1 # -*- coding: utf-8 -*-
4 # Copyright 2015 Telefonica Investigacion y Desarrollo, S.A.U.
5 # This file is part of openmano
8 # Licensed under the Apache License, Version 2.0 (the "License"); you may
9 # not use this file except in compliance with the License. You may obtain
10 # a copy of the License at
12 # http://www.apache.org/licenses/LICENSE-2.0
14 # Unless required by applicable law or agreed to in writing, software
15 # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
17 # License for the specific language governing permissions and limitations
20 # For those usages not covered by the Apache License, Version 2.0 please
21 # contact with: nfvlabs@tid.es
25 osconnector implements all the methods to interact with openstack using the python-neutronclient.
27 For the VNF forwarding graph, The OpenStack VIM connector calls the
28 networking-sfc Neutron extension methods, whose resources are mapped
29 to the VIM connector's SFC resources as follows:
30 - Classification (OSM) -> Flow Classifier (Neutron)
31 - Service Function Instance (OSM) -> Port Pair (Neutron)
32 - Service Function (OSM) -> Port Pair Group (Neutron)
33 - Service Function Path (OSM) -> Port Chain (Neutron)
35 __author__
= "Alfonso Tierno, Gerardo Garcia, Pablo Montes, xFlow Research, Igor D.C., Eduardo Sousa"
36 __date__
= "$22-sep-2017 23:59:59$"
47 from pprint
import pformat
48 from types
import StringTypes
50 from novaclient
import client
as nClient
, exceptions
as nvExceptions
51 from keystoneauth1
.identity
import v2
, v3
52 from keystoneauth1
import session
53 import keystoneclient
.exceptions
as ksExceptions
54 import keystoneclient
.v3
.client
as ksClient_v3
55 import keystoneclient
.v2_0
.client
as ksClient_v2
56 from glanceclient
import client
as glClient
57 import glanceclient
.exc
as gl1Exceptions
58 from cinderclient
import client
as cClient
59 from httplib
import HTTPException
60 from neutronclient
.neutron
import client
as neClient
61 from neutronclient
.common
import exceptions
as neExceptions
62 from requests
.exceptions
import ConnectionError
65 """contain the openstack virtual machine status to openmano status"""
66 vmStatus2manoFormat
={'ACTIVE':'ACTIVE',
68 'SUSPENDED': 'SUSPENDED',
71 'ERROR':'ERROR','DELETED':'DELETED'
73 netStatus2manoFormat
={'ACTIVE':'ACTIVE','PAUSED':'PAUSED','INACTIVE':'INACTIVE','BUILD':'BUILD','ERROR':'ERROR','DELETED':'DELETED'
76 supportedClassificationTypes
= ['legacy_flow_classifier']
78 #global var to have a timeout creating and deleting volumes
83 class SafeDumper(yaml
.SafeDumper
):
84 def represent_data(self
, data
):
85 # Openstack APIs use custom subclasses of dict and YAML safe dumper
86 # is designed to not handle that (reference issue 142 of pyyaml)
87 if isinstance(data
, dict) and data
.__class
__ != dict:
88 # A simple solution is to convert those items back to dicts
89 data
= dict(data
.items())
91 return super(SafeDumper
, self
).represent_data(data
)
94 class vimconnector(vimconn
.vimconnector
):
95 def __init__(self
, uuid
, name
, tenant_id
, tenant_name
, url
, url_admin
=None, user
=None, passwd
=None,
96 log_level
=None, config
={}, persistent_info
={}):
97 '''using common constructor parameters. In this case
98 'url' is the keystone authorization url,
99 'url_admin' is not use
101 api_version
= config
.get('APIversion')
102 if api_version
and api_version
not in ('v3.3', 'v2.0', '2', '3'):
103 raise vimconn
.vimconnException("Invalid value '{}' for config:APIversion. "
104 "Allowed values are 'v3.3', 'v2.0', '2' or '3'".format(api_version
))
105 vim_type
= config
.get('vim_type')
106 if vim_type
and vim_type
not in ('vio', 'VIO'):
107 raise vimconn
.vimconnException("Invalid value '{}' for config:vim_type."
108 "Allowed values are 'vio' or 'VIO'".format(vim_type
))
110 if config
.get('dataplane_net_vlan_range') is not None:
111 #validate vlan ranges provided by user
112 self
._validate
_vlan
_ranges
(config
.get('dataplane_net_vlan_range'), 'dataplane_net_vlan_range')
114 if config
.get('multisegment_vlan_range') is not None:
115 #validate vlan ranges provided by user
116 self
._validate
_vlan
_ranges
(config
.get('multisegment_vlan_range'), 'multisegment_vlan_range')
118 vimconn
.vimconnector
.__init
__(self
, uuid
, name
, tenant_id
, tenant_name
, url
, url_admin
, user
, passwd
, log_level
,
121 if self
.config
.get("insecure") and self
.config
.get("ca_cert"):
122 raise vimconn
.vimconnException("options insecure and ca_cert are mutually exclusive")
124 if self
.config
.get("insecure"):
126 if self
.config
.get("ca_cert"):
127 self
.verify
= self
.config
.get("ca_cert")
130 raise TypeError('url param can not be NoneType')
131 self
.persistent_info
= persistent_info
132 self
.availability_zone
= persistent_info
.get('availability_zone', None)
133 self
.session
= persistent_info
.get('session', {'reload_client': True})
134 self
.my_tenant_id
= self
.session
.get('my_tenant_id')
135 self
.nova
= self
.session
.get('nova')
136 self
.neutron
= self
.session
.get('neutron')
137 self
.cinder
= self
.session
.get('cinder')
138 self
.glance
= self
.session
.get('glance')
139 # self.glancev1 = self.session.get('glancev1')
140 self
.keystone
= self
.session
.get('keystone')
141 self
.api_version3
= self
.session
.get('api_version3')
142 self
.vim_type
= self
.config
.get("vim_type")
144 self
.vim_type
= self
.vim_type
.upper()
145 if self
.config
.get("use_internal_endpoint"):
146 self
.endpoint_type
= "internalURL"
148 self
.endpoint_type
= None
150 self
.logger
= logging
.getLogger('openmano.vim.openstack')
152 # allow security_groups to be a list or a single string
153 if isinstance(self
.config
.get('security_groups'), str):
154 self
.config
['security_groups'] = [self
.config
['security_groups']]
155 self
.security_groups_id
= None
157 ####### VIO Specific Changes #########
158 if self
.vim_type
== "VIO":
159 self
.logger
= logging
.getLogger('openmano.vim.vio')
162 self
.logger
.setLevel( getattr(logging
, log_level
))
164 def __getitem__(self
, index
):
165 """Get individuals parameters.
167 if index
== 'project_domain_id':
168 return self
.config
.get("project_domain_id")
169 elif index
== 'user_domain_id':
170 return self
.config
.get("user_domain_id")
172 return vimconn
.vimconnector
.__getitem
__(self
, index
)
174 def __setitem__(self
, index
, value
):
175 """Set individuals parameters and it is marked as dirty so to force connection reload.
177 if index
== 'project_domain_id':
178 self
.config
["project_domain_id"] = value
179 elif index
== 'user_domain_id':
180 self
.config
["user_domain_id"] = value
182 vimconn
.vimconnector
.__setitem
__(self
, index
, value
)
183 self
.session
['reload_client'] = True
185 def serialize(self
, value
):
186 """Serialization of python basic types.
188 In the case value is not serializable a message will be logged and a
189 simple representation of the data that cannot be converted back to
192 if isinstance(value
, StringTypes
):
196 return yaml
.dump(value
, Dumper
=SafeDumper
,
197 default_flow_style
=True, width
=256)
198 except yaml
.representer
.RepresenterError
:
200 'The following entity cannot be serialized in YAML:'
201 '\n\n%s\n\n', pformat(value
), exc_info
=True)
204 def _reload_connection(self
):
205 '''Called before any operation, it check if credentials has changed
206 Throw keystoneclient.apiclient.exceptions.AuthorizationFailure
208 #TODO control the timing and possible token timeout, but it seams that python client does this task for us :-)
209 if self
.session
['reload_client']:
210 if self
.config
.get('APIversion'):
211 self
.api_version3
= self
.config
['APIversion'] == 'v3.3' or self
.config
['APIversion'] == '3'
212 else: # get from ending auth_url that end with v3 or with v2.0
213 self
.api_version3
= self
.url
.endswith("/v3") or self
.url
.endswith("/v3/")
214 self
.session
['api_version3'] = self
.api_version3
215 if self
.api_version3
:
216 if self
.config
.get('project_domain_id') or self
.config
.get('project_domain_name'):
217 project_domain_id_default
= None
219 project_domain_id_default
= 'default'
220 if self
.config
.get('user_domain_id') or self
.config
.get('user_domain_name'):
221 user_domain_id_default
= None
223 user_domain_id_default
= 'default'
224 auth
= v3
.Password(auth_url
=self
.url
,
226 password
=self
.passwd
,
227 project_name
=self
.tenant_name
,
228 project_id
=self
.tenant_id
,
229 project_domain_id
=self
.config
.get('project_domain_id', project_domain_id_default
),
230 user_domain_id
=self
.config
.get('user_domain_id', user_domain_id_default
),
231 project_domain_name
=self
.config
.get('project_domain_name'),
232 user_domain_name
=self
.config
.get('user_domain_name'))
234 auth
= v2
.Password(auth_url
=self
.url
,
236 password
=self
.passwd
,
237 tenant_name
=self
.tenant_name
,
238 tenant_id
=self
.tenant_id
)
239 sess
= session
.Session(auth
=auth
, verify
=self
.verify
)
240 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River Titanium cloud and StarlingX
241 region_name
= self
.config
.get('region_name')
242 if self
.api_version3
:
243 self
.keystone
= ksClient_v3
.Client(session
=sess
, endpoint_type
=self
.endpoint_type
, region_name
=region_name
)
245 self
.keystone
= ksClient_v2
.Client(session
=sess
, endpoint_type
=self
.endpoint_type
)
246 self
.session
['keystone'] = self
.keystone
247 # In order to enable microversion functionality an explicit microversion must be specified in 'config'.
248 # This implementation approach is due to the warning message in
249 # https://developer.openstack.org/api-guide/compute/microversions.html
250 # where it is stated that microversion backwards compatibility is not guaranteed and clients should
251 # always require an specific microversion.
