639c11751e
Add SCTP support in the API for listeners, pools, health-monitors resources. Story: 2007884 Task: 40255 Change-Id: I57a3c528a20943724bdcd36422c689f496068330
690 lines
31 KiB
Python
690 lines
31 KiB
Python
# Copyright 2014 Rackspace
|
|
# Copyright 2016 Blue Box, an IBM Company
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from octavia_lib.api.drivers import data_models as driver_dm
|
|
from octavia_lib.common import constants as lib_consts
|
|
from oslo_config import cfg
|
|
from oslo_db import exception as odb_exceptions
|
|
from oslo_log import log as logging
|
|
from oslo_utils import excutils
|
|
from pecan import expose as pecan_expose
|
|
from pecan import request as pecan_request
|
|
from wsme import types as wtypes
|
|
from wsmeext import pecan as wsme_pecan
|
|
|
|
from octavia.api.drivers import driver_factory
|
|
from octavia.api.drivers import utils as driver_utils
|
|
from octavia.api.v2.controllers import base
|
|
from octavia.api.v2.controllers import l7policy
|
|
from octavia.api.v2.types import listener as listener_types
|
|
from octavia.common import constants
|
|
from octavia.common import data_models
|
|
from octavia.common import exceptions
|
|
from octavia.common import stats
|
|
from octavia.common import utils as common_utils
|
|
from octavia.common import validate
|
|
from octavia.db import api as db_api
|
|
from octavia.db import prepare as db_prepare
|
|
from octavia.i18n import _
|
|
|
|
|
|
CONF = cfg.CONF
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
|
class ListenersController(base.BaseController):
|
|
RBAC_TYPE = constants.RBAC_LISTENER
|
|
|
|
def __init__(self):
|
|
super().__init__()
|
|
|
|
@wsme_pecan.wsexpose(listener_types.ListenerRootResponse, wtypes.text,
|
|
[wtypes.text], ignore_extra_args=True)
|
|
def get_one(self, id, fields=None):
|
|
"""Gets a single listener's details."""
|
|
context = pecan_request.context.get('octavia_context')
|
|
db_listener = self._get_db_listener(context.session, id,
|
|
show_deleted=False)
|
|
|
|
if not db_listener:
|
|
raise exceptions.NotFound(resource=data_models.Listener._name(),
|
|
id=id)
|
|
|
|
self._auth_validate_action(context, db_listener.project_id,
|
|
constants.RBAC_GET_ONE)
|
|
|
|
result = self._convert_db_to_type(db_listener,
|
|
listener_types.ListenerResponse)
|
|
if fields is not None:
|
|
result = self._filter_fields([result], fields)[0]
|
|
return listener_types.ListenerRootResponse(listener=result)
|
|
|
|
@wsme_pecan.wsexpose(listener_types.ListenersRootResponse, wtypes.text,
|
|
[wtypes.text], ignore_extra_args=True)
|
|
def get_all(self, project_id=None, fields=None):
|
|
"""Lists all listeners."""
|
|
pcontext = pecan_request.context
|
|
context = pcontext.get('octavia_context')
|
|
|
|
query_filter = self._auth_get_all(context, project_id)
|
|
|
|
db_listeners, links = self.repositories.listener.get_all_API_list(
|
|
context.session, show_deleted=False,
|
|
pagination_helper=pcontext.get(constants.PAGINATION_HELPER),
|
|
**query_filter)
|
|
result = self._convert_db_to_type(
|
|
db_listeners, [listener_types.ListenerResponse])
|
|
if fields is not None:
|
|
result = self._filter_fields(result, fields)
|
|
return listener_types.ListenersRootResponse(
|
|
listeners=result, listeners_links=links)
|
|
|
|
def _test_lb_and_listener_statuses(
|
|
self, session, lb_id, id=None,
|
|
listener_status=constants.PENDING_UPDATE):
|
|
"""Verify load balancer is in a mutable state."""
