3 # jose.lausuch@ericsson.com
4 # valentin.boucher@orange.com
5 # All rights reserved. This program and the accompanying materials
6 # are made available under the terms of the Apache License, Version 2.0
7 # which accompanies this distribution, and is available at
8 # http://www.apache.org/licenses/LICENSE-2.0
17 from cinderclient import client as cinderclient
18 import functest.utils.functest_logger as ft_logger
19 import functest.utils.functest_utils as ft_utils
20 from glanceclient import client as glanceclient
21 from keystoneclient.v2_0 import client as keystoneclient
22 from neutronclient.v2_0 import client as neutronclient
23 from novaclient import client as novaclient
25 logger = ft_logger.Logger("openstack_utils").getLogger()
28 # *********************************************
30 # *********************************************
31 class MissingEnvVar(Exception):
33 def __init__(self, var):
37 return str.format("Please set the mandatory env var: {}", self.var)
40 def check_credentials():
42 Check if the OpenStack credentials (openrc) are sourced
44 env_vars = ['OS_AUTH_URL', 'OS_USERNAME', 'OS_PASSWORD', 'OS_TENANT_NAME']
45 return all(map(lambda v: v in os.environ and os.environ[v], env_vars))
48 def get_credentials(service):
49 """Returns a creds dictionary filled with the following keys:
51 * password/api_key (depending on the service)
52 * tenant_name/project_id (depending on the service)
54 :param service: a string indicating the name of the service
55 requesting the credentials.
59 keystone_api_version = os.getenv('OS_IDENTITY_API_VERSION')
60 if (keystone_api_version is None or
61 keystone_api_version == '2'):
63 tenant_env = 'OS_TENANT_NAME'
64 tenant = 'tenant_name'
67 tenant_env = 'OS_PROJECT_NAME'
68 tenant = 'project_name'
70 # Check that the env vars exists:
71 envvars = ('OS_USERNAME', 'OS_PASSWORD', 'OS_AUTH_URL', tenant_env)
72 for envvar in envvars:
73 if os.getenv(envvar) is None:
74 raise MissingEnvVar(envvar)
76 # Unfortunately, each of the OpenStack client will request slightly
77 # different entries in their credentials dict.
78 if service.lower() in ("nova", "cinder"):
84 # The most common way to pass these info to the script is to do it through
85 # environment variables.
87 "username": os.environ.get("OS_USERNAME"),
88 password: os.environ.get("OS_PASSWORD"),
89 "auth_url": os.environ.get("OS_AUTH_URL"),
90 tenant: os.environ.get(tenant_env)
93 if os.getenv('OS_USER_DOMAIN_NAME') is not None:
95 "user_domain_name": os.getenv('OS_USER_DOMAIN_NAME')
97 if os.getenv('OS_PROJECT_DOMAIN_NAME') is not None:
99 "project_domain_name": os.getenv('OS_PROJECT_DOMAIN_NAME')
102 if os.getenv('OS_ENDPOINT_TYPE') is not None:
104 "endpoint_type": os.environ.get("OS_ENDPOINT_TYPE")
106 if os.getenv('OS_REGION_NAME') is not None:
108 "region_name": os.environ.get("OS_REGION_NAME")
110 cacert = os.environ.get("OS_CACERT")
111 if cacert is not None:
112 # each openstack client uses differnt kwargs for this
113 creds.update({"cacert": cacert,
115 "https_ca_cert": cacert,
116 "https_cacert": cacert,
118 creds.update({"insecure": "True", "https_insecure": "True"})
119 if not os.path.isfile(cacert):
120 logger.info("WARNING: The 'OS_CACERT' environment variable is "
121 "set to %s but the file does not exist." % cacert)
125 def source_credentials(rc_file):
126 pipe = subprocess.Popen(". %s; env" % rc_file, stdout=subprocess.PIPE,
128 output = pipe.communicate()[0]
129 env = dict((line.split("=", 1) for line in output.splitlines()))
130 os.environ.update(env)
134 def get_credentials_for_rally():
135 creds = get_credentials("keystone")
136 keystone_api_version = os.getenv('OS_IDENTITY_API_VERSION')
137 if (keystone_api_version is None or
138 keystone_api_version == '2'):