252 # To be able to use 'device role tagging' functionality define 'microversion: 2.32' in datacenter config
253 version
= self
.config
.get("microversion")
256 # addedd region_name to keystone, nova, neutron and cinder to support distributed cloud for Wind River Titanium cloud and StarlingX
257 self
.nova
= self
.session
['nova'] = nClient
.Client(str(version
), session
=sess
, endpoint_type
=self
.endpoint_type
, region_name
=region_name
)
258 self
.neutron
= self
.session
['neutron'] = neClient
.Client('2.0', session
=sess
, endpoint_type
=self
.endpoint_type
, region_name
=region_name
)
259 self
.cinder
= self
.session
['cinder'] = cClient
.Client(2, session
=sess
, endpoint_type
=self
.endpoint_type
, region_name
=region_name
)
261 self
.my_tenant_id
= self
.session
['my_tenant_id'] = sess
.get_project_id()
262 except Exception as e
:
263 self
.logger
.error("Cannot get project_id from session", exc_info
=True)
264 if self
.endpoint_type
== "internalURL":
265 glance_service_id
= self
.keystone
.services
.list(name
="glance")[0].id
266 glance_endpoint
= self
.keystone
.endpoints
.list(glance_service_id
, interface
="internal")[0].url
268 glance_endpoint
= None
269 self
.glance
= self
.session
['glance'] = glClient
.Client(2, session
=sess
, endpoint
=glance_endpoint
)
270 # using version 1 of glance client in new_image()
271 # self.glancev1 = self.session['glancev1'] = glClient.Client('1', session=sess,
272 # endpoint=glance_endpoint)
273 self
.session
['reload_client'] = False
274 self
.persistent_info
['session'] = self
.session
275 # add availablity zone info inside self.persistent_info
276 self
._set
_availablity
_zones
()
277 self
.persistent_info
['availability_zone'] = self
.availability_zone
278 self
.security_groups_id
= None # force to get again security_groups_ids next time they are needed
280 def __net_os2mano(self
, net_list_dict
):
281 '''Transform the net openstack format to mano format
282 net_list_dict can be a list of dict or a single dict'''
283 if type(net_list_dict
) is dict:
284 net_list_
=(net_list_dict
,)
285 elif type(net_list_dict
) is list:
286 net_list_
=net_list_dict
288 raise TypeError("param net_list_dict must be a list or a dictionary")
289 for net
in net_list_
:
290 if net
.get('provider:network_type') == "vlan":
295 def __classification_os2mano(self
, class_list_dict
):
296 """Transform the openstack format (Flow Classifier) to mano format
297 (Classification) class_list_dict can be a list of dict or a single dict
299 if isinstance(class_list_dict
, dict):
300 class_list_
= [class_list_dict
]
301 elif isinstance(class_list_dict
, list):
302 class_list_
= class_list_dict
305 "param class_list_dict must be a list or a dictionary")
306 for classification
in class_list_
:
307 id = classification
.pop('id')
308 name
= classification
.pop('name')
309 description
= classification
.pop('description')
310 project_id
= classification
.pop('project_id')
311 tenant_id
= classification
.pop('tenant_id')
312 original_classification
= copy
.deepcopy(classification
)
313 classification
.clear()
314 classification
['ctype'] = 'legacy_flow_classifier'
315 classification
['definition'] = original_classification
316 classification
['id'] = id
317 classification
['name'] = name
318 classification
['description'] = description
319 classification
['project_id'] = project_id
320 classification
['tenant_id'] = tenant_id
322 def __sfi_os2mano(self
, sfi_list_dict
):
323 """Transform the openstack format (Port Pair) to mano format (SFI)
324 sfi_list_dict can be a list of dict or a single dict
326 if isinstance(sfi_list_dict
, dict):
327 sfi_list_
= [sfi_list_dict
]
328 elif isinstance(sfi_list_dict
, list):
329 sfi_list_
= sfi_list_dict
332 "param sfi_list_dict must be a list or a dictionary")
333 for sfi
in sfi_list_
:
334 sfi
['ingress_ports'] = []
335 sfi
['egress_ports'] = []
336 if sfi
.get('ingress'):
337 sfi
['ingress_ports'].append(sfi
['ingress'])
338 if sfi
.get('egress'):
339 sfi
['egress_ports'].append(sfi
['egress'])
342 params
= sfi
.get('service_function_parameters')
345 correlation
= params
.get('correlation')
348 sfi
['sfc_encap'] = sfc_encap
349 del sfi
['service_function_parameters']
351 def __sf_os2mano(self
, sf_list_dict
):
352 """Transform the openstack format (Port Pair Group) to mano format (SF)
353 sf_list_dict can be a list of dict or a single dict
355 if isinstance(sf_list_dict
, dict):
356 sf_list_
= [sf_list_dict
]
357 elif isinstance(sf_list_dict
, list):
358 sf_list_
= sf_list_dict
361 "param sf_list_dict must be a list or a dictionary")
363 del sf
['port_pair_group_parameters']
364 sf
['sfis'] = sf
['port_pairs']
367 def __sfp_os2mano(self
, sfp_list_dict
):
368 """Transform the openstack format (Port Chain) to mano format (SFP)
369 sfp_list_dict can be a list of dict or a single dict
371 if isinstance(sfp_list_dict
, dict):
372 sfp_list_
= [sfp_list_dict
]
373 elif isinstance(sfp_list_dict
, list):
374 sfp_list_
= sfp_list_dict
377 "param sfp_list_dict must be a list or a dictionary")
378 for sfp
in sfp_list_
:
379 params
= sfp
.pop('chain_parameters')
382 correlation
= params
.get('correlation')
385 sfp
['sfc_encap'] = sfc_encap
386 sfp
['spi'] = sfp
.pop('chain_id')
387 sfp
['classifications'] = sfp
.pop('flow_classifiers')
388 sfp
['service_functions'] = sfp
.pop('port_pair_groups')
390 # placeholder for now; read TODO note below
391 def _validate_classification(self
, type, definition
):
392 # only legacy_flow_classifier Type is supported at this point
394 # TODO(igordcard): this method should be an abstract method of an
395 # abstract Classification class to be implemented by the specific
396 # Types. Also, abstract vimconnector should call the validation
397 # method before the implemented VIM connectors are called.
399 def _format_exception(self
, exception
):
400 '''Transform a keystone, nova, neutron exception into a vimconn exception'''
401 if isinstance(exception
, (neExceptions
.NetworkNotFoundClient
, nvExceptions
.NotFound
, ksExceptions
.NotFound
, gl1Exceptions
.HTTPNotFound
)):
402 raise vimconn
.vimconnNotFoundException(type(exception
).__name
__ + ": " + str(exception
))
403 elif isinstance(exception
, (HTTPException
, gl1Exceptions
.HTTPException
, gl1Exceptions
.CommunicationError
,
404 ConnectionError
, ksExceptions
.ConnectionError
, neExceptions
.ConnectionFailed
)):
405 raise vimconn
.vimconnConnectionException(type(exception
).__name
__ + ": " + str(exception
))
406 elif isinstance(exception
, (KeyError, nvExceptions
.BadRequest
, ksExceptions
.BadRequest
)):
407 raise vimconn
.vimconnException(type(exception
).__name
__ + ": " + str(exception
))
408 elif isinstance(exception
, (nvExceptions
.ClientException
, ksExceptions
.ClientException
,
409 neExceptions
.NeutronException
)):
410 raise vimconn
.vimconnUnexpectedResponse(type(exception
).__name
__ + ": " + str(exception
))
411 elif isinstance(exception
, nvExceptions
.Conflict
):
412 raise vimconn
.vimconnConflictException(type(exception
).__name
__ + ": " + str(exception
))
413 elif isinstance(exception
, vimconn
.vimconnException
):
416 self
.logger
.error("General Exception " + str(exception
), exc_info
=True)
417 raise vimconn
.vimconnConnectionException(type(exception
).__name
__ + ": " + str(exception
))
419 def _get_ids_from_name(self
):
421 Obtain ids from name of tenant and security_groups. Store at self .security_groups_id"
424 # get tenant_id if only tenant_name is supplied
425 self
._reload
_connection
()
426 if not self
.my_tenant_id
:
427 raise vimconn
.vimconnConnectionException("Error getting tenant information from name={} id={}".
428 format(self
.tenant_name
, self
.tenant_id
))
429 if self
.config
.get('security_groups') and not self
.security_groups_id
:
430 # convert from name to id
431 neutron_sg_list
= self
.neutron
.list_security_groups(tenant_id
=self
.my_tenant_id
)["security_groups"]
433 self
.security_groups_id
= []
434 for sg
in self
.config
.get('security_groups'):
435 for neutron_sg
in neutron_sg_list
:
436 if sg
in (neutron_sg
["id"], neutron_sg
["name"]):
437 self
.security_groups_id
.append(neutron_sg
["id"])
440 self
.security_groups_id
= None
441 raise vimconn
.vimconnConnectionException("Not found security group {} for this tenant".format(sg
))
443 def get_tenant_list(self
, filter_dict
={}):
444 '''Obtain tenants of VIM
445 filter_dict can contain the following keys:
446 name: filter by tenant name
447 id: filter by tenant uuid/id
449 Returns the tenant list of dictionaries: [{'name':'<name>, 'id':'<id>, ...}, ...]
451 self
.logger
.debug("Getting tenants from VIM filter: '%s'", str(filter_dict
))
453 self
._reload
_connection
()
454 if self
.api_version3
:
455 project_class_list
= self
.keystone
.projects
.list(name
=filter_dict
.get("name"))
457 project_class_list
= self
.keystone
.tenants
.findall(**filter_dict
)
459 for project
in project_class_list
:
460 if filter_dict
.get('id') and filter_dict
["id"] != project
.id:
462 project_list
.append(project
.to_dict())
464 except (ksExceptions
.ConnectionError
, ksExceptions
.ClientException
, ConnectionError
) as e
:
465 self
._format
_exception
(e
)
467 def new_tenant(self
, tenant_name
, tenant_description
):
468 '''Adds a new tenant to openstack VIM. Returns the tenant identifier'''
469 self
.logger
.debug("Adding a new tenant name: %s", tenant_name
)
471 self
._reload
_connection
()
472 if self
.api_version3
:
473 project
= self
.keystone
.projects
.create(tenant_name
, self
.config
.get("project_domain_id", "default"),
474 description
=tenant_description
, is_domain
=False)
476 project
= self
.keystone
.tenants
.create(tenant_name
, tenant_description
)
478 except (ksExceptions
.ConnectionError
, ksExceptions
.ClientException
, ksExceptions
.BadRequest
, ConnectionError
) as e
:
479 self
._format
_exception
(e
)
481 def delete_tenant(self
, tenant_id
):
482 '''Delete a tenant from openstack VIM. Returns the old tenant identifier'''
483 self
.logger
.debug("Deleting tenant %s from VIM", tenant_id
)
485 self
._reload
_connection
()
486 if self
.api_version3
:
487 self
.keystone
.projects
.delete(tenant_id
)
489 self
.keystone
.tenants
.delete(tenant_id
)
491 except (ksExceptions
.ConnectionError
, ksExceptions
.ClientException
, ksExceptions
.NotFound
, ConnectionError
) as e
:
492 self
._format
_exception
(e
)
494 def new_network(self
,net_name
, net_type
, ip_profile
=None, shared
=False, vlan
=None):
495 """Adds a tenant network to VIM
497 'net_name': name of the network
499 'bridge': overlay isolated network
500 'data': underlay E-LAN network for Passthrough and SRIOV interfaces
501 'ptp': underlay E-LINE network for Passthrough and SRIOV interfaces.
502 'ip_profile': is a dict containing the IP parameters of the network
503 'ip_version': can be "IPv4" or "IPv6" (Currently only IPv4 is implemented)
504 'subnet_address': ip_prefix_schema, that is X.X.X.X/Y
505 'gateway_address': (Optional) ip_schema, that is X.X.X.X
506 'dns_address': (Optional) comma separated list of ip_schema, e.g. X.X.X.X[,X,X,X,X]
507 'dhcp_enabled': True or False
508 'dhcp_start_address': ip_schema, first IP to grant
509 'dhcp_count': number of IPs to grant.
510 'shared': if this network can be seen/use by other tenants/organization
511 'vlan': in case of a data or ptp net_type, the intended vlan tag to be used for the network
512 Returns a tuple with the network identifier and created_items, or raises an exception on error
513 created_items can be None or a dictionary where this method can include key-values that will be passed to
514 the method delete_network. Can be used to store created segments, created l2gw connections, etc.