|
|
lb_repo = self.repositories.load_balancer
|
|
if id:
|
|
if not self.repositories.test_and_set_lb_and_listeners_prov_status(
|
|
session, lb_id, constants.PENDING_UPDATE,
|
|
listener_status, listener_ids=[id]):
|
|
LOG.info("Load Balancer %s is immutable.", lb_id)
|
|
db_lb = lb_repo.get(session, id=lb_id)
|
|
raise exceptions.ImmutableObject(resource=db_lb._name(),
|
|
id=lb_id)
|
|
else:
|
|
if not lb_repo.test_and_set_provisioning_status(
|
|
session, lb_id, constants.PENDING_UPDATE):
|
|
db_lb = lb_repo.get(session, id=lb_id)
|
|
LOG.info("Load Balancer %s is immutable.", db_lb.id)
|
|
raise exceptions.ImmutableObject(resource=db_lb._name(),
|
|
id=lb_id)
|
|
|
|
def _validate_pool(self, session, lb_id, pool_id, listener_protocol):
|
|
"""Validate pool given exists on same load balancer as listener."""
|
|
db_pool = self.repositories.pool.get(
|
|
session, load_balancer_id=lb_id, id=pool_id)
|
|
if not db_pool:
|
|
raise exceptions.NotFound(
|
|
resource=data_models.Pool._name(), id=pool_id)
|
|
self._validate_protocol(listener_protocol, db_pool.protocol)
|
|
|
|
def _has_tls_container_refs(self, listener_dict):
|
|
return (listener_dict.get('tls_certificate_id') or
|
|
listener_dict.get('client_ca_tls_container_id') or
|
|
listener_dict.get('sni_containers'))
|
|
|
|
def _is_tls_or_insert_header(self, listener_dict):
|
|
return (self._has_tls_container_refs(listener_dict) or
|
|
listener_dict.get('insert_headers'))
|
|
|
|
def _validate_insert_headers(self, insert_header_list, listener_protocol):
|
|
if (listener_protocol not in
|
|
constants.LISTENER_PROTOCOLS_SUPPORTING_HEADER_INSERTION):
|
|
raise exceptions.InvalidOption(
|
|
value='insert-headers',
|
|
option=('a %s protocol listener.' % listener_protocol))
|
|
if list(set(insert_header_list) - (
|
|
set(constants.SUPPORTED_HTTP_HEADERS +
|
|
constants.SUPPORTED_SSL_HEADERS))):
|
|
raise exceptions.InvalidOption(
|
|
value=insert_header_list,
|
|
option='insert_headers')
|
|
if not listener_protocol == constants.PROTOCOL_TERMINATED_HTTPS:
|
|
is_matched = len(
|
|
constants.SUPPORTED_SSL_HEADERS) > len(
|
|
list(set(constants.SUPPORTED_SSL_HEADERS) - set(
|
|
insert_header_list)))
|
|
if is_matched:
|
|
headers = []
|
|
for header_name in insert_header_list:
|
|
if header_name in constants.SUPPORTED_SSL_HEADERS:
|
|
headers.append(header_name)
|
|
raise exceptions.InvalidOption(
|
|
value=headers,
|
|
option=('%s protocol listener.' % listener_protocol))
|
|
|
|
def _validate_cidr_compatible_with_vip(self, vip, allowed_cidrs):
|
|
for cidr in allowed_cidrs:
|
|
# Check if CIDR IP version matches VIP IP version
|
|
if common_utils.is_cidr_ipv6(cidr) != common_utils.is_ipv6(vip):
|
|
msg = _("CIDR %(cidr)s IP version incompatible with VIP "
|
|
"%(vip)s IP version.")
|
|
raise exceptions.ValidationException(
|
|
detail=msg % {'cidr': cidr, 'vip': vip})
|
|
|
|
def _validate_create_listener(self, lock_session, listener_dict):
|
|
"""Validate listener for wrong protocol or duplicate listeners
|
|
|
|
Update the load balancer db when provisioning status changes.
