The previously introduced token caching mechanism [1] reduces token requests to subclouds and also effectively handles Keystone endpoint caching, as the endpoint catalog is cached alongside tokens. We avoid unnecessary creation of `OpenStackDriver` instances solely for retrieving service endpoints, significantly reducing redundant Keystone connections and improving performance. [1] https://review.opendev.org/c/starlingx/distcloud/+/931830 Test Plan: PASS - Deploy a subcloud and verify token caching behavior PASS - Deploy a subcloud with remote install PASS - Prestage a subcloud for install and software deployment, validating token caching during the process PASS - Manage a subcloud for the first time and verify that the initial sync functions as expected. PASS - Unmanage a subcloud, then manage the subcloud again. PASS - BnR scalability test PASS - Test DC orchestration sw-deploy PASS - Scalability test PASS - Geo-Redundancy test PASS - Subcloud network reconfiguration test Story: 2011311 Task: 52217 Change-Id: I2ff8c9c95052a7c3d0c495f481f48c1eb239c253 Signed-off-by: Hugo Brito <hugo.brito@windriver.com>
289 lines
9.2 KiB
Python
289 lines
9.2 KiB
Python
# Copyright 2016 Ericsson AB
|
|
# Copyright (c) 2017-2022, 2024-2025 Wind River Systems, Inc.
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
|
|
from functools import wraps
|
|
|
|
from keystoneauth1 import session as ks_session
|
|
from nfv_client.openstack import sw_update
|
|
from oslo_log import log
|
|
|
|
from dccommon import consts
|
|
from dccommon.drivers import base
|
|
from dccommon import exceptions
|
|
|
|
LOG = log.getLogger(__name__)
|
|
|
|
STRATEGY_NAME_FW_UPDATE = "fw-update"
|
|
STRATEGY_NAME_KUBE_ROOTCA_UPDATE = "kube-rootca-update"
|
|
STRATEGY_NAME_KUBE_UPGRADE = "kube-upgrade"
|
|
# TODO(nicodemos): Change this to 'sw-deploy' once the new strategy is created
|
|
STRATEGY_NAME_SW_USM = "sw-upgrade"
|
|
STRATEGY_NAME_SYS_CONFIG_UPDATE = "system-config-update"
|
|
|
|
APPLY_TYPE_SERIAL = "serial"
|
|
APPLY_TYPE_PARALLEL = "parallel"
|
|
APPLY_TYPE_IGNORE = "ignore"
|
|
|
|
INSTANCE_ACTION_MIGRATE = "migrate"
|
|
INSTANCE_ACTION_STOP_START = "stop-start"
|
|
|
|
ALARM_RESTRICTIONS_STRICT = "strict"
|
|
ALARM_RESTRICTIONS_RELAXED = "relaxed"
|
|
|
|
SW_UPDATE_OPTS_CONST_DEFAULT = {
|
|
"name": consts.SW_UPDATE_DEFAULT_TITLE,
|
|
"storage-apply-type": APPLY_TYPE_PARALLEL,
|
|
"worker-apply-type": APPLY_TYPE_PARALLEL,
|
|
"max-parallel-workers": 10,
|
|
"default-instance-action": INSTANCE_ACTION_MIGRATE,
|
|
"alarm-restriction-type": ALARM_RESTRICTIONS_RELAXED,
|
|
"created-at": None,
|
|
"updated-at": None,
|
|
}
|
|
|
|
STATE_INITIAL = "initial"
|
|
STATE_BUILDING = "building"
|
|
STATE_BUILD_FAILED = "build-failed"
|
|
STATE_BUILD_TIMEOUT = "build-timeout"
|
|
STATE_READY_TO_APPLY = "ready-to-apply"
|
|
STATE_APPLYING = "applying"
|
|
STATE_APPLY_FAILED = "apply-failed"
|
|
STATE_APPLY_TIMEOUT = "apply-timeout"
|
|
STATE_APPLIED = "applied"
|
|
STATE_ABORTING = "aborting"
|
|
STATE_ABORT_FAILED = "abort-failed"
|
|
STATE_ABORT_TIMEOUT = "abort-timeout"
|
|
STATE_ABORTED = "aborted"
|
|
|
|
TRANSITORY_STATES = [
|
|
STATE_INITIAL,
|
|
STATE_BUILDING,
|
|
STATE_READY_TO_APPLY,
|
|
STATE_APPLYING,
|
|
