170d14add2
- Mechanism driver specific unit testing. Implements: blueprint fsl-sdn-os-mech-driver Change-Id: If37a39119c620c6d204346a7fe66c70aaad7261e
289 lines
11 KiB
Python
Executable File
289 lines
11 KiB
Python
Executable File
# Copyright (c) 2014 Freescale Semiconductor
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
# implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
# @author: Trinath Somanchi, Freescale, Inc
|
|
|
|
|
|
from neutronclient.v2_0 import client
|
|
from oslo.config import cfg
|
|
|
|
from neutron.common import constants as n_const
|
|
from neutron.common import log
|
|
from neutron.extensions import portbindings
|
|
from neutron.openstack.common import log as logging
|
|
from neutron.plugins.common import constants
|
|
from neutron.plugins.ml2 import driver_api as api
|
|
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
# CRD service options required for FSL SDN OS Mech Driver
|
|
ml2_fslsdn_opts = [
|
|
cfg.StrOpt('crd_user_name', default='crd',
|
|
help=_("CRD service Username")),
|
|
cfg.StrOpt('crd_password', default='password',
|
|
secret='True',
|
|
help=_("CRD Service Password")),
|
|
cfg.StrOpt('crd_tenant_name', default='service',
|
|
help=_("CRD Tenant Name")),
|
|
cfg.StrOpt('crd_auth_url',
|
|
default='http://127.0.0.1:5000/v2.0/',
|
|
help=_("CRD Auth URL")),
|
|
cfg.StrOpt('crd_url',
|
|
default='http://127.0.0.1:9797',
|
|
help=_("URL for connecting to CRD service")),
|
|
cfg.IntOpt('crd_url_timeout',
|
|
default=30,
|
|
help=_("Timeout value for connecting to "
|
|
"CRD service in seconds")),
|
|
cfg.StrOpt('crd_region_name',
|
|
default='RegionOne',
|
|
help=_("Region name for connecting to "
|
|
"CRD Service in admin context")),
|
|
cfg.BoolOpt('crd_api_insecure',
|
|
default=False,
|
|
help=_("If set, ignore any SSL validation issues")),
|
|
cfg.StrOpt('crd_auth_strategy',
|
|
default='keystone',
|
|
help=_("Auth strategy for connecting to "
|
|
"neutron in admin context")),
|
|
cfg.StrOpt('crd_ca_certificates_file',
|
|
help=_("Location of ca certificates file to use for "
|
|
"CRD client requests.")),
|
|
]
|
|
|
|
# Register the configuration option for crd service
|
|
# required for FSL SDN OS Mechanism driver
|
|
cfg.CONF.register_opts(ml2_fslsdn_opts, "ml2_fslsdn")
|
|
|
|
# shortcut
|
|
FSLCONF = cfg.CONF.ml2_fslsdn
|
|
|
|
SERVICE_TYPE = 'crd'
|
|
|
|
|
|
class FslsdnMechanismDriver(api.MechanismDriver):
|
|
|
|
"""Freescale SDN OS Mechanism Driver for ML2 Plugin."""
|
|
|
|
@log.log
|
|
def initialize(self):
|
|
"""Initialize the Mechanism driver."""
|
|
|
|
self.vif_type = portbindings.VIF_TYPE_OVS
|
|
self.vif_details = {portbindings.CAP_PORT_FILTER: True}
|
|
LOG.info(_("Initializing CRD client... "))
|
|
crd_client_params = {
|
|
'username': FSLCONF.crd_user_name,
|
|
'tenant_name': FSLCONF.crd_tenant_name,
|
|
'region_name': FSLCONF.crd_region_name,
|
|
'password': FSLCONF.crd_password,
|
|
'auth_url': FSLCONF.crd_auth_url,
|
|
'auth_strategy': FSLCONF.crd_auth_strategy,
|
|
'endpoint_url': FSLCONF.crd_url,
|
|
'timeout': FSLCONF.crd_url_timeout,
|
|
'insecure': FSLCONF.crd_api_insecure,
|
|
'service_type': SERVICE_TYPE,
|
|
'ca_cert': FSLCONF.crd_ca_certificates_file,
|
|
}
|
|
self._crdclient = client.Client(**crd_client_params)
|
|
|
|
# Network Management
|
|
@staticmethod
|
|
@log.log
|
|
def _prepare_crd_network(network, segments):
|
|
"""Helper function to create 'network' data."""
