Refactored to security group api to support projects

This commit is contained in:
Devin Carlen
2010-09-10 15:26:13 -07:00
parent fffa02ac32
commit e53676bb32
8 changed files with 132 additions and 90 deletions

View File

@@ -649,8 +649,6 @@ class AuthManager(object):
def delete_user(self, user): def delete_user(self, user):
"""Deletes a user""" """Deletes a user"""
with self.driver() as drv: with self.driver() as drv:
for security_group in db.security_group_get_by_user(context = {}, user_id=User.safe_id(user)):
db.security_group_destroy({}, security_group.id)
drv.delete_user(User.safe_id(user)) drv.delete_user(User.safe_id(user))
def generate_key_pair(self, user, key_name): def generate_key_pair(self, user, key_name):

View File

@@ -442,17 +442,28 @@ def volume_update(context, volume_id, values):
""" """
return IMPL.volume_update(context, volume_id, values) return IMPL.volume_update(context, volume_id, values)
#################### ####################
def security_group_create(context, values): def security_group_get_all(context):
"""Create a new security group""" """Get all security groups"""
return IMPL.security_group_create(context, values) return IMPL.security_group_get_all(context)
def security_group_get_by_id(context, security_group_id): def security_group_get(context, security_group_id):
"""Get security group by its internal id""" """Get security group by its internal id"""
return IMPL.security_group_get_by_id(context, security_group_id) return IMPL.security_group_get(context, security_group_id)
def security_group_get_by_name(context, project_id, group_name):
"""Returns a security group with the specified name from a project"""
return IMPL.securitygroup_get_by_name(context, project_id, group_name)
def security_group_get_by_project(context, project_id):
"""Get all security groups belonging to a project"""
return IMPL.securitygroup_get_by_project(context, project_id)
def security_group_get_by_instance(context, instance_id): def security_group_get_by_instance(context, instance_id):
@@ -460,15 +471,10 @@ def security_group_get_by_instance(context, instance_id):
return IMPL.security_group_get_by_instance(context, instance_id) return IMPL.security_group_get_by_instance(context, instance_id)
def security_group_get_by_user(context, user_id): def security_group_create(context, values):
"""Get security groups owned by the given user""" """Create a new security group"""
return IMPL.security_group_get_by_user(context, user_id) return IMPL.security_group_create(context, values)
def security_group_get_by_user_and_name(context, user_id, name):
"""Get user's named security group"""
return IMPL.security_group_get_by_user_and_name(context, user_id, name)
def security_group_destroy(context, security_group_id): def security_group_destroy(context, security_group_id):
"""Deletes a security group""" """Deletes a security group"""