STATE_ABORTING,
|
|
]
|
|
|
|
# The exception message when vim authorization fails
|
|
VIM_AUTHORIZATION_FAILED = "Authorization failed"
|
|
|
|
|
|
# VIM API returns a 403 instead of a 401 for unauthenticated requests, so we
|
|
# can't use the internal re-auth functionality of the keystone session, we must
|
|
# manually check for the VIM_AUTHORIZATION_FAILED string in the raised exception
|
|
def retry_on_auth_failure():
|
|
def decorator(func):
|
|
@wraps(func)
|
|
def wrapper(self, *args, **kwargs):
|
|
try:
|
|
return func(self, *args, **kwargs)
|
|
except Exception as e:
|
|
# Invalidate token cache and retry
|
|
if VIM_AUTHORIZATION_FAILED in str(e):
|
|
self.session.invalidate()
|
|
return func(self, *args, **kwargs)
|
|
# Raise any other type of exception
|
|
raise e
|
|
|
|
return wrapper
|
|
|
|
return decorator
|
|
|
|
|
|
# TODO(gherzmann): Enhance VIM client to use session-based connections,
|
|
# enabling TCP connection reuse for improved efficiency
|
|
class VimClient(base.DriverBase):
|
|
"""VIM driver."""
|
|
|
|
@property
|
|
def token(self):
|
|
# The property is used to guarantee we always get the most recent token
|
|
return self.session.get_token()
|
|
|
|
def __init__(
|
|
self, session: ks_session.Session, region: str = None, endpoint: str = None
|
|
):
|
|
if not (endpoint or region):
|
|
error = "Either endpoint or region must be provided"
|
|
raise exceptions.ClientException(client="VIM", error=error)
|
|
|
|
self.session = session
|
|
self.endpoint = endpoint
|
|
|
|
# The nfv_client doesn't support a session, so we need to
|
|
# get an endpoint and token.
|
|
if not self.endpoint:
|
|
self.endpoint = session.get_endpoint(
|
|
service_type="nfv",
|
|
region_name=region,
|
|
interface=consts.KS_ENDPOINT_ADMIN,
|
|
)
|
|
|
|
# session.get_user_id() returns a UUID
|
|
# that always corresponds to 'dcmanager'
|
|
self.username = consts.DCMANAGER_USER_NAME
|
|
# session object does not provide a domain query
|
|
# The only domain used for dcmanager is 'default'
|
|
self.user_domain_name = "default"
|
|
# session.get_project_id() returns a UUID
|
|
# that always corresponds to 'services'
|
|
self.tenant = consts.SERVICES_USER_NAME
|
|
|
|
@retry_on_auth_failure()
|
|
def create_strategy(
|
|
self,
|
|
strategy_name,
|
|
storage_apply_type,
|
|
worker_apply_type,
|
|
max_parallel_worker_hosts,
|
|
default_instance_action,
|
|
alarm_restrictions,
|
|
**kwargs,
|
|
):
|
|
"""Create VIM orchestration strategy"""
|
|
|
|
url = self.endpoint
|
|
|
|
try:
|
|
strategy = sw_update.create_strategy(
|
|
self.token,
|
|
url,
|
|
strategy_name=strategy_name,
|
|
controller_apply_type=APPLY_TYPE_SERIAL,
|
|
storage_apply_type=storage_apply_type,
|
|
swift_apply_type=APPLY_TYPE_IGNORE,
|
|
worker_apply_type=worker_apply_type,
|
|
max_parallel_worker_hosts=max_parallel_worker_hosts,
|
|
default_instance_action=default_instance_action,
|
|
alarm_restrictions=alarm_restrictions,
|
|
username=self.username,
|
|
user_domain_name=self.user_domain_name,
|
|
tenant=self.tenant,
|
|
**kwargs,
|
|
)
|
|
except Exception as e:
|
|
raise exceptions.VIMClientException(e)
|
|
if not strategy:
|
|
raise exceptions.VIMClientException(
|
|
f"Strategy: {strategy_name} creation failed."
