Merge trunk
Fixing docstrings
This commit is contained in:
@@ -47,3 +47,7 @@
|
||||
<vishvananda@gmail.com> <root@mirror.nasanebula.net>
|
||||
<vishvananda@gmail.com> <root@ubuntu>
|
||||
<vishvananda@gmail.com> <vishvananda@yahoo.com>
|
||||
<ilyaalekseyev@acm.org> <ialekseev@griddynamics.com>
|
||||
<ilyaalekseyev@acm.org> <ilya@oscloud.ru>
|
||||
<reldan@oscloud.ru> <enugaev@griddynamics.com>
|
||||
<kshileev@gmail.com> <kshileev@griddynamics.com>
|
||||
@@ -22,14 +22,14 @@ David Pravec <David.Pravec@danix.org>
|
||||
Dean Troyer <dtroyer@gmail.com>
|
||||
Devin Carlen <devin.carlen@gmail.com>
|
||||
Ed Leafe <ed@leafe.com>
|
||||
Eldar Nugaev <enugaev@griddynamics.com>
|
||||
Eldar Nugaev <reldan@oscloud.ru>
|
||||
Eric Day <eday@oddments.org>
|
||||
Eric Windisch <eric@cloudscaling.com>
|
||||
Ewan Mellor <ewan.mellor@citrix.com>
|
||||
Gabe Westmaas <gabe.westmaas@rackspace.com>
|
||||
Hisaharu Ishii <ishii.hisaharu@lab.ntt.co.jp>
|
||||
Hisaki Ohara <hisaki.ohara@intel.com>
|
||||
Ilya Alekseyev <ialekseev@griddynamics.com>
|
||||
Ilya Alekseyev <ilyaalekseyev@acm.org>
|
||||
Isaku Yamahata <yamahata@valinux.co.jp>
|
||||
Jason Cannavale <jason.cannavale@rackspace.com>
|
||||
Jason Koelker <jason@koelker.net>
|
||||
@@ -53,6 +53,7 @@ Kei Masumoto <masumotok@nttdata.co.jp>
|
||||
Ken Pepple <ken.pepple@gmail.com>
|
||||
Kevin Bringard <kbringard@attinteractive.com>
|
||||
Kevin L. Mitchell <kevin.mitchell@rackspace.com>
|
||||
Kirill Shileev <kshileev@gmail.com>
|
||||
Koji Iida <iida.koji@lab.ntt.co.jp>
|
||||
Lorin Hochstein <lorin@isi.edu>
|
||||
Lvov Maxim <usrleon@gmail.com>
|
||||
|
||||
@@ -23,6 +23,7 @@ include nova/compute/interfaces.template
|
||||
include nova/console/xvp.conf.template
|
||||
include nova/db/sqlalchemy/migrate_repo/migrate.cfg
|
||||
include nova/db/sqlalchemy/migrate_repo/README
|
||||
include nova/db/sqlalchemy/migrate_repo/versions/*.sql
|
||||
include nova/virt/interfaces.template
|
||||
include nova/virt/libvirt*.xml.template
|
||||
include nova/virt/cpuinfo.xml.template
|
||||
|
||||
Executable
+116
@@ -0,0 +1,116 @@
|
||||
#!/usr/bin/env python
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright (c) 2011 Openstack, LLC.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
"""Cron script to generate usage notifications for instances neither created
|
||||
nor destroyed in a given time period.
|
||||
|
||||
Together with the notifications generated by compute on instance
|
||||
create/delete/resize, over that ime period, this allows an external
|
||||
system consuming usage notification feeds to calculate instance usage
|
||||
for each tenant.
|
||||
|
||||
Time periods are specified like so:
|
||||
<number>[mdy]
|
||||
|
||||
1m = previous month. If the script is run April 1, it will generate usages
|
||||
for March 1 thry March 31.
|
||||
3m = 3 previous months.
|
||||
90d = previous 90 days.
|
||||
1y = previous year. If run on Jan 1, it generates usages for
|
||||
Jan 1 thru Dec 31 of the previous year.
|
||||
"""
|
||||
|
||||
import datetime
|
||||
import gettext
|
||||
import os
|
||||
import sys
|
||||
import time
|
||||
|
||||
# If ../nova/__init__.py exists, add ../ to Python search path, so that
|
||||
# it will override what happens to be installed in /usr/(local/)lib/python...
|
||||
POSSIBLE_TOPDIR = os.path.normpath(os.path.join(os.path.abspath(sys.argv[0]),
|
||||
os.pardir,
|
||||
os.pardir))
|
||||
if os.path.exists(os.path.join(POSSIBLE_TOPDIR, 'nova', '__init__.py')):
|
||||
sys.path.insert(0, POSSIBLE_TOPDIR)
|
||||
|
||||
gettext.install('nova', unicode=1)
|
||||
|
||||
|
||||
from nova import context
|
||||
from nova import db
|
||||
from nova import exception
|
||||
from nova import flags
|
||||
from nova import log as logging
|
||||
from nova import utils
|
||||
|
||||
from nova.notifier import api as notifier_api
|
||||
|
||||
FLAGS = flags.FLAGS
|
||||
flags.DEFINE_string('instance_usage_audit_period', '1m',
|
||||
'time period to generate instance usages for.')
|
||||
|
||||
|
||||
def time_period(period):
|
||||
today = datetime.date.today()
|
||||
unit = period[-1]
|
||||
if unit not in 'mdy':
|
||||
raise ValueError('Time period must be m, d, or y')
|
||||
n = int(period[:-1])
|
||||
if unit == 'm':
|
||||
year = today.year - (n // 12)
|
||||
n = n % 12
|
||||
if n >= today.month:
|
||||
year -= 1
|
||||
month = 12 + (today.month - n)
|
||||
else:
|
||||
month = today.month - n
|
||||
begin = datetime.datetime(day=1, month=month, year=year)
|
||||
end = datetime.datetime(day=1, month=today.month, year=today.year)
|
||||
|
||||
elif unit == 'y':
|
||||
begin = datetime.datetime(day=1, month=1, year=today.year - n)
|
||||
end = datetime.datetime(day=1, month=1, year=today.year)
|
||||
|
||||
elif unit == 'd':
|
||||
b = today - datetime.timedelta(days=n)
|
||||
begin = datetime.datetime(day=b.day, month=b.month, year=b.year)
|
||||
end = datetime.datetime(day=today.day,
|
||||
month=today.month,
|
||||
year=today.year)
|
||||
|
||||
return (begin, end)
|
||||
|
||||
if __name__ == '__main__':
|
||||
utils.default_flagfile()
|
||||
flags.FLAGS(sys.argv)
|
||||
logging.setup()
|
||||
begin, end = time_period(FLAGS.instance_usage_audit_period)
|
||||
print "Creating usages for %s until %s" % (str(begin), str(end))
|
||||
instances = db.instance_get_active_by_window(context.get_admin_context(),
|
||||
begin,
|
||||
end)
|
||||
print "%s instances" % len(instances)
|
||||
for instance_ref in instances:
|
||||
usage_info = utils.usage_from_instance(instance_ref,
|
||||
audit_period_begining=str(begin),
|
||||
audit_period_ending=str(end))
|
||||
notifier_api.notify('compute.%s' % FLAGS.host,
|
||||
'compute.instance.exists',
|
||||
notifier_api.INFO,
|
||||
usage_info)
|
||||
@@ -137,8 +137,9 @@ if __name__ == '__main__':
|
||||
utils.default_flagfile()
|
||||
FLAGS(sys.argv)
|
||||
logging.setup()
|
||||
server = wsgi.Server()
|
||||
acp_port = FLAGS.ajax_console_proxy_port
|
||||
acp = AjaxConsoleProxy()
|
||||
acp.register_listeners()
|
||||
server.start(acp, FLAGS.ajax_console_proxy_port, host='0.0.0.0')
|
||||
server = wsgi.Server("AJAX Console Proxy", acp, port=acp_port)
|
||||
server.start()
|
||||
server.wait()
|
||||
|
||||
+26
-31
@@ -1,5 +1,4 @@
|
||||
#!/usr/bin/env python
|
||||
# pylint: disable=C0103
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2010 United States Government as represented by the
|
||||
@@ -18,44 +17,40 @@
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
"""Starter script for Nova API."""
