def test_securitygroup_get_by_securitygroup_id_not_found(self): try: db.securitygroup_get_by_securitygroup_id( self.user_ctxt, "gid", "sec") except Exception as e: status_code = e.code self.assertEqual(status_code, 404)
def test_delete_exeption_HTTPNotFound_db_securitygroup_id_not_found(self): self.mox.StubOutWithMock(db, "securitygroup_get_by_securitygroup_id") db.securitygroup_get_by_securitygroup_id( IsA(context.RequestContext), GID, SECURITYGROUP_ID)\ .AndReturn({"processes": [], "neutron_securitygroup_id": "fake_id"}) self.mox.StubOutWithMock(manager.ResourceOperator, "securitygroup_delete") manager.ResourceOperator.securitygroup_delete( IsA(context.RequestContext), "fake_id") self.mox.StubOutWithMock(db, "securitygroup_delete") db.securitygroup_delete(IsA(context.RequestContext), GID, SECURITYGROUP_ID)\ .AndRaise(exception.SecuritygroupNotFound( securitygroup_id=SECURITYGROUP_ID)) self.mox.ReplayAll() url = get_base_url(GID) + "/" + SECURITYGROUP_ID req = get_request(url, "DELETE") res = req.get_response(self.app) self.assertEqual(res.status_code, 404)
def test_delete_raise_exception_securitygroup_inuse(self): self.mox.StubOutWithMock(db, "securitygroup_get_by_securitygroup_id") db.securitygroup_get_by_securitygroup_id(IsA(context.RequestContext), GID, SECURITYGROUP_ID).AndReturn( {"processes": [{"pid": "pid"}]} ) self.mox.ReplayAll() url = get_base_url(GID) + "/" + SECURITYGROUP_ID req = get_request(url, "DELETE") res = req.get_response(self.app) self.assertEqual(res.status_code, 409)
def test_show_manager_exception(self): self.mox.StubOutWithMock(db, "securitygroup_get_by_securitygroup_id") db.securitygroup_get_by_securitygroup_id(IsA( context.RequestContext), GID, SECURITYGROUP_ID1).AndRaise( exception.SecuritygroupNotFound( securitygroup_id=SECURITYGROUP_ID1)) self.mox.ReplayAll() url = get_base_url(GID) + "/" + SECURITYGROUP_ID1 req = get_request(url, 'GET') res = req.get_response(self.app) self.assertEqual(res.status_code, 404)
def test_delete_exeption_HTTPNotFound_securitygroup_not_found(self): self.mox.StubOutWithMock(db, "securitygroup_get_by_securitygroup_id") db.securitygroup_get_by_securitygroup_id( IsA(context.RequestContext), GID, SECURITYGROUP_ID)\ .AndRaise(exception.SecuritygroupNotFound( securitygroup_id=SECURITYGROUP_ID)) self.mox.ReplayAll() url = get_base_url(GID) + "/" + SECURITYGROUP_ID req = get_request(url, "DELETE") res = req.get_response(self.app) self.assertEqual(res.status_code, 404)
def test_delete_raise_exception_by_scheduler_rpcapi(self): self.mox.StubOutWithMock(db, "securitygroup_get_by_securitygroup_id") db.securitygroup_get_by_securitygroup_id(IsA(context.RequestContext), GID, SECURITYGROUP_ID).AndReturn( {"processes": []} ) scheduler_rpcapi.SchedulerAPI.select_destinations( IsA(context.RequestContext), request_spec={}, filter_properties={} ).AndRaise(Exception()) self.mox.ReplayAll() url = get_base_url(GID) + "/" + SECURITYGROUP_ID req = get_request(url, "DELETE") res = req.get_response(self.app) self.assertEqual(res.status_code, 500)
def test_delete_exeption_SecuritygroupInUse(self): self.mox.StubOutWithMock(db, "securitygroup_get_by_securitygroup_id") db.securitygroup_get_by_securitygroup_id( IsA(context.RequestContext), GID, SECURITYGROUP_ID)\ .AndReturn({"processes": [{"gid": "gid"}], "neutron_securitygroup_id": "fake_id"}) self.mox.ReplayAll() url = get_base_url(GID) + "/" + SECURITYGROUP_ID req = get_request(url, "DELETE") res = req.get_response(self.app) self.assertEqual(res.status_code, 409)
def test_delete(self): self.mox.StubOutWithMock(db, "securitygroup_get_by_securitygroup_id") db.securitygroup_get_by_securitygroup_id(IsA(context.RequestContext), GID, SECURITYGROUP_ID).AndReturn( {"processes": []} ) scheduler_rpcapi.SchedulerAPI.select_destinations( IsA(context.RequestContext), request_spec={}, filter_properties={} ).AndReturn({"host": "fake_host"}) operator_rpcapi.ResourceOperatorAPI.securitygroup_delete( IsA(context.RequestContext), "fake_host", neutron_securitygroup_id="test_securitygroup" ) self.mox.ReplayAll() url = get_base_url(GID) + "/" + SECURITYGROUP_ID req = get_request(url, "DELETE") res = req.get_response(self.app) self.assertEqual(res.status_code, 204)
