750 lines
23 KiB
Python
750 lines
23 KiB
Python
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
|
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from gbpautomation.heat.engine.resources.neutron import gbpresource
|
|
from neutronclient.common.exceptions import NeutronClientException
|
|
|
|
from heat.engine import attributes
|
|
from heat.engine import constraints
|
|
from heat.engine import properties
|
|
|
|
|
|
class Endpoint(gbpresource.GBPResource):
|
|
|
|
PROPERTIES = (
|
|
TENANT_ID, NAME, DESCRIPTION, ENDPOINT_GROUP_ID
|
|
) = (
|
|
'tenant_id', 'name', 'description', 'endpoint_group_id'
|
|
)
|
|
|
|
ATTRIBUTES = (
|
|
PORT_ID
|
|
) = (
|
|
'port_id'
|
|
)
|
|
|
|
properties_schema = {
|
|
TENANT_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Tenant id of the endpoint.')
|
|
),
|
|
NAME: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Name of the endpoint.'),
|
|
update_allowed=True
|
|
),
|
|
DESCRIPTION: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Description of the endpoint.'),
|
|
update_allowed=True
|
|
),
|
|
ENDPOINT_GROUP_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Endpoint group id of the endpoint.'),
|
|
required=True,
|
|
update_allowed=True
|
|
)
|
|
}
|
|
|
|
attributes_schema = {
|
|
PORT_ID: attributes.Schema(
|
|
_("Neutron port id of this endpoint")
|
|
)
|
|
}
|
|
|
|
def _show_resource(self):
|
|
client = self.grouppolicy()
|
|
ep_id = self.resource_id
|
|
return client.show_endpoint(ep_id)['endpoint']
|
|
|
|
def handle_create(self):
|
|
client = self.grouppolicy()
|
|
|
|
props = {}
|
|
for key in self.properties:
|
|
if self.properties.get(key) is not None:
|
|
props[key] = self.properties.get(key)
|
|
|
|
ep = client.create_endpoint({'endpoint': props})['endpoint']
|
|
|
|
self.resource_id_set(ep['id'])
|
|
|
|
def _resolve_attribute(self, name):
|
|
client = self.grouppolicy()
|
|
ep_id = self.resource_id
|
|
if name == 'port_id':
|
|
return client.show_endpoint(ep_id)['endpoint']['port_id']
|
|
return super(Endpoint, self)._resolve_attribute(name)
|
|
|
|
def handle_delete(self):
|
|
|
|
client = self.grouppolicy()
|
|
ep_id = self.resource_id
|
|
|
|
try:
|
|
client.delete_endpoint(ep_id)
|
|
except NeutronClientException as ex:
|
|
self.client_plugin().ignore_not_found(ex)
|
|
else:
|
|
return self._delete_task()
|
|
|
|
def handle_update(self, json_snippet, tmpl_diff, prop_diff):
|
|
if prop_diff:
|
|
self.grouppolicy().update_endpoint(
|
|
self.resource_id, {'endpoint': prop_diff})
|
|
|
|
|
|
class EndpointGroup(gbpresource.GBPResource):
|
|
|
|
PROPERTIES = (
|
|
TENANT_ID, NAME, DESCRIPTION, L2_POLICY_ID,
|
|
PROVIDED_CONTRACTS, CONSUMED_CONTRACTS, NETWORK_SERVICE_POLICY_ID
|
|
) = (
|
|
'tenant_id', 'name', 'description', 'l2_policy_id',
|
|
'provided_contracts', 'consumed_contracts', 'network_service_policy_id'
|
|
)
|
|
|
|
properties_schema = {
|
|
TENANT_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Tenant id of the endpoint group.')
