
2966 return classification_list
2967 except (
2968 neExceptions.ConnectionFailed,
2969 ksExceptions.ClientException,
2970 neExceptions.NeutronException,
2971 ConnectionError,
2972 ) as e:
2973 self._format_exception(e)
2974
2975 def delete_classification(self, class_id):
2976 self.logger.debug("Deleting Classification '%s' from VIM", class_id)
2977
2978 try:
2979 self._reload_connection()
2980 self.neutron.delete_sfc_flow_classifier(class_id)
2981
2982 return class_id
2983 except (
2984 neExceptions.ConnectionFailed,
2985 neExceptions.NeutronException,
2986 ksExceptions.ClientException,
2987 neExceptions.NeutronException,
2988 ConnectionError,
2989 ) as e:
2990 self._format_exception(e)
2991
2992 def new_sfi(self, name, ingress_ports, egress_ports, sfc_encap=True):
2993 self.logger.debug(
2994 "Adding a new Service Function Instance to VIM, named '%s'", name
2995 )
2996
2997 try:
2998 new_sfi = None
2999 self._reload_connection()
3000 correlation = None
3001
3002 if sfc_encap:
3003 correlation = "nsh"
3004
3005 if len(ingress_ports) != 1:
3006 raise vimconn.VimConnNotSupportedException(
3007 "OpenStack VIM connector can only have 1 ingress port per SFI"
3008 )
3009
3010 if len(egress_ports) != 1:
3011 raise vimconn.VimConnNotSupportedException(
3012 "OpenStack VIM connector can only have 1 egress port per SFI"
3013 )
3014
3015 sfi_dict = {
3016 "name": name,
3017 "ingress": ingress_ports[0],
3018 "egress": egress_ports[0],
3019 "service_function_parameters": {"correlation": correlation},
3020 }
3021 new_sfi = self.neutron.create_sfc_port_pair({"port_pair": sfi_dict})
3022
3023 return new_sfi["port_pair"]["id"]
3024 except (
3025 neExceptions.ConnectionFailed,
3026 ksExceptions.ClientException,
3027 neExceptions.NeutronException,
3028 ConnectionError,
3029 ) as e:
3030 if new_sfi:
3031 try:
3032 self.neutron.delete_sfc_port_pair(new_sfi["port_pair"]["id"])
3033 except Exception:
3034 self.logger.error(
3035 "Creation of Service Function Instance failed, with "
3036 "subsequent deletion failure as well."
3037 )
3038
3039 self._format_exception(e)
3040
3041 def get_sfi(self, sfi_id):
3042 self.logger.debug("Getting Service Function Instance %s from VIM", sfi_id)
3043 filter_dict = {"id": sfi_id}
3044 sfi_list = self.get_sfi_list(filter_dict)
3045
3046 if len(sfi_list) == 0:
3047 raise vimconn.VimConnNotFoundException(
3048 "Service Function Instance '{}' not found".format(sfi_id)
3049 )
3050 elif len(sfi_list) > 1:
3051 raise vimconn.VimConnConflictException(
3052 "Found more than one Service Function Instance with this criteria"
3053 )
3054
3055 sfi = sfi_list[0]
3056
3057 return sfi
3058
3059 def get_sfi_list(self, filter_dict={}):
3060 self.logger.debug(
3061 "Getting Service Function Instances from VIM filter: '%s'", str(filter_dict)
3062 )
3063
3064 try:
3065 self._reload_connection()
3066 filter_dict_os = filter_dict.copy()
3067
3068 if self.api_version3 and "tenant_id" in filter_dict_os:
3069 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3070
3071 sfi_dict = self.neutron.list_sfc_port_pairs(**filter_dict_os)
3072 sfi_list = sfi_dict["port_pairs"]
3073 self.__sfi_os2mano(sfi_list)
3074
3075 return sfi_list
3076 except (
3077 neExceptions.ConnectionFailed,
3078 ksExceptions.ClientException,
3079 neExceptions.NeutronException,
3080 ConnectionError,
3081 ) as e:
3082 self._format_exception(e)
3083
3084 def delete_sfi(self, sfi_id):
3085 self.logger.debug("Deleting Service Function Instance '%s' from VIM", sfi_id)
3086
3087 try:
3088 self._reload_connection()
3089 self.neutron.delete_sfc_port_pair(sfi_id)
3090
3091 return sfi_id
3092 except (
3093 neExceptions.ConnectionFailed,
3094 neExceptions.NeutronException,
3095 ksExceptions.ClientException,
3096 neExceptions.NeutronException,
3097 ConnectionError,
3098 ) as e:
3099 self._format_exception(e)
3100
3101 def new_sf(self, name, sfis, sfc_encap=True):
3102 self.logger.debug("Adding a new Service Function to VIM, named '%s'", name)