515 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
518 self
.logger
.debug("Adding a new network to VIM name '%s', type '%s'", net_name
, net_type
)
519 # self.logger.debug(">>>>>>>>>>>>>>>>>> IP profile %s", str(ip_profile))
523 self
._reload
_connection
()
524 network_dict
= {'name': net_name
, 'admin_state_up': True}
525 if net_type
=="data" or net_type
=="ptp":
526 if self
.config
.get('dataplane_physical_net') == None:
527 raise vimconn
.vimconnConflictException("You must provide a 'dataplane_physical_net' at config value before creating sriov network")
528 if not self
.config
.get('multisegment_support'):
529 network_dict
["provider:physical_network"] = self
.config
[
530 'dataplane_physical_net'] # "physnet_sriov" #TODO physical
531 network_dict
["provider:network_type"] = "vlan"
533 network_dict
["provider:network_type"] = vlan
535 ###### Multi-segment case ######
538 segment1_dict
["provider:physical_network"] = ''
539 segment1_dict
["provider:network_type"] = 'vxlan'
540 segment_list
.append(segment1_dict
)
542 segment2_dict
["provider:physical_network"] = self
.config
['dataplane_physical_net']
543 segment2_dict
["provider:network_type"] = "vlan"
544 if self
.config
.get('multisegment_vlan_range'):
545 vlanID
= self
._generate
_multisegment
_vlanID
()
546 segment2_dict
["provider:segmentation_id"] = vlanID
548 # raise vimconn.vimconnConflictException(
549 # "You must provide 'multisegment_vlan_range' at config dict before creating a multisegment network")
550 segment_list
.append(segment2_dict
)
551 network_dict
["segments"] = segment_list
553 ####### VIO Specific Changes #########
554 if self
.vim_type
== "VIO":
556 network_dict
["provider:segmentation_id"] = vlan
558 if self
.config
.get('dataplane_net_vlan_range') is None:
559 raise vimconn
.vimconnConflictException("You must provide "\
560 "'dataplane_net_vlan_range' in format [start_ID - end_ID]"\
561 "at config value before creating sriov network with vlan tag")
563 network_dict
["provider:segmentation_id"] = self
._generate
_vlanID
()
565 network_dict
["shared"] = shared
566 new_net
= self
.neutron
.create_network({'network':network_dict
})
568 # create subnetwork, even if there is no profile
571 if not ip_profile
.get('subnet_address'):
572 #Fake subnet is required
573 subnet_rand
= random
.randint(0, 255)
574 ip_profile
['subnet_address'] = "192.168.{}.0/24".format(subnet_rand
)
575 if 'ip_version' not in ip_profile
:
576 ip_profile
['ip_version'] = "IPv4"
577 subnet
= {"name": net_name
+"-subnet",
578 "network_id": new_net
["network"]["id"],
579 "ip_version": 4 if ip_profile
['ip_version']=="IPv4" else 6,
580 "cidr": ip_profile
['subnet_address']
582 # Gateway should be set to None if not needed. Otherwise openstack assigns one by default
583 if ip_profile
.get('gateway_address'):
584 subnet
['gateway_ip'] = ip_profile
['gateway_address']
586 subnet
['gateway_ip'] = None
587 if ip_profile
.get('dns_address'):
588 subnet
['dns_nameservers'] = ip_profile
['dns_address'].split(";")
589 if 'dhcp_enabled' in ip_profile
:
590 subnet
['enable_dhcp'] = False if \
591 ip_profile
['dhcp_enabled']=="false" or ip_profile
['dhcp_enabled']==False else True
592 if ip_profile
.get('dhcp_start_address'):
593 subnet
['allocation_pools'] = []
594 subnet
['allocation_pools'].append(dict())
595 subnet
['allocation_pools'][0]['start'] = ip_profile
['dhcp_start_address']
596 if ip_profile
.get('dhcp_count'):
597 #parts = ip_profile['dhcp_start_address'].split('.')
598 #ip_int = (int(parts[0]) << 24) + (int(parts[1]) << 16) + (int(parts[2]) << 8) + int(parts[3])
599 ip_int
= int(netaddr
.IPAddress(ip_profile
['dhcp_start_address']))
600 ip_int
+= ip_profile
['dhcp_count'] - 1
601 ip_str
= str(netaddr
.IPAddress(ip_int
))
602 subnet
['allocation_pools'][0]['end'] = ip_str
603 #self.logger.debug(">>>>>>>>>>>>>>>>>> Subnet: %s", str(subnet))
604 self
.neutron
.create_subnet({"subnet": subnet
} )
606 if net_type
== "data" and self
.config
.get('multisegment_support'):
607 if self
.config
.get('l2gw_support'):
608 l2gw_list
= self
.neutron
.list_l2_gateways().get("l2_gateways", ())
609 for l2gw
in l2gw_list
:
611 l2gw_conn
["l2_gateway_id"] = l2gw
["id"]
612 l2gw_conn
["network_id"] = new_net
["network"]["id"]
613 l2gw_conn
["segmentation_id"] = str(vlanID
)
614 new_l2gw_conn
= self
.neutron
.create_l2_gateway_connection({"l2_gateway_connection": l2gw_conn
})
615 created_items
["l2gwconn:" + str(new_l2gw_conn
["l2_gateway_connection"]["id"])] = True
616 return new_net
["network"]["id"], created_items
617 except Exception as e
:
618 #delete l2gw connections (if any) before deleting the network
619 for k
, v
in created_items
.items():
620 if not v
: # skip already deleted
623 k_item
, _
, k_id
= k
.partition(":")
624 if k_item
== "l2gwconn":
625 self
.neutron
.delete_l2_gateway_connection(k_id
)
626 except Exception as e2
:
627 self
.logger
.error("Error deleting l2 gateway connection: {}: {}".format(type(e2
).__name
__, e2
))
629 self
.neutron
.delete_network(new_net
['network']['id'])
630 self
._format
_exception
(e
)
632 def get_network_list(self
, filter_dict
={}):
633 '''Obtain tenant networks of VIM
639 admin_state_up: boolean
641 Returns the network list of dictionaries
643 self
.logger
.debug("Getting network from VIM filter: '%s'", str(filter_dict
))
645 self
._reload
_connection
()
646 filter_dict_os
= filter_dict
.copy()
647 if self
.api_version3
and "tenant_id" in filter_dict_os
:
648 filter_dict_os
['project_id'] = filter_dict_os
.pop('tenant_id') #T ODO check
649 net_dict
= self
.neutron
.list_networks(**filter_dict_os
)
650 net_list
= net_dict
["networks"]
651 self
.__net
_os
2mano
(net_list
)
653 except (neExceptions
.ConnectionFailed
, ksExceptions
.ClientException
, neExceptions
.NeutronException
, ConnectionError
) as e
:
654 self
._format
_exception
(e
)
656 def get_network(self
, net_id
):
657 '''Obtain details of network from VIM
658 Returns the network information from a network id'''
659 self
.logger
.debug(" Getting tenant network %s from VIM", net_id
)
660 filter_dict
={"id": net_id
}
661 net_list
= self
.get_network_list(filter_dict
)
663 raise vimconn
.vimconnNotFoundException("Network '{}' not found".format(net_id
))
664 elif len(net_list
)>1:
665 raise vimconn
.vimconnConflictException("Found more than one network with this criteria")
668 for subnet_id
in net
.get("subnets", () ):
670 subnet
= self
.neutron
.show_subnet(subnet_id
)
671 except Exception as e
:
672 self
.logger
.error("osconnector.get_network(): Error getting subnet %s %s" % (net_id
, str(e
)))
673 subnet
= {"id": subnet_id
, "fault": str(e
)}
674 subnets
.append(subnet
)
675 net
["subnets"] = subnets
676 net
["encapsulation"] = net
.get('provider:network_type')
677 net
["encapsulation_type"] = net
.get('provider:network_type')
678 net
["segmentation_id"] = net
.get('provider:segmentation_id')
679 net
["encapsulation_id"] = net
.get('provider:segmentation_id')
682 def delete_network(self
, net_id
, created_items
=None):
684 Removes a tenant network from VIM and its associated elements
685 :param net_id: VIM identifier of the network, provided by method new_network
686 :param created_items: dictionary with extra items to be deleted. provided by method new_network
687 Returns the network identifier or raises an exception upon error or when network is not found
689 self
.logger
.debug("Deleting network '%s' from VIM", net_id
)
690 if created_items
== None:
693 self
._reload
_connection
()
694 #delete l2gw connections (if any) before deleting the network
695 for k
, v
in created_items
.items():
696 if not v
: # skip already deleted
699 k_item
, _
, k_id
= k
.partition(":")
700 if k_item
== "l2gwconn":
701 self
.neutron
.delete_l2_gateway_connection(k_id
)
702 except Exception as e
:
703 self
.logger
.error("Error deleting l2 gateway connection: {}: {}".format(type(e
).__name
__, e
))
704 #delete VM ports attached to this networks before the network
705 ports
= self
.neutron
.list_ports(network_id
=net_id
)
706 for p
in ports
['ports']:
708 self
.neutron
.delete_port(p
["id"])
709 except Exception as e
:
710 self
.logger
.error("Error deleting port %s: %s", p
["id"], str(e
))
711 self
.neutron
.delete_network(net_id
)
713 except (neExceptions
.ConnectionFailed
, neExceptions
.NetworkNotFoundClient
, neExceptions
.NeutronException
,
714 ksExceptions
.ClientException
, neExceptions
.NeutronException
, ConnectionError
) as e
:
715 self
._format
_exception
(e
)
717 def refresh_nets_status(self
, net_list
):
718 '''Get the status of the networks
719 Params: the list of network identifiers
720 Returns a dictionary with:
721 net_id: #VIM id of this network
722 status: #Mandatory. Text with one of:
723 # DELETED (not found at vim)
724 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
725 # OTHER (Vim reported other status not understood)
726 # ERROR (VIM indicates an ERROR status)
727 # ACTIVE, INACTIVE, DOWN (admin down),
728 # BUILD (on building process)
730 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
731 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
735 for net_id
in net_list
:
738 net_vim
= self
.get_network(net_id
)
739 if net_vim
['status'] in netStatus2manoFormat
:
740 net
["status"] = netStatus2manoFormat
[ net_vim
['status'] ]
742 net
["status"] = "OTHER"
743 net
["error_msg"] = "VIM status reported " + net_vim
['status']
745 if net
['status'] == "ACTIVE" and not net_vim
['admin_state_up']:
746 net
['status'] = 'DOWN'
748 net
['vim_info'] = self
.serialize(net_vim
)
750 if net_vim
.get('fault'): #TODO
751 net
['error_msg'] = str(net_vim
['fault'])
752 except vimconn
.vimconnNotFoundException
as e
:
753 self
.logger
.error("Exception getting net status: %s", str(e
))
754 net
['status'] = "DELETED"
755 net
['error_msg'] = str(e
)
756 except vimconn
.vimconnException
as e
:
757 self
.logger
.error("Exception getting net status: %s", str(e
))
758 net
['status'] = "VIM_ERROR"
759 net
['error_msg'] = str(e
)
760 net_dict
[net_id
] = net
763 def get_flavor(self
, flavor_id
):
764 '''Obtain flavor details from the VIM. Returns the flavor dict details'''
765 self
.logger
.debug("Getting flavor '%s'", flavor_id
)
767 self
._reload
_connection
()
768 flavor
= self
.nova
.flavors
.find(id=flavor_id
)
769 #TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
770 return flavor
.to_dict()
771 except (nvExceptions
.NotFound
, nvExceptions
.ClientException
, ksExceptions
.ClientException
, ConnectionError
) as e
:
772 self
._format
_exception
(e
)
774 def get_flavor_id_from_data(self
, flavor_dict
):
775 """Obtain flavor id that match the flavor description
776 Returns the flavor_id or raises a vimconnNotFoundException
777 flavor_dict: contains the required ram, vcpus, disk
778 If 'use_existing_flavors' is set to True at config, the closer flavor that provides same or more ram, vcpus
779 and disk is returned. Otherwise a flavor with exactly same ram, vcpus and disk is returned or a
780 vimconnNotFoundException is raised
782 exact_match
= False if self
.config
.get('use_existing_flavors') else True
784 self
._reload
_connection
()
785 flavor_candidate_id
= None
786 flavor_candidate_data