|
|
"""
|
|
listener_protocol = listener_dict.get('protocol')
|
|
|
|
if listener_dict and listener_dict.get('insert_headers'):
|
|
self._validate_insert_headers(
|
|
listener_dict['insert_headers'].keys(), listener_protocol)
|
|
|
|
# Check for UDP/SCTP compatibility
|
|
if (listener_protocol in (constants.PROTOCOL_UDP,
|
|
lib_consts.PROTOCOL_SCTP) and
|
|
self._is_tls_or_insert_header(listener_dict)):
|
|
raise exceptions.ValidationException(
|
|
detail=_("%s protocol listener does not "
|
|
"support TLS.") % listener_protocol)
|
|
|
|
# Check for TLS disabled
|
|
if (not CONF.api_settings.allow_tls_terminated_listeners and
|
|
listener_protocol == constants.PROTOCOL_TERMINATED_HTTPS):
|
|
raise exceptions.DisabledOption(
|
|
value=constants.PROTOCOL_TERMINATED_HTTPS, option='protocol')
|
|
|
|
# Check for certs when not TERMINATED_HTTPS
|
|
if (listener_protocol != constants.PROTOCOL_TERMINATED_HTTPS and
|
|
self._has_tls_container_refs(listener_dict)):
|
|
raise exceptions.ValidationException(detail=_(
|
|
"Certificate container references are only allowed on "
|
|
"%s protocol listeners.") %
|
|
constants.PROTOCOL_TERMINATED_HTTPS)
|
|
|
|
# Make sure a base certificate exists if specifying a client ca
|
|
if (listener_dict.get('client_ca_tls_certificate_id') and
|
|
not (listener_dict.get('tls_certificate_id') or
|
|
listener_dict.get('sni_containers'))):
|
|
raise exceptions.ValidationException(detail=_(
|
|
"An SNI or default certificate container reference must "
|
|
"be provided with a client CA container reference."))
|
|
|
|
# Make sure a certificate container is specified for TERMINATED_HTTPS
|
|
if (listener_protocol == constants.PROTOCOL_TERMINATED_HTTPS and
|
|
not (listener_dict.get('tls_certificate_id') or
|
|
listener_dict.get('sni_containers'))):
|
|
raise exceptions.ValidationException(detail=_(
|
|
"An SNI or default certificate container reference must "
|
|
"be provided for %s protocol listeners.") %
|
|
constants.PROTOCOL_TERMINATED_HTTPS)
|
|
|
|
# Make sure we have a client CA cert if they enable client auth
|
|
if (listener_dict.get('client_authentication') !=
|
|
constants.CLIENT_AUTH_NONE and not
|
|
listener_dict.get('client_ca_tls_certificate_id')):
|
|
raise exceptions.ValidationException(detail=_(
|
|
"Client authentication setting %s requires a client CA "
|
|
"container reference.") %
|
|
listener_dict.get('client_authentication'))
|
|
|
|
# Make sure we have a client CA if they specify a CRL
|
|
if (listener_dict.get('client_crl_container_id') and
|
|
not listener_dict.get('client_ca_tls_certificate_id')):
|
|
raise exceptions.ValidationException(detail=_(
|
|
"A client authentication CA reference is required to "
|
|
"specify a client authentication revocation list."))