View File

@@ -616,20 +616,45 @@ def volume_update(_context, volume_id, values):
################### ###################
def security_group_create(_context, values): def security_group_get_all(_context):
security_group_ref = models.SecurityGroup() session = get_session()
for (key, value) in values.iteritems(): return session.query(models.SecurityGroup
security_group_ref[key] = value ).options(eagerload('rules')
security_group_ref.save() ).filter_by(deleted=False
return security_group_ref ).all()
def security_group_get_by_id(_context, security_group_id): def security_group_get(_context, security_group_id):
session = get_session() session = get_session()
with session.begin(): with session.begin():
return session.query(models.SecurityGroup return session.query(models.SecurityGroup
).options(eagerload('rules')
).get(security_group_id)
def securitygroup_get_by_name(context, project_id, group_name):
session = get_session()
group_ref = session.query(models.SecurityGroup
).options(eagerload('rules') ).options(eagerload('rules')
).get(security_group_id) ).filter_by(project_id=project_id
).filter_by(name=group_name
).filter_by(deleted=False
).first()
if not group_ref:
raise exception.NotFound(
'No security group named %s for project: %s' \
% (group_name, project_id))
return group_ref
def securitygroup_get_by_project(_context, project_id):
session = get_session()
return session.query(models.SecurityGroup
).options(eagerload('rules')
).filter_by(project_id=project_id
).filter_by(deleted=False
).all()
def security_group_get_by_instance(_context, instance_id): def security_group_get_by_instance(_context, instance_id):
@@ -638,34 +663,27 @@ def security_group_get_by_instance(_context, instance_id):
return session.query(models.Instance return session.query(models.Instance
).get(instance_id ).get(instance_id
).security_groups \ ).security_groups \
.all() .filter_by(deleted=False
).all()
def security_group_get_by_user(_context, user_id): def security_group_create(_context, values):
session = get_session() security_group_ref = models.SecurityGroup()
with session.begin(): for (key, value) in values.iteritems():
return session.query(models.SecurityGroup security_group_ref[key] = value
).filter_by(user_id=user_id security_group_ref.save()
).filter_by(deleted=False return security_group_ref
).options(eagerload('rules')
).all()
def security_group_get_by_user_and_name(_context, user_id, name):
session = get_session()
with session.begin():
return session.query(models.SecurityGroup
).filter_by(user_id=user_id
).filter_by(name=name
).filter_by(deleted=False
).options(eagerload('rules')
).one()
def security_group_destroy(_context, security_group_id): def security_group_destroy(_context, security_group_id):
session = get_session() session = get_session()
with session.begin(): with session.begin():
security_group = session.query(models.SecurityGroup # TODO(vish): do we have to use sql here?
).get(security_group_id) session.execute('update security_group set deleted=1 where id=:id',
security_group.delete(session=session) {'id': security_group_id})
session.execute('update security_group_rule set deleted=1 '
'where group_id=:id',
{'id': security_group_id})
################### ###################

View File

@@ -306,26 +306,23 @@ class SecurityGroup(BASE, NovaBase):
class SecurityGroupIngressRule(BASE, NovaBase): class SecurityGroupIngressRule(BASE, NovaBase):
"""Represents a rule in a security group""" """Represents a rule in a security group"""
__tablename__ = 'security_group_rules' __tablename__ = 'security_group_rule'
id = Column(Integer, primary_key=True) id = Column(Integer, primary_key=True)
parent_group_id = Column(Integer, ForeignKey('security_group.id')) group_id = Column(Integer, ForeignKey('security_group.id'))
parent_group = relationship("SecurityGroup", backref="rules", foreign_keys=parent_group_id, group = relationship("SecurityGroup", backref="rules",
primaryjoin=parent_group_id==SecurityGroup.id) foreign_keys=group_id,
primaryjoin=group_id==SecurityGroup.id)
protocol = Column(String(5)) # "tcp", "udp", or "icmp" protocol = Column(String(5)) # "tcp", "udp", or "icmp"
from_port = Column(Integer) from_port = Column(Integer)
to_port = Column(Integer) to_port = Column(Integer)
cidr = Column(String(255))
# Note: This is not the parent SecurityGroup. It's SecurityGroup we're # Note: This is not the parent SecurityGroup. It's SecurityGroup we're
# granting access for. # granting access for.
group_id = Column(Integer, ForeignKey('security_group.id')) source_group_id = Column(Integer, ForeignKey('security_group.id'))
@property
def user(self):
return auth.manager.AuthManager().get_user(self.user_id)
cidr = Column(String(255))
class Network(BASE, NovaBase): class Network(BASE, NovaBase):
"""Represents a network""" """Represents a network"""
@@ -430,8 +427,9 @@ class FloatingIp(BASE, NovaBase):
def register_models(): def register_models():
"""Register Models and create metadata""" """Register Models and create metadata"""
from sqlalchemy import create_engine from sqlalchemy import create_engine
models = (Service, Instance, Volume, ExportDevice, models = (Service, Instance, Volume, ExportDevice, FixedIp, FloatingIp,
FixedIp, FloatingIp, Network, NetworkIndex) # , Image, Host) Network, NetworkIndex, SecurityGroup, SecurityGroupIngressRule)
# , Image, Host
engine = create_engine(FLAGS.sql_connection, echo=False) engine = create_engine(FLAGS.sql_connection, echo=False)
for model in models: for model in models:
model.metadata.create_all(engine) model.metadata.create_all(engine)