|
|
),
|
|
NAME: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Name of the endpoint group.'),
|
|
update_allowed=True
|
|
),
|
|
DESCRIPTION: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Description of the endpoint group.'),
|
|
update_allowed=True
|
|
),
|
|
L2_POLICY_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('L2 policy id of the endpoint group.'),
|
|
update_allowed=True
|
|
),
|
|
PROVIDED_CONTRACTS: properties.Schema(
|
|
properties.Schema.LIST,
|
|
_('Provided contracts for the endpoint group.'),
|
|
update_allowed=True
|
|
),
|
|
CONSUMED_CONTRACTS: properties.Schema(
|
|
properties.Schema.LIST,
|
|
_('Consumed contracts for the endpoint group.'),
|
|
update_allowed=True
|
|
),
|
|
NETWORK_SERVICE_POLICY_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Network service policy id of the endpoint group.'),
|
|
update_allowed=True, default=None
|
|
)
|
|
}
|
|
|
|
def _show_resource(self):
|
|
client = self.grouppolicy()
|
|
epg_id = self.resource_id
|
|
return client.show_endpoint_group(epg_id)['endpoint_group']
|
|
|
|
def handle_create(self):
|
|
client = self.grouppolicy()
|
|
|
|
props = {}
|
|
for key in self.properties:
|
|
if self.properties.get(key) is not None:
|
|
props[key] = self.properties.get(key)
|
|
|
|
provided_contracts_list = {}
|
|
consumed_contracts_list = {}
|
|
props_provided_contracts = props.get('provided_contracts', [])
|
|
props_consumed_contracts = props.get('consumed_contracts', [])
|
|
|
|
for prop_prov_contract in props_provided_contracts:
|
|
contract_id = prop_prov_contract['contract_id']
|
|
contract_scope = prop_prov_contract['contract_scope']
|
|
provided_contracts_list.update({contract_id: contract_scope})
|
|
|
|
for prop_cons_contract in props_consumed_contracts:
|
|
contract_id = prop_cons_contract['contract_id']
|
|
contract_scope = prop_cons_contract['contract_scope']
|
|
consumed_contracts_list.update({contract_id: contract_scope})
|
|
|
|
if provided_contracts_list:
|
|
props['provided_contracts'] = provided_contracts_list
|
|
if consumed_contracts_list:
|
|
props['consumed_contracts'] = consumed_contracts_list
|
|
|
|
epg = client.create_endpoint_group(
|
|
{'endpoint_group': props})['endpoint_group']
|
|
|
|
self.resource_id_set(epg['id'])
|
|
|
|
def handle_delete(self):
|
|
|
|
client = self.grouppolicy()
|
|
epg_id = self.resource_id
|
|
|
|
try:
|
|
client.delete_endpoint_group(epg_id)
|
|
except NeutronClientException as ex:
|
|
self.client_plugin().ignore_not_found(ex)
|
|
else:
|
|
return self._delete_task()
|
|
|
|
def handle_update(self, json_snippet, tmpl_diff, prop_diff):
|
|
if prop_diff:
|
|
self.grouppolicy().update_endpoint_group(
|
|
self.resource_id, {'endpoint_group': prop_diff})
|
|
|
|
|
|
class L2Policy(gbpresource.GBPResource):
|
|
|
|
PROPERTIES = (
|
|
TENANT_ID, NAME, DESCRIPTION, L3_POLICY_ID
|
|
) = (
|
|
'tenant_id', 'name', 'description', 'l3_policy_id'
|
|
)
|
|
|
|
properties_schema = {
|
|
TENANT_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Tenant id of the L2 policy.')
