
* Fix errors in infrastructure blueprinr one-style-config 1) Update sample config - remove non-existing directory 2) Add 0.4.1 version 3) Rename config file to sample Fixes-Bug: 1270734 * Catch AttributeError in case of incorrect session_id Closes-Bug: 1269749 * Fixed issue with copy configuration files. Closes-Bug: #1271079 * Add translation support Use openstack.common.gettextutils for translation Closes-Bug: #1267514 * Fix name for syslog_log_facility param * Update requirements for a release-0.4.1 * Handle incorrect env_id Closes-Bug: 1227154 * Import _ not implicit Change-Id: I2744eaeef369220c5a8dabb027ba40622be9d155
152 lines
5.8 KiB
Python
152 lines
5.8 KiB
Python
# Copyright (c) 2013 Mirantis, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from webob import exc
|
|
from muranoapi.db.models import Session, Environment
|
|
from muranoapi.db.session import get_session
|
|
from muranoapi.db.services.sessions import SessionServices
|
|
from muranoapi.db.services.sessions import SessionState
|
|
from muranoapi.db.services.environments import EnvironmentServices
|
|
from muranoapi.db.services.environments import EnvironmentStatus
|
|
from muranoapi.openstack.common import wsgi
|
|
from muranoapi.openstack.common import log as logging
|
|
from muranoapi.openstack.common.gettextutils import _ # noqa
|
|
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
class Controller(object):
|
|
def configure(self, request, environment_id):
|
|
log.debug(_('Session:Configure <EnvId: {0}>'.format(environment_id)))
|
|
|
|
unit = get_session()
|
|
environment = unit.query(Environment).get(environment_id)
|
|
|
|
if environment is None:
|
|
log.info(_('Environment <EnvId {0}> '
|
|
'is not found'.format(environment_id)))
|
|
raise exc.HTTPNotFound
|
|
|
|
if environment.tenant_id != request.context.tenant:
|
|
log.info(_('User is not authorized to access '
|
|
'this tenant resources.'))
|
|
raise exc.HTTPUnauthorized
|
|
|
|
# no new session can be opened if environment has deploying status
|
|
env_status = EnvironmentServices.get_status(environment_id)
|
|
if env_status == EnvironmentStatus.deploying:
|
|
log.info(_('Could not open session for environment <EnvId: {0}>,'
|
|
'environment has deploying '
|
|
'status.'.format(environment_id)))
|
|
raise exc.HTTPForbidden()
|
|
|
|
user_id = request.context.user
|
|
session = SessionServices.create(environment_id, user_id)
|
|
|
|
return session.to_dict()
|
|
|
|
def show(self, request, environment_id, session_id):
|
|
log.debug(_('Session:Show <SessionId: {0}>'.format(session_id)))
|
|
|
|
unit = get_session()
|
|
session = unit.query(Session).get(session_id)
|
|
|
|
if session is None:
|
|
log.error(_('Session <SessionId {0}> '
|
|
'is not found'.format(session_id)))
|
|
raise exc.HTTPNotFound()
|
|
|
|
if session.environment_id != environment_id:
|
|
log.error(_('Session <SessionId {0}> is not tied with Environment '
|
|
'<EnvId {1}>'.format(session_id, environment_id)))
|
|
raise exc.HTTPNotFound()
|
|
|
|
user_id = request.context.user
|
|
if session.user_id != user_id:
|
|
log.error(_('User <UserId {0}> is not authorized to access session'
|
|
'<SessionId {1}>.'.format(user_id, session_id)))
|
|
raise exc.HTTPUnauthorized()
|
|
|
|
if not SessionServices.validate(session):
|
|
log.error(_('Session <SessionId {0}> '
|
|
'is invalid'.format(session_id)))
|
|
raise exc.HTTPForbidden()
|
|
|
|
return session.to_dict()
|
|
|
|
def delete(self, request, environment_id, session_id):
|
|
log.debug(_('Session:Delete <SessionId: {0}>'.format(session_id)))
|
|
|
|
unit = get_session()
|
|
session = unit.query(Session).get(session_id)
|
|
|
|
if session is None:
|
|
log.error(_('Session <SessionId {0}> '
|
|
'is not found'.format(session_id)))
|
|
raise exc.HTTPNotFound()
|
|
|
|
if session.environment_id != environment_id:
|
|
log.error(_('Session <SessionId {0}> is not tied with Environment '
|
|
'<EnvId {1}>'.format(session_id, environment_id)))
|
|
raise exc.HTTPNotFound()
|
|
|
|
user_id = request.context.user
|
|
if session.user_id != user_id:
|
|
log.error(_('User <UserId {0}> is not authorized to access session'
|
|
'<SessionId {1}>.'.format(user_id, session_id)))
|
|
raise exc.HTTPUnauthorized()
|
|
|
|
if session.state == SessionState.deploying:
|
|
log.error(_('Session <SessionId: {0}> is in deploying state and '
|
|
'could not be deleted'.format(session_id)))
|
|
raise exc.HTTPForbidden()
|
|
|
|
with unit.begin():
|
|
unit.delete(session)
|
|
|
|
return None
|
|
|
|
def deploy(self, request, environment_id, session_id):
|
|
log.debug(_('Session:Deploy <SessionId: {0}>'.format(session_id)))
|
|
|
|
unit = get_session()
|
|
session = unit.query(Session).get(session_id)
|
|
|
|
if session is None:
|
|
log.error(_('Session <SessionId {0}> '
|
|
'is not found'.format(session_id)))
|
|
raise exc.HTTPNotFound()
|
|
|
|
if session.environment_id != environment_id:
|
|
log.error(_('Session <SessionId {0}> is not tied with Environment '
|
|
'<EnvId {1}>'.format(session_id, environment_id)))
|
|
raise exc.HTTPNotFound()
|
|
|
|
if not SessionServices.validate(session):
|
|
log.error(_('Session <SessionId {0}> '
|
|
'is invalid'.format(session_id)))
|
|
raise exc.HTTPForbidden()
|
|
|
|
if session.state != SessionState.open:
|
|
log.error(_('Session <SessionId {0}> is already deployed or '
|
|
'deployment is in progress'.format(session_id)))
|
|
raise exc.HTTPForbidden()
|
|
|
|
SessionServices.deploy(session, unit, request.context.auth_token)
|
|
|
|
|
|
def create_resource():
|
|
return wsgi.Resource(Controller())
|