|
|
|
|
# Check TLS cipher prohibit list
|
|
if 'tls_ciphers' in listener_dict and listener_dict['tls_ciphers']:
|
|
rejected_ciphers = validate.check_cipher_prohibit_list(
|
|
listener_dict['tls_ciphers'])
|
|
if rejected_ciphers:
|
|
raise exceptions.ValidationException(detail=_(
|
|
'The following ciphers have been prohibited by an '
|
|
'administrator: ' + ', '.join(rejected_ciphers)))
|
|
|
|
# Validate the TLS containers
|
|
sni_containers = listener_dict.pop('sni_containers', [])
|
|
tls_refs = [sni['tls_container_id'] for sni in sni_containers]
|
|
if listener_dict.get('tls_certificate_id'):
|
|
tls_refs.append(listener_dict.get('tls_certificate_id'))
|
|
self._validate_tls_refs(tls_refs)
|
|
|
|
# Validate the client CA cert and optional client CRL
|
|
if listener_dict.get('client_ca_tls_certificate_id'):
|
|
self._validate_client_ca_and_crl_refs(
|
|
listener_dict.get('client_ca_tls_certificate_id'),
|
|
listener_dict.get('client_crl_container_id', None))
|
|
|
|
# Validate that the L4 protocol (UDP, TCP or SCTP) is not already used
|
|
# for the specified protocol_port in this load balancer
|
|
pcontext = pecan_request.context
|
|
query_filter = {
|
|
'project_id': listener_dict['project_id'],
|
|
'load_balancer_id': listener_dict['load_balancer_id'],
|
|
'protocol_port': listener_dict['protocol_port']
|
|
}
|
|
|
|
# Get listeners on the same load balancer that use the same
|
|
# protocol port
|
|
db_listeners = self.repositories.listener.get_all_API_list(
|
|
lock_session, show_deleted=False,
|
|
pagination_helper=pcontext.get(constants.PAGINATION_HELPER),
|
|
**query_filter)[0]
|
|
|
|
if db_listeners:
|
|
l4_protocol = constants.L4_PROTOCOL_MAP[listener_protocol]
|
|
|
|
# List supported protocols that share the same L4 protocol as our
|
|
# new listener
|
|
disallowed_protocols = [
|
|
p
|
|
for p in constants.L4_PROTOCOL_MAP
|
|
if constants.L4_PROTOCOL_MAP[p] == l4_protocol
|
|
]
|
|
|
|
for db_l in db_listeners:
|
|
# Check if l4 protocol ports conflict
|
|
if db_l.protocol in disallowed_protocols:
|
|
raise exceptions.DuplicateListenerEntry(
|
|
protocol=db_l.protocol,
|
|
port=listener_dict.get('protocol_port'))
|
|
|
|
# Validate allowed CIDRs
|
|
allowed_cidrs = listener_dict.get('allowed_cidrs', []) or []
|
|
lb_id = listener_dict.get('load_balancer_id')
|
|
vip_db = self.repositories.vip.get(
|
|
lock_session, load_balancer_id=lb_id)
|
|
vip_address = vip_db.ip_address
|
|
self._validate_cidr_compatible_with_vip(vip_address, allowed_cidrs)
|
|
|
|
if listener_protocol == constants.PROTOCOL_TERMINATED_HTTPS:
|
|
# Validate TLS version list
|
|
validate.check_tls_version_list(listener_dict['tls_versions'])
|
|
# Validate TLS versions against minimum
|
|
validate.check_tls_version_min(listener_dict['tls_versions'])
|
|
# Validate ALPN protocol list
|
|
validate.check_alpn_protocols(listener_dict['alpn_protocols'])
|
|
|
|
try:
|
|
db_listener = self.repositories.listener.create(
|
|
lock_session, **listener_dict)
|
|
if sni_containers:
|
|
for container in sni_containers:
|
|
sni_dict = {'listener_id': db_listener.id,
|
|
'tls_container_id': container.get(
|
|
'tls_container_id')}
|
|
self.repositories.sni.create(lock_session, **sni_dict)
|
|
# DB listener needs to be refreshed
|
|
db_listener = self.repositories.listener.get(
|
|
lock_session, id=db_listener.id)
|
|
|
|
return db_listener
|
|
except odb_exceptions.DBDuplicateEntry as de:
|
|
column_list = ['load_balancer_id', 'protocol', 'protocol_port']
|
|
constraint_list = ['uq_listener_load_balancer_id_protocol_port']
|
|
if ['id'] == de.columns:
|
|
raise exceptions.IDAlreadyExists()
|
|
if (set(column_list) == set(de.columns) or
|
|
set(constraint_list) == set(de.columns)):
|
|
raise exceptions.DuplicateListenerEntry(
|
|
protocol=listener_dict.get('protocol'),
|
|
port=listener_dict.get('protocol_port'))
|
|
except odb_exceptions.DBError as e:
|
|
raise exceptions.InvalidOption(value=listener_dict.get('protocol'),
|
|
option='protocol') from e
|
|
|
|
@wsme_pecan.wsexpose(listener_types.ListenerRootResponse,
|
|
body=listener_types.ListenerRootPOST, status_code=201)
|
|
def post(self, listener_):
|
|
"""Creates a listener on a load balancer."""