139 admin_keys = ['username', 'tenant_name', 'password']
141 admin_keys = ['username', 'password', 'user_domain_name',
142 'project_name', 'project_domain_name']
144 endpoint_types = [('internalURL', 'internal'),
145 ('publicURL', 'public'), ('adminURL', 'admin')]
146 if 'endpoint_type' in creds.keys():
147 for k, v in endpoint_types:
148 if creds['endpoint_type'] == k:
149 creds['endpoint_type'] = v
150 rally_conf = {"type": "ExistingCloud", "admin": {}}
152 if key in admin_keys:
153 rally_conf['admin'][key] = creds[key]
155 rally_conf[key] = creds[key]
159 # *********************************************
161 # *********************************************
162 def get_keystone_client():
163 creds_keystone = get_credentials("keystone")
164 return keystoneclient.Client(**creds_keystone)
167 def get_nova_client():
168 creds_nova = get_credentials("nova")
169 return novaclient.Client('2', **creds_nova)
172 def get_cinder_client():
173 creds_cinder = get_credentials("cinder")
174 creds_cinder.update({
175 "service_type": "volume"
177 return cinderclient.Client('2', **creds_cinder)
180 def get_neutron_client():
181 creds_neutron = get_credentials("neutron")
182 return neutronclient.Client(**creds_neutron)
185 def get_glance_client():
186 keystone_client = get_keystone_client()
187 glance_endpoint_type = 'publicURL'
188 os_endpoint_type = os.getenv('OS_ENDPOINT_TYPE')
189 if os_endpoint_type is not None:
190 glance_endpoint_type = os_endpoint_type
191 glance_endpoint = keystone_client.service_catalog.url_for(
192 service_type='image', endpoint_type=glance_endpoint_type)
193 return glanceclient.Client(1, glance_endpoint,
194 token=keystone_client.auth_token)
197 # *********************************************
199 # *********************************************
200 def get_instances(nova_client):
202 instances = nova_client.servers.list(search_opts={'all_tenants': 1})
205 logger.error("Error [get_instances(nova_client)]: %s" % e)
209 def get_instance_status(nova_client, instance):
211 instance = nova_client.servers.get(instance.id)
212 return instance.status
214 logger.error("Error [get_instance_status(nova_client)]: %s" % e)
218 def get_instance_by_name(nova_client, instance_name):
220 instance = nova_client.servers.find(name=instance_name)
223 logger.error("Error [get_instance_by_name(nova_client, '%s')]: %s"
224 % (instance_name, e))
228 def get_flavor_id(nova_client, flavor_name):
229 flavors = nova_client.flavors.list(detailed=True)
232 if f.name == flavor_name:
238 def get_flavor_id_by_ram_range(nova_client, min_ram, max_ram):
239 flavors = nova_client.flavors.list(detailed=True)
242 if min_ram <= f.ram and f.ram <= max_ram:
248 def create_flavor(nova_client, flavor_name, ram, disk, vcpus, public=True):
250 flavor = nova_client.flavors.create(
251 flavor_name, ram, vcpus, disk, is_public=public)
253 extra_specs = ft_utils.get_functest_config(
254 'general.flavor_extra_specs')
255 flavor.set_keys(extra_specs)
257 # flavor extra specs are not configured, therefore skip the update
261 logger.error("Error [create_flavor(nova_client, '%s', '%s', '%s', "
262 "'%s')]: %s" % (flavor_name, ram, disk, vcpus, e))
267 def get_or_create_flavor(flavor_name, ram, disk, vcpus, public=True):
268 flavor_exists = False
269 nova_client = get_nova_client()
271 flavor_id = get_flavor_id(nova_client, flavor_name)
273 logger.info("Using existing flavor '%s'..." % flavor_name)
276 logger.info("Creating flavor '%s' with '%s' RAM, '%s' disk size, "
277 "'%s' vcpus..." % (flavor_name, ram, disk, vcpus))
278 flavor_id = create_flavor(
279 nova_client, flavor_name, ram, disk, vcpus, public=public)
281 logger.error("Failed to create flavor '%s'..." % (flavor_name))
283 logger.debug("Flavor '%s' with ID=%s created successfully."
