Statistics
| Branch: | Tag: | Revision:

root / snf-cyclades-app / synnefo / api / util.py @ 0baa1e3d

History | View | Annotate | Download (14.9 kB)

1
# Copyright 2011-2012 GRNET S.A. All rights reserved.
2
#
3
# Redistribution and use in source and binary forms, with or
4
# without modification, are permitted provided that the following
5
# conditions are met:
6
#
7
#   1. Redistributions of source code must retain the above
8
#      copyright notice, this list of conditions and the following
9
#      disclaimer.
10
#
11
#   2. Redistributions in binary form must reproduce the above
12
#      copyright notice, this list of conditions and the following
13
#      disclaimer in the documentation and/or other materials
14
#      provided with the distribution.
15
#
16
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
17
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
18
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
20
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
23
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
26
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27
# POSSIBILITY OF SUCH DAMAGE.
28
#
29
# The views and conclusions contained in the software and
30
# documentation are those of the authors and should not be
31
# interpreted as representing official policies, either expressed
32
# or implied, of GRNET S.A.
33

    
34
from base64 import b64encode, b64decode
35
from hashlib import sha256
36
from logging import getLogger
37
from random import choice
38
from string import digits, lowercase, uppercase
39

    
40
from Crypto.Cipher import AES
41

    
42
from django.conf import settings
43
from django.http import HttpResponse
44
from django.template.loader import render_to_string
45
from django.utils import simplejson as json
46
from django.db.models import Q
47

    
48
from snf_django.lib.api import faults
49
from synnefo.db.models import (Flavor, VirtualMachine, VirtualMachineMetadata,
50
                               Network, BackendNetwork, NetworkInterface,
51
                               BridgePoolTable, MacPrefixPoolTable, Backend,
52
                               IPAddress)
53
from synnefo.db.pools import EmptyPool
54

    
55
from synnefo.plankton.utils import image_backend
56

    
57
from synnefo.cyclades_settings import cyclades_services, BASE_HOST
58
from synnefo.lib.services import get_service_path
59
from synnefo.lib import join_urls
60

    
61
COMPUTE_URL = \
62
    join_urls(BASE_HOST,
63
              get_service_path(cyclades_services, "compute", version="v2.0"))
64
SERVERS_URL = join_urls(COMPUTE_URL, "servers/")
65
NETWORKS_URL = join_urls(COMPUTE_URL, "networks/")
66
FLAVORS_URL = join_urls(COMPUTE_URL, "flavors/")
67
IMAGES_URL = join_urls(COMPUTE_URL, "images/")
68
PLANKTON_URL = \
69
    join_urls(BASE_HOST,
70
              get_service_path(cyclades_services, "image", version="v1.0"))
71
IMAGES_PLANKTON_URL = join_urls(PLANKTON_URL, "images/")
72

    
73
PITHOSMAP_PREFIX = "pithosmap://"
74

    
75
log = getLogger('synnefo.api')
76

    
77

    
78
def random_password():
79
    """Generates a random password
80

81
    We generate a windows compliant password: it must contain at least
82
    one charachter from each of the groups: upper case, lower case, digits.
83
    """
84

    
85
    pool = lowercase + uppercase + digits
86
    lowerset = set(lowercase)
87
    upperset = set(uppercase)
88
    digitset = set(digits)
89
    length = 10
90

    
91
    password = ''.join(choice(pool) for i in range(length - 2))
92

    
93
    # Make sure the password is compliant
94
    chars = set(password)
95
    if not chars & lowerset:
96
        password += choice(lowercase)
97
    if not chars & upperset:
98
        password += choice(uppercase)
99
    if not chars & digitset:
100
        password += choice(digits)
101

    
102
    # Pad if necessary to reach required length
103
    password += ''.join(choice(pool) for i in range(length - len(password)))
104

    
105
    return password
106

    
107

    
108
def zeropad(s):
109
    """Add zeros at the end of a string in order to make its length
110
       a multiple of 16."""
111

    
112
    npad = 16 - len(s) % 16
113
    return s + '\x00' * npad
114

    
115

    
116
def encrypt(plaintext):
117
    # Make sure key is 32 bytes long
118
    key = sha256(settings.SECRET_KEY).digest()
119