|
|
),
|
|
NAME: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Name of the L2 policy.'),
|
|
update_allowed=True
|
|
),
|
|
DESCRIPTION: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Description of the L2 policy.'),
|
|
update_allowed=True
|
|
),
|
|
L3_POLICY_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('L3 policy id associated with l2 policy.'),
|
|
required=True,
|
|
update_allowed=True
|
|
)
|
|
}
|
|
|
|
def _show_resource(self):
|
|
client = self.grouppolicy()
|
|
l2_policy_id = self.resource_id
|
|
return client.show_l2_policy(l2_policy_id)['l2_policy']
|
|
|
|
def handle_create(self):
|
|
client = self.grouppolicy()
|
|
|
|
props = {}
|
|
for key in self.properties:
|
|
if self.properties.get(key) is not None:
|
|
props[key] = self.properties.get(key)
|
|
|
|
l2_policy = client.create_l2_policy(
|
|
{'l2_policy': props})['l2_policy']
|
|
|
|
self.resource_id_set(l2_policy['id'])
|
|
|
|
def handle_delete(self):
|
|
|
|
client = self.grouppolicy()
|
|
l2_policy_id = self.resource_id
|
|
|
|
try:
|
|
client.delete_l2_policy(l2_policy_id)
|
|
except NeutronClientException as ex:
|
|
self.client_plugin().ignore_not_found(ex)
|
|
else:
|
|
return self._delete_task()
|
|
|
|
def handle_update(self, json_snippet, tmpl_diff, prop_diff):
|
|
if prop_diff:
|
|
self.grouppolicy().update_l2_policy(
|
|
self.resource_id, {'l2_policy': prop_diff})
|
|
|
|
|
|
class L3Policy(gbpresource.GBPResource):
|
|
|
|
PROPERTIES = (
|
|
TENANT_ID, NAME, DESCRIPTION, IP_VERSION, IP_POOL,
|
|
SUBNET_PREFIX_LENGTH
|
|
) = (
|
|
'tenant_id', 'name', 'description', 'ip_version', 'ip_pool',
|
|
'subnet_prefix_length'
|
|
)
|
|
|
|
properties_schema = {
|
|
TENANT_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Tenant id of the L3 policy.')
|
|
),
|
|
NAME: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Name of the L3 policy.'),
|
|
update_allowed=True
|
|
),
|
|
DESCRIPTION: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Description of the L3 policy.'),
|
|
update_allowed=True
|
|
),
|
|
IP_VERSION: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('IP version of the L3 policy.'),
|
|
update_allowed=False
|
|
),
|
|
IP_POOL: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('IP pool of the L3 policy.'),
|
|
update_allowed=False
|
|
),
|
|
SUBNET_PREFIX_LENGTH: properties.Schema(
|
|
properties.Schema.INTEGER,
|
|
_('Subnet prefix length of L3 policy.'),
|
|
update_allowed=True
|
|
)
|
|
}
|
|
|
|
def _show_resource(self):
|
|
client = self.grouppolicy()
|
|
l3_policy_id = self.resource_id
|
|
return client.show_l3_policy(l3_policy_id)['l3_policy']
|
|
|
|
def handle_create(self):
|
|
client = self.grouppolicy()
|
|
|
|
props = {}
|
|
for key in self.properties:
|
|
if self.properties.get(key) is not None:
|
|
props[key] = self.properties.get(key)
|
|
|
|
l3_policy = client.create_l3_policy(
|
|
{'l3_policy': props})['l3_policy']
|
|
|
|
self.resource_id_set(l3_policy['id'])
|
|
|
|
def handle_delete(self):
|
|
|
|
client = self.grouppolicy()
|
|
l3_policy_id = self.resource_id
|
|
|
|
try:
|
|
client.delete_l3_policy(l3_policy_id)
|
|
except NeutronClientException as ex:
|
|
self.client_plugin().ignore_not_found(ex)
|
|
else:
|
|
return self._delete_task()
|
|
|
|
def handle_update(self, json_snippet, tmpl_diff, prop_diff):
|
|
if prop_diff:
|
|
self.grouppolicy().update_l3_policy(
|
|
self.resource_id, {'l3_policy': prop_diff})
|
|
|
|
|
|
class PolicyClassifier(gbpresource.GBPResource):
|
|
|
|
PROPERTIES = (
|
|
TENANT_ID, NAME, DESCRIPTION, PROTOCOL, PORT_RANGE,
|
|
DIRECTION
|
|
) = (
|
|
'tenant_id', 'name', 'description', 'protocol', 'port_range',
|
|
'direction'
|
|
)
|
|
|
|
properties_schema = {
|
|
TENANT_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Tenant id of the policy classifier.')