|
|
listener = listener_.listener
|
|
context = pecan_request.context.get('octavia_context')
|
|
|
|
load_balancer_id = listener.loadbalancer_id
|
|
listener.project_id, provider = self._get_lb_project_id_provider(
|
|
context.session, load_balancer_id)
|
|
|
|
self._auth_validate_action(context, listener.project_id,
|
|
constants.RBAC_POST)
|
|
|
|
# Load the driver early as it also provides validation
|
|
driver = driver_factory.get_driver(provider)
|
|
|
|
lock_session = db_api.get_session(autocommit=False)
|
|
try:
|
|
if self.repositories.check_quota_met(
|
|
context.session,
|
|
lock_session,
|
|
data_models.Listener,
|
|
listener.project_id):
|
|
raise exceptions.QuotaException(
|
|
resource=data_models.Listener._name())
|
|
|
|
listener_dict = db_prepare.create_listener(
|
|
listener.to_dict(render_unsets=True), None)
|
|
|
|
if listener_dict['default_pool_id']:
|
|
self._validate_pool(context.session, load_balancer_id,
|
|
listener_dict['default_pool_id'],
|
|
listener.protocol)
|
|
|
|
self._test_lb_and_listener_statuses(
|
|
lock_session, lb_id=load_balancer_id)
|
|
|
|
db_listener = self._validate_create_listener(
|
|
lock_session, listener_dict)
|
|
|
|
# Prepare the data for the driver data model
|
|
provider_listener = (
|
|
driver_utils.db_listener_to_provider_listener(db_listener))
|
|
|
|
# re-inject the sni container references lost due to SNI
|
|
# being a separate table in the DB
|
|
if listener.sni_container_refs != wtypes.Unset:
|
|
provider_listener.sni_container_refs = (
|
|
listener.sni_container_refs)
|
|
|
|
# Dispatch to the driver
|
|
LOG.info("Sending create Listener %s to provider %s",
|
|
db_listener.id, driver.name)
|
|
driver_utils.call_provider(
|
|
driver.name, driver.listener_create, provider_listener)
|
|
|
|
lock_session.commit()
|
|
except Exception:
|
|
with excutils.save_and_reraise_exception():
|
|
lock_session.rollback()
|
|
|
|
db_listener = self._get_db_listener(context.session, db_listener.id)
|
|
result = self._convert_db_to_type(db_listener,
|
|
listener_types.ListenerResponse)
|
|
return listener_types.ListenerRootResponse(listener=result)
|
|
|
|
def _graph_create(self, lock_session, listener_dict,
|
|
l7policies=None, pool_name_ids=None):
|
|
load_balancer_id = listener_dict['load_balancer_id']
|
|
listener_dict = db_prepare.create_listener(
|
|
listener_dict, load_balancer_id)
|
|
l7policies = listener_dict.pop('l7policies', l7policies)
|
|
if listener_dict.get('default_pool_id'):
|
|
self._validate_pool(lock_session, load_balancer_id,
|
|
listener_dict['default_pool_id'],
|
|
listener_dict['protocol'])
|
|
db_listener = self._validate_create_listener(
|
|
lock_session, listener_dict)
|
|
|
|
# Now create l7policies
|
|
new_l7ps = []
|
|
for l7p in l7policies:
|
|
l7p['project_id'] = db_listener.project_id
|
|
l7p['load_balancer_id'] = load_balancer_id
|
|
l7p['listener_id'] = db_listener.id
|
|
redirect_pool = l7p.pop('redirect_pool', None)
|
|
if redirect_pool:
|
|
pool_name = redirect_pool['name']
|
|
pool_id = pool_name_ids.get(pool_name)
|
|
if not pool_id:
|
|
raise exceptions.SingleCreateDetailsMissing(
|
|
type='Pool', name=pool_name)
|
|
l7p['redirect_pool_id'] = pool_id
|
|
new_l7ps.append(l7policy.L7PolicyController()._graph_create(
|
|
lock_session, l7p))
|
|
db_listener.l7policies = new_l7ps
|
|
return db_listener
|
|
|
|
def _validate_listener_PUT(self, listener, db_listener):
|
|
# TODO(rm_work): Do we need something like this? What do we do on an
|
|
# empty body for a PUT?
|
|
if not listener:
|
|
raise exceptions.ValidationException(
|
|
detail='No listener object supplied.')