3103
3104 try:
3105 new_sf = None
3106 self._reload_connection()
3107 # correlation = None
3108 # if sfc_encap:
3109 # correlation = "nsh"
3110
3111 for instance in sfis:
3112 sfi = self.get_sfi(instance)
3113
3114 if sfi.get("sfc_encap") != sfc_encap:
3115 raise vimconn.VimConnNotSupportedException(
3116 "OpenStack VIM connector requires all SFIs of the "
3117 "same SF to share the same SFC Encapsulation"
3118 )
3119
3120 sf_dict = {"name": name, "port_pairs": sfis}
3121 new_sf = self.neutron.create_sfc_port_pair_group(
3122 {"port_pair_group": sf_dict}
3123 )
3124
3125 return new_sf["port_pair_group"]["id"]
3126 except (
3127 neExceptions.ConnectionFailed,
3128 ksExceptions.ClientException,
3129 neExceptions.NeutronException,
3130 ConnectionError,
3131 ) as e:
3132 if new_sf:
3133 try:
3134 self.neutron.delete_sfc_port_pair_group(
3135 new_sf["port_pair_group"]["id"]
3136 )
3137 except Exception:
3138 self.logger.error(
3139 "Creation of Service Function failed, with "
3140 "subsequent deletion failure as well."
3141 )
3142
3143 self._format_exception(e)
3144
3145 def get_sf(self, sf_id):
3146 self.logger.debug("Getting Service Function %s from VIM", sf_id)
3147 filter_dict = {"id": sf_id}
3148 sf_list = self.get_sf_list(filter_dict)
3149
3150 if len(sf_list) == 0:
3151 raise vimconn.VimConnNotFoundException(
3152 "Service Function '{}' not found".format(sf_id)
3153 )
3154 elif len(sf_list) > 1:
3155 raise vimconn.VimConnConflictException(
3156 "Found more than one Service Function with this criteria"
3157 )
3158
3159 sf = sf_list[0]
3160
3161 return sf
3162
3163 def get_sf_list(self, filter_dict={}):
3164 self.logger.debug(
3165 "Getting Service Function from VIM filter: '%s'", str(filter_dict)
3166 )
3167
3168 try:
3169 self._reload_connection()
3170 filter_dict_os = filter_dict.copy()
3171
3172 if self.api_version3 and "tenant_id" in filter_dict_os:
3173 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3174
3175 sf_dict = self.neutron.list_sfc_port_pair_groups(**filter_dict_os)
3176 sf_list = sf_dict["port_pair_groups"]
3177 self.__sf_os2mano(sf_list)
3178
3179 return sf_list
3180 except (
3181 neExceptions.ConnectionFailed,
3182 ksExceptions.ClientException,
3183 neExceptions.NeutronException,
3184 ConnectionError,
3185 ) as e:
3186 self._format_exception(e)
3187
3188 def delete_sf(self, sf_id):
3189 self.logger.debug("Deleting Service Function '%s' from VIM", sf_id)
3190
3191 try:
3192 self._reload_connection()
3193 self.neutron.delete_sfc_port_pair_group(sf_id)
3194
3195 return sf_id
3196 except (
3197 neExceptions.ConnectionFailed,
3198 neExceptions.NeutronException,
3199 ksExceptions.ClientException,
3200 neExceptions.NeutronException,
3201 ConnectionError,
3202 ) as e:
3203 self._format_exception(e)
3204
3205 def new_sfp(self, name, classifications, sfs, sfc_encap=True, spi=None):
3206 self.logger.debug("Adding a new Service Function Path to VIM, named '%s'", name)
3207
3208 try:
3209 new_sfp = None
3210 self._reload_connection()
3211 # In networking-sfc the MPLS encapsulation is legacy
3212 # should be used when no full SFC Encapsulation is intended
3213 correlation = "mpls"
3214
3215 if sfc_encap:
3216 correlation = "nsh"
3217
3218 sfp_dict = {
3219 "name": name,
3220 "flow_classifiers": classifications,
3221 "port_pair_groups": sfs,
3222 "chain_parameters": {"correlation": correlation},
3223 }
3224
3225 if spi:
3226 sfp_dict["chain_id"] = spi
3227
3228 new_sfp = self.neutron.create_sfc_port_chain({"port_chain": sfp_dict})
3229
3230 return new_sfp["port_chain"]["id"]
3231 except (
3232 neExceptions.ConnectionFailed,
3233 ksExceptions.ClientException,
3234 neExceptions.NeutronException,
3235 ConnectionError,
3236 ) as e:
3237 if new_sfp:
3238 try:
3239 self.neutron.delete_sfc_port_chain(new_sfp["port_chain"]["id"])
3240 except Exception:
3241 self.logger.error(
3242 "Creation of Service Function Path failed, with "
3243 "subsequent deletion failure as well."
