|
1 |
# Copyright 2011-2013 GRNET S.A. All rights reserved.
|
|
2 |
#
|
|
3 |
# Redistribution and use in source and binary forms, with or
|
|
4 |
# without modification, are permitted provided that the following
|
|
5 |
# conditions are met:
|
|
6 |
#
|
|
7 |
# 1. Redistributions of source code must retain the above
|
|
8 |
# copyright notice, this list of conditions and the following
|
|
9 |
# disclaimer.
|
|
10 |
#
|
|
11 |
# 2. Redistributions in binary form must reproduce the above
|
|
12 |
# copyright notice, this list of conditions and the following
|
|
13 |
# disclaimer in the documentation and/or other materials
|
|
14 |
# provided with the distribution.
|
|
15 |
#
|
|
16 |
# THIS SOFTWARE IS PROVIDED BY GRNET S.A. ``AS IS'' AND ANY EXPRESS
|
|
17 |
# OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
18 |
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
19 |
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GRNET S.A OR
|
|
20 |
# CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
21 |
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
22 |
# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
|
|
23 |
# USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
24 |
# AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
25 |
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
26 |
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
27 |
# POSSIBILITY OF SUCH DAMAGE.
|
|
28 |
#
|
|
29 |
# The views and conclusions contained in the software and
|
|
30 |
# documentation are those of the authors and should not be
|
|
31 |
# interpreted as representing official policies, either expressed
|
|
32 |
# or implied, of GRNET S.A.
|
|
33 |
|
1 |
34 |
from django.conf import settings
|
2 |
35 |
from django.conf.urls import patterns
|
3 |
|
|
4 |
36 |
from django.http import HttpResponse
|
5 |
37 |
from django.utils import simplejson as json
|
6 |
38 |
from django.db import transaction
|
7 |
39 |
from django.db.models import Q
|
8 |
|
from synnefo.db.pools import EmptyPool
|
9 |
|
from synnefo.db.utils import validate_mac
|
10 |
|
from django.conf import settings
|
11 |
|
from snf_django.lib import api
|
12 |
|
from snf_django.lib.api import utils
|
13 |
|
from synnefo.logic import backend
|
14 |
40 |
from django.template.loader import render_to_string
|
|
41 |
|
|
42 |
from snf_django.lib import api
|
|
43 |
|
15 |
44 |
from synnefo.api import util
|
16 |
45 |
from synnefo.db.models import NetworkInterface, SecurityGroup, IPAddress
|
17 |
46 |
|
... | ... | |
24 |
53 |
(r'^(?:/|.json|.xml)?$', 'demux'),
|
25 |
54 |
(r'^/([-\w]+)(?:/|.json|.xml)?$', 'port_demux'))
|
26 |
55 |
|
|
56 |
|
27 |
57 |
def demux(request):
|
28 |
58 |
if request.method == 'GET':
|
29 |
|
#return HttpResponse("list ports")
|
30 |
59 |
return list_ports(request)
|
31 |
60 |
elif request.method == 'POST':
|
32 |
61 |
return create_port(request)
|
33 |
|
#return HttpResponse("create port")
|
34 |
62 |
else:
|
35 |
63 |
return api.api_method_not_allowed(request)
|
36 |
64 |
|
37 |
65 |
|
38 |
|
def port_demux(request, offset):
|
|
66 |
def port_demux(request, port_id):
|
39 |
67 |
|
40 |
68 |
if request.method == 'GET':
|
41 |
|
#return HttpResponse("get single port")
|
42 |
|
return get_port(request, offset)
|
|
69 |
return get_port_details(request, port_id)
|
43 |
70 |
elif request.method == 'DELETE':
