1061 lines
40 KiB
Python
1061 lines
40 KiB
Python
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
|
|
|
# Copyright 2010 United States Government as represented by the
|
|
# Administrator of the National Aeronautics and Space Administration.
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
"""
|
|
Drivers for volumes.
|
|
|
|
"""
|
|
|
|
import os
|
|
import time
|
|
|
|
from oslo.config import cfg
|
|
|
|
from cinder.brick.initiator import connector as initiator
|
|
from cinder.brick.iscsi import iscsi
|
|
from cinder.brick.iser import iser
|
|
from cinder import exception
|
|
from cinder.image import image_utils
|
|
from cinder.openstack.common import excutils
|
|
from cinder.openstack.common import fileutils
|
|
from cinder.openstack.common import log as logging
|
|
from cinder.openstack.common import processutils
|
|
from cinder import utils
|
|
from cinder.volume import rpcapi as volume_rpcapi
|
|
from cinder.volume import utils as volume_utils
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
volume_opts = [
|
|
cfg.IntOpt('num_shell_tries',
|
|
default=3,
|
|
help='number of times to attempt to run flakey shell commands'),
|
|
cfg.IntOpt('reserved_percentage',
|
|
default=0,
|
|
help='The percentage of backend capacity is reserved'),
|
|
cfg.IntOpt('iscsi_num_targets',
|
|
default=100,
|
|
help='The maximum number of iscsi target ids per host'),
|
|
cfg.StrOpt('iscsi_target_prefix',
|
|
default='iqn.2010-10.org.openstack:',
|
|
help='prefix for iscsi volumes'),
|
|
cfg.StrOpt('iscsi_ip_address',
|
|
default='$my_ip',
|
|
help='The IP address that the iSCSI daemon is listening on'),
|
|
cfg.IntOpt('iscsi_port',
|
|
default=3260,
|
|
help='The port that the iSCSI daemon is listening on'),
|
|
cfg.IntOpt('num_volume_device_scan_tries',
|
|
deprecated_name='num_iscsi_scan_tries',
|
|
default=3,
|
|
help='The maximum number of times to rescan targets'
|
|
' to find volume'),
|
|
cfg.IntOpt('num_iser_scan_tries',
|
|
default=3,
|
|
help='The maximum number of times to rescan iSER target'
|
|
'to find volume'),
|
|
cfg.IntOpt('iser_num_targets',
|
|
default=100,
|
|
help='The maximum number of iser target ids per host'),
|
|
cfg.StrOpt('iser_target_prefix',
|
|
default='iqn.2010-10.org.iser.openstack:',
|
|
help='prefix for iser volumes'),
|
|
cfg.StrOpt('iser_ip_address',
|
|
default='$my_ip',
|
|
help='The IP address that the iSER daemon is listening on'),
|
|
cfg.IntOpt('iser_port',
|
|
default=3260,
|
|
help='The port that the iSER daemon is listening on'),
|
|
cfg.StrOpt('iser_helper',
|
|
default='tgtadm',
|
|
help='iser target user-land tool to use'),
|
|
cfg.StrOpt('volume_backend_name',
|
|
default=None,
|
|
help='The backend name for a given driver implementation'),
|
|
cfg.BoolOpt('use_multipath_for_image_xfer',
|
|
default=False,
|
|
help='Do we attach/detach volumes in cinder using multipath '
|
|
'for volume to image and image to volume transfers?'),
|
|
cfg.StrOpt('volume_clear',
|
|
default='zero',
|
|
help='Method used to wipe old voumes (valid options are: '
|
|
'none, zero, shred)'),
|
|
cfg.IntOpt('volume_clear_size',
|
|
default=0,
|
|
help='Size in MiB to wipe at start of old volumes. 0 => all'),
|
|
cfg.StrOpt('iscsi_helper',
|
|
default='tgtadm',
|
|
help='iscsi target user-land tool to use'),
|
|
cfg.StrOpt('volumes_dir',
|
|
default='$state_path/volumes',
|
|
help='Volume configuration file storage '
|
|
'directory'),
|
|
cfg.StrOpt('iet_conf',
|
|
default='/etc/iet/ietd.conf',
|
|
help='IET configuration file'),
|
|
cfg.StrOpt('lio_initiator_iqns',
|
|
default='',
|
|
help=('Comma-separated list of initiator IQNs '
|
|
'allowed to connect to the '
|
|
'iSCSI target. (From Nova compute nodes.)')),
|
|
cfg.StrOpt('iscsi_iotype',
|
|
default='fileio',
|
|
help=('Sets the behavior of the iSCSI target '
|
|
'to either perform blockio or fileio '
|
|
'optionally, auto can be set and Cinder '
|
|
'will autodetect type of backing device'))]
|
|
|
|
|
|
CONF = cfg.CONF
|
|
CONF.register_opts(volume_opts)
|
|
|
|
|
|
class VolumeDriver(object):
|
|
"""Executes commands relating to Volumes."""