3244 )
3245
3246 self._format_exception(e)
3247
3248 def get_sfp(self, sfp_id):
3249 self.logger.debug(" Getting Service Function Path %s from VIM", sfp_id)
3250
3251 filter_dict = {"id": sfp_id}
3252 sfp_list = self.get_sfp_list(filter_dict)
3253
3254 if len(sfp_list) == 0:
3255 raise vimconn.VimConnNotFoundException(
3256 "Service Function Path '{}' not found".format(sfp_id)
3257 )
3258 elif len(sfp_list) > 1:
3259 raise vimconn.VimConnConflictException(
3260 "Found more than one Service Function Path with this criteria"
3261 )
3262
3263 sfp = sfp_list[0]
3264
3265 return sfp
3266
3267 def get_sfp_list(self, filter_dict={}):
3268 self.logger.debug(
3269 "Getting Service Function Paths from VIM filter: '%s'", str(filter_dict)
3270 )
3271
3272 try:
3273 self._reload_connection()
3274 filter_dict_os = filter_dict.copy()
3275
3276 if self.api_version3 and "tenant_id" in filter_dict_os:
3277 filter_dict_os["project_id"] = filter_dict_os.pop("tenant_id")
3278
3279 sfp_dict = self.neutron.list_sfc_port_chains(**filter_dict_os)
3280 sfp_list = sfp_dict["port_chains"]
3281 self.__sfp_os2mano(sfp_list)
3282
3283 return sfp_list
3284 except (
3285 neExceptions.ConnectionFailed,
3286 ksExceptions.ClientException,
3287 neExceptions.NeutronException,
3288 ConnectionError,
3289 ) as e:
3290 self._format_exception(e)
3291
3292 def delete_sfp(self, sfp_id):
3293 self.logger.debug("Deleting Service Function Path '%s' from VIM", sfp_id)
3294
3295 try:
3296 self._reload_connection()
3297 self.neutron.delete_sfc_port_chain(sfp_id)
3298
3299 return sfp_id
3300 except (
3301 neExceptions.ConnectionFailed,
3302 neExceptions.NeutronException,
3303 ksExceptions.ClientException,
3304 neExceptions.NeutronException,
3305 ConnectionError,
3306 ) as e:
3307 self._format_exception(e)
3308
3309 def refresh_sfps_status(self, sfp_list):
3310 """Get the status of the service function path
3311 Params: the list of sfp identifiers
3312 Returns a dictionary with:
3313 vm_id: #VIM id of this service function path
3314 status: #Mandatory. Text with one of:
3315 # DELETED (not found at vim)
3316 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3317 # OTHER (Vim reported other status not understood)
3318 # ERROR (VIM indicates an ERROR status)
3319 # ACTIVE,
3320 # CREATING (on building process)
3321 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3322 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)F
3323 """
3324 sfp_dict = {}
3325 self.logger.debug(
3326 "refresh_sfps status: Getting tenant SFP information from VIM"
3327 )
3328
3329 for sfp_id in sfp_list:
3330 sfp = {}
3331
3332 try:
3333 sfp_vim = self.get_sfp(sfp_id)
3334
3335 if sfp_vim["spi"]:
3336 sfp["status"] = vmStatus2manoFormat["ACTIVE"]
3337 else:
3338 sfp["status"] = "OTHER"
3339 sfp["error_msg"] = "VIM status reported " + sfp["status"]
3340
3341 sfp["vim_info"] = self.serialize(sfp_vim)
3342
3343 if sfp_vim.get("fault"):
3344 sfp["error_msg"] = str(sfp_vim["fault"])
3345 except vimconn.VimConnNotFoundException as e:
3346 self.logger.error("Exception getting sfp status: %s", str(e))
3347 sfp["status"] = "DELETED"
3348 sfp["error_msg"] = str(e)
3349 except vimconn.VimConnException as e:
3350 self.logger.error("Exception getting sfp status: %s", str(e))
3351 sfp["status"] = "VIM_ERROR"
3352 sfp["error_msg"] = str(e)
3353
3354 sfp_dict[sfp_id] = sfp
3355
3356 return sfp_dict
3357
3358 def refresh_sfis_status(self, sfi_list):