|
44 |
|
#return HttpResponse("delete port")
|
45 |
|
return delete_port(request, offset)
|
|
71 |
return delete_port(request, port_id)
|
46 |
72 |
elif request.method == 'PUT':
|
47 |
|
#return HttpResponse("put port")
|
48 |
|
return update_port(request, offset)
|
|
73 |
return update_port(request, port_id)
|
49 |
74 |
else:
|
50 |
75 |
return api.api_method_not_allowed(request)
|
51 |
76 |
|
... | ... | |
58 |
83 |
user_ports = NetworkInterface.objects.filter(
|
59 |
84 |
network__userid=request.user_uniq)
|
60 |
85 |
|
61 |
|
ports = [port_to_dict(port, detail)
|
|
86 |
port_dicts = [port_to_dict(port, detail)
|
62 |
87 |
for port in user_ports.order_by('id')]
|
63 |
88 |
|
64 |
89 |
if request.serialization == 'xml':
|
65 |
|
data = render_to_string('list_networks.xml', {
|
66 |
|
"ports": ports})
|
|
90 |
data = render_to_string('list_ports.xml', {
|
|
91 |
"ports": port_dicts})
|
67 |
92 |
else:
|
68 |
|
data = json.dumps({'ports': ports})
|
|
93 |
data = json.dumps({'ports': port_dicts})
|
69 |
94 |
|
70 |
95 |
return HttpResponse(data, status=200)
|
71 |
96 |
|
72 |
97 |
|
73 |
|
@api.api_method(http_method='GET', user_required=True, logger=log)
|
74 |
|
def get_port(request, port_id):
|
75 |
|
log.debug('get_port_details %s', port_id)
|
76 |
|
port = util.get_port(port_id, request.user_uniq)
|
77 |
|
|
78 |
|
portdict = port_to_dict(port)
|
79 |
|
return render_port(request, portdict)
|
80 |
|
|
81 |
|
|
82 |
|
@api.api_method(http_method='DELETE', user_required=True, logger=log)
|
83 |
|
@transaction.commit_on_success
|
84 |
|
def delete_port(request, port_id):
|
85 |
|
log.info('delete_port %s', port_id)
|
86 |
|
port = util.get_port(port_id, request.user_uniq, for_update=True)
|
87 |
|
|
88 |
|
|
89 |
|
'''
|
90 |
|
FIXME delete the port
|
91 |
|
skip the backend part...
|
92 |
|
release the ips associated with the port
|
93 |
|
'''
|
94 |
|
|
95 |
|
|
96 |
|
return HttpResponse(status=204)
|
97 |
|
|
98 |
|
|
99 |
|
@api.api_method(http_method='PUT', user_required=True, logger=log)
|
100 |
|
def update_port(request, port_id):
|
101 |
|
'''
|
102 |
|
You can update only name, security_groups
|
103 |
|
'''
|
104 |
|
port = util.get_port(port_id, request.user_uniq, for_update=True)
|
105 |
|
info = utils.get_request_dict(request)
|
106 |
|
try:
|
107 |
|
info = info["port"]
|
108 |
|
except KeyError:
|
109 |
|
raise api.faults.BadRequest("Malformed request")
|
110 |
|
|
111 |
|
try:
|
112 |
|
name = info['name']
|
113 |
|
port.name = name
|
114 |
|
except KeyError:
|
115 |
|
pass
|
116 |
|
sg_list = []
|
117 |
|
try:
|
118 |
|
s_groups = info['security_groups']
|
119 |
|
#validate security groups
|
120 |
|
# like get security group from db
|
121 |
|
for gid in s_groups:
|
122 |
|
try:
|
123 |
|
sg = SecurityGroup.objects.get(id=int(gid))
|
124 |
|
sg_list.append(sg)
|
125 |
|
except (ValueError, SecurityGroup.DoesNotExist):
|
126 |
|
raise api.faults.ItemNotFound("Not valid security group")
|
127 |
|
|
128 |
|
#clear the old security groups
|
129 |
|
port.security_groups.clear()
|
130 |
|
|
131 |
|
#add the new groups
|
132 |
|
for group in sg_list:
|
133 |
|
port.security_groups.add(group)
|
134 |
|
except KeyError:
|
135 |
|
pass
|
136 |
|
|
137 |
|
port.save()
|
138 |
|
portdict = port_to_dict(port)
|
139 |
|
return render_port(request, portdict, 200)