|
|
),
|
|
NAME: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Name of the policy classifier.'),
|
|
update_allowed=True
|
|
),
|
|
DESCRIPTION: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Description of the policy classifier.'),
|
|
update_allowed=True
|
|
),
|
|
PROTOCOL: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Protocol of traffic described by the policy classifier.'),
|
|
constraints=[
|
|
constraints.AllowedValues(['tcp', 'udp', 'icmp', None])
|
|
],
|
|
update_allowed=True
|
|
),
|
|
PORT_RANGE: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Port range of traffic described by the policy classifier.'),
|
|
update_allowed=True
|
|
),
|
|
DIRECTION: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Direction of traffic described by the policy classifier.'),
|
|
constraints=[
|
|
constraints.AllowedValues(['in', 'out', 'bi', None])
|
|
],
|
|
update_allowed=True
|
|
)
|
|
}
|
|
|
|
def _show_resource(self):
|
|
client = self.grouppolicy()
|
|
pc_id = self.resource_id
|
|
return client.show_policy_classifier(pc_id)['policy_classifier']
|
|
|
|
def handle_create(self):
|
|
client = self.grouppolicy()
|
|
|
|
props = {}
|
|
for key in self.properties:
|
|
if self.properties.get(key) is not None:
|
|
props[key] = self.properties.get(key)
|
|
|
|
policy_classifier = client.create_policy_classifier(
|
|
{'policy_classifier': props})['policy_classifier']
|
|
|
|
self.resource_id_set(policy_classifier['id'])
|
|
|
|
def handle_delete(self):
|
|
|
|
client = self.grouppolicy()
|
|
pc_id = self.resource_id
|
|
|
|
try:
|
|
client.delete_policy_classifier(pc_id)
|
|
except NeutronClientException as ex:
|
|
self.client_plugin().ignore_not_found(ex)
|
|
else:
|
|
return self._delete_task()
|
|
|
|
def handle_update(self, json_snippet, tmpl_diff, prop_diff):
|
|
if prop_diff:
|
|
self.grouppolicy().update_policy_classifier(
|
|
self.resource_id, {'policy_classifier': prop_diff})
|
|
|
|
|
|
class PolicyAction(gbpresource.GBPResource):
|
|
|
|
PROPERTIES = (
|
|
TENANT_ID, NAME, DESCRIPTION, ACTION_TYPE, ACTION_VALUE
|
|
) = (
|
|
'tenant_id', 'name', 'description', 'action_type', 'action_value'
|
|
)
|
|
|
|
properties_schema = {
|
|
TENANT_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Tenant id of the action.')
|
|
),
|
|
NAME: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Name of the action.'),
|
|
update_allowed=True
|
|
),
|
|
DESCRIPTION: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Description of the action.'),
|
|
update_allowed=True
|
|
),
|
|
ACTION_TYPE: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Type of action.'),
|
|
constraints=[
|
|
constraints.AllowedValues(['allow', 'redirect', None])
|
|
],
|
|
update_allowed=True
|
|
),
|
|
ACTION_VALUE: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Value of the action.'),
|
|
update_allowed=True
|
|
)
|
|
}
|
|
|
|
def _show_resource(self):
|
|
client = self.grouppolicy()
|
|
action_id = self.resource_id
|
|
return client.show_policy_action(action_id)['policy_action']
|
|
|
|
def handle_create(self):
|
|
client = self.grouppolicy()
|
|
|
|
props = {}
|
|
for key in self.properties:
|
|
if self.properties.get(key) is not None:
|
|
props[key] = self.properties.get(key)
|
|
|
|
policy_action = client.create_policy_action(
|
|
{'policy_action': props})['policy_action']
|
|
|
|
self.resource_id_set(policy_action['id'])
|
|
|
|
def handle_delete(self):
|
|
|
|
client = self.grouppolicy()
|
|
action_id = self.resource_id
|
|
|
|
try:
|
|
client.delete_policy_action(action_id)
|
|
except NeutronClientException as ex:
|
|
self.client_plugin().ignore_not_found(ex)
|
|
else:
|
|
return self._delete_task()
|
|
|
|
def handle_update(self, json_snippet, tmpl_diff, prop_diff):
|
|
if prop_diff:
|
|
self.grouppolicy().update_policy_action(
|
|
self.resource_id, {'policy_action': prop_diff})
|
|
|
|
|
|
class PolicyRule(gbpresource.GBPResource):
|
|
|
|
PROPERTIES = (
|
|
TENANT_ID, NAME, DESCRIPTION, ENABLED, POLICY_CLASSIFIER_ID,
|
|
POLICY_ACTIONS
|
|
) = (
|
|
'tenant_id', 'name', 'description', 'enabled', 'policy_classifier_id',
|
|
'policy_actions'
|
|
)
|
|
|
|
properties_schema = {
|
|
TENANT_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Tenant id of the policy rule.')
