blob: 835f9004256944f278aad7b8bb212b1e20ceedcd [file] [log] [blame]
Mark McClainb05c8762013-07-06 23:29:39 -04001# lib/neutron
2# functions - funstions specific to neutron
3
4# Dependencies:
5# ``functions`` file
6# ``DEST`` must be defined
7
8# ``stack.sh`` calls the entry points in this order:
9#
10# install_neutron
11# install_neutronclient
12# install_neutron_agent_packages
13# install_neutron_third_party
14# configure_neutron
15# init_neutron
16# configure_neutron_third_party
17# init_neutron_third_party
18# start_neutron_third_party
19# create_nova_conf_neutron
20# start_neutron_service_and_check
21# create_neutron_initial_network
22# setup_neutron_debug
23# start_neutron_agents
24#
25# ``unstack.sh`` calls the entry points in this order:
26#
27# stop_neutron
28
29# Functions in lib/neutron are classified into the following categories:
30#
31# - entry points (called from stack.sh or unstack.sh)
32# - internal functions
33# - neutron exercises
34# - 3rd party programs
35
36
37# Neutron Networking
38# ------------------
39
40# Make sure that neutron is enabled in ``ENABLED_SERVICES``. If you want
41# to run Neutron on this host, make sure that q-svc is also in
42# ``ENABLED_SERVICES``.
43#
44# If you're planning to use the Neutron openvswitch plugin, set
45# ``Q_PLUGIN`` to "openvswitch" and make sure the q-agt service is enabled
46# in ``ENABLED_SERVICES``. If you're planning to use the Neutron
47# linuxbridge plugin, set ``Q_PLUGIN`` to "linuxbridge" and make sure the
48# q-agt service is enabled in ``ENABLED_SERVICES``.
49#
50# See "Neutron Network Configuration" below for additional variables
51# that must be set in localrc for connectivity across hosts with
52# Neutron.
53#
54# With Neutron networking the NETWORK_MANAGER variable is ignored.
55#
56# To enable specific configuration options for either the Open vSwitch or
57# LinuxBridge plugin, please see the top level README file under the
58# Neutron section.
59
60# Save trace setting
61XTRACE=$(set +o | grep xtrace)
62set +o xtrace
63
64
65# Neutron Network Configuration
66# -----------------------------
67
68# Gateway and subnet defaults, in case they are not customized in localrc
69NETWORK_GATEWAY=${NETWORK_GATEWAY:-10.0.0.1}
70PUBLIC_NETWORK_GATEWAY=${PUBLIC_NETWORK_GATEWAY:-172.24.4.225}
71PRIVATE_SUBNET_NAME=${PRIVATE_SUBNET_NAME:-"private-subnet"}
72PUBLIC_SUBNET_NAME=${PUBLIC_SUBNET_NAME:-"public-subnet"}
73
74# Set up default directories
75NEUTRON_DIR=$DEST/neutron
76NEUTRONCLIENT_DIR=$DEST/python-neutronclient
77NEUTRON_AUTH_CACHE_DIR=${NEUTRON_AUTH_CACHE_DIR:-/var/cache/neutron}
78
79# Support entry points installation of console scripts
80if [[ -d $NEUTRON_DIR/bin/neutron-server ]]; then
81 NEUTRON_BIN_DIR=$NEUTRON_DIR/bin
82 else
83NEUTRON_BIN_DIR=$(get_python_exec_prefix)
84fi
85
86NEUTRON_CONF_DIR=/etc/neutron
87NEUTRON_CONF=$NEUTRON_CONF_DIR/neutron.conf
88export NEUTRON_TEST_CONFIG_FILE=${NEUTRON_TEST_CONFIG_FILE:-"$NEUTRON_CONF_DIR/debug.ini"}
89
90# Default Neutron Plugin
91Q_PLUGIN=${Q_PLUGIN:-openvswitch}
92# Default Neutron Port
93Q_PORT=${Q_PORT:-9696}
94# Default Neutron Host
95Q_HOST=${Q_HOST:-$SERVICE_HOST}
96# Default admin username
97Q_ADMIN_USERNAME=${Q_ADMIN_USERNAME:-neutron}
98# Default auth strategy
99Q_AUTH_STRATEGY=${Q_AUTH_STRATEGY:-keystone}
100# Use namespace or not
101Q_USE_NAMESPACE=${Q_USE_NAMESPACE:-True}
102# RHEL's support for namespaces requires using veths with ovs
103Q_OVS_USE_VETH=${Q_OVS_USE_VETH:-False}
104Q_USE_ROOTWRAP=${Q_USE_ROOTWRAP:-True}
105# Meta data IP
106Q_META_DATA_IP=${Q_META_DATA_IP:-$SERVICE_HOST}
107# Allow Overlapping IP among subnets
108Q_ALLOW_OVERLAPPING_IP=${Q_ALLOW_OVERLAPPING_IP:-True}
109# Use neutron-debug command
110Q_USE_DEBUG_COMMAND=${Q_USE_DEBUG_COMMAND:-False}
111# The name of the default q-l3 router
112Q_ROUTER_NAME=${Q_ROUTER_NAME:-router1}
113# List of config file names in addition to the main plugin config file
114# See _configure_neutron_common() for details about setting it up
115declare -a Q_PLUGIN_EXTRA_CONF_FILES
116
117if is_service_enabled neutron; then
118 Q_RR_CONF_FILE=$NEUTRON_CONF_DIR/rootwrap.conf
119 if [[ "$Q_USE_ROOTWRAP" == "False" ]]; then
120 Q_RR_COMMAND="sudo"
121 else
122 NEUTRON_ROOTWRAP=$(get_rootwrap_location neutron)
123 Q_RR_COMMAND="sudo $NEUTRON_ROOTWRAP $Q_RR_CONF_FILE"
124 fi
125
126 # Provider Network Configurations
127 # --------------------------------
128
129 # The following variables control the Neutron openvswitch and
130 # linuxbridge plugins' allocation of tenant networks and
131 # availability of provider networks. If these are not configured
132 # in ``localrc``, tenant networks will be local to the host (with no
133 # remote connectivity), and no physical resources will be
134 # available for the allocation of provider networks.
