Merge "Remove Cisco FC Zone Manager Driver"
This commit is contained in:
commit
94f76843cf
@ -168,10 +168,6 @@ from cinder.zonemanager.drivers.brocade import brcd_fabric_opts as \
|
||||
cinder_zonemanager_drivers_brocade_brcdfabricopts
|
||||
from cinder.zonemanager.drivers.brocade import brcd_fc_zone_driver as \
|
||||
cinder_zonemanager_drivers_brocade_brcdfczonedriver
|
||||
from cinder.zonemanager.drivers.cisco import cisco_fabric_opts as \
|
||||
cinder_zonemanager_drivers_cisco_ciscofabricopts
|
||||
from cinder.zonemanager.drivers.cisco import cisco_fc_zone_driver as \
|
||||
cinder_zonemanager_drivers_cisco_ciscofczonedriver
|
||||
from cinder.zonemanager import fc_zone_manager as \
|
||||
cinder_zonemanager_fczonemanager
|
||||
|
||||
@ -182,7 +178,6 @@ def list_opts():
|
||||
itertools.chain(
|
||||
cinder_zonemanager_fczonemanager.zone_manager_opts,
|
||||
cinder_zonemanager_drivers_brocade_brcdfczonedriver.brcd_opts,
|
||||
cinder_zonemanager_drivers_cisco_ciscofczonedriver.cisco_opts,
|
||||
)),
|
||||
('KEYMGR',
|
||||
itertools.chain(
|
||||
@ -342,11 +337,6 @@ def list_opts():
|
||||
itertools.chain(
|
||||
cinder_service.profiler_opts,
|
||||
)),
|
||||
('CISCO_FABRIC_EXAMPLE',
|
||||
itertools.chain(
|
||||
cinder_zonemanager_drivers_cisco_ciscofabricopts.
|
||||
cisco_zone_opts,
|
||||
)),
|
||||
('BRCD_FABRIC_EXAMPLE',
|
||||
itertools.chain(
|
||||
cinder_zonemanager_drivers_brocade_brcdfabricopts.
|
||||
|
@ -1,149 +0,0 @@
|
||||
# (c) Copyright 2014 Cisco Systems Inc.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
#
|
||||
|
||||
|
||||
"""Unit tests for Cisco fc san lookup service."""
|
||||
|
||||
import mock
|
||||
from oslo_config import cfg
|
||||
|
||||
from cinder import exception
|
||||
from cinder import test
|
||||
from cinder.volume import configuration as conf
|
||||
import cinder.zonemanager.drivers.cisco.cisco_fc_san_lookup_service \
|
||||
as cisco_lookup
|
||||
import cinder.zonemanager.drivers.cisco.fc_zone_constants as ZoneConstant
|
||||
from cinder.zonemanager import utils as zm_utils
|
||||
|
||||
nsshow = '20:1a:00:05:1e:e8:e3:29'
|
||||
switch_data = ['VSAN 304\n',
|
||||
'------------------------------------------------------\n',
|
||||
'FCID TYPE PWWN (VENDOR) \n',
|
||||
'------------------------------------------------------\n',
|
||||
'0x030001 N 20:1a:00:05:1e:e8:e3:29 (Cisco) ipfc\n',
|
||||
'0x030101 NL 10:00:00:00:77:99:60:2c (Interphase)\n',
|
||||
'0x030200 N 10:00:00:49:c9:28:c7:01\n']
|
||||
|
||||
nsshow_data = ['10:00:8c:7c:ff:52:3b:01', '20:24:00:02:ac:00:0a:50']
|
||||
|
||||
_device_map_to_verify = {
|
||||
'304': {
|
||||
'initiator_port_wwn_list': ['10008c7cff523b01'],
|
||||
'target_port_wwn_list': ['20240002ac000a50']}}
|
||||
|
||||
|
||||
class TestCiscoFCSanLookupService(cisco_lookup.CiscoFCSanLookupService,
|
||||
test.TestCase):
|
||||
|
||||
def setUp(self):
|
||||
super(TestCiscoFCSanLookupService, self).setUp()
|
||||
self.configuration = conf.Configuration(None)
|
||||
self.configuration.set_default('fc_fabric_names', 'CISCO_FAB_2',
|
||||
'fc-zone-manager')
|
||||
self.configuration.fc_fabric_names = 'CISCO_FAB_2'
|
||||
self.create_configuration()
|
||||
self.fabric_vsan = '304'
|
||||
|
||||
# override some of the functions
|
||||
def __init__(self, *args, **kwargs):
|
||||
test.TestCase.__init__(self, *args, **kwargs)
|
||||
|
||||
def create_configuration(self):
|
||||
fc_fabric_opts = []
|
||||
fc_fabric_opts.append(cfg.StrOpt('cisco_fc_fabric_address',
|
||||
default='172.24.173.142', help=''))
|
||||
fc_fabric_opts.append(cfg.StrOpt('cisco_fc_fabric_user',
|
||||
default='admin', help=''))
|
||||
fc_fabric_opts.append(cfg.StrOpt('cisco_fc_fabric_password',
|
||||
default='admin1234', help='',
|
||||
secret=True))
|
||||
fc_fabric_opts.append(cfg.PortOpt('cisco_fc_fabric_port',
|
||||
default=22, help=''))
|
||||
fc_fabric_opts.append(cfg.StrOpt('cisco_zoning_vsan',
|
||||
default='304', help=''))
|
||||
config = conf.Configuration(fc_fabric_opts, 'CISCO_FAB_2')
|
||||
self.fabric_configs = {'CISCO_FAB_2': config}
|
||||
|
||||
@mock.patch.object(cisco_lookup.CiscoFCSanLookupService,
|
||||
'get_nameserver_info')
|
||||
def test_get_device_mapping_from_network(self, get_nameserver_info_mock):
|
||||
initiator_list = ['10008c7cff523b01']
|
||||
target_list = ['20240002ac000a50', '20240002ac000a40']
|
||||
get_nameserver_info_mock.return_value = (nsshow_data)
|
||||
device_map = self.get_device_mapping_from_network(
|
||||
initiator_list, target_list)
|
||||
self.assertDictMatch(_device_map_to_verify, device_map)
|
||||
|
||||
@mock.patch.object(cisco_lookup.CiscoFCSanLookupService,
|
||||
'_get_switch_info')
|
||||
def test_get_nameserver_info(self, get_switch_data_mock):
|
||||
ns_info_list = []
|
||||
ns_info_list_expected = ['20:1a:00:05:1e:e8:e3:29',
|
||||
'10:00:00:49:c9:28:c7:01']
|
||||
get_switch_data_mock.return_value = (switch_data)
|
||||
ns_info_list = self.get_nameserver_info('304')
|
||||
self.assertEqual(ns_info_list_expected, ns_info_list)
|
||||
|
||||
def test_parse_ns_output(self):
|
||||
invalid_switch_data = [' N 011a00;20:1a:00:05:1e:e8:e3:29']
|
||||
return_wwn_list = []
|
||||
expected_wwn_list = ['20:1a:00:05:1e:e8:e3:29',
|
||||
'10:00:00:49:c9:28:c7:01']
|
||||
return_wwn_list = self._parse_ns_output(switch_data)
|
||||
self.assertEqual(expected_wwn_list, return_wwn_list)
|
||||
self.assertRaises(exception.InvalidParameterValue,
|
||||
self._parse_ns_output, invalid_switch_data)
|
||||
|
||||
def test_get_formatted_wwn(self):
|
||||
wwn_list = ['10008c7cff523b01']
|
||||
return_wwn_list = []
|
||||
expected_wwn_list = ['10:00:8c:7c:ff:52:3b:01']
|
||||
return_wwn_list.append(zm_utils.get_formatted_wwn(wwn_list[0]))
|
||||
self.assertEqual(expected_wwn_list, return_wwn_list)
|
||||
|
||||
@mock.patch.object(cisco_lookup.CiscoFCSanLookupService,
|
||||
'_run_ssh')
|
||||
def test__get_switch_info(self, run_ssh_mock):
|
||||
cmd_list = [ZoneConstant.FCNS_SHOW, self.fabric_vsan,
|
||||
' | no-more']
|
||||
nsshow_list = [nsshow]
|
||||
run_ssh_mock.return_value = (Stream(nsshow), Stream())
|
||||
switch_data = self._get_switch_info(cmd_list)
|
||||
self.assertEqual(nsshow_list, switch_data)
|
||||
run_ssh_mock.assert_called_once_with(cmd_list, True, 1)
|
||||
|
||||
|
||||
class Channel(object):
|
||||
def recv_exit_status(self):
|
||||
return 0
|
||||
|
||||
|
||||
class Stream(object):
|
||||
def __init__(self, buffer=''):
|
||||
self.buffer = buffer
|
||||
self.channel = Channel()
|
||||
|
||||
def readlines(self):
|
||||
return self.buffer
|
||||
|
||||
def splitlines(self):
|
||||
return self.buffer.splitlines()
|
||||
|
||||
def close(self):
|
||||
pass
|
||||
|
||||
def flush(self):
|
||||
self.buffer = ''
|
@ -1,303 +0,0 @@
|
||||
# (c) Copyright 2014 Cisco Systems Inc.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
#
|
||||
|
||||
|
||||
"""Unit tests for Cisco fc zone client cli."""