|
|
),
|
|
NAME: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Name of the policy rule.'),
|
|
update_allowed=True
|
|
),
|
|
DESCRIPTION: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Description of the policy rule.'),
|
|
update_allowed=True
|
|
),
|
|
ENABLED: properties.Schema(
|
|
properties.Schema.BOOLEAN,
|
|
_('State of policy rule.'),
|
|
default=True, update_allowed=True
|
|
),
|
|
POLICY_CLASSIFIER_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Classifier id of the policy rule.'),
|
|
required=True, update_allowed=True
|
|
),
|
|
POLICY_ACTIONS: properties.Schema(
|
|
properties.Schema.LIST,
|
|
_('List of actions of the policy rule.'),
|
|
default=None, update_allowed=True
|
|
)
|
|
}
|
|
|
|
def _show_resource(self):
|
|
client = self.grouppolicy()
|
|
rule_id = self.resource_id
|
|
return client.show_policy_rule(rule_id)['policy_rule']
|
|
|
|
def handle_create(self):
|
|
client = self.grouppolicy()
|
|
|
|
props = {}
|
|
for key in self.properties:
|
|
if self.properties.get(key) is not None:
|
|
props[key] = self.properties.get(key)
|
|
|
|
policy_rule = client.create_policy_rule(
|
|
{'policy_rule': props})['policy_rule']
|
|
|
|
self.resource_id_set(policy_rule['id'])
|
|
|
|
def handle_delete(self):
|
|
|
|
client = self.grouppolicy()
|
|
rule_id = self.resource_id
|
|
|
|
try:
|
|
client.delete_policy_rule(rule_id)
|
|
except NeutronClientException as ex:
|
|
self.client_plugin().ignore_not_found(ex)
|
|
else:
|
|
return self._delete_task()
|
|
|
|
def handle_update(self, json_snippet, tmpl_diff, prop_diff):
|
|
if prop_diff:
|
|
self.grouppolicy().update_policy_rule(
|
|
self.resource_id, {'policy_rule': prop_diff})
|
|
|
|
|
|
class Contract(gbpresource.GBPResource):
|
|
|
|
PROPERTIES = (
|
|
TENANT_ID, NAME, DESCRIPTION, PARENT_ID, CHILD_CONTRACTS,
|
|
POLICY_RULES
|
|
) = (
|
|
'tenant_id', 'name', 'description', 'parent_id', 'child_contracts',
|
|
'policy_rules'
|
|
)
|
|
|
|
properties_schema = {
|
|
TENANT_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Tenant id of the contract.')