135
136 # To use GRE tunnels for tenant networks, set to True in
137 # ``localrc``. GRE tunnels are only supported by the openvswitch
138 # plugin, and currently only on Ubuntu.
139 ENABLE_TENANT_TUNNELS=${ENABLE_TENANT_TUNNELS:-False}
140
141 # If using GRE tunnels for tenant networks, specify the range of
142 # tunnel IDs from which tenant networks are allocated. Can be
143 # overriden in ``localrc`` in necesssary.
144 TENANT_TUNNEL_RANGES=${TENANT_TUNNEL_RANGE:-1:1000}
145
146 # To use VLANs for tenant networks, set to True in localrc. VLANs
147 # are supported by the openvswitch and linuxbridge plugins, each
148 # requiring additional configuration described below.
149 ENABLE_TENANT_VLANS=${ENABLE_TENANT_VLANS:-False}
150
151 # If using VLANs for tenant networks, set in ``localrc`` to specify
152 # the range of VLAN VIDs from which tenant networks are
153 # allocated. An external network switch must be configured to
154 # trunk these VLANs between hosts for multi-host connectivity.
155 #
156 # Example: ``TENANT_VLAN_RANGE=1000:1999``
157 TENANT_VLAN_RANGE=${TENANT_VLAN_RANGE:-}
158
159 # If using VLANs for tenant networks, or if using flat or VLAN
160 # provider networks, set in ``localrc`` to the name of the physical
161 # network, and also configure ``OVS_PHYSICAL_BRIDGE`` for the
162 # openvswitch agent or ``LB_PHYSICAL_INTERFACE`` for the linuxbridge
163 # agent, as described below.
164 #
165 # Example: ``PHYSICAL_NETWORK=default``
166 PHYSICAL_NETWORK=${PHYSICAL_NETWORK:-}
167
168 # With the openvswitch plugin, if using VLANs for tenant networks,
169 # or if using flat or VLAN provider networks, set in ``localrc`` to
170 # the name of the OVS bridge to use for the physical network. The
171 # bridge will be created if it does not already exist, but a
172 # physical interface must be manually added to the bridge as a
173 # port for external connectivity.
174 #
175 # Example: ``OVS_PHYSICAL_BRIDGE=br-eth1``
176 OVS_PHYSICAL_BRIDGE=${OVS_PHYSICAL_BRIDGE:-}
177
178 # With the linuxbridge plugin, if using VLANs for tenant networks,
179 # or if using flat or VLAN provider networks, set in ``localrc`` to
180 # the name of the network interface to use for the physical
181 # network.
182 #
183 # Example: ``LB_PHYSICAL_INTERFACE=eth1``
184 LB_PHYSICAL_INTERFACE=${LB_PHYSICAL_INTERFACE:-}
185
186 # With the openvswitch plugin, set to True in ``localrc`` to enable
187 # provider GRE tunnels when ``ENABLE_TENANT_TUNNELS`` is False.
188 #
189 # Example: ``OVS_ENABLE_TUNNELING=True``
190 OVS_ENABLE_TUNNELING=${OVS_ENABLE_TUNNELING:-$ENABLE_TENANT_TUNNELS}
191fi
192
193# Neutron plugin specific functions
194# ---------------------------------
195
196# Please refer to ``lib/neutron_plugins/README.md`` for details.
197source $TOP_DIR/lib/neutron_plugins/$Q_PLUGIN
198
199# Agent loadbalancer service plugin functions
200# -------------------------------------------
201
202# Hardcoding for 1 service plugin for now
203source $TOP_DIR/lib/neutron_plugins/services/loadbalancer
204
Nachi Ueno69b3ff62013-06-07 10:28:33 -0700205# VPN service plugin functions
206# -------------------------------------------
207# Hardcoding for 1 service plugin for now
208source $TOP_DIR/lib/neutron_plugins/services/vpn
209
Mark McClainb05c8762013-07-06 23:29:39 -0400210# Use security group or not
211if has_neutron_plugin_security_group; then
212 Q_USE_SECGROUP=${Q_USE_SECGROUP:-True}
213else
214 Q_USE_SECGROUP=False
215fi
216
217# Functions
218# ---------
219
220# configure_neutron()
221# Set common config for all neutron server and agents.
