Files
quark/quark/plugin.py
Justin Hammond 9dc68e4057 Initial work on async worker for quark
JIRA:NCP-1172

Created basic async service and test client
- this is basically scaffolding and more will be added later
- currently doesn't have tests but will on the next PR
- intention is to add 'plugins' to support different types of async
  operations

Created AsyncTransactions model and migration

Created jobs endpoint and resource

Created plugin_module for jobs

Made job plugin_module admin-only for writes

Allowed query by completed

Created functional test for job plugin_module

Fixed flake8 stuff

Undid the neutron requirements

Implements: blueprint quark-async-worker
Change-Id: I88417f094e90b5410bce8ea5fed01043ed47aedd
2016-06-22 11:24:33 -05:00

525 lines
20 KiB
Python

# Copyright 2013 Rackspace Hosting Inc.
# All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
"""
v2 Neutron Plug-in API Quark Implementation
"""
from neutron.extensions import securitygroup as sg_ext
from neutron import neutron_plugin_base_v2
from neutron.quota import resource as qres
from neutron.quota import resource_registry as qres_reg
from oslo_config import cfg
from oslo_log import log as logging
import webob.exc
from quark.api import extensions
from quark import ip_availability
from quark.plugin_modules import floating_ips
from quark.plugin_modules import ip_addresses
from quark.plugin_modules import ip_policies
from quark.plugin_modules import jobs
from quark.plugin_modules import mac_address_ranges
from quark.plugin_modules import networks
from quark.plugin_modules import ports
from quark.plugin_modules import router
from quark.plugin_modules import routes
from quark.plugin_modules import security_groups
from quark.plugin_modules import segment_allocation_ranges
from quark.plugin_modules import subnets
LOG = logging.getLogger(__name__)
CONF = cfg.CONF
quark_resources = [
qres.BaseResource('alloc_pools_per_subnet',
'quota_alloc_pools_per_subnet'),
qres.BaseResource('dns_nameservers_per_subnet',
'quota_dns_nameservers_per_subnet'),
qres.BaseResource('ports_per_network',
'quota_ports_per_network'),
qres.BaseResource('routes_per_subnet',
'quota_routes_per_subnet'),
qres.BaseResource('security_rules_per_group',
'quota_security_rules_per_group'),
qres.BaseResource('security_groups_per_port',
'quota_security_groups_per_port'),
qres.BaseResource('v4_subnets_per_network',
'quota_v4_subnets_per_network'),
qres.BaseResource('v6_subnets_per_network',
'quota_v6_subnets_per_network'),
qres.BaseResource('fixed_ips_per_port',
'quota_fixed_ips_per_port')
]
quark_quota_opts = [
cfg.IntOpt("quota_alloc_pools_per_subnet",
default=5,
help=_("Maximum number of allocation pools per subnet")),
cfg.IntOpt('quota_dns_nameservers_per_subnet',
default=2,
help=_('Maximum number of dns nameservers per subnet')),
cfg.IntOpt('quota_ports_per_network',
default=250,
help=_('Maximum ports per network')),
cfg.IntOpt('quota_routes_per_subnet',
default=3,
help=_('Maximum routes per subnet')),
cfg.IntOpt('quota_security_rules_per_group',
default=20,
help=_('Maximum security group rules in a group')),
cfg.IntOpt("quota_security_groups_per_port",
default=5,
help=_("Maximum number of security groups per port")),
cfg.IntOpt('quota_v4_subnets_per_network',
default=1,
help=_('Maximum v4 subnets per network')),
cfg.IntOpt('quota_v6_subnets_per_network',
default=1,
help=_('Maximum v6 subnets per network')),
cfg.IntOpt('quota_fixed_ips_per_port',
default=6,
help=_('Maximum number of fixed IPs per port')),
]
def append_quark_extensions(conf):
"""Adds the Quark API Extensions to the extension path.
Pulled out for test coveage.
"""
if 'api_extensions_path' in conf:
conf.set_override('api_extensions_path', ":".join(extensions.__path__))
append_quark_extensions(CONF)
CONF.register_opts(quark_quota_opts, "QUOTAS")
qres_reg.ResourceRegistry.get_instance().register_resources(quark_resources)
def sessioned(func):
def _wrapped(self, context, *args, **kwargs):
res = func(self, context, *args, **kwargs)
if not context.session.is_active:
context.session.close()