|
||||
"""Starter script for Nova API.
|
||||
|
||||
Starts both the EC2 and OpenStack APIs in separate processes.
|
||||
|
||||
"""
|
||||
|
||||
import gettext
|
||||
import os
|
||||
import sys
|
||||
|
||||
# If ../nova/__init__.py exists, add ../ to Python search path, so that
|
||||
# it will override what happens to be installed in /usr/(local/)lib/python...
|
||||
possible_topdir = os.path.normpath(os.path.join(os.path.abspath(sys.argv[0]),
|
||||
os.pardir,
|
||||
os.pardir))
|
||||
if os.path.exists(os.path.join(possible_topdir, 'nova', '__init__.py')):
|
||||
possible_topdir = os.path.normpath(os.path.join(os.path.abspath(
|
||||
sys.argv[0]), os.pardir, os.pardir))
|
||||
if os.path.exists(os.path.join(possible_topdir, "nova", "__init__.py")):
|
||||
sys.path.insert(0, possible_topdir)
|
||||
|
||||
gettext.install('nova', unicode=1)
|
||||
|
||||
from nova import flags
|
||||
from nova import log as logging
|
||||
from nova import service
|
||||
from nova import utils
|
||||
from nova import version
|
||||
from nova import wsgi
|
||||
import nova.service
|
||||
import nova.utils
|
||||
|
||||
|
||||
LOG = logging.getLogger('nova.api')
|
||||
def main():
|
||||
"""Launch EC2 and OSAPI services."""
|
||||
nova.utils.Bootstrapper.bootstrap_binary(sys.argv)
|
||||
|
||||
ec2 = nova.service.WSGIService("ec2")
|
||||
osapi = nova.service.WSGIService("osapi")
|
||||
|
||||
launcher = nova.service.Launcher()
|
||||
launcher.launch_service(ec2)
|
||||
launcher.launch_service(osapi)
|
||||
|
||||
try:
|
||||
launcher.wait()
|
||||
except KeyboardInterrupt:
|
||||
launcher.stop()
|
||||
|
||||
FLAGS = flags.FLAGS
|
||||
|
||||
if __name__ == '__main__':
|
||||
utils.default_flagfile()
|
||||
FLAGS(sys.argv)
|
||||
logging.setup()
|
||||
LOG.audit(_("Starting nova-api node (version %s)"),
|
||||
version.version_string_with_vcs())
|
||||
LOG.debug(_("Full set of FLAGS:"))
|
||||
for flag in FLAGS:
|
||||
flag_get = FLAGS.get(flag, None)
|
||||
LOG.debug("%(flag)s : %(flag_get)s" % locals())
|
||||
|
||||
service = service.serve_wsgi(service.ApiService)
|
||||
service.wait()
|
||||
sys.exit(main())
|
||||
|
||||
+2
-6
@@ -59,14 +59,12 @@ def add_lease(mac, ip_address, _hostname, _interface):
|
||||
LOG.debug(_("leasing ip"))
|
||||
network_manager = utils.import_object(FLAGS.network_manager)
|
||||
network_manager.lease_fixed_ip(context.get_admin_context(),
|
||||
mac,
|
||||
ip_address)
|
||||
else:
|
||||
rpc.cast(context.get_admin_context(),
|
||||
"%s.%s" % (FLAGS.network_topic, FLAGS.host),
|
||||
{"method": "lease_fixed_ip",
|
||||
"args": {"mac": mac,
|
||||
"address": ip_address}})
|
||||
"args": {"address": ip_address}})
|
||||
|
||||
|
||||
def old_lease(mac, ip_address, hostname, interface):
|
||||
@@ -81,14 +79,12 @@ def del_lease(mac, ip_address, _hostname, _interface):
|
||||
LOG.debug(_("releasing ip"))
|
||||
network_manager = utils.import_object(FLAGS.network_manager)
|
||||
network_manager.release_fixed_ip(context.get_admin_context(),
|
||||
mac,
|
||||
ip_address)
|
||||
else:
|
||||
rpc.cast(context.get_admin_context(),
|
||||
"%s.%s" % (FLAGS.network_topic, FLAGS.host),
|
||||
{"method": "release_fixed_ip",
|
||||
"args": {"mac": mac,
|
||||
"address": ip_address}})
|
||||
"args": {"address": ip_address}})
|
||||
|
||||
|
||||
def init_leases(interface):
|
||||
|
||||
+5
-2
@@ -93,6 +93,9 @@ if __name__ == '__main__':
|
||||
with_req = direct.PostParamsMiddleware(with_json)
|
||||
with_auth = direct.DelegatedAuthMiddleware(with_req)
|
||||
|
||||
server = wsgi.Server()
|
||||
server.start(with_auth, FLAGS.direct_port, host=FLAGS.direct_host)
|
||||
server = wsgi.Server("Direct API",
|
||||
with_auth,
|
||||
host=FLAGS.direct_host,
|
||||
port=FLAGS.direct_port)
|
||||
server.start()
|
||||
server.wait()
|
||||
|
||||
+55
-28
@@ -172,17 +172,23 @@ class VpnCommands(object):
|
||||
def change(self, project_id, ip, port):
|
||||
"""Change the ip and port for a vpn.