284 % (flavor_name, flavor_id))
286 return flavor_exists, flavor_id
289 def get_floating_ips(nova_client):
291 floating_ips = nova_client.floating_ips.list()
294 logger.error("Error [get_floating_ips(nova_client)]: %s" % e)
298 def get_hypervisors(nova_client):
301 hypervisors = nova_client.hypervisors.list()
302 for hypervisor in hypervisors:
303 if hypervisor.state == "up":
304 nodes.append(hypervisor.hypervisor_hostname)
307 logger.error("Error [get_hypervisors(nova_client)]: %s" % e)
311 def create_instance(flavor_name,
314 instance_name="functest-vm",
320 nova_client = get_nova_client()
322 flavor = nova_client.flavors.find(name=flavor_name)
324 flavors = nova_client.flavors.list()
325 logger.error("Error: Flavor '%s' not found. Available flavors are: "
326 "\n%s" % (flavor_name, flavors))
328 if fixed_ip is not None:
329 nics = {"net-id": network_id, "v4-fixed-ip": fixed_ip}
331 nics = {"net-id": network_id}
333 instance = nova_client.servers.create(
338 availability_zone=av_zone,
342 instance = nova_client.servers.create(
347 config_drive=confdrive,
349 availability_zone=av_zone,
355 def create_instance_and_wait_for_active(flavor_name,
365 VM_BOOT_TIMEOUT = 180
366 nova_client = get_nova_client()
367 instance = create_instance(flavor_name,
376 count = VM_BOOT_TIMEOUT / SLEEP
377 for n in range(count, -1, -1):
378 status = get_instance_status(nova_client, instance)
379 if status.lower() == "active":
381 elif status.lower() == "error":
382 logger.error("The instance %s went to ERROR status."
386 logger.error("Timeout booting the instance %s." % instance_name)
390 def create_floating_ip(neutron_client):
391 extnet_id = get_external_net_id(neutron_client)
392 props = {'floating_network_id': extnet_id}
394 ip_json = neutron_client.create_floatingip({'floatingip': props})
395 fip_addr = ip_json['floatingip']['floating_ip_address']
396 fip_id = ip_json['floatingip']['id']
398 logger.error("Error [create_floating_ip(neutron_client)]: %s" % e)
400 return {'fip_addr': fip_addr, 'fip_id': fip_id}
403 def add_floating_ip(nova_client, server_id, floatingip_id):
405 nova_client.servers.add_floating_ip(server_id, floatingip_id)
408 logger.error("Error [add_floating_ip(nova_client, '%s', '%s')]: %s"
409 % (server_id, floatingip_id, e))
413 def delete_instance(nova_client, instance_id):
415 nova_client.servers.force_delete(instance_id)
418 logger.error("Error [delete_instance(nova_client, '%s')]: %s"
423 def delete_floating_ip(nova_client, floatingip_id):
425 nova_client.floating_ips.delete(floatingip_id)
428 logger.error("Error [delete_floating_ip(nova_client, '%s')]: %s"
429 % (floatingip_id, e))
433 # *********************************************
435 # *********************************************
436 def get_network_list(neutron_client):
437 network_list = neutron_client.list_networks()['networks']
438 if len(network_list) == 0:
444 def get_router_list(neutron_client):
445 router_list = neutron_client.list_routers()['routers']
446 if len(router_list) == 0:
452 def get_port_list(neutron_client):
453 port_list = neutron_client.list_ports()['ports']
454 if len(port_list) == 0:
460 def get_network_id(neutron_client, network_name):
461 networks = neutron_client.list_networks()['networks']
464 if n['name'] == network_name:
470 def get_subnet_id(neutron_client, subnet_name):
471 subnets = neutron_client.list_subnets()['subnets']
474 if s['name'] == subnet_name:
480 def get_router_id(neutron_client, router_name):
481 routers = neutron_client.list_routers()['routers']
484 if r['name'] == router_name:
490 def get_private_net(neutron_client):
491 # Checks if there is an existing shared private network
492 networks = neutron_client.list_networks()['networks']
493 if len(networks) == 0:
496 if (net['router:external'] is False) and (net['shared'] is True):
501 def get_external_net(neutron_client):
502 for network in neutron_client.list_networks()['networks']:
503 if network['router:external']:
504 return network['name']
508 def get_external_net_id(neutron_client):
509 for network in neutron_client.list_networks()['networks']:
510 if network['router:external']:
515 def check_neutron_net(neutron_client, net_name):
516 for network in neutron_client.list_networks()['networks']:
517 if network['name'] == net_name:
518 for subnet in network['subnets']:
523 def create_neutron_net(neutron_client, name):
