self._create_snat_namespace()
super(DvrEdgeHaRouter, self).initialize(process_monitor)
- def process(self, agent):
- super(DvrEdgeHaRouter, self).process(agent)
+ def process(self, agent, delete=False):
+ super(DvrEdgeHaRouter, self).process(agent, delete)
if self.ha_port:
self.enable_keepalived()
- def delete(self, agent):
- super(DvrEdgeHaRouter, self).delete(agent)
- if self.snat_namespace:
- self.snat_namespace.delete()
-
def get_router_cidrs(self, device):
return RouterInfo.get_router_cidrs(self, device)
ns_name = dvr_snat_ns.SnatNamespace.get_snat_ns_name(self.router['id'])
super(DvrEdgeRouter, self).update_routing_table(operation, route,
namespace=ns_name)
+
+ def delete(self, agent):
+ super(DvrEdgeRouter, self).delete(agent)
+ if self.snat_namespace:
+ self.snat_namespace.delete()
def _handle_router_snat_rules(self, ex_gw_port, interface_name):
pass
- def process_external(self, agent):
+ def process_external(self, agent, delete=False):
ex_gw_port = self.get_ex_gw_port()
if ex_gw_port:
self.create_dvr_fip_interfaces(ex_gw_port)
- super(DvrLocalRouter, self).process_external(agent)
+ super(DvrLocalRouter, self).process_external(agent, delete)
def create_dvr_fip_interfaces(self, ex_gw_port):
floating_ips = self.get_floating_ips()
# configured
self.agent.process_router_add(self)
- def process(self, agent):
+ def process(self, agent, delete=False):
ex_gw_port = self.get_ex_gw_port()
if ex_gw_port:
self.fip_ns = agent.get_fip_ns(ex_gw_port['network_id'])
self.fip_ns.scan_fip_ports(self)
- super(DvrLocalRouter, self).process(agent)
+ super(DvrLocalRouter, self).process(agent, delete)
self.agent = agent
self.host = host
- def process(self, agent):
- super(DvrRouterBase, self).process(agent)
+ def process(self, agent, delete=False):
+ super(DvrRouterBase, self).process(agent, delete)
# NOTE: Keep a copy of the interfaces around for when they are removed
self.snat_ports = self.get_snat_interfaces()
self.ha_network_removed()
self.disable_keepalived()
- def process(self, agent):
- super(HaRouter, self).process(agent)
+ def process(self, agent, delete=False):
+ super(HaRouter, self).process(agent, delete)
if self.ha_port:
self.enable_keepalived()
self.router['gw_port'] = None
self.router[l3_constants.INTERFACE_KEY] = []
self.router[l3_constants.FLOATINGIP_KEY] = []
- self.process(agent)
+ self.process(agent, delete=True)
self.disable_radvd()
self.router_namespace.delete()
self.iptables_manager,
interface_name)
- def process_external(self, agent):
+ def process_external(self, agent, delete=False):
fip_statuses = {}
- try:
- with self.iptables_manager.defer_apply():
- ex_gw_port = self.get_ex_gw_port()
- self._process_external_gateway(ex_gw_port, agent.pd)
- if not ex_gw_port:
- return
-
- # Process SNAT/DNAT rules and addresses for floating IPs
- self.process_snat_dnat_for_fip()
-
- # Once NAT rules for floating IPs are safely in place
- # configure their addresses on the external gateway port
- interface_name = self.get_external_device_interface_name(
- ex_gw_port)
- fip_statuses = self.configure_fip_addresses(interface_name)
-
- except (n_exc.FloatingIpSetupException,
- n_exc.IpTablesApplyException):
- # All floating IPs must be put in error state
- LOG.exception(_LE("Failed to process floating IPs."))
- fip_statuses = self.put_fips_in_error_state()
- finally:
- self.update_fip_statuses(agent, fip_statuses)
+ if not delete:
+ try:
+ with self.iptables_manager.defer_apply():
+ ex_gw_port = self.get_ex_gw_port()
+ self._process_external_gateway(ex_gw_port, agent.pd)
+ if not ex_gw_port:
+ return
+
+ # Process SNAT/DNAT rules and addresses for floating IPs
+ self.process_snat_dnat_for_fip()
+
+ # Once NAT rules for floating IPs are safely in place
+ # configure their addresses on the external gateway port
+ interface_name = self.get_external_device_interface_name(
+ ex_gw_port)
+ fip_statuses = self.configure_fip_addresses(interface_name)
+
+ except (n_exc.FloatingIpSetupException,
+ n_exc.IpTablesApplyException):
+ # All floating IPs must be put in error state
+ LOG.exception(_LE("Failed to process floating IPs."))
+ fip_statuses = self.put_fips_in_error_state()
+ finally:
+ self.update_fip_statuses(agent, fip_statuses)
+ else:
+ ex_gw_port = self.get_ex_gw_port()
+ self._process_external_gateway(ex_gw_port, agent.pd)
def update_fip_statuses(self, agent, fip_statuses):
# Identify floating IPs which were disabled
agent.context, self.router_id, fip_statuses)
@common_utils.exception_logger()
- def process(self, agent):
+ def process(self, agent, delete=False):
"""Process updates to this router
This method is the point where the agent requests that updates be
applied to this router.
:param agent: Passes the agent in order to send RPC messages.
+ :param delete: Indicates whether this update is from a delete operation
"""
LOG.debug("process router updates")
self._process_internal_ports(agent.pd)
agent.pd.sync_router(self.router['id'])
- self.process_external(agent)
+ self.process_external(agent, delete)
# Process static routes for router
self.routes_updated()
def before_router_removed(resource, event, l3_agent, **kwargs):
router = kwargs['router']
proxy = l3_agent.metadata_driver
- for c, r in proxy.metadata_filter_rules(proxy.metadata_port,
- proxy.metadata_access_mark):
- router.iptables_manager.ipv4['filter'].remove_rule(c, r)
- for c, r in proxy.metadata_mangle_rules(proxy.metadata_access_mark):
- router.iptables_manager.ipv4['mangle'].remove_rule(c, r)
- for c, r in proxy.metadata_nat_rules(proxy.metadata_port):
- router.iptables_manager.ipv4['nat'].remove_rule(c, r)
- router.iptables_manager.apply()
proxy.destroy_monitored_metadata_proxy(l3_agent.process_monitor,
router.router['id'],