View File

@@ -216,7 +216,8 @@ class CloudController(object):
@rbac.allow('all') @rbac.allow('all')
def describe_security_groups(self, context, **kwargs): def describe_security_groups(self, context, **kwargs):
groups = [] groups = []
for group in db.security_group_get_by_user(context, context.user.id): for group in db.security_group_get_by_project(context,
context.project.id):
group_dict = {} group_dict = {}
group_dict['groupDescription'] = group.description group_dict['groupDescription'] = group.description
group_dict['groupName'] = group.name group_dict['groupName'] = group.name
@@ -229,10 +230,11 @@ class CloudController(object):
rule_dict['toPort'] = rule.to_port rule_dict['toPort'] = rule.to_port
rule_dict['groups'] = [] rule_dict['groups'] = []
rule_dict['ipRanges'] = [] rule_dict['ipRanges'] = []
import pdb; pdb.set_trace()
if rule.group_id: if rule.group_id:
foreign_group = db.security_group_get_by_id({}, rule.group_id) source_group = db.security_group_get(context, rule.group_id)
rule_dict['groups'] += [ { 'groupName': foreign_group.name, rule_dict['groups'] += [ { 'groupName': source_group.name,
'userId': foreign_group.user_id } ] 'userId': source_group.user_id } ]
else: else:
rule_dict['ipRanges'] += [ { 'cidrIp': rule.cidr } ] rule_dict['ipRanges'] += [ { 'cidrIp': rule.cidr } ]
group_dict['ipPermissions'] += [ rule_dict ] group_dict['ipPermissions'] += [ rule_dict ]
@@ -258,23 +260,22 @@ class CloudController(object):
user_id=None, user_id=None,
source_security_group_name=None, source_security_group_name=None,
source_security_group_owner_id=None): source_security_group_owner_id=None):
security_group = db.security_group_get_by_user_and_name(context, security_group = db.security_group_get_by_name(context,
context.user.id, context.project.id,
group_name) group_name)
criteria = {} criteria = {}
if source_security_group_name: if source_security_group_name:
if source_security_group_owner_id: source_project_id = self._get_source_project_id(context,
other_user_id = source_security_group_owner_id source_security_group_owner_id)
else:
other_user_id = context.user.id source_security_group = \
db.security_group_get_by_name(context,
foreign_security_group = \ source_project_id,
db.security_group_get_by_user_and_name(context, source_security_group_name)
other_user_id,
source_security_group_name) criteria['group_id'] = source_security_group.id
criteria['group_id'] = foreign_security_group.id
elif cidr_ip: elif cidr_ip:
criteria['cidr'] = cidr_ip criteria['cidr'] = cidr_ip
else: else:
@@ -303,22 +304,20 @@ class CloudController(object):
ip_protocol=None, cidr_ip=None, ip_protocol=None, cidr_ip=None,
source_security_group_name=None, source_security_group_name=None,
source_security_group_owner_id=None): source_security_group_owner_id=None):
security_group = db.security_group_get_by_user_and_name(context, security_group = db.security_group_get_by_name(context,
context.user.id, context.project.id,
group_name) group_name)
values = { 'parent_group_id' : security_group.id } values = { 'group_id' : security_group.id }
if source_security_group_name: if source_security_group_name:
if source_security_group_owner_id: source_project_id = self._get_source_project_id(context,
other_user_id = source_security_group_owner_id source_security_group_owner_id)
else:
other_user_id = context.user.id
foreign_security_group = \ source_security_group = \
db.security_group_get_by_user_and_name(context, db.security_group_get_by_name(context,
other_user_id, source_project_id,
source_security_group_name) source_security_group_name)
values['group_id'] = foreign_security_group.id values['source_group_id'] = source_security_group.id
elif cidr_ip: elif cidr_ip:
values['cidr'] = cidr_ip values['cidr'] = cidr_ip
else: else:
@@ -336,18 +335,38 @@ class CloudController(object):
security_group_rule = db.security_group_rule_create(context, values) security_group_rule = db.security_group_rule_create(context, values)
return True return True
def _get_source_project_id(self, context, source_security_group_owner_id):
if source_security_group_owner_id:
# Parse user:project for source group.
source_parts = source_security_group_owner_id.split(':')
# If no project name specified, assume it's same as user name.
# Since we're looking up by project name, the user name is not
# used here. It's only read for EC2 API compatibility.
if len(source_parts) == 2:
source_project_id = parts[1]
else:
source_project_id = parts[0]
else:
source_project_id = context.project.id
return source_project_id
@rbac.allow('netadmin') @rbac.allow('netadmin')
def create_security_group(self, context, group_name, group_description): def create_security_group(self, context, group_name, group_description):
db.security_group_create(context, db.security_group_create(context,
values = { 'user_id' : context.user.id, values = { 'user_id' : context.user.id,
'project_id': context.project.id,
'name': group_name, 'name': group_name,
'description': group_description }) 'description': group_description })
return True return True
@rbac.allow('netadmin') @rbac.allow('netadmin')
def delete_security_group(self, context, group_name, **kwargs): def delete_security_group(self, context, group_name, **kwargs):
security_group = db.security_group_get_by_user_and_name(context, context.user.id, group_name) security_group = db.security_group_get_by_name(context,
context.project.id,
group_name)
db.security_group_destroy(context, security_group.id) db.security_group_destroy(context, security_group.id)
return True return True