|
||||
|
||||
this will update all networks associated with a project
|
||||
not sure if that's the desired behavior or not, patches accepted
|
||||
|
||||
args: project, ip, port"""
|
||||
# TODO(tr3buchet): perhaps this shouldn't update all networks
|
||||
# associated with a project in the future
|
||||
project = self.manager.get_project(project_id)
|
||||
if not project:
|
||||
print 'No project %s' % (project_id)
|
||||
return
|
||||
admin = context.get_admin_context()
|
||||
network_ref = db.project_get_network(admin, project_id)
|
||||
db.network_update(admin,
|
||||
network_ref['id'],
|
||||
{'vpn_public_address': ip,
|
||||
'vpn_public_port': int(port)})
|
||||
admin_context = context.get_admin_context()
|
||||
networks = db.project_get_networks(admin_context, project_id)
|
||||
for network in networks:
|
||||
db.network_update(admin_context,
|
||||
network['id'],
|
||||
{'vpn_public_address': ip,
|
||||
'vpn_public_port': int(port)})
|
||||
|
||||
|
||||
class ShellCommands(object):
|
||||
@@ -446,12 +452,13 @@ class ProjectCommands(object):
|
||||
def scrub(self, project_id):
|
||||
"""Deletes data associated with project
|
||||
arguments: project_id"""
|
||||
ctxt = context.get_admin_context()
|
||||
network_ref = db.project_get_network(ctxt, project_id)
|
||||
db.network_disassociate(ctxt, network_ref['id'])
|
||||
groups = db.security_group_get_by_project(ctxt, project_id)
|
||||
admin_context = context.get_admin_context()
|
||||
networks = db.project_get_networks(admin_context, project_id)
|
||||
for network in networks:
|
||||
db.network_disassociate(admin_context, network['id'])
|
||||
groups = db.security_group_get_by_project(admin_context, project_id)
|
||||
for group in groups:
|
||||
db.security_group_destroy(ctxt, group['id'])
|
||||
db.security_group_destroy(admin_context, group['id'])
|
||||
|
||||
def zipfile(self, project_id, user_id, filename='nova.zip'):
|
||||
"""Exports credentials for project to a zip file
|
||||
@@ -505,7 +512,7 @@ class FixedIpCommands(object):
|
||||
instance = fixed_ip['instance']
|
||||
hostname = instance['hostname']
|
||||
host = instance['host']
|
||||
mac_address = instance['mac_address']
|
||||
mac_address = fixed_ip['mac_address']['address']
|
||||
print "%-18s\t%-15s\t%-17s\t%-15s\t%s" % (
|
||||
fixed_ip['network']['cidr'],
|
||||
fixed_ip['address'],
|
||||
@@ -515,13 +522,12 @@ class FixedIpCommands(object):
|
||||
class FloatingIpCommands(object):
|
||||
"""Class for managing floating ip."""
|
||||
|
||||
def create(self, host, range):
|
||||
"""Creates floating ips for host by range
|
||||
arguments: host ip_range"""
|
||||
def create(self, range):
|
||||
"""Creates floating ips for zone by range
|
||||
arguments: ip_range"""
|
||||
for address in netaddr.IPNetwork(range):
|
||||
db.floating_ip_create(context.get_admin_context(),
|
||||
{'address': str(address),
|
||||
'host': host})
|
||||
{'address': str(address)})
|
||||
|
||||
def delete(self, ip_range):
|
||||
"""Deletes floating ips by range
|
||||
@@ -532,7 +538,8 @@ class FloatingIpCommands(object):
|
||||
|
||||
def list(self, host=None):
|
||||
"""Lists all floating ips (optionally by host)
|
||||
arguments: [host]"""
|
||||
arguments: [host]
|
||||
Note: if host is given, only active floating IPs are returned"""
|
||||
ctxt = context.get_admin_context()
|
||||
if host is None:
|
||||
floating_ips = db.floating_ip_get_all(ctxt)
|
||||
@@ -550,10 +557,23 @@ class FloatingIpCommands(object):
|
||||
class NetworkCommands(object):
|
||||
"""Class for managing networks."""
|
||||
|
||||
def create(self, fixed_range=None, num_networks=None, network_size=None,
|
||||
vlan_start=None, vpn_start=None, fixed_range_v6=None,
|
||||
gateway_v6=None, label='public'):
|
||||
"""Creates fixed ips for host by range"""
|
||||
def create(self, label=None, fixed_range=None, num_networks=None,
|
||||
network_size=None, vlan_start=None,
|
||||
vpn_start=None, fixed_range_v6=None, gateway_v6=None,
|
||||
flat_network_bridge=None, bridge_interface=None):
|
||||
"""Creates fixed ips for host by range
|
||||
arguments: label, fixed_range, [num_networks=FLAG],
|
||||
[network_size=FLAG], [vlan_start=FLAG],
|
||||
[vpn_start=FLAG], [fixed_range_v6=FLAG], [gateway_v6=FLAG],
|
||||
[flat_network_bridge=FLAG], [bridge_interface=FLAG]
|
||||
If you wish to use a later argument fill in the gaps with 0s
|
||||
Ex: network create private 10.0.0.0/8 1 15 0 0 0 0 xenbr1 eth1
|
||||
network create private 10.0.0.0/8 1 15
|
||||
"""
|
||||
if not label:
|
||||
msg = _('a label (ex: public) is required to create networks.')
|
||||
print msg
|
||||
raise TypeError(msg)
|
||||
if not fixed_range:
|
||||
msg = _('Fixed range in the form of 10.0.0.0/8 is '
|
||||
'required to create networks.')
|
||||
@@ -569,11 +589,17 @@ class NetworkCommands(object):
|
||||
vpn_start = FLAGS.vpn_start
|
||||
if not fixed_range_v6:
|
||||
fixed_range_v6 = FLAGS.fixed_range_v6
|
||||
if not flat_network_bridge:
|
||||
flat_network_bridge = FLAGS.flat_network_bridge
|
||||
if not bridge_interface:
|
||||
bridge_interface = FLAGS.flat_interface or FLAGS.vlan_interface
|
||||
if not gateway_v6:
|
||||
gateway_v6 = FLAGS.gateway_v6
|
||||
net_manager = utils.import_object(FLAGS.network_manager)
|
||||
|
||||
try:
|
||||
net_manager.create_networks(context.get_admin_context(),
|
||||
label=label,
|
||||
cidr=fixed_range,
|
||||
num_networks=int(num_networks),
|
||||
network_size=int(network_size),
|
||||
@@ -581,7 +607,8 @@ class NetworkCommands(object):
|
||||
vpn_start=int(vpn_start),
|
||||
cidr_v6=fixed_range_v6,
|
||||
gateway_v6=gateway_v6,
|
||||
label=label)
|
||||
bridge=flat_network_bridge,
|
||||
bridge_interface=bridge_interface)
|
||||
except ValueError, e:
|
||||
print e
|
||||
raise e
|
||||
@@ -617,7 +644,7 @@ class VmCommands(object):
|
||||
:param host: show all instance on specified host.
|
||||
:param instance: show specificed instance.