# NOTE(mdietz): Forces neutron to get a fresh session
# if it needs it after our call
context._session = None
return res
return _wrapped
class Plugin(neutron_plugin_base_v2.NeutronPluginBaseV2,
sg_ext.SecurityGroupPluginBase):
supported_extension_aliases = ["mac_address_ranges", "routes",
"ip_addresses", "security-group",
"diagnostics", "subnets_quark",
"provider", "ip_policies", "quotas",
"networks_quark", "router",
"ip_availabilities", "ports_quark",
"floatingip", "segment_allocation_ranges",
"scalingip", "jobs"]
def __init__(self):
LOG.info("Starting quark plugin")
def _fix_missing_tenant_id(self, context, resource):
"""Will add the tenant_id to the context from body.
It is assumed that the body must have a tenant_id because neutron
core could never have gotten here otherwise.
"""
if context.tenant_id is None:
context.tenant_id = resource.get("tenant_id")
if context.tenant_id is None:
msg = _("Running without keystone AuthN requires "
"that tenant_id is specified")
raise webob.exc.HTTPBadRequest(msg)
@sessioned
def get_mac_address_range(self, context, id, fields=None):
return mac_address_ranges.get_mac_address_range(context, id, fields)
@sessioned
def get_mac_address_ranges(self, context):
return mac_address_ranges.get_mac_address_ranges(context)
@sessioned
def create_mac_address_range(self, context, mac_range):
self._fix_missing_tenant_id(context, mac_range["mac_address_range"])
return mac_address_ranges.create_mac_address_range(context, mac_range)
@sessioned
def delete_mac_address_range(self, context, id):
mac_address_ranges.delete_mac_address_range(context, id)
@sessioned
def create_security_group(self, context, security_group):
self._fix_missing_tenant_id(context, security_group["security_group"])
return security_groups.create_security_group(context, security_group)
@sessioned
def create_security_group_rule(self, context, security_group_rule):
self._fix_missing_tenant_id(context,
security_group_rule["security_group_rule"])
return security_groups.create_security_group_rule(context,
security_group_rule)
@sessioned
def delete_security_group(self, context, id):
security_groups.delete_security_group(context, id)
@sessioned
def delete_security_group_rule(self, context, id):
security_groups.delete_security_group_rule(context, id)
@sessioned
def get_security_group(self, context, id, fields=None):
return security_groups.get_security_group(context, id, fields)
@sessioned
def get_security_group_rule(self, context, id, fields=None):
return security_groups.get_security_group_rule(context, id, fields)
@sessioned
def get_security_groups(self, context, filters=None, fields=None,
sorts=None, limit=None, marker=None,
page_reverse=False):
return security_groups.get_security_groups(context, filters, fields,
sorts, limit, marker,
page_reverse)
@sessioned
def get_security_group_rules(self, context, filters=None, fields=None,
sorts=None, limit=None, marker=None,
page_reverse=False):
return security_groups.get_security_group_rules(context, filters,
fields, sorts, limit,
marker, page_reverse)
@sessioned
def update_security_group(self, context, id, security_group):
return security_groups.update_security_group(context, id,
security_group)
@sessioned
def create_ip_policy(self, context, ip_policy):
self._fix_missing_tenant_id(context, ip_policy["ip_policy"])
return ip_policies.create_ip_policy(context, ip_policy)
@sessioned
def get_ip_policy(self, context, id):
return ip_policies.get_ip_policy(context, id)
@sessioned
def get_ip_policies(self, context, **filters):
return ip_policies.get_ip_policies(context, **filters)
@sessioned
def update_ip_policy(self, context, id, ip_policy):
return ip_policies.update_ip_policy(context, id, ip_policy)
@sessioned
def delete_ip_policy(self, context, id):
return ip_policies.delete_ip_policy(context, id)
@sessioned
def get_ip_addresses(self, context, **filters):
return ip_addresses.get_ip_addresses(context, **filters)
@sessioned
def get_ip_address(self, context, id):
return ip_addresses.get_ip_address(context, id)
@sessioned
def create_ip_address(self, context, ip_address):