= (10000, 10000, 10000)
787 flavor_target
= (flavor_dict
["ram"], flavor_dict
["vcpus"], flavor_dict
["disk"])
789 numas
= flavor_dict
.get("extended", {}).get("numas")
792 raise vimconn
.vimconnNotFoundException("Flavor with EPA still not implemted")
794 # raise vimconn.vimconnNotFoundException("Cannot find any flavor with more than one numa")
796 # numas = extended.get("numas")
797 for flavor
in self
.nova
.flavors
.list():
798 epa
= flavor
.get_keys()
802 flavor_data
= (flavor
.ram
, flavor
.vcpus
, flavor
.disk
)
803 if flavor_data
== flavor_target
:
805 elif not exact_match
and flavor_target
< flavor_data
< flavor_candidate_data
:
806 flavor_candidate_id
= flavor
.id
807 flavor_candidate_data
= flavor_data
808 if not exact_match
and flavor_candidate_id
:
809 return flavor_candidate_id
810 raise vimconn
.vimconnNotFoundException("Cannot find any flavor matching '{}'".format(str(flavor_dict
)))
811 except (nvExceptions
.NotFound
, nvExceptions
.ClientException
, ksExceptions
.ClientException
, ConnectionError
) as e
:
812 self
._format
_exception
(e
)
814 def new_flavor(self
, flavor_data
, change_name_if_used
=True):
815 '''Adds a tenant flavor to openstack VIM
816 if change_name_if_used is True, it will change name in case of conflict, because it is not supported name repetition
817 Returns the flavor identifier
819 self
.logger
.debug("Adding flavor '%s'", str(flavor_data
))
824 name
=flavor_data
['name']
825 while retry
<max_retries
:
828 self
._reload
_connection
()
829 if change_name_if_used
:
832 fl
=self
.nova
.flavors
.list()
834 fl_names
.append(f
.name
)
835 while name
in fl_names
:
837 name
= flavor_data
['name']+"-" + str(name_suffix
)
839 ram
= flavor_data
.get('ram',64)
840 vcpus
= flavor_data
.get('vcpus',1)
843 extended
= flavor_data
.get("extended")
845 numas
=extended
.get("numas")
847 numa_nodes
= len(numas
)
849 return -1, "Can not add flavor with more than one numa"
850 numa_properties
= {"hw:numa_nodes":str(numa_nodes
)}
851 numa_properties
["hw:mem_page_size"] = "large"
852 numa_properties
["hw:cpu_policy"] = "dedicated"
853 numa_properties
["hw:numa_mempolicy"] = "strict"
854 if self
.vim_type
== "VIO":
855 numa_properties
["vmware:extra_config"] = '{"numa.nodeAffinity":"0"}'
856 numa_properties
["vmware:latency_sensitivity_level"] = "high"
858 #overwrite ram and vcpus
859 #check if key 'memory' is present in numa else use ram value at flavor
861 ram
= numa
['memory']*1024
862 #See for reference: https://specs.openstack.org/openstack/nova-specs/specs/mitaka/implemented/virt-driver-cpu-thread-pinning.html
863 if 'paired-threads' in numa
:
864 vcpus
= numa
['paired-threads']*2
865 #cpu_thread_policy "require" implies that the compute node must have an STM architecture
866 numa_properties
["hw:cpu_thread_policy"] = "require"
867 numa_properties
["hw:cpu_policy"] = "dedicated"
868 elif 'cores' in numa
:
869 vcpus
= numa
['cores']
870 # cpu_thread_policy "prefer" implies that the host must not have an SMT architecture, or a non-SMT architecture will be emulated
871 numa_properties
["hw:cpu_thread_policy"] = "isolate"
872 numa_properties
["hw:cpu_policy"] = "dedicated"
873 elif 'threads' in numa
:
874 vcpus
= numa
['threads']
875 # cpu_thread_policy "prefer" implies that the host may or may not have an SMT architecture
876 numa_properties
["hw:cpu_thread_policy"] = "prefer"
877 numa_properties
["hw:cpu_policy"] = "dedicated"
878 # for interface in numa.get("interfaces",() ):
879 # if interface["dedicated"]=="yes":
880 # raise vimconn.vimconnException("Passthrough interfaces are not supported for the openstack connector", http_code=vimconn.HTTP_Service_Unavailable)
881 # #TODO, add the key 'pci_passthrough:alias"="<label at config>:<number ifaces>"' when a way to connect it is available
884 new_flavor
=self
.nova
.flavors
.create(name
,
887 flavor_data
.get('disk',0),
888 is_public
=flavor_data
.get('is_public', True)
892 new_flavor
.set_keys(numa_properties
)
894 except nvExceptions
.Conflict
as e
:
895 if change_name_if_used
and retry
< max_retries
:
897 self
._format
_exception
(e
)
898 #except nvExceptions.BadRequest as e:
899 except (ksExceptions
.ClientException
, nvExceptions
.ClientException
, ConnectionError
, KeyError) as e
:
900 self
._format
_exception
(e
)
902 def delete_flavor(self
,flavor_id
):
903 '''Deletes a tenant flavor from openstack VIM. Returns the old flavor_id
906 self
._reload
_connection
()
907 self
.nova
.flavors
.delete(flavor_id
)
909 #except nvExceptions.BadRequest as e:
910 except (nvExceptions
.NotFound
, ksExceptions
.ClientException
, nvExceptions
.ClientException
, ConnectionError
) as e
:
911 self
._format
_exception
(e
)
913 def new_image(self
,image_dict
):
915 Adds a tenant image to VIM. imge_dict is a dictionary with:
917 disk_format: qcow2, vhd, vmdk, raw (by default), ...
918 location: path or URI
919 public: "yes" or "no"
920 metadata: metadata of the image
925 while retry
<max_retries
:
928 self
._reload
_connection
()
929 #determine format http://docs.openstack.org/developer/glance/formats.html
930 if "disk_format" in image_dict
:
931 disk_format
=image_dict
["disk_format"]
932 else: #autodiscover based on extension
933 if image_dict
['location'].endswith(".qcow2"):
935 elif image_dict
['location'].endswith(".vhd"):
937 elif image_dict
['location'].endswith(".vmdk"):
939 elif image_dict
['location'].endswith(".vdi"):
941 elif image_dict
['location'].endswith(".iso"):
943 elif image_dict
['location'].endswith(".aki"):
945 elif image_dict
['location'].endswith(".ari"):
947 elif image_dict
['location'].endswith(".ami"):
951 self
.logger
.debug("new_image: '%s' loading from '%s'", image_dict
['name'], image_dict
['location'])
952 if self
.vim_type
== "VIO":
953 container_format
= "bare"
954 if 'container_format' in image_dict
:
955 container_format
= image_dict
['container_format']
956 new_image
= self
.glance
.images
.create(name
=image_dict
['name'], container_format
=container_format
,
957 disk_format
=disk_format
)
959 new_image
= self
.glance
.images
.create(name
=image_dict
['name'])
960 if image_dict
['location'].startswith("http"):
961 # TODO there is not a method to direct download. It must be downloaded locally with requests
962 raise vimconn
.vimconnNotImplemented("Cannot create image from URL")
964 with
open(image_dict
['location']) as fimage
:
965 self
.glance
.images
.upload(new_image
.id, fimage
)
966 #new_image = self.glancev1.images.create(name=image_dict['name'], is_public=image_dict.get('public',"yes")=="yes",
967 # container_format="bare", data=fimage, disk_format=disk_format)
968 metadata_to_load
= image_dict
.get('metadata')
969 # TODO location is a reserved word for current openstack versions. fixed for VIO please check for openstack
970 if self
.vim_type
== "VIO":
971 metadata_to_load
['upload_location'] = image_dict
['location']
973 metadata_to_load
['location'] = image_dict
['location']
974 self
.glance
.images
.update(new_image
.id, **metadata_to_load
)
976 except (nvExceptions
.Conflict
, ksExceptions
.ClientException
, nvExceptions
.ClientException
) as e
:
977 self
._format
_exception
(e
)
978 except (HTTPException
, gl1Exceptions
.HTTPException
, gl1Exceptions
.CommunicationError
, ConnectionError
) as e
:
979 if retry
==max_retries
:
981 self
._format
_exception
(e
)
982 except IOError as e
: #can not open the file
983 raise vimconn
.vimconnConnectionException(type(e
).__name
__ + ": " + str(e
)+ " for " + image_dict
['location'],
984 http_code
=vimconn
.HTTP_Bad_Request
)
986 def delete_image(self
, image_id
):
987 '''Deletes a tenant image from openstack VIM. Returns the old id
990 self
._reload
_connection
()
991 self
.glance
.images
.delete(image_id
)
993 except (nvExceptions
.NotFound
, ksExceptions
.ClientException
, nvExceptions
.ClientException
, gl1Exceptions
.CommunicationError
, gl1Exceptions
.HTTPNotFound
, ConnectionError
) as e
: #TODO remove
994 self
._format
_exception
(e
)
996 def get_image_id_from_path(self
, path
):
997 '''Get the image id from image path in the VIM database. Returns the image_id'''
999 self
._reload
_connection
()
1000 images
= self
.glance
.images
.list()
1001 for image
in images
:
1002 if image
.metadata
.get("location")==path
:
1004 raise vimconn
.vimconnNotFoundException("image with location '{}' not found".format( path
))
1005 except (ksExceptions
.ClientException
, nvExceptions
.ClientException
, gl1Exceptions
.CommunicationError
, ConnectionError
) as e
:
1006 self
._format
_exception
(e
)
1008 def get_image_list(self
, filter_dict
={}):
1009 '''Obtain tenant images from VIM
1013 checksum: image checksum
1014 Returns the image list of dictionaries:
1015 [{<the fields at Filter_dict plus some VIM specific>}, ...]
1018 self
.logger
.debug("Getting image list from VIM filter: '%s'", str(filter_dict
))
1020 self
._reload
_connection
()
1021 filter_dict_os
= filter_dict
.copy()
1022 #First we filter by the available filter fields: name, id. The others are removed.
1023 image_list
= self
.glance
.images
.list()
1025 for image
in image_list
:
1027 if filter_dict
.get("name") and image
["name"] != filter_dict
["name"]:
1029 if filter_dict
.get("id") and image
["id"] != filter_dict
["id"]:
1031 if filter_dict
.get("checksum") and image
["checksum"] != filter_dict
["checksum"]:
1034 filtered_list
.append(image
.copy())
1035 except gl1Exceptions
.HTTPNotFound
:
1037 return filtered_list
1038 except (ksExceptions
.ClientException
, nvExceptions
.ClientException
, gl1Exceptions
.CommunicationError
, ConnectionError
) as e
:
1039 self
._format
_exception
(e
)
1041 def __wait_for_vm(self
, vm_id
, status
):
1042 """wait until vm is in the desired status and return True.
1043 If the VM gets in ERROR status, return false.
1044 If the timeout is reached generate an exception"""
1046 while elapsed_time
< server_timeout
:
1047 vm_status
= self
.nova
.servers
.get(vm_id
).status
1048 if vm_status
== status
:
1050 if vm_status
== 'ERROR':
1055 # if we exceeded the timeout rollback
1056 if elapsed_time
>= server_timeout
:
1057 raise vimconn
.vimconnException('Timeout waiting for instance ' + vm_id
+ ' to get ' + status
,
1058 http_code
=vimconn
.HTTP_Request_Timeout
)
1060 def _get_openstack_availablity_zones(self
):
1062 Get from openstack availability zones available
1066 openstack_availability_zone
= self
.nova
.availability_zones
.list()
1067 openstack_availability_zone
= [str(zone
.zoneName
) for zone
in openstack_availability_zone
1068 if zone
.zoneName
!= 'internal']
1069 return openstack_availability_zone
1070 except Exception as e
:
1073 def _set_availablity_zones(self
):
1075 Set vim availablity zone
1079 if 'availability_zone' in self
.config
:
1080 vim_availability_zones
= self
.config
.get('availability_zone')
1081 if isinstance(vim_availability_zones
, str):
1082 self
.availability_zone
= [vim_availability_zones
]
1083 elif isinstance(vim_availability_zones
, list):
1084 self
.availability_zone
= vim_availability_zones
1086 self
.availability_zone
= self
._get
_openstack
_availablity
_zones
()
1088 def _get_vm_availability_zone(self
, availability_zone_index
, availability_zone_list
):