|
||||
|
||||
import time
|
||||
|
||||
import mock
|
||||
from oslo_concurrency import processutils
|
||||
from six.moves import range
|
||||
|
||||
from cinder import exception
|
||||
from cinder import test
|
||||
from cinder.zonemanager.drivers.cisco \
|
||||
import cisco_fc_zone_client_cli as cli
|
||||
import cinder.zonemanager.drivers.cisco.fc_zone_constants as ZoneConstant
|
||||
|
||||
nsshow = '20:1a:00:05:1e:e8:e3:29'
|
||||
switch_data = ['VSAN 303\n',
|
||||
'----------------------------------------------------------\n',
|
||||
'FCID TYPE PWWN (VENDOR) FC4-TYPE:FEATURE\n',
|
||||
'----------------------------------------------------------\n',
|
||||
'0x030001 N 20:1a:00:05:1e:e8:e3:29 (Cisco) ipfc\n',
|
||||
'0x030101 NL 10:00:00:00:77:99:60:2c (Interphase)\n',
|
||||
'0x030200 NL 10:00:00:49:c9:28:c7:01\n']
|
||||
|
||||
cfgactv = ['zoneset name OpenStack_Cfg vsan 303\n',
|
||||
'zone name openstack50060b0000c26604201900051ee8e329 vsan 303\n',
|
||||
'pwwn 50:06:0b:00:00:c2:66:04\n',
|
||||
'pwwn 20:19:00:05:1e:e8:e3:29\n']
|
||||
|
||||
active_zoneset = {
|
||||
'zones': {
|
||||
'openstack50060b0000c26604201900051ee8e329':
|
||||
['50:06:0b:00:00:c2:66:04', '20:19:00:05:1e:e8:e3:29']},
|
||||
'active_zone_config': 'OpenStack_Cfg'}
|
||||
|
||||
zoning_status_data_basic = [
|
||||
'VSAN: 303 default-zone: deny distribute: active only Interop: default\n',
|
||||
' mode: basic merge-control: allow\n',
|
||||
' session: none\n',
|
||||
' hard-zoning: enabled broadcast: unsupported\n',
|
||||
' smart-zoning: disabled\n',
|
||||
' rscn-format: fabric-address\n',
|
||||
'Default zone:\n',
|
||||
' qos: none broadcast: unsupported ronly: unsupported\n',
|
||||
'Full Zoning Database :\n',
|
||||
' DB size: 220 bytes\n',
|
||||
' Zonesets:2 Zones:2 Aliases: 0\n',
|
||||
'Active Zoning Database :\n',
|
||||
' DB size: 80 bytes\n',
|
||||
' Name: test-zs-test Zonesets:1 Zones:1\n',
|
||||
'Status:\n']
|
||||
|
||||
zoning_status_basic = {'mode': 'basic', 'session': 'none'}
|
||||
|
||||
zoning_status_data_enhanced_nosess = [
|
||||
'VSAN: 303 default-zone: deny distribute: active only Interop: default\n',
|
||||
' mode: enhanced merge-control: allow\n',
|
||||
' session: none\n',
|
||||
' hard-zoning: enabled broadcast: unsupported\n',
|
||||
' smart-zoning: disabled\n',
|
||||
' rscn-format: fabric-address\n',
|
||||
'Default zone:\n',
|
||||
' qos: none broadcast: unsupported ronly: unsupported\n',
|
||||
'Full Zoning Database :\n',
|
||||
' DB size: 220 bytes\n',
|
||||
' Zonesets:2 Zones:2 Aliases: 0\n',
|
||||
'Active Zoning Database :\n',
|
||||
' DB size: 80 bytes\n',
|
||||
' Name: test-zs-test Zonesets:1 Zones:1\n',
|
||||
'Status:\n']
|
||||
|
||||
zoning_status_enhanced_nosess = {'mode': 'enhanced', 'session': 'none'}
|
||||
|
||||
zoning_status_data_enhanced_sess = [
|
||||
'VSAN: 303 default-zone: deny distribute: active only Interop: default\n',
|
||||
' mode: enhanced merge-control: allow\n',
|
||||
' session: otherthannone\n',
|
||||
' hard-zoning: enabled broadcast: unsupported\n',
|
||||
' smart-zoning: disabled\n',
|
||||
' rscn-format: fabric-address\n',
|
||||
'Default zone:\n',
|
||||
' qos: none broadcast: unsupported ronly: unsupported\n',
|
||||
'Full Zoning Database :\n',
|
||||
' DB size: 220 bytes\n',
|
||||
' Zonesets:2 Zones:2 Aliases: 0\n',
|
||||
'Active Zoning Database :\n',
|
||||
' DB size: 80 bytes\n',
|
||||
' Name: test-zs-test Zonesets:1 Zones:1\n',
|
||||
'Status:\n']
|
||||
|
||||
zoning_status_enhanced_sess = {'mode': 'enhanced', 'session': 'otherthannone'}
|
||||
|
||||
active_zoneset_multiple_zones = {
|
||||
'zones': {
|
||||
'openstack50060b0000c26604201900051ee8e329':
|
||||
['50:06:0b:00:00:c2:66:04', '20:19:00:05:1e:e8:e3:29'],
|
||||
'openstack10000012345678902001009876543210':
|
||||
['50:06:0b:00:00:c2:66:02', '20:19:00:05:1e:e8:e3:27']},
|
||||
'active_zone_config': 'OpenStack_Cfg'}
|
||||
|
||||
new_zone = {'openstack10000012345678902001009876543210':
|
||||
['10:00:00:12:34:56:78:90', '20:01:00:98:76:54:32:10']}
|
||||
|
||||
new_zones = {'openstack10000012345678902001009876543210':
|
||||
['10:00:00:12:34:56:78:90', '20:01:00:98:76:54:32:10'],
|
||||
'openstack10000011111111112001001111111111':
|
||||
['10:00:00:11:11:11:11:11', '20:01:00:11:11:11:11:11']}
|
||||
|
||||
zone_names_to_delete = 'openstack50060b0000c26604201900051ee8e329'
|
||||
|
||||
|
||||
class TestCiscoFCZoneClientCLI(cli.CiscoFCZoneClientCLI, test.TestCase):
|
||||
|
||||
def setUp(self):
|
||||
super(TestCiscoFCZoneClientCLI, self).setUp()
|
||||
self.fabric_vsan = '303'
|
||||
|
||||
# override some of the functions
|
||||
def __init__(self, *args, **kwargs):
|
||||
test.TestCase.__init__(self, *args, **kwargs)
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_get_switch_info')
|
||||
def test_get_active_zone_set(self, get_switch_info_mock):
|
||||
cmd_list = [ZoneConstant.GET_ACTIVE_ZONE_CFG, self.fabric_vsan,
|
||||
' | no-more']
|
||||
get_switch_info_mock.return_value = cfgactv
|
||||
active_zoneset_returned = self.get_active_zone_set()
|
||||
get_switch_info_mock.assert_called_once_with(cmd_list)
|
||||
self.assertDictMatch(active_zoneset, active_zoneset_returned)
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
|
||||
def test_get_active_zone_set_ssh_error(self, run_ssh_mock):
|
||||
run_ssh_mock.side_effect = processutils.ProcessExecutionError
|
||||
self.assertRaises(exception.CiscoZoningCliException,
|
||||
self.get_active_zone_set)
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_get_switch_info')
|
||||
def test_get_zoning_status_basic(self, get_zoning_status_mock):
|
||||
cmd_list = [ZoneConstant.GET_ZONE_STATUS, self.fabric_vsan]
|
||||
get_zoning_status_mock.return_value = zoning_status_data_basic
|
||||
zoning_status_returned = self.get_zoning_status()
|
||||
get_zoning_status_mock.assert_called_once_with(cmd_list)
|
||||
self.assertDictMatch(zoning_status_basic, zoning_status_returned)
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_get_switch_info')
|
||||
def test_get_zoning_status_enhanced_nosess(self, get_zoning_status_mock):
|
||||
cmd_list = [ZoneConstant.GET_ZONE_STATUS, self.fabric_vsan]
|
||||
get_zoning_status_mock.return_value =\
|
||||
zoning_status_data_enhanced_nosess
|
||||
zoning_status_returned = self.get_zoning_status()
|
||||
get_zoning_status_mock.assert_called_once_with(cmd_list)
|
||||
self.assertDictMatch(zoning_status_enhanced_nosess,
|
||||
zoning_status_returned)
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_get_switch_info')
|
||||
def test_get_zoning_status_enhanced_sess(self, get_zoning_status_mock):
|
||||
cmd_list = [ZoneConstant.GET_ZONE_STATUS, self.fabric_vsan]
|
||||
get_zoning_status_mock.return_value = zoning_status_data_enhanced_sess
|
||||
zoning_status_returned = self.get_zoning_status()
|
||||
get_zoning_status_mock.assert_called_once_with(cmd_list)
|
||||
self.assertDictMatch(zoning_status_enhanced_sess,
|
||||
zoning_status_returned)
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_get_switch_info')
|
||||
def test_get_nameserver_info(self, get_switch_info_mock):
|
||||
ns_info_list = []
|
||||
ns_info_list_expected = ['20:1a:00:05:1e:e8:e3:29']
|
||||
get_switch_info_mock.return_value = (switch_data)
|
||||
ns_info_list = self.get_nameserver_info()
|
||||
self.assertEqual(ns_info_list_expected, ns_info_list)
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
|
||||
def test_get_nameserver_info_ssh_error(self, run_ssh_mock):
|
||||
run_ssh_mock.side_effect = processutils.ProcessExecutionError
|
||||
self.assertRaises(exception.CiscoZoningCliException,
|
||||
self.get_nameserver_info)
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
|
||||
def test__cfg_save(self, run_ssh_mock):
|
||||
cmd_list = ['copy', 'running-config', 'startup-config']
|
||||
self._cfg_save()
|
||||
run_ssh_mock.assert_called_once_with(cmd_list, True)
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
|
||||
@mock.patch.object(time, 'sleep')
|
||||
def test__cfg_save_with_retry(self, mock_sleep, run_ssh_mock):
|
||||
cmd_list = ['copy', 'running-config', 'startup-config']
|
||||
run_ssh_mock.side_effect = [
|
||||
processutils.ProcessExecutionError,
|
||||
('', None)
|
||||
]
|
||||
|
||||
self._cfg_save()
|
||||
|
||||
self.assertEqual(2, run_ssh_mock.call_count)
|
||||
run_ssh_mock.assert_has_calls([
|
||||
mock.call(cmd_list, True),
|
||||
mock.call(cmd_list, True)
|
||||
])
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
|
||||
@mock.patch.object(time, 'sleep')
|
||||
def test__cfg_save_with_error(self, mock_sleep, run_ssh_mock):
|
||||
cmd_list = ['copy', 'running-config', 'startup-config']
|
||||
run_ssh_mock.side_effect = processutils.ProcessExecutionError
|
||||
|
||||
self.assertRaises(processutils.ProcessExecutionError, self._cfg_save)
|
||||
|
||||
expected_num_calls = 5
|
||||
expected_calls = []
|
||||
for i in range(expected_num_calls):
|
||||
expected_calls.append(mock.call(cmd_list, True))
|
||||
|
||||
self.assertEqual(expected_num_calls, run_ssh_mock.call_count)
|
||||
run_ssh_mock.assert_has_calls(expected_calls)
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
|
||||
def test__get_switch_info(self, run_ssh_mock):
|
||||
cmd_list = [ZoneConstant.FCNS_SHOW, self.fabric_vsan]
|
||||
nsshow_list = [nsshow]
|
||||
run_ssh_mock.return_value = (Stream(nsshow), Stream())
|
||||
switch_data = self._get_switch_info(cmd_list)
|
||||
self.assertEqual(nsshow_list, switch_data)
|
||||
run_ssh_mock.assert_called_once_with(cmd_list, True)
|
||||
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_ssh_execute')
|
||||
@mock.patch.object(cli.CiscoFCZoneClientCLI, '_cfg_save')
|
||||
def test__add_zones_with_update(self, ssh_execute_mock, cfg_save_mock):
|
||||
self.add_zones(new_zone, False, self.fabric_vsan,
|
||||
active_zoneset_multiple_zones,
|
||||
zoning_status_basic)
|
||||
self.assertEqual(2, ssh_execute_mock.call_count)
|
||||
self.assertEqual(2, cfg_save_mock.call_count)
|
||||
|
||||
def test__parse_ns_output(self):
|
||||
return_wwn_list = []
|
||||
expected_wwn_list = ['20:1a:00:05:1e:e8:e3:29']
|
||||
return_wwn_list = self._parse_ns_output(switch_data)
|
||||
self.assertEqual(expected_wwn_list, return_wwn_list)
|
||||
|
||||
|
||||
class TestCiscoFCZoneClientCLISSH(test.TestCase):
|
||||
|
||||
def setUp(self):
|
||||
super(TestCiscoFCZoneClientCLISSH, self).setUp()
|
||||
self.client = cli.CiscoFCZoneClientCLI(None, None, None, None, None)
|
||||
self.client.sshpool = mock.MagicMock()
|
||||
self.mock_ssh = self.client.sshpool.item().__enter__()
|
||||
|
||||
@mock.patch('oslo_concurrency.processutils.ssh_execute')
|
||||
def test__run_ssh(self, mock_execute):
|
||||
mock_execute.return_value = 'ssh output'
|
||||
ret = self.client._run_ssh(['cat', 'foo'])
|
||||
self.assertEqual('ssh output', ret)
|
||||
mock_execute.assert_called_once_with(self.mock_ssh,
|
||||
'cat foo',
|
||||
check_exit_code=True)
|
||||
|
||||
@mock.patch('oslo_concurrency.processutils.ssh_execute')
|
||||
def test__run_ssh_with_error(self, mock_execute):
|
||||
mock_execute.side_effect = processutils.ProcessExecutionError()
|
||||
self.assertRaises(processutils.ProcessExecutionError,
|
||||
self.client._run_ssh,
|
||||
['cat', 'foo'])
|
||||
|
||||
|
||||
class Channel(object):
|
||||
def recv_exit_status(self):
|
||||
return 0
|
||||
|
||||
|
||||
class Stream(object):
|
||||
def __init__(self, buffer=''):
|
||||
self.buffer = buffer
|
||||
self.channel = Channel()
|
||||
|
||||
def readlines(self):
|
||||
return self.buffer
|
||||
|
||||
def splitlines(self):
|
||||
return self.buffer.splitlines()
|
||||
|
||||
def close(self):
|
||||
pass
|
||||
|
||||
def flush(self):
|
||||
self.buffer = ''
|
@ -1,208 +0,0 @@
|
||||
# (c) Copyright 2014 Cisco Systems Inc.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
#
|
||||
|
||||
|
||||
"""Unit tests for Cisco FC zone driver."""