    
120
    aes = AES.new(key)
121
    enc = aes.encrypt(zeropad(plaintext))
122
    return b64encode(enc)
123

    
124

    
125
def get_vm(server_id, user_id, for_update=False, non_deleted=False,
126
           non_suspended=False):
127
    """Find a VirtualMachine instance based on ID and owner."""
128

    
129
    try:
130
        server_id = int(server_id)
131
        servers = VirtualMachine.objects
132
        if for_update:
133
            servers = servers.select_for_update()
134
        vm = servers.get(id=server_id, userid=user_id)
135
        if non_deleted and vm.deleted:
136
            raise faults.BadRequest("Server has been deleted.")
137
        if non_suspended and vm.suspended:
138
            raise faults.Forbidden("Administratively Suspended VM")
139
        return vm
140
    except ValueError:
141
        raise faults.BadRequest('Invalid server ID.')
142
    except VirtualMachine.DoesNotExist:
143
        raise faults.ItemNotFound('Server not found.')
144

    
145

    
146
def get_vm_meta(vm, key):
147
    """Return a VirtualMachineMetadata instance or raise ItemNotFound."""
148

    
149
    try:
150
        return VirtualMachineMetadata.objects.get(meta_key=key, vm=vm)
151
    except VirtualMachineMetadata.DoesNotExist:
152
        raise faults.ItemNotFound('Metadata key not found.')
153

    
154

    
155
def get_image(image_id, user_id):
156
    """Return an Image instance or raise ItemNotFound."""
157

    
158
    with image_backend(user_id) as backend:
159
        return backend.get_image(image_id)
160

    
161

    
162
def get_image_dict(image_id, user_id):
163
    image = {}
164
    img = get_image(image_id, user_id)
165
    image["id"] = img["id"]
166
    image["name"] = img["name"]
167
    image["format"] = img["disk_format"]
168
    image["checksum"] = img["checksum"]
169
    image["location"] = img["location"]
170

    
171
    checksum = image["checksum"] = img["checksum"]
172
    size = image["size"] = img["size"]
173
    image["backend_id"] = PITHOSMAP_PREFIX + "/".join([checksum, str(size)])
174

    
175
    properties = img.get("properties", {})
176
    image["metadata"] = dict((key.upper(), val)
177
                             for key, val in properties.items())
178

    
179
    return image
180

    
181

    
182
def get_flavor(flavor_id, include_deleted=False):
183
    """Return a Flavor instance or raise ItemNotFound."""
184

    
185
    try:
186
        flavor_id = int(flavor_id)
187
        if include_deleted:
188
            return Flavor.objects.get(id=flavor_id)
189
        else:
190
            return Flavor.objects.get(id=flavor_id, deleted=include_deleted)
191
    except (ValueError, Flavor.DoesNotExist):
192
        raise faults.ItemNotFound('Flavor not found.')
193

    
194

    
195
def get_flavor_provider(flavor):
196
    """Extract provider from disk template.
197

198
    Provider for `ext` disk_template is encoded in the disk template
199
    name, which is formed `ext_<provider_name>`. Provider is None
200
    for all other disk templates.
201

202
    """
203
    disk_template = flavor.disk_template
204
    provider = None
205
    if disk_template.startswith("ext"):
206
        disk_template, provider = disk_template.split("_", 1)
207
    return disk_template, provider
208

    
209
'''
210
def get_network(network_id, user_id, for_update=False, non_deleted=False):
211
    """Return a Network instance or raise ItemNotFound."""
212

213
    try:
214
        network_id = int(network_id)
215
        objects = Network.objects
216
        if for_update:
217
            objects = objects.select_for_update()
218
        network = objects.get(Q(userid=user_id) | Q(public=True),
219
                              id=network_id)
220
        if non_deleted and network.deleted:
221
            raise faults.BadRequest("Network has been deleted.")
222
        return network
223
    except (ValueError, Network.DoesNotExist):
224
        raise faults.ItemNotFound('Network not found.')
225
'''
226
def get_network(network_id, user_id, public=False, for_update=False):
227
    """
228
    Return a Network instance or raise ItemNotFound.
229
    This is the same as util.get_network
230
    """
231
    try:
232
        objects = Network.objects
233
        if for_update:
234
            objects = objects.select_for_update()
235
        if public:
236
            objects = objects.filter(public=True)
237
        return objects.get(Q(userid=user_id) | Q(public=True), id=network_id)
238
    except (ValueError, Network.DoesNotExist):
239
        raise faults.ItemNotFound('Network not found.')
240