|
|
),
|
|
NAME: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Name of the contract.'),
|
|
update_allowed=True
|
|
),
|
|
DESCRIPTION: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Description of the contract.'),
|
|
update_allowed=True
|
|
),
|
|
PARENT_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Parent id of the contract.'),
|
|
update_allowed=False
|
|
),
|
|
CHILD_CONTRACTS: properties.Schema(
|
|
properties.Schema.LIST,
|
|
_('List of child contracts.'),
|
|
default=None, update_allowed=True
|
|
),
|
|
POLICY_RULES: properties.Schema(
|
|
properties.Schema.LIST,
|
|
_('List of policy rules.'),
|
|
default=None, update_allowed=True
|
|
)
|
|
}
|
|
|
|
def _show_resource(self):
|
|
client = self.grouppolicy()
|
|
contract_id = self.resource_id
|
|
return client.show_contract(contract_id)['contract']
|
|
|
|
def handle_create(self):
|
|
client = self.grouppolicy()
|
|
|
|
props = {}
|
|
for key in self.properties:
|
|
if self.properties.get(key) is not None:
|
|
props[key] = self.properties.get(key)
|
|
|
|
contract = client.create_contract(
|
|
{'contract': props})['contract']
|
|
|
|
self.resource_id_set(contract['id'])
|
|
|
|
def handle_delete(self):
|
|
|
|
client = self.grouppolicy()
|
|
contract_id = self.resource_id
|
|
|
|
try:
|
|
client.delete_contract(contract_id)
|
|
except NeutronClientException as ex:
|
|
self.client_plugin().ignore_not_found(ex)
|
|
else:
|
|
return self._delete_task()
|
|
|
|
def handle_update(self, json_snippet, tmpl_diff, prop_diff):
|
|
if prop_diff:
|
|
self.grouppolicy().update_contract(
|
|
self.resource_id, {'contract': prop_diff})
|
|
|
|
|
|
class NetworkServicePolicy(gbpresource.GBPResource):
|
|
|
|
PROPERTIES = (
|
|
TENANT_ID, NAME, DESCRIPTION, NETWORK_SERVICE_PARAMS
|
|
) = (
|
|
'tenant_id', 'name', 'description', 'network_service_params'
|
|
)
|
|
|
|
properties_schema = {
|
|
TENANT_ID: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Tenant id of the network service policy.')
|
|
),
|
|
NAME: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Name of the network service policy.'),
|
|
update_allowed=True
|
|
),
|
|
DESCRIPTION: properties.Schema(
|
|
properties.Schema.STRING,
|
|
_('Description of the network service policy.'),
|
|
update_allowed=True
|
|
),
|
|
NETWORK_SERVICE_PARAMS: properties.Schema(
|
|
properties.Schema.LIST,
|
|
_('List of network service policy dicts.'),
|
|
default=None, update_allowed=True
|
|
)
|
|
}
|
|
|
|
def _show_resource(self):
|
|
client = self.grouppolicy()
|
|
nsp_id = self.resource_id
|
|
nsp = client.show_network_service_policy(nsp_id)
|
|
return nsp['network_service_policy']
|
|
|
|
def handle_create(self):
|
|
client = self.grouppolicy()
|
|
|
|
props = {}
|
|
for key in self.properties:
|
|
if self.properties.get(key) is not None:
|
|
props[key] = self.properties.get(key)
|
|
|
|
nsp = client.create_network_service_policy(
|
|
{'network_service_policy': props})['network_service_policy']
|
|
|
|
self.resource_id_set(nsp['id'])
|
|
|
|
def handle_delete(self):
|
|
|
|
client = self.grouppolicy()
|
|
nsp_id = self.resource_id
|
|
|
|
try:
|
|
client.delete_network_service_policy(nsp_id)
|
|
except NeutronClientException as ex:
|
|
self.client_plugin().ignore_not_found(ex)
|
|
else:
|
|
return self._delete_task()
|
|
|
|
def handle_update(self, json_snippet, tmpl_diff, prop_diff):
|
|
if prop_diff:
|
|
self.grouppolicy().update_network_service_policy(
|
|
self.resource_id, {'network_service_policy': prop_diff})
|
|
|
|
|
|
def resource_mapping():
|
|
return {
|
|
'OS::Neutron::Endpoint': Endpoint,
|
|
'OS::Neutron::EndpointGroup': EndpointGroup,
|
|
'OS::Neutron::L2Policy': L2Policy,
|
|
'OS::Neutron::L3Policy': L3Policy,
|
|
'OS::Neutron::PolicyClassifier': PolicyClassifier,
|
|
'OS::Neutron::PolicyAction': PolicyAction,
|
|
'OS::Neutron::PolicyRule': PolicyRule,
|
|
'OS::Neutron::Contract': Contract,
|
|
'OS::Neutron::NetworkServicePolicy': NetworkServicePolicy
|
|
}
|