|
140 |
|
|
141 |
|
|
142 |
98 |
@api.api_method(http_method='POST', user_required=True, logger=log)
|
143 |
99 |
@transaction.commit_manually
|
144 |
100 |
def create_port(request):
|
145 |
101 |
'''
|
146 |
102 |
'''
|
147 |
103 |
user_id = request.user_uniq
|
148 |
|
req = utils.get_request_dict(request)
|
|
104 |
req = api.utils.get_request_dict(request)
|
149 |
105 |
log.info('create_port %s', req)
|
150 |
106 |
try:
|
151 |
|
try:
|
152 |
|
info = req['port']
|
153 |
|
net_id = info['network_id']
|
154 |
|
dev_id = info['device_id']
|
155 |
|
except KeyError:
|
156 |
|
raise api.faults.BadRequest("Malformed request")
|
|
107 |
port_dict = api.utils.get_attribute(req, "port")
|
|
108 |
net_id = api.utils.get_attribute(port_dict, "network_id")
|
|
109 |
dev_id = api.utils.get_attribute(port_dict, "device_id")
|
157 |
110 |
|
158 |
|
net = util.get_network(net_id, request.user_uniq)
|
|
111 |
network = util.get_network(net_id, request.user_uniq)
|
159 |
112 |
|
160 |
113 |
vm = util.get_vm(dev_id, request.user_uniq)
|
161 |
114 |
|
162 |
|
try:
|
163 |
|
name = info['name']
|
164 |
|
except KeyError:
|
165 |
|
name = "random_name"
|
|
115 |
name = api.utils.get_attribute(port_dict, "name", required=False)
|
|
116 |
|
|
117 |
if name is None:
|
|
118 |
name = ""
|
166 |
119 |
|
167 |
120 |
sg_list = []
|
168 |
|
try:
|
169 |
|
s_groups = info['security_groups']
|
170 |
|
#validate security groups
|
171 |
|
# like get security group from db
|
172 |
|
for gid in s_groups:
|
|
121 |
security_groups = api.utils.get_attribute(port_dict,
|
|
122 |
"security_groups",
|
|
123 |
required=False)
|
|
124 |
#validate security groups
|
|
125 |
# like get security group from db
|
|
126 |
if security_groups:
|
|
127 |
for gid in security_groups:
|
173 |
128 |
try:
|
174 |
129 |
sg = SecurityGroup.objects.get(id=int(gid))
|
175 |
130 |
sg_list.append(sg)
|
176 |
131 |
except (ValueError, SecurityGroup.DoesNotExist):
|
177 |
132 |
raise api.faults.ItemNotFound("Not valid security group")
|
178 |
|
except KeyError:
|
179 |
|
pass
|
180 |
133 |
|
181 |
134 |
#create the port
|
182 |
135 |
new_port = NetworkInterface.objects.create(name=name,
|
183 |
|
network=net,
|
|
136 |
network=network,
|
184 |
137 |
machine=vm,
|
185 |
138 |
device_owner="vm",
|
186 |
139 |
state="BUILDING")
|
187 |
140 |
#add the security groups
|
188 |
141 |
new_port.security_groups.add(*sg_list)
|
189 |
142 |
|
190 |
|
#add every to every subnet of the network
|
191 |
|
for subn in net.subnets.all():
|
|
143 |
#add new port to every subnet of the network
|
|
144 |
for subn in network.subnets.all():
|
192 |
145 |
IPAddress.objects.create(subnet=subn,
|
193 |
|
network=net,
|
|
146 |
network=network,
|
194 |
147 |
nic=new_port,
|
195 |
148 |
userid=user_id,
|
196 |
|
address="192.168.0."+str(subn.id) # FIXME
|
197 |
|
)
|
198 |
|
|
|
149 |
# FIXME
|
|
150 |
address="192.168.0." + str(subn.id))
|
199 |
151 |
|
200 |
152 |
except:
|
201 |
153 |
transaction.rollback()
|
... | ... | |
206 |
158 |
transaction.commit()
|
207 |
159 |
log.info("commit")
|
208 |
160 |
|
209 |
|
portdict = port_to_dict(new_port)
|
210 |
|
response = render_port(request, portdict, status=201)
|
|
161 |
response = render_port(request, port_to_dict(new_port), status=201)
|
211 |
162 |
|
212 |
163 |
return response
|
213 |
164 |
|
214 |
165 |
|
|
166 |