1090 Return thge availability zone to be used by the created VM.
1091 :return: The VIM availability zone to be used or None
1093 if availability_zone_index
is None:
1094 if not self
.config
.get('availability_zone'):
1096 elif isinstance(self
.config
.get('availability_zone'), str):
1097 return self
.config
['availability_zone']
1099 # TODO consider using a different parameter at config for default AV and AV list match
1100 return self
.config
['availability_zone'][0]
1102 vim_availability_zones
= self
.availability_zone
1103 # check if VIM offer enough availability zones describe in the VNFD
1104 if vim_availability_zones
and len(availability_zone_list
) <= len(vim_availability_zones
):
1105 # check if all the names of NFV AV match VIM AV names
1106 match_by_index
= False
1107 for av
in availability_zone_list
:
1108 if av
not in vim_availability_zones
:
1109 match_by_index
= True
1112 return vim_availability_zones
[availability_zone_index
]
1114 return availability_zone_list
[availability_zone_index
]
1116 raise vimconn
.vimconnConflictException("No enough availability zones at VIM for this deployment")
1118 def new_vminstance(self
, name
, description
, start
, image_id
, flavor_id
, net_list
, cloud_config
=None, disk_list
=None,
1119 availability_zone_index
=None, availability_zone_list
=None):
1120 """Adds a VM instance to VIM
1122 start: indicates if VM must start or boot in pause mode. Ignored
1123 image_id,flavor_id: iamge and flavor uuid
1124 net_list: list of interfaces, each one is a dictionary with:
1126 net_id: network uuid to connect
1127 vpci: virtual vcpi to assign, ignored because openstack lack #TODO
1128 model: interface model, ignored #TODO
1129 mac_address: used for SR-IOV ifaces #TODO for other types
1130 use: 'data', 'bridge', 'mgmt'
1131 type: 'virtual', 'PCI-PASSTHROUGH'('PF'), 'SR-IOV'('VF'), 'VFnotShared'
1132 vim_id: filled/added by this function
1133 floating_ip: True/False (or it can be None)
1134 'cloud_config': (optional) dictionary with:
1135 'key-pairs': (optional) list of strings with the public key to be inserted to the default user
1136 'users': (optional) list of users to be inserted, each item is a dict with:
1137 'name': (mandatory) user name,
1138 'key-pairs': (optional) list of strings with the public key to be inserted to the user
1139 'user-data': (optional) string is a text script to be passed directly to cloud-init
1140 'config-files': (optional). List of files to be transferred. Each item is a dict with:
1141 'dest': (mandatory) string with the destination absolute path
1142 'encoding': (optional, by default text). Can be one of:
1143 'b64', 'base64', 'gz', 'gz+b64', 'gz+base64', 'gzip+b64', 'gzip+base64'
1144 'content' (mandatory): string with the content of the file
1145 'permissions': (optional) string with file permissions, typically octal notation '0644'
1146 'owner': (optional) file owner, string with the format 'owner:group'
1147 'boot-data-drive': boolean to indicate if user-data must be passed using a boot drive (hard disk)
1148 'disk_list': (optional) list with additional disks to the VM. Each item is a dict with:
1149 'image_id': (optional). VIM id of an existing image. If not provided an empty disk must be mounted
1150 'size': (mandatory) string with the size of the disk in GB
1151 'vim_id' (optional) should use this existing volume id
1152 availability_zone_index: Index of availability_zone_list to use for this this VM. None if not AV required
1153 availability_zone_list: list of availability zones given by user in the VNFD descriptor. Ignore if
1154 availability_zone_index is None
1155 #TODO ip, security groups
1156 Returns a tuple with the instance identifier and created_items or raises an exception on error
1157 created_items can be None or a dictionary where this method can include key-values that will be passed to
1158 the method delete_vminstance and action_vminstance. Can be used to store created ports, volumes, etc.
1159 Format is vimconnector dependent, but do not use nested dictionaries and a value of None should be the same
1162 self
.logger
.debug("new_vminstance input: image='%s' flavor='%s' nics='%s'",image_id
, flavor_id
,str(net_list
))
1168 external_network
= [] # list of external networks to be connected to instance, later on used to create floating_ip
1169 no_secured_ports
= [] # List of port-is with port-security disabled
1170 self
._reload
_connection
()
1171 # metadata_vpci = {} # For a specific neutron plugin
1172 block_device_mapping
= None
1174 for net
in net_list
:
1175 if not net
.get("net_id"): # skip non connected iface
1179 "network_id": net
["net_id"],
1180 "name": net
.get("name"),
1181 "admin_state_up": True
1183 if self
.config
.get("security_groups") and net
.get("port_security") is not False and \
1184 not self
.config
.get("no_port_security_extension"):
1185 if not self
.security_groups_id
:
1186 self
._get
_ids
_from
_name
()
1187 port_dict
["security_groups"] = self
.security_groups_id
1189 if net
["type"]=="virtual":
1192 # metadata_vpci[ net["net_id"] ] = [[ net["vpci"], "" ]]
1193 elif net
["type"] == "VF" or net
["type"] == "SR-IOV": # for VF
1195 # if "VF" not in metadata_vpci:
1196 # metadata_vpci["VF"]=[]
1197 # metadata_vpci["VF"].append([ net["vpci"], "" ])
1198 port_dict
["binding:vnic_type"]="direct"
1199 # VIO specific Changes
1200 if self
.vim_type
== "VIO":
1201 # Need to create port with port_security_enabled = False and no-security-groups
1202 port_dict
["port_security_enabled"]=False
1203 port_dict
["provider_security_groups"]=[]
1204 port_dict
["security_groups"]=[]
1205 else: # For PT PCI-PASSTHROUGH
1206 # VIO specific Changes
1207 # Current VIO release does not support port with type 'direct-physical'
1208 # So no need to create virtual port in case of PCI-device.
1209 # Will update port_dict code when support gets added in next VIO release
1210 if self
.vim_type
== "VIO":
1211 raise vimconn
.vimconnNotSupportedException(
1212 "Current VIO release does not support full passthrough (PT)")
1214 # if "PF" not in metadata_vpci:
1215 # metadata_vpci["PF"]=[]
1216 # metadata_vpci["PF"].append([ net["vpci"], "" ])
1217 port_dict
["binding:vnic_type"]="direct-physical"
1218 if not port_dict
["name"]:
1219 port_dict
["name"]=name
1220 if net
.get("mac_address"):
1221 port_dict
["mac_address"]=net
["mac_address"]
1222 if net
.get("ip_address"):
1223 port_dict
["fixed_ips"] = [{'ip_address': net
["ip_address"]}]
1224 # TODO add 'subnet_id': <subnet_id>
1225 new_port
= self
.neutron
.create_port({"port": port_dict
})
1226 created_items
["port:" + str(new_port
["port"]["id"])] = True
1227 net
["mac_adress"] = new_port
["port"]["mac_address"]
1228 net
["vim_id"] = new_port
["port"]["id"]
1229 # if try to use a network without subnetwork, it will return a emtpy list
1230 fixed_ips
= new_port
["port"].get("fixed_ips")
1232 net
["ip"] = fixed_ips
[0].get("ip_address")
1236 port
= {"port-id": new_port
["port"]["id"]}
1237 if float(self
.nova
.api_version
.get_string()) >= 2.32:
1238 port
["tag"] = new_port
["port"]["name"]
1239 net_list_vim
.append(port
)
1241 if net
.get('floating_ip', False):
1242 net
['exit_on_floating_ip_error'] = True
1243 external_network
.append(net
)
1244 elif net
['use'] == 'mgmt' and self
.config
.get('use_floating_ip'):
1245 net
['exit_on_floating_ip_error'] = False
1246 external_network
.append(net
)
1247 net
['floating_ip'] = self
.config
.get('use_floating_ip')
1249 # If port security is disabled when the port has not yet been attached to the VM, then all vm traffic is dropped.
1250 # As a workaround we wait until the VM is active and then disable the port-security
1251 if net
.get("port_security") == False and not self
.config
.get("no_port_security_extension"):
1252 no_secured_ports
.append(new_port
["port"]["id"])
1255 # metadata = {"pci_assignement": json.dumps(metadata_vpci)}
1256 # if len(metadata["pci_assignement"]) >255:
1257 # #limit the metadata size
1258 # #metadata["pci_assignement"] = metadata["pci_assignement"][0:255]
1259 # self.logger.warn("Metadata deleted since it exceeds the expected length (255) ")
1262 self
.logger
.debug("name '%s' image_id '%s'flavor_id '%s' net_list_vim '%s' description '%s'",
1263 name
, image_id
, flavor_id
, str(net_list_vim
), description
)
1266 config_drive
, userdata
= self
._create
_user
_data
(cloud_config
)
1268 # Create additional volumes in case these are present in disk_list
1269 base_disk_index
= ord('b')
1271 block_device_mapping
= {}
1272 for disk
in disk_list
:
1273 if disk
.get('vim_id'):
1274 block_device_mapping
['_vd' + chr(base_disk_index
)] = disk
['vim_id']
1276 if 'image_id' in disk
:
1277 volume
= self
.cinder
.volumes
.create(size
=disk
['size'], name
=name
+ '_vd' +
1278 chr(base_disk_index
), imageRef
=disk
['image_id'])
1280 volume
= self
.cinder
.volumes
.create(size
=disk
['size'], name
=name
+ '_vd' +
1281 chr(base_disk_index
))
1282 created_items
["volume:" + str(volume
.id)] = True
1283 block_device_mapping
['_vd' + chr(base_disk_index
)] = volume
.id
1284 base_disk_index
+= 1
1286 # Wait until created volumes are with status available
1288 while elapsed_time
< volume_timeout
:
1289 for created_item
in created_items
:
1290 v
, _
, volume_id
= created_item
.partition(":")
1292 if self
.cinder
.volumes
.get(volume_id
).status
!= 'available':
1294 else: # all ready: break from while
1298 # If we exceeded the timeout rollback
1299 if elapsed_time
>= volume_timeout
:
1300 raise vimconn
.vimconnException('Timeout creating volumes for instance ' + name
,
1301 http_code
=vimconn
.HTTP_Request_Timeout
)
1302 # get availability Zone
1303 vm_av_zone
= self
._get
_vm
_availability
_zone
(availability_zone_index
, availability_zone_list
)
1305 self
.logger
.debug("nova.servers.create({}, {}, {}, nics={}, security_groups={}, "
1306 "availability_zone={}, key_name={}, userdata={}, config_drive={}, "
1307 "block_device_mapping={})".format(name
, image_id
, flavor_id
, net_list_vim
,
1308 self
.config
.get("security_groups"), vm_av_zone
,
1309 self
.config
.get('keypair'), userdata
, config_drive
,
1310 block_device_mapping
))
1311 server
= self
.nova
.servers
.create(name
, image_id
, flavor_id
, nics
=net_list_vim
,
1312 security_groups
=self
.config
.get("security_groups"),
1313 # TODO remove security_groups in future versions. Already at neutron port
1314 availability_zone
=vm_av_zone
,
1315 key_name
=self
.config
.get('keypair'),
1317 config_drive
=config_drive
,
1318 block_device_mapping
=block_device_mapping
1319 ) # , description=description)
1321 vm_start_time
= time
.time()
1322 # Previously mentioned workaround to wait until the VM is active and then disable the port-security
1323 if no_secured_ports
:
1324 self
.__wait
_for
_vm
(server
.id, 'ACTIVE')
1326 for port_id
in no_secured_ports
:
1328 self
.neutron
.update_port(port_id
,
1329 {"port": {"port_security_enabled": False, "security_groups": None}})
1330 except Exception as e
:
1331 raise vimconn
.vimconnException("It was not possible to disable port security for port {}".format(
1333 # print "DONE :-)", server
1336 if external_network
:
1337 floating_ips
= self
.neutron
.list_floatingips().get("floatingips", ())
1338 for floating_network
in external_network
:
1343 ip
= floating_ips
.pop(0)
1344 if ip
.get("port_id", False) or ip
.get('tenant_id') != server
.tenant_id
:
1346 if isinstance(floating_network
['floating_ip'], str):
1347 if ip
.get("floating_network_id") != floating_network
['floating_ip']:
1349 free_floating_ip
= ip
.get("floating_ip_address")
1351 if isinstance(floating_network
['floating_ip'], str) and \
1352 floating_network
['floating_ip'].lower() != "true":
1353 pool_id
= floating_network
['floating_ip']
1355 # Find the external network
1356 external_nets
= list()
1357 for net
in self
.neutron
.list_networks()['networks']:
1358 if net
['router:external']:
1359 external_nets
.append(net
)
1361 if len(external_nets
) == 0:
1362 raise vimconn
.vimconnException("Cannot create floating_ip automatically since no external "
1363 "network is present",
1364 http_code
=vimconn
.HTTP_Conflict
)
1365 if len(external_nets
) > 1:
1366 raise vimconn
.vimconnException("Cannot create floating_ip automatically since multiple "
1367 "external networks are present",
1368 http_code
=vimconn
.HTTP_Conflict
)
1370 pool_id
= external_nets
[0].get('id')
1371 param
= {'floatingip': {'floating_network_id': pool_id
, 'tenant_id': server
.tenant_id
}}
1373 # self.logger.debug("Creating floating IP")
1374 new_floating_ip
= self
.neutron
.create_floatingip(param
)
1375 free_floating_ip
= new_floating_ip
['floatingip']['floating_ip_address']
1376 except Exception as e
:
1377 raise vimconn
.vimconnException(type(e
).__name
__ + ": Cannot create new floating_ip " +
1378 str(e
), http_code
=vimconn
.HTTP_Conflict
)
1380 fix_ip
= floating_network
.get('ip')
1383 server
.add_floating_ip(free_floating_ip
, fix_ip
)
1385 except Exception as e
:
1386 # openstack need some time after VM creation to asign an IP. So retry if fails
1387 vm_status
= self
.nova
.servers
.get(server
.id).status
1388 if vm_status
!= 'ACTIVE' and vm_status
!= 'ERROR':
1389 if time
.time() - vm_start_time
< server_timeout
:
1392 raise vimconn
.vimconnException(
1393 "Cannot create floating_ip: {} {}".format(type(e
).__name
__, e
),
1394 http_code
=vimconn
.HTTP_Conflict
)
1396 except Exception as e
:
1397 if not floating_network
['exit_on_floating_ip_error']:
1398 self
.logger
.warn("Cannot create floating_ip. %s", str(e
))
1402 return server
.id, created_items
1403 # except nvExceptions.NotFound as e:
1404 # error_value=-vimconn.HTTP_Not_Found
1405 # error_text= "vm instance %s not found" % vm_id
1406 # except TypeError as e:
1407 # raise vimconn.vimconnException(type(e).__name__ + ": "+ str(e), http_code=vimconn.HTTP_Bad_Request)
1409 except Exception as e
:
1412 server_id
= server
.id
1414 self
.delete_vminstance(server_id
, created_items
)
1415 except Exception as e2
:
1416 self
.logger
.error("new_vminstance rollback fail {}".format(e2
))
1418 self
._format
_exception
(e
)
1420 def get_vminstance(self
,vm_id
):
1421 '''Returns the VM instance information from VIM'''
1422 #self.logger.debug("Getting VM from VIM")
1424 self
._reload
_connection
()
1425 server
= self
.nova
.servers
.find(id=vm_id
)
1426 #TODO parse input and translate to VIM format (openmano_schemas.new_vminstance_response_schema)
1427 return server
.to_dict()
1428 except (ksExceptions
.ClientException
, nvExceptions
.ClientException
, nvExceptions
.NotFound
, ConnectionError
) as e
:
1429 self
._format
_exception
(e
)
1431 def get_vminstance_console(self
,vm_id
, console_type
="vnc"):
1433 Get a console for the virtual machine
1435 vm_id: uuid of the VM
1436 console_type, can be:
1437 "novnc" (by default), "xvpvnc" for VNC types,
1438 "rdp-html5" for RDP types, "spice-html5" for SPICE types
1439 Returns dict with the console parameters:
1440 protocol: ssh, ftp, http, https, ...