self._fix_missing_tenant_id(context, ip_address["ip_address"])
return ip_addresses.create_ip_address(context, ip_address)
@sessioned
def update_ip_address(self, context, id, ip_address):
return ip_addresses.update_ip_address(context, id, ip_address)
@sessioned
def delete_ip_address(self, context, id):
return ip_addresses.delete_ip_address(context, id)
@sessioned
def create_port(self, context, port):
self._fix_missing_tenant_id(context, port["port"])
return ports.create_port(context, port)
@sessioned
def get_port(self, context, id, fields=None):
return ports.get_port(context, id, fields)
@sessioned
def update_port(self, context, id, port):
return ports.update_port(context, id, port)
@sessioned
def update_port_for_ip(self, context, ip_id, id, port):
return ip_addresses.update_port_for_ip_address(context, ip_id, id,
port)
@sessioned
def get_ports(self, context, limit=None, page_reverse=False, sorts=None,
marker=None, filters=None, fields=None):
return ports.get_ports(context, limit, sorts, marker, page_reverse,
filters, fields)
@sessioned
def get_ports_for_ip_address(self, context, ip, limit=None,
page_reverse=False, sorts=None, marker=None,
filters=None, fields=None):
return ip_addresses.get_ports_for_ip_address(context, ip, limit, sorts,
marker, page_reverse,
filters, fields)
@sessioned
def get_port_for_ip_address(self, context, ip_id, id, fields=None):
return ip_addresses.get_port_for_ip_address(context, ip_id, id, fields)
@sessioned
def get_ports_count(self, context, filters=None):
return ports.get_ports_count(context, filters)
@sessioned
def delete_port(self, context, id):
return ports.delete_port(context, id)
@sessioned
def disassociate_port(self, context, id, ip_address_id):
return ports.disassociate_port(context, id, ip_address_id)
@sessioned
def diagnose_port(self, context, id, fields):
return ports.diagnose_port(context, id, fields)
@sessioned
def get_route(self, context, id):
return routes.get_route(context, id)
@sessioned
def get_routes(self, context):
return routes.get_routes(context)
@sessioned
def create_route(self, context, route):
self._fix_missing_tenant_id(context, route["route"])
return routes.create_route(context, route)
@sessioned
def delete_route(self, context, id):
routes.delete_route(context, id)
@sessioned
def create_subnet(self, context, subnet):
self._fix_missing_tenant_id(context, subnet["subnet"])
return subnets.create_subnet(context, subnet)
@sessioned
def update_subnet(self, context, id, subnet):
return subnets.update_subnet(context, id, subnet)
@sessioned
def get_subnet(self, context, id, fields=None):
return subnets.get_subnet(context, id, fields)
@sessioned
def get_subnets(self, context, limit=None, page_reverse=False, sorts=None,
marker=None, filters=None, fields=None):
return subnets.get_subnets(context, limit, page_reverse, sorts, marker,
filters, fields)
@sessioned
def get_subnets_count(self, context, filters=None):
return subnets.get_subnets_count(context, filters)
@sessioned
def delete_subnet(self, context, id):
return subnets.delete_subnet(context, id)
@sessioned
def diagnose_subnet(self, context, id, fields):
return subnets.diagnose_subnet(context, id, fields)
@sessioned
def create_network(self, context, network):
self._fix_missing_tenant_id(context, network["network"])
return networks.create_network(context, network)
@sessioned
def update_network(self, context, id, network):
return networks.update_network(context, id, network)
@sessioned
def get_network(self, context, id, fields=None):
return networks.get_network(context, id, fields)
@sessioned
def get_networks(self, context, limit=None, sorts=None, marker=None,
page_reverse=False, filters=None, fields=None):
return networks.get_networks(context, limit, sorts, marker,
page_reverse, filters, fields)
@sessioned
def get_networks_count(self, context, filters=None):
return networks.get_networks_count(context, filters)
@sessioned
def delete_network(self, context, id):
return networks.delete_network(context, id)
@sessioned
def diagnose_network(self, context, id, fields):
return networks.diagnose_network(context, id, fields)