222function configure_neutron() {
223 _configure_neutron_common
224 iniset_rpc_backend neutron $NEUTRON_CONF DEFAULT
225
226 # goes before q-svc to init Q_SERVICE_PLUGIN_CLASSES
227 if is_service_enabled q-lbaas; then
228 _configure_neutron_lbaas
229 fi
Nachi Ueno69b3ff62013-06-07 10:28:33 -0700230 if is_service_enabled q-vpn; then
231 _configure_neutron_vpn
232 fi
Mark McClainb05c8762013-07-06 23:29:39 -0400233 if is_service_enabled q-svc; then
234 _configure_neutron_service
235 fi
236 if is_service_enabled q-agt; then
237 _configure_neutron_plugin_agent
238 fi
239 if is_service_enabled q-dhcp; then
240 _configure_neutron_dhcp_agent
241 fi
242 if is_service_enabled q-l3; then
243 _configure_neutron_l3_agent
244 fi
245 if is_service_enabled q-meta; then
246 _configure_neutron_metadata_agent
247 fi
248
249 _configure_neutron_debug_command
250}
251
252function create_nova_conf_neutron() {
253 iniset $NOVA_CONF DEFAULT network_api_class "nova.network.quantumv2.api.API"
254 iniset $NOVA_CONF DEFAULT quantum_admin_username "$Q_ADMIN_USERNAME"
255 iniset $NOVA_CONF DEFAULT quantum_admin_password "$SERVICE_PASSWORD"
256 iniset $NOVA_CONF DEFAULT quantum_admin_auth_url "$KEYSTONE_SERVICE_PROTOCOL://$KEYSTONE_SERVICE_HOST:$KEYSTONE_AUTH_PORT/v2.0"
257 iniset $NOVA_CONF DEFAULT quantum_auth_strategy "$Q_AUTH_STRATEGY"
258 iniset $NOVA_CONF DEFAULT quantum_admin_tenant_name "$SERVICE_TENANT_NAME"
Nachi Ueno69b3ff62013-06-07 10:28:33 -0700259 iniset $NOVA_CONF DEFAULT quantum_region_name "RegionOne"
Mark McClainb05c8762013-07-06 23:29:39 -0400260 iniset $NOVA_CONF DEFAULT quantum_url "http://$Q_HOST:$Q_PORT"
261
262 if [[ "$Q_USE_SECGROUP" == "True" ]]; then
263 LIBVIRT_FIREWALL_DRIVER=nova.virt.firewall.NoopFirewallDriver
264 iniset $NOVA_CONF DEFAULT security_group_api quantum
265 fi
266
267 # set NOVA_VIF_DRIVER and optionally set options in nova_conf
268 neutron_plugin_create_nova_conf
269
270 iniset $NOVA_CONF DEFAULT libvirt_vif_driver "$NOVA_VIF_DRIVER"
271 iniset $NOVA_CONF DEFAULT linuxnet_interface_driver "$LINUXNET_VIF_DRIVER"
272 if is_service_enabled q-meta; then
273 iniset $NOVA_CONF DEFAULT service_quantum_metadata_proxy "True"
274 fi
275}
276
277# create_neutron_accounts() - Set up common required neutron accounts
278
279# Tenant User Roles
280# ------------------------------------------------------------------
281# service neutron admin # if enabled
282
283# Migrated from keystone_data.sh
284function create_neutron_accounts() {
285
286 SERVICE_TENANT=$(keystone tenant-list | awk "/ $SERVICE_TENANT_NAME / { print \$2 }")
287 ADMIN_ROLE=$(keystone role-list | awk "/ admin / { print \$2 }")
288
289 if [[ "$ENABLED_SERVICES" =~ "q-svc" ]]; then
290 NEUTRON_USER=$(keystone user-create \
291 --name=neutron \
292 --pass="$SERVICE_PASSWORD" \
293 --tenant_id $SERVICE_TENANT \
294 --email=neutron@example.com \
295 | grep " id " | get_field 2)
296 keystone user-role-add \
297 --tenant_id $SERVICE_TENANT \
298 --user_id $NEUTRON_USER \
299 --role_id $ADMIN_ROLE
300 if [[ "$KEYSTONE_CATALOG_BACKEND" = 'sql' ]]; then
301 NEUTRON_SERVICE=$(keystone service-create \
302 --name=neutron \
303 --type=network \
304 --description="Neutron Service" \
305 | grep " id " | get_field 2)
306 keystone endpoint-create \
307 --region RegionOne \
308 --service_id $NEUTRON_SERVICE \
309 --publicurl "http://$SERVICE_HOST:9696/" \
310 --adminurl "http://$SERVICE_HOST:9696/" \
311 --internalurl "http://$SERVICE_HOST:9696/"
312 fi
313 fi
314}
315
316function create_neutron_initial_network() {
317 TENANT_ID=$(keystone tenant-list | grep " demo " | get_field 1)
318
319 # Create a small network
320 # Since neutron command is executed in admin context at this point,
321 # ``--tenant_id`` needs to be specified.
322 if is_baremetal; then
323 sudo ovs-vsctl add-port $OVS_PHYSICAL_BRIDGE $PUBLIC_INTERFACE
324 for IP in $(ip addr show dev $PUBLIC_INTERFACE | grep ' inet ' | awk '{print $2}'); do
325 sudo ip addr del $IP dev $PUBLIC_INTERFACE
326 sudo ip addr add $IP dev $OVS_PHYSICAL_BRIDGE
327 done
328 NET_ID=$(neutron net-create $PHYSICAL_NETWORK --tenant_id $TENANT_ID --provider:network_type flat --provider:physical_network "$PHYSICAL_NETWORK" | grep ' id ' | get_field 2)
329 SUBNET_ID=$(neutron subnet-create --tenant_id $TENANT_ID --ip_version 4 ${ALLOCATION_POOL:+--allocation-pool $ALLOCATION_POOL} --gateway $NETWORK_GATEWAY --name $PRIVATE_SUBNET_NAME $NET_ID $FIXED_RANGE | grep ' id ' | get_field 2)
330 sudo ifconfig $OVS_PHYSICAL_BRIDGE up
331 else
332 NET_ID=$(neutron net-create --tenant_id $TENANT_ID "$PRIVATE_NETWORK_NAME" | grep ' id ' | get_field 2)
333 SUBNET_ID=$(neutron subnet-create --tenant_id $TENANT_ID --ip_version 4 --gateway $NETWORK_GATEWAY --name $PRIVATE_SUBNET_NAME $NET_ID $FIXED_RANGE | grep ' id ' | get_field 2)
334 fi
335
336 if [[ "$Q_L3_ENABLED" == "True" ]]; then
337 # Create a router, and add the private subnet as one of its interfaces
338 if [[ "$Q_L3_ROUTER_PER_TENANT" == "True" ]]; then
339 # create a tenant-owned router.