|
|
|
|
# Check for UDP/SCTP compatibility
|
|
if (db_listener.protocol in (constants.PROTOCOL_UDP,
|
|
lib_consts.PROTOCOL_SCTP) and
|
|
self._is_tls_or_insert_header(listener.to_dict())):
|
|
raise exceptions.ValidationException(detail=_(
|
|
"%s protocol listener does not support TLS or header "
|
|
"insertion.") % db_listener.protocol)
|
|
|
|
# Check for certs when not TERMINATED_HTTPS
|
|
if (db_listener.protocol != constants.PROTOCOL_TERMINATED_HTTPS and
|
|
self._has_tls_container_refs(listener.to_dict())):
|
|
raise exceptions.ValidationException(detail=_(
|
|
"Certificate container references are only allowed on "
|
|
"%s protocol listeners.") %
|
|
constants.PROTOCOL_TERMINATED_HTTPS)
|
|
|
|
# Make sure we have a client CA cert if they enable client auth
|
|
if ((listener.client_authentication != wtypes.Unset and
|
|
listener.client_authentication != constants.CLIENT_AUTH_NONE) and
|
|
not (db_listener.client_ca_tls_certificate_id or
|
|
listener.client_ca_tls_container_ref)):
|
|
raise exceptions.ValidationException(detail=_(
|
|
"Client authentication setting %s requires a client CA "
|
|
"container reference.") %
|
|
listener.client_authentication)
|
|
|
|
if listener.insert_headers:
|
|
self._validate_insert_headers(
|
|
list(listener.insert_headers.keys()), db_listener.protocol)
|
|
|
|
sni_containers = listener.sni_container_refs or []
|
|
tls_refs = list(sni_containers)
|
|
if listener.default_tls_container_ref:
|
|
tls_refs.append(listener.default_tls_container_ref)
|
|
self._validate_tls_refs(tls_refs)
|
|
|
|
ca_ref = None
|
|
if (listener.client_ca_tls_container_ref and
|
|
listener.client_ca_tls_container_ref != wtypes.Unset):
|
|
ca_ref = listener.client_ca_tls_container_ref
|
|
elif db_listener.client_ca_tls_certificate_id:
|
|
ca_ref = db_listener.client_ca_tls_certificate_id
|
|
|
|
crl_ref = None
|
|
if (listener.client_crl_container_ref and
|
|
listener.client_crl_container_ref != wtypes.Unset):
|
|
crl_ref = listener.client_crl_container_ref
|
|
elif db_listener.client_crl_container_id:
|
|
crl_ref = db_listener.client_crl_container_id
|
|
|
|
if crl_ref and not ca_ref:
|
|
raise exceptions.ValidationException(detail=_(
|
|
"A client authentication CA reference is required to "
|
|
"specify a client authentication revocation list."))