def test_securitygroup_get_by_securitygroup_id(self): group = self._create_group("gid1") securitygroup_ids = ["sc1", "sc2", "sc3"] securitygroups = [] for securitygroup_id in securitygroup_ids: securitygroup = db.securitygroup_create( self.user_ctxt, self._get_base_values(group["gid"], securitygroup_id)) securitygroups.append(securitygroup) res_securitygroup = db.securitygroup_get_by_securitygroup_id( self.user_ctxt, group["gid"], securitygroup_ids[0]) ignored_keys = ['deleted_at', 'updated_at', 'created_at', 'processes'] self._assertEqualObjects( res_securitygroup, securitygroups[0], ignored_keys)
def show(self, req, gid, securitygroup_id): def _validate(gid, securitygroup_id): if not uuidutils.is_uuid_like(gid): raise exception.GroupNotFound(gid=gid) if not uuidutils.is_uuid_like(securitygroup_id): raise exception.SecuritygroupNotFound( securitygroup_id=securitygroup_id) try: _validate(gid, securitygroup_id) context = req.environ['rack.context'] securitygroup = db.securitygroup_get_by_securitygroup_id( context, gid, securitygroup_id) except exception.NotFound as exc: raise webob.exc.HTTPNotFound(explanation=exc.format_message()) return self._view_builder.show(securitygroup)
def delete(self, req, gid, securitygroup_id): def _validate(gid, securitygroup_id): if not uuidutils.is_uuid_like(gid): raise exception.GroupNotFound(gid=gid) if not uuidutils.is_uuid_like(securitygroup_id): raise exception.SecuritygroupNotFound( securitygroup_id=securitygroup_id) try: _validate(gid, securitygroup_id) context = req.environ['rack.context'] securitygroup = db.securitygroup_get_by_securitygroup_id( context, gid, securitygroup_id) if securitygroup["processes"]: raise exception.SecuritygroupInUse( securitygroup_id=securitygroup_id) securitygroup = db.securitygroup_delete( context, gid, securitygroup_id) except exception.SecuritygroupInUse as exc: raise webob.exc.HTTPConflict(explanation=exc.format_message()) except exception.NotFound as exc: raise webob.exc.HTTPNotFound(explanation=exc.format_message()) try: host = self.scheduler_rpcapi.select_destinations( context, request_spec={}, filter_properties={}) self.operator_rpcapi.securitygroup_delete( context, host["host"], neutron_securitygroup_id=securitygroup["neutron_securitygroup" "_id"]) except Exception: raise exception.SecuritygroupDeleteFailed()
def _validate(context, body, gid, is_proxy=False): proxy = db.process_get_all(context, gid, filters={"is_proxy": True}) if is_proxy: if len(proxy) > 0: msg = _("Proxy process already exists in the group %s" % gid) raise exception.InvalidInput(reason=msg) else: if len(proxy) != 1: msg = _("Proxy process does not exist in the group %s" % gid) raise webob.exc.HTTPBadRequest(explanation=msg) keyname = "proxy" if is_proxy else "process" if not self.is_valid_body(body, keyname): msg = _("Invalid request body") raise exception.InvalidInput(reason=msg) values = body[keyname] ppid = values.get("ppid") name = values.get("name") keypair_id = values.get("keypair_id") securitygroup_ids = values.get("securitygroup_ids") glance_image_id = values.get("glance_image_id") nova_flavor_id = values.get("nova_flavor_id") userdata = values.get("userdata") args = values.get("args") self._uuid_check(gid, ppid, keypair_id) pid = unicode(uuid.uuid4()) if not name: prefix = "proxy-" if is_proxy else "process-" name = prefix + pid if ppid: parent_process = db.process_get_by_pid(context, gid, ppid) nova_keypair_id = None if keypair_id: keypair = db.keypair_get_by_keypair_id(context, gid, keypair_id) nova_keypair_id = keypair["nova_keypair_id"] elif ppid: keypair_id = parent_process.get("keypair_id") if keypair_id: keypair = db.keypair_get_by_keypair_id( context, gid, keypair_id) nova_keypair_id = keypair["nova_keypair_id"] else: default_keypair = db.keypair_get_all( context, gid, filters={"is_default": True}) if default_keypair: keypair_id = default_keypair[0]["keypair_id"] nova_keypair_id = default_keypair[0]["nova_keypair_id"] if securitygroup_ids