|
||||
|
||||
from oslo_concurrency import processutils
|
||||
from oslo_config import cfg
|
||||
from oslo_utils import importutils
|
||||
|
||||
from cinder import exception
|
||||
from cinder import test
|
||||
from cinder.volume import configuration as conf
|
||||
|
||||
_active_cfg_before_add = {}
|
||||
_active_cfg_before_delete = {
|
||||
'zones': {
|
||||
'openstack10008c7cff523b0120240002ac000a50': (
|
||||
['10:00:8c:7c:ff:52:3b:01',
|
||||
'20:24:00:02:ac:00:0a:50'])},
|
||||
'active_zone_config': 'cfg1'}
|
||||
_activate = True
|
||||
_zone_name = 'openstack10008c7cff523b0120240002ac000a50'
|
||||
_target_ns_map = {'100000051e55a100': ['20240002ac000a50']}
|
||||
_zoning_status = {'mode': 'basis', 'session': 'none'}
|
||||
_initiator_ns_map = {'100000051e55a100': ['10008c7cff523b01']}
|
||||
_zone_map_to_add = {'openstack10008c7cff523b0120240002ac000a50': (
|
||||
['10:00:8c:7c:ff:52:3b:01', '20:24:00:02:ac:00:0a:50'])}
|
||||
|
||||
_initiator_target_map = {'10008c7cff523b01': ['20240002ac000a50']}
|
||||
_device_map_to_verify = {
|
||||
'304': {
|
||||
'initiator_port_wwn_list': [
|
||||
'10008c7cff523b01'], 'target_port_wwn_list': ['20240002ac000a50']}}
|
||||
_fabric_wwn = '304'
|
||||
|
||||
|
||||
class CiscoFcZoneDriverBaseTest(object):
|
||||
|
||||
def setup_config(self, is_normal, mode):
|
||||
fc_test_opts = [
|
||||
cfg.StrOpt('fc_fabric_address_CISCO_FAB_1', default='10.24.48.213',
|
||||
help='FC Fabric names'),
|
||||
]
|
||||
configuration = conf.Configuration(fc_test_opts)
|
||||
# fill up config
|
||||
configuration.zoning_mode = 'fabric'
|
||||
configuration.zone_driver = ('cinder.tests.unit.zonemanager.'
|
||||
'test_cisco_fc_zone_driver.'
|
||||
'FakeCiscoFCZoneDriver')
|
||||
configuration.cisco_sb_connector = ('cinder.tests.unit.zonemanager.'
|
||||
'test_cisco_fc_zone_driver'
|
||||
'.FakeCiscoFCZoneClientCLI')
|
||||
configuration.zoning_policy = 'initiator-target'
|
||||
configuration.zone_activate = True
|
||||
configuration.zone_name_prefix = 'openstack'
|
||||
configuration.fc_san_lookup_service = ('cinder.tests.unit.zonemanager.'
|
||||
'test_cisco_fc_zone_driver.'
|
||||
'FakeCiscoFCSanLookupService')
|
||||
|
||||
configuration.fc_fabric_names = 'CISCO_FAB_1'
|
||||
configuration.fc_fabric_address_CISCO_FAB_1 = '172.21.60.220'
|
||||
if (is_normal):
|
||||
configuration.fc_fabric_user_CISCO_FAB_1 = 'admin'
|
||||
else:
|
||||
configuration.fc_fabric_user_CISCO_FAB_1 = 'invaliduser'
|
||||
configuration.fc_fabric_password_CISCO_FAB_1 = 'admin1234'
|
||||
|
||||
if (mode == 1):
|
||||
configuration.zoning_policy_CISCO_FAB_1 = 'initiator-target'
|
||||
elif (mode == 2):
|
||||
configuration.zoning_policy_CISCO_FAB_1 = 'initiator'
|
||||
else:
|
||||
configuration.zoning_policy_CISCO_FAB_1 = 'initiator-target'
|
||||
configuration.zone_activate_CISCO_FAB_1 = True
|
||||
configuration.zone_name_prefix_CISCO_FAB_1 = 'openstack'
|
||||
configuration.zoning_vsan_CISCO_FAB_1 = '304'
|
||||
return configuration
|
||||
|
||||
|
||||
class TestCiscoFcZoneDriver(CiscoFcZoneDriverBaseTest, test.TestCase):
|
||||
|
||||
def setUp(self):
|
||||
super(TestCiscoFcZoneDriver, self).setUp()
|
||||
# setup config for normal flow
|
||||
self.setup_driver(self.setup_config(True, 1))
|
||||
GlobalVars._zone_state = []
|
||||
|
||||
def setup_driver(self, config):
|
||||
self.driver = importutils.import_object(
|
||||
'cinder.zonemanager.drivers.cisco.cisco_fc_zone_driver'
|
||||
'.CiscoFCZoneDriver', configuration=config)
|
||||
|
||||
def fake_get_active_zone_set(self, fabric_ip, fabric_user, fabric_pwd,
|
||||
zoning_vsan):
|
||||
return GlobalVars._active_cfg
|
||||
|
||||
def fake_get_san_context(self, target_wwn_list):
|
||||
fabric_map = {}
|
||||
return fabric_map
|
||||
|
||||
def test_delete_connection(self):
|
||||
GlobalVars._is_normal_test = True
|
||||
GlobalVars._active_cfg = _active_cfg_before_delete
|
||||
self.driver.delete_connection(
|
||||
'CISCO_FAB_1', _initiator_target_map)
|
||||
self.assertFalse(_zone_name in GlobalVars._zone_state)
|
||||
|
||||
def test_delete_connection_for_initiator_mode(self):
|
||||
GlobalVars._is_normal_test = True
|
||||
GlobalVars._active_cfg = _active_cfg_before_delete
|
||||
self.setup_driver(self.setup_config(True, 2))
|
||||
self.driver.delete_connection(
|
||||
'CISCO_FAB_1', _initiator_target_map)
|
||||
self.assertFalse(_zone_name in GlobalVars._zone_state)
|
||||
|
||||
def test_add_connection_for_invalid_fabric(self):
|
||||
"""Test abnormal flows."""
|
||||
GlobalVars._is_normal_test = True
|
||||
GlobalVars._active_cfg = _active_cfg_before_add
|
||||
GlobalVars._is_normal_test = False
|
||||
self.setup_driver(self.setup_config(False, 1))
|
||||
self.assertRaises(exception.FCZoneDriverException,
|
||||
self.driver.add_connection,
|
||||
'CISCO_FAB_1',
|
||||
_initiator_target_map)
|
||||
|
||||
def test_delete_connection_for_invalid_fabric(self):
|
||||
GlobalVars._active_cfg = _active_cfg_before_delete
|
||||
GlobalVars._is_normal_test = False
|
||||
self.setup_driver(self.setup_config(False, 1))
|
||||
self.assertRaises(exception.FCZoneDriverException,
|
||||
self.driver.delete_connection,
|
||||
'CISCO_FAB_1',
|
||||
_initiator_target_map)
|
||||
|
||||
|
||||
class FakeCiscoFCZoneClientCLI(object):
|
||||
def __init__(self, ipaddress, username, password, port, vsan):
|
||||
if not GlobalVars._is_normal_test:
|
||||
raise processutils.ProcessExecutionError(
|
||||
"Unable to connect to fabric")
|
||||
|
||||
def get_active_zone_set(self):
|
||||
return GlobalVars._active_cfg
|
||||
|
||||
def add_zones(self, zones, isActivate):
|
||||
GlobalVars._zone_state.extend(zones.keys())
|
||||
|
||||
def delete_zones(self, zone_names, isActivate):
|
||||
zone_list = zone_names.split(';')
|
||||
GlobalVars._zone_state = [
|
||||
x for x in GlobalVars._zone_state if x not in zone_list]
|
||||
|
||||
def get_nameserver_info(self):
|
||||
return _target_ns_map
|
||||
|
||||
def get_zoning_status(self):
|
||||
return _zoning_status
|
||||
|
||||
def close_connection(self):
|
||||
pass
|
||||
|
||||
def cleanup(self):
|
||||
pass
|
||||
|
||||
|
||||
class FakeCiscoFCSanLookupService(object):
|
||||
def get_device_mapping_from_network(self,
|
||||
initiator_wwn_list,
|
||||
target_wwn_list):
|
||||
device_map = {}
|
||||
initiators = []
|
||||
targets = []
|
||||
for i in initiator_wwn_list:
|
||||
if (i in _initiator_ns_map[_fabric_wwn]):
|
||||
initiators.append(i)
|
||||
for t in target_wwn_list:
|
||||
if (t in _target_ns_map[_fabric_wwn]):
|
||||
targets.append(t)
|
||||
device_map[_fabric_wwn] = {
|
||||
'initiator_port_wwn_list': initiators,
|
||||
'target_port_wwn_list': targets}
|
||||
return device_map
|
||||
|
||||
|
||||
class GlobalVars(object):
|
||||
global _active_cfg
|
||||
_active_cfg = {}
|
||||
global _zone_state
|
||||
_zone_state = list()
|
||||
global _is_normal_test
|
||||
_is_normal_test = True
|
||||
global _zoning_status
|
||||
_zoning_status = {}
|
@ -1,96 +0,0 @@
|
||||
# (c) Copyright 2014 Cisco Systems Inc.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
#
|
||||
|
||||
|
||||
"""Unit tests for Cisco FC san lookup service."""
