cinder_zonemanager_drivers_brocade_brcdfabricopts
from cinder.zonemanager.drivers.brocade import brcd_fc_zone_driver as \
cinder_zonemanager_drivers_brocade_brcdfczonedriver
+from cinder.zonemanager.drivers.cisco import cisco_fabric_opts as \
+ cinder_zonemanager_drivers_cisco_ciscofabricopts
+from cinder.zonemanager.drivers.cisco import cisco_fc_zone_driver as \
+ cinder_zonemanager_drivers_cisco_ciscofczonedriver
from cinder.zonemanager import fc_zone_manager as \
cinder_zonemanager_fczonemanager
itertools.chain(
cinder_zonemanager_fczonemanager.zone_manager_opts,
cinder_zonemanager_drivers_brocade_brcdfczonedriver.brcd_opts,
+ cinder_zonemanager_drivers_cisco_ciscofczonedriver.cisco_opts,
)),
('KEYMGR',
itertools.chain(
cinder_volume_drivers_vzstorage.vzstorage_opts,
cinder_volume_drivers_nfs.nfs_opts,
)),
+ ('CISCO_FABRIC_EXAMPLE',
+ itertools.chain(
+ cinder_zonemanager_drivers_cisco_ciscofabricopts.
+ cisco_zone_opts,
+ )),
('BRCD_FABRIC_EXAMPLE',
itertools.chain(
cinder_zonemanager_drivers_brocade_brcdfabricopts.
--- /dev/null
+# (c) Copyright 2014 Cisco Systems Inc.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+
+
+"""Unit tests for Cisco fc san lookup service."""
+
+import mock
+from oslo_config import cfg
+
+from cinder import exception
+from cinder import test
+from cinder.volume import configuration as conf
+import cinder.zonemanager.drivers.cisco.cisco_fc_san_lookup_service \
+ as cisco_lookup
+import cinder.zonemanager.drivers.cisco.fc_zone_constants as ZoneConstant
+from cinder.zonemanager import utils as zm_utils
+
+nsshow = '20:1a:00:05:1e:e8:e3:29'
+switch_data = ['VSAN 304\n',
+ '------------------------------------------------------\n',
+ 'FCID TYPE PWWN (VENDOR) \n',
+ '------------------------------------------------------\n',
+ '0x030001 N 20:1a:00:05:1e:e8:e3:29 (Cisco) ipfc\n',
+ '0x030101 NL 10:00:00:00:77:99:60:2c (Interphase)\n',
+ '0x030200 N 10:00:00:49:c9:28:c7:01\n']
+
+nsshow_data = ['10:00:8c:7c:ff:52:3b:01', '20:24:00:02:ac:00:0a:50']
+
+_device_map_to_verify = {
+ '304': {
+ 'initiator_port_wwn_list': ['10008c7cff523b01'],
+ 'target_port_wwn_list': ['20240002ac000a50']}}
+
+
+class TestCiscoFCSanLookupService(cisco_lookup.CiscoFCSanLookupService,
+ test.TestCase):
+
+ def setUp(self):
+ super(TestCiscoFCSanLookupService, self).setUp()
+ self.configuration = conf.Configuration(None)
+ self.configuration.set_default('fc_fabric_names', 'CISCO_FAB_2',
+ 'fc-zone-manager')
+ self.configuration.fc_fabric_names = 'CISCO_FAB_2'
+ self.create_configuration()
+ self.fabric_vsan = '304'
+
+ # override some of the functions
+ def __init__(self, *args, **kwargs):
+ test.TestCase.__init__(self, *args, **kwargs)
+
+ def create_configuration(self):
+ fc_fabric_opts = []
+ fc_fabric_opts.append(cfg.StrOpt('cisco_fc_fabric_address',
+ default='172.24.173.142', help=''))
+ fc_fabric_opts.append(cfg.StrOpt('cisco_fc_fabric_user',
+ default='admin', help=''))
+ fc_fabric_opts.append(cfg.StrOpt('cisco_fc_fabric_password',
+ default='admin1234', help='',
+ secret=True))
+ fc_fabric_opts.append(cfg.PortOpt('cisco_fc_fabric_port',
+ default=22, help=''))
+ fc_fabric_opts.append(cfg.StrOpt('cisco_zoning_vsan',
+ default='304', help=''))
+ config = conf.Configuration(fc_fabric_opts, 'CISCO_FAB_2')
+ self.fabric_configs = {'CISCO_FAB_2': config}
+
+ @mock.patch.object(cisco_lookup.CiscoFCSanLookupService,
+ 'get_nameserver_info')
+ def test_get_device_mapping_from_network(self, get_nameserver_info_mock):
+ initiator_list = ['10008c7cff523b01']
+ target_list = ['20240002ac000a50', '20240002ac000a40']
+ get_nameserver_info_mock.return_value = (nsshow_data)
+ device_map = self.get_device_mapping_from_network(
+ initiator_list, target_list)
+ self.assertDictMatch(_device_map_to_verify, device_map)
+
+ @mock.patch.object(cisco_lookup.CiscoFCSanLookupService,
+ '_get_switch_info')
+ def test_get_nameserver_info(self, get_switch_data_mock):
+ ns_info_list = []
+ ns_info_list_expected = ['20:1a:00:05:1e:e8:e3:29',
+ '10:00:00:49:c9:28:c7:01']
+ get_switch_data_mock.return_value = (switch_data)
+ ns_info_list = self.get_nameserver_info('304')
+ self.assertEqual(ns_info_list_expected, ns_info_list)
+
+ def test_parse_ns_output(self):
+ invalid_switch_data = [' N 011a00;20:1a:00:05:1e:e8:e3:29']
+ return_wwn_list = []
+ expected_wwn_list = ['20:1a:00:05:1e:e8:e3:29',
+ '10:00:00:49:c9:28:c7:01']
+ return_wwn_list = self._parse_ns_output(switch_data)
+ self.assertEqual(expected_wwn_list, return_wwn_list)
+ self.assertRaises(exception.InvalidParameterValue,
+ self._parse_ns_output, invalid_switch_data)
+
+ def test_get_formatted_wwn(self):
+ wwn_list = ['10008c7cff523b01']
+ return_wwn_list = []
+ expected_wwn_list = ['10:00:8c:7c:ff:52:3b:01']
+ return_wwn_list.append(zm_utils.get_formatted_wwn(wwn_list[0]))
+ self.assertEqual(expected_wwn_list, return_wwn_list)
+
+ @mock.patch.object(cisco_lookup.CiscoFCSanLookupService,
+ '_run_ssh')
+ def test__get_switch_info(self, run_ssh_mock):
+ cmd_list = [ZoneConstant.FCNS_SHOW, self.fabric_vsan,
+ ' | no-more']
+ nsshow_list = [nsshow]
+ run_ssh_mock.return_value = (Stream(nsshow), Stream())
+ switch_data = self._get_switch_info(cmd_list)
+ self.assertEqual(nsshow_list, switch_data)
+ run_ssh_mock.assert_called_once_with(cmd_list, True, 1)
+
+
+class Channel(object):
+ def recv_exit_status(self):
+ return 0
+
+
+class Stream(object):
+ def __init__(self, buffer=''):
+ self.buffer = buffer
+ self.channel = Channel()
+
+ def readlines(self):
+ return self.buffer
+
+ def splitlines(self):
+ return self.buffer.splitlines()
+
+ def close(self):
+ pass
+
+ def flush(self):
+ self.buffer = ''
--- /dev/null
+# (c) Copyright 2014 Cisco Systems Inc.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+
+
+"""Unit tests for Cisco fc zone client cli."""
+
+import time
+
+import mock
+from oslo_concurrency import processutils
+from six.moves import range
+
+from cinder import exception
+from cinder import test
+from cinder.zonemanager.drivers.cisco \
+ import cisco_fc_zone_client_cli as cli
+import cinder.zonemanager.drivers.cisco.fc_zone_constants as ZoneConstant
+
+nsshow = '20:1a:00:05:1e:e8:e3:29'
+switch_data = ['VSAN 303\n',
+ '----------------------------------------------------------\n',
+ 'FCID TYPE PWWN (VENDOR) FC4-TYPE:FEATURE\n',
+ '----------------------------------------------------------\n',
+ '0x030001 N 20:1a:00:05:1e:e8:e3:29 (Cisco) ipfc\n',
+ '0x030101 NL 10:00:00:00:77:99:60:2c (Interphase)\n',
+ '0x030200 NL 10:00:00:49:c9:28:c7:01\n']
+
+cfgactv = ['zoneset name OpenStack_Cfg vsan 303\n',
+ 'zone name openstack50060b0000c26604201900051ee8e329 vsan 303\n',
+ 'pwwn 50:06:0b:00:00:c2:66:04\n',
+ 'pwwn 20:19:00:05:1e:e8:e3:29\n']
+
+active_zoneset = {
+ 'zones': {
+ 'openstack50060b0000c26604201900051ee8e329':
+ ['50:06:0b:00:00:c2:66:04', '20:19:00:05:1e:e8:e3:29']},
+ 'active_zone_config': 'OpenStack_Cfg'}
+
+zoning_status_data_basic = [
+ 'VSAN: 303 default-zone: deny distribute: active only Interop: default\n',
+ ' mode: basic merge-control: allow\n',
+ ' session: none\n',
+ ' hard-zoning: enabled broadcast: unsupported\n',
+ ' smart-zoning: disabled\n',
+ ' rscn-format: fabric-address\n',
+ 'Default zone:\n',
+ ' qos: none broadcast: unsupported ronly: unsupported\n',
+ 'Full Zoning Database :\n',
+ ' DB size: 220 bytes\n',
+ ' Zonesets:2 Zones:2 Aliases: 0\n',
+ 'Active Zoning Database :\n',
+ ' DB size: 80 bytes\n',
+ ' Name: test-zs-test Zonesets:1 Zones:1\n',
+ 'Status:\n']
+
+zoning_status_basic = {'mode': 'basic', 'session': 'none'}
+
+zoning_status_data_enhanced_nosess = [
+ 'VSAN: 303 default-zone: deny distribute: active only Interop: default\n',
+ ' mode: enhanced merge-control: allow\n',
+ ' session: none\n',
+ ' hard-zoning: enabled broadcast: unsupported\n',
+ ' smart-zoning: disabled\n',
+ ' rscn-format: fabric-address\n',
+ 'Default zone:\n',
+ ' qos: none broadcast: unsupported ronly: unsupported\n',
+ 'Full Zoning Database :\n',
+ ' DB size: 220 bytes\n',
+ ' Zonesets:2 Zones:2 Aliases: 0\n',
+ 'Active Zoning Database :\n',
+ ' DB size: 80 bytes\n',
+ ' Name: test-zs-test Zonesets:1 Zones:1\n',
+ 'Status:\n']
+
+zoning_status_enhanced_nosess = {'mode': 'enhanced', 'session': 'none'}
+
+zoning_status_data_enhanced_sess = [
+ 'VSAN: 303 default-zone: deny distribute: active only Interop: default\n',
+ ' mode: enhanced merge-control: allow\n',
+ ' session: otherthannone\n',
+ ' hard-zoning: enabled broadcast: unsupported\n',
+ ' smart-zoning: disabled\n',
+ ' rscn-format: fabric-address\n',
+ 'Default zone:\n',
+ ' qos: none broadcast: unsupported ronly: unsupported\n',
+ 'Full Zoning Database :\n',
+ ' DB size: 220 bytes\n',
+ ' Zonesets:2 Zones:2 Aliases: 0\n',
+ 'Active Zoning Database :\n',
+ ' DB size: 80 bytes\n',
+ ' Name: test-zs-test Zonesets:1 Zones:1\n',
+ 'Status:\n']
+
+zoning_status_enhanced_sess = {'mode': 'enhanced', 'session': 'otherthannone'}
+
+active_zoneset_multiple_zones = {
+ 'zones': {
+ 'openstack50060b0000c26604201900051ee8e329':
+ ['50:06:0b:00:00:c2:66:04', '20:19:00:05:1e:e8:e3:29'],
+ 'openstack10000012345678902001009876543210':
+ ['50:06:0b:00:00:c2:66:02', '20:19:00:05:1e:e8:e3:27']},
+ 'active_zone_config': 'OpenStack_Cfg'}
+
+new_zone = {'openstack10000012345678902001009876543210':
+ ['10:00:00:12:34:56:78:90', '20:01:00:98:76:54:32:10']}
+
+new_zones = {'openstack10000012345678902001009876543210':
+ ['10:00:00:12:34:56:78:90', '20:01:00:98:76:54:32:10'],
+ 'openstack10000011111111112001001111111111':
+ ['10:00:00:11:11:11:11:11', '20:01:00:11:11:11:11:11']}
+
+zone_names_to_delete = 'openstack50060b0000c26604201900051ee8e329'
+
+
+class TestCiscoFCZoneClientCLI(cli.CiscoFCZoneClientCLI, test.TestCase):
+
+ def setUp(self):
+ super(TestCiscoFCZoneClientCLI, self).setUp()
+ self.fabric_vsan = '303'
+
+ # override some of the functions
+ def __init__(self, *args, **kwargs):
+ test.TestCase.__init__(self, *args, **kwargs)
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_get_switch_info')
+ def test_get_active_zone_set(self, get_switch_info_mock):
+ cmd_list = [ZoneConstant.GET_ACTIVE_ZONE_CFG, self.fabric_vsan,
+ ' | no-more']
+ get_switch_info_mock.return_value = cfgactv
+ active_zoneset_returned = self.get_active_zone_set()
+ get_switch_info_mock.assert_called_once_with(cmd_list)
+ self.assertDictMatch(active_zoneset, active_zoneset_returned)
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
+ def test_get_active_zone_set_ssh_error(self, run_ssh_mock):
+ run_ssh_mock.side_effect = processutils.ProcessExecutionError
+ self.assertRaises(exception.CiscoZoningCliException,
+ self.get_active_zone_set)
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_get_switch_info')
+ def test_get_zoning_status_basic(self, get_zoning_status_mock):
+ cmd_list = [ZoneConstant.GET_ZONE_STATUS, self.fabric_vsan]
+ get_zoning_status_mock.return_value = zoning_status_data_basic
+ zoning_status_returned = self.get_zoning_status()
+ get_zoning_status_mock.assert_called_once_with(cmd_list)
+ self.assertDictMatch(zoning_status_basic, zoning_status_returned)
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_get_switch_info')
+ def test_get_zoning_status_enhanced_nosess(self, get_zoning_status_mock):
+ cmd_list = [ZoneConstant.GET_ZONE_STATUS, self.fabric_vsan]
+ get_zoning_status_mock.return_value =\
+ zoning_status_data_enhanced_nosess
+ zoning_status_returned = self.get_zoning_status()
+ get_zoning_status_mock.assert_called_once_with(cmd_list)
+ self.assertDictMatch(zoning_status_enhanced_nosess,
+ zoning_status_returned)
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_get_switch_info')
+ def test_get_zoning_status_enhanced_sess(self, get_zoning_status_mock):
+ cmd_list = [ZoneConstant.GET_ZONE_STATUS, self.fabric_vsan]
+ get_zoning_status_mock.return_value = zoning_status_data_enhanced_sess
+ zoning_status_returned = self.get_zoning_status()
+ get_zoning_status_mock.assert_called_once_with(cmd_list)
+ self.assertDictMatch(zoning_status_enhanced_sess,
+ zoning_status_returned)
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_get_switch_info')
+ def test_get_nameserver_info(self, get_switch_info_mock):
+ ns_info_list = []
+ ns_info_list_expected = ['20:1a:00:05:1e:e8:e3:29']
+ get_switch_info_mock.return_value = (switch_data)
+ ns_info_list = self.get_nameserver_info()
+ self.assertEqual(ns_info_list_expected, ns_info_list)
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
+ def test_get_nameserver_info_ssh_error(self, run_ssh_mock):
+ run_ssh_mock.side_effect = processutils.ProcessExecutionError
+ self.assertRaises(exception.CiscoZoningCliException,
+ self.get_nameserver_info)
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
+ def test__cfg_save(self, run_ssh_mock):
+ cmd_list = ['copy', 'running-config', 'startup-config']
+ self._cfg_save()
+ run_ssh_mock.assert_called_once_with(cmd_list, True)
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
+ @mock.patch.object(time, 'sleep')
+ def test__cfg_save_with_retry(self, mock_sleep, run_ssh_mock):
+ cmd_list = ['copy', 'running-config', 'startup-config']
+ run_ssh_mock.side_effect = [
+ processutils.ProcessExecutionError,
+ ('', None)
+ ]
+
+ self._cfg_save()
+
+ self.assertEqual(2, run_ssh_mock.call_count)
+ run_ssh_mock.assert_has_calls([
+ mock.call(cmd_list, True),
+ mock.call(cmd_list, True)
+ ])
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
+ @mock.patch.object(time, 'sleep')
+ def test__cfg_save_with_error(self, mock_sleep, run_ssh_mock):
+ cmd_list = ['copy', 'running-config', 'startup-config']
+ run_ssh_mock.side_effect = processutils.ProcessExecutionError
+
+ self.assertRaises(processutils.ProcessExecutionError, self._cfg_save)
+
+ expected_num_calls = 5
+ expected_calls = []
+ for i in range(expected_num_calls):
+ expected_calls.append(mock.call(cmd_list, True))
+
+ self.assertEqual(expected_num_calls, run_ssh_mock.call_count)
+ run_ssh_mock.assert_has_calls(expected_calls)
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_run_ssh')
+ def test__get_switch_info(self, run_ssh_mock):
+ cmd_list = [ZoneConstant.FCNS_SHOW, self.fabric_vsan]
+ nsshow_list = [nsshow]
+ run_ssh_mock.return_value = (Stream(nsshow), Stream())
+ switch_data = self._get_switch_info(cmd_list)
+ self.assertEqual(nsshow_list, switch_data)
+ run_ssh_mock.assert_called_once_with(cmd_list, True)
+
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_ssh_execute')
+ @mock.patch.object(cli.CiscoFCZoneClientCLI, '_cfg_save')
+ def test__add_zones_with_update(self, ssh_execute_mock, cfg_save_mock):
+ self.add_zones(new_zone, False, self.fabric_vsan,
+ active_zoneset_multiple_zones,
+ zoning_status_basic)
+ self.assertEqual(2, ssh_execute_mock.call_count)
+ self.assertEqual(2, cfg_save_mock.call_count)
+
+ def test__parse_ns_output(self):
+ return_wwn_list = []
+ expected_wwn_list = ['20:1a:00:05:1e:e8:e3:29']
+ return_wwn_list = self._parse_ns_output(switch_data)
+ self.assertEqual(expected_wwn_list, return_wwn_list)
+
+
+class TestCiscoFCZoneClientCLISSH(test.TestCase):
+
+ def setUp(self):
+ super(TestCiscoFCZoneClientCLISSH, self).setUp()
+ self.client = cli.CiscoFCZoneClientCLI(None, None, None, None, None)
+ self.client.sshpool = mock.MagicMock()
+ self.mock_ssh = self.client.sshpool.item().__enter__()
+
+ @mock.patch('oslo_concurrency.processutils.ssh_execute')
+ def test__run_ssh(self, mock_execute):
+ mock_execute.return_value = 'ssh output'
+ ret = self.client._run_ssh(['cat', 'foo'])
+ self.assertEqual('ssh output', ret)
+ mock_execute.assert_called_once_with(self.mock_ssh,
+ 'cat foo',
+ check_exit_code=True)
+
+ @mock.patch('oslo_concurrency.processutils.ssh_execute')
+ def test__run_ssh_with_error(self, mock_execute):
+ mock_execute.side_effect = processutils.ProcessExecutionError()
+ self.assertRaises(processutils.ProcessExecutionError,
+ self.client._run_ssh,
+ ['cat', 'foo'])
+
+
+class Channel(object):
+ def recv_exit_status(self):
+ return 0
+
+
+class Stream(object):
+ def __init__(self, buffer=''):
+ self.buffer = buffer
+ self.channel = Channel()
+
+ def readlines(self):
+ return self.buffer
+
+ def splitlines(self):
+ return self.buffer.splitlines()
+
+ def close(self):
+ pass
+
+ def flush(self):
+ self.buffer = ''
--- /dev/null
+# (c) Copyright 2014 Cisco Systems Inc.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+
+
+"""Unit tests for Cisco FC zone driver."""
+
+from oslo_concurrency import processutils
+from oslo_config import cfg
+from oslo_utils import importutils
+
+from cinder import exception
+from cinder import test
+from cinder.volume import configuration as conf
+
+_active_cfg_before_add = {}
+_active_cfg_before_delete = {
+ 'zones': {
+ 'openstack10008c7cff523b0120240002ac000a50': (
+ ['10:00:8c:7c:ff:52:3b:01',
+ '20:24:00:02:ac:00:0a:50'])},
+ 'active_zone_config': 'cfg1'}
+_activate = True
+_zone_name = 'openstack10008c7cff523b0120240002ac000a50'
+_target_ns_map = {'100000051e55a100': ['20240002ac000a50']}
+_zoning_status = {'mode': 'basis', 'session': 'none'}
+_initiator_ns_map = {'100000051e55a100': ['10008c7cff523b01']}
+_zone_map_to_add = {'openstack10008c7cff523b0120240002ac000a50': (
+ ['10:00:8c:7c:ff:52:3b:01', '20:24:00:02:ac:00:0a:50'])}
+
+_initiator_target_map = {'10008c7cff523b01': ['20240002ac000a50']}
+_device_map_to_verify = {
+ '304': {
+ 'initiator_port_wwn_list': [
+ '10008c7cff523b01'], 'target_port_wwn_list': ['20240002ac000a50']}}
+_fabric_wwn = '304'
+
+
+class CiscoFcZoneDriverBaseTest(object):
+
+ def setup_config(self, is_normal, mode):
+ fc_test_opts = [
+ cfg.StrOpt('fc_fabric_address_CISCO_FAB_1', default='10.24.48.213',
+ help='FC Fabric names'),
+ ]
+ configuration = conf.Configuration(fc_test_opts)
+ # fill up config
+ configuration.zoning_mode = 'fabric'
+ configuration.zone_driver = ('cinder.tests.unit.zonemanager.'
+ 'test_cisco_fc_zone_driver.'
+ 'FakeCiscoFCZoneDriver')
+ configuration.cisco_sb_connector = ('cinder.tests.unit.zonemanager.'
+ 'test_cisco_fc_zone_driver'
+ '.FakeCiscoFCZoneClientCLI')
+ configuration.zoning_policy = 'initiator-target'
+ configuration.zone_activate = True
+ configuration.zone_name_prefix = 'openstack'
+ configuration.fc_san_lookup_service = ('cinder.tests.unit.zonemanager.'
+ 'test_cisco_fc_zone_driver.'
+ 'FakeCiscoFCSanLookupService')
+
+ configuration.fc_fabric_names = 'CISCO_FAB_1'
+ configuration.fc_fabric_address_CISCO_FAB_1 = '172.21.60.220'
+ if (is_normal):
+ configuration.fc_fabric_user_CISCO_FAB_1 = 'admin'
+ else:
+ configuration.fc_fabric_user_CISCO_FAB_1 = 'invaliduser'
+ configuration.fc_fabric_password_CISCO_FAB_1 = 'admin1234'
+
+ if (mode == 1):
+ configuration.zoning_policy_CISCO_FAB_1 = 'initiator-target'
+ elif (mode == 2):
+ configuration.zoning_policy_CISCO_FAB_1 = 'initiator'
+ else:
+ configuration.zoning_policy_CISCO_FAB_1 = 'initiator-target'
+ configuration.zone_activate_CISCO_FAB_1 = True
+ configuration.zone_name_prefix_CISCO_FAB_1 = 'openstack'
+ configuration.zoning_vsan_CISCO_FAB_1 = '304'
+ return configuration
+
+
+class TestCiscoFcZoneDriver(CiscoFcZoneDriverBaseTest, test.TestCase):
+
+ def setUp(self):
+ super(TestCiscoFcZoneDriver, self).setUp()
+ # setup config for normal flow
+ self.setup_driver(self.setup_config(True, 1))
+ GlobalVars._zone_state = []
+
+ def setup_driver(self, config):
+ self.driver = importutils.import_object(
+ 'cinder.zonemanager.drivers.cisco.cisco_fc_zone_driver'
+ '.CiscoFCZoneDriver', configuration=config)
+
+ def fake_get_active_zone_set(self, fabric_ip, fabric_user, fabric_pwd,
+ zoning_vsan):
+ return GlobalVars._active_cfg
+
+ def fake_get_san_context(self, target_wwn_list):
+ fabric_map = {}
+ return fabric_map
+
+ def test_delete_connection(self):
+ GlobalVars._is_normal_test = True
+ GlobalVars._active_cfg = _active_cfg_before_delete
+ self.driver.delete_connection(
+ 'CISCO_FAB_1', _initiator_target_map)
+ self.assertFalse(_zone_name in GlobalVars._zone_state)
+
+ def test_delete_connection_for_initiator_mode(self):
+ GlobalVars._is_normal_test = True
+ GlobalVars._active_cfg = _active_cfg_before_delete
+ self.setup_driver(self.setup_config(True, 2))
+ self.driver.delete_connection(
+ 'CISCO_FAB_1', _initiator_target_map)
+ self.assertFalse(_zone_name in GlobalVars._zone_state)
+
+ def test_add_connection_for_invalid_fabric(self):
+ """Test abnormal flows."""
+ GlobalVars._is_normal_test = True
+ GlobalVars._active_cfg = _active_cfg_before_add
+ GlobalVars._is_normal_test = False
+ self.setup_driver(self.setup_config(False, 1))
+ self.assertRaises(exception.FCZoneDriverException,
+ self.driver.add_connection,
+ 'CISCO_FAB_1',
+ _initiator_target_map)
+
+ def test_delete_connection_for_invalid_fabric(self):
+ GlobalVars._active_cfg = _active_cfg_before_delete
+ GlobalVars._is_normal_test = False
+ self.setup_driver(self.setup_config(False, 1))
+ self.assertRaises(exception.FCZoneDriverException,
+ self.driver.delete_connection,
+ 'CISCO_FAB_1',
+ _initiator_target_map)
+
+
+class FakeCiscoFCZoneClientCLI(object):
+ def __init__(self, ipaddress, username, password, port, vsan):
+ if not GlobalVars._is_normal_test:
+ raise processutils.ProcessExecutionError(
+ "Unable to connect to fabric")
+
+ def get_active_zone_set(self):
+ return GlobalVars._active_cfg
+
+ def add_zones(self, zones, isActivate):
+ GlobalVars._zone_state.extend(zones.keys())
+
+ def delete_zones(self, zone_names, isActivate):
+ zone_list = zone_names.split(';')
+ GlobalVars._zone_state = [
+ x for x in GlobalVars._zone_state if x not in zone_list]
+
+ def get_nameserver_info(self):
+ return _target_ns_map
+
+ def get_zoning_status(self):
+ return _zoning_status
+
+ def close_connection(self):
+ pass
+
+ def cleanup(self):
+ pass
+
+
+class FakeCiscoFCSanLookupService(object):
+ def get_device_mapping_from_network(self,
+ initiator_wwn_list,
+ target_wwn_list):
+ device_map = {}
+ initiators = []
+ targets = []
+ for i in initiator_wwn_list:
+ if (i in _initiator_ns_map[_fabric_wwn]):
+ initiators.append(i)
+ for t in target_wwn_list:
+ if (t in _target_ns_map[_fabric_wwn]):
+ targets.append(t)
+ device_map[_fabric_wwn] = {
+ 'initiator_port_wwn_list': initiators,
+ 'target_port_wwn_list': targets}
+ return device_map
+
+
+class GlobalVars(object):
+ global _active_cfg
+ _active_cfg = {}
+ global _zone_state
+ _zone_state = list()
+ global _is_normal_test
+ _is_normal_test = True
+ global _zoning_status
+ _zoning_status = {}
--- /dev/null
+# (c) Copyright 2014 Cisco Systems Inc.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+
+
+"""Unit tests for Cisco FC san lookup service."""
+
+from cinder import exception
+from cinder import test
+from cinder.volume import configuration as conf
+from cinder.zonemanager import fc_san_lookup_service as san_service
+
+_target_ns_map = {'100000051e55a100': ['20240002ac000a50']}
+_initiator_ns_map = {'100000051e55a100': ['10008c7cff523b01']}
+_device_map_to_verify = {
+ '100000051e55a100': {
+ 'initiator_port_wwn_list': [
+ '10008c7cff523b01'], 'target_port_wwn_list': ['20240002ac000a50']}}
+_fabric_wwn = '100000051e55a100'
+
+
+class TestFCSanLookupService(san_service.FCSanLookupService, test.TestCase):
+
+ def setUp(self):
+ super(TestFCSanLookupService, self).setUp()
+ self.configuration = self.setup_config()
+
+ # override some of the functions
+ def __init__(self, *args, **kwargs):
+ test.TestCase.__init__(self, *args, **kwargs)
+
+ def setup_config(self):
+ configuration = conf.Configuration(None)
+ # fill up config
+ configuration.fc_san_lookup_service = ('cinder.tests.unit.zonemanager'
+ '.test_cisco_lookup_service'
+ '.FakeCiscoFCSanLookupService')
+ return configuration
+
+ def test_get_device_mapping_from_network(self):
+ GlobalParams._is_normal_test = True
+ initiator_list = ['10008c7cff523b01']
+ target_list = ['20240002ac000a50', '20240002ac000a40']
+ device_map = self.get_device_mapping_from_network(
+ initiator_list, target_list)
+ self.assertDictMatch(_device_map_to_verify, device_map)
+
+ def test_get_device_mapping_from_network_for_invalid_config(self):
+ GlobalParams._is_normal_test = False
+ initiator_list = ['10008c7cff523b01']
+ target_list = ['20240002ac000a50', '20240002ac000a40']
+ self.assertRaises(exception.FCSanLookupServiceException,
+ self.get_device_mapping_from_network,
+ initiator_list, target_list)
+
+
+class FakeCiscoFCSanLookupService(object):
+
+ def __init__(self, **kwargs):
+ pass
+
+ def get_device_mapping_from_network(self,
+ initiator_wwn_list,
+ target_wwn_list):
+ if not GlobalParams._is_normal_test:
+ raise exception.FCSanLookupServiceException("Error")
+ device_map = {}
+ initiators = []
+ targets = []
+ for i in initiator_wwn_list:
+ if (i in _initiator_ns_map[_fabric_wwn]):
+ initiators.append(i)
+ for t in target_wwn_list:
+ if (t in _target_ns_map[_fabric_wwn]):
+ targets.append(t)
+ device_map[_fabric_wwn] = {
+ 'initiator_port_wwn_list': initiators,
+ 'target_port_wwn_list': targets}
+ return device_map
+
+
+class GlobalParams(object):
+ global _is_normal_test
+ _is_normal_test = True
--- /dev/null
+# (c) Copyright 2014 Cisco Systems Inc.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+from oslo_config import cfg
+
+from cinder.volume import configuration
+
+cisco_zone_opts = [
+ cfg.StrOpt('cisco_fc_fabric_address',
+ default='',
+ help='Management IP of fabric'),
+ cfg.StrOpt('cisco_fc_fabric_user',
+ default='',
+ help='Fabric user ID'),
+ cfg.StrOpt('cisco_fc_fabric_password',
+ default='',
+ help='Password for user',
+ secret=True),
+ cfg.PortOpt('cisco_fc_fabric_port',
+ default=22,
+ help='Connecting port'),
+ cfg.StrOpt('cisco_zoning_policy',
+ default='initiator-target',
+ help='overridden zoning policy'),
+ cfg.BoolOpt('cisco_zone_activate',
+ default=True,
+ help='overridden zoning activation state'),
+ cfg.StrOpt('cisco_zone_name_prefix',
+ help='overridden zone name prefix'),
+ cfg.StrOpt('cisco_zoning_vsan',
+ help='VSAN of the Fabric'),
+]
+
+CONF = cfg.CONF
+CONF.register_opts(cisco_zone_opts, group='CISCO_FABRIC_EXAMPLE')
+
+
+def load_fabric_configurations(fabric_names):
+ fabric_configs = {}
+ for fabric_name in fabric_names:
+ config = configuration.Configuration(cisco_zone_opts, fabric_name)
+ fabric_configs[fabric_name] = config
+
+ return fabric_configs
--- /dev/null
+# (c) Copyright 2014 Cisco Systems Inc.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+
+
+import random
+
+from eventlet import greenthread
+from oslo_concurrency import processutils
+from oslo_log import log as logging
+from oslo_utils import excutils
+import six
+
+from cinder import exception
+from cinder.i18n import _, _LE
+from cinder import ssh_utils
+from cinder import utils
+from cinder.zonemanager.drivers.cisco import cisco_fabric_opts as fabric_opts
+import cinder.zonemanager.drivers.cisco.fc_zone_constants as zone_constant
+from cinder.zonemanager import fc_san_lookup_service as fc_service
+from cinder.zonemanager import utils as zm_utils
+
+LOG = logging.getLogger(__name__)
+
+
+class CiscoFCSanLookupService(fc_service.FCSanLookupService):
+ """The SAN lookup service that talks to Cisco switches.
+
+ Version History:
+ 1.0.0 - Initial version
+
+ """
+
+ VERSION = "1.0.0"
+
+ def __init__(self, **kwargs):
+ """Initializing the client."""
+ super(CiscoFCSanLookupService, self).__init__(**kwargs)
+ self.configuration = kwargs.get('configuration', None)
+ self.create_configuration()
+
+ self.switch_user = ""
+ self.switch_port = ""
+ self.switch_pwd = ""
+ self.switch_ip = ""
+ self.sshpool = None
+
+ def create_configuration(self):
+ """Configuration specific to SAN context values."""
+ config = self.configuration
+
+ fabric_names = [x.strip() for x in config.fc_fabric_names.split(',')]
+ LOG.debug('Fabric Names: %s', fabric_names)
+
+ # There can be more than one SAN in the network and we need to
+ # get credentials for each for SAN context lookup later.
+ # Cisco Zonesets require VSANs
+ if fabric_names:
+ self.fabric_configs = fabric_opts.load_fabric_configurations(
+ fabric_names)
+
+ def get_device_mapping_from_network(self,
+ initiator_wwn_list,
+ target_wwn_list):
+ """Provides the initiator/target map for available SAN contexts.
+
+ Looks up fcns database of each fc SAN configured to find logged in
+ devices and returns a map of initiator and target port WWNs for each
+ fabric.
+
+ :param initiator_wwn_list: List of initiator port WWN
+ :param target_wwn_list: List of target port WWN
+ :returns: List -- device wwn map in following format
+ {
+ <San name>: {
+ 'initiator_port_wwn_list':
+ ('200000051e55a100', '200000051e55a121'..)
+ 'target_port_wwn_list':
+ ('100000051e55a100', '100000051e55a121'..)
+ }
+ }
+ :raises: Exception when connection to fabric is failed
+ """
+ device_map = {}
+ formatted_target_list = []
+ formatted_initiator_list = []
+ fabric_map = {}
+ fabric_names = self.configuration.fc_fabric_names
+
+ if not fabric_names:
+ raise exception.InvalidParameterValue(
+ err=_("Missing Fibre Channel SAN configuration "
+ "param - fc_fabric_names"))
+
+ fabrics = [x.strip() for x in fabric_names.split(',')]
+
+ LOG.debug("FC Fabric List: %s", fabrics)
+ if fabrics:
+ for t in target_wwn_list:
+ formatted_target_list.append(zm_utils.get_formatted_wwn(t))
+
+ for i in initiator_wwn_list:
+ formatted_initiator_list.append(zm_utils.get_formatted_wwn(i))
+
+ for fabric_name in fabrics:
+ self.switch_ip = self.fabric_configs[fabric_name].safe_get(
+ 'cisco_fc_fabric_address')
+ self.switch_user = self.fabric_configs[fabric_name].safe_get(
+ 'cisco_fc_fabric_user')
+ self.switch_pwd = self.fabric_configs[fabric_name].safe_get(
+ 'cisco_fc_fabric_password')
+ self.switch_port = self.fabric_configs[fabric_name].safe_get(
+ 'cisco_fc_fabric_port')
+ zoning_vsan = self.fabric_configs[fabric_name].safe_get(
+ 'cisco_zoning_vsan')
+
+ # Get name server data from fabric and find the targets
+ # logged in
+ nsinfo = ''
+ LOG.debug("show fcns database for vsan %s", zoning_vsan)
+ nsinfo = self.get_nameserver_info(zoning_vsan)
+
+ LOG.debug("Lookup service:fcnsdatabase-%s", nsinfo)
+ LOG.debug("Lookup service:initiator list from caller-%s",
+ formatted_initiator_list)
+ LOG.debug("Lookup service:target list from caller-%s",
+ formatted_target_list)
+ visible_targets = [x for x in nsinfo
+ if x in formatted_target_list]
+ visible_initiators = [x for x in nsinfo
+ if x in formatted_initiator_list]
+
+ if visible_targets:
+ LOG.debug("Filtered targets is: %s", visible_targets)
+ # getting rid of the : before returning
+ for idx, elem in enumerate(visible_targets):
+ elem = str(elem).replace(':', '')
+ visible_targets[idx] = elem
+ else:
+ LOG.debug("No targets are in the fcns database"
+ " for vsan %s", zoning_vsan)
+
+ if visible_initiators:
+ # getting rid of the : before returning ~sk
+ for idx, elem in enumerate(visible_initiators):
+ elem = str(elem).replace(':', '')
+ visible_initiators[idx] = elem
+ else:
+ LOG.debug("No initiators are in the fcns database"
+ " for vsan %s", zoning_vsan)
+
+ fabric_map = {'initiator_port_wwn_list': visible_initiators,
+ 'target_port_wwn_list': visible_targets
+ }
+ device_map[zoning_vsan] = fabric_map
+ LOG.debug("Device map for SAN context: %s", device_map)
+ return device_map
+
+ def get_nameserver_info(self, fabric_vsan):
+ """Get fcns database info from fabric.
+
+ This method will return the connected node port wwn list(local
+ and remote) for the given switch fabric
+ """
+ cli_output = None
+ nsinfo_list = []
+ try:
+ cmd = ([zone_constant.FCNS_SHOW, fabric_vsan, ' | no-more'])
+ cli_output = self._get_switch_info(cmd)
+ except exception.FCSanLookupServiceException:
+ with excutils.save_and_reraise_exception():
+ LOG.error(_LE("Failed collecting show fcns database for"
+ " fabric"))
+ if cli_output:
+ nsinfo_list = self._parse_ns_output(cli_output)
+
+ LOG.debug("Connector returning fcns info-%s", nsinfo_list)
+ return nsinfo_list
+
+ def _get_switch_info(self, cmd_list):
+ stdout, stderr, sw_data = None, None, None
+ try:
+ stdout, stderr = self._run_ssh(cmd_list, True, 1)
+ LOG.debug("CLI output from ssh - output: %s", stdout)
+ if (stdout):
+ sw_data = stdout.splitlines()
+ return sw_data
+ except processutils.ProcessExecutionError as e:
+ msg = _("Error while getting data via ssh: (command=%(cmd)s "
+ "error=%(err)s).") % {'cmd': cmd_list,
+ 'err': six.text_type(e)}
+ LOG.error(msg)
+ raise exception.CiscoZoningCliException(reason=msg)
+
+ def _parse_ns_output(self, switch_data):
+ """Parses name server data.
+
+ Parses nameserver raw data and adds the device port wwns to the list
+
+ :returns: list of device port wwn from ns info
+ """
+ nsinfo_list = []
+ for line in switch_data:
+ if not(" N " in line):
+ continue
+ linesplit = line.split()
+ if len(linesplit) > 2:
+ node_port_wwn = linesplit[2]
+ nsinfo_list.append(node_port_wwn)
+ else:
+ msg = _("Malformed fcns output string: %s") % line
+ LOG.error(msg)
+ raise exception.InvalidParameterValue(err=msg)
+ return nsinfo_list
+
+ def _run_ssh(self, cmd_list, check_exit_code=True, attempts=1):
+
+ command = ' '.join(cmd_list)
+
+ if not self.sshpool:
+ self.sshpool = ssh_utils.SSHPool(self.switch_ip,
+ self.switch_port,
+ None,
+ self.switch_user,
+ self.switch_pwd,
+ min_size=1,
+ max_size=5)
+ last_exception = None
+ try:
+ with self.sshpool.item() as ssh:
+ while attempts > 0:
+ attempts -= 1
+ try:
+ return processutils.ssh_execute(
+ ssh,
+ command,
+ check_exit_code=check_exit_code)
+ except Exception as e:
+ msg = _("Exception: %s") % six.text_type(e)
+ LOG.error(msg)
+ last_exception = e
+ greenthread.sleep(random.randint(20, 500) / 100.0)
+ try:
+ raise processutils.ProcessExecutionError(
+ exit_code=last_exception.exit_code,
+ stdout=last_exception.stdout,
+ stderr=last_exception.stderr,
+ cmd=last_exception.cmd)
+ except AttributeError:
+ raise processutils.ProcessExecutionError(
+ exit_code=-1,
+ stdout="",
+ stderr="Error running SSH command",
+ cmd=command)
+ except Exception:
+ with excutils.save_and_reraise_exception():
+ LOG.error(_LE("Error running SSH command: %s"), command)
+
+ def _ssh_execute(self, cmd_list, check_exit_code=True, attempts=1):
+ """Execute cli with status update.
+
+ Executes CLI commands where status return is expected.
+
+ cmd_list is a list of commands, where each command is itself
+ a list of parameters. We use utils.check_ssh_injection to check each
+ command, but then join then with " ; " to form a single command.
+ """
+
+ # Check that each command is secure
+ for cmd in cmd_list:
+ utils.check_ssh_injection(cmd)
+
+ # Combine into a single command.
+ command = ' ; '.join(map(lambda x: ' '.join(x), cmd_list))
+
+ if not self.sshpool:
+ self.sshpool = ssh_utils.SSHPool(self.switch_ip,
+ self.switch_port,
+ None,
+ self.switch_user,
+ self.switch_pwd,
+ min_size=1,
+ max_size=5)
+ stdin, stdout, stderr = None, None, None
+ LOG.debug("Executing command via ssh: %s", command)
+ last_exception = None
+ try:
+ with self.sshpool.item() as ssh:
+ while attempts > 0:
+ attempts -= 1
+ try:
+ stdin, stdout, stderr = ssh.exec_command(command)
+ greenthread.sleep(random.randint(20, 500) / 100.0)
+ channel = stdout.channel
+ exit_status = channel.recv_exit_status()
+ LOG.debug("Exit Status from ssh:%s", exit_status)
+ # exit_status == -1 if no exit code was returned
+ if exit_status != -1:
+ LOG.debug('Result was %s', exit_status)
+ if check_exit_code and exit_status != 0:
+ raise processutils.ProcessExecutionError(
+ exit_code=exit_status,
+ stdout=stdout,
+ stderr=stderr,
+ cmd=command)
+ else:
+ return True
+ else:
+ return True
+ except Exception as e:
+ msg = _("Exception: %s") % six.text_type(e)
+ LOG.error(msg)
+ last_exception = e
+ greenthread.sleep(random.randint(20, 500) / 100.0)
+ LOG.debug("Handling error case after SSH:%s", last_exception)
+ try:
+ raise processutils.ProcessExecutionError(
+ exit_code=last_exception.exit_code,
+ stdout=last_exception.stdout,
+ stderr=last_exception.stderr,
+ cmd=last_exception.cmd)
+ except AttributeError:
+ raise processutils.ProcessExecutionError(
+ exit_code=-1,
+ stdout="",
+ stderr="Error running SSH command",
+ cmd=command)
+ except Exception as e:
+ with excutils.save_and_reraise_exception():
+ msg = (_("Error executing command via ssh: %s") %
+ six.text_type(e))
+ LOG.error(msg)
+ finally:
+ if stdin:
+ stdin.flush()
+ stdin.close()
+ if stdout:
+ stdout.close()
+ if stderr:
+ stderr.close()
+
+ def cleanup(self):
+ self.sshpool = None
--- /dev/null
+# (c) Copyright 2014 Cisco Systems Inc.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+
+
+"""
+Script to push the zone configuration to Cisco SAN switches.
+"""
+import random
+import re
+
+from eventlet import greenthread
+from oslo_concurrency import processutils
+from oslo_log import log as logging
+from oslo_utils import excutils
+import six
+
+from cinder import exception
+from cinder.i18n import _, _LE, _LI, _LW
+from cinder import ssh_utils
+from cinder import utils
+import cinder.zonemanager.drivers.cisco.fc_zone_constants as ZoneConstant
+
+LOG = logging.getLogger(__name__)
+
+
+class CiscoFCZoneClientCLI(object):
+ """Cisco FC zone client cli implementation.
+
+ OpenStack Fibre Channel zone client cli connector
+ to manage FC zoning in Cisco SAN fabrics.
+
+ Version history:
+ 1.0 - Initial Cisco FC zone client cli
+ """
+
+ switch_ip = None
+ switch_port = '22'
+ switch_user = 'admin'
+ switch_pwd = 'none'
+
+ def __init__(self, ipaddress, username, password, port, vsan):
+ """initializing the client."""
+ self.switch_ip = ipaddress
+ self.switch_port = port
+ self.switch_user = username
+ self.switch_pwd = password
+ self.fabric_vsan = vsan
+ self.sshpool = None
+
+ def get_active_zone_set(self):
+ """Return the active zone configuration.
+
+ Return active zoneset from fabric. When none of the configurations
+ are active then it will return empty map.
+
+ :returns: Map -- active zone set map in the following format
+ {
+ 'zones':
+ {'openstack50060b0000c26604201900051ee8e329':
+ ['50060b0000c26604', '201900051ee8e329']
+ },
+ 'active_zone_config': 'OpenStack_Cfg'
+ }
+ """
+ zone_set = {}
+ zone = {}
+ zone_member = None
+ zone_name = None
+ switch_data = None
+ zone_set_name = None
+ try:
+ switch_data = self._get_switch_info(
+ [ZoneConstant.GET_ACTIVE_ZONE_CFG, self.fabric_vsan,
+ ' | no-more'])
+ except exception.CiscoZoningCliException:
+ with excutils.save_and_reraise_exception():
+ LOG.error(_LE("Failed getting active zone set "
+ "from fabric %s"), self.switch_ip)
+ try:
+ for line in switch_data:
+ # Split on non-word characters,
+ line_split = re.split('[\s\[\]]+', line)
+ if ZoneConstant.CFG_ZONESET in line_split:
+ # zoneset name [name] vsan [vsan]
+ zone_set_name = \
+ line_split[line_split.index(ZoneConstant.CFG_ZONESET)
+ + 2]
+ continue
+ if ZoneConstant.CFG_ZONE in line_split:
+ # zone name [name] vsan [vsan]
+ zone_name = \
+ line_split[line_split.index(ZoneConstant.CFG_ZONE) + 2]
+ zone[zone_name] = list()
+ continue
+ if ZoneConstant.CFG_ZONE_MEMBER in line_split:
+ # Examples:
+ # pwwn c0:50:76:05:15:9f:00:12
+ # * fcid 0x1e01c0 [pwwn 50:05:07:68:02:20:48:04] [V7K_N1P2]
+ zone_member = \
+ line_split[
+ line_split.index(ZoneConstant.CFG_ZONE_MEMBER) + 1]
+ zone_member_list = zone.get(zone_name)
+ zone_member_list.append(zone_member)
+
+ zone_set[ZoneConstant.CFG_ZONES] = zone
+ zone_set[ZoneConstant.ACTIVE_ZONE_CONFIG] = zone_set_name
+ except Exception as ex:
+ # In case of parsing error here, it should be malformed cli output.
+ msg = _("Malformed zone configuration: (switch=%(switch)s "
+ "zone_config=%(zone_config)s)."
+ ) % {'switch': self.switch_ip,
+ 'zone_config': switch_data}
+ LOG.error(msg)
+ exc_msg = _("Exception: %s") % six.text_type(ex)
+ LOG.error(exc_msg)
+ raise exception.FCZoneDriverException(reason=msg)
+
+ return zone_set
+
+ def add_zones(self, zones, activate, fabric_vsan, active_zone_set,
+ zone_status):
+ """Add zone configuration.
+
+ This method will add the zone configuration passed by user.
+ input params:
+ zones - zone names mapped to members and VSANs.
+ zone members are colon separated but case-insensitive
+ { zonename1:[zonememeber1,zonemember2,...],
+ zonename2:[zonemember1, zonemember2,...]...}
+ e.g: {'openstack50060b0000c26604201900051ee8e329':
+ ['50:06:0b:00:00:c2:66:04', '20:19:00:05:1e:e8:e3:29']
+ }
+ activate - True/False
+ """
+ LOG.debug("Add Zones - Zones passed: %s", zones)
+
+ LOG.debug("Active zone set: %s", active_zone_set)
+ zone_list = active_zone_set[ZoneConstant.CFG_ZONES]
+ LOG.debug("zone list: %s", zone_list)
+ LOG.debug("zone status: %s", zone_status)
+
+ cfg_name = active_zone_set[ZoneConstant.ACTIVE_ZONE_CONFIG]
+
+ zone_cmds = [['conf'],
+ ['zoneset', 'name', cfg_name, 'vsan', fabric_vsan]]
+
+ for zone in zones.keys():
+ # if zone exists, its an update. Delete & insert
+ LOG.debug("Update call")
+ if zone in zone_list:
+ # Response from get_active_zone_set strips colons from WWPNs
+ current_zone = set(zone_list[zone])
+ new_wwpns = map(lambda x: x.lower().replace(':', ''),
+ zones[zone])
+ new_zone = set(new_wwpns)
+
+ if current_zone != new_zone:
+ try:
+ self.delete_zones(zone, activate, fabric_vsan,
+ active_zone_set, zone_status)
+ except exception.CiscoZoningCliException:
+ with excutils.save_and_reraise_exception():
+ LOG.error(_LE("Deleting zone failed %s"), zone)
+ LOG.debug("Deleted Zone before insert : %s", zone)
+
+ zone_cmds.append(['zone', 'name', zone])
+
+ for member in zones[zone]:
+ zone_cmds.append(['member', 'pwwn', member])
+
+ zone_cmds.append(['end'])
+
+ try:
+ LOG.debug("Add zones: Config cmd to run: %s", zone_cmds)
+ self._ssh_execute(zone_cmds, True, 1)
+
+ if activate:
+ self.activate_zoneset(cfg_name, fabric_vsan, zone_status)
+ self._cfg_save()
+ except Exception as e:
+
+ msg = _("Creating and activating zone set failed: "
+ "(Zone set=%(zoneset)s error=%(err)s)."
+ ) % {'zoneset': cfg_name, 'err': six.text_type(e)}
+ LOG.error(msg)
+ raise exception.CiscoZoningCliException(reason=msg)
+
+ def activate_zoneset(self, cfgname, fabric_vsan, zone_status):
+ """Method to Activate the zone config. Param cfgname - ZonesetName."""
+
+ LOG.debug("zone status: %s", zone_status)
+
+ cmd_list = [['conf'],
+ ['zoneset', 'activate', 'name', cfgname, 'vsan',
+ self.fabric_vsan]]
+ if zone_status['mode'] == 'enhanced':
+ cmd_list.append(['zone', 'commit', 'vsan', fabric_vsan])
+
+ cmd_list.append(['end'])
+
+ return self._ssh_execute(cmd_list, True, 1)
+
+ def get_zoning_status(self):
+ """Return the zoning mode and session for a zoneset."""
+ zone_status = {}
+
+ try:
+ switch_data = self._get_switch_info(
+ [ZoneConstant.GET_ZONE_STATUS, self.fabric_vsan])
+ except exception.CiscoZoningCliException:
+ with excutils.save_and_reraise_exception():
+ LOG.error(_LE("Failed getting zone status "
+ "from fabric %s"), self.switch_ip)
+ try:
+ for line in switch_data:
+ # Split on non-word characters,
+ line_split = re.split('[\s\[\]]+', line)
+ if 'mode:' in line_split:
+ # mode: <enhanced|basic>
+ zone_status['mode'] = line_split[line_split.index('mode:')
+ + 1]
+ continue
+ if 'session:' in line_split:
+ # session: <none|a value other than none>
+ zone_status['session'] = \
+ line_split[line_split.index('session:') + 1]
+ continue
+ except Exception as ex:
+ # In case of parsing error here, it should be malformed cli output.
+ msg = _("Malformed zone status: (switch=%(switch)s "
+ "zone_config=%(zone_config)s)."
+ ) % {'switch': self.switch_ip,
+ 'zone_status': switch_data}
+ LOG.error(msg)
+ exc_msg = _("Exception: %s") % six.text_type(ex)
+ LOG.error(exc_msg)
+ raise exception.FCZoneDriverException(reason=msg)
+
+ return zone_status
+
+ def delete_zones(self, zone_names, activate, fabric_vsan, active_zone_set,
+ zone_status):
+ """Delete zones from fabric.
+
+ Method to delete the active zone config zones
+
+ params zone_names: zoneNames separated by semicolon
+ params activate: True/False
+ """
+
+ LOG.debug("zone_names %s", zone_names)
+ active_zoneset_name = active_zone_set[ZoneConstant.ACTIVE_ZONE_CONFIG]
+
+ cmds = [['conf'],
+ ['zoneset', 'name', active_zoneset_name, 'vsan',
+ fabric_vsan]]
+
+ try:
+ for zone in set(zone_names.split(';')):
+ cmds.append(['no', 'zone', 'name', zone])
+
+ cmds.append(['end'])
+
+ LOG.debug("Delete zones: Config cmd to run: %s", cmds)
+ self._ssh_execute(cmds, True, 1)
+
+ if activate:
+ self.activate_zoneset(active_zoneset_name, fabric_vsan,
+ zone_status)
+ self._cfg_save()
+
+ except Exception as e:
+ msg = _("Deleting zones failed: (command=%(cmd)s error=%(err)s)."
+ ) % {'cmd': cmds, 'err': six.text_type(e)}
+ LOG.error(msg)
+ raise exception.CiscoZoningCliException(reason=msg)
+
+ def get_nameserver_info(self):
+ """Get name server data from fabric.
+
+ This method will return the connected node port wwn list(local
+ and remote) for the given switch fabric
+
+ show fcns database
+ """
+ cli_output = None
+ return_list = []
+ try:
+ cli_output = self._get_switch_info([ZoneConstant.FCNS_SHOW,
+ self.fabric_vsan])
+ except exception.CiscoZoningCliException:
+ with excutils.save_and_reraise_exception():
+ LOG.error(_LE("Failed collecting fcns database "
+ "info for fabric %s"), self.switch_ip)
+
+ if (cli_output):
+ return_list = self._parse_ns_output(cli_output)
+
+ LOG.info(_LI("Connector returning fcnsinfo-%s"), return_list)
+
+ return return_list
+
+ @utils.retry(processutils.ProcessExecutionError, retries=5)
+ def _cfg_save(self):
+ cmd = ['copy', 'running-config', 'startup-config']
+ self._run_ssh(cmd, True)
+
+ def _get_switch_info(self, cmd_list):
+ stdout, stderr, sw_data = None, None, None
+ try:
+ stdout, stderr = self._run_ssh(cmd_list, True)
+ LOG.debug("CLI output from ssh - output: %s", stdout)
+ if (stdout):
+ sw_data = stdout.splitlines()
+ return sw_data
+ except processutils.ProcessExecutionError as e:
+ msg = _("Error while getting data via ssh: (command=%(cmd)s "
+ "error=%(err)s).") % {'cmd': cmd_list,
+ 'err': six.text_type(e)}
+ LOG.error(msg)
+ raise exception.CiscoZoningCliException(reason=msg)
+
+ def _parse_ns_output(self, switch_data):
+ """Parses name server data.
+
+ Parses nameserver raw data and adds the device port wwns to the list
+
+ :returns: List -- list of device port wwn from ns info
+ """
+ return_list = []
+ for line in switch_data:
+ if not(" N " in line):
+ continue
+ linesplit = line.split()
+ if len(linesplit) > 2:
+ node_port_wwn = linesplit[2]
+ return_list.append(node_port_wwn)
+ else:
+ msg = _("Malformed show fcns database string: %s") % line
+ LOG.error(msg)
+ raise exception.InvalidParameterValue(err=msg)
+ return return_list
+
+ def _run_ssh(self, cmd_list, check_exit_code=True):
+
+ command = ' '.join(cmd_list)
+
+ if not self.sshpool:
+ self.sshpool = ssh_utils.SSHPool(self.switch_ip,
+ self.switch_port,
+ None,
+ self.switch_user,
+ self.switch_pwd,
+ min_size=1,
+ max_size=5)
+ try:
+ with self.sshpool.item() as ssh:
+ return processutils.ssh_execute(
+ ssh,
+ command,
+ check_exit_code=check_exit_code)
+
+ except Exception:
+ with excutils.save_and_reraise_exception():
+ LOG.warning(_LW("Error running SSH command: %s"), command)
+
+ def _ssh_execute(self, cmd_list, check_exit_code=True, attempts=1):
+ """Execute cli with status update.
+
+ Executes CLI commands where status return is expected.
+
+ cmd_list is a list of commands, where each command is itself
+ a list of parameters. We use utils.check_ssh_injection to check each
+ command, but then join then with " ; " to form a single command.
+ """
+
+ # Check that each command is secure
+ for cmd in cmd_list:
+ utils.check_ssh_injection(cmd)
+
+ # Combine into a single command.
+ command = ' ; '.join(map(lambda x: ' '.join(x), cmd_list))
+
+ if not self.sshpool:
+ self.sshpool = ssh_utils.SSHPool(self.switch_ip,
+ self.switch_port,
+ None,
+ self.switch_user,
+ self.switch_pwd,
+ min_size=1,
+ max_size=5)
+ stdin, stdout, stderr = None, None, None
+ LOG.debug("Executing command via ssh: %s", command)
+ last_exception = None
+ try:
+ with self.sshpool.item() as ssh:
+ while attempts > 0:
+ attempts -= 1
+ try:
+ stdin, stdout, stderr = ssh.exec_command(command)
+ channel = stdout.channel
+ exit_status = channel.recv_exit_status()
+ LOG.debug("Exit Status from ssh: %s", exit_status)
+ # exit_status == -1 if no exit code was returned
+ if exit_status != -1:
+ LOG.debug('Result was %s', exit_status)
+ if check_exit_code and exit_status != 0:
+ raise processutils.ProcessExecutionError(
+ exit_code=exit_status,
+ stdout=stdout,
+ stderr=stderr,
+ cmd=command)
+ else:
+ return True
+ else:
+ return True
+ except Exception as e:
+ LOG.exception(_LE('Error executing SSH command.'))
+ last_exception = e
+ greenthread.sleep(random.randint(20, 500) / 100.0)
+ LOG.debug("Handling error case after SSH: %s", last_exception)
+ try:
+ raise processutils.ProcessExecutionError(
+ exit_code=last_exception.exit_code,
+ stdout=last_exception.stdout,
+ stderr=last_exception.stderr,
+ cmd=last_exception.cmd)
+ except AttributeError:
+ raise processutils.ProcessExecutionError(
+ exit_code=-1,
+ stdout="",
+ stderr="Error running SSH command",
+ cmd=command)
+ except Exception:
+ with excutils.save_and_reraise_exception():
+ LOG.exception(_LE("Error executing command via ssh."))
+ finally:
+ if stdin:
+ stdin.flush()
+ stdin.close()
+ if stdout:
+ stdout.close()
+ if stderr:
+ stderr.close()
+
+ def cleanup(self):
+ self.sshpool = None
--- /dev/null
+# (c) Copyright 2014 Cisco Systems Inc.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+
+
+"""
+Cisco Zone Driver is responsible to manage access control using FC zoning
+for Cisco FC fabrics.
+This is a concrete implementation of FCZoneDriver interface implementing
+add_connection and delete_connection interfaces.
+
+**Related Flags**
+
+:zone_activate: Used by: class: 'FCZoneDriver'. Defaults to True
+:zone_name_prefix: Used by: class: 'FCZoneDriver'. Defaults to 'openstack'
+"""
+
+from oslo_concurrency import lockutils
+from oslo_config import cfg
+from oslo_log import log as logging
+from oslo_utils import excutils
+from oslo_utils import importutils
+import six
+import string
+
+from cinder import exception
+from cinder.i18n import _, _LE, _LI
+from cinder.zonemanager.drivers.cisco import cisco_fabric_opts as fabric_opts
+from cinder.zonemanager.drivers import driver_utils
+from cinder.zonemanager.drivers import fc_zone_driver
+from cinder.zonemanager import utils as zm_utils
+
+LOG = logging.getLogger(__name__)
+
+SUPPORTED_CHARS = string.ascii_letters + string.digits + '$' + '-' + '^' + '_'
+cisco_opts = [
+ cfg.StrOpt('cisco_sb_connector',
+ default='cinder.zonemanager.drivers.cisco'
+ '.cisco_fc_zone_client_cli.CiscoFCZoneClientCLI',
+ help='Southbound connector for zoning operation'),
+]
+
+CONF = cfg.CONF
+CONF.register_opts(cisco_opts, group='fc-zone-manager')
+
+
+class CiscoFCZoneDriver(fc_zone_driver.FCZoneDriver):
+ """Cisco FC zone driver implementation.
+
+ OpenStack Fibre Channel zone driver to manage FC zoning in
+ Cisco SAN fabrics.
+
+ Version history:
+ 1.0 - Initial Cisco FC zone driver
+ 1.1 - Added friendly zone name support
+ """
+
+ VERSION = "1.1.0"
+
+ def __init__(self, **kwargs):
+ super(CiscoFCZoneDriver, self).__init__(**kwargs)
+ self.configuration = kwargs.get('configuration', None)
+ if self.configuration:
+ self.configuration.append_config_values(cisco_opts)
+
+ # Adding a hack to handle parameters from super classes
+ # in case configured with multi backends.
+ fabric_names = self.configuration.safe_get('fc_fabric_names')
+ activate = self.configuration.safe_get('cisco_zone_activate')
+ prefix = self.configuration.safe_get('cisco_zone_name_prefix')
+ base_san_opts = []
+ if not fabric_names:
+ base_san_opts.append(
+ cfg.StrOpt('fc_fabric_names',
+ help='Comma separated list of fibre channel '
+ 'fabric names. This list of names is used to'
+ ' retrieve other SAN credentials for connecting'
+ ' to each SAN fabric'
+ ))
+ if not activate:
+ base_san_opts.append(
+ cfg.BoolOpt('cisco_zone_activate',
+ default=True,
+ help='Indicates whether zone should '
+ 'be activated or not'))
+ if not prefix:
+ base_san_opts.append(
+ cfg.StrOpt('cisco_zone_name_prefix',
+ default="openstack",
+ help="A prefix to be used when naming zone"))
+ if len(base_san_opts) > 0:
+ CONF.register_opts(base_san_opts)
+ self.configuration.append_config_values(base_san_opts)
+ fabric_names = [x.strip() for x in self.
+ configuration.fc_fabric_names.split(',')]
+
+ # There can be more than one SAN in the network and we need to
+ # get credentials for each SAN.
+ if fabric_names:
+ self.fabric_configs = fabric_opts.load_fabric_configurations(
+ fabric_names)
+
+ @lockutils.synchronized('cisco', 'fcfabric-', True)
+ def add_connection(self, fabric, initiator_target_map, host_name=None,
+ storage_system=None):
+ """Concrete implementation of add_connection.
+
+ Based on zoning policy and state of each I-T pair, list of zone
+ members are created and pushed to the fabric to add zones. The
+ new zones created or zones updated are activated based on isActivate
+ flag set in cinder.conf returned by volume driver after attach
+ operation.
+
+ :param fabric: Fabric name from cinder.conf file
+ :param initiator_target_map: Mapping of initiator to list of targets
+ """
+
+ LOG.debug("Add connection for Fabric: %s", fabric)
+ LOG.info(_LI("CiscoFCZoneDriver - Add connection "
+ "for I-T map: %s"), initiator_target_map)
+ fabric_ip = self.fabric_configs[fabric].safe_get(
+ 'cisco_fc_fabric_address')
+ fabric_user = self.fabric_configs[fabric].safe_get(
+ 'cisco_fc_fabric_user')
+ fabric_pwd = self.fabric_configs[fabric].safe_get(
+ 'cisco_fc_fabric_password')
+ fabric_port = self.fabric_configs[fabric].safe_get(
+ 'cisco_fc_fabric_port')
+ zoning_policy = self.configuration.zoning_policy
+ zoning_policy_fab = self.fabric_configs[fabric].safe_get(
+ 'cisco_zoning_policy')
+ if zoning_policy_fab:
+ zoning_policy = zoning_policy_fab
+
+ zoning_vsan = self.fabric_configs[fabric].safe_get('cisco_zoning_vsan')
+
+ LOG.info(_LI("Zoning policy for Fabric %s"), zoning_policy)
+
+ statusmap_from_fabric = self.get_zoning_status(
+ fabric_ip, fabric_user, fabric_pwd, fabric_port, zoning_vsan)
+
+ if statusmap_from_fabric.get('session') == 'none':
+
+ cfgmap_from_fabric = self.get_active_zone_set(
+ fabric_ip, fabric_user, fabric_pwd, fabric_port, zoning_vsan)
+ zone_names = []
+ if cfgmap_from_fabric.get('zones'):
+ zone_names = cfgmap_from_fabric['zones'].keys()
+ # based on zoning policy, create zone member list and
+ # push changes to fabric.
+ for initiator_key in initiator_target_map.keys():
+ zone_map = {}
+ initiator = initiator_key.lower()
+ t_list = initiator_target_map[initiator_key]
+ if zoning_policy == 'initiator-target':
+ for t in t_list:
+ target = t.lower()
+ zone_members = [
+ zm_utils.get_formatted_wwn(initiator),
+ zm_utils.get_formatted_wwn(target)]
+ zone_name = (
+ driver_utils.get_friendly_zone_name(
+ zoning_policy,
+ initiator,
+ target,
+ host_name,
+ storage_system,
+ self.configuration.cisco_zone_name_prefix,
+ SUPPORTED_CHARS))
+ if (len(cfgmap_from_fabric) == 0 or (
+ zone_name not in zone_names)):
+ zone_map[zone_name] = zone_members
+ else:
+ # This is I-T zoning, skip if zone exists.
+ LOG.info(_LI("Zone exists in I-T mode. "
+ "Skipping zone creation %s"),
+ zone_name)
+ elif zoning_policy == 'initiator':
+ zone_members = [
+ zm_utils.get_formatted_wwn(initiator)]
+ for t in t_list:
+ target = t.lower()
+ zone_members.append(
+ zm_utils.get_formatted_wwn(target))
+
+ zone_name = (
+ driver_utils.get_friendly_zone_name(
+ zoning_policy,
+ initiator,
+ target,
+ host_name,
+ storage_system,
+ self.configuration.cisco_zone_name_prefix,
+ SUPPORTED_CHARS))
+
+ if len(zone_names) > 0 and (zone_name in zone_names):
+ zone_members = zone_members + filter(
+ lambda x: x not in zone_members,
+ cfgmap_from_fabric['zones'][zone_name])
+ zone_map[zone_name] = zone_members
+ else:
+ msg = _("Zoning Policy: %s, not"
+ " recognized") % zoning_policy
+ LOG.error(msg)
+ raise exception.FCZoneDriverException(msg)
+
+ LOG.info(_LI("Zone map to add: %s"), zone_map)
+
+ if len(zone_map) > 0:
+ conn = None
+ try:
+ conn = importutils.import_object(
+ self.configuration.cisco_sb_connector,
+ ipaddress=fabric_ip,
+ username=fabric_user,
+ password=fabric_pwd,
+ port=fabric_port,
+ vsan=zoning_vsan)
+ conn.add_zones(
+ zone_map, self.configuration.cisco_zone_activate,
+ zoning_vsan, cfgmap_from_fabric,
+ statusmap_from_fabric)
+ conn.cleanup()
+ except exception.CiscoZoningCliException as cisco_ex:
+ msg = _("Exception: %s") % six.text_type(cisco_ex)
+ raise exception.FCZoneDriverException(msg)
+ except Exception:
+ msg = _("Failed to add zoning configuration.")
+ LOG.exception(msg)
+ raise exception.FCZoneDriverException(msg)
+ LOG.debug("Zones added successfully: %s", zone_map)
+ else:
+ LOG.debug("Zoning session exists VSAN: %s", zoning_vsan)
+
+ @lockutils.synchronized('cisco', 'fcfabric-', True)
+ def delete_connection(self, fabric, initiator_target_map, host_name=None,
+ storage_system=None):
+ """Concrete implementation of delete_connection.
+
+ Based on zoning policy and state of each I-T pair, list of zones
+ are created for deletion. The zones are either updated deleted based
+ on the policy and attach/detach state of each I-T pair.
+
+ :param fabric: Fabric name from cinder.conf file
+ :param initiator_target_map: Mapping of initiator to list of targets
+ """
+ LOG.debug("Delete connection for fabric: %s", fabric)
+ LOG.info(_LI("CiscoFCZoneDriver - Delete connection for I-T map: %s"),
+ initiator_target_map)
+ fabric_ip = self.fabric_configs[fabric].safe_get(
+ 'cisco_fc_fabric_address')
+ fabric_user = self.fabric_configs[fabric].safe_get(
+ 'cisco_fc_fabric_user')
+ fabric_pwd = self.fabric_configs[fabric].safe_get(
+ 'cisco_fc_fabric_password')
+ fabric_port = self.fabric_configs[fabric].safe_get(
+ 'cisco_fc_fabric_port')
+ zoning_policy = self.configuration.zoning_policy
+ zoning_policy_fab = self.fabric_configs[fabric].safe_get(
+ 'cisco_zoning_policy')
+
+ if zoning_policy_fab:
+ zoning_policy = zoning_policy_fab
+
+ zoning_vsan = self.fabric_configs[fabric].safe_get('cisco_zoning_vsan')
+
+ LOG.info(_LI("Zoning policy for fabric %s"), zoning_policy)
+
+ statusmap_from_fabric = self.get_zoning_status(
+ fabric_ip, fabric_user, fabric_pwd, fabric_port, zoning_vsan)
+
+ if statusmap_from_fabric.get('session') == 'none':
+ cfgmap_from_fabric = self.get_active_zone_set(
+ fabric_ip, fabric_user, fabric_pwd, fabric_port, zoning_vsan)
+
+ zone_names = []
+ if cfgmap_from_fabric.get('zones'):
+ zone_names = cfgmap_from_fabric['zones'].keys()
+
+ # Based on zoning policy, get zone member list and push
+ # changes to fabric. This operation could result in an update
+ # for zone config with new member list or deleting zones from
+ # active cfg.
+
+ LOG.debug("zone config from Fabric: %s", cfgmap_from_fabric)
+ for initiator_key in initiator_target_map.keys():
+ initiator = initiator_key.lower()
+ formatted_initiator = zm_utils.get_formatted_wwn(initiator)
+ zone_map = {}
+ zones_to_delete = []
+ t_list = initiator_target_map[initiator_key]
+ if zoning_policy == 'initiator-target':
+ # In this case, zone needs to be deleted.
+ for t in t_list:
+ target = t.lower()
+ zone_name = (
+ driver_utils.get_friendly_zone_name(
+ zoning_policy,
+ initiator,
+ target,
+ host_name,
+ storage_system,
+ self.configuration.cisco_zone_name_prefix,
+ SUPPORTED_CHARS))
+ LOG.debug("Zone name to del: %s", zone_name)
+ if (len(zone_names) > 0 and (zone_name in zone_names)):
+ # delete zone.
+ LOG.debug("Added zone to delete to list: %s",
+ zone_name)
+ zones_to_delete.append(zone_name)
+
+ elif zoning_policy == 'initiator':
+ zone_members = [formatted_initiator]
+ for t in t_list:
+ target = t.lower()
+ zone_members.append(
+ zm_utils.get_formatted_wwn(target))
+
+ zone_name = driver_utils.get_friendly_zone_name(
+ zoning_policy,
+ initiator,
+ target,
+ host_name,
+ storage_system,
+ self.configuration.cisco_zone_name_prefix,
+ SUPPORTED_CHARS)
+
+ if (zone_names and (zone_name in zone_names)):
+ filtered_members = filter(
+ lambda x: x not in zone_members,
+ cfgmap_from_fabric['zones'][zone_name])
+
+ # The assumption here is that initiator is always
+ # there in the zone as it is 'initiator' policy.
+ # We find the filtered list and if it is non-empty,
+ # add initiator to it and update zone if filtered
+ # list is empty, we remove that zone.
+ LOG.debug("Zone delete - I mode: filtered targets: %s",
+ filtered_members)
+ if filtered_members:
+ filtered_members.append(formatted_initiator)
+ LOG.debug("Filtered zone members to update: %s",
+ filtered_members)
+ zone_map[zone_name] = filtered_members
+ LOG.debug("Filtered zone Map to update: %s",
+ zone_map)
+ else:
+ zones_to_delete.append(zone_name)
+ else:
+ LOG.info(_LI("Zoning Policy: %s, not recognized"),
+ zoning_policy)
+ LOG.debug("Final Zone map to update: %s", zone_map)
+ LOG.debug("Final Zone list to delete: %s", zones_to_delete)
+ conn = None
+ try:
+ conn = importutils.import_object(
+ self.configuration.cisco_sb_connector,
+ ipaddress=fabric_ip,
+ username=fabric_user,
+ password=fabric_pwd,
+ port=fabric_port,
+ vsan=zoning_vsan)
+ # Update zone membership.
+ if zone_map:
+ conn.add_zones(
+ zone_map, self.configuration.cisco_zone_activate,
+ zoning_vsan, cfgmap_from_fabric,
+ statusmap_from_fabric)
+ # Delete zones ~sk.
+ if zones_to_delete:
+ zone_name_string = ''
+ num_zones = len(zones_to_delete)
+ for i in range(0, num_zones):
+ if i == 0:
+ zone_name_string = ('%s%s' % (
+ zone_name_string,
+ zones_to_delete[i]))
+ else:
+ zone_name_string = ('%s%s%s' % (
+ zone_name_string, ';',
+ zones_to_delete[i]))
+
+ conn.delete_zones(zone_name_string,
+ self.configuration.
+ cisco_zone_activate,
+ zoning_vsan, cfgmap_from_fabric,
+ statusmap_from_fabric)
+ conn.cleanup()
+ except Exception:
+ msg = _("Failed to update or delete zoning configuration")
+ LOG.exception(msg)
+ raise exception.FCZoneDriverException(msg)
+ LOG.debug("Zones deleted successfully: %s", zone_map)
+ else:
+ LOG.debug("Zoning session exists VSAN: %s", zoning_vsan)
+
+ def get_san_context(self, target_wwn_list):
+ """Lookup SAN context for visible end devices.
+
+ Look up each SAN configured and return a map of SAN (fabric IP) to
+ list of target WWNs visible to the fabric.
+ """
+ formatted_target_list = []
+ fabric_map = {}
+ fabrics = [x.strip() for x in self.
+ configuration.fc_fabric_names.split(',')]
+ LOG.debug("Fabric List: %s", fabrics)
+ LOG.debug("Target wwn List: %s", target_wwn_list)
+ if len(fabrics) > 0:
+ for t in target_wwn_list:
+ formatted_target_list.append(
+ zm_utils.get_formatted_wwn(t.lower()))
+ LOG.debug("Formatted Target wwn List: %s", formatted_target_list)
+ for fabric_name in fabrics:
+ fabric_ip = self.fabric_configs[fabric_name].safe_get(
+ 'cisco_fc_fabric_address')
+ fabric_user = self.fabric_configs[fabric_name].safe_get(
+ 'cisco_fc_fabric_user')
+ fabric_pwd = self.fabric_configs[fabric_name].safe_get(
+ 'cisco_fc_fabric_password')
+ fabric_port = self.fabric_configs[fabric_name].safe_get(
+ 'cisco_fc_fabric_port')
+ zoning_vsan = self.fabric_configs[fabric_name].safe_get(
+ 'cisco_zoning_vsan')
+
+ # Get name server data from fabric and get the targets
+ # logged in.
+ nsinfo = None
+ try:
+ conn = importutils.import_object(
+ self.configuration.cisco_sb_connector,
+ ipaddress=fabric_ip,
+ username=fabric_user,
+ password=fabric_pwd, port=fabric_port,
+ vsan=zoning_vsan)
+ nsinfo = conn.get_nameserver_info()
+ LOG.debug("show fcns database info from fabric: %s",
+ nsinfo)
+ conn.cleanup()
+ except exception.CiscoZoningCliException:
+ with excutils.save_and_reraise_exception():
+ LOG.exception(_LE("Error getting show fcns database "
+ "info."))
+ except Exception:
+ msg = _("Failed to get show fcns database info.")
+ LOG.exception(msg)
+ raise exception.FCZoneDriverException(msg)
+ visible_targets = filter(
+ lambda x: x in formatted_target_list, nsinfo)
+
+ if visible_targets:
+ LOG.info(_LI("Filtered targets for SAN is: %s"),
+ {fabric_name: visible_targets})
+ # getting rid of the ':' before returning
+ for idx, elem in enumerate(visible_targets):
+ visible_targets[idx] = six.text_type(
+ visible_targets[idx]).replace(':', '')
+ fabric_map[fabric_name] = visible_targets
+ else:
+ LOG.debug("No targets are in the fcns info for SAN %s",
+ fabric_name)
+ LOG.debug("Return SAN context output: %s", fabric_map)
+ return fabric_map
+
+ def get_active_zone_set(self, fabric_ip,
+ fabric_user, fabric_pwd, fabric_port,
+ zoning_vsan):
+ """Gets active zoneset config for vsan."""
+ cfgmap = {}
+ conn = None
+ try:
+ LOG.debug("Southbound connector: %s",
+ self.configuration.cisco_sb_connector)
+ conn = importutils.import_object(
+ self.configuration.cisco_sb_connector,
+ ipaddress=fabric_ip, username=fabric_user,
+ password=fabric_pwd, port=fabric_port, vsan=zoning_vsan)
+ cfgmap = conn.get_active_zone_set()
+ conn.cleanup()
+ except Exception:
+ msg = _("Failed to access active zoning configuration.")
+ LOG.exception(msg)
+ raise exception.FCZoneDriverException(msg)
+ LOG.debug("Active zone set from fabric: %s", cfgmap)
+ return cfgmap
+
+ def get_zoning_status(self, fabric_ip, fabric_user, fabric_pwd,
+ fabric_port, zoning_vsan):
+ """Gets zoneset status and mode."""
+ statusmap = {}
+ conn = None
+ try:
+ LOG.debug("Southbound connector: %s",
+ self.configuration.cisco_sb_connector)
+ conn = importutils.import_object(
+ self.configuration.cisco_sb_connector,
+ ipaddress=fabric_ip, username=fabric_user,
+ password=fabric_pwd, port=fabric_port, vsan=zoning_vsan)
+ statusmap = conn.get_zoning_status()
+ conn.cleanup()
+ except Exception:
+ msg = _("Failed to access zoneset status:%s")
+ LOG.exception(msg)
+ raise exception.FCZoneDriverException(msg)
+ LOG.debug("Zoneset status from fabric: %s", statusmap)
+ return statusmap
--- /dev/null
+# (c) Copyright 2014 Cisco Systems Inc.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+
+
+"""
+Common constants used by Cisco FC Zone Driver.
+"""
+ACTIVE_ZONE_CONFIG = 'active_zone_config'
+CFG_ZONESET = 'zoneset'
+CFG_ZONE = 'zone'
+CFG_ZONE_MEMBER = 'pwwn'
+CFG_ZONES = 'zones'
+
+"""
+CLI Commands for FC zoning operations.
+"""
+GET_ACTIVE_ZONE_CFG = 'show zoneset active vsan '
+FCNS_SHOW = 'show fcns database vsan '
+GET_ZONE_STATUS = 'show zone status vsan '
+++ /dev/null
----
-upgrade:
- - The Cisco FC Zone Manager driver is no longer supported
- and not included in-tree.