|
|
|
|
VERSION = "N/A"
|
|
|
|
def __init__(self, execute=utils.execute, *args, **kwargs):
|
|
# NOTE(vish): db is set by Manager
|
|
self.db = kwargs.get('db')
|
|
self.configuration = kwargs.get('configuration', None)
|
|
if self.configuration:
|
|
self.configuration.append_config_values(volume_opts)
|
|
self.set_execute(execute)
|
|
self._stats = {}
|
|
|
|
# set True by manager after succesful check_for_setup
|
|
self._initialized = False
|
|
|
|
def set_execute(self, execute):
|
|
self._execute = execute
|
|
|
|
def set_initialized(self):
|
|
self._initialized = True
|
|
|
|
@property
|
|
def initialized(self):
|
|
return self._initialized
|
|
|
|
def get_version(self):
|
|
"""Get the current version of this driver."""
|
|
return self.VERSION
|
|
|
|
def _is_non_recoverable(self, err, non_recoverable_list):
|
|
for item in non_recoverable_list:
|
|
if item in err:
|
|
return True
|
|
|
|
return False
|
|
|
|
def _try_execute(self, *command, **kwargs):
|
|
# NOTE(vish): Volume commands can partially fail due to timing, but
|
|
# running them a second time on failure will usually
|
|
# recover nicely.
|
|
|
|
non_recoverable = kwargs.pop('no_retry_list', [])
|
|
|
|
tries = 0
|
|
while True:
|
|
try:
|
|
self._execute(*command, **kwargs)
|
|
return True
|
|
except processutils.ProcessExecutionError as ex:
|
|
tries = tries + 1
|
|
|
|
if tries >= self.configuration.num_shell_tries or\
|
|
self._is_non_recoverable(ex.stderr, non_recoverable):
|
|
raise
|
|
|
|
LOG.exception(_("Recovering from a failed execute. "
|
|
"Try number %s"), tries)
|
|
time.sleep(tries ** 2)
|
|
|
|
def check_for_setup_error(self):
|
|
raise NotImplementedError()
|
|
|
|
def create_volume(self, volume):
|
|
"""Creates a volume. Can optionally return a Dictionary of
|
|
changes to the volume object to be persisted.
|
|
"""
|
|
raise NotImplementedError()
|
|
|
|
def create_volume_from_snapshot(self, volume, snapshot):
|
|
"""Creates a volume from a snapshot."""
|
|
raise NotImplementedError()
|
|
|
|
def create_cloned_volume(self, volume, src_vref):
|
|
"""Creates a clone of the specified volume."""
|
|
raise NotImplementedError()
|
|
|
|
def delete_volume(self, volume):
|
|
"""Deletes a volume."""
|
|
raise NotImplementedError()
|
|
|
|
def create_snapshot(self, snapshot):
|
|
"""Creates a snapshot."""
|
|
raise NotImplementedError()
|
|
|
|
def delete_snapshot(self, snapshot):
|
|
"""Deletes a snapshot."""
|
|
raise NotImplementedError()
|
|
|
|
def local_path(self, volume):
|
|
raise NotImplementedError()
|
|
|
|
def ensure_export(self, context, volume):
|
|
"""Synchronously recreates an export for a volume."""
|
|
raise NotImplementedError()
|
|
|
|
def create_export(self, context, volume):
|
|
"""Exports the volume. Can optionally return a Dictionary of changes
|
|
to the volume object to be persisted.
|
|
"""
|
|
raise NotImplementedError()
|
|
|
|
def remove_export(self, context, volume):
|
|
"""Removes an export for a volume."""
|
|
raise NotImplementedError()
|
|
|
|
def initialize_connection(self, volume, connector):
|
|
"""Allow connection to connector and return connection info."""
|
|
raise NotImplementedError()
|
|
|
|
def terminate_connection(self, volume, connector, **kwargs):
|
|
"""Disallow connection from connector"""
|
|
raise NotImplementedError()
|
|
|
|
def attach_volume(self, context, volume, instance_uuid, host_name,
|
|
mountpoint):
|
|
"""Callback for volume attached to instance or host."""
|
|
pass
|
|
|
|
def detach_volume(self, context, volume):
|
|
"""Callback for volume detached."""
|
|
pass
|
|
|
|
def get_volume_stats(self, refresh=False):
|
|
"""Return the current state of the volume service. If 'refresh' is
|
|
True, run the update first.
|
|
"""
|
|
return None
|
|
|
|
def do_setup(self, context):
|
|
"""Any initialization the volume driver does while starting"""
|
|
pass
|
|
|
|
def validate_connector(self, connector):
|
|
"""Fail if connector doesn't contain all the data needed by driver"""
|
|
pass
|
|
|
|
def _copy_volume_data_cleanup(self, context, volume, properties,
|
|
attach_info, remote, force=False):
|
|
self._detach_volume(attach_info)
|
|
if remote:
|
|
rpcapi = volume_rpcapi.VolumeAPI()
|
|
rpcapi.terminate_connection(context, volume, properties,
|
|
force=force)
|
|
else:
|
|
self.terminate_connection(volume, properties, force=False)
|
|
|
|
def copy_volume_data(self, context, src_vol, dest_vol, remote=None):
|
|
"""Copy data from src_vol to dest_vol."""
|
|
LOG.debug(_('copy_data_between_volumes %(src)s -> %(dest)s.')