|
||||
|
||||
from cinder import exception
|
||||
from cinder import test
|
||||
from cinder.volume import configuration as conf
|
||||
from cinder.zonemanager import fc_san_lookup_service as san_service
|
||||
|
||||
_target_ns_map = {'100000051e55a100': ['20240002ac000a50']}
|
||||
_initiator_ns_map = {'100000051e55a100': ['10008c7cff523b01']}
|
||||
_device_map_to_verify = {
|
||||
'100000051e55a100': {
|
||||
'initiator_port_wwn_list': [
|
||||
'10008c7cff523b01'], 'target_port_wwn_list': ['20240002ac000a50']}}
|
||||
_fabric_wwn = '100000051e55a100'
|
||||
|
||||
|
||||
class TestFCSanLookupService(san_service.FCSanLookupService, test.TestCase):
|
||||
|
||||
def setUp(self):
|
||||
super(TestFCSanLookupService, self).setUp()
|
||||
self.configuration = self.setup_config()
|
||||
|
||||
# override some of the functions
|
||||
def __init__(self, *args, **kwargs):
|
||||
test.TestCase.__init__(self, *args, **kwargs)
|
||||
|
||||
def setup_config(self):
|
||||
configuration = conf.Configuration(None)
|
||||
# fill up config
|
||||
configuration.fc_san_lookup_service = ('cinder.tests.unit.zonemanager'
|
||||
'.test_cisco_lookup_service'
|
||||
'.FakeCiscoFCSanLookupService')
|
||||
return configuration
|
||||
|
||||
def test_get_device_mapping_from_network(self):
|
||||
GlobalParams._is_normal_test = True
|
||||
initiator_list = ['10008c7cff523b01']
|
||||
target_list = ['20240002ac000a50', '20240002ac000a40']
|
||||
device_map = self.get_device_mapping_from_network(
|
||||
initiator_list, target_list)
|
||||
self.assertDictMatch(_device_map_to_verify, device_map)
|
||||
|
||||
def test_get_device_mapping_from_network_for_invalid_config(self):
|
||||
GlobalParams._is_normal_test = False
|
||||
initiator_list = ['10008c7cff523b01']
|
||||
target_list = ['20240002ac000a50', '20240002ac000a40']
|
||||
self.assertRaises(exception.FCSanLookupServiceException,
|
||||
self.get_device_mapping_from_network,
|
||||
initiator_list, target_list)
|
||||
|
||||
|
||||
class FakeCiscoFCSanLookupService(object):
|
||||
|
||||
def __init__(self, **kwargs):
|
||||
pass
|
||||
|
||||
def get_device_mapping_from_network(self,
|
||||
initiator_wwn_list,
|
||||
target_wwn_list):
|
||||
if not GlobalParams._is_normal_test:
|
||||
raise exception.FCSanLookupServiceException("Error")
|
||||
device_map = {}
|
||||
initiators = []
|
||||
targets = []
|
||||
for i in initiator_wwn_list:
|
||||
if (i in _initiator_ns_map[_fabric_wwn]):
|
||||
initiators.append(i)
|
||||
for t in target_wwn_list:
|
||||
if (t in _target_ns_map[_fabric_wwn]):
|
||||
targets.append(t)
|
||||
device_map[_fabric_wwn] = {
|
||||
'initiator_port_wwn_list': initiators,
|
||||
'target_port_wwn_list': targets}
|
||||
return device_map
|
||||
|
||||
|
||||
class GlobalParams(object):
|
||||
global _is_normal_test
|
||||
_is_normal_test = True
|
@ -1,56 +0,0 @@
|
||||
# (c) Copyright 2014 Cisco Systems Inc.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
#
|
||||
from oslo_config import cfg
|
||||
|
||||
from cinder.volume import configuration
|
||||
|
||||
cisco_zone_opts = [
|
||||
cfg.StrOpt('cisco_fc_fabric_address',
|
||||
default='',
|
||||
help='Management IP of fabric'),
|
||||
cfg.StrOpt('cisco_fc_fabric_user',
|
||||
default='',
|
||||
help='Fabric user ID'),
|
||||
cfg.StrOpt('cisco_fc_fabric_password',
|
||||
default='',
|
||||
help='Password for user',
|
||||
secret=True),
|
||||
cfg.PortOpt('cisco_fc_fabric_port',
|
||||
default=22,
|
||||
help='Connecting port'),
|
||||
cfg.StrOpt('cisco_zoning_policy',
|
||||
default='initiator-target',
|
||||
help='overridden zoning policy'),
|
||||
cfg.BoolOpt('cisco_zone_activate',
|
||||
default=True,
|
||||
help='overridden zoning activation state'),
|
||||
cfg.StrOpt('cisco_zone_name_prefix',
|
||||
help='overridden zone name prefix'),
|
||||
cfg.StrOpt('cisco_zoning_vsan',
|
||||
help='VSAN of the Fabric'),
|
||||
]
|
||||
|
||||
CONF = cfg.CONF
|
||||
CONF.register_opts(cisco_zone_opts, group='CISCO_FABRIC_EXAMPLE')
|
||||
|
||||
|
||||
def load_fabric_configurations(fabric_names):
|
||||
fabric_configs = {}
|
||||
for fabric_name in fabric_names:
|
||||
config = configuration.Configuration(cisco_zone_opts, fabric_name)
|
||||
fabric_configs[fabric_name] = config
|
||||
|
||||
return fabric_configs
|
@ -1,355 +0,0 @@
|
||||
# (c) Copyright 2014 Cisco Systems Inc.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
#
|
||||
|
||||
|
||||
import random
|
||||
|
||||
from eventlet import greenthread
|
||||
from oslo_concurrency import processutils
|
||||
from oslo_log import log as logging
|
||||
from oslo_utils import excutils
|
||||
import six
|
||||
|
||||
from cinder import exception
|
||||
from cinder.i18n import _, _LE
|
||||
from cinder import ssh_utils
|
||||
from cinder import utils
|
||||
from cinder.zonemanager.drivers.cisco import cisco_fabric_opts as fabric_opts
|
||||
import cinder.zonemanager.drivers.cisco.fc_zone_constants as zone_constant
|
||||
from cinder.zonemanager import fc_san_lookup_service as fc_service
|
||||
from cinder.zonemanager import utils as zm_utils
|
||||
|
||||
LOG = logging.getLogger(__name__)
|
||||
|
||||
|
||||
class CiscoFCSanLookupService(fc_service.FCSanLookupService):
|
||||
"""The SAN lookup service that talks to Cisco switches.
|
||||
|
||||
Version History:
|
||||
1.0.0 - Initial version
|
||||
|
||||
"""
|
||||
|
||||
VERSION = "1.0.0"
|
||||
|
||||
def __init__(self, **kwargs):
|
||||
"""Initializing the client."""
|
||||
super(CiscoFCSanLookupService, self).__init__(**kwargs)
|
||||
self.configuration = kwargs.get('configuration', None)
|
||||
self.create_configuration()
|
||||
|
||||
self.switch_user = ""
|
||||
self.switch_port = ""
|
||||
self.switch_pwd = ""
|
||||
self.switch_ip = ""
|
||||
self.sshpool = None
|
||||
|
||||
def create_configuration(self):
|
||||
"""Configuration specific to SAN context values."""
|
||||
config = self.configuration
|
||||
|
||||
fabric_names = [x.strip() for x in config.fc_fabric_names.split(',')]
|
||||
LOG.debug('Fabric Names: %s', fabric_names)
|
||||
|
||||
# There can be more than one SAN in the network and we need to
|
||||
# get credentials for each for SAN context lookup later.
|
||||
# Cisco Zonesets require VSANs
|
||||
if fabric_names:
|
||||
self.fabric_configs = fabric_opts.load_fabric_configurations(
|
||||
fabric_names)
|
||||
|
||||
def get_device_mapping_from_network(self,
|
||||
initiator_wwn_list,
|
||||
target_wwn_list):
|
||||
"""Provides the initiator/target map for available SAN contexts.
|
||||
|
||||
Looks up fcns database of each fc SAN configured to find logged in
|
||||
devices and returns a map of initiator and target port WWNs for each
|
||||
fabric.
|
||||
|
||||
:param initiator_wwn_list: List of initiator port WWN
|
||||
:param target_wwn_list: List of target port WWN
|
||||
:returns: List -- device wwn map in following format
|
||||
{
|
||||
<San name>: {
|
||||
'initiator_port_wwn_list':
|
||||
('200000051e55a100', '200000051e55a121'..)
|
||||
'target_port_wwn_list':
|
||||
('100000051e55a100', '100000051e55a121'..)
|
||||
}
|
||||
}
|
||||
:raises: Exception when connection to fabric is failed
|
||||
"""
|
||||
device_map = {}
|
||||
formatted_target_list = []
|
||||
formatted_initiator_list = []
|
||||
fabric_map = {}
|
||||
fabric_names = self.configuration.fc_fabric_names
|
||||
|
||||
if not fabric_names:
|
||||
raise exception.InvalidParameterValue(
|
||||
err=_("Missing Fibre Channel SAN configuration "
|
||||
"param - fc_fabric_names"))
|
||||
|
||||
fabrics = [x.strip() for x in fabric_names.split(',')]
|
||||
|
||||
LOG.debug("FC Fabric List: %s", fabrics)
|
||||
if fabrics:
|
||||
for t in target_wwn_list:
|
||||
formatted_target_list.append(zm_utils.get_formatted_wwn(t))
|
||||
|
||||
for i in initiator_wwn_list:
|
||||
formatted_initiator_list.append(zm_utils.get_formatted_wwn(i))
|
||||
|
||||
for fabric_name in fabrics:
|
||||
self.switch_ip = self.fabric_configs[fabric_name].safe_get(
|
||||
'cisco_fc_fabric_address')
|
||||
self.switch_user = self.fabric_configs[fabric_name].safe_get(
|
||||
'cisco_fc_fabric_user')
|
||||
self.switch_pwd = self.fabric_configs[fabric_name].safe_get(
|
||||
'cisco_fc_fabric_password')
|
||||
self.switch_port = self.fabric_configs[fabric_name].safe_get(
|
||||
'cisco_fc_fabric_port')
|
||||
zoning_vsan = self.fabric_configs[fabric_name].safe_get(
|
||||
'cisco_zoning_vsan')
|
||||
|
||||
# Get name server data from fabric and find the targets
|
||||
# logged in
|
||||
nsinfo = ''
|
||||
LOG.debug("show fcns database for vsan %s", zoning_vsan)
|
||||
nsinfo = self.get_nameserver_info(zoning_vsan)
|
||||
|
||||
LOG.debug("Lookup service:fcnsdatabase-%s", nsinfo)
|
||||
LOG.debug("Lookup service:initiator list from caller-%s",
|
||||
formatted_initiator_list)
|
||||
LOG.debug("Lookup service:target list from caller-%s",
|
||||
formatted_target_list)
|
||||
visible_targets = [x for x in nsinfo
|
||||
if x in formatted_target_list]
|
||||
visible_initiators = [x for x in nsinfo
|
||||
if x in formatted_initiator_list]
|
||||
|
||||
if visible_targets:
|
||||
LOG.debug("Filtered targets is: %s", visible_targets)
|
||||
# getting rid of the : before returning
|
||||
for idx, elem in enumerate(visible_targets):
|
||||
elem = str(elem).replace(':', '')
|
||||
visible_targets[idx] = elem
|
||||
else:
|
||||
LOG.debug("No targets are in the fcns database"
|
||||
" for vsan %s", zoning_vsan)
|
||||
|
||||
if visible_initiators:
|
||||
# getting rid of the : before returning ~sk
|
||||
for idx, elem in enumerate(visible_initiators):
|
||||
elem = str(elem).replace(':', '')
|
||||
visible_initiators[idx] = elem
|
||||
else:
|
||||
LOG.debug("No initiators are in the fcns database"
|
||||
" for vsan %s", zoning_vsan)
|
||||
|
||||
fabric_map = {'initiator_port_wwn_list': visible_initiators,
|
||||
'target_port_wwn_list': visible_targets
|
||||
}
|
||||
device_map[zoning_vsan] = fabric_map
|
||||
LOG.debug("Device map for SAN context: %s", device_map)
|
||||
return device_map
|
||||
|
||||
def get_nameserver_info(self, fabric_vsan):
|
||||
"""Get fcns database info from fabric.
|
||||
|
||||
This method will return the connected node port wwn list(local
|
||||
and remote) for the given switch fabric
|
||||
"""
|
||||
cli_output = None
|
||||
nsinfo_list = []
|
||||
try:
|
||||
cmd = ([zone_constant.FCNS_SHOW, fabric_vsan, ' | no-more'])
|
||||
cli_output = self._get_switch_info(cmd)
|
||||
except exception.FCSanLookupServiceException:
|
||||
with excutils.save_and_reraise_exception():
|
||||
LOG.error(_LE("Failed collecting show fcns database for"
|
||||
" fabric"))
|
||||
if cli_output:
|
||||
nsinfo_list = self._parse_ns_output(cli_output)
|
||||
|
||||
LOG.debug("Connector returning fcns info-%s", nsinfo_list)
|
||||
return nsinfo_list
|
||||
|
||||
def _get_switch_info(self, cmd_list):
|
||||
stdout, stderr, sw_data = None, None, None
|
||||
try:
|
||||
stdout, stderr = self._run_ssh(cmd_list, True, 1)
|
||||
LOG.debug("CLI output from ssh - output: %s", stdout)
|
||||
if (stdout):
|
||||
sw_data = stdout.splitlines()
|
||||
return sw_data
|
||||
except processutils.ProcessExecutionError as e:
|
||||
msg = _("Error while getting data via ssh: (command=%(cmd)s "
|
||||
"error=%(err)s).") % {'cmd': cmd_list,
|
||||
'err': six.text_type(e)}
|
||||
LOG.error(msg)
|
||||
raise exception.CiscoZoningCliException(reason=msg)
|
||||
|
||||
def _parse_ns_output(self, switch_data):
|
||||
"""Parses name server data.
|
||||
|
||||
Parses nameserver raw data and adds the device port wwns to the list
|
||||
|
||||
:returns: list of device port wwn from ns info
|
||||
"""
|
||||
nsinfo_list = []
|
||||
for line in switch_data:
|
||||
if not(" N " in line):
|
||||
continue
|
||||
linesplit = line.split()
|
||||
if len(linesplit) > 2:
|
||||
node_port_wwn = linesplit[2]
|
||||
nsinfo_list.append(node_port_wwn)
|
||||
else:
|
||||
msg = _("Malformed fcns output string: %s") % line
|
||||
LOG.error(msg)
|
||||
raise exception.InvalidParameterValue(err=msg)
|
||||
return nsinfo_list
|
||||
|
||||
def _run_ssh(self, cmd_list, check_exit_code=True, attempts=1):
|
||||
|
||||
command = ' '.join(cmd_list)
|
||||
|
||||
if not self.sshpool:
|
||||
self.sshpool = ssh_utils.SSHPool(self.switch_ip,
|
||||
self.switch_port,
|
||||
None,
|
||||
self.switch_user,
|
||||
self.switch_pwd,
|
||||
min_size=1,
|
||||
max_size=5)
|
||||
last_exception = None
|
||||
try:
|
||||
with self.sshpool.item() as ssh:
|
||||
while attempts > 0:
|
||||
attempts -= 1
|
||||
try:
|
||||
return processutils.ssh_execute(
|
||||
ssh,
|
||||
command,
|
||||
check_exit_code=check_exit_code)
|
||||
except Exception as e:
|
||||
msg = _("Exception: %s") % six.text_type(e)
|
||||
LOG.error(msg)
|
||||
last_exception = e
|
||||
greenthread.sleep(random.randint(20, 500) / 100.0)
|
||||
try:
|
||||
raise processutils.ProcessExecutionError(
|
||||
exit_code=last_exception.exit_code,
|
||||
stdout=last_exception.stdout,
|
||||
stderr=last_exception.stderr,
|
||||
cmd=last_exception.cmd)
|
||||
except AttributeError:
|
||||
raise processutils.ProcessExecutionError(
|
||||
exit_code=-1,
|
||||
stdout="",
|
||||
stderr="Error running SSH command",
|
||||
cmd=command)
|
||||
except Exception:
|
||||
with excutils.save_and_reraise_exception():
|
||||
LOG.error(_LE("Error running SSH command: %s"), command)
|
||||
|
||||
def _ssh_execute(self, cmd_list, check_exit_code=True, attempts=1):
|
||||
"""Execute cli with status update.