340 ROUTER_ID=$(neutron router-create --tenant_id $TENANT_ID $Q_ROUTER_NAME | grep ' id ' | get_field 2)
341 else
342 # Plugin only supports creating a single router, which should be admin owned.
343 ROUTER_ID=$(neutron router-create $Q_ROUTER_NAME | grep ' id ' | get_field 2)
344 fi
345 neutron router-interface-add $ROUTER_ID $SUBNET_ID
346 # Create an external network, and a subnet. Configure the external network as router gw
347 EXT_NET_ID=$(neutron net-create "$PUBLIC_NETWORK_NAME" -- --router:external=True | grep ' id ' | get_field 2)
348 EXT_GW_IP=$(neutron subnet-create --ip_version 4 ${Q_FLOATING_ALLOCATION_POOL:+--allocation-pool $Q_FLOATING_ALLOCATION_POOL} --gateway $PUBLIC_NETWORK_GATEWAY --name $PUBLIC_SUBNET_NAME $EXT_NET_ID $FLOATING_RANGE -- --enable_dhcp=False | grep 'gateway_ip' | get_field 2)
349 neutron router-gateway-set $ROUTER_ID $EXT_NET_ID
350
351 if is_service_enabled q-l3; then
352 # logic is specific to using the l3-agent for l3
353 if is_neutron_ovs_base_plugin && [[ "$Q_USE_NAMESPACE" = "True" ]]; then
354 CIDR_LEN=${FLOATING_RANGE#*/}
355 sudo ip addr add $EXT_GW_IP/$CIDR_LEN dev $PUBLIC_BRIDGE
356 sudo ip link set $PUBLIC_BRIDGE up
357 ROUTER_GW_IP=`neutron port-list -c fixed_ips -c device_owner | grep router_gateway | awk -F '"' '{ print $8; }'`
358 sudo route add -net $FIXED_RANGE gw $ROUTER_GW_IP
359 fi
360 if [[ "$Q_USE_NAMESPACE" == "False" ]]; then
361 # Explicitly set router id in l3 agent configuration
362 iniset $Q_L3_CONF_FILE DEFAULT router_id $ROUTER_ID
363 fi
364 fi
365 fi
366}
367
368# init_neutron() - Initialize databases, etc.
369function init_neutron() {
370 :
371}
372
373# install_neutron() - Collect source and prepare
374function install_neutron() {
375 git_clone $NEUTRON_REPO $NEUTRON_DIR $NEUTRON_BRANCH
376 setup_develop $NEUTRON_DIR
377}
378
379# install_neutronclient() - Collect source and prepare
380function install_neutronclient() {
381 git_clone $NEUTRONCLIENT_REPO $NEUTRONCLIENT_DIR $NEUTRONCLIENT_BRANCH
382 setup_develop $NEUTRONCLIENT_DIR
383}
384
385# install_neutron_agent_packages() - Collect source and prepare
386function install_neutron_agent_packages() {
387 # install packages that are specific to plugin agent(s)
388 if is_service_enabled q-agt q-dhcp q-l3; then
389 neutron_plugin_install_agent_packages
390 fi
391
392 if is_service_enabled q-lbaas; then
393 neutron_agent_lbaas_install_agent_packages
394 fi
395}
396
397# Start running processes, including screen
398function start_neutron_service_and_check() {
399 # build config-file options
400 local cfg_file
401 local CFG_FILE_OPTIONS="--config-file $NEUTRON_CONF --config-file /$Q_PLUGIN_CONF_FILE"
402 for cfg_file in ${Q_PLUGIN_EXTRA_CONF_FILES[@]}; do
403 CFG_FILE_OPTIONS+=" --config-file /$cfg_file"
404 done
405 # Start the Neutron service
406 screen_it q-svc "cd $NEUTRON_DIR && python $NEUTRON_BIN_DIR/neutron-server $CFG_FILE_OPTIONS"
407 echo "Waiting for Neutron to start..."