524 json_body = {'network': {'name': name,
525 'admin_state_up': True}}
527 network = neutron_client.create_network(body=json_body)
528 network_dict = network['network']
529 return network_dict['id']
531 logger.error("Error [create_neutron_net(neutron_client, '%s')]: %s"
536 def create_neutron_subnet(neutron_client, name, cidr, net_id):
537 json_body = {'subnets': [{'name': name, 'cidr': cidr,
538 'ip_version': 4, 'network_id': net_id}]}
540 subnet = neutron_client.create_subnet(body=json_body)
541 return subnet['subnets'][0]['id']
543 logger.error("Error [create_neutron_subnet(neutron_client, '%s', "
544 "'%s', '%s')]: %s" % (name, cidr, net_id, e))
548 def create_neutron_router(neutron_client, name):
549 json_body = {'router': {'name': name, 'admin_state_up': True}}
551 router = neutron_client.create_router(json_body)
552 return router['router']['id']
554 logger.error("Error [create_neutron_router(neutron_client, '%s')]: %s"
559 def create_neutron_port(neutron_client, name, network_id, ip):
560 json_body = {'port': {
561 'admin_state_up': True,
563 'network_id': network_id,
564 'fixed_ips': [{"ip_address": ip}]
567 port = neutron_client.create_port(body=json_body)
568 return port['port']['id']
570 logger.error("Error [create_neutron_port(neutron_client, '%s', '%s', "
571 "'%s')]: %s" % (name, network_id, ip, e))
575 def update_neutron_net(neutron_client, network_id, shared=False):
576 json_body = {'network': {'shared': shared}}
578 neutron_client.update_network(network_id, body=json_body)
581 logger.error("Error [update_neutron_net(neutron_client, '%s', '%s')]: "
582 "%s" % (network_id, str(shared), e))
586 def update_neutron_port(neutron_client, port_id, device_owner):
587 json_body = {'port': {
588 'device_owner': device_owner,
591 port = neutron_client.update_port(port=port_id,
593 return port['port']['id']
595 logger.error("Error [update_neutron_port(neutron_client, '%s', '%s')]:"
596 " %s" % (port_id, device_owner, e))
600 def add_interface_router(neutron_client, router_id, subnet_id):
601 json_body = {"subnet_id": subnet_id}
603 neutron_client.add_interface_router(router=router_id, body=json_body)
606 logger.error("Error [add_interface_router(neutron_client, '%s', "
607 "'%s')]: %s" % (router_id, subnet_id, e))
611 def add_gateway_router(neutron_client, router_id):
612 ext_net_id = get_external_net_id(neutron_client)
613 router_dict = {'network_id': ext_net_id}
615 neutron_client.add_gateway_router(router_id, router_dict)
618 logger.error("Error [add_gateway_router(neutron_client, '%s')]: %s"
623 def delete_neutron_net(neutron_client, network_id):
625 neutron_client.delete_network(network_id)
628 logger.error("Error [delete_neutron_net(neutron_client, '%s')]: %s"
633 def delete_neutron_subnet(neutron_client, subnet_id):
635 neutron_client.delete_subnet(subnet_id)
638 logger.error("Error [delete_neutron_subnet(neutron_client, '%s')]: %s"
643 def delete_neutron_router(neutron_client, router_id):
645 neutron_client.delete_router(router=router_id)
648 logger.error("Error [delete_neutron_router(neutron_client, '%s')]: %s"
653 def delete_neutron_port(neutron_client, port_id):
655 neutron_client.delete_port(port_id)
658 logger.error("Error [delete_neutron_port(neutron_client, '%s')]: %s"
663 def remove_interface_router(neutron_client, router_id, subnet_id):
664 json_body = {"subnet_id": subnet_id}
666 neutron_client.remove_interface_router(router=router_id,
670 logger.error("Error [remove_interface_router(neutron_client, '%s', "
671 "'%s')]: %s" % (router_id, subnet_id, e))
675 def remove_gateway_router(neutron_client, router_id):
677 neutron_client.remove_gateway_router(router_id)
680 logger.error("Error [remove_gateway_router(neutron_client, '%s')]: %s"
685 def create_network_full(neutron_client,
691 # Check if the network already exists
692 network_id = get_network_id(neutron_client, net_name)
693 subnet_id = get_subnet_id(neutron_client, subnet_name)
694 router_id = get_router_id(neutron_client, router_name)
696 if network_id != '' and subnet_id != '' and router_id != '':
697 logger.info("A network with name '%s' already exists..." % net_name)
699 neutron_client.format = 'json'
700 logger.info('Creating neutron network %s...' % net_name)
701 network_id = create_neutron_net(neutron_client, net_name)
706 logger.debug("Network '%s' created successfully" % network_id)
707 logger.debug('Creating Subnet....')