|
|
% {'src': src_vol['name'], 'dest': dest_vol['name']})
|
|
|
|
properties = utils.brick_get_connector_properties()
|
|
dest_remote = True if remote in ['dest', 'both'] else False
|
|
dest_orig_status = dest_vol['status']
|
|
try:
|
|
dest_attach_info = self._attach_volume(context,
|
|
dest_vol,
|
|
properties,
|
|
remote=dest_remote)
|
|
except Exception:
|
|
with excutils.save_and_reraise_exception():
|
|
msg = _("Failed to attach volume %(vol)s")
|
|
LOG.error(msg % {'vol': dest_vol['id']})
|
|
self.db.volume_update(context, dest_vol['id'],
|
|
{'status': dest_orig_status})
|
|
|
|
src_remote = True if remote in ['src', 'both'] else False
|
|
src_orig_status = src_vol['status']
|
|
try:
|
|
src_attach_info = self._attach_volume(context,
|
|
src_vol,
|
|
properties,
|
|
remote=src_remote)
|
|
except Exception:
|
|
with excutils.save_and_reraise_exception():
|
|
msg = _("Failed to attach volume %(vol)s")
|
|
LOG.error(msg % {'vol': src_vol['id']})
|
|
self.db.volume_update(context, src_vol['id'],
|
|
{'status': src_orig_status})
|
|
self._copy_volume_data_cleanup(context, dest_vol, properties,
|
|
dest_attach_info, dest_remote,
|
|
force=True)
|
|
|
|
try:
|
|
size_in_mb = int(src_vol['size']) * 1024 # vol size is in GB
|
|
volume_utils.copy_volume(src_attach_info['device']['path'],
|
|
dest_attach_info['device']['path'],
|
|
size_in_mb)
|
|
copy_error = False
|
|
except Exception:
|
|
with excutils.save_and_reraise_exception():
|
|
msg = _("Failed to copy volume %(src)s to %(dest)d")
|
|
LOG.error(msg % {'src': src_vol['id'], 'dest': dest_vol['id']})
|
|
copy_error = True
|
|
finally:
|
|
self._copy_volume_data_cleanup(context, dest_vol, properties,
|
|
dest_attach_info, dest_remote,
|
|
force=copy_error)
|
|
self._copy_volume_data_cleanup(context, src_vol, properties,
|
|
src_attach_info, src_remote,
|
|
force=copy_error)
|
|
|
|
def copy_image_to_volume(self, context, volume, image_service, image_id):
|
|
"""Fetch the image from image_service and write it to the volume."""
|
|
LOG.debug(_('copy_image_to_volume %s.') % volume['name'])
|
|
|
|
properties = utils.brick_get_connector_properties()
|
|
attach_info = self._attach_volume(context, volume, properties)
|
|
|
|
try:
|
|
image_utils.fetch_to_raw(context,
|
|
image_service,
|
|
image_id,
|
|
attach_info['device']['path'])
|
|
finally:
|
|
self._detach_volume(attach_info)
|
|
self.terminate_connection(volume, properties)
|
|
|
|
def copy_volume_to_image(self, context, volume, image_service, image_meta):
|
|
"""Copy the volume to the specified image."""
|
|
LOG.debug(_('copy_volume_to_image %s.') % volume['name'])
|
|
|
|
properties = utils.brick_get_connector_properties()
|
|
attach_info = self._attach_volume(context, volume, properties)
|
|
|
|
try:
|
|
image_utils.upload_volume(context,
|
|
image_service,
|
|
image_meta,
|
|
attach_info['device']['path'])
|
|
finally:
|
|
self._detach_volume(attach_info)
|
|
self.terminate_connection(volume, properties)
|
|
|
|
def _attach_volume(self, context, volume, properties, remote=False):
|
|
"""Attach the volume."""
|
|
if remote:
|
|
rpcapi = volume_rpcapi.VolumeAPI()
|
|
conn = rpcapi.initialize_connection(context, volume, properties)
|
|
else:
|
|
conn = self.initialize_connection(volume, properties)
|
|
|
|
# Use Brick's code to do attach/detach
|
|
use_multipath = self.configuration.use_multipath_for_image_xfer
|
|
device_scan_attempts = self.configuration.num_volume_device_scan_tries
|
|
protocol = conn['driver_volume_type']
|
|
connector = utils.brick_get_connector(protocol,
|
|
use_multipath=use_multipath,
|
|
device_scan_attempts=
|
|
device_scan_attempts,
|
|
conn=conn)
|
|
device = connector.connect_volume(conn['data'])
|
|
host_device = device['path']
|
|
|
|
if not connector.check_valid_device(host_device):
|
|
raise exception.DeviceUnavailable(path=host_device,
|
|
reason=(_("Unable to access "
|
|
"the backend storage "
|
|
"via the path "
|
|
"%(path)s.") %
|
|
{'path': host_device}))
|
|
return {'conn': conn, 'device': device, 'connector': connector}
|
|
|
|
def _detach_volume(self, attach_info):
|
|
"""Disconnect the volume from the host."""
|
|
# Use Brick's code to do attach/detach
|
|
connector = attach_info['connector']
|
|
connector.disconnect_volume(attach_info['conn']['data'],
|
|
attach_info['device'])
|
|
|
|
def clone_image(self, volume, image_location, image_id):
|
|
"""Create a volume efficiently from an existing image.