408 if ! timeout $SERVICE_TIMEOUT sh -c "while ! http_proxy= wget -q -O- http://$Q_HOST:$Q_PORT; do sleep 1; done"; then
409 die $LINENO "Neutron did not start"
410 fi
411}
412
413# Start running processes, including screen
414function start_neutron_agents() {
415 # Start up the neutron agents if enabled
416 screen_it q-agt "cd $NEUTRON_DIR && python $AGENT_BINARY --config-file $NEUTRON_CONF --config-file /$Q_PLUGIN_CONF_FILE"
417 screen_it q-dhcp "cd $NEUTRON_DIR && python $AGENT_DHCP_BINARY --config-file $NEUTRON_CONF --config-file=$Q_DHCP_CONF_FILE"
Nachi Ueno584750f2013-07-15 18:22:21 -0700418
419 if is_service_enabled q-vpn; then
420 screen_it q-vpn "cd $NEUTRON_DIR && $AGENT_VPN_BINARY --config-file $NEUTRON_CONF --config-file=$Q_L3_CONF_FILE"
421 else
422 screen_it q-l3 "cd $NEUTRON_DIR && python $AGENT_L3_BINARY --config-file $NEUTRON_CONF --config-file=$Q_L3_CONF_FILE"
423 fi
Mark McClainb05c8762013-07-06 23:29:39 -0400424 screen_it q-meta "cd $NEUTRON_DIR && python $AGENT_META_BINARY --config-file $NEUTRON_CONF --config-file=$Q_META_CONF_FILE"
425
426 if [ "$VIRT_DRIVER" = 'xenserver' ]; then
427 # For XenServer, start an agent for the domU openvswitch
428 screen_it q-domua "cd $NEUTRON_DIR && python $AGENT_BINARY --config-file $NEUTRON_CONF --config-file /$Q_PLUGIN_CONF_FILE.domU"
429 fi
430
431 if is_service_enabled q-lbaas; then
432 screen_it q-lbaas "cd $NEUTRON_DIR && python $AGENT_LBAAS_BINARY --config-file $NEUTRON_CONF --config-file=$LBAAS_AGENT_CONF_FILENAME"
433 fi
434}
435
436# stop_neutron() - Stop running processes (non-screen)
437function stop_neutron() {
438 if is_service_enabled q-dhcp; then
439 pid=$(ps aux | awk '/[d]nsmasq.+interface=(tap|ns-)/ { print $2 }')
440 [ ! -z "$pid" ] && sudo kill -9 $pid
441 fi
442 if is_service_enabled q-meta; then
443 pid=$(ps aux | awk '/neutron-ns-metadata-proxy/ { print $2 }')
444 [ ! -z "$pid" ] && sudo kill -9 $pid
445 fi
446}
447
448# cleanup_neutron() - Remove residual data files, anything left over from previous
449# runs that a clean run would need to clean up
450function cleanup_neutron() {
451 if is_neutron_ovs_base_plugin; then
452 neutron_ovs_base_cleanup
453 fi
454
455 # delete all namespaces created by neutron
456 for ns in $(sudo ip netns list | grep -o -e qdhcp-[0-9a-f\-]* -e qrouter-[0-9a-f\-]*); do
457 sudo ip netns delete ${ns}
458 done
459}
460
461# _configure_neutron_common()
462# Set common config for all neutron server and agents.
463# This MUST be called before other ``_configure_neutron_*`` functions.
464function _configure_neutron_common() {
465 # Put config files in ``NEUTRON_CONF_DIR`` for everyone to find
466 if [[ ! -d $NEUTRON_CONF_DIR ]]; then
467 sudo mkdir -p $NEUTRON_CONF_DIR
468 fi
469 sudo chown $STACK_USER $NEUTRON_CONF_DIR
470
471 cp $NEUTRON_DIR/etc/neutron.conf $NEUTRON_CONF
472
473 # Set plugin-specific variables ``Q_DB_NAME``, ``Q_PLUGIN_CLASS``.
474 # For main plugin config file, set ``Q_PLUGIN_CONF_PATH``, ``Q_PLUGIN_CONF_FILENAME``.
475 # For addition plugin config files, set ``Q_PLUGIN_EXTRA_CONF_PATH``,
476 # ``Q_PLUGIN_EXTRA_CONF_FILES``. For example:
477 # ``Q_PLUGIN_EXTRA_CONF_FILES=(file1, file2)``
478 neutron_plugin_configure_common
479
480 if [[ $Q_PLUGIN_CONF_PATH == '' || $Q_PLUGIN_CONF_FILENAME == '' || $Q_PLUGIN_CLASS == '' ]]; then
481 die $LINENO "Neutron plugin not set.. exiting"
482 fi
483
484 # If needed, move config file from ``$NEUTRON_DIR/etc/neutron`` to ``NEUTRON_CONF_DIR``
485 mkdir -p /$Q_PLUGIN_CONF_PATH
486 Q_PLUGIN_CONF_FILE=$Q_PLUGIN_CONF_PATH/$Q_PLUGIN_CONF_FILENAME
487 cp $NEUTRON_DIR/$Q_PLUGIN_CONF_FILE /$Q_PLUGIN_CONF_FILE
488
489 iniset /$Q_PLUGIN_CONF_FILE database connection `database_connection_url $Q_DB_NAME`
490 iniset $NEUTRON_CONF DEFAULT state_path $DATA_DIR/neutron
491
492 # If addition config files are set, make sure their path name is set as well
493 if [[ ${#Q_PLUGIN_EXTRA_CONF_FILES[@]} > 0 && $Q_PLUGIN_EXTRA_CONF_PATH == '' ]]; then
494 die $LINENO "Neutron additional plugin config not set.. exiting"
495 fi
496
497 # If additional config files exist, copy them over to neutron configuration
498 # directory
499 if [[ $Q_PLUGIN_EXTRA_CONF_PATH != '' ]]; then
500 mkdir -p /$Q_PLUGIN_EXTRA_CONF_PATH
501 local f
502 for (( f=0; $f < ${#Q_PLUGIN_EXTRA_CONF_FILES[@]}; f+=1 )); do
503 Q_PLUGIN_EXTRA_CONF_FILES[$f]=$Q_PLUGIN_EXTRA_CONF_PATH/${Q_PLUGIN_EXTRA_CONF_FILES[$f]}
504 cp $NEUTRON_DIR/${Q_PLUGIN_EXTRA_CONF_FILES[$f]} /${Q_PLUGIN_EXTRA_CONF_FILES[$f]}
505 done
506 fi
507
508 _neutron_setup_rootwrap
509}
510
511function _configure_neutron_debug_command() {
512 if [[ "$Q_USE_DEBUG_COMMAND" != "True" ]]; then
513 return
514 fi
515
516 cp $NEUTRON_DIR/etc/l3_agent.ini $NEUTRON_TEST_CONFIG_FILE
517
518 iniset $NEUTRON_TEST_CONFIG_FILE DEFAULT verbose False
519 iniset $NEUTRON_TEST_CONFIG_FILE DEFAULT debug False
520 iniset $NEUTRON_TEST_CONFIG_FILE DEFAULT use_namespaces $Q_USE_NAMESPACE
521 iniset $NEUTRON_TEST_CONFIG_FILE DEFAULT root_helper "$Q_RR_COMMAND"
522 # Intermediate fix until Neutron patch lands and then line above will
523 # be cleaned.