View File

@@ -304,6 +304,7 @@ class ApiEc2TestCase(test.BaseTestCase):
# be good enough for that. # be good enough for that.
for group in rv: for group in rv:
if group.name == security_group_name: if group.name == security_group_name:
import pdb; pdb.set_trace()
self.assertEquals(len(group.rules), 1) self.assertEquals(len(group.rules), 1)
self.assertEquals(int(group.rules[0].from_port), 80) self.assertEquals(int(group.rules[0].from_port), 80)
self.assertEquals(int(group.rules[0].to_port), 81) self.assertEquals(int(group.rules[0].to_port), 81)

View File

@@ -86,6 +86,8 @@ class NWFilterTestCase(test.TrialTestCase):
context.user = FakeContext() context.user = FakeContext()
context.user.id = 'fake' context.user.id = 'fake'
context.user.is_superuser = lambda:True context.user.is_superuser = lambda:True
context.project = FakeContext()
context.project.id = 'fake'
cloud_controller.create_security_group(context, 'testgroup', 'test group description') cloud_controller.create_security_group(context, 'testgroup', 'test group description')
cloud_controller.authorize_security_group_ingress(context, 'testgroup', from_port='80', cloud_controller.authorize_security_group_ingress(context, 'testgroup', from_port='80',
to_port='81', ip_protocol='tcp', to_port='81', ip_protocol='tcp',
@@ -93,7 +95,7 @@ class NWFilterTestCase(test.TrialTestCase):
fw = libvirt_conn.NWFilterFirewall() fw = libvirt_conn.NWFilterFirewall()
security_group = db.security_group_get_by_user_and_name({}, 'fake', 'testgroup') security_group = db.security_group_get_by_name({}, 'fake', 'testgroup')
xml = fw.security_group_to_nwfilter_xml(security_group.id) xml = fw.security_group_to_nwfilter_xml(security_group.id)

View File

@@ -492,7 +492,7 @@ class NWFilterFirewall(object):
</filter>''' </filter>'''
def security_group_to_nwfilter_xml(self, security_group_id): def security_group_to_nwfilter_xml(self, security_group_id):
security_group = db.security_group_get_by_id({}, security_group_id) security_group = db.security_group_get({}, security_group_id)
rule_xml = "" rule_xml = ""
for rule in security_group.rules: for rule in security_group.rules:
rule_xml += "<rule action='allow' direction='in' priority='900'>" rule_xml += "<rule action='allow' direction='in' priority='900'>"