protected boolean defaultNetworkRulesForUserVm(String vmName, Long vmId, NicTO nic) throws XmlRpcException { if (!_canBridgeFirewall) { return false; } OvmVif.Details vif = getVifFromVm(vmName, nic.getDeviceId()); String ipAddress = nic.getIp(); String macAddress = vif.mac; String vifName = vif.name; String bridgeName = vif.bridge; return OvmSecurityGroup.defaultNetworkRulesForUserVm(_conn, vmName, String.valueOf(vmId), ipAddress, macAddress, vifName, bridgeName); }
final NetworkACL networkACL = new NetworkACL(dev, nic.getMac(), privateGw != null, nic.getIp(), netmask, ingressRules.toArray(new AclRule[ingressRules.size()]), egressRules.toArray(new AclRule[egressRules.size()]));
@Override public List<ConfigItem> generateConfig(final NetworkElementCommand cmd) { final LoadBalancerConfigCommand command = (LoadBalancerConfigCommand) cmd; final LoadBalancerConfigurator cfgtr = new HAProxyConfigurator(); final String[] configuration = cfgtr.generateConfiguration(command); String routerIp = command.getNic().getIp(); if (command.getVpcId() == null) { routerIp = cmd.getAccessDetail(NetworkElementCommand.ROUTER_IP); } final String tmpCfgFilePath = "/etc/haproxy/"; final String tmpCfgFileName = "haproxy.cfg.new." + String.valueOf(System.currentTimeMillis()); final String[][] allRules = cfgtr.generateFwRules(command); final String[] addRules = allRules[LoadBalancerConfigurator.ADD]; final String[] removeRules = allRules[LoadBalancerConfigurator.REMOVE]; final String[] statRules = allRules[LoadBalancerConfigurator.STATS]; final LoadBalancerRule loadBalancerRule = new LoadBalancerRule(configuration, tmpCfgFilePath, tmpCfgFileName, addRules, removeRules, statRules, routerIp); final List<LoadBalancerRule> rules = new LinkedList<LoadBalancerRule>(); rules.add(loadBalancerRule); final LoadBalancerRules configRules = new LoadBalancerRules(rules); return generateConfigItems(configRules); }
secIpsStr = "0;"; result = citrixResourceBase.callHostPlugin(conn, "vmops", "default_network_rules", "vmName", vmName, "vmIP", nic.getIp(), "vmMAC", nic.getMac(), "vmID", Long.toString(vmSpec.getId()), "secIps", secIpsStr); s_logger.warn("Failed to program default network rules for " + vmName + " on nic with ip:" + nic.getIp() + " mac:" + nic.getMac()); } else { s_logger.info("Programmed default network rules for " + vmName + " on nic with ip:" + nic.getIp() + " mac:" + nic.getMac());
protected boolean post_default_network_rules(final Connect conn, final String vmName, final NicTO nic, final Long vmId, final InetAddress dhcpServerIp, final String hostIp, final String hostMacAddr) { if (!_canBridgeFirewall) { return false; } final List<InterfaceDef> intfs = getInterfaces(conn, vmName); if (intfs.size() < nic.getDeviceId()) { return false; } final InterfaceDef intf = intfs.get(nic.getDeviceId()); final String brname = intf.getBrName(); final String vif = intf.getDevName(); final Script cmd = new Script(_securityGroupPath, _timeout, s_logger); cmd.add("post_default_network_rules"); cmd.add("--vmname", vmName); cmd.add("--vmid", vmId.toString()); cmd.add("--vmip", nic.getIp()); cmd.add("--vmmac", nic.getMac()); cmd.add("--vif", vif); cmd.add("--brname", brname); if (dhcpServerIp != null) { cmd.add("--dhcpSvr", dhcpServerIp.getHostAddress()); } cmd.add("--hostIp", hostIp); cmd.add("--hostMacAddr", hostMacAddr); final String result = cmd.execute(); if (result != null) { return false; } return true; }
if (mgmtNic != null) { Map<String, String> xenstoreData = new HashMap<String, String>(3); xenstoreData.put(XENSTORE_DATA_IP, mgmtNic.getIp().toString().trim()); xenstoreData.put(XENSTORE_DATA_GATEWAY, mgmtNic.getGateway().toString().trim()); xenstoreData.put(XENSTORE_DATA_NETMASK, mgmtNic.getNetmask().toString().trim());
for (NicTO nic : vmSpec.getNics()) { if (nic.getType() == TrafficType.Control) { controlIp = nic.getIp();
for (final NicTO nic : nics) { if (nic.getType() == TrafficType.Control) { controlIp = nic.getIp(); break;
for (NicTO nicTO : vmTO.getNics()) { if (nicTO.getType() == TrafficType.Guest) { returnedIp = nicTO.getIp();