|
||||
|
||||
Executes CLI commands where status return is expected.
|
||||
|
||||
cmd_list is a list of commands, where each command is itself
|
||||
a list of parameters. We use utils.check_ssh_injection to check each
|
||||
command, but then join then with " ; " to form a single command.
|
||||
"""
|
||||
|
||||
# Check that each command is secure
|
||||
for cmd in cmd_list:
|
||||
utils.check_ssh_injection(cmd)
|
||||
|
||||
# Combine into a single command.
|
||||
command = ' ; '.join(map(lambda x: ' '.join(x), cmd_list))
|
||||
|
||||
if not self.sshpool:
|
||||
self.sshpool = ssh_utils.SSHPool(self.switch_ip,
|
||||
self.switch_port,
|
||||
None,
|
||||
self.switch_user,
|
||||
self.switch_pwd,
|
||||
min_size=1,
|
||||
max_size=5)
|
||||
stdin, stdout, stderr = None, None, None
|
||||
LOG.debug("Executing command via ssh: %s", command)
|
||||
last_exception = None
|
||||
try:
|
||||
with self.sshpool.item() as ssh:
|
||||
while attempts > 0:
|
||||
attempts -= 1
|
||||
try:
|
||||
stdin, stdout, stderr = ssh.exec_command(command)
|
||||
greenthread.sleep(random.randint(20, 500) / 100.0)
|
||||
channel = stdout.channel
|
||||
exit_status = channel.recv_exit_status()
|
||||
LOG.debug("Exit Status from ssh:%s", exit_status)
|
||||
# exit_status == -1 if no exit code was returned
|
||||
if exit_status != -1:
|
||||
LOG.debug('Result was %s', exit_status)
|
||||
if check_exit_code and exit_status != 0:
|
||||
raise processutils.ProcessExecutionError(
|
||||
exit_code=exit_status,
|
||||
stdout=stdout,
|
||||
stderr=stderr,
|
||||
cmd=command)
|
||||
else:
|
||||
return True
|
||||
else:
|
||||
return True
|
||||
except Exception as e:
|
||||
msg = _("Exception: %s") % six.text_type(e)
|
||||
LOG.error(msg)
|
||||
last_exception = e
|
||||
greenthread.sleep(random.randint(20, 500) / 100.0)
|
||||
LOG.debug("Handling error case after SSH:%s", last_exception)
|
||||
try:
|
||||
raise processutils.ProcessExecutionError(
|
||||
exit_code=last_exception.exit_code,
|
||||
stdout=last_exception.stdout,
|
||||
stderr=last_exception.stderr,
|
||||
cmd=last_exception.cmd)
|
||||
except AttributeError:
|
||||
raise processutils.ProcessExecutionError(
|
||||
exit_code=-1,
|
||||
stdout="",
|
||||
stderr="Error running SSH command",
|
||||
cmd=command)
|
||||
except Exception as e:
|
||||
with excutils.save_and_reraise_exception():
|
||||
msg = (_("Error executing command via ssh: %s") %
|
||||
six.text_type(e))
|
||||
LOG.error(msg)
|
||||
finally:
|
||||
if stdin:
|
||||
stdin.flush()
|
||||
stdin.close()
|
||||
if stdout:
|
||||
stdout.close()
|
||||
if stderr:
|
||||
stderr.close()
|
||||
|
||||
def cleanup(self):
|
||||
self.sshpool = None
|
@ -1,460 +0,0 @@
|
||||
# (c) Copyright 2014 Cisco Systems Inc.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
#
|
||||
|
||||
|
||||
"""
|
||||
Script to push the zone configuration to Cisco SAN switches.
|
||||
"""
|
||||
import random
|
||||
import re
|
||||
|
||||
from eventlet import greenthread
|
||||
from oslo_concurrency import processutils
|
||||
from oslo_log import log as logging
|
||||
from oslo_utils import excutils
|
||||
import six
|
||||
|
||||
from cinder import exception
|
||||
from cinder.i18n import _, _LE, _LI, _LW
|
||||
from cinder import ssh_utils
|
||||
from cinder import utils
|
||||
import cinder.zonemanager.drivers.cisco.fc_zone_constants as ZoneConstant
|
||||
|
||||
LOG = logging.getLogger(__name__)
|
||||
|
||||
|
||||
class CiscoFCZoneClientCLI(object):
|
||||
"""Cisco FC zone client cli implementation.
|
||||
|
||||
OpenStack Fibre Channel zone client cli connector
|
||||
to manage FC zoning in Cisco SAN fabrics.
|
||||
|
||||
Version history:
|
||||
1.0 - Initial Cisco FC zone client cli
|
||||
"""
|
||||
|
||||
switch_ip = None
|
||||
switch_port = '22'
|
||||
switch_user = 'admin'
|
||||
switch_pwd = 'none'
|
||||
|
||||
def __init__(self, ipaddress, username, password, port, vsan):
|
||||
"""initializing the client."""
|
||||
self.switch_ip = ipaddress
|
||||
self.switch_port = port
|
||||
self.switch_user = username
|
||||
self.switch_pwd = password
|
||||
self.fabric_vsan = vsan
|
||||
self.sshpool = None
|
||||
|
||||
def get_active_zone_set(self):
|
||||
"""Return the active zone configuration.
|
||||
|
||||
Return active zoneset from fabric. When none of the configurations
|
||||
are active then it will return empty map.
|
||||
|
||||
:returns: Map -- active zone set map in the following format
|
||||
{
|
||||
'zones':
|
||||
{'openstack50060b0000c26604201900051ee8e329':
|
||||
['50060b0000c26604', '201900051ee8e329']
|
||||
},
|
||||
'active_zone_config': 'OpenStack_Cfg'
|
||||
}
|
||||
"""
|
||||
zone_set = {}
|
||||
zone = {}
|
||||
zone_member = None
|
||||
zone_name = None
|
||||
switch_data = None
|
||||
zone_set_name = None
|
||||
try:
|
||||
switch_data = self._get_switch_info(
|
||||
[ZoneConstant.GET_ACTIVE_ZONE_CFG, self.fabric_vsan,
|
||||
' | no-more'])
|
||||
except exception.CiscoZoningCliException:
|
||||
with excutils.save_and_reraise_exception():
|
||||
LOG.error(_LE("Failed getting active zone set "
|
||||
"from fabric %s"), self.switch_ip)
|
||||
try:
|
||||
for line in switch_data:
|
||||
# Split on non-word characters,
|
||||
line_split = re.split('[\s\[\]]+', line)
|
||||
if ZoneConstant.CFG_ZONESET in line_split:
|
||||
# zoneset name [name] vsan [vsan]
|
||||
zone_set_name = \
|
||||
line_split[line_split.index(ZoneConstant.CFG_ZONESET)
|
||||
+ 2]
|
||||
continue
|
||||
if ZoneConstant.CFG_ZONE in line_split:
|
||||
# zone name [name] vsan [vsan]
|
||||
zone_name = \
|
||||
line_split[line_split.index(ZoneConstant.CFG_ZONE) + 2]
|
||||
zone[zone_name] = list()
|
||||
continue
|
||||
if ZoneConstant.CFG_ZONE_MEMBER in line_split:
|
||||
# Examples:
|
||||
# pwwn c0:50:76:05:15:9f:00:12
|
||||
# * fcid 0x1e01c0 [pwwn 50:05:07:68:02:20:48:04] [V7K_N1P2]
|
||||
zone_member = \
|
||||
line_split[
|
||||
line_split.index(ZoneConstant.CFG_ZONE_MEMBER) + 1]
|
||||
zone_member_list = zone.get(zone_name)
|
||||
zone_member_list.append(zone_member)
|
||||
|
||||
zone_set[ZoneConstant.CFG_ZONES] = zone
|
||||
zone_set[ZoneConstant.ACTIVE_ZONE_CONFIG] = zone_set_name
|
||||
except Exception as ex:
|
||||
# In case of parsing error here, it should be malformed cli output.
|
||||
msg = _("Malformed zone configuration: (switch=%(switch)s "
|
||||
"zone_config=%(zone_config)s)."
|
||||
) % {'switch': self.switch_ip,
|
||||
'zone_config': switch_data}
|
||||
LOG.error(msg)
|
||||
exc_msg = _("Exception: %s") % six.text_type(ex)
|
||||
LOG.error(exc_msg)
|
||||
raise exception.FCZoneDriverException(reason=msg)
|
||||
|
||||
return zone_set
|
||||
|
||||
def add_zones(self, zones, activate, fabric_vsan, active_zone_set,
|
||||
zone_status):
|
||||
"""Add zone configuration.
|
||||
|
||||
This method will add the zone configuration passed by user.
|
||||
input params:
|
||||
zones - zone names mapped to members and VSANs.
|
||||
zone members are colon separated but case-insensitive
|
||||
{ zonename1:[zonememeber1,zonemember2,...],
|
||||
zonename2:[zonemember1, zonemember2,...]...}
|
||||
e.g: {'openstack50060b0000c26604201900051ee8e329':
|
||||
['50:06:0b:00:00:c2:66:04', '20:19:00:05:1e:e8:e3:29']
|
||||
}
|
||||
activate - True/False
|
||||
"""
|
||||
LOG.debug("Add Zones - Zones passed: %s", zones)
|
||||
|
||||
LOG.debug("Active zone set: %s", active_zone_set)
|
||||
zone_list = active_zone_set[ZoneConstant.CFG_ZONES]
|
||||
LOG.debug("zone list: %s", zone_list)
|
||||
LOG.debug("zone status: %s", zone_status)
|
||||
|
||||
cfg_name = active_zone_set[ZoneConstant.ACTIVE_ZONE_CONFIG]
|
||||
|
||||
zone_cmds = [['conf'],
|
||||
['zoneset', 'name', cfg_name, 'vsan', fabric_vsan]]
|
||||
|
||||
for zone in zones.keys():
|
||||
# if zone exists, its an update. Delete & insert
|
||||
LOG.debug("Update call")
|
||||
if zone in zone_list:
|
||||
# Response from get_active_zone_set strips colons from WWPNs
|
||||
current_zone = set(zone_list[zone])
|
||||
new_wwpns = map(lambda x: x.lower().replace(':', ''),
|
||||
zones[zone])
|
||||
new_zone = set(new_wwpns)
|
||||
|
||||
if current_zone != new_zone:
|
||||
try:
|
||||
self.delete_zones(zone, activate, fabric_vsan,
|
||||
active_zone_set, zone_status)
|
||||
except exception.CiscoZoningCliException:
|
||||
with excutils.save_and_reraise_exception():
|
||||
LOG.error(_LE("Deleting zone failed %s"), zone)
|
||||
LOG.debug("Deleted Zone before insert : %s", zone)
|
||||
|
||||
zone_cmds.append(['zone', 'name', zone])
|
||||
|
||||
for member in zones[zone]:
|
||||
zone_cmds.append(['member', 'pwwn', member])
|
||||
|
||||
zone_cmds.append(['end'])
|
||||
|
||||
try:
|
||||
LOG.debug("Add zones: Config cmd to run: %s", zone_cmds)
|
||||
self._ssh_execute(zone_cmds, True, 1)
|
||||
|
||||
if activate:
|
||||
self.activate_zoneset(cfg_name, fabric_vsan, zone_status)
|
||||
self._cfg_save()
|
||||
except Exception as e:
|
||||
|
||||
msg = _("Creating and activating zone set failed: "
|
||||
"(Zone set=%(zoneset)s error=%(err)s)."