|
|
|
|
return {'network':
|
|
{'network_id': network['id'],
|
|
'tenant_id': network['tenant_id'],
|
|
'name': network['name'],
|
|
'status': network['status'],
|
|
'admin_state_up': network['admin_state_up'],
|
|
'segments': segments,
|
|
}}
|
|
|
|
def create_network_postcommit(self, context):
|
|
"""Send create_network data to CRD service."""
|
|
|
|
network = context.current
|
|
segments = context.network_segments
|
|
body = self._prepare_crd_network(network, segments)
|
|
self._crdclient.create_network(body=body)
|
|
LOG.debug("create_network update sent to CRD Server: %s", body)
|
|
|
|
def update_network_postcommit(self, context):
|
|
"""Send update_network data to CRD service."""
|
|
|
|
network = context.current
|
|
segments = context.network_segments
|
|
body = self._prepare_crd_network(network, segments)
|
|
self._crdclient.update_network(network['id'], body=body)
|
|
LOG.debug("update_network update sent to CRD Server: %s", body)
|
|
|
|
def delete_network_postcommit(self, context):
|
|
"""Send delete_network data to CRD service."""
|
|
|
|
network = context.current
|
|
self._crdclient.delete_network(network['id'])
|
|
LOG.debug(
|
|
"delete_network update sent to CRD Server: %s",
|
|
network['id'])
|
|
|
|
# Port Management
|
|
@staticmethod
|
|
def _prepare_crd_port(port):
|
|
"""Helper function to prepare 'port' data."""
|
|
|
|
crd_subnet_id = ''
|
|
crd_ipaddress = ''
|
|
crd_sec_grps = ''
|
|
# Since CRD accepts one Fixed IP,
|
|
# so handle only one fixed IP per port.
|
|
if len(port['fixed_ips']) > 1:
|
|
LOG.debug("More than one fixed IP exists - using first one.")
|
|
# check empty fixed_ips list, move on if one or more exists
|
|
if len(port['fixed_ips']) != 0:
|
|
crd_subnet_id = port['fixed_ips'][0]['subnet_id']
|
|
crd_ipaddress = port['fixed_ips'][0]['ip_address']
|
|
LOG.debug("Handling fixed IP {subnet_id:%(subnet)s, "
|
|
"ip_address:%(ip)s}",
|
|
{'subnet': crd_subnet_id, 'ip': crd_ipaddress})
|
|
else:
|
|
LOG.debug("No fixed IPs found.")
|
|
if 'security_groups' in port:
|
|
crd_sec_grps = ','.join(port['security_groups'])
|
|
return {'port':
|
|
{'port_id': port['id'],
|
|
'tenant_id': port['tenant_id'],
|
|
'name': port['name'],
|
|
'network_id': port['network_id'],
|
|
'subnet_id': crd_subnet_id,
|
|
'mac_address': port['mac_address'],
|
|
'device_id': port['device_id'],
|
|
'ip_address': crd_ipaddress,
|
|
'admin_state_up': port['admin_state_up'],
|
|
'status': port['status'],
|
|
'device_owner': port['device_owner'],
|
|
'security_groups': crd_sec_grps,
|
|
}}
|
|
|
|
def create_port_postcommit(self, context):
|
|
"""Send create_port data to CRD service."""
|
|
|
|
port = context.current
|
|
body = self._prepare_crd_port(port)
|
|
self._crdclient.create_port(body=body)
|
|
LOG.debug("create_port update sent to CRD Server: %s", body)
|
|
|
|
def delete_port_postcommit(self, context):
|
|
"""Send delete_port data to CRD service."""
|
|
|
|
port = context.current
|
|
self._crdclient.delete_port(port['id'])
|
|
LOG.debug("delete_port update sent to CRD Server: %s", port['id'])
|
|
|
|
# Subnet Management
|
|
@staticmethod
|
|
@log.log
|
|
def _prepare_crd_subnet(subnet):
|
|
"""Helper function to prepare 'subnet' data."""