|
|
|
|
if ca_ref or crl_ref:
|
|
self._validate_client_ca_and_crl_refs(ca_ref, crl_ref)
|
|
|
|
# Validate allowed CIDRs
|
|
if (listener.allowed_cidrs and listener.allowed_cidrs != wtypes.Unset):
|
|
vip_address = db_listener.load_balancer.vip.ip_address
|
|
self._validate_cidr_compatible_with_vip(
|
|
vip_address, listener.allowed_cidrs)
|
|
|
|
# Check TLS cipher prohibit list
|
|
if listener.tls_ciphers:
|
|
rejected_ciphers = validate.check_cipher_prohibit_list(
|
|
listener.tls_ciphers)
|
|
if rejected_ciphers:
|
|
raise exceptions.ValidationException(detail=_(
|
|
'The following ciphers have been prohibited by an '
|
|
'administrator: ' + ', '.join(rejected_ciphers)))
|
|
|
|
if listener.tls_versions is not wtypes.Unset:
|
|
# Validate TLS version list
|
|
validate.check_tls_version_list(listener.tls_versions)
|
|
# Validate TLS versions against minimum
|
|
validate.check_tls_version_min(listener.tls_versions)
|
|
|
|
if listener.alpn_protocols is not wtypes.Unset:
|
|
# Validate ALPN protocol list
|
|
validate.check_alpn_protocols(listener.alpn_protocols)
|
|
|
|
def _set_default_on_none(self, listener):
|
|
"""Reset settings to their default values if None/null was passed in
|
|
|
|
A None/null value can be passed in to clear a value. PUT values
|
|
that were not provided by the user have a type of wtypes.UnsetType.
|
|
If the user is attempting to clear values, they should either
|
|
be set to None (for example in the name field) or they should be
|
|
reset to their default values.
|
|
This method is intended to handle those values that need to be set
|
|
back to a default value.
|
|
"""
|
|
if listener.connection_limit is None:
|
|
listener.connection_limit = constants.DEFAULT_CONNECTION_LIMIT
|
|
if listener.timeout_client_data is None:
|
|
listener.timeout_client_data = (
|
|
CONF.haproxy_amphora.timeout_client_data)
|
|
if listener.timeout_member_connect is None:
|
|
listener.timeout_member_connect = (
|
|
CONF.haproxy_amphora.timeout_member_connect)
|
|
if listener.timeout_member_data is None:
|
|
listener.timeout_member_data = (
|
|
CONF.haproxy_amphora.timeout_member_data)
|
|
if listener.timeout_tcp_inspect is None:
|
|
listener.timeout_tcp_inspect = (
|
|
CONF.haproxy_amphora.timeout_tcp_inspect)
|
|
if listener.client_authentication is None:
|
|
listener.client_authentication = constants.CLIENT_AUTH_NONE
|
|
if listener.tls_ciphers is None:
|
|
listener.tls_ciphers = CONF.api_settings.default_listener_ciphers
|
|
if listener.tls_versions is None:
|
|
listener.tls_versions = (
|
|
CONF.api_settings.default_listener_tls_versions)
|
|
if listener.alpn_protocols is None:
|
|
listener.alpn_protocols = (
|
|
CONF.api_settings.default_listener_alpn_protocols)
|
|
|
|
@wsme_pecan.wsexpose(listener_types.ListenerRootResponse, wtypes.text,
|
|
body=listener_types.ListenerRootPUT, status_code=200)
|
|
def put(self, id, listener_):
|
|
"""Updates a listener on a load balancer."""
|
|
listener = listener_.listener
|
|
context = pecan_request.context.get('octavia_context')
|
|
db_listener = self._get_db_listener(context.session, id,
|
|
show_deleted=False)
|
|
load_balancer_id = db_listener.load_balancer_id
|
|
|
|
project_id, provider = self._get_lb_project_id_provider(
|
|
context.session, load_balancer_id)
|
|
|
|
self._auth_validate_action(context, project_id, constants.RBAC_PUT)
|
|
|
|
self._validate_listener_PUT(listener, db_listener)
|
|
|
|
self._set_default_on_none(listener)
|
|
|
|
if listener.default_pool_id:
|
|
self._validate_pool(context.session, load_balancer_id,
|
|
listener.default_pool_id, db_listener.protocol)
|
|
|
|
# Load the driver early as it also provides validation
|
|
driver = driver_factory.get_driver(provider)
|
|
|
|