708 subnet_id = create_neutron_subnet(neutron_client, subnet_name,
713 logger.debug("Subnet '%s' created successfully" % subnet_id)
714 logger.debug('Creating Router...')
715 router_id = create_neutron_router(neutron_client, router_name)
720 logger.debug("Router '%s' created successfully" % router_id)
721 logger.debug('Adding router to subnet...')
723 if not add_interface_router(neutron_client, router_id, subnet_id):
726 logger.debug("Interface added successfully.")
728 logger.debug('Adding gateway to router...')
729 if not add_gateway_router(neutron_client, router_id):
732 logger.debug("Gateway added successfully.")
734 network_dic = {'net_id': network_id,
735 'subnet_id': subnet_id,
736 'router_id': router_id}
740 def create_shared_network_full(net_name, subnt_name, router_name, subnet_cidr):
741 neutron_client = get_neutron_client()
743 network_dic = create_network_full(neutron_client,
749 if not update_neutron_net(neutron_client,
750 network_dic['net_id'],
752 logger.error("Failed to update network %s..." % net_name)
755 logger.debug("Network '%s' is available..." % net_name)
757 logger.error("Network %s creation failed" % net_name)
762 def create_bgpvpn(neutron_client, **kwargs):
763 # route_distinguishers
765 json_body = {"bgpvpn": kwargs}
766 return neutron_client.create_bgpvpn(json_body)
769 def create_network_association(neutron_client, bgpvpn_id, neutron_network_id):
770 json_body = {"network_association": {"network_id": neutron_network_id}}
771 return neutron_client.create_network_association(bgpvpn_id, json_body)
774 def create_router_association(neutron_client, bgpvpn_id, router_id):
775 json_body = {"router_association": {"router_id": router_id}}
776 return neutron_client.create_router_association(bgpvpn_id, json_body)
779 def update_bgpvpn(neutron_client, bgpvpn_id, **kwargs):
780 json_body = {"bgpvpn": kwargs}
781 return neutron_client.update_bgpvpn(bgpvpn_id, json_body)
784 def delete_bgpvpn(neutron_client, bgpvpn_id):
785 return neutron_client.delete_bgpvpn(bgpvpn_id)
788 def get_bgpvpn(neutron_client, bgpvpn_id):
789 return neutron_client.show_bgpvpn(bgpvpn_id)
792 def get_bgpvpn_routers(neutron_client, bgpvpn_id):
793 return get_bgpvpn(neutron_client, bgpvpn_id)['bgpvpn']['routers']
796 def get_bgpvpn_networks(neutron_client, bgpvpn_id):
797 return get_bgpvpn(neutron_client, bgpvpn_id)['bgpvpn']['networks']
799 # *********************************************
801 # *********************************************
804 def get_security_groups(neutron_client):
806 security_groups = neutron_client.list_security_groups()[
808 return security_groups
810 logger.error("Error [get_security_groups(neutron_client)]: %s" % e)
814 def get_security_group_id(neutron_client, sg_name):
815 security_groups = get_security_groups(neutron_client)
817 for sg in security_groups:
818 if sg['name'] == sg_name:
824 def create_security_group(neutron_client, sg_name, sg_description):
825 json_body = {'security_group': {'name': sg_name,
826 'description': sg_description}}
828 secgroup = neutron_client.create_security_group(json_body)
829 return secgroup['security_group']
831 logger.error("Error [create_security_group(neutron_client, '%s', "
832 "'%s')]: %s" % (sg_name, sg_description, e))
836 def create_secgroup_rule(neutron_client, sg_id, direction, protocol,
837 port_range_min=None, port_range_max=None):
838 if port_range_min is None and port_range_max is None:
839 json_body = {'security_group_rule': {'direction': direction,
840 'security_group_id': sg_id,
841 'protocol': protocol}}
842 elif port_range_min is not None and port_range_max is not None:
843 json_body = {'security_group_rule': {'direction': direction,
844 'security_group_id': sg_id,
845 'port_range_min': port_range_min,
846 'port_range_max': port_range_max,
847 'protocol': protocol}}
849 logger.error("Error [create_secgroup_rule(neutron_client, '%s', '%s', "
850 "'%s', '%s', '%s', '%s')]:" % (neutron_client,
855 " Invalid values for port_range_min, port_range_max")
858 neutron_client.create_security_group_rule(json_body)
861 logger.error("Error [create_secgroup_rule(neutron_client, '%s', '%s', "
862 "'%s', '%s', '%s', '%s')]: %s" % (neutron_client,
871 def create_security_group_full(neutron_client,
872 sg_name, sg_description):
873 sg_id = get_security_group_id(neutron_client, sg_name)
875 logger.info("Using existing security group '%s'..." % sg_name)
877 logger.info("Creating security group '%s'..." % sg_name)
878 SECGROUP = create_security_group(neutron_client,
882 logger.error("Failed to create the security group...")
