Quotas API
This commit is contained in:
		@@ -35,6 +35,7 @@ from neutron.openstack.common.db.sqlalchemy import session as neutron_session
 | 
			
		||||
from neutron.openstack.common import importutils
 | 
			
		||||
from neutron.openstack.common import log as logging
 | 
			
		||||
from neutron.openstack.common import uuidutils
 | 
			
		||||
from neutron import quota
 | 
			
		||||
 | 
			
		||||
from neutron import neutron_plugin_base_v2
 | 
			
		||||
 | 
			
		||||
@@ -66,8 +67,18 @@ quark_opts = [
 | 
			
		||||
               help=_("Path to the config for the net driver"))
 | 
			
		||||
]
 | 
			
		||||
 | 
			
		||||
quark_quota_opts = [
 | 
			
		||||
    cfg.IntOpt('quota_ports_per_network',
 | 
			
		||||
               default=64,
 | 
			
		||||
               help=_('Maximum ports per network per tenant')),
 | 
			
		||||
    cfg.IntOpt('quota_security_rules_per_group',
 | 
			
		||||
               default=20,
 | 
			
		||||
               help=_('Maximum security group rules in a group')),
 | 
			
		||||
]
 | 
			
		||||
 | 
			
		||||
STRATEGY = network_strategy.STRATEGY
 | 
			
		||||
CONF.register_opts(quark_opts, "QUARK")
 | 
			
		||||
CONF.register_opts(quark_quota_opts, "QUOTAS")
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
def _pop_param(attrs, param, default=None):
 | 
			
		||||
@@ -93,7 +104,8 @@ class Plugin(neutron_plugin_base_v2.NeutronPluginBaseV2,
 | 
			
		||||
    supported_extension_aliases = ["mac_address_ranges", "routes",
 | 
			
		||||
                                   "ip_addresses", "ports_quark",
 | 
			
		||||
                                   "security-group",
 | 
			
		||||
                                   "subnets_quark", "provider", "ip_policies"]
 | 
			
		||||
                                   "subnets_quark", "provider",
 | 
			
		||||
                                   "ip_policies", "quotas"]
 | 
			
		||||
 | 
			
		||||
    def _initDBMaker(self):
 | 
			
		||||
        # This needs to be called after _ENGINE is configured
 | 
			
		||||
@@ -125,6 +137,14 @@ class Plugin(neutron_plugin_base_v2.NeutronPluginBaseV2,
 | 
			
		||||
        self.ipam_reuse_after = CONF.QUARK.ipam_reuse_after
 | 
			
		||||
        neutron_db_api.register_models(base=models.BASEV2)
 | 
			
		||||
 | 
			
		||||
        quark_resources = [
 | 
			
		||||
            quota.BaseResource('ports_per_network',
 | 
			
		||||
                               'quota_ports_per_network'),
 | 
			
		||||
            quota.BaseResource('security_rules_per_group',
 | 
			
		||||
                               'quota_security_rules_per_group'),
 | 
			
		||||
        ]
 | 
			
		||||
        quota.QUOTAS.register_resources(quark_resources)
 | 
			
		||||
 | 
			
		||||
    def _make_security_group_list(self, context, group_ids):
 | 
			
		||||
        if not group_ids or group_ids is attributes.ATTR_NOT_SPECIFIED:
 | 
			
		||||
            return ([], [])
 | 
			
		||||
@@ -590,6 +610,10 @@ class Plugin(neutron_plugin_base_v2.NeutronPluginBaseV2,
 | 
			
		||||
            if not net:
 | 
			
		||||
                raise exceptions.NetworkNotFound(net_id=net_id)
 | 
			
		||||
 | 
			
		||||
        quota.QUOTAS.limit_check(
 | 
			
		||||
            context, context.tenant_id,
 | 
			
		||||
            ports_per_network=len(net.get('ports', []))+1)
 | 
			
		||||
 | 
			
		||||
        if fixed_ips:
 | 
			
		||||
            for fixed_ip in fixed_ips:
 | 
			
		||||
                subnet_id = fixed_ip.get("subnet_id")
 | 
			
		||||
@@ -1080,9 +1104,6 @@ class Plugin(neutron_plugin_base_v2.NeutronPluginBaseV2,
 | 
			
		||||
    def create_security_group(self, context, security_group):
 | 
			
		||||
        LOG.info("create_security_group for tenant %s" %
 | 
			
		||||
                (context.tenant_id))
 | 
			
		||||
        if (db_api.security_group_find(context).count() >=
 | 
			
		||||
                CONF.QUOTAS.quota_security_group):
 | 
			
		||||
            raise exceptions.OverQuota(overs="security groups")
 | 
			
		||||
        group = security_group["security_group"]
 | 
			
		||||
        group_name = group.get('name', '')
 | 
			
		||||
        if group_name == "default":
 | 
			
		||||
@@ -1107,14 +1128,13 @@ class Plugin(neutron_plugin_base_v2.NeutronPluginBaseV2,
 | 
			