|
|
|
|
image_location is a string whose format depends on the
|
|
image service backend in use. The driver should use it
|
|
to determine whether cloning is possible.
|
|
|
|
image_id is a string which represents id of the image.
|
|
It can be used by the driver to introspect internal
|
|
stores or registry to do an efficient image clone.
|
|
|
|
Returns a dict of volume properties eg. provider_location,
|
|
boolean indicating whether cloning occurred
|
|
"""
|
|
return None, False
|
|
|
|
def backup_volume(self, context, backup, backup_service):
|
|
"""Create a new backup from an existing volume."""
|
|
volume = self.db.volume_get(context, backup['volume_id'])
|
|
|
|
LOG.debug(_('Creating a new backup for volume %s.') %
|
|
volume['name'])
|
|
|
|
properties = utils.brick_get_connector_properties()
|
|
attach_info = self._attach_volume(context, volume, properties)
|
|
|
|
try:
|
|
volume_path = attach_info['device']['path']
|
|
with utils.temporary_chown(volume_path):
|
|
with fileutils.file_open(volume_path) as volume_file:
|
|
backup_service.backup(backup, volume_file)
|
|
|
|
finally:
|
|
self._detach_volume(attach_info)
|
|
self.terminate_connection(volume, properties)
|
|
|
|
def restore_backup(self, context, backup, volume, backup_service):
|
|
"""Restore an existing backup to a new or existing volume."""
|
|
LOG.debug(_('Restoring backup %(backup)s to '
|
|
'volume %(volume)s.') %
|
|
{'backup': backup['id'],
|
|
'volume': volume['name']})
|
|
|
|
properties = utils.brick_get_connector_properties()
|
|
attach_info = self._attach_volume(context, volume, properties)
|
|
|
|
try:
|
|
volume_path = attach_info['device']['path']
|
|
with utils.temporary_chown(volume_path):
|
|
with fileutils.file_open(volume_path, 'wb') as volume_file:
|
|
backup_service.restore(backup, volume['id'], volume_file)
|
|
|
|
finally:
|
|
self._detach_volume(attach_info)
|
|
self.terminate_connection(volume, properties)
|
|
|
|
def clear_download(self, context, volume):
|
|
"""Clean up after an interrupted image copy."""
|
|
pass
|
|
|
|
def extend_volume(self, volume, new_size):
|
|
msg = _("Extend volume not implemented")
|
|
raise NotImplementedError(msg)
|
|
|
|
def migrate_volume(self, context, volume, host):
|
|
"""Migrate the volume to the specified host.
|
|
|
|
Returns a boolean indicating whether the migration occurred, as well as
|
|
model_update.
|
|
"""
|
|
return (False, None)
|
|
|
|
|
|
class ISCSIDriver(VolumeDriver):
|
|
"""Executes commands relating to ISCSI volumes.
|
|
|
|
We make use of model provider properties as follows:
|
|
|
|
``provider_location``
|
|
if present, contains the iSCSI target information in the same
|
|
format as an ietadm discovery
|
|
i.e. '<ip>:<port>,<portal> <target IQN>'
|
|
|
|
``provider_auth``
|
|
if present, contains a space-separated triple:
|
|
'<auth method> <auth username> <auth password>'.
|
|
`CHAP` is the only auth_method in use at the moment.
|
|
"""
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
super(ISCSIDriver, self).__init__(*args, **kwargs)
|
|
|
|
def _do_iscsi_discovery(self, volume):
|
|
#TODO(justinsb): Deprecate discovery and use stored info
|
|
#NOTE(justinsb): Discovery won't work with CHAP-secured targets (?)
|
|
LOG.warn(_("ISCSI provider_location not stored, using discovery"))
|
|
|
|
volume_name = volume['name']
|
|
|
|
(out, _err) = self._execute('iscsiadm', '-m', 'discovery',
|
|
'-t', 'sendtargets', '-p', volume['host'],
|
|
run_as_root=True)
|
|
for target in out.splitlines():
|
|
if (self.configuration.iscsi_ip_address in target
|
|
and volume_name in target):
|
|
return target
|
|
return None
|
|
|
|
def _get_iscsi_properties(self, volume):
|
|
"""Gets iscsi configuration
|
|
|
|
We ideally get saved information in the volume entity, but fall back
|
|
to discovery if need be. Discovery may be completely removed in future
|
|
The properties are:
|
|
|
|
:target_discovered: boolean indicating whether discovery was used
|
|
|
|
:target_iqn: the IQN of the iSCSI target
|
|
|
|
:target_portal: the portal of the iSCSI target
|
|
|
|
:target_lun: the lun of the iSCSI target
|
|
|
|
:volume_id: the id of the volume (currently used by xen)
|
|
|
|
:auth_method:, :auth_username:, :auth_password:
|
|
|
|
the authentication details. Right now, either auth_method is not
|
|
present meaning no authentication, or auth_method == `CHAP`
|
|
meaning use CHAP with the specified credentials.
