![Adit Sarfaty](/assets/img/avatar_default.png)
FWaaS V2 support in NSX-v3. Support different firewall group per router interface port for igress/egress. limitation: cannot support egress rules with source ip, or ingress rules with destination ips. Depends-on: I2a37be5518bfc8124ffca2ab05f684d8c1c3d673 Change-Id: I3ed70fa48d078bed15f30e855b73bdfb11d11c6e
150 lines
5.8 KiB
Python
150 lines
5.8 KiB
Python
# Copyright 2017 VMware, Inc.
|
|
# All Rights Reserved
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from oslo_config import cfg
|
|
from oslo_log import log as logging
|
|
|
|
from neutron.agent.l3 import router_info
|
|
from neutron.common import config as neutron_config # noqa
|
|
from neutron_fwaas.db.firewall.v2 import firewall_db_v2
|
|
from neutron_fwaas.services.firewall.agents.l3reference \
|
|
import firewall_l3_agent_v2
|
|
from neutron_lib import constants as nl_constants
|
|
from neutron_lib import context as n_context
|
|
from neutron_lib.plugins import directory
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
|
class DummyAgentApi(object):
|
|
def is_router_in_namespace(self, router_id):
|
|
return True
|
|
|
|
|
|
class NsxFwaasCallbacksV2(firewall_l3_agent_v2.L3WithFWaaS):
|
|
"""Common NSX RPC callbacks for Firewall As A Service - V2."""
|
|
def __init__(self):
|
|
# The super code needs a configuration object with the neutron host
|
|
# and an agent_mode, which our driver doesn't use.
|
|
neutron_conf = cfg.CONF
|
|
neutron_conf.agent_mode = 'nsx'
|
|
super(NsxFwaasCallbacksV2, self).__init__(conf=neutron_conf)
|
|
self.agent_api = DummyAgentApi()
|
|
|
|
@property
|
|
def core_plugin(self):
|
|
return directory.get_plugin()
|
|
|
|
# Override functions using the agent_api that is not used by our plugin
|
|
def _get_firewall_group_ports(self, context, firewall_group,
|
|
to_delete=False, require_new_plugin=False):
|
|
"""Returns in-namespace ports, either from firewall group dict if newer
|
|
version of plugin or from project routers otherwise.
|
|
|
|
NOTE: Vernacular move from "tenant" to "project" doesn't yet appear
|
|
as a key in router or firewall group objects.
|
|
"""
|
|
fwg_port_ids = []
|
|
if self._has_port_insertion_fields(firewall_group):
|
|
if to_delete:
|
|
fwg_port_ids = firewall_group['del-port-ids']
|
|
else:
|
|
fwg_port_ids = firewall_group['add-port-ids']
|
|
elif not require_new_plugin:
|
|
routers = self._get_routers_in_project(
|
|
context, firewall_group['tenant_id'])
|
|
for router in routers:
|
|
if router.router['tenant_id'] == firewall_group['tenant_id']:
|
|
fwg_port_ids.extend([p['id'] for p in
|
|
router.internal_ports])
|
|
|
|
# Return in-namespace port objects.
|
|
return self._get_in_ns_ports(fwg_port_ids)
|
|
|
|
def _get_in_ns_ports(self, port_ids):
|
|
"""Returns port objects in the local namespace, along with their
|
|
router_info.
|
|
"""
|
|
context = n_context.get_admin_context()
|
|
in_ns_ports = {} # This will be converted to a list later.
|
|
for port_id in port_ids:
|
|
# find the router of this port:
|
|
port = self.core_plugin.get_port(context, port_id)
|
|
router_id = port['device_id']
|
|
router = self.core_plugin.get_router(context, router_id)
|
|
router_info = self._router_dict_to_obj(router)
|
|
if router_info:
|
|
if router_info in in_ns_ports:
|
|
in_ns_ports[router_info].append(port_id)
|
|
else:
|
|
in_ns_ports[router_info] = [port_id]
|
|
return list(in_ns_ports.items())
|
|
|
|
def _get_routers_in_project(self, context, project_id):
|
|
return self.core_plugin.get_routers(
|
|
context,
|
|
filters={'project_id': [project_id]})
|
|
|
|
def _router_dict_to_obj(self, r):
|
|
# The callbacks expect a router-info object
|
|
return router_info.RouterInfo(
|
|
None, r['id'], router=r,
|
|
agent_conf=None,
|
|
interface_driver=None,
|
|
use_ipv6=False)
|
|
|
|
def get_port_fwg(self, context, port_id):
|
|
"""Return the firewall group of this port
|
|
|
|
if the FWaaS rules should be added to the backend router.
|
|
"""
|
|
if not self.fwaas_enabled:
|
|
return False
|
|
|
|
ctx = context.elevated()
|
|
fwg_id = self._get_port_firewall_group_id(ctx, port_id)
|
|
if fwg_id is None:
|
|
# No FWaas Firewall was assigned to this port
|
|
return
|
|
|
|
# check the state of this firewall group
|
|
fwg = self._get_fw_group_from_plugin(ctx, fwg_id)
|
|
if fwg is not None:
|
|
if fwg.get('status') in (nl_constants.ERROR,
|
|
nl_constants.PENDING_DELETE):
|
|
# Do not add rules of firewalls with errors
|
|
LOG.warning("Port %(port)s will not get rules from firewall "
|
|
"group %(fwg)s which is in %(status)s",
|
|
{'port': port_id, 'fwg': fwg_id,
|
|
'status': fwg['status']})
|
|
return
|
|
|
|
return fwg
|
|
|
|
def _get_fw_group_from_plugin(self, context, fwg_id):
|
|
# NOTE(asarfaty): currently there is no api to get a specific firewall
|
|
fwg_list = self.fwplugin_rpc.get_firewall_groups_for_project(context)
|
|
for fwg in fwg_list:
|
|
if fwg['id'] == fwg_id:
|
|
return fwg
|
|
|
|
# TODO(asarfaty): add this api to fwaas firewall_db_v2
|
|
def _get_port_firewall_group_id(self, context, port_id):
|
|
entry = context.session.query(
|
|
firewall_db_v2.FirewallGroupPortAssociation).filter_by(
|
|
port_id=port_id).first()
|
|
if entry:
|
|
return entry.firewall_group_id
|