    
241

    
242
def get_floating_ip(user_id, ipv4, for_update=False):
243
    try:
244
        objects = IPAddress.objects
245
        if for_update:
246
            objects = objects.select_for_update()
247
        return objects.get(userid=user_id, ipv4=ipv4, deleted=False)
248
    except IPAddress.DoesNotExist:
249
        raise faults.ItemNotFound("Floating IP does not exist.")
250

    
251

    
252
def allocate_public_address(backend, userid):
253
    """Get a public IP for any available network of a backend."""
254
    # Guarantee exclusive access to backend, because accessing the IP pools of
255
    # the backend networks may result in a deadlock with backend allocator
256
    # which also checks that backend networks have a free IP.
257
    backend = Backend.objects.select_for_update().get(id=backend.id)
258
    public_networks = backend_public_networks(backend)
259
    return get_free_ip(public_networks, userid)
260

    
261

    
262
def backend_public_networks(backend):
263
    """Return available public networks of the backend.
264

265
    Iterator for non-deleted public networks that are available
266
    to the specified backend.
267

268
    """
269
    bnets = BackendNetwork.objects.filter(backend=backend,
270
                                          network__public=True,
271
                                          network__deleted=False,
272
                                          network__floating_ip_pool=False,
273
                                          network__drained=False)
274
    return [b.network for b in bnets]
275

    
276

    
277
def get_free_ip(networks, userid):
278
    for network in networks:
279
        try:
280
            return network.allocate_address(userid=userid)
281
        except faults.OverLimit:
282
            pass
283
    msg = "Can not allocate public IP. Public networks are full."
284
    log.error(msg)
285
    raise faults.OverLimit(msg)
286

    
287

    
288
def get_network_free_address(network, userid):
289
    """Reserve an IP address from the IP Pool of the network."""
290

    
291
    try:
292
        return network.allocate_address(userid=userid)
293
    except EmptyPool:
294
        raise faults.OverLimit("Network %s is full." % network.backend_id)
295

    
296

    
297
def get_vm_nic(vm, nic_id):
298
    """Get a VMs NIC by its ID."""
299
    try:
300
        return vm.nics.get(id=nic_id)
301
    except NetworkInterface.DoesNotExist:
302
        raise faults.ItemNotFound("NIC '%s' not found" % nic_id)
303

    
304

    
305
def get_nic(nic_id):
306
    try:
307
        return NetworkInterface.objects.get(id=nic_id)
308
    except NetworkInterface.DoesNotExist:
309
        raise faults.ItemNotFound("NIC '%s' not found" % nic_id)
310

    
311

    
312
def render_metadata(request, metadata, use_values=False, status=200):
313
    if request.serialization == 'xml':
314
        data = render_to_string('metadata.xml', {'metadata': metadata})
315
    else:
316
        if use_values:
317
            d = {'metadata': {'values': metadata}}
318
        else:
319
            d = {'metadata': metadata}
320
        data = json.dumps(d)
321
    return HttpResponse(data, status=status)
322

    
323

    
324
def render_meta(request, meta, status=200):
325
    if request.serialization == 'xml':
326
        key, val = meta.items()[0]
327
        data = render_to_string('meta.xml', dict(key=key, val=val))
328
    else:
329
        data = json.dumps(dict(meta=meta))
330
    return HttpResponse(data, status=status)
331