|
||||
) % {'zoneset': cfg_name, 'err': six.text_type(e)}
|
||||
LOG.error(msg)
|
||||
raise exception.CiscoZoningCliException(reason=msg)
|
||||
|
||||
def activate_zoneset(self, cfgname, fabric_vsan, zone_status):
|
||||
"""Method to Activate the zone config. Param cfgname - ZonesetName."""
|
||||
|
||||
LOG.debug("zone status: %s", zone_status)
|
||||
|
||||
cmd_list = [['conf'],
|
||||
['zoneset', 'activate', 'name', cfgname, 'vsan',
|
||||
self.fabric_vsan]]
|
||||
if zone_status['mode'] == 'enhanced':
|
||||
cmd_list.append(['zone', 'commit', 'vsan', fabric_vsan])
|
||||
|
||||
cmd_list.append(['end'])
|
||||
|
||||
return self._ssh_execute(cmd_list, True, 1)
|
||||
|
||||
def get_zoning_status(self):
|
||||
"""Return the zoning mode and session for a zoneset."""
|
||||
zone_status = {}
|
||||
|
||||
try:
|
||||
switch_data = self._get_switch_info(
|
||||
[ZoneConstant.GET_ZONE_STATUS, self.fabric_vsan])
|
||||
except exception.CiscoZoningCliException:
|
||||
with excutils.save_and_reraise_exception():
|
||||
LOG.error(_LE("Failed getting zone status "
|
||||
"from fabric %s"), self.switch_ip)
|
||||
try:
|
||||
for line in switch_data:
|
||||
# Split on non-word characters,
|
||||
line_split = re.split('[\s\[\]]+', line)
|
||||
if 'mode:' in line_split:
|
||||
# mode: <enhanced|basic>
|
||||
zone_status['mode'] = line_split[line_split.index('mode:')
|
||||
+ 1]
|
||||
continue
|
||||
if 'session:' in line_split:
|
||||
# session: <none|a value other than none>
|
||||
zone_status['session'] = \
|
||||
line_split[line_split.index('session:') + 1]
|
||||
continue
|
||||
except Exception as ex:
|
||||
# In case of parsing error here, it should be malformed cli output.
|
||||
msg = _("Malformed zone status: (switch=%(switch)s "
|
||||
"zone_config=%(zone_config)s)."
|
||||
) % {'switch': self.switch_ip,
|
||||
'zone_status': switch_data}
|
||||
LOG.error(msg)
|
||||
exc_msg = _("Exception: %s") % six.text_type(ex)
|
||||
LOG.error(exc_msg)
|
||||
raise exception.FCZoneDriverException(reason=msg)
|
||||
|
||||
return zone_status
|
||||
|
||||
def delete_zones(self, zone_names, activate, fabric_vsan, active_zone_set,
|
||||
zone_status):
|
||||
"""Delete zones from fabric.
|
||||
|
||||
Method to delete the active zone config zones
|
||||
|
||||
params zone_names: zoneNames separated by semicolon
|
||||
params activate: True/False
|
||||
"""
|
||||
|
||||
LOG.debug("zone_names %s", zone_names)
|
||||
active_zoneset_name = active_zone_set[ZoneConstant.ACTIVE_ZONE_CONFIG]
|
||||
|
||||
cmds = [['conf'],
|
||||
['zoneset', 'name', active_zoneset_name, 'vsan',
|
||||
fabric_vsan]]
|
||||
|
||||
try:
|
||||
for zone in set(zone_names.split(';')):
|
||||
cmds.append(['no', 'zone', 'name', zone])
|
||||
|
||||
cmds.append(['end'])
|
||||
|
||||
LOG.debug("Delete zones: Config cmd to run: %s", cmds)
|
||||
self._ssh_execute(cmds, True, 1)
|
||||
|
||||
if activate:
|
||||
self.activate_zoneset(active_zoneset_name, fabric_vsan,
|
||||
zone_status)
|
||||
self._cfg_save()
|
||||
|
||||
except Exception as e:
|
||||
msg = _("Deleting zones failed: (command=%(cmd)s error=%(err)s)."
|
||||
) % {'cmd': cmds, 'err': six.text_type(e)}
|
||||
LOG.error(msg)
|
||||
raise exception.CiscoZoningCliException(reason=msg)
|
||||
|
||||
def get_nameserver_info(self):
|
||||
"""Get name server data from fabric.
|
||||
|
||||
This method will return the connected node port wwn list(local
|
||||
and remote) for the given switch fabric
|
||||
|
||||
show fcns database
|
||||
"""
|
||||
cli_output = None
|
||||
return_list = []
|
||||
try:
|
||||
cli_output = self._get_switch_info([ZoneConstant.FCNS_SHOW,
|
||||
self.fabric_vsan])
|
||||
except exception.CiscoZoningCliException:
|
||||
with excutils.save_and_reraise_exception():
|
||||
LOG.error(_LE("Failed collecting fcns database "
|
||||
"info for fabric %s"), self.switch_ip)
|
||||
|
||||
if (cli_output):
|
||||
return_list = self._parse_ns_output(cli_output)
|
||||
|
||||
LOG.info(_LI("Connector returning fcnsinfo-%s"), return_list)
|
||||
|
||||
return return_list
|
||||
|
||||
@utils.retry(processutils.ProcessExecutionError, retries=5)
|
||||
def _cfg_save(self):
|
||||
cmd = ['copy', 'running-config', 'startup-config']
|
||||
self._run_ssh(cmd, True)
|
||||
|
||||
def _get_switch_info(self, cmd_list):
|
||||
stdout, stderr, sw_data = None, None, None
|
||||
try:
|
||||
stdout, stderr = self._run_ssh(cmd_list, True)
|
||||
LOG.debug("CLI output from ssh - output: %s", stdout)
|
||||
if (stdout):
|
||||
sw_data = stdout.splitlines()
|
||||
return sw_data
|
||||
except processutils.ProcessExecutionError as e:
|
||||
msg = _("Error while getting data via ssh: (command=%(cmd)s "
|
||||
"error=%(err)s).") % {'cmd': cmd_list,
|
||||
'err': six.text_type(e)}
|
||||
LOG.error(msg)
|
||||
raise exception.CiscoZoningCliException(reason=msg)
|
||||
|
||||
def _parse_ns_output(self, switch_data):
|
||||
"""Parses name server data.
|
||||
|
||||
Parses nameserver raw data and adds the device port wwns to the list
|
||||
|
||||
:returns: List -- list of device port wwn from ns info
|
||||
"""
|
||||
return_list = []
|
||||
for line in switch_data:
|
||||
if not(" N " in line):
|
||||
continue
|
||||
linesplit = line.split()
|
||||
if len(linesplit) > 2:
|
||||
node_port_wwn = linesplit[2]
|
||||
return_list.append(node_port_wwn)
|
||||
else:
|
||||
msg = _("Malformed show fcns database string: %s") % line
|
||||
LOG.error(msg)
|
||||
raise exception.InvalidParameterValue(err=msg)
|
||||
return return_list
|
||||
|
||||
def _run_ssh(self, cmd_list, check_exit_code=True):
|
||||
|
||||
command = ' '.join(cmd_list)
|
||||
|
||||
if not self.sshpool:
|
||||
self.sshpool = ssh_utils.SSHPool(self.switch_ip,
|
||||
self.switch_port,
|
||||
None,
|
||||
self.switch_user,
|
||||
self.switch_pwd,
|
||||
min_size=1,
|
||||
max_size=5)
|
||||
try:
|
||||
with self.sshpool.item() as ssh:
|
||||
return processutils.ssh_execute(
|
||||
ssh,
|
||||
command,
|
||||
check_exit_code=check_exit_code)
|
||||
|
||||
except Exception:
|
||||
with excutils.save_and_reraise_exception():
|
||||
LOG.warning(_LW("Error running SSH command: %s"), command)
|
||||
|
||||
def _ssh_execute(self, cmd_list, check_exit_code=True, attempts=1):
|
||||
"""Execute cli with status update.
|
||||
|
||||
Executes CLI commands where status return is expected.
|
||||
|
||||
cmd_list is a list of commands, where each command is itself
|
||||
a list of parameters. We use utils.check_ssh_injection to check each
|
||||
command, but then join then with " ; " to form a single command.
|
||||
"""
|
||||
|
||||
# Check that each command is secure
|
||||
for cmd in cmd_list:
|
||||
utils.check_ssh_injection(cmd)
|
||||
|
||||
# Combine into a single command.
|
||||
command = ' ; '.join(map(lambda x: ' '.join(x), cmd_list))
|
||||
|
||||
if not self.sshpool:
|
||||
self.sshpool = ssh_utils.SSHPool(self.switch_ip,
|
||||
self.switch_port,
|
||||
None,
|
||||
self.switch_user,
|
||||
self.switch_pwd,
|
||||
min_size=1,
|
||||
max_size=5)
|
||||
stdin, stdout, stderr = None, None, None
|
||||
LOG.debug("Executing command via ssh: %s", command)
|
||||
last_exception = None
|
||||
try:
|
||||
with self.sshpool.item() as ssh:
|
||||
while attempts > 0:
|
||||
attempts -= 1
|
||||
try:
|
||||
stdin, stdout, stderr = ssh.exec_command(command)
|
||||
channel = stdout.channel
|
||||
exit_status = channel.recv_exit_status()
|
||||
LOG.debug("Exit Status from ssh: %s", exit_status)
|
||||
# exit_status == -1 if no exit code was returned
|
||||
if exit_status != -1:
|
||||
LOG.debug('Result was %s', exit_status)
|
||||
if check_exit_code and exit_status != 0:
|
||||
raise processutils.ProcessExecutionError(
|
||||
exit_code=exit_status,
|
||||
stdout=stdout,
|
||||
stderr=stderr,
|
||||
cmd=command)
|
||||
else:
|
||||
return True
|
||||
else:
|
||||
return True
|
||||
except Exception as e:
|
||||
LOG.exception(_LE('Error executing SSH command.'))
|
||||
last_exception = e
|
||||
greenthread.sleep(random.randint(20, 500) / 100.0)
|
||||
LOG.debug("Handling error case after SSH: %s", last_exception)
|
||||
try:
|
||||
raise processutils.ProcessExecutionError(
|
||||
exit_code=last_exception.exit_code,
|
||||
stdout=last_exception.stdout,
|
||||
stderr=last_exception.stderr,
|
||||
cmd=last_exception.cmd)
|
||||
except AttributeError:
|
||||
raise processutils.ProcessExecutionError(
|
||||
exit_code=-1,
|
||||
stdout="",
|
||||
stderr="Error running SSH command",
|
||||
cmd=command)
|
||||
except Exception:
|
||||
with excutils.save_and_reraise_exception():
|
||||
LOG.exception(_LE("Error executing command via ssh."))
|
||||
finally:
|
||||
if stdin:
|
||||
stdin.flush()
|
||||
stdin.close()
|
||||
if stdout:
|
||||
stdout.close()
|
||||
if stderr:
|
||||
stderr.close()
|
||||
|
||||
def cleanup(self):
|
||||
self.sshpool = None
|
@ -1,518 +0,0 @@
|
||||
# (c) Copyright 2014 Cisco Systems Inc.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
#
|
||||
|
||||
|
||||
"""
|
||||
Cisco Zone Driver is responsible to manage access control using FC zoning
|
||||
for Cisco FC fabrics.
|
||||
This is a concrete implementation of FCZoneDriver interface implementing
|
||||
add_connection and delete_connection interfaces.