3359 """Get the status of the service function instances
3360 Params: the list of sfi identifiers
3361 Returns a dictionary with:
3362 vm_id: #VIM id of this service function instance
3363 status: #Mandatory. Text with one of:
3364 # DELETED (not found at vim)
3365 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3366 # OTHER (Vim reported other status not understood)
3367 # ERROR (VIM indicates an ERROR status)
3368 # ACTIVE,
3369 # CREATING (on building process)
3370 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3371 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
3372 """
3373 sfi_dict = {}
3374 self.logger.debug(
3375 "refresh_sfis status: Getting tenant sfi information from VIM"
3376 )
3377
3378 for sfi_id in sfi_list:
3379 sfi = {}
3380
3381 try:
3382 sfi_vim = self.get_sfi(sfi_id)
3383
3384 if sfi_vim:
3385 sfi["status"] = vmStatus2manoFormat["ACTIVE"]
3386 else:
3387 sfi["status"] = "OTHER"
3388 sfi["error_msg"] = "VIM status reported " + sfi["status"]
3389
3390 sfi["vim_info"] = self.serialize(sfi_vim)
3391
3392 if sfi_vim.get("fault"):
3393 sfi["error_msg"] = str(sfi_vim["fault"])
3394 except vimconn.VimConnNotFoundException as e:
3395 self.logger.error("Exception getting sfi status: %s", str(e))
3396 sfi["status"] = "DELETED"
3397 sfi["error_msg"] = str(e)
3398 except vimconn.VimConnException as e:
3399 self.logger.error("Exception getting sfi status: %s", str(e))
3400 sfi["status"] = "VIM_ERROR"
3401 sfi["error_msg"] = str(e)
3402
3403 sfi_dict[sfi_id] = sfi
3404
3405 return sfi_dict
3406
3407 def refresh_sfs_status(self, sf_list):
3408 """Get the status of the service functions
3409 Params: the list of sf identifiers
3410 Returns a dictionary with:
3411 vm_id: #VIM id of this service function
3412 status: #Mandatory. Text with one of:
3413 # DELETED (not found at vim)
3414 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3415 # OTHER (Vim reported other status not understood)
3416 # ERROR (VIM indicates an ERROR status)
3417 # ACTIVE,
3418 # CREATING (on building process)
3419 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3420 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
3421 """
3422 sf_dict = {}
3423 self.logger.debug("refresh_sfs status: Getting tenant sf information from VIM")
3424
3425 for sf_id in sf_list:
3426 sf = {}
3427
3428 try:
3429 sf_vim = self.get_sf(sf_id)
3430
3431 if sf_vim:
3432 sf["status"] = vmStatus2manoFormat["ACTIVE"]
3433 else:
3434 sf["status"] = "OTHER"
3435 sf["error_msg"] = "VIM status reported " + sf_vim["status"]
3436
3437 sf["vim_info"] = self.serialize(sf_vim)
3438
3439 if sf_vim.get("fault"):
3440 sf["error_msg"] = str(sf_vim["fault"])
3441 except vimconn.VimConnNotFoundException as e:
3442 self.logger.error("Exception getting sf status: %s", str(e))
3443 sf["status"] = "DELETED"
3444 sf["error_msg"] = str(e)
3445 except vimconn.VimConnException as e:
3446 self.logger.error("Exception getting sf status: %s", str(e))
3447 sf["status"] = "VIM_ERROR"
3448 sf["error_msg"] = str(e)
3449
3450 sf_dict[sf_id] = sf
3451
3452 return sf_dict
3453
3454 def refresh_classifications_status(self, classification_list):
3455 """Get the status of the classifications
3456 Params: the list of classification identifiers
3457 Returns a dictionary with:
3458 vm_id: #VIM id of this classifier
3459 status: #Mandatory. Text with one of:
3460 # DELETED (not found at vim)
3461 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
3462 # OTHER (Vim reported other status not understood)
3463 # ERROR (VIM indicates an ERROR status)
3464 # ACTIVE,
3465 # CREATING (on building process)
3466 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
3467 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
3468 """
3469 classification_dict = {}
3470 self.logger.debug(
3471 "refresh_classifications status: Getting tenant classification information from VIM"
3472 )
3473
3474 for classification_id in classification_list:
3475 classification = {}
3476
3477 try:
3478 classification_vim = self.get_classification(classification_id)
3479
3480 if classification_vim:
3481 classification["status"] = vmStatus2manoFormat["ACTIVE"]
3482 else:
3483 classification["status"] = "OTHER"
3484 classification["error_msg"] = (
3485 "VIM status reported " + classification["status"]
3486 )
3487
3488 classification["vim_info"] = self.serialize(classification_vim)
3489
3490 if classification_vim.get("fault"):
3491 classification["error_msg"] = str(classification_vim["fault"])
3492 except vimconn.VimConnNotFoundException as e:
3493 self.logger.error("Exception getting classification status: %s", str(e))
3494 classification["status"] = "DELETED"
3495 classification["error_msg"] = str(e)
3496 except vimconn.VimConnException as e:
3497 self.logger.error("Exception getting classification status: %s", str(e))
3498 classification["status"] = "VIM_ERROR"
3499 classification["error_msg"] = str(e)
3500
3501 classification_dict[classification_id] = classification
3502
3503 return classification_dict
3504
3505 def new_affinity_group(self, affinity_group_data):
3506 """Adds a server group to VIM
3507 affinity_group_data contains a dictionary with information, keys:
3508 name: name in VIM for the server group
3509 type: affinity or anti-affinity
3510 scope: Only nfvi-node allowed
3511 Returns the server group identifier"""
3512 self.logger.debug("Adding Server Group '%s'", str(affinity_group_data))
3513
3514 try:
3515 name = affinity_group_data["name"]
3516 policy = affinity_group_data["type"]
3517
3518 self._reload_connection()
3519 new_server_group = self.nova.server_groups.create(name, policy)
3520
3521 return new_server_group.id
3522 except (
3523 ksExceptions.ClientException,
3524 nvExceptions.ClientException,
3525 ConnectionError,
3526 KeyError,
3527 ) as e:
3528 self._format_exception(e)
3529
3530 def get_affinity_group(self, affinity_group_id):
3531 """Obtain server group details from the VIM. Returns the server group detais as a dict"""
3532 self.logger.debug("Getting flavor '%s'", affinity_group_id)
3533 try:
3534 self._reload_connection()
3535 server_group = self.nova.server_groups.find(id=affinity_group_id)
3536
3537 return server_group.to_dict()
3538 except (
3539 nvExceptions.NotFound,
3540 nvExceptions.ClientException,
3541 ksExceptions.ClientException,
3542 ConnectionError,
3543 ) as e:
3544 self._format_exception(e)
3545
3546 def delete_affinity_group(self, affinity_group_id):
3547 """Deletes a server group from the VIM. Returns the old affinity_group_id"""
3548 self.logger.debug("Getting server group '%s'", affinity_group_id)
3549 try:
3550 self._reload_connection()
3551 self.nova.server_groups.delete(affinity_group_id)
3552
3553 return affinity_group_id
3554 except (
3555 nvExceptions.NotFound,
3556 ksExceptions.ClientException,
3557 nvExceptions.ClientException,
3558 ConnectionError,
3559 ) as e:
3560 self._format_exception(e)