    
332

    
333
def verify_personality(personality):
334
    """Verify that a a list of personalities is well formed"""
335
    if len(personality) > settings.MAX_PERSONALITY:
336
        raise faults.OverLimit("Maximum number of personalities"
337
                               " exceeded")
338
    for p in personality:
339
        # Verify that personalities are well-formed
340
        try:
341
            assert isinstance(p, dict)
342
            keys = set(p.keys())
343
            allowed = set(['contents', 'group', 'mode', 'owner', 'path'])
344
            assert keys.issubset(allowed)
345
            contents = p['contents']
346
            if len(contents) > settings.MAX_PERSONALITY_SIZE:
347
                # No need to decode if contents already exceed limit
348
                raise faults.OverLimit("Maximum size of personality exceeded")
349
            if len(b64decode(contents)) > settings.MAX_PERSONALITY_SIZE:
350
                raise faults.OverLimit("Maximum size of personality exceeded")
351
        except AssertionError:
352
            raise faults.BadRequest("Malformed personality in request")
353

    
354

    
355
def values_from_flavor(flavor):
356
    """Get Ganeti connectivity info from flavor type.
357

358
    If link or mac_prefix equals to "pool", then the resources
359
    are allocated from the corresponding Pools.
360

361
    """
362
    try:
363
        flavor = Network.FLAVORS[flavor]
364
    except KeyError:
365
        raise faults.BadRequest("Unknown network flavor")
366

    
367
    mode = flavor.get("mode")
368

    
369
    link = flavor.get("link")
370
    if link == "pool":
371
        link = allocate_resource("bridge")
372

    
373
    mac_prefix = flavor.get("mac_prefix")
374
    if mac_prefix == "pool":
375
        mac_prefix = allocate_resource("mac_prefix")
376

    
377
    tags = flavor.get("tags")
378

    
379
    return mode, link, mac_prefix, tags
380

    
381

    
382
def allocate_resource(res_type):
383
    table = get_pool_table(res_type)
384
    pool = table.get_pool()
385
    value = pool.get()
386
    pool.save()
387
    return value
388

    
389

    
390
def release_resource(res_type, value):
391
    table = get_pool_table(res_type)
392
    pool = table.get_pool()
393
    pool.put(value)
394
    pool.save()
395

    
396

    
397
def get_pool_table(res_type):
398
    if res_type == "bridge":
399
        return BridgePoolTable
400
    elif res_type == "mac_prefix":
401
        return MacPrefixPoolTable
402
    else:
403
        raise Exception("Unknown resource type")
404

    
405

    
406
def get_existing_users():
407
    """
408
    Retrieve user ids stored in cyclades user agnostic models.
409
    """
410
    # also check PublicKeys a user with no servers/networks exist
411
    from synnefo.userdata.models import PublicKeyPair
412
    from synnefo.db.models import VirtualMachine, Network
413

    
414
    keypairusernames = PublicKeyPair.objects.filter().values_list('user',
415
                                                                  flat=True)
416
    serverusernames = VirtualMachine.objects.filter().values_list('userid',
417
                                                                  flat=True)
418
    networkusernames = Network.objects.filter().values_list('userid',
419
                                                            flat=True)
420

    
421
    return set(list(keypairusernames) + list(serverusernames) +
422
               list(networkusernames))
423

    
424

    
425
def vm_to_links(vm_id):
426
    href = join_urls(SERVERS_URL, str(vm_id))
427
    return [{"rel": rel, "href": href} for rel in ("self", "bookmark")]
428

    
429

    
430
def network_to_links(network_id):
431
    href = join_urls(NETWORKS_URL, str(network_id))
432
    return [{"rel": rel, "href": href} for rel in ("self", "bookmark")]
433

    
434

    
435
def flavor_to_links(flavor_id):
436
    href = join_urls(FLAVORS_URL, str(flavor_id))
437
    return [{"rel": rel, "href": href} for rel in ("self", "bookmark")]
438

    
439

    
440
def image_to_links(image_id):
441
    href = join_urls(IMAGES_URL, str(image_id))
442
    links = [{"rel": rel, "href": href} for rel in ("self", "bookmark")]
443
    links.append({"rel": "alternate",
444
                  "href": join_urls(IMAGES_PLANKTON_URL, str(image_id))})
445
    return links
446

    
447

    
448
def start_action(vm, action, jobId):
449
    vm.action = action
450
    vm.backendjobid = jobId
451
    vm.backendopcode = None
452
    vm.backendjobstatus = None
453
    vm.backendlogmsg = None
454
    vm.save()