254 lines
8.4 KiB
Python
Raw Normal View History

# Copyright (c) 2016 Cisco Systems, Inc.
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
# Some constants and verifier functions have been deprecated but are still
# used by earlier releases of neutron. In order to maintain
# backwards-compatibility with stable/mitaka this will act as a translator
# that passes constants and functions according to version number.
# neutron_lib has a bunch of hacking checks explicitly to ensure that
# newer versions of mech drivers don't go loading Neutron files.
# Obviously, since we're trying to achieve backward compatibility, we
# do precisely that - but that should only happen in this file. The
# no-qa comments are to allow that to work.
try:
# Ocata+
import neutron_lib.api.definitions.portbindings
portbindings = neutron_lib.api.definitions.portbindings
except ImportError:
import neutron.extensions.portbindings # flake8: noqa: N530
portbindings = neutron.extensions.portbindings
try:
# Newton+
import neutron_lib.context
context = neutron_lib.context
except ImportError:
import neutron.context
context = neutron.context
try:
from neutron_lib.api.definitions import provider_net as n_provider
except ImportError:
# Newton, at least, has this:
from neutron.extensions import providernet as n_provider
try:
# Mitaka+
import neutron_lib.constants
import neutron_lib.exceptions
n_const = neutron_lib.constants
n_exc = neutron_lib.exceptions
except ImportError:
import neutron.common.constants # noqa: N530
import neutron.common.exceptions # noqa: N530
n_const = neutron.common.constants
n_exec = neutron.common.exceptions
# Some of the TYPE_XXX objects also moved in Pike/Queens
if hasattr(n_const, 'TYPE_FLAT'):
plugin_constants = n_const
else:
import neutron.plugins.common.constants
plugin_constants = neutron.plugins.common.constants
try:
n_const.UUID_PATTERN
except AttributeError:
HEX_ELEM = '[0-9A-Fa-f]'
n_const.UUID_PATTERN = '-'.join([HEX_ELEM + '{8}', HEX_ELEM + '{4}',
HEX_ELEM + '{4}', HEX_ELEM + '{4}',
HEX_ELEM + '{12}'])
try:
from neutron.callbacks import events
from neutron.callbacks import registry
from neutron.callbacks import resources
except ImportError:
# Queens+
from neutron_lib.callbacks import events
from neutron_lib.callbacks import registry
from neutron_lib.callbacks import resources
try:
# Newton+
import neutron_lib.db.model_base
import neutron_lib.plugins.directory
model_base = neutron_lib.db.model_base
directory = neutron_lib.plugins.directory
except ImportError:
import neutron.db.model_base # noqa: N530
import neutron.manager # noqa: N530
directory = neutron.manager.NeutronManager
model_base = neutron.db.model_base
# Staying abreast of neutron.db changes in Stein
try:
# Rocky and before
from neutron.db import _resource_extend as resource_extend
from neutron.db import api as neutron_db_api
db_context_writer = neutron_db_api.context_manager.writer
db_context_reader = neutron_db_api.context_manager.reader
except ImportError:
# Stein onwards
from neutron_lib.db import api as neutron_db_api
from neutron_lib.db import resource_extend
db_context_writer = neutron_db_api.CONTEXT_WRITER
db_context_reader = neutron_db_api.CONTEXT_READER
# Neutron changes in Train
try:
# Stein and before
from neutron.services.trunk import constants
trunk_const = constants
except ImportError:
# Map changed trunk constants in Train
from neutron_lib.services.trunk import constants
class new_trunk_const(object):
VLAN = constants.SEGMENTATION_TYPE_VLAN
TRUNK = 'trunk'
TRUNK_PLUGIN = 'trunk_plugin'
DOWN_STATUS = constants.TRUNK_DOWN_STATUS
ACTIVE_STATUS = constants.TRUNK_ACTIVE_STATUS
ERROR_STATUS = constants.TRUNK_ERROR_STATUS
SUBPORTS = 'subports'
trunk_const = new_trunk_const
try:
# Newton
n_const.L3
except AttributeError:
try:
n_const.L3 = plugin_constants.L3_ROUTER_NAT
except AttributeError:
# Rocky
n_const.L3 = neutron_lib.plugins.constants.L3
# Register security group option
def register_securitygroups_opts(cfg):
# Mitaka compatibility
try:
from neutron.conf.agent import securitygroups_rpc
securitygroups_rpc.register_securitygroups_opts()
except ImportError:
security_group_opts = [
cfg.BoolOpt(
'enable_security_group', default=True,
help=_('Controls whether neutron security groups is enabled '
'Set it to false to disable security groups')), ]
# This can get loaded from other parts of Mitaka because other
# mechanism drivers respect this flag too
if not (hasattr(cfg.CONF, 'SECURITYGROUP') and
hasattr(cfg.CONF.SECURITYGROUP.enable_security_group)):
cfg.register_opts(security_group_opts, 'SECURITYGROUP')
def register_ml2_base_opts(cfg):
try:
# Older
from neutron.plugins.ml2 import config
# Calls register whether you like it or not, with no choice on arg
except ImportError:
# Newer (Pike-ish)
from neutron.conf.plugins.ml2 import config
config.register_ml2_plugin_opts(cfg)
try:
# (for, specifically, get_random_mac)
# Newer:
from neutron_lib.utils import net as net_utils
if not hasattr(net_utils,'get_random_mac'): # Check for Newton
raise AttributeError
except (ImportError, AttributeError):
# Older:
from neutron.common import utils as net_utils
assert hasattr(net_utils,'get_random_mac') == True
try:
from neutron.plugins.ml2 import driver_api
except:
# Between Pike and Queens
from neutron_lib.plugins.ml2 import api as driver_api
import os
import re
# TODO(ijw): should be in neutron_lib
from neutron.agent.linux import bridge_lib # noqa: N530
from neutron.agent.linux import ip_lib # noqa: N530
def monkey_patch():
"""Add backward compatibility to networking-vpp for Liberty.
This monkey-patches a couple of bits of Neutron
to enable compatibility with Liberty.
"""
if 'owns_interface' not in dir(bridge_lib.BridgeDevice):
def owns_interface(self, interface):
bridge_interface_fs = \
"/sys/class/net/%(bridge)s/brif/%(interface)s"
return os.path.exists(
bridge_interface_fs % {'bridge': self.name,
'interface': interface})
bridge_lib.BridgeDevice.owns_interface = owns_interface
if 'get_log_fail_as_error' not in dir(bridge_lib.BridgeDevice):
def get_log_fail_as_error(self):
return self.log_fail_as_error
bridge_lib.BridgeDevice.get_log_fail_as_error = get_log_fail_as_error
if 'exists' not in dir(bridge_lib.BridgeDevice):
def exists(self):
orig_log_fail_as_error = self.get_log_fail_as_error()
self.set_log_fail_as_error(False)
try:
return bool(self.link.address)
except RuntimeError:
return False
finally:
self.set_log_fail_as_error(orig_log_fail_as_error)
bridge_lib.BridgeDevice.exists = exists
if 'disable_ipv6' not in dir(bridge_lib.BridgeDevice):
def disable_ipv6(self):
sysctl_name = re.sub(r'\.', '/', self.name)
cmd = 'net.ipv6.conf.%s.disable_ipv6=1' % sysctl_name
wrapper = ip_lib.IPWrapper(namespace=self.namespace)
try:
wrapper.netns.execute(
['sysctl', '-w', cmd],
run_as_root=True,
log_fail_as_error=self.log_fail_as_error)
except RuntimeError:
return 1
return 0
bridge_lib.BridgeDevice.disable_ipv6 = disable_ipv6