# Copyright (c) 2013 OpenStack Foundation # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. from oslo.config import cfg from quantum.agent import securitygroups_rpc as sg_rpc from quantum.api.rpc.agentnotifiers import dhcp_rpc_agent_api from quantum.api.rpc.agentnotifiers import l3_rpc_agent_api from quantum.api.v2 import attributes from quantum.common import constants as const from quantum.common import exceptions as exc from quantum.common import topics from quantum.db import agentschedulers_db from quantum.db import db_base_plugin_v2 from quantum.db import extraroute_db from quantum.db import portbindings_db from quantum.db import quota_db # noqa from quantum.db import securitygroups_rpc_base as sg_db_rpc from quantum.extensions import portbindings from quantum.extensions import providernet as provider from quantum.openstack.common import importutils from quantum.openstack.common import log from quantum.openstack.common import rpc as c_rpc from quantum.plugins.ml2 import config # noqa from quantum.plugins.ml2 import db from quantum.plugins.ml2 import driver_api as api from quantum.plugins.ml2 import managers from quantum.plugins.ml2 import rpc LOG = log.getLogger(__name__) # REVISIT(rkukura): Move this and other network_type constants to # providernet.py? TYPE_MULTI_SEGMENT = 'multi-segment' class Ml2Plugin(db_base_plugin_v2.QuantumDbPluginV2, extraroute_db.ExtraRoute_db_mixin, sg_db_rpc.SecurityGroupServerRpcMixin, agentschedulers_db.AgentSchedulerDbMixin, portbindings_db.PortBindingMixin): """Implement the Quantum L2 abstractions using modules. Ml2Plugin is a Quantum plugin based on separately extensible sets of network types and mechanisms for connecting to networks of those types. The network types and mechanisms are implemented as drivers loaded via Python entry points. Networks can be made up of multiple segments (not yet fully implemented). """ # This attribute specifies whether the plugin supports or not # bulk/pagination/sorting operations. Name mangling is used in # order to ensure it is qualified by class __native_bulk_support = True __native_pagination_support = True __native_sorting_support = True # List of supported extensions _supported_extension_aliases = ["provider", "router", "extraroute", "binding", "quotas", "security-group", "agent", "agent_scheduler"] @property def supported_extension_aliases(self): if not hasattr(self, '_aliases'): aliases = self._supported_extension_aliases[:] sg_rpc.disable_security_group_extension_if_noop_driver(aliases) self._aliases = aliases return self._aliases def __init__(self): # First load drivers, then initialize DB, then initialize drivers self.type_manager = managers.TypeManager() self.mechanism_manager = managers.MechanismManager() db.initialize() self.type_manager.initialize() self.mechanism_manager.initialize() self._setup_rpc() # REVISIT(rkukura): Use stevedore for these? self.network_scheduler = importutils.import_object( cfg.CONF.network_scheduler_driver) self.router_scheduler = importutils.import_object( cfg.CONF.router_scheduler_driver) LOG.info(_("Modular L2 Plugin initialization complete")) def _setup_rpc(self): self.notifier = rpc.AgentNotifierApi(topics.AGENT) self.dhcp_agent_notifier = dhcp_rpc_agent_api.DhcpAgentNotifyAPI() self.l3_agent_notifier = l3_rpc_agent_api.L3AgentNotify self.callbacks = rpc.RpcCallbacks(self.notifier) self.topic = topics.PLUGIN self.conn = c_rpc.create_connection(new=True) self.dispatcher = self.callbacks.create_rpc_dispatcher() self.conn.create_consumer(self.topic, self.dispatcher, fanout=False) self.conn.consume_in_thread() def _process_provider_create(self, context, attrs): network_type = self._get_attribute(attrs, provider.NETWORK_TYPE) physical_network = self._get_attribute(attrs, provider.PHYSICAL_NETWORK) segmentation_id = self._get_attribute(attrs, provider.SEGMENTATION_ID) if attributes.is_attr_set(network_type): segment = {api.NETWORK_TYPE: network_type, api.PHYSICAL_NETWORK: physical_network, api.SEGMENTATION_ID: segmentation_id} return self.type_manager.validate_provider_segment(segment) if (attributes.is_attr_set(attrs.get(provider.PHYSICAL_NETWORK)) or attributes.is_attr_set(attrs.get(provider.SEGMENTATION_ID))): msg = _("network_type required if other provider attributes " "specified") raise exc.InvalidInput(error_message=msg) def _get_attribute(self, attrs, key): value = attrs.get(key) if value is attributes.ATTR_NOT_SPECIFIED: value = None return value def _check_provider_update(self, context, attrs): if (attributes.is_attr_set(attrs.get(provider.NETWORK_TYPE)) or attributes.is_attr_set(attrs.get(provider.PHYSICAL_NETWORK)) or attributes.is_attr_set(attrs.get(provider.SEGMENTATION_ID))): msg = _("Plugin does not support updating provider attributes") raise exc.InvalidInput(error_message=msg) def _extend_network_dict_provider(self, context, network): id = network['id'] segments = db.get_network_segments(context.session, id) if not segments: LOG.error(_("Network %s has no segments"), id) network[provider.NETWORK_TYPE] = None network[provider.PHYSICAL_NETWORK] = None network[provider.SEGMENTATION_ID] = None elif len(segments) > 1: network[provider.NETWORK_TYPE] = TYPE_MULTI_SEGMENT network[provider.PHYSICAL_NETWORK] = None network[provider.SEGMENTATION_ID] = None else: segment = segments[0] network[provider.NETWORK_TYPE] = segment[api.NETWORK_TYPE] network[provider.PHYSICAL_NETWORK] = segment[api.PHYSICAL_NETWORK] network[provider.SEGMENTATION_ID] = segment[api.SEGMENTATION_ID] def _filter_nets_provider(self, context, nets, filters): # TODO(rkukura): Implement filtering. return nets def _extend_port_dict_binding(self, context, port): # TODO(rkukura): Implement based on host_id, agents, and # MechanismDrivers. Also set CAPABILITIES. Use # extra_binding_dict if applicable, or maybe a new hook so # base handles field processing and get_port and get_ports # don't need to be overridden. port[portbindings.VIF_TYPE] = portbindings.VIF_TYPE_UNBOUND def _notify_port_updated(self, context, port): session = context.session with session.begin(subtransactions=True): network_id = port['network_id'] segments = db.get_network_segments(session, network_id) if not segments: LOG.warning(_("In _notify_port_updated() for port %(port_id), " "network %(network_id) has no segments"), {'port_id': port['id'], 'network_id': network_id}) return # TODO(rkukura): Use port binding to select segment. segment = segments[0] self.notifier.port_update(context, port, segment[api.NETWORK_TYPE], segment[api.SEGMENTATION_ID], segment[api.PHYSICAL_NETWORK]) def create_network(self, context, network): attrs = network['network'] segment = self._process_provider_create(context, attrs) tenant_id = self._get_tenant_id_for_create(context, attrs) session = context.session with session.begin(subtransactions=True): self._ensure_default_security_group(context, tenant_id) if segment: self.type_manager.reserve_provider_segment(session, segment) else: segment = self.type_manager.allocate_tenant_segment(session) result = super(Ml2Plugin, self).create_network(context, network) id = result['id'] self._process_l3_create(context, attrs, id) # REVISIT(rkukura): Consider moving all segment management # to TypeManager. db.add_network_segment(session, id, segment) self._extend_network_dict_provider(context, result) self._extend_network_dict_l3(context, result) return result def update_network(self, context, id, network): attrs = network['network'] self._check_provider_update(context, attrs) session = context.session with session.begin(subtransactions=True): result = super(Ml2Plugin, self).update_network(context, id, network) self._process_l3_update(context, attrs, id) self._extend_network_dict_provider(context, result) self._extend_network_dict_l3(context, result) return result def get_network(self, context, id, fields=None): session = context.session with session.begin(subtransactions=True): result = super(Ml2Plugin, self).get_network(context, id, None) self._extend_network_dict_provider(context, result) self._extend_network_dict_l3(context, result) return self._fields(result, fields) def get_networks(self, context, filters=None, fields=None, sorts=None, limit=None, marker=None, page_reverse=False): session = context.session with session.begin(subtransactions=True): nets = super(Ml2Plugin, self).get_networks(context, filters, None, sorts, limit, marker, page_reverse) for net in nets: self._extend_network_dict_provider(context, net) self._extend_network_dict_l3(context, net) nets = self._filter_nets_provider(context, nets, filters) nets = self._filter_nets_l3(context, nets, filters) return [self._fields(net, fields) for net in nets] def delete_network(self, context, id): session = context.session with session.begin(subtransactions=True): segments = db.get_network_segments(session, id) super(Ml2Plugin, self).delete_network(context, id) for segment in segments: self.type_manager.release_segment(session, segment) # The segment records are deleted via cascade from the # network record, so explicit removal is not necessary. self.notifier.network_delete(context, id) def create_port(self, context, port): attrs = port['port'] attrs['status'] = const.PORT_STATUS_DOWN session = context.session with session.begin(subtransactions=True): self._ensure_default_security_group_on_port(context, port) sgids = self._get_security_groups_on_port(context, port) result = super(Ml2Plugin, self).create_port(context, port) self._process_portbindings_create_and_update(context, attrs, result) self._process_port_create_security_group(context, result, sgids) self._extend_port_dict_binding(context, result) self.notify_security_groups_member_updated(context, result) return result def update_port(self, context, id, port): attrs = port['port'] need_port_update_notify = False session = context.session with session.begin(subtransactions=True): original_port = super(Ml2Plugin, self).get_port(context, id) updated_port = super(Ml2Plugin, self).update_port(context, id, port) need_port_update_notify = self.update_security_group_on_port( context, id, port, original_port, updated_port) self._process_portbindings_create_and_update(context, attrs, updated_port) self._extend_port_dict_binding(context, updated_port) need_port_update_notify |= self.is_security_group_member_updated( context, original_port, updated_port) if original_port['admin_state_up'] != updated_port['admin_state_up']: need_port_update_notify = True if need_port_update_notify: self._notify_port_updated(context, updated_port) return updated_port def get_port(self, context, id, fields=None): session = context.session with session.begin(subtransactions=True): port = super(Ml2Plugin, self).get_port(context, id, fields) self._extend_port_dict_binding(context, port) return self._fields(port, fields) def get_ports(self, context, filters=None, fields=None, sorts=None, limit=None, marker=None, page_reverse=False): session = context.session with session.begin(subtransactions=True): ports = super(Ml2Plugin, self).get_ports(context, filters, fields, sorts, limit, marker, page_reverse) # TODO(nati): filter by security group for port in ports: self._extend_port_dict_binding(context, port) return [self._fields(port, fields) for port in ports] def delete_port(self, context, id, l3_port_check=True): if l3_port_check: self.prevent_l3_port_deletion(context, id) session = context.session with session.begin(subtransactions=True): self.disassociate_floatingips(context, id) port = self.get_port(context, id) self._delete_port_security_group_bindings(context, id) super(Ml2Plugin, self).delete_port(context, id) self.notify_security_groups_member_updated(context, port)