# NOTE(mdietz): we don't actually support these, but despite the fact that
# they're extensions in Neutron, Nova still expects to be
# able to call some of these as if they aren't
def create_router(self, context, router):
raise NotImplementedError()
def update_router(self, context, id, router):
raise NotImplementedError()
def get_router(self, context, id, fields=None):
return router.get_router(context, id, fields)
def delete_router(self, context, id):
raise NotImplementedError()
def get_routers(self, context, filters=None, fields=None,
sorts=None, limit=None, marker=None, page_reverse=False):
return router.get_routers(context, filters=filters, fields=fields,
sorts=sorts, limit=limit, marker=marker,
page_reverse=page_reverse)
def add_router_interface(self, context, router_id, interface_info):
raise NotImplementedError()
def remove_router_interface(self, context, router_id, interface_info):
raise NotImplementedError()
@sessioned
def create_floatingip(self, context, floatingip):
self._fix_missing_tenant_id(context, floatingip["floatingip"])
return floating_ips.create_floatingip(context,
floatingip["floatingip"])
@sessioned
def update_floatingip(self, context, id, floatingip):
return floating_ips.update_floatingip(context, id,
floatingip["floatingip"])
@sessioned
def get_floatingip(self, context, id, fields=None):
return floating_ips.get_floatingip(context, id, fields)
@sessioned
def delete_floatingip(self, context, id):
return floating_ips.delete_floatingip(context, id)
@sessioned
def get_floatingips(self, context, filters=None, fields=None,
sorts=None, limit=None, marker=None,
page_reverse=False):
return floating_ips.get_floatingips(context, filters=filters,
fields=fields, sorts=sorts,
limit=limit, marker=marker,
page_reverse=page_reverse)
def get_routers_count(self, context, filters=None):
raise NotImplementedError()
def get_floatingips_count(self, context, filters=None):
return floating_ips.get_floatingips_count(context, filters)
def get_ip_availability(self, **kwargs):
return ip_availability.get_ip_availability(**kwargs)
@sessioned
def get_segment_allocation_range(self, context, id, fields=None):
return segment_allocation_ranges.get_segment_allocation_range(
context, id, fields)
@sessioned
def get_segment_allocation_ranges(self, context, **filters):
return segment_allocation_ranges.get_segment_allocation_ranges(
context, **filters)
@sessioned
def create_segment_allocation_range(self, context, sa_range):
self._fix_missing_tenant_id(
context, sa_range["segment_allocation_range"])
return segment_allocation_ranges.create_segment_allocation_range(
context, sa_range)
@sessioned
def delete_segment_allocation_range(self, context, id):
segment_allocation_ranges.delete_segment_allocation_range(
context, id)
def create_scalingip(self, context, scalingip):
self._fix_missing_tenant_id(context, scalingip["scalingip"])
return floating_ips.create_scalingip(context, scalingip["scalingip"])
@sessioned
def update_scalingip(self, context, id, scalingip):
return floating_ips.update_scalingip(context, id,
scalingip["scalingip"])
@sessioned
def get_scalingip(self, context, id, fields=None):
return floating_ips.get_scalingip(context, id, fields)
@sessioned
def delete_scalingip(self, context, id):
return floating_ips.delete_scalingip(context, id)
@sessioned
def get_scalingips(self, context, filters=None, fields=None,
sorts=None, limit=None, marker=None,
page_reverse=False):
return floating_ips.get_scalingips(context, filters=filters,
fields=fields, sorts=sorts,
limit=limit, marker=marker,
page_reverse=page_reverse)
@sessioned
def get_jobs(self, context, **filters):
return jobs.get_jobs(context, **filters)
@sessioned
def get_job(self, context, id):
return jobs.get_job(context, id)
@sessioned
def create_job(self, context, job):
self._fix_missing_tenant_id(context, job['job'])
return jobs.create_job(context, job)
@sessioned
def update_job(self, context, id, job):
self._fix_missing_tenant_id(context, job['job'])
return jobs.update_job(context, id, job)
@sessioned
def delete_job(self, context, id):
return jobs.delete_job(context, id)