Merge "Fixes using SSL OVSDB connection"
This commit is contained in:
commit
e6b4fe995d
@ -12,13 +12,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
|
import os
|
||||||
|
|
||||||
from debtcollector import moves
|
from debtcollector import moves
|
||||||
from oslo_config import cfg
|
from oslo_config import cfg
|
||||||
from ovs.db import idl
|
from ovs.db import idl
|
||||||
|
from ovs.stream import Stream
|
||||||
from ovsdbapp.backend.ovs_idl import connection as _connection
|
from ovsdbapp.backend.ovs_idl import connection as _connection
|
||||||
from ovsdbapp.backend.ovs_idl import idlutils
|
from ovsdbapp.backend.ovs_idl import idlutils
|
||||||
import tenacity
|
import tenacity
|
||||||
|
|
||||||
|
from neutron.agent.ovsdb.native import exceptions as ovsdb_exc
|
||||||
from neutron.agent.ovsdb.native import helpers
|
from neutron.agent.ovsdb.native import helpers
|
||||||
|
|
||||||
TransactionQueue = moves.moved_class(_connection.TransactionQueue,
|
TransactionQueue = moves.moved_class(_connection.TransactionQueue,
|
||||||
@ -26,9 +30,31 @@ TransactionQueue = moves.moved_class(_connection.TransactionQueue,
|
|||||||
Connection = moves.moved_class(_connection.Connection, 'Connection', __name__)
|
Connection = moves.moved_class(_connection.Connection, 'Connection', __name__)
|
||||||
|
|
||||||
|
|
||||||
|
def configure_ssl_conn():
|
||||||
|
"""
|
||||||
|
Configures required settings for an SSL based OVSDB client connection
|
||||||
|
:return: None
|
||||||
|
"""
|
||||||
|
|
||||||
|
req_ssl_opts = {'ssl_key_file': cfg.CONF.OVS.ssl_key_file,
|
||||||
|
'ssl_cert_file': cfg.CONF.OVS.ssl_cert_file,
|
||||||
|
'ssl_ca_cert_file': cfg.CONF.OVS.ssl_ca_cert_file}
|
||||||
|
for ssl_opt, ssl_file in req_ssl_opts.items():
|
||||||
|
if not ssl_file:
|
||||||
|
raise ovsdb_exc.OvsdbSslRequiredOptError(ssl_opt=ssl_opt)
|
||||||
|
elif not os.path.exists(ssl_file):
|
||||||
|
raise ovsdb_exc.OvsdbSslConfigNotFound(ssl_file=ssl_file)
|
||||||
|
# TODO(ihrachys): move to ovsdbapp
|
||||||
|
Stream.ssl_set_private_key_file(req_ssl_opts['ssl_key_file'])
|
||||||
|
Stream.ssl_set_certificate_file(req_ssl_opts['ssl_cert_file'])
|
||||||
|
Stream.ssl_set_ca_cert_file(req_ssl_opts['ssl_ca_cert_file'])
|
||||||
|
|
||||||
|
|
||||||
def idl_factory():
|
def idl_factory():
|
||||||
conn = cfg.CONF.OVS.ovsdb_connection
|
conn = cfg.CONF.OVS.ovsdb_connection
|
||||||
schema_name = 'Open_vSwitch'
|
schema_name = 'Open_vSwitch'
|
||||||
|
if conn.startswith('ssl:'):
|
||||||
|
configure_ssl_conn()
|
||||||
try:
|
try:
|
||||||
helper = idlutils.get_schema_helper(conn, schema_name)
|
helper = idlutils.get_schema_helper(conn, schema_name)
|
||||||
except Exception:
|
except Exception:
|
||||||
|
28
neutron/agent/ovsdb/native/exceptions.py
Normal file
28
neutron/agent/ovsdb/native/exceptions.py
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
# Copyright 2018 Red Hat, Inc.
|
||||||
|
# All Rights Reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
|
# not use this file except in compliance with the License. You may obtain
|
||||||
|
# a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
|
# License for the specific language governing permissions and limitations
|
||||||
|
# under the License.
|
||||||
|
|
||||||
|
from neutron_lib import exceptions as e
|
||||||
|
|
||||||
|
from neutron._i18n import _
|
||||||
|
|
||||||
|
|
||||||
|
class OvsdbSslConfigNotFound(e.NeutronException):
|
||||||
|
message = _("Specified SSL file %(ssl_file)s could not be found")
|
||||||
|
|
||||||
|
|
||||||
|
class OvsdbSslRequiredOptError(e.NeutronException):
|
||||||
|
message = _("Required 'ovs' group option %(ssl_opt)s not set. SSL "
|
||||||
|
"configuration options are required when using SSL "
|
||||||
|
"ovsdb_connection URI")
|
@ -35,7 +35,22 @@ API_OPTS = [
|
|||||||
'Will be used by ovsdb-client when monitoring and '
|
'Will be used by ovsdb-client when monitoring and '
|
||||||
'used for the all ovsdb commands when native '
|
'used for the all ovsdb commands when native '
|
||||||
'ovsdb_interface is enabled'
|
'ovsdb_interface is enabled'
|
||||||
))
|
)),
|
||||||
|
cfg.StrOpt('ssl_key_file',
|
||||||
|
help=_('The SSL private key file to use when interacting with '
|
||||||
|
'OVSDB. Required when using an "ssl:" prefixed '
|
||||||
|
'ovsdb_connection'
|
||||||
|
)),
|
||||||
|
cfg.StrOpt('ssl_cert_file',
|
||||||
|
help=_('The SSL certificate file to use when interacting '
|
||||||
|
'with OVSDB. Required when using an "ssl:" prefixed '
|
||||||
|
'ovsdb_connection'
|
||||||
|
)),
|
||||||
|
cfg.StrOpt('ssl_ca_cert_file',
|
||||||
|
help=_('The Certificate Authority (CA) certificate to use '
|
||||||
|
'when interacting with OVSDB. Required when using an '
|
||||||
|
'"ssl:" prefixed ovsdb_connection'
|
||||||
|
)),
|
||||||
]
|
]
|
||||||
|
|
||||||
|
|
||||||
|
@ -18,9 +18,14 @@ from ovsdbapp.backend.ovs_idl import connection
|
|||||||
from ovsdbapp.backend.ovs_idl import idlutils
|
from ovsdbapp.backend.ovs_idl import idlutils
|
||||||
|
|
||||||
from neutron.agent.ovsdb.native import connection as native_conn
|
from neutron.agent.ovsdb.native import connection as native_conn
|
||||||
|
from neutron.agent.ovsdb.native import exceptions as ovsdb_exc
|
||||||
from neutron.agent.ovsdb.native import helpers
|
from neutron.agent.ovsdb.native import helpers
|
||||||
from neutron.tests import base
|
from neutron.tests import base
|
||||||
|
|
||||||
|
SSL_KEY_FILE = '/tmp/dummy.pem'
|
||||||
|
SSL_CERT_FILE = '/tmp/dummy.crt'
|
||||||
|
SSL_CA_FILE = '/tmp/ca.crt'
|
||||||
|
|
||||||
|
|
||||||
class TestOVSNativeConnection(base.BaseTestCase):
|
class TestOVSNativeConnection(base.BaseTestCase):
|
||||||
@mock.patch.object(connection, 'threading')
|
@mock.patch.object(connection, 'threading')
|
||||||
@ -46,3 +51,59 @@ class TestOVSNativeConnection(base.BaseTestCase):
|
|||||||
conn.start()
|
conn.start()
|
||||||
self.assertEqual(3, len(mock_get_schema_helper.mock_calls))
|
self.assertEqual(3, len(mock_get_schema_helper.mock_calls))