@api.api_method(http_method='GET', user_required=True, logger=log)
|
|
167 |
def get_port_details(request, port_id):
|
|
168 |
log.debug('get_port_details %s', port_id)
|
|
169 |
port = util.get_port(port_id, request.user_uniq)
|
|
170 |
return render_port(request, port_to_dict(port))
|
|
171 |
|
|
172 |
|
|
173 |
@api.api_method(http_method='PUT', user_required=True, logger=log)
|
|
174 |
def update_port(request, port_id):
|
|
175 |
'''
|
|
176 |
You can update only name, security_groups
|
|
177 |
'''
|
|
178 |
port = util.get_port(port_id, request.user_uniq, for_update=True)
|
|
179 |
req = api.utils.get_request_dict(request)
|
|
180 |
|
|
181 |
port_info = api.utils.get_attribute(req, "port", required=True)
|
|
182 |
name = api.utils.get_attribute(port_info, "name", required=False)
|
|
183 |
|
|
184 |
if name:
|
|
185 |
port.name = name
|
|
186 |
|
|
187 |
security_groups = api.utils.get_attribute(port_info, "security_groups",
|
|
188 |
required=False)
|
|
189 |
if security_groups:
|
|
190 |
sg_list = []
|
|
191 |
#validate security groups
|
|
192 |
# like get security group from db
|
|
193 |
for gid in security_groups:
|
|
194 |
try:
|
|
195 |
sg = SecurityGroup.objects.get(id=int(gid))
|
|
196 |
sg_list.append(sg)
|
|
197 |
except (ValueError, SecurityGroup.DoesNotExist):
|
|
198 |
raise api.faults.ItemNotFound("Not valid security group")
|
|
199 |
|
|
200 |
#clear the old security groups
|
|
201 |
port.security_groups.clear()
|
|
202 |
|
|
203 |
#add the new groups
|
|
204 |
port.security_groups.add(*sg_list)
|
|
205 |
|
|
206 |
port.save()
|
|
207 |
return render_port(request, port_to_dict(port), 200)
|
|
208 |
|
|
209 |
|
|
210 |
@api.api_method(http_method='DELETE', user_required=True, logger=log)
|
|
211 |
@transaction.commit_on_success
|
|
212 |
def delete_port(request, port_id):
|
|
213 |
log.info('delete_port %s', port_id)
|
|
214 |
port = util.get_port(port_id, request.user_uniq, for_update=True)
|
|
215 |
'''
|
|
216 |
FIXME delete the port
|
|
217 |
skip the backend part...
|
|
218 |
release the ips associated with the port
|
|
219 |
'''
|
|
220 |
return HttpResponse(status=204)
|
|
221 |
|
215 |
222 |
#util functions
|
216 |
223 |
|
217 |
224 |
|
... | ... | |
226 |
233 |
d['status'] = port.state
|
227 |
234 |
d['device_owner'] = port.device_owner
|
228 |
235 |
d['network_id'] = str(port.network.id)
|
|
236 |
d['updated'] = api.utils.isoformat(port.updated)
|
|
237 |
d['created'] = api.utils.isoformat(port.created)
|
229 |
238 |
d['fixed_ips'] = []
|
230 |
239 |
for ip in port.ips.all():
|
231 |
240 |
d['fixed_ips'].append({"ip_address": ip.address,
|
232 |
|
"subnet": ip.subnet.id})
|
233 |
|
d['security_groups'] = [str(sg.id)
|
234 |
|
for sg in port.security_groups.all()]
|
|
241 |
"subnet": str(ip.subnet.id)})
|
|
242 |
sg_list = list(port.security_groups.values_list('id', flat=True))
|
|
243 |
d['security_groups'] = map(str, sg_list)
|
|
244 |
|
235 |
245 |
return d
|
236 |
246 |
|
237 |
247 |
|
238 |
248 |
def render_port(request, portdict, status=200):
|
239 |
249 |
if request.serialization == 'xml':
|
240 |
|
data = render_to_string('network.xml', {'port': portdict})
|
|
250 |
data = render_to_string('port.xml', {'port': portdict})
|
241 |
251 |
else:
|
242 |
252 |
data = json.dumps({'port': portdict})
|
243 |
253 |
return HttpResponse(data, status=status)
|