with db_api.get_lock_session() as lock_session:
|
|
self._test_lb_and_listener_statuses(lock_session,
|
|
load_balancer_id, id=id)
|
|
|
|
# Prepare the data for the driver data model
|
|
listener_dict = listener.to_dict(render_unsets=False)
|
|
listener_dict['id'] = id
|
|
|
|
provider_listener_dict = (
|
|
driver_utils.listener_dict_to_provider_dict(listener_dict))
|
|
|
|
# Also prepare the baseline object data
|
|
old_provider_listener = (
|
|
driver_utils.db_listener_to_provider_listener(db_listener,
|
|
for_delete=True))
|
|
|
|
# Dispatch to the driver
|
|
LOG.info("Sending update Listener %s to provider %s", id,
|
|
driver.name)
|
|
driver_utils.call_provider(
|
|
driver.name, driver.listener_update,
|
|
old_provider_listener,
|
|
driver_dm.Listener.from_dict(provider_listener_dict))
|
|
|
|
# Update the database to reflect what the driver just accepted
|
|
self.repositories.listener.update(
|
|
lock_session, id, **listener.to_dict(render_unsets=False))
|
|
|
|
# Force SQL alchemy to query the DB, otherwise we get inconsistent
|
|
# results
|
|
context.session.expire_all()
|
|
db_listener = self._get_db_listener(context.session, id)
|
|
result = self._convert_db_to_type(db_listener,
|
|
listener_types.ListenerResponse)
|
|
return listener_types.ListenerRootResponse(listener=result)
|
|
|
|
@wsme_pecan.wsexpose(None, wtypes.text, status_code=204)
|
|
def delete(self, id):
|
|
"""Deletes a listener from a load balancer."""
|
|
context = pecan_request.context.get('octavia_context')
|
|
db_listener = self._get_db_listener(context.session, id,
|
|
show_deleted=False)
|
|
load_balancer_id = db_listener.load_balancer_id
|
|
|
|
project_id, provider = self._get_lb_project_id_provider(
|
|
context.session, load_balancer_id)
|
|
|
|
self._auth_validate_action(context, project_id, constants.RBAC_DELETE)
|
|
|
|
# Load the driver early as it also provides validation
|
|
driver = driver_factory.get_driver(provider)
|
|
|
|
with db_api.get_lock_session() as lock_session:
|
|
|
|
self._test_lb_and_listener_statuses(
|
|
lock_session, load_balancer_id,
|
|
id=id, listener_status=constants.PENDING_DELETE)
|
|
|
|
LOG.info("Sending delete Listener %s to provider %s", id,
|
|
driver.name)
|
|
provider_listener = (
|
|
driver_utils.db_listener_to_provider_listener(
|
|
db_listener, for_delete=True))
|
|
driver_utils.call_provider(driver.name, driver.listener_delete,
|
|
provider_listener)
|
|
|
|
@pecan_expose()
|
|
def _lookup(self, id, *remainder):
|
|
"""Overridden pecan _lookup method for custom routing.
|
|
|
|
Currently it checks if this was a stats request and routes
|
|
the request to the StatsController.
|
|
"""
|
|
if id and remainder and remainder[0] == 'stats':
|
|
return StatisticsController(listener_id=id), remainder[1:]
|
|
return None
|
|
|
|
|
|
class StatisticsController(base.BaseController, stats.StatsMixin):
|
|
RBAC_TYPE = constants.RBAC_LISTENER
|
|
|
|
def __init__(self, listener_id):
|
|
super().__init__()
|
|
self.id = listener_id
|
|
|
|
@wsme_pecan.wsexpose(listener_types.StatisticsRootResponse, wtypes.text,
|
|
status_code=200)
|
|
def get(self):
|
|
context = pecan_request.context.get('octavia_context')
|
|
db_listener = self._get_db_listener(context.session, self.id,
|
|
show_deleted=False)
|
|
if not db_listener:
|
|
LOG.info("Listener %s not found.", id)
|
|
raise exceptions.NotFound(
|
|
resource=data_models.Listener._name(),
|
|
id=id)
|
|
|
|
self._auth_validate_action(context, db_listener.project_id,
|
|
constants.RBAC_GET_STATS)
|
|
|
|
listener_stats = self.get_listener_stats(context.session, self.id)
|
|
|
|
result = self._convert_db_to_type(
|
|
listener_stats, listener_types.ListenerStatisticsResponse)
|
|
return listener_types.StatisticsRootResponse(stats=result)
|