524 iniset $NEUTRON_TEST_CONFIG_FILE agent root_helper "$Q_RR_COMMAND"
525
526 _neutron_setup_keystone $NEUTRON_TEST_CONFIG_FILE DEFAULT set_auth_url
527 _neutron_setup_interface_driver $NEUTRON_TEST_CONFIG_FILE
528
529 neutron_plugin_configure_debug_command
530}
531
532function _configure_neutron_dhcp_agent() {
533 AGENT_DHCP_BINARY="$NEUTRON_BIN_DIR/neutron-dhcp-agent"
534 Q_DHCP_CONF_FILE=$NEUTRON_CONF_DIR/dhcp_agent.ini
535
536 cp $NEUTRON_DIR/etc/dhcp_agent.ini $Q_DHCP_CONF_FILE
537
538 iniset $Q_DHCP_CONF_FILE DEFAULT verbose True
539 iniset $Q_DHCP_CONF_FILE DEFAULT debug True
540 iniset $Q_DHCP_CONF_FILE DEFAULT use_namespaces $Q_USE_NAMESPACE
541 iniset $Q_DHCP_CONF_FILE DEFAULT root_helper "$Q_RR_COMMAND"
542
543 _neutron_setup_keystone $Q_DHCP_CONF_FILE DEFAULT set_auth_url
544 _neutron_setup_interface_driver $Q_DHCP_CONF_FILE
545
546 neutron_plugin_configure_dhcp_agent
547}
548
549function _configure_neutron_l3_agent() {
550 Q_L3_ENABLED=True
551 # for l3-agent, only use per tenant router if we have namespaces
552 Q_L3_ROUTER_PER_TENANT=$Q_USE_NAMESPACE
Nachi Ueno69b3ff62013-06-07 10:28:33 -0700553
554 AGENT_L3_BINARY=${AGENT_L3_BINARY:-"$NEUTRON_BIN_DIR/neutron-l3-agent"}
Mark McClainb05c8762013-07-06 23:29:39 -0400555 Q_L3_CONF_FILE=$NEUTRON_CONF_DIR/l3_agent.ini
556
557 cp $NEUTRON_DIR/etc/l3_agent.ini $Q_L3_CONF_FILE
558
559 iniset $Q_L3_CONF_FILE DEFAULT verbose True
560 iniset $Q_L3_CONF_FILE DEFAULT debug True
561 iniset $Q_L3_CONF_FILE DEFAULT use_namespaces $Q_USE_NAMESPACE
562 iniset $Q_L3_CONF_FILE DEFAULT root_helper "$Q_RR_COMMAND"
563
564 _neutron_setup_keystone $Q_L3_CONF_FILE DEFAULT set_auth_url
565 _neutron_setup_interface_driver $Q_L3_CONF_FILE
566
567 neutron_plugin_configure_l3_agent
568}
569
570function _configure_neutron_metadata_agent() {
571 AGENT_META_BINARY="$NEUTRON_BIN_DIR/neutron-metadata-agent"
572 Q_META_CONF_FILE=$NEUTRON_CONF_DIR/metadata_agent.ini
573
574 cp $NEUTRON_DIR/etc/metadata_agent.ini $Q_META_CONF_FILE
575
576 iniset $Q_META_CONF_FILE DEFAULT verbose True
577 iniset $Q_META_CONF_FILE DEFAULT debug True
578 iniset $Q_META_CONF_FILE DEFAULT nova_metadata_ip $Q_META_DATA_IP
579 iniset $Q_META_CONF_FILE DEFAULT root_helper "$Q_RR_COMMAND"
580
581 _neutron_setup_keystone $Q_META_CONF_FILE DEFAULT set_auth_url
582}
583
584function _configure_neutron_lbaas() {
585 neutron_agent_lbaas_configure_common
586 neutron_agent_lbaas_configure_agent
587}
588
Nachi Ueno69b3ff62013-06-07 10:28:33 -0700589function _configure_neutron_vpn()
590{
591 neutron_vpn_install_agent_packages
592 neutron_vpn_configure_common
Nachi Ueno69b3ff62013-06-07 10:28:33 -0700593}
594
Mark McClainb05c8762013-07-06 23:29:39 -0400595# _configure_neutron_plugin_agent() - Set config files for neutron plugin agent
596# It is called when q-agt is enabled.
597function _configure_neutron_plugin_agent() {
598 # Specify the default root helper prior to agent configuration to
599 # ensure that an agent's configuration can override the default
600 iniset /$Q_PLUGIN_CONF_FILE agent root_helper "$Q_RR_COMMAND"
601 iniset $NEUTRON_CONF DEFAULT verbose True
602 iniset $NEUTRON_CONF DEFAULT debug True
603
604 # Configure agent for plugin
605 neutron_plugin_configure_plugin_agent
606}
607
608# _configure_neutron_service() - Set config files for neutron service
609# It is called when q-svc is enabled.