		||||
            'group_id': '00000000-0000-0000-0000-000000000000',
 | 
			
		||||
            'port_egress_rules': [],
 | 
			
		||||
            'port_ingress_rules': [
 | 
			
		||||
                {'ethertype': 'IPv4', 'protocol': 6,
 | 
			
		||||
                    'port_range_min': 0, 'port_range_max': 65535},
 | 
			
		||||
                {'ethertype': 'IPv4', 'protocol': 17,
 | 
			
		||||
                    'port_range_min': 0, 'port_range_max': 65535},
 | 
			
		||||
                {'ethertype': 'IPv6', 'protocol': 6,
 | 
			
		||||
                    'port_range_min': 0, 'port_range_max': 65535},
 | 
			
		||||
                {'ethertype': 'IPv6', 'protocol': 17,
 | 
			
		||||
                    'port_range_min': 0, 'port_range_max': 65535}]}
 | 
			
		||||
                {'ethertype': 'IPv4', 'protocol': 1},
 | 
			
		||||
                {'ethertype': 'IPv4', 'protocol': 6},
 | 
			
		||||
                {'ethertype': 'IPv4', 'protocol': 17},
 | 
			
		||||
                {'ethertype': 'IPv6', 'protocol': 1},
 | 
			
		||||
                {'ethertype': 'IPv6', 'protocol': 6},
 | 
			
		||||
                {'ethertype': 'IPv6', 'protocol': 17},
 | 
			
		||||
            ]}
 | 
			
		||||
 | 
			
		||||
        self.net_driver.create_security_group(
 | 
			
		||||
            context,
 | 
			
		||||
@@ -1134,9 +1154,6 @@ class Plugin(neutron_plugin_base_v2.NeutronPluginBaseV2,
 | 
			
		||||
    def create_security_group_rule(self, context, security_group_rule):
 | 
			
		||||
        LOG.info("create_security_group for tenant %s" %
 | 
			
		||||
                (context.tenant_id))
 | 
			
		||||
        if (db_api.security_group_rule_find(context).count() >=
 | 
			
		||||
                CONF.QUOTAS.quota_security_group_rule):
 | 
			
		||||
            raise exceptions.OverQuota(overs="security group rules")
 | 
			
		||||
        rule = self._validate_security_group_rule(
 | 
			
		||||
            context, security_group_rule["security_group_rule"])
 | 
			
		||||
        rule['id'] = uuidutils.generate_uuid()
 | 
			
		||||
@@ -1147,6 +1164,10 @@ class Plugin(neutron_plugin_base_v2.NeutronPluginBaseV2,
 | 
			
		||||
        if not group:
 | 
			
		||||
            raise sg_ext.SecurityGroupNotFound(group_id=group_id)
 | 
			
		||||
 | 
			
		||||
        quota.QUOTAS.limit_check(
 | 
			
		||||
            context, context.tenant_id,
 | 
			
		||||
            security_rules_per_group=len(group.get('rules', []))+1)
 | 
			
		||||
 | 
			
		||||
        self.net_driver.create_security_group_rule(
 | 
			
		||||
            context,
 | 
			
		||||
            group_id,
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										49
									
								
								quark/quota_driver.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										49
									
								
								quark/quota_driver.py
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,49 @@
 | 
			
		||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
 | 
			
		||||
 | 
			
		||||
# Copyright 2011 OpenStack Foundation.
 | 
			
		||||
# All Rights Reserved.
 | 
			
		||||
#
 | 
			
		||||
#    Licensed under the Apache License, Version 2.0 (the "License"); you may
 | 
			
		||||
#    not use this file except in compliance with the License. You may obtain
 | 
			
		||||
#    a copy of the License at
 | 
			
		||||
#
 | 
			
		||||
#         http://www.apache.org/licenses/LICENSE-2.0
 | 
			
		||||
#
 | 
			
		||||
#    Unless required by applicable law or agreed to in writing, software
 | 
			
		||||
#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 | 
			
		||||
#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 | 
			
		||||
#    License for the specific language governing permissions and limitations
 | 
			
		||||
#    under the License.
 | 
			
		||||
 | 
			
		||||
from neutron.db import quota_db
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
class QuarkQuotaDriver(quota_db.DbQuotaDriver):
 | 
			
		||||
    """Driver to perform necessary checks to enforce quotas and obtain quota
 | 
			
		||||
    information.
 | 
			
		||||
 | 
			
		||||
    The default driver utilizes the local database.
 | 
			
		||||
    """
 | 
			
		||||
 | 
			
		||||
    @staticmethod
 | 
			
		||||
    def delete_tenant_quota(context, tenant_id):
 | 
			
		||||
        """Delete the quota entries for a given tenant_id.
 | 
			
		||||
 | 
			
		||||
        Atfer deletion, this tenant will use default quota values in conf.
 | 
			