|
|
|
|
crd_allocation_pools = ''
|
|
crd_dns_nameservers = ''
|
|
crd_host_routes = ''
|
|
# Handling Allocation IPs
|
|
if 'allocation_pools' in subnet:
|
|
a_pools = subnet['allocation_pools']
|
|
crd_allocation_pools = ','.join(["%s-%s" % (p['start'],
|
|
p['end'])
|
|
for p in a_pools])
|
|
# Handling Host Routes
|
|
if 'host_routes' in subnet:
|
|
crd_host_routes = ','.join(["%s-%s" % (r['destination'],
|
|
r['nexthop'])
|
|
for r in subnet['host_routes']])
|
|
# Handling DNS Nameservers
|
|
if 'dns_nameservers' in subnet:
|
|
crd_dns_nameservers = ','.join(subnet['dns_nameservers'])
|
|
# return Subnet Data
|
|
return {'subnet':
|
|
{'subnet_id': subnet['id'],
|
|
'tenant_id': subnet['tenant_id'],
|
|
'name': subnet['name'],
|
|
'network_id': subnet['network_id'],
|
|
'ip_version': subnet['ip_version'],
|
|
'cidr': subnet['cidr'],
|
|
'gateway_ip': subnet['gateway_ip'],
|
|
'dns_nameservers': crd_dns_nameservers,
|
|
'allocation_pools': crd_allocation_pools,
|
|
'host_routes': crd_host_routes,
|
|
}}
|
|
|
|
def create_subnet_postcommit(self, context):
|
|
"""Send create_subnet data to CRD service."""
|
|
|
|
subnet = context.current
|
|
body = self._prepare_crd_subnet(subnet)
|
|
self._crdclient.create_subnet(body=body)
|
|
LOG.debug("create_subnet update sent to CRD Server: %s", body)
|
|
|
|
def update_subnet_postcommit(self, context):
|
|
"""Send update_subnet data to CRD service."""
|
|
|
|
subnet = context.current
|
|
body = self._prepare_crd_subnet(subnet)
|
|
self._crdclient.update_subnet(subnet['id'], body=body)
|
|
LOG.debug("update_subnet update sent to CRD Server: %s", body)
|
|
|
|
def delete_subnet_postcommit(self, context):
|
|
"""Send delete_subnet data to CRD service."""
|
|
|
|
subnet = context.current
|
|
self._crdclient.delete_subnet(subnet['id'])
|
|
LOG.debug("delete_subnet update sent to CRD Server: %s", subnet['id'])
|
|
|
|
def bind_port(self, context):
|
|
"""Set porting binding data for use with nova."""
|
|
|
|
LOG.debug("Attempting to bind port %(port)s on "
|
|
"network %(network)s",
|
|
{'port': context.current['id'],
|
|
'network': context.network.current['id']})
|
|
# Prepared porting binding data
|
|
for segment in context.network.network_segments:
|
|
if self.check_segment(segment):
|
|
context.set_binding(segment[api.ID],
|
|
self.vif_type,
|
|
self.vif_details,
|
|
status=n_const.PORT_STATUS_ACTIVE)
|
|
LOG.debug("Bound using segment: %s", segment)
|
|
return
|
|
else:
|
|
LOG.debug("Refusing to bind port for segment ID %(id)s, "
|
|
"segment %(seg)s, phys net %(physnet)s, and "
|
|
"network type %(nettype)s",
|
|
{'id': segment[api.ID],
|
|
'seg': segment[api.SEGMENTATION_ID],
|
|
'physnet': segment[api.PHYSICAL_NETWORK],
|
|
'nettype': segment[api.NETWORK_TYPE]})
|
|
|
|
@log.log
|
|
def check_segment(self, segment):
|
|
"""Verify a segment is valid for the FSL SDN MechanismDriver."""
|
|
|
|
return segment[api.NETWORK_TYPE] in [constants.TYPE_VLAN,
|
|
constants.TYPE_VXLAN]
|