|
||||
|
||||
**Related Flags**
|
||||
|
||||
:zone_activate: Used by: class: 'FCZoneDriver'. Defaults to True
|
||||
:zone_name_prefix: Used by: class: 'FCZoneDriver'. Defaults to 'openstack'
|
||||
"""
|
||||
|
||||
from oslo_concurrency import lockutils
|
||||
from oslo_config import cfg
|
||||
from oslo_log import log as logging
|
||||
from oslo_utils import excutils
|
||||
from oslo_utils import importutils
|
||||
import six
|
||||
import string
|
||||
|
||||
from cinder import exception
|
||||
from cinder.i18n import _, _LE, _LI
|
||||
from cinder.zonemanager.drivers.cisco import cisco_fabric_opts as fabric_opts
|
||||
from cinder.zonemanager.drivers import driver_utils
|
||||
from cinder.zonemanager.drivers import fc_zone_driver
|
||||
from cinder.zonemanager import utils as zm_utils
|
||||
|
||||
LOG = logging.getLogger(__name__)
|
||||
|
||||
SUPPORTED_CHARS = string.ascii_letters + string.digits + '$' + '-' + '^' + '_'
|
||||
cisco_opts = [
|
||||
cfg.StrOpt('cisco_sb_connector',
|
||||
default='cinder.zonemanager.drivers.cisco'
|
||||
'.cisco_fc_zone_client_cli.CiscoFCZoneClientCLI',
|
||||
help='Southbound connector for zoning operation'),
|
||||
]
|
||||
|
||||
CONF = cfg.CONF
|
||||
CONF.register_opts(cisco_opts, group='fc-zone-manager')
|
||||
|
||||
|
||||
class CiscoFCZoneDriver(fc_zone_driver.FCZoneDriver):
|
||||
"""Cisco FC zone driver implementation.
|
||||
|
||||
OpenStack Fibre Channel zone driver to manage FC zoning in
|
||||
Cisco SAN fabrics.
|
||||
|
||||
Version history:
|
||||
1.0 - Initial Cisco FC zone driver
|
||||
1.1 - Added friendly zone name support
|
||||
"""
|
||||
|
||||
VERSION = "1.1.0"
|
||||
|
||||
def __init__(self, **kwargs):
|
||||
super(CiscoFCZoneDriver, self).__init__(**kwargs)
|
||||
self.configuration = kwargs.get('configuration', None)
|
||||
if self.configuration:
|
||||
self.configuration.append_config_values(cisco_opts)
|
||||
|
||||
# Adding a hack to handle parameters from super classes
|
||||
# in case configured with multi backends.
|
||||
fabric_names = self.configuration.safe_get('fc_fabric_names')
|
||||
activate = self.configuration.safe_get('cisco_zone_activate')
|
||||
prefix = self.configuration.safe_get('cisco_zone_name_prefix')
|
||||
base_san_opts = []
|
||||
if not fabric_names:
|
||||
base_san_opts.append(
|
||||
cfg.StrOpt('fc_fabric_names',
|
||||
help='Comma separated list of fibre channel '
|
||||
'fabric names. This list of names is used to'
|
||||
' retrieve other SAN credentials for connecting'
|
||||
' to each SAN fabric'
|
||||
))
|
||||
if not activate:
|
||||
base_san_opts.append(
|
||||
cfg.BoolOpt('cisco_zone_activate',
|
||||
default=True,
|
||||
help='Indicates whether zone should '
|
||||
'be activated or not'))
|
||||
if not prefix:
|
||||
base_san_opts.append(
|
||||
cfg.StrOpt('cisco_zone_name_prefix',
|
||||
default="openstack",
|
||||
help="A prefix to be used when naming zone"))
|
||||
if len(base_san_opts) > 0:
|
||||
CONF.register_opts(base_san_opts)
|
||||
self.configuration.append_config_values(base_san_opts)
|
||||
fabric_names = [x.strip() for x in self.
|
||||
configuration.fc_fabric_names.split(',')]
|
||||
|
||||
# There can be more than one SAN in the network and we need to
|
||||
# get credentials for each SAN.
|
||||
if fabric_names:
|
||||
self.fabric_configs = fabric_opts.load_fabric_configurations(
|
||||
fabric_names)
|
||||
|
||||
@lockutils.synchronized('cisco', 'fcfabric-', True)
|
||||
def add_connection(self, fabric, initiator_target_map, host_name=None,
|
||||
storage_system=None):
|
||||
"""Concrete implementation of add_connection.
|
||||
|
||||
Based on zoning policy and state of each I-T pair, list of zone
|
||||
members are created and pushed to the fabric to add zones. The
|
||||
new zones created or zones updated are activated based on isActivate
|
||||
flag set in cinder.conf returned by volume driver after attach
|
||||
operation.
|
||||
|
||||
:param fabric: Fabric name from cinder.conf file
|
||||
:param initiator_target_map: Mapping of initiator to list of targets
|
||||
"""
|
||||
|
||||
LOG.debug("Add connection for Fabric: %s", fabric)
|
||||
LOG.info(_LI("CiscoFCZoneDriver - Add connection "
|
||||
"for I-T map: %s"), initiator_target_map)
|
||||
fabric_ip = self.fabric_configs[fabric].safe_get(
|
||||
'cisco_fc_fabric_address')
|
||||
fabric_user = self.fabric_configs[fabric].safe_get(
|
||||
'cisco_fc_fabric_user')
|
||||
fabric_pwd = self.fabric_configs[fabric].safe_get(
|
||||
'cisco_fc_fabric_password')
|
||||
fabric_port = self.fabric_configs[fabric].safe_get(
|
||||
'cisco_fc_fabric_port')
|
||||
zoning_policy = self.configuration.zoning_policy
|
||||
zoning_policy_fab = self.fabric_configs[fabric].safe_get(
|
||||
'cisco_zoning_policy')
|
||||
if zoning_policy_fab:
|
||||
zoning_policy = zoning_policy_fab
|
||||
|
||||
zoning_vsan = self.fabric_configs[fabric].safe_get('cisco_zoning_vsan')
|
||||
|
||||
LOG.info(_LI("Zoning policy for Fabric %s"), zoning_policy)
|
||||
|
||||
statusmap_from_fabric = self.get_zoning_status(
|
||||
fabric_ip, fabric_user, fabric_pwd, fabric_port, zoning_vsan)
|
||||
|
||||
if statusmap_from_fabric.get('session') == 'none':
|
||||
|
||||
cfgmap_from_fabric = self.get_active_zone_set(
|
||||
fabric_ip, fabric_user, fabric_pwd, fabric_port, zoning_vsan)
|
||||
zone_names = []
|
||||
if cfgmap_from_fabric.get('zones'):
|
||||
zone_names = cfgmap_from_fabric['zones'].keys()
|
||||
# based on zoning policy, create zone member list and
|
||||
# push changes to fabric.
|
||||
for initiator_key in initiator_target_map.keys():
|
||||
zone_map = {}
|
||||
initiator = initiator_key.lower()
|
||||
t_list = initiator_target_map[initiator_key]
|
||||
if zoning_policy == 'initiator-target':
|
||||
for t in t_list:
|
||||
target = t.lower()
|
||||
zone_members = [
|
||||
zm_utils.get_formatted_wwn(initiator),
|
||||
zm_utils.get_formatted_wwn(target)]
|
||||
zone_name = (
|
||||
driver_utils.get_friendly_zone_name(
|
||||
zoning_policy,
|
||||
initiator,
|
||||
target,
|
||||
host_name,
|
||||
storage_system,
|
||||
self.configuration.cisco_zone_name_prefix,
|
||||
SUPPORTED_CHARS))
|
||||
if (len(cfgmap_from_fabric) == 0 or (
|
||||
zone_name not in zone_names)):
|
||||
zone_map[zone_name] = zone_members
|
||||
else:
|
||||
# This is I-T zoning, skip if zone exists.
|
||||
LOG.info(_LI("Zone exists in I-T mode. "
|
||||
"Skipping zone creation %s"),
|
||||
zone_name)
|
||||
elif zoning_policy == 'initiator':
|
||||
zone_members = [
|
||||
zm_utils.get_formatted_wwn(initiator)]
|
||||
for t in t_list:
|
||||
target = t.lower()
|
||||
zone_members.append(
|
||||
zm_utils.get_formatted_wwn(target))
|
||||
|
||||
zone_name = (
|
||||
driver_utils.get_friendly_zone_name(
|
||||
zoning_policy,
|
||||
initiator,
|
||||
target,
|
||||
host_name,
|
||||
storage_system,
|
||||
self.configuration.cisco_zone_name_prefix,
|
||||
SUPPORTED_CHARS))
|
||||
|
||||
if len(zone_names) > 0 and (zone_name in zone_names):
|
||||
zone_members = zone_members + filter(
|
||||
lambda x: x not in zone_members,
|
||||
cfgmap_from_fabric['zones'][zone_name])
|
||||
zone_map[zone_name] = zone_members
|
||||
else:
|
||||
msg = _("Zoning Policy: %s, not"
|
||||
" recognized") % zoning_policy
|
||||
LOG.error(msg)
|
||||
raise exception.FCZoneDriverException(msg)
|
||||
|
||||
LOG.info(_LI("Zone map to add: %s"), zone_map)
|
||||
|
||||
if len(zone_map) > 0:
|
||||
conn = None
|
||||
try:
|
||||
conn = importutils.import_object(
|
||||
self.configuration.cisco_sb_connector,
|
||||
ipaddress=fabric_ip,
|
||||
username=fabric_user,
|
||||
password=fabric_pwd,
|
||||
port=fabric_port,
|
||||
vsan=zoning_vsan)
|
||||
conn.add_zones(
|
||||
zone_map, self.configuration.cisco_zone_activate,
|
||||
zoning_vsan, cfgmap_from_fabric,
|
||||
statusmap_from_fabric)
|
||||
conn.cleanup()
|
||||
except exception.CiscoZoningCliException as cisco_ex:
|
||||
msg = _("Exception: %s") % six.text_type(cisco_ex)
|
||||
raise exception.FCZoneDriverException(msg)
|
||||
except Exception:
|
||||
msg = _("Failed to add zoning configuration.")
|
||||
LOG.exception(msg)
|
||||
raise exception.FCZoneDriverException(msg)
|
||||
LOG.debug("Zones added successfully: %s", zone_map)
|
||||
else:
|
||||
LOG.debug("Zoning session exists VSAN: %s", zoning_vsan)
|
||||
|
||||
@lockutils.synchronized('cisco', 'fcfabric-', True)
|
||||
def delete_connection(self, fabric, initiator_target_map, host_name=None,
|
||||
storage_system=None):
|
||||
"""Concrete implementation of delete_connection.
|
||||
|
||||
Based on zoning policy and state of each I-T pair, list of zones
|
||||
are created for deletion. The zones are either updated deleted based
|
||||
on the policy and attach/detach state of each I-T pair.