610function _configure_neutron_service() {
611 Q_API_PASTE_FILE=$NEUTRON_CONF_DIR/api-paste.ini
612 Q_POLICY_FILE=$NEUTRON_CONF_DIR/policy.json
613
614 cp $NEUTRON_DIR/etc/api-paste.ini $Q_API_PASTE_FILE
615 cp $NEUTRON_DIR/etc/policy.json $Q_POLICY_FILE
616
617 if is_service_enabled $DATABASE_BACKENDS; then
618 recreate_database $Q_DB_NAME utf8
619 else
620 die $LINENO "A database must be enabled in order to use the $Q_PLUGIN Neutron plugin."
621 fi
622
623 # Update either configuration file with plugin
624 iniset $NEUTRON_CONF DEFAULT core_plugin $Q_PLUGIN_CLASS
625
626 if [[ $Q_SERVICE_PLUGIN_CLASSES != '' ]]; then
627 iniset $NEUTRON_CONF DEFAULT service_plugins $Q_SERVICE_PLUGIN_CLASSES
628 fi
629
630 iniset $NEUTRON_CONF DEFAULT verbose True
631 iniset $NEUTRON_CONF DEFAULT debug True
632 iniset $NEUTRON_CONF DEFAULT policy_file $Q_POLICY_FILE
633 iniset $NEUTRON_CONF DEFAULT allow_overlapping_ips $Q_ALLOW_OVERLAPPING_IP
634
635 iniset $NEUTRON_CONF DEFAULT auth_strategy $Q_AUTH_STRATEGY
636 _neutron_setup_keystone $NEUTRON_CONF keystone_authtoken
637
Simon Pasquierca96b0a2013-07-09 16:59:12 +0200638 # Define extra "DEFAULT" configuration options when q-svc is configured by
639 # defining the array ``Q_SRV_EXTRA_DEFAULT_OPTS``.
640 # For Example: ``Q_SRV_EXTRA_DEFAULT_OPTS=(foo=true bar=2)``
641 for I in "${Q_SRV_EXTRA_DEFAULT_OPTS[@]}"; do
642 # Replace the first '=' with ' ' for iniset syntax
643 iniset $NEUTRON_CONF DEFAULT ${I/=/ }
644 done
645
Mark McClainb05c8762013-07-06 23:29:39 -0400646 # Configure plugin
647 neutron_plugin_configure_service
648}
649
650# Utility Functions
651#------------------
652
653# _neutron_setup_rootwrap() - configure Neutron's rootwrap
654function _neutron_setup_rootwrap() {
655 if [[ "$Q_USE_ROOTWRAP" == "False" ]]; then
656 return
657 fi
658 # Deploy new rootwrap filters files (owned by root).
659 # Wipe any existing ``rootwrap.d`` files first
660 Q_CONF_ROOTWRAP_D=$NEUTRON_CONF_DIR/rootwrap.d
661 if [[ -d $Q_CONF_ROOTWRAP_D ]]; then
662 sudo rm -rf $Q_CONF_ROOTWRAP_D
663 fi
664 # Deploy filters to ``$NEUTRON_CONF_DIR/rootwrap.d``
665 mkdir -p -m 755 $Q_CONF_ROOTWRAP_D
666 cp -pr $NEUTRON_DIR/etc/neutron/rootwrap.d/* $Q_CONF_ROOTWRAP_D/
667 sudo chown -R root:root $Q_CONF_ROOTWRAP_D
668 sudo chmod 644 $Q_CONF_ROOTWRAP_D/*
669 # Set up ``rootwrap.conf``, pointing to ``$NEUTRON_CONF_DIR/rootwrap.d``
670 # location moved in newer versions, prefer new location
671 if test -r $NEUTRON_DIR/etc/neutron/rootwrap.conf; then
672 sudo cp -p $NEUTRON_DIR/etc/neutron/rootwrap.conf $Q_RR_CONF_FILE
673 else
674 sudo cp -p $NEUTRON_DIR/etc/rootwrap.conf $Q_RR_CONF_FILE
675 fi
676 sudo sed -e "s:^filters_path=.*$:filters_path=$Q_CONF_ROOTWRAP_D:" -i $Q_RR_CONF_FILE
677 sudo chown root:root $Q_RR_CONF_FILE
678 sudo chmod 0644 $Q_RR_CONF_FILE
679 # Specify ``rootwrap.conf`` as first parameter to neutron-rootwrap
680 ROOTWRAP_SUDOER_CMD="$NEUTRON_ROOTWRAP $Q_RR_CONF_FILE *"
681
682 # Set up the rootwrap sudoers for neutron
683 TEMPFILE=`mktemp`
684 echo "$USER ALL=(root) NOPASSWD: $ROOTWRAP_SUDOER_CMD" >$TEMPFILE
685 chmod 0440 $TEMPFILE
686 sudo chown root:root $TEMPFILE
687 sudo mv $TEMPFILE /etc/sudoers.d/neutron-rootwrap
688
689 # Update the root_helper
690 iniset $NEUTRON_CONF agent root_helper "$Q_RR_COMMAND"
691}
692
693# Configures keystone integration for neutron service and agents
694function _neutron_setup_keystone() {
695 local conf_file=$1
696 local section=$2
697 local use_auth_url=$3
698 if [[ -n $use_auth_url ]]; then
699 iniset $conf_file $section auth_url "$KEYSTONE_SERVICE_PROTOCOL://$KEYSTONE_AUTH_HOST:$KEYSTONE_AUTH_PORT/v2.0"
700 else
701 iniset $conf_file $section auth_host $KEYSTONE_SERVICE_HOST
702 iniset $conf_file $section auth_port $KEYSTONE_AUTH_PORT
703 iniset $conf_file $section auth_protocol $KEYSTONE_SERVICE_PROTOCOL
704 fi
705 iniset $conf_file $section admin_tenant_name $SERVICE_TENANT_NAME
706 iniset $conf_file $section admin_user $Q_ADMIN_USERNAME
707 iniset $conf_file $section admin_password $SERVICE_PASSWORD
708 iniset $conf_file $section signing_dir $NEUTRON_AUTH_CACHE_DIR
709 # Create cache dir
710 sudo mkdir -p $NEUTRON_AUTH_CACHE_DIR
711 sudo chown $STACK_USER $NEUTRON_AUTH_CACHE_DIR
712 rm -f $NEUTRON_AUTH_CACHE_DIR/*
713}
714
715function _neutron_setup_interface_driver() {
716
717 # ovs_use_veth needs to be set before the plugin configuration
718 # occurs to allow plugins to override the setting.