|
||||
"""
|
||||
print "%-10s %-15s %-10s %-10s %-19s %-12s %-12s %-12s" \
|
||||
print "%-10s %-15s %-10s %-10s %-26s %-9s %-9s %-9s" \
|
||||
" %-10s %-10s %-10s %-5s" % (
|
||||
_('instance'),
|
||||
_('node'),
|
||||
@@ -639,14 +666,14 @@ class VmCommands(object):
|
||||
context.get_admin_context(), host)
|
||||
|
||||
for instance in instances:
|
||||
print "%-10s %-15s %-10s %-10s %-19s %-12s %-12s %-12s" \
|
||||
print "%-10s %-15s %-10s %-10s %-26s %-9s %-9s %-9s" \
|
||||
" %-10s %-10s %-10s %-5d" % (
|
||||
instance['hostname'],
|
||||
instance['host'],
|
||||
instance['instance_type'],
|
||||
instance['instance_type'].name,
|
||||
instance['state_description'],
|
||||
instance['launched_at'],
|
||||
instance['image_id'],
|
||||
instance['image_ref'],
|
||||
instance['kernel_id'],
|
||||
instance['ramdisk_id'],
|
||||
instance['project_id'],
|
||||
@@ -878,7 +905,7 @@ class InstanceTypeCommands(object):
|
||||
try:
|
||||
instance_types.create(name, memory, vcpus, local_gb,
|
||||
flavorid, swap, rxtx_quota, rxtx_cap)
|
||||
except exception.InvalidInput:
|
||||
except exception.InvalidInput, e:
|
||||
print "Must supply valid parameters to create instance_type"
|
||||
print e
|
||||
sys.exit(1)
|
||||
|
||||
@@ -50,6 +50,9 @@ if __name__ == '__main__':
|
||||
FLAGS(sys.argv)
|
||||
logging.setup()
|
||||
router = s3server.S3Application(FLAGS.buckets_path)
|
||||
server = wsgi.Server()
|
||||
server.start(router, FLAGS.s3_port, host=FLAGS.s3_host)
|
||||
server = wsgi.Server("S3 Objectstore",
|
||||
router,
|
||||
port=FLAGS.s3_port,
|
||||
host=FLAGS.s3_host)
|
||||
server.start()
|
||||
server.wait()
|
||||
|
||||
+5
-2
@@ -96,6 +96,9 @@ if __name__ == "__main__":
|
||||
|
||||
service.serve()
|
||||
|
||||
server = wsgi.Server()
|
||||
server.start(with_auth, FLAGS.vncproxy_port, host=FLAGS.vncproxy_host)
|
||||
server = wsgi.Server("VNC Proxy",
|
||||
with_auth,
|
||||
host=FLAGS.vncproxy_host,
|
||||
port=FLAGS.vncproxy_port)
|
||||
server.start()
|
||||
server.wait()
|
||||
|
||||
Vendored
-4
@@ -1,4 +0,0 @@
|
||||
# Sphinx build info version 1
|
||||
# This file hashes the configuration used when building these files. When it is not found, a full rebuild will be done.
|
||||
config: 2a2fe6198f4be4a4d6f289b09d16d74a
|
||||
tags: fbb0d17656682115ca4d033fb2f83ba1
|
||||
@@ -0,0 +1,39 @@
|
||||
MultiNic
|
||||
========
|
||||
|
||||
What is it
|
||||
----------
|
||||
|
||||
Multinic allows an instance to have more than one vif connected to it. Each vif is representative of a separate network with its own IP block.
|
||||
|
||||
Managers
|
||||
--------
|
||||
|
||||
Each of the network managers are designed to run independently of the compute manager. They expose a common API for the compute manager to call to determine and configure the network(s) for an instance. Direct calls to either the network api or especially the DB should be avoided by the virt layers.
|
||||
|
||||
On startup a manager looks in the networks table for networks it is assigned and configures itself to support that network. Using the periodic task, they will claim new networks that have no host set. Only one network per network-host will be claimed at a time. This allows for psuedo-loadbalancing if there are multiple network-hosts running.
|
||||
|
||||
Flat Manager
|
||||
------------
|
||||
|
||||
.. image:: /images/multinic_flat.png
|
||||
|
||||
The Flat manager is most similar to a traditional switched network environment. It assumes that the IP routing, DNS, DHCP (possibly) and bridge creation is handled by something else. That is it makes no attempt to configure any of this. It does keep track of a range of IPs for the instances that are connected to the network to be allocated.
|
||||
|
||||
Each instance will get a fixed IP from each network's pool. The guest operating system may be configured to gather this information through an agent or by the hypervisor injecting the files, or it may ignore it completely and come up with only a layer 2 connection.
|
||||
|
||||
Flat manager requires at least one nova-network process running that will listen to the API queue and respond to queries. It does not need to sit on any of the networks but it does keep track of the IPs it hands out to instances.
|
||||
|
||||
FlatDHCP Manager
|
||||
----------------
|
||||
|
||||
.. image:: /images/multinic_dhcp.png
|
||||
|
||||
FlatDHCP manager builds on the the Flat manager adding dnsmask (DNS and DHCP) and radvd (Router Advertisement) servers on the bridge for that network. The services run on the host that is assigned to that nework. The FlatDHCP manager will create its bridge as specified when the network was created on the network-host when the network host starts up or when a new network gets allocated to that host. Compute nodes will also create the bridges as necessary and connect instance VIFs to them.
|
||||
|
||||
VLAN Manager
|
||||
------------
|
||||
|
||||
.. image:: /images/multinic_vlan.png
|
||||
|
||||
The VLAN manager sets up forwarding to/from a cloudpipe instance in addition to providing dnsmask (DNS and DHCP) and radvd (Router Advertisement) services for each network. The manager will create its bridge as specified when the network was created on the network-host when the network host starts up or when a new network gets allocated to that host. Compute nodes will also create the bridges as necessary and conenct instance VIFs to them.