|
|
|
|
:access_mode: the volume access mode allow client used
|
|
('rw' or 'ro' currently supported)
|
|
"""
|
|
|
|
properties = {}
|
|
|
|
location = volume['provider_location']
|
|
|
|
if location:
|
|
# provider_location is the same format as iSCSI discovery output
|
|
properties['target_discovered'] = False
|
|
else:
|
|
location = self._do_iscsi_discovery(volume)
|
|
|
|
if not location:
|
|
msg = (_("Could not find iSCSI export for volume %s") %
|
|
(volume['name']))
|
|
raise exception.InvalidVolume(reason=msg)
|
|
|
|
LOG.debug(_("ISCSI Discovery: Found %s") % (location))
|
|
properties['target_discovered'] = True
|
|
|
|
results = location.split(" ")
|
|
properties['target_portal'] = results[0].split(",")[0]
|
|
properties['target_iqn'] = results[1]
|
|
try:
|
|
properties['target_lun'] = int(results[2])
|
|
except (IndexError, ValueError):
|
|
if (self.configuration.volume_driver in
|
|
['cinder.volume.drivers.lvm.LVMISCSIDriver',
|
|
'cinder.volume.drivers.lvm.ThinLVMVolumeDriver'] and
|
|
self.configuration.iscsi_helper == 'tgtadm'):
|
|
properties['target_lun'] = 1
|
|
else:
|
|
properties['target_lun'] = 0
|
|
|
|
properties['volume_id'] = volume['id']
|
|
|
|
auth = volume['provider_auth']
|
|
if auth:
|
|
(auth_method, auth_username, auth_secret) = auth.split()
|
|
|
|
properties['auth_method'] = auth_method
|
|
properties['auth_username'] = auth_username
|
|
properties['auth_password'] = auth_secret
|
|
|
|
geometry = volume.get('provider_geometry', None)
|
|
if geometry:
|
|
(physical_block_size, logical_block_size) = geometry.split()
|
|
properties['physical_block_size'] = physical_block_size
|
|
properties['logical_block_size'] = logical_block_size
|
|
|
|
encryption_key_id = volume.get('encryption_key_id', None)
|
|
properties['encrypted'] = encryption_key_id is not None
|
|
|
|
return properties
|
|
|
|
def _run_iscsiadm(self, iscsi_properties, iscsi_command, **kwargs):
|
|
check_exit_code = kwargs.pop('check_exit_code', 0)
|
|
(out, err) = self._execute('iscsiadm', '-m', 'node', '-T',
|
|
iscsi_properties['target_iqn'],
|
|
'-p', iscsi_properties['target_portal'],
|
|
*iscsi_command, run_as_root=True,
|
|
check_exit_code=check_exit_code)
|
|
LOG.debug("iscsiadm %s: stdout=%s stderr=%s" %
|
|
(iscsi_command, out, err))
|
|
return (out, err)
|
|
|
|
def _run_iscsiadm_bare(self, iscsi_command, **kwargs):
|
|
check_exit_code = kwargs.pop('check_exit_code', 0)
|
|
(out, err) = self._execute('iscsiadm',
|
|
*iscsi_command,
|
|
run_as_root=True,
|
|
check_exit_code=check_exit_code)
|
|
LOG.debug("iscsiadm %s: stdout=%s stderr=%s" %
|
|
(iscsi_command, out, err))
|
|
return (out, err)
|
|
|
|
def _iscsiadm_update(self, iscsi_properties, property_key, property_value,
|
|
**kwargs):
|
|
iscsi_command = ('--op', 'update', '-n', property_key,
|
|
'-v', property_value)
|
|
return self._run_iscsiadm(iscsi_properties, iscsi_command, **kwargs)
|
|
|
|
def initialize_connection(self, volume, connector):
|
|
"""Initializes the connection and returns connection info.
|
|
|
|
The iscsi driver returns a driver_volume_type of 'iscsi'.
|
|
The format of the driver data is defined in _get_iscsi_properties.
|
|
Example return value::
|
|
|
|
{
|
|
'driver_volume_type': 'iscsi'
|
|
'data': {
|
|
'target_discovered': True,
|
|
'target_iqn': 'iqn.2010-10.org.openstack:volume-00000001',
|
|
'target_portal': '127.0.0.0.1:3260',
|
|
'volume_id': 1,
|
|
'access_mode': 'rw'
|
|
}
|
|
}
|
|
|
|
"""
|
|
|
|
if CONF.iscsi_helper == 'lioadm':
|
|
self.tgtadm.initialize_connection(volume, connector)
|
|
|
|
iscsi_properties = self._get_iscsi_properties(volume)
|
|
return {
|
|
'driver_volume_type': 'iscsi',
|
|
'data': iscsi_properties
|
|
}
|
|
|
|
def validate_connector(self, connector):
|
|
# iSCSI drivers require the initiator information
|
|
if 'initiator' not in connector:
|
|
err_msg = (_('The volume driver requires the iSCSI initiator '
|
|
'name in the connector.'))
|
|
LOG.error(err_msg)
|
|
raise exception.VolumeBackendAPIException(data=err_msg)
|
|
|
|
def terminate_connection(self, volume, connector, **kwargs):
|
|
pass
|
|
|
|
def _get_iscsi_initiator(self):
|
|
"""Get iscsi initiator name for this machine"""
|
|
# NOTE openiscsi stores initiator name in a file that
|
|
# needs root permission to read.
|
|
contents = utils.read_file_as_root('/etc/iscsi/initiatorname.iscsi')
|
|
for l in contents.split('\n'):
|
|
if l.startswith('InitiatorName='):
|
|
return l[l.index('=') + 1:].strip()
|
|
|
|
def get_volume_stats(self, refresh=False):
|
|
"""Get volume stats.