885 sg_id = SECGROUP['id']
887 logger.debug("Security group '%s' with ID=%s created successfully."
888 % (SECGROUP['name'], sg_id))
890 logger.debug("Adding ICMP rules in security group '%s'..."
892 if not create_secgroup_rule(neutron_client, sg_id,
894 logger.error("Failed to create the security group rule...")
897 logger.debug("Adding SSH rules in security group '%s'..."
899 if not create_secgroup_rule(
900 neutron_client, sg_id, 'ingress', 'tcp', '22', '22'):
901 logger.error("Failed to create the security group rule...")
904 if not create_secgroup_rule(
905 neutron_client, sg_id, 'egress', 'tcp', '22', '22'):
906 logger.error("Failed to create the security group rule...")
911 def add_secgroup_to_instance(nova_client, instance_id, secgroup_id):
913 nova_client.servers.add_security_group(instance_id, secgroup_id)
916 logger.error("Error [add_secgroup_to_instance(nova_client, '%s', "
917 "'%s')]: %s" % (instance_id, secgroup_id, e))
921 def update_sg_quota(neutron_client, tenant_id, sg_quota, sg_rule_quota):
922 json_body = {"quota": {
923 "security_group": sg_quota,
924 "security_group_rule": sg_rule_quota
928 neutron_client.update_quota(tenant_id=tenant_id,
932 logger.error("Error [update_sg_quota(neutron_client, '%s', '%s', "
933 "'%s')]: %s" % (tenant_id, sg_quota, sg_rule_quota, e))
937 def delete_security_group(neutron_client, secgroup_id):
939 neutron_client.delete_security_group(secgroup_id)
942 logger.error("Error [delete_security_group(neutron_client, '%s')]: %s"
947 # *********************************************
949 # *********************************************
950 def get_images(nova_client):
952 images = nova_client.images.list()
955 logger.error("Error [get_images]: %s" % e)
959 def get_image_id(glance_client, image_name):
960 images = glance_client.images.list()
963 if i.name == image_name:
969 def create_glance_image(glance_client, image_name, file_path, disk="qcow2",
970 container="bare", public=True):
971 if not os.path.isfile(file_path):
972 logger.error("Error: file %s does not exist." % file_path)
975 image_id = get_image_id(glance_client, image_name)
978 logger.info("Image %s already exists." % image_name)
981 logger.info("Creating image '%s' from '%s'..." % (image_name,
984 properties = ft_utils.get_functest_config(
985 'general.image_properties')
987 # image properties are not configured
988 # therefore don't add any properties
990 with open(file_path) as fimage:
991 image = glance_client.images.create(name=image_name,
994 container_format=container,
995 properties=properties,
1000 logger.error("Error [create_glance_image(glance_client, '%s', '%s', "
1001 "'%s')]: %s" % (image_name, file_path, str(public), e))
1005 def get_or_create_image(name, path, format):
1006 image_exists = False
1007 glance_client = get_glance_client()
1009 image_id = get_image_id(glance_client, name)
1011 logger.info("Using existing image '%s'..." % name)
1014 logger.info("Creating image '%s' from '%s'..." % (name, path))
1015 image_id = create_glance_image(glance_client, name, path, format)
1017 logger.error("Failed to create a Glance image...")
1019 logger.debug("Image '%s' with ID=%s created successfully."