|
||||||
mock_helper.register_all.assert_called_once_with()
|
mock_helper.register_all.assert_called_once_with()
|
||||||
|
|
||||||
|
@mock.patch.object(native_conn, 'Stream')
|
||||||
|
@mock.patch.object(connection, 'threading')
|
||||||
|
@mock.patch.object(native_conn, 'idl')
|
||||||
|
@mock.patch.object(idlutils, 'get_schema_helper')
|
||||||
|
@mock.patch.object(native_conn, 'os')
|
||||||
|
@mock.patch.object(native_conn, 'cfg')
|
||||||
|
def test_ssl_connection(self, mock_cfg, mock_os, mock_get_schema_helper,
|
||||||
|
mock_idl, mock_threading, mock_stream):
|
||||||
|
mock_os.path.isfile.return_value = True
|
||||||
|
mock_cfg.CONF.OVS.ovsdb_connection = 'ssl:127.0.0.1:6640'
|
||||||
|
mock_cfg.CONF.OVS.ssl_key_file = SSL_KEY_FILE
|
||||||
|
mock_cfg.CONF.OVS.ssl_cert_file = SSL_CERT_FILE
|
||||||
|
mock_cfg.CONF.OVS.ssl_ca_cert_file = SSL_CA_FILE
|
||||||
|
|
||||||
|
conn = connection.Connection(idl=native_conn.idl_factory(),
|
||||||
|
timeout=1)
|
||||||
|
conn.start()
|
||||||
|
mock_stream.ssl_set_private_key_file.assert_called_once_with(
|
||||||
|
SSL_KEY_FILE
|
||||||
|
)
|
||||||
|
mock_stream.ssl_set_certificate_file.assert_called_once_with(
|
||||||
|
SSL_CERT_FILE
|
||||||
|
)
|
||||||
|
mock_stream.ssl_set_ca_cert_file.assert_called_once_with(
|
||||||
|
SSL_CA_FILE
|
||||||
|
)
|
||||||
|
|
||||||
|
@mock.patch.object(native_conn, 'Stream')
|
||||||
|
@mock.patch.object(connection, 'threading')
|
||||||
|
@mock.patch.object(native_conn, 'idl')
|
||||||
|
@mock.patch.object(idlutils, 'get_schema_helper')
|
||||||
|
@mock.patch.object(native_conn, 'cfg')
|
||||||
|
def test_ssl_conn_file_missing(self, mock_cfg, mock_get_schema_helper,
|
||||||
|
mock_idl, mock_threading, mock_stream):
|
||||||
|
mock_cfg.CONF.OVS.ovsdb_connection = 'ssl:127.0.0.1:6640'
|
||||||
|
mock_cfg.CONF.OVS.ssl_key_file = SSL_KEY_FILE
|
||||||
|
mock_cfg.CONF.OVS.ssl_cert_file = SSL_CERT_FILE
|
||||||
|
mock_cfg.CONF.OVS.ssl_ca_cert_file = SSL_CA_FILE
|
||||||
|
|
||||||
|
self.assertRaises(ovsdb_exc.OvsdbSslConfigNotFound,
|
||||||
|
native_conn.idl_factory)
|
||||||
|
|
||||||
|
@mock.patch.object(native_conn, 'Stream')
|
||||||
|
@mock.patch.object(connection, 'threading')
|
||||||
|
@mock.patch.object(native_conn, 'idl')
|
||||||
|
@mock.patch.object(idlutils, 'get_schema_helper')
|
||||||
|
@mock.patch.object(native_conn, 'cfg')
|
||||||
|
def test_ssl_conn_cfg_missing(self, mock_cfg, mock_get_schema_helper,
|
||||||
|
mock_idl, mock_threading, mock_stream):
|
||||||
|
mock_cfg.CONF.OVS.ovsdb_connection = 'ssl:127.0.0.1:6640'
|
||||||
|
mock_cfg.CONF.OVS.ssl_key_file = None
|
||||||
|
mock_cfg.CONF.OVS.ssl_cert_file = None
|
||||||
|
mock_cfg.CONF.OVS.ssl_ca_cert_file = None
|
||||||
|
self.assertRaises(ovsdb_exc.OvsdbSslRequiredOptError,
|
||||||
|
native_conn.idl_factory)
|
||||||
|
@ -0,0 +1,8 @@
|
|||||||
|
---
|
||||||
|
features:
|
||||||
|
- |
|
||||||
|
Neutron agents now support SSL connections to OVSDB server.
|
||||||
|
To enable an SSL based connection, use an ``ssl`` prefixed URI for the
|
||||||
|
``ovsdb_connection`` setting. When using SSL it is also required to set
|
||||||
|
new ``ovs`` group options which include ``ssl_key_file``, ``ssl_cert_file``, and
|
||||||
|
``ssl_ca_cert_file``.
|
Loading…
Reference in New Issue
Block a user