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
After Width: | Height: | Size: 53 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 40 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 57 KiB |
@@ -30,3 +30,8 @@
|
||||
.. moduleauthor:: Manish Singh <yosh@gimp.org>
|
||||
.. moduleauthor:: Andy Smith <andy@anarkystic.com>
|
||||
"""
|
||||
|
||||
import gettext
|
||||
|
||||
|
||||
gettext.install("nova", unicode=1)
|
||||
|
||||
+81
-38
@@ -86,8 +86,7 @@ class CloudController(object):
|
||||
self.volume_api = volume.API()
|
||||
self.compute_api = compute.API(
|
||||
network_api=self.network_api,
|
||||
volume_api=self.volume_api,
|
||||
hostname_factory=ec2utils.id_to_ec2_id)
|
||||
volume_api=self.volume_api)
|
||||
self.setup()
|
||||
|
||||
def __str__(self):
|
||||
@@ -121,8 +120,8 @@ class CloudController(object):
|
||||
result = {}
|
||||
for instance in self.compute_api.get_all(context,
|
||||
project_id=project_id):
|
||||
if instance['fixed_ip']:
|
||||
line = '%s slots=%d' % (instance['fixed_ip']['address'],
|
||||
if instance['fixed_ips']:
|
||||
line = '%s slots=%d' % (instance['fixed_ips'][0]['address'],
|
||||
instance['vcpus'])
|
||||
key = str(instance['key_name'])
|
||||
if key in result:
|
||||
@@ -152,7 +151,7 @@ class CloudController(object):
|
||||
|
||||
# This ensures that all attributes of the instance
|
||||
# are populated.
|
||||
instance_ref = db.instance_get(ctxt, instance_ref['id'])
|
||||
instance_ref = db.instance_get(ctxt, instance_ref[0]['id'])
|
||||
|
||||
mpi = self._get_mpi_data(ctxt, instance_ref['project_id'])
|
||||
if instance_ref['key_name']:
|
||||
@@ -391,15 +390,21 @@ class CloudController(object):
|
||||
pass
|
||||
return True
|
||||
|
||||
def describe_security_groups(self, context, group_name=None, **kwargs):
|
||||
def describe_security_groups(self, context, group_name=None, group_id=None,
|
||||
**kwargs):
|
||||
self.compute_api.ensure_default_security_group(context)
|
||||
if group_name:
|
||||
if group_name or group_id:
|
||||
groups = []
|
||||
for name in group_name:
|
||||
group = db.security_group_get_by_name(context,
|
||||
context.project_id,
|
||||
name)
|
||||
groups.append(group)
|
||||
if group_name:
|
||||
for name in group_name:
|
||||
group = db.security_group_get_by_name(context,
|
||||
context.project_id,
|
||||
name)
|
||||
groups.append(group)
|
||||
if group_id:
|
||||
for gid in group_id:
|
||||
group = db.security_group_get(context, gid)
|
||||
groups.append(group)
|
||||
elif context.is_admin:
|
||||
groups = db.security_group_get_all(context)
|
||||
else:
|
||||
@@ -497,13 +502,26 @@ class CloudController(object):
|
||||
return True
|
||||
return False
|
||||
|
||||
def revoke_security_group_ingress(self, context, group_name, **kwargs):
|
||||
LOG.audit(_("Revoke security group ingress %s"), group_name,
|
||||
context=context)
|
||||
def revoke_security_group_ingress(self, context, group_name=None,
|
||||
group_id=None, **kwargs):
|
||||
if not group_name and not group_id:
|
||||
err = "Not enough parameters, need group_name or group_id"
|
||||
raise exception.ApiError(_(err))
|
||||
self.compute_api.ensure_default_security_group(context)
|
||||
security_group = db.security_group_get_by_name(context,
|
||||
context.project_id,
|
||||
group_name)
|
||||
notfound = exception.SecurityGroupNotFound
|
||||
if group_name:
|
||||
security_group = db.security_group_get_by_name(context,
|
||||
context.project_id,
|
||||
group_name)
|
||||
if not security_group:
|
||||
raise notfound(security_group_id=group_name)
|
||||
if group_id:
|
||||
security_group = db.security_group_get(context, group_id)
|
||||
if not security_group:
|
||||
raise notfound(security_group_id=group_id)
|
||||
|
||||
msg = "Revoke security group ingress %s"
|
||||
LOG.audit(_(msg), security_group['name'], context=context)
|
||||
|
||||
criteria = self._revoke_rule_args_to_dict(context, **kwargs)
|
||||
if criteria is None:
|
||||
@@ -518,7 +536,7 @@ class CloudController(object):
|
||||
if match:
|
||||
db.security_group_rule_destroy(context, rule['id'])
|
||||
self.compute_api.trigger_security_group_rules_refresh(context,
|
||||
security_group['id'])
|
||||
security_group_id=security_group['id'])
|
||||
return True
|
||||
raise exception.ApiError(_("No rule for the specified parameters."))
|
||||
|
||||
@@ -526,14 +544,26 @@ class CloudController(object):
|
||||
# Unfortunately, it seems Boto is using an old API
|
||||
# for these operations, so support for newer API versions
|
||||
# is sketchy.
|
||||
def authorize_security_group_ingress(self, context, group_name, **kwargs):
|
||||
LOG.audit(_("Authorize security group ingress %s"), group_name,
|
||||
context=context)
|
||||
def authorize_security_group_ingress(self, context, group_name=None,
|
||||
group_id=None, **kwargs):
|
||||
if not group_name and not group_id:
|
||||
err = "Not enough parameters, need group_name or group_id"
|
||||
raise exception.ApiError(_(err))
|
||||
self.compute_api.ensure_default_security_group(context)
|
||||
security_group = db.security_group_get_by_name(context,
|
||||
context.project_id,
|
||||
group_name)
|
||||
notfound = exception.SecurityGroupNotFound
|
||||
if group_name:
|
||||
security_group = db.security_group_get_by_name(context,
|
||||
context.project_id,
|
||||
group_name)
|
||||
if not security_group:
|
||||
raise notfound(security_group_id=group_name)
|
||||
if group_id:
|
||||
security_group = db.security_group_get(context, group_id)
|
||||
if not security_group:
|
||||
raise notfound(security_group_id=group_id)
|
||||
|
||||
msg = "Authorize security group ingress %s"
|
||||
LOG.audit(_(msg), security_group['name'], context=context)
|
||||
values = self._revoke_rule_args_to_dict(context, **kwargs)
|
||||
if values is None:
|
||||
raise exception.ApiError(_("Not enough parameters to build a "
|
||||
@@ -547,7 +577,7 @@ class CloudController(object):
|
||||
security_group_rule = db.security_group_rule_create(context, values)
|
||||
|
||||
self.compute_api.trigger_security_group_rules_refresh(context,
|
||||
security_group['id'])
|
||||
security_group_id=security_group['id'])
|
||||
|
||||
return True
|
||||
|
||||
@@ -583,11 +613,23 @@ class CloudController(object):
|
||||
return {'securityGroupSet': [self._format_security_group(context,
|
||||
group_ref)]}
|
||||
|
||||
def delete_security_group(self, context, group_name, **kwargs):
|
||||
def delete_security_group(self, context, group_name=None, group_id=None,
|
||||
**kwargs):
|
||||
if not group_name and not group_id:
|
||||
err = "Not enough parameters, need group_name or group_id"
|
||||
raise exception.ApiError(_(err))
|
||||
notfound = exception.SecurityGroupNotFound
|
||||
if group_name:
|
||||
security_group = db.security_group_get_by_name(context,
|
||||
context.project_id,
|
||||
group_name)
|
||||
if not security_group:
|
||||
raise notfound(security_group_id=group_name)
|
||||
elif group_id:
|
||||
security_group = db.security_group_get(context, group_id)
|
||||
if not security_group:
|
||||
raise notfound(security_group_id=group_id)
|
||||
LOG.audit(_("Delete security group %s"), group_name, context=context)
|
||||
security_group = db.security_group_get_by_name(context,
|
||||
context.project_id,
|
||||
group_name)
|
||||
db.security_group_destroy(context, security_group.id)
|
||||
return True
|
||||
|
||||
@@ -793,15 +835,15 @@ class CloudController(object):
|
||||
'name': instance['state_description']}
|
||||
fixed_addr = None
|
||||
floating_addr = None
|
||||
if instance['fixed_ip']:
|
||||
fixed_addr = instance['fixed_ip']['address']
|
||||
if instance['fixed_ip']['floating_ips']:
|
||||
fixed = instance['fixed_ip']
|
||||
if instance['fixed_ips']:
|
||||
fixed = instance['fixed_ips'][0]
|
||||
fixed_addr = fixed['address']
|
||||
if fixed['floating_ips']:
|
||||
floating_addr = fixed['floating_ips'][0]['address']
|
||||
if instance['fixed_ip']['network'] and 'use_v6' in kwargs:
|
||||
if fixed['network'] and 'use_v6' in kwargs:
|
||||
i['dnsNameV6'] = ipv6.to_global(
|
||||
instance['fixed_ip']['network']['cidr_v6'],
|
||||
instance['mac_address'],
|
||||
fixed['network']['cidr_v6'],
|
||||
fixed['virtual_interface']['address'],
|
||||
instance['project_id'])
|
||||
|
||||
i['privateDnsName'] = fixed_addr
|
||||
@@ -877,7 +919,8 @@ class CloudController(object):
|
||||
public_ip = self.network_api.allocate_floating_ip(context)
|
||||
return {'publicIp': public_ip}
|
||||
except rpc.RemoteError as ex:
|
||||
if ex.exc_type == 'NoMoreAddresses':