|
|
|
|
If 'refresh' is True, run update the stats first.
|
|
"""
|
|
if refresh:
|
|
self._update_volume_stats()
|
|
|
|
return self._stats
|
|
|
|
def _update_volume_stats(self):
|
|
"""Retrieve stats info from volume group."""
|
|
|
|
LOG.debug(_("Updating volume stats"))
|
|
data = {}
|
|
backend_name = self.configuration.safe_get('volume_backend_name')
|
|
data["volume_backend_name"] = backend_name or 'Generic_iSCSI'
|
|
data["vendor_name"] = 'Open Source'
|
|
data["driver_version"] = '1.0'
|
|
data["storage_protocol"] = 'iSCSI'
|
|
|
|
data['total_capacity_gb'] = 'infinite'
|
|
data['free_capacity_gb'] = 'infinite'
|
|
data['reserved_percentage'] = 100
|
|
data['QoS_support'] = False
|
|
self._stats = data
|
|
|
|
def accept_transfer(self, context, volume, new_user, new_project):
|
|
pass
|
|
|
|
def get_target_admin(self):
|
|
root_helper = utils.get_root_helper()
|
|
|
|
if CONF.iscsi_helper == 'tgtadm':
|
|
return iscsi.TgtAdm(root_helper,
|
|
CONF.volumes_dir,
|
|
CONF.iscsi_target_prefix)
|
|
elif CONF.iscsi_helper == 'fake':
|
|
return iscsi.FakeIscsiHelper()
|
|
elif CONF.iscsi_helper == 'lioadm':
|
|
return iscsi.LioAdm(root_helper,
|
|
CONF.lio_initiator_iqns,
|
|
CONF.iscsi_target_prefix)
|
|
else:
|
|
return iscsi.IetAdm(root_helper, CONF.iet_conf, CONF.iscsi_iotype)
|
|
|
|
|
|
class FakeISCSIDriver(ISCSIDriver):
|
|
"""Logs calls instead of executing."""
|
|
def __init__(self, *args, **kwargs):
|
|
super(FakeISCSIDriver, self).__init__(execute=self.fake_execute,
|
|
*args, **kwargs)
|
|
|
|
def create_volume(self, volume):
|
|
pass
|
|
|
|
def check_for_setup_error(self):
|
|
"""No setup necessary in fake mode."""
|
|
pass
|
|
|
|
def initialize_connection(self, volume, connector):
|
|
return {
|
|
'driver_volume_type': 'iscsi',
|
|
'data': {'access_mode': 'rw'}
|
|
}
|
|
|
|
def terminate_connection(self, volume, connector, **kwargs):
|
|
pass
|
|
|
|
@staticmethod
|
|
def fake_execute(cmd, *_args, **_kwargs):
|
|
"""Execute that simply logs the command."""
|
|
LOG.debug(_("FAKE ISCSI: %s"), cmd)
|
|
return (None, None)
|
|
|
|
|
|
class ISERDriver(ISCSIDriver):
|
|
"""Executes commands relating to ISER volumes.
|
|
|
|
We make use of model provider properties as follows:
|
|
|
|
``provider_location``
|
|
if present, contains the iSER target information in the same
|
|
format as an ietadm discovery
|
|
i.e. '<ip>:<port>,<portal> <target IQN>'
|
|
|
|
``provider_auth``
|
|
if present, contains a space-separated triple:
|
|
'<auth method> <auth username> <auth password>'.
|
|
`CHAP` is the only auth_method in use at the moment.
|
|
"""
|
|
|
|
def __init__(self, *args, **kwargs):
|
|
super(ISERDriver, self).__init__(*args, **kwargs)
|
|
|
|
def _do_iser_discovery(self, volume):
|
|
LOG.warn(_("ISER provider_location not stored, using discovery"))
|
|
|
|
volume_name = volume['name']
|
|
|
|
(out, _err) = self._execute('iscsiadm', '-m', 'discovery',
|
|
'-t', 'sendtargets', '-p', volume['host'],
|
|
run_as_root=True)
|
|
for target in out.splitlines():
|
|
if (self.configuration.iser_ip_address in target
|
|
and volume_name in target):
|
|
return target
|
|
return None
|
|
|
|
def _get_iser_properties(self, volume):
|
|
"""Gets iser configuration
|
|
|
|
We ideally get saved information in the volume entity, but fall back
|
|
to discovery if need be. Discovery may be completely removed in future
|
|
The properties are:
|
|
|
|
:target_discovered: boolean indicating whether discovery was used
|
|
|
|
:target_iqn: the IQN of the iSER target
|
|
|
|
:target_portal: the portal of the iSER target
|
|
|
|
:target_lun: the lun of the iSER target
|
|
|
|
:volume_id: the id of the volume (currently used by xen)
|
|
|
|
:auth_method:, :auth_username:, :auth_password:
|
|
|
|
the authentication details. Right now, either auth_method is not
|
|
present meaning no authentication, or auth_method == `CHAP`
|
|
meaning use CHAP with the specified credentials.