|
|
)
|
|
|
|
LOG.debug("Strategy created: %s" % strategy)
|
|
return strategy
|
|
|
|
@retry_on_auth_failure()
|
|
def get_strategy(self, strategy_name, raise_error_if_missing=True):
|
|
"""Get VIM orchestration strategy"""
|
|
|
|
url = self.endpoint
|
|
try:
|
|
strategy = sw_update.get_strategies(
|
|
self.token,
|
|
url,
|
|
strategy_name=strategy_name,
|
|
username=self.username,
|
|
user_domain_name=self.user_domain_name,
|
|
tenant=self.tenant,
|
|
)
|
|
except Exception as e:
|
|
raise exceptions.VIMClientException(e)
|
|
if not strategy:
|
|
if raise_error_if_missing:
|
|
raise exceptions.VIMClientException(
|
|
f"Get strategy: {strategy_name} failed."
|
|
)
|
|
|
|
LOG.debug("Strategy: %s" % strategy)
|
|
return strategy
|
|
|
|
@retry_on_auth_failure()
|
|
def get_current_strategy(self):
|
|
"""Get the current active VIM orchestration strategy"""
|
|
|
|
url = self.endpoint
|
|
try:
|
|
strategy = sw_update.get_current_strategy(self.token, url)
|
|
except Exception as e:
|
|
raise exceptions.VIMClientException(e)
|
|
|
|
LOG.debug("Strategy: %s" % strategy)
|
|
return strategy
|
|
|
|
@retry_on_auth_failure()
|
|
def delete_strategy(self, strategy_name):
|
|
"""Delete the current VIM orchestration strategy"""
|
|
|
|
url = self.endpoint
|
|
try:
|
|
success = sw_update.delete_strategy(
|
|
self.token,
|
|
url,
|
|
strategy_name=strategy_name,
|
|
username=self.username,
|
|
user_domain_name=self.user_domain_name,
|
|
tenant=self.tenant,
|
|
)
|
|
except Exception as e:
|
|
raise exceptions.VIMClientException(e)
|
|
if not success:
|
|
raise exceptions.VIMClientException(
|
|
f"Delete strategy: {strategy_name} failed."
|
|
)
|
|
|
|
LOG.debug("Strategy deleted")
|
|
|
|
@retry_on_auth_failure()
|
|
def apply_strategy(self, strategy_name):
|
|
"""Apply the current orchestration strategy"""
|
|
|
|
url = self.endpoint
|
|
try:
|
|
strategy = sw_update.apply_strategy(
|
|
self.token,
|
|
url,
|
|
strategy_name=strategy_name,
|
|
username=self.username,
|
|
user_domain_name=self.user_domain_name,
|
|
tenant=self.tenant,
|
|
)
|
|
except Exception as e:
|
|
raise exceptions.VIMClientException(e)
|
|
if not strategy:
|
|
raise exceptions.VIMClientException(
|
|
f"Strategy: {strategy_name} apply failed."
|
|
)
|
|
|
|
LOG.debug("Strategy applied: %s" % strategy)
|
|
return strategy
|
|
|
|
@retry_on_auth_failure()
|
|
def abort_strategy(self, strategy_name):
|
|
"""Abort the current orchestration strategy"""
|
|
|
|
url = self.endpoint
|
|
strategy = sw_update.abort_strategy(
|
|
self.token,
|
|
url,
|
|
strategy_name=strategy_name,
|
|
stage_id=None,
|
|
username=self.username,
|
|
user_domain_name=self.user_domain_name,
|
|
tenant=self.tenant,
|
|
)
|
|
if not strategy:
|
|
raise Exception("Strategy abort failed")
|
|
|
|
LOG.debug("Strategy aborted: %s" % strategy)
|
|
return strategy
|