is not None and\ not isinstance(securitygroup_ids, list): msg = _("securitygroupids must be a list") raise exception.InvalidInput(reason=msg) elif securitygroup_ids: neutron_securitygroup_ids = [] for id in securitygroup_ids: self._uuid_check(securitygroup_id=id) securitygroup = db.securitygroup_get_by_securitygroup_id( context, gid, id) neutron_securitygroup_ids.append( securitygroup["neutron_securitygroup_id"]) elif ppid: securitygroups = parent_process.get("securitygroups") securitygroup_ids =\ [securitygroup["securitygroup_id"] for securitygroup in securitygroups] neutron_securitygroup_ids =\ [securitygroup["neutron_securitygroup_id"] for securitygroup in securitygroups] else: default_securitygroups = db.securitygroup_get_all( context, gid, filters={"is_default": True}) if default_securitygroups: securitygroup_ids =\ [securitygroup["securitygroup_id"] for securitygroup in default_securitygroups] neutron_securitygroup_ids =\ [securitygroup["neutron_securitygroup_id"] for securitygroup in default_securitygroups] else: msg = _("securitygroup_ids is required. Default \ securitygroup_ids are not registered.") raise exception.InvalidInput(reason=msg) if not glance_image_id and ppid: glance_image_id = parent_process.get("glance_image_id") if not nova_flavor_id and ppid: nova_flavor_id = parent_process.get("nova_flavor_id") if userdata: try: base64.b64decode(userdata) except TypeError: msg = _("userdadta must be a base64 encoded value.") raise exception.InvalidInput(reason=msg) networks = db.network_get_all(context, gid) if not networks: msg = _("Netwoks does not exist in the group %s" % gid) raise webob.exc.HTTPBadRequest(explanation=msg) network_ids =\ [network["network_id"] for network in networks] neutron_network_ids =\ [network["neutron_network_id"] for network in networks] nics = [] for id in neutron_network_ids: nics.append({"net-id": id}) if args is None: args = {} elif args is not None and\ not isinstance(args, dict): msg = _("args must be a dict.") raise exception.InvalidInput(reason=msg) else: for key in args.keys(): args[key] = str(args[key]) default_args = { "gid": gid, "pid": pid, } if ppid: default_args["ppid"] = ppid if is_proxy: default_args["rackapi_ip"] = cfg.CONF.my_ip default_args["os_username"] = cfg.CONF.os_username default_args["os_password"] = cfg.CONF.os_password default_args["os_tenant_name"] = cfg.CONF.os_tenant_name default_args["os_auth_url"] = cfg.CONF.os_auth_url default_args["os_region_name"] = cfg.CONF.os_region_name else: proxy_instance_id = proxy[0]["nova_instance_id"] default_args["proxy_ip"] = self.manager.get_process_address( context, proxy_instance_id) args.update(default_args) valid_values = {} valid_values["gid"] = gid valid_values["ppid"] = ppid valid_values["pid"] = pid valid_values["display_name"] = name valid_values["keypair_id"] = keypair_id valid_values["securitygroup_ids"] = securitygroup_ids valid_values["glance_image_id"] = glance_image_id valid_values["nova_flavor_id"] = nova_flavor_id valid_values["userdata"] = userdata valid_values["args"] = json.dumps(args) valid_values["is_proxy"] = True if is_proxy else False valid_values["network_ids"] = network_ids if is_proxy: ipc_endpoint = values.get("ipc_endpoint") shm_endpoint = values.get("shm_endpoint") fs_endpoint = values.get("fs_endpoint") if ipc_endpoint: utils.check_string_length(ipc_endpoint, 'ipc_endpoint', min_length=1, max_length=255) if shm_endpoint: utils.check_string_length(shm_endpoint, 'shm_endpoint', min_length=1, max_length=255) if fs_endpoint: utils.check_string_length(fs_endpoint, 'fs_endpoint', min_length=1, max_length=255) valid_values["ipc_endpoint"] = ipc_endpoint valid_values["shm_endpoint"] = shm_endpoint valid_values["fs_endpoint"] = fs_endpoint boot_values = {} boot_values["name"] = name boot_values["key_name"] = nova_keypair_id boot_values["security_groups"] = neutron_securitygroup_ids boot_values["image"] = glance_image_id boot_values["flavor"] = nova_flavor_id boot_values["userdata"] = userdata boot_values["meta"] = args boot_values["nics"] = nics return valid_values, boot_values