|
|
"""
|
|
|
|
properties = {}
|
|
|
|
location = volume['provider_location']
|
|
|
|
if location:
|
|
# provider_location is the same format as iSER discovery output
|
|
properties['target_discovered'] = False
|
|
else:
|
|
location = self._do_iser_discovery(volume)
|
|
|
|
if not location:
|
|
msg = (_("Could not find iSER export for volume %s") %
|
|
(volume['name']))
|
|
raise exception.InvalidVolume(reason=msg)
|
|
|
|
LOG.debug(_("ISER Discovery: Found %s") % (location))
|
|
properties['target_discovered'] = True
|
|
|
|
results = location.split(" ")
|
|
properties['target_portal'] = results[0].split(",")[0]
|
|
properties['target_iqn'] = results[1]
|
|
try:
|
|
properties['target_lun'] = int(results[2])
|
|
except (IndexError, ValueError):
|
|
if (self.configuration.volume_driver in
|
|
['cinder.volume.drivers.lvm.LVMISERDriver',
|
|
'cinder.volume.drivers.lvm.ThinLVMVolumeDriver'] and
|
|
self.configuration.iser_helper == 'tgtadm'):
|
|
properties['target_lun'] = 1
|
|
else:
|
|
properties['target_lun'] = 0
|
|
|
|
properties['volume_id'] = volume['id']
|
|
|
|
auth = volume['provider_auth']
|
|
if auth:
|
|
(auth_method, auth_username, auth_secret) = auth.split()
|
|
|
|
properties['auth_method'] = auth_method
|
|
properties['auth_username'] = auth_username
|
|
properties['auth_password'] = auth_secret
|
|
|
|
return properties
|
|
|
|
def initialize_connection(self, volume, connector):
|
|
"""Initializes the connection and returns connection info.
|
|
|
|
The iser driver returns a driver_volume_type of 'iser'.
|
|
The format of the driver data is defined in _get_iser_properties.
|
|
Example return value::
|
|
|
|
{
|
|
'driver_volume_type': 'iser'
|
|
'data': {
|
|
'target_discovered': True,
|
|
'target_iqn':
|
|
'iqn.2010-10.org.iser.openstack:volume-00000001',
|
|
'target_portal': '127.0.0.0.1:3260',
|
|
'volume_id': 1,
|
|
}
|
|
}
|
|
|
|
"""
|
|
|
|
iser_properties = self._get_iser_properties(volume)
|
|
return {
|
|
'driver_volume_type': 'iser',
|
|
'data': iser_properties
|
|
}
|
|
|
|
def _check_valid_device(self, path):
|
|
cmd = ('dd', 'if=%(path)s' % {"path": path},
|
|
'of=/dev/null', 'count=1')
|
|
out, info = None, None
|
|
try:
|
|
out, info = self._execute(*cmd, run_as_root=True)
|
|
except processutils.ProcessExecutionError as e:
|
|
LOG.error(_("Failed to access the device on the path "
|
|
"%(path)s: %(error)s.") %
|
|
{"path": path, "error": e.stderr})
|
|
return False
|
|
# If the info is none, the path does not exist.
|
|
if info is None:
|
|
return False
|
|
return True
|
|
|
|
def _attach_volume(self, context, volume, connector):
|
|
"""Attach the volume."""
|
|
iser_properties = None
|
|
host_device = None
|
|
init_conn = self.initialize_connection(volume, connector)
|
|
iser_properties = init_conn['data']
|
|
|
|
# code "inspired by" nova/virt/libvirt/volume.py
|
|
try:
|
|
self._run_iscsiadm(iser_properties, ())
|
|
except processutils.ProcessExecutionError as exc:
|
|
# iscsiadm returns 21 for "No records found" after version 2.0-871
|
|
if exc.exit_code in [21, 255]:
|
|
self._run_iscsiadm(iser_properties, ('--op', 'new'))
|
|
else:
|
|
raise
|
|
|
|
if iser_properties.get('auth_method'):
|
|
self._iscsiadm_update(iser_properties,
|
|
"node.session.auth.authmethod",
|
|
iser_properties['auth_method'])
|
|
self._iscsiadm_update(iser_properties,
|
|
"node.session.auth.username",
|
|
iser_properties['auth_username'])
|
|
self._iscsiadm_update(iser_properties,
|
|
"node.session.auth.password",
|
|
iser_properties['auth_password'])
|
|
|
|
host_device = ("/dev/disk/by-path/ip-%s-iser-%s-lun-%s" %
|
|
(iser_properties['target_portal'],
|
|
iser_properties['target_iqn'],
|
|
iser_properties.get('target_lun', 0)))
|
|
|
|
out = self._run_iscsiadm_bare(["-m", "session"],
|
|
run_as_root=True,
|
|
check_exit_code=[0, 1, 21])[0] or ""
|
|
|
|
portals = [{'portal': p.split(" ")[2], 'iqn': p.split(" ")[3]}
|
|
for p in out.splitlines() if p.startswith("iser:")]
|
|
|
|
stripped_portal = iser_properties['target_portal'].split(",")[0]
|
|