|
||||
# NOTE(tr3buchet) - why does this block exist?
|
||||
if ex.exc_type == 'NoMoreFloatingIps':
|
||||
raise exception.NoMoreFloatingIps()
|
||||
else:
|
||||
raise
|
||||
|
||||
@@ -45,23 +45,20 @@ def get_pagination_params(request):
|
||||
exc.HTTPBadRequest() exceptions to be raised.
|
||||
|
||||
"""
|
||||
try:
|
||||
marker = int(request.GET.get('marker', 0))
|
||||
except ValueError:
|
||||
raise webob.exc.HTTPBadRequest(_('marker param must be an integer'))
|
||||
params = {}
|
||||
for param in ['marker', 'limit']:
|
||||
if not param in request.GET:
|
||||
continue
|
||||
try:
|
||||
params[param] = int(request.GET[param])
|
||||
except ValueError:
|
||||
msg = _('%s param must be an integer') % param
|
||||
raise webob.exc.HTTPBadRequest(msg)
|
||||
if params[param] < 0:
|
||||
msg = _('%s param must be positive') % param
|
||||
raise webob.exc.HTTPBadRequest(msg)
|
||||
|
||||
try:
|
||||
limit = int(request.GET.get('limit', 0))
|
||||
except ValueError:
|
||||
raise webob.exc.HTTPBadRequest(_('limit param must be an integer'))
|
||||
|
||||
if limit < 0:
|
||||
raise webob.exc.HTTPBadRequest(_('limit param must be positive'))
|
||||
|
||||
if marker < 0:
|
||||
raise webob.exc.HTTPBadRequest(_('marker param must be positive'))
|
||||
|
||||
return(marker, limit)
|
||||
return params
|
||||
|
||||
|
||||
def limited(items, request, max_limit=FLAGS.osapi_max_limit):
|
||||
@@ -100,10 +97,10 @@ def limited(items, request, max_limit=FLAGS.osapi_max_limit):
|
||||
|
||||
def limited_by_marker(items, request, max_limit=FLAGS.osapi_max_limit):
|
||||
"""Return a slice of items according to the requested marker and limit."""
|
||||
(marker, limit) = get_pagination_params(request)
|
||||
params = get_pagination_params(request)
|
||||
|
||||
if limit == 0:
|
||||
limit = max_limit
|
||||
limit = params.get('limit', max_limit)
|
||||
marker = params.get('marker')
|
||||
|
||||
limit = min(max_limit, limit)
|
||||
start_index = 0
|
||||
|
||||
@@ -0,0 +1,126 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2011 University of Southern California
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
""" The instance type extra specs extension"""
|
||||
|
||||
from webob import exc
|
||||
|
||||
from nova import db
|
||||
from nova import quota
|
||||
from nova.api.openstack import extensions
|
||||
from nova.api.openstack import faults
|
||||
from nova.api.openstack import wsgi
|
||||
|
||||
|
||||
class FlavorExtraSpecsController(object):
|
||||
""" The flavor extra specs API controller for the Openstack API """
|
||||
|
||||
def _get_extra_specs(self, context, flavor_id):
|
||||
extra_specs = db.api.instance_type_extra_specs_get(context, flavor_id)
|
||||
specs_dict = {}
|
||||
for key, value in extra_specs.iteritems():
|
||||
specs_dict[key] = value
|
||||
return dict(extra_specs=specs_dict)
|
||||
|
||||
def _check_body(self, body):
|
||||
if body == None or body == "":
|
||||
expl = _('No Request Body')
|
||||
raise exc.HTTPBadRequest(explanation=expl)
|
||||
|
||||
def index(self, req, flavor_id):
|
||||
""" Returns the list of extra specs for a givenflavor """
|
||||
context = req.environ['nova.context']
|
||||
return self._get_extra_specs(context, flavor_id)
|
||||
|
||||
def create(self, req, flavor_id, body):
|
||||
self._check_body(body)
|
||||
context = req.environ['nova.context']
|
||||
specs = body.get('extra_specs')
|
||||
try:
|
||||
db.api.instance_type_extra_specs_update_or_create(context,
|
||||
flavor_id,
|
||||
specs)
|
||||
except quota.QuotaError as error:
|
||||
self._handle_quota_error(error)
|
||||
return body
|
||||
|
||||
def update(self, req, flavor_id, id, body):
|
||||
self._check_body(body)
|
||||
context = req.environ['nova.context']
|
||||
if not id in body:
|
||||
expl = _('Request body and URI mismatch')
|
||||
raise exc.HTTPBadRequest(explanation=expl)
|
||||
if len(body) > 1:
|
||||
expl = _('Request body contains too many items')
|
||||
raise exc.HTTPBadRequest(explanation=expl)
|
||||
try:
|
||||
db.api.instance_type_extra_specs_update_or_create(context,
|
||||
flavor_id,
|
||||
body)
|
||||
except quota.QuotaError as error:
|
||||
self._handle_quota_error(error)
|
||||
|
||||
return body
|
||||
|
||||
def show(self, req, flavor_id, id):
|
||||
""" Return a single extra spec item """
|
||||
context = req.environ['nova.context']
|
||||
specs = self._get_extra_specs(context, flavor_id)
|
||||
if id in specs['extra_specs']:
|
||||
return {id: specs['extra_specs'][id]}
|
||||
else:
|
||||
return faults.Fault(exc.HTTPNotFound())
|
||||
|
||||
def delete(self, req, flavor_id, id):
|
||||
""" Deletes an existing extra spec """
|
||||
context = req.environ['nova.context']
|
||||
db.api.instance_type_extra_specs_delete(context, flavor_id, id)
|
||||
|
||||
def _handle_quota_error(self, error):
|
||||
"""Reraise quota errors as api-specific http exceptions."""