719 iniset $1 DEFAULT ovs_use_veth $Q_OVS_USE_VETH
720
721 neutron_plugin_setup_interface_driver $1
722}
723
724# Functions for Neutron Exercises
725#--------------------------------
726
727function delete_probe() {
728 local from_net="$1"
729 net_id=`_get_net_id $from_net`
730 probe_id=`neutron-debug --os-tenant-name admin --os-username admin --os-password $ADMIN_PASSWORD probe-list -c id -c network_id | grep $net_id | awk '{print $2}'`
731 neutron-debug --os-tenant-name admin --os-username admin probe-delete $probe_id
732}
733
734function setup_neutron_debug() {
735 if [[ "$Q_USE_DEBUG_COMMAND" == "True" ]]; then
736 public_net_id=`_get_net_id $PUBLIC_NETWORK_NAME`
737 neutron-debug --os-tenant-name admin --os-username admin --os-password $ADMIN_PASSWORD probe-create --device-owner compute $public_net_id
738 private_net_id=`_get_net_id $PRIVATE_NETWORK_NAME`
739 neutron-debug --os-tenant-name admin --os-username admin --os-password $ADMIN_PASSWORD probe-create --device-owner compute $private_net_id
740 fi
741}
742
743function teardown_neutron_debug() {
744 delete_probe $PUBLIC_NETWORK_NAME
745 delete_probe $PRIVATE_NETWORK_NAME
746}
747
748function _get_net_id() {
749 neutron --os-tenant-name admin --os-username admin --os-password $ADMIN_PASSWORD net-list | grep $1 | awk '{print $2}'
750}
751
752function _get_probe_cmd_prefix() {
753 local from_net="$1"
754 net_id=`_get_net_id $from_net`
755 probe_id=`neutron-debug --os-tenant-name admin --os-username admin --os-password $ADMIN_PASSWORD probe-list -c id -c network_id | grep $net_id | awk '{print $2}' | head -n 1`
756 echo "$Q_RR_COMMAND ip netns exec qprobe-$probe_id"
757}
758
759function _ping_check_neutron() {
760 local from_net=$1
761 local ip=$2
762 local timeout_sec=$3
763 local expected=${4:-"True"}
764 local check_command=""
765 probe_cmd=`_get_probe_cmd_prefix $from_net`
766 if [[ "$expected" = "True" ]]; then
767 check_command="while ! $probe_cmd ping -w 1 -c 1 $ip; do sleep 1; done"
768 else
769 check_command="while $probe_cmd ping -w 1 -c 1 $ip; do sleep 1; done"
770 fi
771 if ! timeout $timeout_sec sh -c "$check_command"; then
772 if [[ "$expected" = "True" ]]; then
773 die $LINENO "[Fail] Couldn't ping server"
774 else
775 die $LINENO "[Fail] Could ping server"
776 fi
777 fi
778}
779
780# ssh check
781function _ssh_check_neutron() {
782 local from_net=$1
783 local key_file=$2
784 local ip=$3
785 local user=$4
786 local timeout_sec=$5
787 local probe_cmd = ""
788 probe_cmd=`_get_probe_cmd_prefix $from_net`
789 if ! timeout $timeout_sec sh -c "while ! $probe_cmd ssh -o StrictHostKeyChecking=no -i $key_file ${user}@$ip echo success; do sleep 1; done"; then
790 die $LINENO "server didn't become ssh-able!"
791 fi
792}
793
794# Neutron 3rd party programs
795#---------------------------
796
797# please refer to ``lib/neutron_thirdparty/README.md`` for details
798NEUTRON_THIRD_PARTIES=""
799for f in $TOP_DIR/lib/neutron_thirdparty/*; do
800 third_party=$(basename $f)
801 if is_service_enabled $third_party; then
802 source $TOP_DIR/lib/neutron_thirdparty/$third_party
803 NEUTRON_THIRD_PARTIES="$NEUTRON_THIRD_PARTIES,$third_party"
804 fi
805done
806
807function _neutron_third_party_do() {
808 for third_party in ${NEUTRON_THIRD_PARTIES//,/ }; do
809 ${1}_${third_party}
810 done
811}
812
813# configure_neutron_third_party() - Set config files, create data dirs, etc
814function configure_neutron_third_party() {
815 _neutron_third_party_do configure
816}
817
818# init_neutron_third_party() - Initialize databases, etc.
819function init_neutron_third_party() {
820 _neutron_third_party_do init
821}
822
823# install_neutron_third_party() - Collect source and prepare
824function install_neutron_third_party() {
825 _neutron_third_party_do install
826}
827
828# start_neutron_third_party() - Start running processes, including screen
829function start_neutron_third_party() {
830 _neutron_third_party_do start
831}
832
833# stop_neutron_third_party - Stop running processes (non-screen)
834function stop_neutron_third_party() {
835 _neutron_third_party_do stop
836}
837
838
839# Restore xtrace
840$XTRACE
841
842# Local variables:
843# mode: shell-script
844# End: