#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
"-co", "current", "ipv4"]
if p.returncode != 0:
print "failed to retrieve hostmodel ipadm property"
return False
return True
if p.returncode != 0:
print "failed to set ipadm hostmodel property to %s" % value
return False
return True
if p.returncode != 0:
print "failed to retrieve datalink names"
# L3 agent datalinks are always 15 characters in length. They start
# with either 'l3i' or 'l3e', end with '_0', and in between they are
# hexadecimal digits.
continue
try:
# first remove the IP
dlname])
# It is possible that the IP was already deleted but not the
# datalink. So we continue and try and delete the datalink.
try:
# next remove the VNIC
dlname])
# remove the OVS Port
if ovs_bridge:
print "failed to remove datalink '%s' used by L3 agent: %s" % \
return retcode
# verify paths are valid
print '%s does not exist or is not readable' % f
# We need to remove VNICs associated with L3 agent if any were left over.
# Before that, we need to first remove the PF rules added under
# the rules were applied.
return ret_code
# System-wide forwarding (either ipv4 or ipv6 or both) must be enabled
# before neutron-l3-agent can be started.
"-o", "current", "ipv4"]
if p.returncode != 0:
print "failed to determine if IPv4 forwarding is enabled or not"
"-o", "current", "ipv6"]
if p.returncode != 0:
print "failed to determine if IPv6 forwarding is enabled or not"
print "System-wide IPv4 or IPv6 (or both) forwarding must be " \
"enabled before enabling neutron-l3-agent"
"--config-file %s --config-file %s --config-file %s " \
# The VPNaaS shutdown should unplumb all IP tunnels it created. But
# be paranoid and check for lingering tunnels created by OpenStack
# that may have been left behind if the OpenStack device driver exits
# unexpectedly. OpenStack VPN configuration is created when the service
# starts. Errors will occur if old IP tunnels still exist.
if vpn_ifs:
print "Error: Found existing IP tunnel interface(s)."
print "Then use svcadm(1M) to clear the service."
print "Use the following commands to remove:"
# set the hostmodel property if necessary
# retrieve the right OVS bridge based on the interface name
section = "ovs"
option = "integration_bridge"
else:
section = "DEFAULT"
option = "external_network_bridge"
try:
return ovs_bridge
def stop():
# Keep issuing SIGTERM until the contract is empty. This way we will catch
# any child processes missed because they were getting forked.
# 50 attempts will be made at intervals of 2 seconds. Typically, we
# will only need 0 or 1 additional attempt before the contract is empty but
# we chose to err on the side of caution. In the worst case, we will use
# 100 seconds in the below loop which will leave 500 seconds (timeout is
# 600s) for the other cleanup tasks, after which the service will be put to
# maintenance state if the contract was not killed successfully.
# anchor and then remove the IP interfaces on which the rules were applied.
# remove VNICs associated with L3 agent
# finally reset the hostmodel property
return smf_include.SMF_EXIT_OK
if __name__ == "__main__":