|
||||
if error.code == "MetadataLimitExceeded":
|
||||
raise exc.HTTPBadRequest(explanation=error.message)
|
||||
raise error
|
||||
|
||||
|
||||
class Flavorextraspecs(extensions.ExtensionDescriptor):
|
||||
|
||||
def get_name(self):
|
||||
return "FlavorExtraSpecs"
|
||||
|
||||
def get_alias(self):
|
||||
return "os-flavor-extra-specs"
|
||||
|
||||
def get_description(self):
|
||||
return "Instance type (flavor) extra specs"
|
||||
|
||||
def get_namespace(self):
|
||||
return \
|
||||
"http://docs.openstack.org/ext/flavor_extra_specs/api/v1.1"
|
||||
|
||||
def get_updated(self):
|
||||
return "2011-06-23T00:00:00+00:00"
|
||||
|
||||
def get_resources(self):
|
||||
resources = []
|
||||
res = extensions.ResourceExtension(
|
||||
'os-extra_specs',
|
||||
FlavorExtraSpecsController(),
|
||||
parent=dict(member_name='flavor', collection_name='flavors'))
|
||||
|
||||
resources.append(res)
|
||||
return resources
|
||||
@@ -0,0 +1,173 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2011 OpenStack LLC.
|
||||
# Copyright 2011 Grid Dynamics
|
||||
# Copyright 2011 Eldar Nugaev, Kirill Shileev, Ilya Alekseyev
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License
|
||||
from webob import exc
|
||||
|
||||
from nova import exception
|
||||
from nova import network
|
||||
from nova import rpc
|
||||
from nova.api.openstack import faults
|
||||
from nova.api.openstack import extensions
|
||||
|
||||
|
||||
def _translate_floating_ip_view(floating_ip):
|
||||
result = {'id': floating_ip['id'],
|
||||
'ip': floating_ip['address']}
|
||||
if 'fixed_ip' in floating_ip:
|
||||
result['fixed_ip'] = floating_ip['fixed_ip']['address']
|
||||
else:
|
||||
result['fixed_ip'] = None
|
||||
if 'instance' in floating_ip:
|
||||
result['instance_id'] = floating_ip['instance']['id']
|
||||
else:
|
||||
result['instance_id'] = None
|
||||
return {'floating_ip': result}
|
||||
|
||||
|
||||
def _translate_floating_ips_view(floating_ips):
|
||||
return {'floating_ips': [_translate_floating_ip_view(floating_ip)
|
||||
for floating_ip in floating_ips]}
|
||||
|
||||
|
||||
class FloatingIPController(object):
|
||||
"""The Floating IPs API controller for the OpenStack API."""
|
||||
|
||||
_serialization_metadata = {
|
||||
'application/xml': {
|
||||
"attributes": {
|
||||
"floating_ip": [
|
||||
"id",
|
||||
"ip",
|
||||
"instance_id",
|
||||
"fixed_ip",
|
||||
]}}}
|
||||
|
||||
def __init__(self):
|
||||
self.network_api = network.API()
|
||||
super(FloatingIPController, self).__init__()
|
||||
|
||||
def show(self, req, id):
|
||||
"""Return data about the given floating ip."""
|
||||
context = req.environ['nova.context']
|
||||
|
||||
try:
|
||||
floating_ip = self.network_api.get_floating_ip(context, id)
|
||||
except exception.NotFound:
|
||||
return faults.Fault(exc.HTTPNotFound())
|
||||
|
||||
return _translate_floating_ip_view(floating_ip)
|
||||
|
||||
def index(self, req):
|
||||
context = req.environ['nova.context']
|
||||
|
||||
floating_ips = self.network_api.list_floating_ips(context)
|
||||
|
||||
return _translate_floating_ips_view(floating_ips)
|
||||
|
||||
def create(self, req, body):
|
||||
context = req.environ['nova.context']
|
||||
|
||||
try:
|
||||
address = self.network_api.allocate_floating_ip(context)
|
||||
ip = self.network_api.get_floating_ip_by_ip(context, address)
|
||||
except rpc.RemoteError as ex:
|
||||
# NOTE(tr3buchet) - why does this block exist?
|
||||
if ex.exc_type == 'NoMoreFloatingIps':
|
||||
raise exception.NoMoreFloatingIps()
|
||||
else:
|
||||
raise
|
||||
|
||||
return {'allocated': {
|
||||
"id": ip['id'],
|
||||
"floating_ip": ip['address']}}
|
||||
|
||||
def delete(self, req, id):
|
||||
context = req.environ['nova.context']
|
||||
|
||||
ip = self.network_api.get_floating_ip(context, id)
|
||||
self.network_api.release_floating_ip(context, address=ip)
|
||||
|
||||
return {'released': {
|
||||
"id": ip['id'],
|
||||
"floating_ip": ip['address']}}
|
||||
|
||||
def associate(self, req, id, body):
|
||||
""" /floating_ips/{id}/associate fixed ip in body """
|
||||
context = req.environ['nova.context']
|
||||
floating_ip = self._get_ip_by_id(context, id)
|
||||
|
||||
fixed_ip = body['associate_address']['fixed_ip']
|
||||
|
||||
try:
|
||||
self.network_api.associate_floating_ip(context,
|
||||
floating_ip, fixed_ip)
|
||||
except rpc.RemoteError:
|
||||
raise
|
||||
|
||||
return {'associated':
|
||||
{
|
||||
"floating_ip_id": id,
|
||||
"floating_ip": floating_ip,
|
||||
"fixed_ip": fixed_ip}}
|
||||
|
||||
def disassociate(self, req, id, body):
|
||||
""" POST /floating_ips/{id}/disassociate """
|
||||
context = req.environ['nova.context']
|
||||
floating_ip = self.network_api.get_floating_ip(context, id)
|
||||
address = floating_ip['address']
|
||||
fixed_ip = floating_ip['fixed_ip']['address']
|
||||
|
||||
try:
|
||||
self.network_api.disassociate_floating_ip(context, address)
|
||||
except rpc.RemoteError:
|
||||
raise
|
||||
|
||||
return {'disassociated': {'floating_ip': address,
|
||||
'fixed_ip': fixed_ip}}
|
||||
|
||||
def _get_ip_by_id(self, context, value):
|
||||
"""Checks that value is id and then returns its address."""