length_iqn = [s for s in portals
|
|
if stripped_portal ==
|
|
s['portal'].split(",")[0] and
|
|
s['iqn'] == iser_properties['target_iqn']]
|
|
if len(portals) == 0 or len(length_iqn) == 0:
|
|
try:
|
|
self._run_iscsiadm(iser_properties, ("--login",),
|
|
check_exit_code=[0, 255])
|
|
except processutils.ProcessExecutionError as err:
|
|
if err.exit_code in [15]:
|
|
self._iscsiadm_update(iser_properties,
|
|
"node.startup",
|
|
"automatic")
|
|
return iser_properties, host_device
|
|
else:
|
|
raise
|
|
|
|
self._iscsiadm_update(iser_properties,
|
|
"node.startup", "automatic")
|
|
|
|
tries = 0
|
|
while not os.path.exists(host_device):
|
|
if tries >= self.configuration.num_iser_scan_tries:
|
|
raise exception.CinderException(_("iSER device "
|
|
"not found "
|
|
"at %s") % (host_device))
|
|
|
|
LOG.warn(_("ISER volume not yet found at: %(host_device)s. "
|
|
"Will rescan & retry. Try number: %(tries)s.") %
|
|
{'host_device': host_device, 'tries': tries})
|
|
|
|
# The rescan isn't documented as being necessary(?),
|
|
# but it helps
|
|
self._run_iscsiadm(iser_properties, ("--rescan",))
|
|
|
|
tries = tries + 1
|
|
if not os.path.exists(host_device):
|
|
time.sleep(tries ** 2)
|
|
|
|
if tries != 0:
|
|
LOG.debug(_("Found iSER node %(host_device)s "
|
|
"(after %(tries)s rescans).") %
|
|
{'host_device': host_device,
|
|
'tries': tries})
|
|
|
|
if not self._check_valid_device(host_device):
|
|
raise exception.DeviceUnavailable(path=host_device,
|
|
reason=(_("Unable to access "
|
|
"the backend storage "
|
|
"via the path "
|
|
"%(path)s.") %
|
|
{'path': host_device}))
|
|
return iser_properties, host_device
|
|
|
|
def _update_volume_status(self):
|
|
"""Retrieve status info from volume group."""
|
|
|
|
LOG.debug(_("Updating volume status"))
|
|
data = {}
|
|
backend_name = self.configuration.safe_get('volume_backend_name')
|
|
data["volume_backend_name"] = backend_name or 'Generic_iSER'
|
|
data["vendor_name"] = 'Open Source'
|
|
data["driver_version"] = '1.0'
|
|
data["storage_protocol"] = 'iSER'
|
|
|
|
data['total_capacity_gb'] = 'infinite'
|
|
data['free_capacity_gb'] = 'infinite'
|
|
data['reserved_percentage'] = 100
|
|
data['QoS_support'] = False
|
|
self._stats = data
|
|
|
|
def get_target_admin(self):
|
|
root_helper = utils.get_root_helper()
|
|
|
|
if CONF.iser_helper == 'fake':
|
|
return iser.FakeIserHelper()
|
|
else:
|
|
return iser.TgtAdm(root_helper,
|
|
CONF.volumes_dir)
|
|
|
|
|
|
class FakeISERDriver(FakeISCSIDriver):
|
|
"""Logs calls instead of executing."""
|
|
def __init__(self, *args, **kwargs):
|
|
super(FakeISERDriver, self).__init__(execute=self.fake_execute,
|
|
*args, **kwargs)
|
|
|
|
def initialize_connection(self, volume, connector):
|
|
return {
|
|
'driver_volume_type': 'iser',
|
|
'data': {}
|
|
}
|
|
|
|
@staticmethod
|
|
def fake_execute(cmd, *_args, **_kwargs):
|
|
"""Execute that simply logs the command."""
|
|
LOG.debug(_("FAKE ISER: %s"), cmd)
|
|
return (None, None)
|
|
|
|
|
|
class FibreChannelDriver(VolumeDriver):
|
|
"""Executes commands relating to Fibre Channel volumes."""
|
|
def __init__(self, *args, **kwargs):
|
|
super(FibreChannelDriver, self).__init__(*args, **kwargs)
|
|
|
|
def initialize_connection(self, volume, connector):
|
|
"""Initializes the connection and returns connection info.
|
|
|
|
The driver returns a driver_volume_type of 'fibre_channel'.
|
|
The target_wwn can be a single entry or a list of wwns that
|
|
correspond to the list of remote wwn(s) that will export the volume.
|
|
Example return values:
|
|
|
|
{
|
|
'driver_volume_type': 'fibre_channel'
|
|
'data': {
|
|
'target_discovered': True,
|
|
'target_lun': 1,
|
|
'target_wwn': '1234567890123',
|
|
'access_mode': 'rw'
|
|
}
|
|
}
|
|
|
|
or
|
|
|
|
{
|
|
'driver_volume_type': 'fibre_channel'
|
|
'data': {
|
|
'target_discovered': True,
|
|
'target_lun': 1,
|
|
'target_wwn': ['1234567890123', '0987654321321'],
|
|
'access_mode': 'rw'
|
|
}
|
|
}
|
|
|
|
"""
|
|
msg = _("Driver must implement initialize_connection")
|
|
raise NotImplementedError(msg)
|