55b0cf16e8
Change-Id: I3dae7c34527f7f65f37cf03e699007141865a090
77 lines
2.9 KiB
Python
77 lines
2.9 KiB
Python
# Copyright 2017 VMware, Inc.
|
|
# All Rights Reserved
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from oslo_log import log as logging
|
|
|
|
from vmware_nsx._i18n import _
|
|
from vmware_nsx.common import exceptions as nsx_exc
|
|
from vmware_nsx.services.vpnaas.common_v3 import ipsec_utils
|
|
from vmware_nsx.services.vpnaas.common_v3 import ipsec_validator
|
|
from vmware_nsxlib.v3 import nsx_constants as consts
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
|
class IPsecV3Validator(ipsec_validator.IPsecCommonValidator):
|
|
"""Validator methods for Vmware NSX-V3 VPN support"""
|
|
def __init__(self, service_plugin):
|
|
super(IPsecV3Validator, self).__init__(service_plugin)
|
|
|
|
@property
|
|
def nsxlib(self):
|
|
return self._core_plugin.nsxlib
|
|
|
|
def check_backend_version(self):
|
|
if not self.nsxlib.feature_supported(consts.FEATURE_IPSEC_VPN):
|
|
# ipsec vpn is not supported
|
|
LOG.warning("VPNaaS is not supported by the NSX backend (version "
|
|
"%s)",
|
|
self.nsxlib.get_version())
|
|
self.backend_support = False
|
|
else:
|
|
self.backend_support = True
|
|
|
|
def _validate_backend_version(self):
|
|
if not self.backend_support:
|
|
msg = (_("VPNaaS is not supported by the NSX backend "
|
|
"(version %s)") % self.nsxlib.get_version())
|
|
raise nsx_exc.NsxVpnValidationError(details=msg)
|
|
|
|
@property
|
|
def auth_algorithm_map(self):
|
|
return ipsec_utils.AUTH_ALGORITHM_MAP
|
|
|
|
@property
|
|
def pfs_map(self):
|
|
return ipsec_utils.PFS_MAP
|
|
|
|
def _validate_t0_ha_mode(self, tier0_uuid):
|
|
# TODO(asarfaty): cache this result
|
|
tier0_router = self.nsxlib.logical_router.get(tier0_uuid)
|
|
if (not tier0_router or
|
|
tier0_router.get('high_availability_mode') != 'ACTIVE_STANDBY'):
|
|
msg = _("The router GW should be connected to a TIER-0 router "
|
|
"with ACTIVE_STANDBY HA mode")
|
|
raise nsx_exc.NsxVpnValidationError(details=msg)
|
|
|
|
def _validate_router(self, context, router_id):
|
|
super(IPsecV3Validator, self)._validate_router(context, router_id)
|
|
|
|
# Verify that this is a no-snat router
|
|
router_db = self._core_plugin._get_router(context, router_id)
|
|
if router_db.enable_snat:
|
|
msg = _("VPN is supported only for routers with disabled SNAT")
|
|
raise nsx_exc.NsxVpnValidationError(details=msg)
|