1022 return image_exists, image_id
1025 def delete_glance_image(nova_client, image_id):
1027 nova_client.images.delete(image_id)
1029 except Exception, e:
1030 logger.error("Error [delete_glance_image(nova_client, '%s')]: %s"
1035 # *********************************************
1037 # *********************************************
1038 def get_volumes(cinder_client):
1040 volumes = cinder_client.volumes.list(search_opts={'all_tenants': 1})
1042 except Exception, e:
1043 logger.error("Error [get_volumes(cinder_client)]: %s" % e)
1047 def list_volume_types(cinder_client, public=True, private=True):
1049 volume_types = cinder_client.volume_types.list()
1051 volume_types = [vt for vt in volume_types if not vt.is_public]
1053 volume_types = [vt for vt in volume_types if vt.is_public]
1055 except Exception, e:
1056 logger.error("Error [list_volume_types(cinder_client)]: %s" % e)
1060 def create_volume_type(cinder_client, name):
1062 volume_type = cinder_client.volume_types.create(name)
1064 except Exception, e:
1065 logger.error("Error [create_volume_type(cinder_client, '%s')]: %s"
1070 def update_cinder_quota(cinder_client, tenant_id, vols_quota,
1071 snapshots_quota, gigabytes_quota):
1072 quotas_values = {"volumes": vols_quota,
1073 "snapshots": snapshots_quota,
1074 "gigabytes": gigabytes_quota}
1077 cinder_client.quotas.update(tenant_id, **quotas_values)
1079 except Exception, e:
1080 logger.error("Error [update_cinder_quota(cinder_client, '%s', '%s', "
1081 "'%s' '%s')]: %s" % (tenant_id, vols_quota,
1082 snapshots_quota, gigabytes_quota, e))
1086 def delete_volume(cinder_client, volume_id, forced=False):
1090 cinder_client.volumes.detach(volume_id)
1092 logger.error(sys.exc_info()[0])
1093 cinder_client.volumes.force_delete(volume_id)
1095 cinder_client.volumes.delete(volume_id)
1097 except Exception, e:
1098 logger.error("Error [delete_volume(cinder_client, '%s', '%s')]: %s"
1099 % (volume_id, str(forced), e))
1103 def delete_volume_type(cinder_client, volume_type):
1105 cinder_client.volume_types.delete(volume_type)
1107 except Exception, e:
1108 logger.error("Error [delete_volume_type(cinder_client, '%s')]: %s"
1113 # *********************************************
1115 # *********************************************
1116 def get_tenants(keystone_client):
1118 tenants = keystone_client.tenants.list()
1120 except Exception, e:
1121 logger.error("Error [get_tenants(keystone_client)]: %s" % e)
1125 def get_users(keystone_client):
1127 users = keystone_client.users.list()
1129 except Exception, e:
1130 logger.error("Error [get_users(keystone_client)]: %s" % e)
1134 def get_tenant_id(keystone_client, tenant_name):
1135 tenants = keystone_client.tenants.list()
1138 if t.name == tenant_name:
1144 def get_user_id(keystone_client, user_name):
1145 users = keystone_client.users.list()
1148 if u.name == user_name:
1154 def get_role_id(keystone_client, role_name):
1155 roles = keystone_client.roles.list()
1158 if r.name == role_name:
1164 def create_tenant(keystone_client, tenant_name, tenant_description):
1166 tenant = keystone_client.tenants.create(tenant_name,
1170 except Exception, e:
1171 logger.error("Error [create_tenant(keystone_client, '%s', '%s')]: %s"
1172 % (tenant_name, tenant_description, e))
1176 def create_user(keystone_client, user_name, user_password,
1177 user_email, tenant_id):
1179 user = keystone_client.users.create(user_name, user_password,
1180 user_email, tenant_id,
1183 except Exception, e:
1184 logger.error("Error [create_user(keystone_client, '%s', '%s', '%s'"
1185 "'%s')]: %s" % (user_name, user_password,
1186 user_email, tenant_id, e))
1190 def add_role_user(keystone_client, user_id, role_id, tenant_id):
1192 keystone_client.roles.add_user_role(user_id, role_id, tenant_id)
1194 except Exception, e:
1195 logger.error("Error [add_role_user(keystone_client, '%s', '%s'"
1196 "'%s')]: %s " % (user_id, role_id, tenant_id, e))
1200 def delete_tenant(keystone_client, tenant_id):
1202 keystone_client.tenants.delete(tenant_id)
1204 except Exception, e:
1205 logger.error("Error [delete_tenant(keystone_client, '%s')]: %s"
1210 def delete_user(keystone_client, user_id):
1212 keystone_client.users.delete(user_id)
1214 except Exception, e:
1215 logger.error("Error [delete_user(keystone_client, '%s')]: %s"