1441 server: usually ip address
1442 port: the http, ssh, ... port
1443 suffix: extra text, e.g. the http path and query string
1445 self
.logger
.debug("Getting VM CONSOLE from VIM")
1447 self
._reload
_connection
()
1448 server
= self
.nova
.servers
.find(id=vm_id
)
1449 if console_type
== None or console_type
== "novnc":
1450 console_dict
= server
.get_vnc_console("novnc")
1451 elif console_type
== "xvpvnc":
1452 console_dict
= server
.get_vnc_console(console_type
)
1453 elif console_type
== "rdp-html5":
1454 console_dict
= server
.get_rdp_console(console_type
)
1455 elif console_type
== "spice-html5":
1456 console_dict
= server
.get_spice_console(console_type
)
1458 raise vimconn
.vimconnException("console type '{}' not allowed".format(console_type
), http_code
=vimconn
.HTTP_Bad_Request
)
1460 console_dict1
= console_dict
.get("console")
1462 console_url
= console_dict1
.get("url")
1465 protocol_index
= console_url
.find("//")
1466 suffix_index
= console_url
[protocol_index
+2:].find("/") + protocol_index
+2
1467 port_index
= console_url
[protocol_index
+2:suffix_index
].find(":") + protocol_index
+2
1468 if protocol_index
< 0 or port_index
<0 or suffix_index
<0:
1469 return -vimconn
.HTTP_Internal_Server_Error
, "Unexpected response from VIM"
1470 console_dict
={"protocol": console_url
[0:protocol_index
],
1471 "server": console_url
[protocol_index
+2:port_index
],
1472 "port": console_url
[port_index
:suffix_index
],
1473 "suffix": console_url
[suffix_index
+1:]
1477 raise vimconn
.vimconnUnexpectedResponse("Unexpected response from VIM")
1479 except (nvExceptions
.NotFound
, ksExceptions
.ClientException
, nvExceptions
.ClientException
, nvExceptions
.BadRequest
, ConnectionError
) as e
:
1480 self
._format
_exception
(e
)
1482 def delete_vminstance(self
, vm_id
, created_items
=None):
1483 '''Removes a VM instance from VIM. Returns the old identifier
1485 #print "osconnector: Getting VM from VIM"
1486 if created_items
== None:
1489 self
._reload
_connection
()
1490 # delete VM ports attached to this networks before the virtual machine
1491 for k
, v
in created_items
.items():
1492 if not v
: # skip already deleted
1495 k_item
, _
, k_id
= k
.partition(":")
1496 if k_item
== "port":
1497 self
.neutron
.delete_port(k_id
)
1498 except Exception as e
:
1499 self
.logger
.error("Error deleting port: {}: {}".format(type(e
).__name
__, e
))
1501 # #commented because detaching the volumes makes the servers.delete not work properly ?!?
1502 # #dettach volumes attached
1503 # server = self.nova.servers.get(vm_id)
1504 # volumes_attached_dict = server._info['os-extended-volumes:volumes_attached'] #volume['id']
1505 # #for volume in volumes_attached_dict:
1506 # # self.cinder.volumes.detach(volume['id'])
1509 self
.nova
.servers
.delete(vm_id
)
1511 # delete volumes. Although having detached, they should have in active status before deleting
1512 # we ensure in this loop
1515 while keep_waiting
and elapsed_time
< volume_timeout
:
1516 keep_waiting
= False
1517 for k
, v
in created_items
.items():
1518 if not v
: # skip already deleted
1521 k_item
, _
, k_id
= k
.partition(":")
1522 if k_item
== "volume":
1523 if self
.cinder
.volumes
.get(k_id
).status
!= 'available':
1526 self
.cinder
.volumes
.delete(k_id
)
1527 except Exception as e
:
1528 self
.logger
.error("Error deleting volume: {}: {}".format(type(e
).__name
__, e
))
1533 except (nvExceptions
.NotFound
, ksExceptions
.ClientException
, nvExceptions
.ClientException
, ConnectionError
) as e
:
1534 self
._format
_exception
(e
)
1536 def refresh_vms_status(self
, vm_list
):
1537 '''Get the status of the virtual machines and their interfaces/ports
1538 Params: the list of VM identifiers
1539 Returns a dictionary with:
1540 vm_id: #VIM id of this Virtual Machine
1541 status: #Mandatory. Text with one of:
1542 # DELETED (not found at vim)
1543 # VIM_ERROR (Cannot connect to VIM, VIM response error, ...)
1544 # OTHER (Vim reported other status not understood)
1545 # ERROR (VIM indicates an ERROR status)
1546 # ACTIVE, PAUSED, SUSPENDED, INACTIVE (not running),
1547 # CREATING (on building process), ERROR
1548 # ACTIVE:NoMgmtIP (Active but any of its interface has an IP address
1550 error_msg: #Text with VIM error message, if any. Or the VIM connection ERROR
1551 vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
1553 - vim_info: #Text with plain information obtained from vim (yaml.safe_dump)
1554 mac_address: #Text format XX:XX:XX:XX:XX:XX
1555 vim_net_id: #network id where this interface is connected
1556 vim_interface_id: #interface/port VIM id
1557 ip_address: #null, or text with IPv4, IPv6 address
1558 compute_node: #identification of compute node where PF,VF interface is allocated
1559 pci: #PCI address of the NIC that hosts the PF,VF
1560 vlan: #physical VLAN used for VF
1563 self
.logger
.debug("refresh_vms status: Getting tenant VM instance information from VIM")
1564 for vm_id
in vm_list
:
1567 vm_vim
= self
.get_vminstance(vm_id
)
1568 if vm_vim
['status'] in vmStatus2manoFormat
:
1569 vm
['status'] = vmStatus2manoFormat
[ vm_vim
['status'] ]
1571 vm
['status'] = "OTHER"
1572 vm
['error_msg'] = "VIM status reported " + vm_vim
['status']
1574 vm
['vim_info'] = self
.serialize(vm_vim
)
1576 vm
["interfaces"] = []
1577 if vm_vim
.get('fault'):
1578 vm
['error_msg'] = str(vm_vim
['fault'])
1581 self
._reload
_connection
()
1582 port_dict
= self
.neutron
.list_ports(device_id
=vm_id
)
1583 for port
in port_dict
["ports"]:
1585 interface
['vim_info'] = self
.serialize(port
)
1586 interface
["mac_address"] = port
.get("mac_address")
1587 interface
["vim_net_id"] = port
["network_id"]
1588 interface
["vim_interface_id"] = port
["id"]
1589 # check if OS-EXT-SRV-ATTR:host is there,
1590 # in case of non-admin credentials, it will be missing
1591 if vm_vim
.get('OS-EXT-SRV-ATTR:host'):
1592 interface
["compute_node"] = vm_vim
['OS-EXT-SRV-ATTR:host']
1593 interface
["pci"] = None
1595 # check if binding:profile is there,
1596 # in case of non-admin credentials, it will be missing
1597 if port
.get('binding:profile'):
1598 if port
['binding:profile'].get('pci_slot'):
1599 # TODO: At the moment sr-iov pci addresses are converted to PF pci addresses by setting the slot to 0x00
1600 # TODO: This is just a workaround valid for niantinc. Find a better way to do so
1601 # CHANGE DDDD:BB:SS.F to DDDD:BB:00.(F%2) assuming there are 2 ports per nic
1602 pci
= port
['binding:profile']['pci_slot']
1603 # interface["pci"] = pci[:-4] + "00." + str(int(pci[-1]) % 2)
1604 interface
["pci"] = pci
1605 interface
["vlan"] = None
1606 #if network is of type vlan and port is of type direct (sr-iov) then set vlan id
1607 network
= self
.neutron
.show_network(port
["network_id"])
1608 if network
['network'].get('provider:network_type') == 'vlan' and \
1609 port
.get("binding:vnic_type") == "direct":
1610 interface
["vlan"] = network
['network'].get('provider:segmentation_id')
1612 #look for floating ip address
1614 floating_ip_dict
= self
.neutron
.list_floatingips(port_id
=port
["id"])
1615 if floating_ip_dict
.get("floatingips"):
1616 ips
.append(floating_ip_dict
["floatingips"][0].get("floating_ip_address") )
1620 for subnet
in port
["fixed_ips"]:
1621 ips
.append(subnet
["ip_address"])
1622 interface
["ip_address"] = ";".join(ips
)
1623 vm
["interfaces"].append(interface
)
1624 except Exception as e
:
1625 self
.logger
.error("Error getting vm interface information {}: {}".format(type(e
).__name
__, e
),
1627 except vimconn
.vimconnNotFoundException
as e
:
1628 self
.logger
.error("Exception getting vm status: %s", str(e
))
1629 vm
['status'] = "DELETED"
1630 vm
['error_msg'] = str(e
)
1631 except vimconn
.vimconnException
as e
:
1632 self
.logger
.error("Exception getting vm status: %s", str(e
))
1633 vm
['status'] = "VIM_ERROR"
1634 vm
['error_msg'] = str(e
)
1638 def action_vminstance(self
, vm_id
, action_dict
, created_items
={}):
1639 '''Send and action over a VM instance from VIM
1640 Returns None or the console dict if the action was successfully sent to the VIM'''
1641 self
.logger
.debug("Action over VM '%s': %s", vm_id
, str(action_dict
))
1643 self
._reload
_connection
()
1644 server
= self
.nova
.servers
.find(id=vm_id
)
1645 if "start" in action_dict
:
1646 if action_dict
["start"]=="rebuild":
1649 if server
.status
=="PAUSED":
1651 elif server
.status
=="SUSPENDED":
1653 elif server
.status
=="SHUTOFF":
1655 elif "pause" in action_dict
:
1657 elif "resume" in action_dict
:
1659 elif "shutoff" in action_dict
or "shutdown" in action_dict
:
1661 elif "forceOff" in action_dict
:
1663 elif "terminate" in action_dict
:
1665 elif "createImage" in action_dict
:
1666 server
.create_image()
1667 #"path":path_schema,
1668 #"description":description_schema,
1669 #"name":name_schema,
1670 #"metadata":metadata_schema,
1671 #"imageRef": id_schema,
1672 #"disk": {"oneOf":[{"type": "null"}, {"type":"string"}] },
1673 elif "rebuild" in action_dict
:
1674 server
.rebuild(server
.image
['id'])
1675 elif "reboot" in action_dict
:
1676 server
.reboot() #reboot_type='SOFT'
1677 elif "console" in action_dict
:
1678 console_type
= action_dict
["console"]
1679 if console_type
== None or console_type
== "novnc":
1680 console_dict
= server
.get_vnc_console("novnc")
1681 elif console_type
== "xvpvnc":
1682 console_dict
= server
.get_vnc_console(console_type
)
1683 elif console_type
== "rdp-html5":
1684 console_dict
= server
.get_rdp_console(console_type
)
1685 elif console_type
== "spice-html5":
1686 console_dict
= server
.get_spice_console(console_type
)
1688 raise vimconn
.vimconnException("console type '{}' not allowed".format(console_type
),
1689 http_code
=vimconn
.HTTP_Bad_Request
)
1691 console_url
= console_dict
["console"]["url"]
1693 protocol_index
= console_url
.find("//")
1694 suffix_index
= console_url
[protocol_index
+2:].find("/") + protocol_index
+2
1695 port_index
= console_url
[protocol_index
+2:suffix_index
].find(":") + protocol_index
+2
1696 if protocol_index
< 0 or port_index
<0 or suffix_index
<0:
1697 raise vimconn
.vimconnException("Unexpected response from VIM " + str(console_dict
))
1698 console_dict2
={"protocol": console_url
[0:protocol_index
],
1699 "server": console_url
[protocol_index
+2 : port_index
],
1700 "port": int(console_url
[port_index
+1 : suffix_index
]),
1701 "suffix": console_url
[suffix_index
+1:]
1703 return console_dict2
1704 except Exception as e
:
1705 raise vimconn
.vimconnException("Unexpected response from VIM " + str(console_dict
))
1708 except (ksExceptions
.ClientException
, nvExceptions
.ClientException
, nvExceptions
.NotFound
, ConnectionError
) as e
:
1709 self
._format
_exception
(e
)
1710 #TODO insert exception vimconn.HTTP_Unauthorized
1712 ####### VIO Specific Changes #########
1713 def _generate_vlanID(self
):
1715 Method to get unused vlanID
1723 networks
= self
.get_network_list()
1724 for net
in networks
:
1725 if net
.get('provider:segmentation_id'):
1726 usedVlanIDs
.append(net
.get('provider:segmentation_id'))
1727 used_vlanIDs
= set(usedVlanIDs
)
1729 #find unused VLAN ID
1730 for vlanID_range
in self
.config
.get('dataplane_net_vlan_range'):
1732 start_vlanid
, end_vlanid
= map(int, vlanID_range
.replace(" ", "").split("-"))
1733 for vlanID
in xrange(start_vlanid
, end_vlanid
+ 1):
1734 if vlanID
not in used_vlanIDs
:
1736 except Exception as exp
:
1737 raise vimconn
.vimconnException("Exception {} occurred while generating VLAN ID.".format(exp
))
1739 raise vimconn
.vimconnConflictException("Unable to create the SRIOV VLAN network."\
1740 " All given Vlan IDs {} are in use.".format(self
.config
.get('dataplane_net_vlan_range')))
1743 def _generate_multisegment_vlanID(self
):
1745 Method to get unused vlanID
1753 networks
= self
.get_network_list()
1754 for net
in networks
:
1755 if net
.get('provider:network_type') == "vlan" and net
.get('provider:segmentation_id'):
1756 usedVlanIDs
.append(net
.get('provider:segmentation_id'))
1757 elif net
.get('segments'):
1758 for segment
in net
.get('segments'):
1759 if segment
.get('provider:network_type') == "vlan" and segment
.get('provider:segmentation_id'):
1760 usedVlanIDs
.append(segment
.get('provider:segmentation_id'))
1761 used_vlanIDs
= set(usedVlanIDs
)
1763 #find unused VLAN ID
1764 for vlanID_range
in self
.config
.get('multisegment_vlan_range'):
1766 start_vlanid
, end_vlanid
= map(int, vlanID_range
.replace(" ", "").split("-"))
1767 for vlanID
in xrange(start_vlanid
, end_vlanid
+ 1):
1768 if vlanID
not in used_vlanIDs
:
1770 except Exception as exp
:
1771 raise vimconn
.vimconnException("Exception {} occurred while generating VLAN ID.".format(exp
))
1773 raise vimconn
.vimconnConflictException("Unable to create the VLAN segment."\
1774 " All VLAN IDs {} are in use.".format(self
.config
.get('multisegment_vlan_range')))
1777 def _validate_vlan_ranges(self
, input_vlan_range
, text_vlan_range
):
1779 Method to validate user given vlanID ranges
1783 for vlanID_range
in input_vlan_range
:
1784 vlan_range
= vlanID_range
.replace(" ", "")
1786 vlanID_pattern
= r
'(\d)*-(\d)*$'
1787 match_obj
= re
.match(vlanID_pattern
, vlan_range
)
1789 raise vimconn
.vimconnConflictException("Invalid VLAN range for {}: {}.You must provide "\
1790 "'{}' in format [start_ID - end_ID].".format(text_vlan_range
, vlanID_range
, text_vlan_range
))
1792 start_vlanid
, end_vlanid
= map(int,vlan_range
.split("-"))
1793 if start_vlanid
<= 0 :
1794 raise vimconn
.vimconnConflictException("Invalid VLAN range for {}: {}."\
1795 "Start ID can not be zero. For VLAN "\
1796 "networks valid IDs are 1 to 4094 ".format(text_vlan_range
, vlanID_range
))
1797 if end_vlanid
> 4094 :
1798 raise vimconn
.vimconnConflictException("Invalid VLAN range for {}: {}."\
1799 "End VLAN ID can not be greater than 4094. For VLAN "\
1800 "networks valid IDs are 1 to 4094 ".format(text_vlan_range
, vlanID_range
))
1802 if start_vlanid
> end_vlanid
:
1803 raise vimconn
.vimconnConflictException("Invalid VLAN range for {}: {}."\
1804 "You must provide '{}' in format start_ID - end_ID and "\
1805 "start_ID < end_ID ".format(text_vlan_range
, vlanID_range
, text_vlan_range
))
1809 def new_external_port(self
, port_data
):
1810 #TODO openstack if needed
1811 '''Adds a external port to VIM'''
1812 '''Returns the port identifier'''
1813 return -vimconn
.HTTP_Internal_Server_Error
, "osconnector.new_external_port() not implemented"
1815 def connect_port_network(self
, port_id
, network_id
, admin
=False):
1816 #TODO openstack if needed
1817 '''Connects a external port to a network'''
1818 '''Returns status code of the VIM response'''
1819 return -vimconn
.HTTP_Internal_Server_Error
, "osconnector.connect_port_network() not implemented"
1821 def new_user(self
, user_name
, user_passwd
, tenant_id
=None):
1822 '''Adds a new user to openstack VIM'''
1823 '''Returns the user identifier'''
1824 self
.logger
.debug("osconnector: Adding a new user to VIM")
1826 self
._reload
_connection
()
1827 user
=self
.keystone
.users
.create(user_name
, password
=user_passwd
, default_project
=tenant_id
)
1828 #self.keystone.tenants.add_user(self.k_creds["username"], #role)
1830 except ksExceptions
.ConnectionError
as e
:
1831 error_value
=-vimconn
.HTTP_Bad_Request
1832 error_text
= type(e
).__name
__ + ": "+ (str(e
) if len(e
.args
)==0 else str(e
.args
[0]))
1833 except ksExceptions
.ClientException
as e
: #TODO remove
1834 error_value
=-vimconn
.HTTP_Bad_Request
1835 error_text
= type(e
).__name
__ + ": "+ (str(e
) if len(e
.args
)==0 else str(e
.args
[0]))
1836 #TODO insert exception vimconn.HTTP_Unauthorized
1837 #if reaching here is because an exception
1838 self
.logger
.debug("new_user " + error_text
)
1839 return error_value
, error_text
1841 def delete_user(self
, user_id
):
1842 '''Delete a user from openstack VIM'''
1843 '''Returns the user identifier'''
1845 print("osconnector: Deleting a user from VIM")
1847 self
._reload
_connection
()
1848 self
.keystone
.users
.delete(user_id
)
1850 except ksExceptions
.ConnectionError
as e
:
1851 error_value
=-vimconn
.HTTP_Bad_Request
1852 error_text
= type(e
).__name
__ + ": "+ (str(e
) if len(e
.args
)==0 else str(e
.args
[0]))
1853 except ksExceptions
.NotFound
as e
:
1854 error_value
=-vimconn
.HTTP_Not_Found
1855 error_text
= type(e
).__name
__ + ": "+ (str(e
) if len(e
.args
)==0 else str(e
.args
[0]))
1856 except ksExceptions
.ClientException
as e
: #TODO remove
1857 error_value
=-vimconn
.HTTP_Bad_Request
1858 error_text
= type(e
).__name
__ + ": "+ (str(e
) if len(e
.args
)==0 else str(e
.args
[0]))
1859 #TODO insert exception vimconn.HTTP_Unauthorized
1860 #if reaching here is because an exception
1861 self
.logger
.debug("delete_tenant " + error_text
)
1862 return error_value
, error_text
1864 def get_hosts_info(self
):
1865 '''Get the information of deployed hosts
1866 Returns the hosts content'''
1868 print("osconnector: Getting Host info from VIM")
1871 self
._reload
_connection
()
1872 hypervisors
= self
.nova
.hypervisors
.list()
1873 for hype
in hypervisors
:
1874 h_list
.append( hype
.to_dict() )
1875 return 1, {"hosts":h_list
}
1876 except nvExceptions
.NotFound
as e
:
1877 error_value
=-vimconn
.HTTP_Not_Found
1878 error_text
= (str(e
) if len(e
.args
)==0 else str(e
.args
[0]))
1879 except (ksExceptions
.ClientException
, nvExceptions
.ClientException
) as e
:
1880 error_value
=-vimconn
.HTTP_Bad_Request
1881 error_text
= type(e
).__name
__ + ": "+ (str(e
) if len(e
.args
)==0 else str(e
.args
[0]))
1882 #TODO insert exception vimconn.HTTP_Unauthorized
1883 #if reaching here is because an exception
1884 self
.logger
.debug("get_hosts_info " + error_text
)
1885 return error_value
, error_text
1887 def get_hosts(self
, vim_tenant
):
1888 '''Get the hosts and deployed instances
1889 Returns the hosts content'''
1890 r
, hype_dict
= self
.get_hosts_info()
1893 hypervisors
= hype_dict
["hosts"]
1895 servers
= self
.nova
.servers
.list()
1896 for hype
in hypervisors
:
1897 for server
in servers
:
1898 if server
.to_dict()['OS-EXT-SRV-ATTR:hypervisor_hostname']==hype
['hypervisor_hostname']:
1900 hype
['vm'].append(server
.id)
1902 hype
['vm'] = [server
.id]
1904 except nvExceptions
.NotFound
as e
:
1905 error_value
=-vimconn
.HTTP_Not_Found
1906 error_text
= (str(e
) if len(e
.args
)==0 else str(e
.args
[0]))
1907 except (ksExceptions
.ClientException
, nvExceptions
.ClientException
) as e
:
1908 error_value
=-vimconn
.HTTP_Bad_Request
1909 error_text
= type(e
).__name
__ + ": "+ (str(e
) if len(e
.args
)==0 else str(e
.args
[0]))
1910 #TODO insert exception vimconn.HTTP_Unauthorized
1911 #if reaching here is because an exception
1912 self
.logger
.debug("get_hosts " + error_text
)
1913 return error_value
, error_text
1915 def new_classification(self
, name
, ctype
, definition
):
1917 'Adding a new (Traffic) Classification to VIM, named %s', name
)
1920 self
._reload
_connection
()
1921 if ctype
not in supportedClassificationTypes
:
1922 raise vimconn
.vimconnNotSupportedException(
1923 'OpenStack VIM connector doesn\'t support provided '
1924 'Classification Type {}, supported ones are: '
1925 '{}'.format(ctype
, supportedClassificationTypes
))
1926 if not self
._validate
_classification
(ctype
, definition
):
1927 raise vimconn
.vimconnException(
1928 'Incorrect Classification definition '
1929 'for the type specified.')
1930 classification_dict
= definition
1931 classification_dict
['name'] = name
1933 new_class
= self
.neutron
.create_sfc_flow_classifier(
1934 {'flow_classifier': classification_dict
})
1935 return new_class
['flow_classifier']['id']
1936 except (neExceptions
.ConnectionFailed
, ksExceptions
.ClientException
,
1937 neExceptions
.NeutronException
, ConnectionError
) as e
:
1939 'Creation of Classification failed.')
1940 self
._format
_exception
(e
)
1942 def get_classification(self
, class_id
):
1943 self
.logger
.debug(" Getting Classification %s from VIM", class_id
)
1944 filter_dict
= {"id": class_id
}
1945 class_list
= self
.get_classification_list(filter_dict
)
1946 if len(class_list
) == 0:
1947 raise vimconn
.vimconnNotFoundException(
1948 "Classification '{}' not found".format(class_id
))
1949 elif len(class_list
) > 1:
1950 raise vimconn
.vimconnConflictException(
1951 "Found more than one Classification with this criteria")
1952 classification
= class_list
[0]
1953 return classification
1955 def get_classification_list(self
, filter_dict
={}):
1956 self
.logger
.debug("Getting Classifications from VIM filter: '%s'",
1959 filter_dict_os
= filter_dict
.copy()
1960 self
._reload
_connection
()
1961 if self
.api_version3
and "tenant_id" in filter_dict_os
:
1962 filter_dict_os
['project_id'] = filter_dict_os
.pop('tenant_id')
1963 classification_dict
= self
.neutron
.list_sfc_flow_classifiers(
1965 classification_list
= classification_dict
["flow_classifiers"]
1966 self
.__classification
_os
2mano
(classification_list
)
1967 return classification_list
1968 except (neExceptions
.ConnectionFailed
, ksExceptions
.ClientException
,
1969 neExceptions
.NeutronException
, ConnectionError
) as e
:
1970 self
._format
_exception
(e
)
1972 def delete_classification(self
, class_id
):
1973 self
.logger
.debug("Deleting Classification '%s' from VIM", class_id
)
1975 self
._reload
_connection
()
1976 self
.neutron
.delete_sfc_flow_classifier(class_id
)
1978 except (neExceptions
.ConnectionFailed
, neExceptions
.NeutronException
,
1979 ksExceptions
.ClientException
, neExceptions
.NeutronException
,
1980 ConnectionError
) as e
:
1981 self
._format
_exception
(e
)
1983 def new_sfi(self
, name
, ingress_ports
, egress_ports
, sfc_encap
=True):
1985 "Adding a new Service Function Instance to VIM, named '%s'", name
)
1988 self
._reload
_connection
()
1992 if len(ingress_ports
) != 1:
1993 raise vimconn
.vimconnNotSupportedException(
1994 "OpenStack VIM connector can only have "
1995 "1 ingress port per SFI")
1996 if len(egress_ports
) != 1:
1997 raise vimconn
.vimconnNotSupportedException(
1998 "OpenStack VIM connector can only have "
1999 "1 egress port per SFI")
2000 sfi_dict
= {'name': name
,
2001 'ingress': ingress_ports
[0],
2002 'egress': egress_ports
[0],
2003 'service_function_parameters': {
2004 'correlation': correlation
}}
2005 new_sfi
= self
.neutron
.create_sfc_port_pair({'port_pair': sfi_dict
})
2006 return new_sfi
['port_pair']['id']
2007 except (neExceptions
.ConnectionFailed
, ksExceptions
.ClientException
,
2008 neExceptions
.NeutronException
, ConnectionError
) as e
:
2011 self
.neutron
.delete_sfc_port_pair(
2012 new_sfi
['port_pair']['id'])
2015 'Creation of Service Function Instance failed, with '
2016 'subsequent deletion failure as well.')
2017 self
._format
_exception
(e
)
2019 def get_sfi(self
, sfi_id
):
2021 'Getting Service Function Instance %s from VIM', sfi_id
)
2022 filter_dict
= {"id": sfi_id
}
2023 sfi_list
= self
.get_sfi_list(filter_dict
)
2024 if len(sfi_list
) == 0:
2025 raise vimconn
.vimconnNotFoundException(
2026 "Service Function Instance '{}' not found".format(sfi_id
))
2027 elif len(sfi_list
) > 1:
2028 raise vimconn
.vimconnConflictException(
2029 'Found more than one Service Function Instance '
2030 'with this criteria')
2034 def get_sfi_list(self
, filter_dict
={}):
2035 self
.logger
.debug("Getting Service Function Instances from "
2036 "VIM filter: '%s'", str(filter_dict
))
2038 self
._reload
_connection
()
2039 filter_dict_os
= filter_dict
.copy()
2040 if self
.api_version3
and "tenant_id" in filter_dict_os
:
2041 filter_dict_os
['project_id'] = filter_dict_os
.pop('tenant_id')
2042 sfi_dict
= self
.neutron
.list_sfc_port_pairs(**filter_dict_os
)
2043 sfi_list
= sfi_dict
["port_pairs"]
2044 self
.__sfi
_os
2mano
(sfi_list
)
2046 except (neExceptions
.ConnectionFailed
, ksExceptions
.ClientException
,
2047 neExceptions
.NeutronException
, ConnectionError
) as e
:
2048 self
._format
_exception
(e
)
2050 def delete_sfi(self
, sfi_id
):
2051 self
.logger
.debug("Deleting Service Function Instance '%s' "
2054 self
._reload
_connection
()
2055 self
.neutron
.delete_sfc_port_pair(sfi_id
)
2057 except (neExceptions
.ConnectionFailed
, neExceptions
.NeutronException
,
2058 ksExceptions
.ClientException
, neExceptions
.NeutronException
,
2059 ConnectionError
) as e
:
2060 self
._format
_exception
(e
)
2062 def new_sf(self
, name
, sfis
, sfc_encap
=True):
2063 self
.logger
.debug("Adding a new Service Function to VIM, "
2067 self
._reload
_connection
()
2068 # correlation = None
2070 # correlation = 'nsh'
2071 for instance
in sfis
:
2072 sfi
= self
.get_sfi(instance
)
2073 if sfi
.get('sfc_encap') != sfc_encap
:
2074 raise vimconn
.vimconnNotSupportedException(
2075 "OpenStack VIM connector requires all SFIs of the "
2076 "same SF to share the same SFC Encapsulation")
2077 sf_dict
= {'name': name
,
2079 new_sf
= self
.neutron
.create_sfc_port_pair_group({
2080 'port_pair_group': sf_dict
})
2081 return new_sf
['port_pair_group']['id']
2082 except (neExceptions
.ConnectionFailed
, ksExceptions
.ClientException
,
2083 neExceptions
.NeutronException
, ConnectionError
) as e
:
2086 self
.neutron
.delete_sfc_port_pair_group(
2087 new_sf
['port_pair_group']['id'])
2090 'Creation of Service Function failed, with '
2091 'subsequent deletion failure as well.')
2092 self
._format
_exception
(e
)
2094 def get_sf(self
, sf_id
):
2095 self
.logger
.debug("Getting Service Function %s from VIM", sf_id
)
2096 filter_dict
= {"id": sf_id
}
2097 sf_list
= self
.get_sf_list(filter_dict
)
2098 if len(sf_list
) == 0:
2099 raise vimconn
.vimconnNotFoundException(
2100 "Service Function '{}' not found".format(sf_id
))
2101 elif len(sf_list
) > 1:
2102 raise vimconn
.vimconnConflictException(
2103 "Found more than one Service Function with this criteria")
2107 def get_sf_list(self
, filter_dict
={}):
2108 self
.logger
.debug("Getting Service Function from VIM filter: '%s'",
2111 self
._reload
_connection
()
2112 filter_dict_os
= filter_dict
.copy()
2113 if self
.api_version3
and "tenant_id" in filter_dict_os
:
2114 filter_dict_os
['project_id'] = filter_dict_os
.pop('tenant_id')
2115 sf_dict
= self
.neutron
.list_sfc_port_pair_groups(**filter_dict_os
)
2116 sf_list
= sf_dict
["port_pair_groups"]
2117 self
.__sf
_os
2mano
(sf_list
)
2119 except (neExceptions
.ConnectionFailed
, ksExceptions
.ClientException
,
2120 neExceptions
.NeutronException
, ConnectionError
) as e
:
2121 self
._format
_exception
(e
)
2123 def delete_sf(self
, sf_id
):
2124 self
.logger
.debug("Deleting Service Function '%s' from VIM", sf_id
)
2126 self
._reload
_connection
()
2127 self
.neutron
.delete_sfc_port_pair_group(sf_id
)
2129 except (neExceptions
.ConnectionFailed
, neExceptions
.NeutronException
,
2130 ksExceptions
.ClientException
, neExceptions
.NeutronException
,
2131 ConnectionError
) as e
:
2132 self
._format
_exception
(e
)
2134 def new_sfp(self
, name
, classifications
, sfs
, sfc_encap
=True, spi
=None):
2135 self
.logger
.debug("Adding a new Service Function Path to VIM, "
2139 self
._reload
_connection
()
2140 # In networking-sfc the MPLS encapsulation is legacy
2141 # should be used when no full SFC Encapsulation is intended
2142 correlation
= 'mpls'
2145 sfp_dict
= {'name': name
,
2146 'flow_classifiers': classifications
,
2147 'port_pair_groups': sfs
,
2148 'chain_parameters': {'correlation': correlation
}}
2150 sfp_dict
['chain_id'] = spi
2151 new_sfp
= self
.neutron
.create_sfc_port_chain({'port_chain': sfp_dict
})
2152 return new_sfp
["port_chain"]["id"]
2153 except (neExceptions
.ConnectionFailed
, ksExceptions
.ClientException
,
2154 neExceptions
.NeutronException
, ConnectionError
) as e
:
2157 self
.neutron
.delete_sfc_port_chain(new_sfp
['port_chain']['id'])
2160 'Creation of Service Function Path failed, with '
2161 'subsequent deletion failure as well.')
2162 self
._format
_exception
(e
)
2164 def get_sfp(self
, sfp_id
):
2165 self
.logger
.debug(" Getting Service Function Path %s from VIM", sfp_id
)
2166 filter_dict
= {"id": sfp_id
}
2167 sfp_list
= self
.get_sfp_list(filter_dict
)
2168 if len(sfp_list
) == 0:
2169 raise vimconn
.vimconnNotFoundException(
2170 "Service Function Path '{}' not found".format(sfp_id
))
2171 elif len(sfp_list
) > 1:
2172 raise vimconn
.vimconnConflictException(
2173 "Found more than one Service Function Path with this criteria")
2177 def get_sfp_list(self
, filter_dict
={}):
2178 self
.logger
.debug("Getting Service Function Paths from VIM filter: "
2179 "'%s'", str(filter_dict
))
2181 self
._reload
_connection
()
2182 filter_dict_os
= filter_dict
.copy()
2183 if self
.api_version3
and "tenant_id" in filter_dict_os
:
2184 filter_dict_os
['project_id'] = filter_dict_os
.pop('tenant_id')
2185 sfp_dict
= self
.neutron
.list_sfc_port_chains(**filter_dict_os
)
2186 sfp_list
= sfp_dict
["port_chains"]
2187 self
.__sfp
_os
2mano
(sfp_list
)
2189 except (neExceptions
.ConnectionFailed
, ksExceptions
.ClientException
,
2190 neExceptions
.NeutronException
, ConnectionError
) as e
:
2191 self
._format
_exception
(e
)
2193 def delete_sfp(self
, sfp_id
):
2195 "Deleting Service Function Path '%s' from VIM", sfp_id
)
2197 self
._reload
_connection
()
2198 self
.neutron
.delete_sfc_port_chain(sfp_id
)
2200 except (neExceptions
.ConnectionFailed
, neExceptions
.NeutronException
,
2201 ksExceptions
.ClientException
, neExceptions
.NeutronException
,
2202 ConnectionError
) as e
:
2203 self
._format
_exception
(e
)