|
||||
|
||||
:param fabric: Fabric name from cinder.conf file
|
||||
:param initiator_target_map: Mapping of initiator to list of targets
|
||||
"""
|
||||
LOG.debug("Delete connection for fabric: %s", fabric)
|
||||
LOG.info(_LI("CiscoFCZoneDriver - Delete connection for I-T map: %s"),
|
||||
initiator_target_map)
|
||||
fabric_ip = self.fabric_configs[fabric].safe_get(
|
||||
'cisco_fc_fabric_address')
|
||||
fabric_user = self.fabric_configs[fabric].safe_get(
|
||||
'cisco_fc_fabric_user')
|
||||
fabric_pwd = self.fabric_configs[fabric].safe_get(
|
||||
'cisco_fc_fabric_password')
|
||||
fabric_port = self.fabric_configs[fabric].safe_get(
|
||||
'cisco_fc_fabric_port')
|
||||
zoning_policy = self.configuration.zoning_policy
|
||||
zoning_policy_fab = self.fabric_configs[fabric].safe_get(
|
||||
'cisco_zoning_policy')
|
||||
|
||||
if zoning_policy_fab:
|
||||
zoning_policy = zoning_policy_fab
|
||||
|
||||
zoning_vsan = self.fabric_configs[fabric].safe_get('cisco_zoning_vsan')
|
||||
|
||||
LOG.info(_LI("Zoning policy for fabric %s"), zoning_policy)
|
||||
|
||||
statusmap_from_fabric = self.get_zoning_status(
|
||||
fabric_ip, fabric_user, fabric_pwd, fabric_port, zoning_vsan)
|
||||
|
||||
if statusmap_from_fabric.get('session') == 'none':
|
||||
cfgmap_from_fabric = self.get_active_zone_set(
|
||||
fabric_ip, fabric_user, fabric_pwd, fabric_port, zoning_vsan)
|
||||
|
||||
zone_names = []
|
||||
if cfgmap_from_fabric.get('zones'):
|
||||
zone_names = cfgmap_from_fabric['zones'].keys()
|
||||
|
||||
# Based on zoning policy, get zone member list and push
|
||||
# changes to fabric. This operation could result in an update
|
||||
# for zone config with new member list or deleting zones from
|
||||
# active cfg.
|
||||
|
||||
LOG.debug("zone config from Fabric: %s", cfgmap_from_fabric)
|
||||
for initiator_key in initiator_target_map.keys():
|
||||
initiator = initiator_key.lower()
|
||||
formatted_initiator = zm_utils.get_formatted_wwn(initiator)
|
||||
zone_map = {}
|
||||
zones_to_delete = []
|
||||
t_list = initiator_target_map[initiator_key]
|
||||
if zoning_policy == 'initiator-target':
|
||||
# In this case, zone needs to be deleted.
|
||||
for t in t_list:
|
||||
target = t.lower()
|
||||
zone_name = (
|
||||
driver_utils.get_friendly_zone_name(
|
||||
zoning_policy,
|
||||
initiator,
|
||||
target,
|
||||
host_name,
|
||||
storage_system,
|
||||
self.configuration.cisco_zone_name_prefix,
|
||||
SUPPORTED_CHARS))
|
||||
LOG.debug("Zone name to del: %s", zone_name)
|
||||
if (len(zone_names) > 0 and (zone_name in zone_names)):
|
||||
# delete zone.
|
||||
LOG.debug("Added zone to delete to list: %s",
|
||||
zone_name)
|
||||
zones_to_delete.append(zone_name)
|
||||
|
||||
elif zoning_policy == 'initiator':
|
||||
zone_members = [formatted_initiator]
|
||||
for t in t_list:
|
||||
target = t.lower()
|
||||
zone_members.append(
|
||||
zm_utils.get_formatted_wwn(target))
|
||||
|
||||
zone_name = driver_utils.get_friendly_zone_name(
|
||||
zoning_policy,
|
||||
initiator,
|
||||
target,
|
||||
host_name,
|
||||
storage_system,
|
||||
self.configuration.cisco_zone_name_prefix,
|
||||
SUPPORTED_CHARS)
|
||||
|
||||
if (zone_names and (zone_name in zone_names)):
|
||||
filtered_members = filter(
|
||||
lambda x: x not in zone_members,
|
||||
cfgmap_from_fabric['zones'][zone_name])
|
||||
|
||||
# The assumption here is that initiator is always
|
||||
# there in the zone as it is 'initiator' policy.
|
||||
# We find the filtered list and if it is non-empty,
|
||||
# add initiator to it and update zone if filtered
|
||||
# list is empty, we remove that zone.
|
||||
LOG.debug("Zone delete - I mode: filtered targets: %s",
|
||||
filtered_members)
|
||||
if filtered_members:
|
||||
filtered_members.append(formatted_initiator)
|
||||
LOG.debug("Filtered zone members to update: %s",
|
||||
filtered_members)
|
||||
zone_map[zone_name] = filtered_members
|
||||
LOG.debug("Filtered zone Map to update: %s",
|
||||
zone_map)
|
||||
else:
|
||||
zones_to_delete.append(zone_name)
|
||||
else:
|
||||
LOG.info(_LI("Zoning Policy: %s, not recognized"),
|
||||
zoning_policy)
|
||||
LOG.debug("Final Zone map to update: %s", zone_map)
|
||||
LOG.debug("Final Zone list to delete: %s", zones_to_delete)
|
||||
conn = None
|
||||
try:
|
||||
conn = importutils.import_object(
|
||||
self.configuration.cisco_sb_connector,
|
||||
ipaddress=fabric_ip,
|
||||
username=fabric_user,
|
||||
password=fabric_pwd,
|
||||
port=fabric_port,
|
||||
vsan=zoning_vsan)
|
||||
# Update zone membership.
|
||||
if zone_map:
|
||||
conn.add_zones(
|
||||
zone_map, self.configuration.cisco_zone_activate,
|
||||
zoning_vsan, cfgmap_from_fabric,
|
||||
statusmap_from_fabric)
|
||||
# Delete zones ~sk.
|
||||
if zones_to_delete:
|
||||
zone_name_string = ''
|
||||
num_zones = len(zones_to_delete)
|
||||
for i in range(0, num_zones):
|
||||
if i == 0:
|
||||
zone_name_string = ('%s%s' % (
|
||||
zone_name_string,
|
||||
zones_to_delete[i]))
|
||||
else:
|
||||
zone_name_string = ('%s%s%s' % (
|
||||
zone_name_string, ';',
|
||||
zones_to_delete[i]))
|
||||
|
||||
conn.delete_zones(zone_name_string,
|
||||
self.configuration.
|
||||
cisco_zone_activate,
|
||||
zoning_vsan, cfgmap_from_fabric,
|
||||
statusmap_from_fabric)
|
||||
conn.cleanup()
|
||||
except Exception:
|
||||
msg = _("Failed to update or delete zoning configuration")
|
||||
LOG.exception(msg)
|
||||
raise exception.FCZoneDriverException(msg)
|
||||
LOG.debug("Zones deleted successfully: %s", zone_map)
|
||||
else:
|
||||
LOG.debug("Zoning session exists VSAN: %s", zoning_vsan)
|
||||
|
||||
def get_san_context(self, target_wwn_list):
|
||||
"""Lookup SAN context for visible end devices.
|
||||
|
||||
Look up each SAN configured and return a map of SAN (fabric IP) to
|
||||
list of target WWNs visible to the fabric.
|
||||
"""
|
||||
formatted_target_list = []
|
||||
fabric_map = {}
|
||||
fabrics = [x.strip() for x in self.
|
||||
configuration.fc_fabric_names.split(',')]
|
||||
LOG.debug("Fabric List: %s", fabrics)
|
||||
LOG.debug("Target wwn List: %s", target_wwn_list)
|
||||
if len(fabrics) > 0:
|
||||
for t in target_wwn_list:
|
||||
formatted_target_list.append(
|
||||
zm_utils.get_formatted_wwn(t.lower()))
|
||||
LOG.debug("Formatted Target wwn List: %s", formatted_target_list)
|
||||
for fabric_name in fabrics:
|
||||
fabric_ip = self.fabric_configs[fabric_name].safe_get(
|
||||
'cisco_fc_fabric_address')
|
||||
fabric_user = self.fabric_configs[fabric_name].safe_get(
|
||||
'cisco_fc_fabric_user')
|
||||
fabric_pwd = self.fabric_configs[fabric_name].safe_get(
|
||||
'cisco_fc_fabric_password')
|
||||
fabric_port = self.fabric_configs[fabric_name].safe_get(
|
||||
'cisco_fc_fabric_port')
|
||||
zoning_vsan = self.fabric_configs[fabric_name].safe_get(
|
||||
'cisco_zoning_vsan')
|
||||
|
||||
# Get name server data from fabric and get the targets
|
||||
# logged in.
|
||||
nsinfo = None
|
||||
try:
|
||||
conn = importutils.import_object(
|
||||
self.configuration.cisco_sb_connector,
|
||||
ipaddress=fabric_ip,
|
||||
username=fabric_user,
|
||||
password=fabric_pwd, port=fabric_port,
|
||||
vsan=zoning_vsan)
|
||||
nsinfo = conn.get_nameserver_info()
|
||||
LOG.debug("show fcns database info from fabric: %s",
|
||||
nsinfo)
|
||||
conn.cleanup()
|
||||
except exception.CiscoZoningCliException:
|
||||
with excutils.save_and_reraise_exception():
|
||||
LOG.exception(_LE("Error getting show fcns database "
|
||||
"info."))
|
||||
except Exception:
|
||||
msg = _("Failed to get show fcns database info.")
|
||||
LOG.exception(msg)
|
||||
raise exception.FCZoneDriverException(msg)
|
||||
visible_targets = filter(
|
||||
lambda x: x in formatted_target_list, nsinfo)
|
||||
|
||||
if visible_targets:
|
||||
LOG.info(_LI("Filtered targets for SAN is: %s"),
|
||||
{fabric_name: visible_targets})
|
||||
# getting rid of the ':' before returning
|
||||
for idx, elem in enumerate(visible_targets):
|
||||
visible_targets[idx] = six.text_type(
|
||||
visible_targets[idx]).replace(':', '')
|
||||
fabric_map[fabric_name] = visible_targets
|
||||
else:
|
||||
LOG.debug("No targets are in the fcns info for SAN %s",
|
||||
fabric_name)
|
||||
LOG.debug("Return SAN context output: %s", fabric_map)
|
||||
return fabric_map
|
||||
|
||||
def get_active_zone_set(self, fabric_ip,
|
||||
fabric_user, fabric_pwd, fabric_port,
|
||||
zoning_vsan):
|
||||
"""Gets active zoneset config for vsan."""
|
||||
cfgmap = {}
|
||||
conn = None
|
||||
try:
|
||||
LOG.debug("Southbound connector: %s",
|
||||
self.configuration.cisco_sb_connector)
|
||||
conn = importutils.import_object(
|
||||
self.configuration.cisco_sb_connector,
|
||||
ipaddress=fabric_ip, username=fabric_user,
|
||||
password=fabric_pwd, port=fabric_port, vsan=zoning_vsan)
|
||||
cfgmap = conn.get_active_zone_set()
|
||||
conn.cleanup()
|
||||
except Exception:
|
||||
msg = _("Failed to access active zoning configuration.")
|
||||
LOG.exception(msg)
|
||||
raise exception.FCZoneDriverException(msg)
|
||||
LOG.debug("Active zone set from fabric: %s", cfgmap)
|
||||
return cfgmap
|
||||
|
||||
def get_zoning_status(self, fabric_ip, fabric_user, fabric_pwd,
|
||||
fabric_port, zoning_vsan):
|
||||
"""Gets zoneset status and mode."""
|
||||
statusmap = {}
|
||||
conn = None
|
||||
try:
|
||||
LOG.debug("Southbound connector: %s",
|
||||
self.configuration.cisco_sb_connector)
|
||||
conn = importutils.import_object(
|
||||
self.configuration.cisco_sb_connector,
|
||||
ipaddress=fabric_ip, username=fabric_user,
|
||||
password=fabric_pwd, port=fabric_port, vsan=zoning_vsan)
|
||||
statusmap = conn.get_zoning_status()
|
||||
conn.cleanup()
|
||||
except Exception:
|
||||
msg = _("Failed to access zoneset status:%s")
|
||||
LOG.exception(msg)
|
||||
raise exception.FCZoneDriverException(msg)
|
||||
LOG.debug("Zoneset status from fabric: %s", statusmap)
|
||||
return statusmap
|
@ -1,32 +0,0 @@
|
||||
# (c) Copyright 2014 Cisco Systems Inc.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
#
|
||||
|
||||
|
||||
"""
|
||||
Common constants used by Cisco FC Zone Driver.
|
||||
"""
|
||||
ACTIVE_ZONE_CONFIG = 'active_zone_config'
|
||||
CFG_ZONESET = 'zoneset'
|
||||
CFG_ZONE = 'zone'
|
||||
CFG_ZONE_MEMBER = 'pwwn'
|
||||
CFG_ZONES = 'zones'
|
||||
|
||||
"""
|
||||
CLI Commands for FC zoning operations.
|
||||
"""
|
||||
GET_ACTIVE_ZONE_CFG = 'show zoneset active vsan '
|
||||
FCNS_SHOW = 'show fcns database vsan '
|
||||
GET_ZONE_STATUS = 'show zone status vsan '
|
@ -0,0 +1,4 @@
|
||||
---
|
||||
upgrade:
|
||||
- The Cisco FC Zone Manager driver is no longer supported
|
||||
and not included in-tree.
|
Loading…
Reference in New Issue
Block a user