		||||
        """
 | 
			
		||||
        tenant_quotas = context.session.query(quota_db.Quota)
 | 
			
		||||
        tenant_quotas = tenant_quotas.filter_by(tenant_id=tenant_id)
 | 
			
		||||
        tenant_quotas.delete()
 | 
			
		||||
 | 
			
		||||
    @staticmethod
 | 
			
		||||
    def update_quota_limit(context, tenant_id, resource, limit):
 | 
			
		||||
        tenant_quota = context.session.query(quota_db.Quota).filter_by(
 | 
			
		||||
            tenant_id=tenant_id, resource=resource).first()
 | 
			
		||||
 | 
			
		||||
        if tenant_quota:
 | 
			
		||||
            tenant_quota.update({'limit': limit})
 | 
			
		||||
        else:
 | 
			
		||||
            tenant_quota = quota_db.Quota(tenant_id=tenant_id,
 | 
			
		||||
                                          resource=resource,
 | 
			
		||||
                                          limit=limit)
 | 
			
		||||
            context.session.add(tenant_quota)
 | 
			
		||||
@@ -37,6 +37,7 @@ class TestQuarkPlugin(test_base.TestBase):
 | 
			
		||||
    def setUp(self):
 | 
			
		||||
        super(TestQuarkPlugin, self).setUp()
 | 
			
		||||
 | 
			
		||||
        cfg.CONF.set_override('quota_ports_per_network', 1, 'QUOTAS')
 | 
			
		||||
        cfg.CONF.set_override('connection', 'sqlite://', 'database')
 | 
			
		||||
        db_api.configure_db()
 | 
			
		||||
        self.plugin = quark.plugin.Plugin()
 | 
			
		||||
@@ -1219,6 +1220,18 @@ class TestQuarkCreatePort(TestQuarkPlugin):
 | 
			
		||||
            with self.assertRaises(exceptions.NetworkNotFound):
 | 
			
		||||
                self.plugin.create_port(self.context, port)
 | 
			
		||||
 | 
			
		||||
    def test_create_port_net_at_max(self):
 | 
			
		||||
        network = dict(id=1, ports=[models.Port()])
 | 
			
		||||
        mac = dict(address="aa:bb:cc:dd:ee:ff")
 | 
			
		||||
        port_name = "foobar"
 | 
			
		||||
        ip = dict()
 | 
			
		||||
        port = dict(port=dict(mac_address=mac["address"], network_id=1,
 | 
			
		||||
                              tenant_id=self.context.tenant_id, device_id=2,
 | 
			
		||||
                              name=port_name))
 | 
			
		||||
        with self._stubs(port=port["port"], network=network, addr=ip, mac=mac):
 | 
			
		||||
            with self.assertRaises(exceptions.OverQuota):
 | 
			
		||||
                self.plugin.create_port(self.context, port)
 | 
			
		||||
 | 
			
		||||
    def test_create_port_security_groups(self, groups=[1]):
 | 
			
		||||
        network = dict(id=1)
 | 
			
		||||
        mac = dict(address="aa:bb:cc:dd:ee:ff")
 | 
			
		||||
@@ -1888,6 +1901,7 @@ class TestQuarkCreateSecurityGroupRule(TestQuarkPlugin):
 | 
			
		||||
    def setUp(self, *args, **kwargs):
 | 
			
		||||
        super(TestQuarkCreateSecurityGroupRule, self).setUp(*args, **kwargs)
 | 
			
		||||
        cfg.CONF.set_override('quota_security_group_rule', 1, 'QUOTAS')
 | 
			
		||||
        cfg.CONF.set_override('quota_security_rules_per_group', 1, 'QUOTAS')
 | 
			
		||||
        self.rule = {'id': 1, 'ethertype': 'IPv4',
 | 
			
		||||
                     'security_group_id': 1, 'group': {'id': 1}}
 | 
			
		||||
        self.expected = {
 | 
			
		||||
@@ -1928,6 +1942,7 @@ class TestQuarkCreateSecurityGroupRule(TestQuarkPlugin):
 | 
			
		||||
        rule = dict(self.rule, **ruleset)
 | 
			
		||||
        group = rule.pop('group')
 | 
			
		||||
        expected = dict(self.expected, **ruleset)
 | 
			
		||||
        expected.pop('group', None)
 | 
			
		||||
        with self._stubs(rule, group) as rule_create:
 | 
			
		||||
            result = self.plugin.create_security_group_rule(
 | 
			
		||||
                self.context, {'security_group_rule': rule})
 | 
			
		||||
@@ -1973,6 +1988,11 @@ class TestQuarkCreateSecurityGroupRule(TestQuarkPlugin):
 | 
			
		||||
        with self.assertRaises(sg_ext.SecurityGroupNotFound):
 | 
			
		||||
            self._test_create_security_rule(group=None)
 | 
			
		||||
 | 
			
		||||
    def test_create_security_rule_group_at_max(self):
 | 
			
		||||
        with self.assertRaises(exceptions.OverQuota):
 | 
			
		||||
            self._test_create_security_rule(
 | 
			
		||||
                group={'id': 1, 'rules': [models.SecurityGroupRule()]})
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
class TestQuarkDeleteSecurityGroupRule(TestQuarkPlugin):
 | 
			
		||||
    @contextlib.contextmanager
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user