OpenStack Networking (Neutron)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

101 lines
4.6 KiB

# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from neutron_lib.callbacks import events as local_events
from neutron_lib.callbacks import registry as local_registry
from oslo_config import cfg
from oslo_log import log as logging
import oslo_messaging
from neutron.api.rpc.callbacks.consumer import registry
from neutron.api.rpc.callbacks import events
from neutron.api.rpc.callbacks import resources
from import ovsdb_handler
from import trunk_manager
from import agent
LOG = logging.getLogger(__name__)
class OVSTrunkSkeleton(agent.TrunkSkeleton):
"""It processes Neutron Server events to create the physical resources
associated to a logical trunk in response to user initiated API events
(such as trunk subport add/remove). It collaborates with the OVSDBHandler
to implement the trunk control plane.
def __init__(self, ovsdb_handler):
super(OVSTrunkSkeleton, self).__init__()
self.ovsdb_handler = ovsdb_handler
registry.unsubscribe(self.handle_trunks, resources.TRUNK)
def handle_trunks(self, context, resource_type, trunk, event_type):
"""This method is not required by the OVS Agent driver.
Trunk notifications are handled via local OVSDB events.
raise NotImplementedError()
def handle_subports(self, context, resource_type, subports, event_type):
# Subports are always created with the same trunk_id and there is
# always at least one item in subports list
trunk_id = subports[0].trunk_id
if self.ovsdb_handler.manages_this_trunk(trunk_id):
if event_type not in (events.CREATED, events.DELETED):
LOG.error("Unknown or unimplemented event %s", event_type)
ctx = self.ovsdb_handler.context
LOG.debug("Event %s for subports: %s", event_type, subports)
if event_type == events.CREATED:
status = self.ovsdb_handler.wire_subports_for_trunk(
ctx, trunk_id, subports)
elif event_type == events.DELETED:
subport_ids = [subport.port_id for subport in subports]
status = self.ovsdb_handler.unwire_subports_for_trunk(
trunk_id, subport_ids)
self.ovsdb_handler.report_trunk_status(ctx, trunk_id, status)
except oslo_messaging.MessagingException as e:
"Error on event %(event)s for subports "
"%(subports)s: %(err)s",
{'event': event_type, 'subports': subports, 'err': e})
@local_registry.receives(resources.TRUNK, [local_events.BEFORE_CREATE])
def check_trunk_dependencies(self, resource, event, trigger, **kwargs):
# The OVS trunk driver does not work with iptables firewall and QoS.
# We should validate the environment configuration and signal that
# something might be wrong.
# NOTE(armax): this check could be made quite sophisticated in that
# we could check for incompatibilities and abort the creation request
# only if the trunk is indeed associated with ports that have security
# groups and QoS rules, though this would be a lot more work.
if "iptables_hybrid" in cfg.CONF.SECURITYGROUP.firewall_driver:
"Firewall driver iptables_hybrid is not compatible with "
"trunk ports. Trunk %(trunk_id)s may be insecure.",
{'trunk_id': kwargs['trunk'].id})
def init_handler(resource, event, trigger, payload=None):
"""Handler for agent init event."""
# Set up agent-side RPC for receiving trunk events; we may want to
# make this setup conditional based on server-side capabilities.
manager = trunk_manager.TrunkManager(trigger.int_br)
handler = ovsdb_handler.OVSDBHandler(manager)
TRUNK_SKELETON = OVSTrunkSkeleton(handler)