|
||||
return self.network_api.get_floating_ip(context, value)['address']
|
||||
|
||||
|
||||
class Floating_ips(extensions.ExtensionDescriptor):
|
||||
def get_name(self):
|
||||
return "Floating_ips"
|
||||
|
||||
def get_alias(self):
|
||||
return "os-floating-ips"
|
||||
|
||||
def get_description(self):
|
||||
return "Floating IPs support"
|
||||
|
||||
def get_namespace(self):
|
||||
return "http://docs.openstack.org/ext/floating_ips/api/v1.1"
|
||||
|
||||
def get_updated(self):
|
||||
return "2011-06-16T00:00:00+00:00"
|
||||
|
||||
def get_resources(self):
|
||||
resources = []
|
||||
|
||||
res = extensions.ResourceExtension('os-floating-ips',
|
||||
FloatingIPController(),
|
||||
member_actions={
|
||||
'associate': 'POST',
|
||||
'disassociate': 'POST'})
|
||||
resources.append(res)
|
||||
|
||||
return resources
|
||||
@@ -114,6 +114,15 @@ class CreateInstanceHelper(object):
|
||||
name = name.strip()
|
||||
|
||||
reservation_id = body['server'].get('reservation_id')
|
||||
min_count = body['server'].get('min_count')
|
||||
max_count = body['server'].get('max_count')
|
||||
# min_count and max_count are optional. If they exist, they come
|
||||
# in as strings. We want to default 'min_count' to 1, and default
|
||||
# 'max_count' to be 'min_count'.
|
||||
min_count = int(min_count) if min_count else 1
|
||||
max_count = int(max_count) if max_count else min_count
|
||||
if min_count > max_count:
|
||||
min_count = max_count
|
||||
|
||||
try:
|
||||
inst_type = \
|
||||
@@ -137,7 +146,9 @@ class CreateInstanceHelper(object):
|
||||
injected_files=injected_files,
|
||||
admin_password=password,
|
||||
zone_blob=zone_blob,
|
||||
reservation_id=reservation_id))
|
||||
reservation_id=reservation_id,
|
||||
min_count=min_count,
|
||||
max_count=max_count))
|
||||
except quota.QuotaError as error:
|
||||
self._handle_quota_error(error)
|
||||
except exception.ImageNotFound as error:
|
||||
|
||||
@@ -112,18 +112,18 @@ class Controller(object):
|
||||
|
||||
|
||||
class ImageMetadataXMLSerializer(wsgi.XMLDictSerializer):
|
||||
def __init__(self):
|
||||
xmlns = wsgi.XMLNS_V11
|
||||
def __init__(self, xmlns=wsgi.XMLNS_V11):
|
||||
super(ImageMetadataXMLSerializer, self).__init__(xmlns=xmlns)
|
||||
|
||||
def _meta_item_to_xml(self, doc, key, value):
|
||||
node = doc.createElement('meta')
|
||||
node.setAttribute('key', key)
|
||||
text = doc.createTextNode(value)
|
||||
doc.appendChild(node)
|
||||
node.setAttribute('key', '%s' % key)
|
||||
text = doc.createTextNode('%s' % value)
|
||||
node.appendChild(text)
|
||||
return node
|
||||
|
||||
def _meta_list_to_xml(self, xml_doc, meta_items):
|
||||
def meta_list_to_xml(self, xml_doc, meta_items):
|
||||
container_node = xml_doc.createElement('metadata')
|
||||
for (key, value) in meta_items:
|
||||
item_node = self._meta_item_to_xml(xml_doc, key, value)
|
||||
@@ -133,9 +133,10 @@ class ImageMetadataXMLSerializer(wsgi.XMLDictSerializer):
|
||||
def _meta_list_to_xml_string(self, metadata_dict):
|
||||
xml_doc = minidom.Document()
|
||||
items = metadata_dict['metadata'].items()
|
||||
container_node = self._meta_list_to_xml(xml_doc, items)
|
||||
container_node = self.meta_list_to_xml(xml_doc, items)
|
||||
xml_doc.appendChild(container_node)
|
||||
self._add_xmlns(container_node)
|
||||
return container_node.toprettyxml(indent=' ')
|
||||
return xml_doc.toprettyxml(indent=' ', encoding='UTF-8')
|
||||
|
||||
def index(self, metadata_dict):
|
||||
return self._meta_list_to_xml_string(metadata_dict)
|
||||
@@ -147,8 +148,9 @@ class ImageMetadataXMLSerializer(wsgi.XMLDictSerializer):
|
||||
xml_doc = minidom.Document()
|
||||
item_key, item_value = meta_item_dict.items()[0]
|
||||
item_node = self._meta_item_to_xml(xml_doc, item_key, item_value)
|
||||
xml_doc.appendChild(item_node)
|
||||
self._add_xmlns(item_node)
|
||||
return item_node.toprettyxml(indent=' ')
|
||||
return xml_doc.toprettyxml(indent=' ', encoding='UTF-8')
|
||||
|
||||
def show(self, meta_item_dict):
|
||||
return self._meta_item_to_xml_string(meta_item_dict['meta'])
|
||||
|
||||
+117
-23
@@ -16,6 +16,7 @@
|
||||
import os.path
|
||||
|
||||
import webob.exc
|
||||
from xml.dom import minidom
|
||||
|
||||
from nova import compute
|
||||
from nova import exception
|
||||
@@ -25,6 +26,7 @@ from nova import log
|
||||
from nova import utils
|
||||
from nova.api.openstack import common
|
||||
from nova.api.openstack import faults
|
||||
from nova.api.openstack import image_metadata
|
||||
from nova.api.openstack.views import images as images_view
|
||||
from nova.api.openstack import wsgi
|
||||
|
||||
@@ -90,31 +92,67 @@ class Controller(object):
|
||||
return webob.exc.HTTPNoContent()
|
||||
|
||||
def create(self, req, body):
|
||||
"""Snapshot a server instance and save the image.
|
||||
"""Snapshot or backup a server instance and save the image.
|
||||
|
||||
Images now have an `image_type` associated with them, which can be
|
||||
'snapshot' or the backup type, like 'daily' or 'weekly'.
|
||||
|
||||
If the image_type is backup-like, then the rotation factor can be
|
||||
included and that will cause the oldest backups that exceed the
|
||||
rotation factor to be deleted.
|
||||
|
||||
:param req: `wsgi.Request` object
|
||||
"""
|
||||
def get_param(param):
|
||||
try:
|
||||
return body["image"][param]
|
||||
except KeyError:
|
||||
raise webob.exc.HTTPBadRequest(explanation="Missing required "
|
||||
"param: %s" % param)
|
||||
|
||||
context = req.environ['nova.context']
|
||||
content_type = req.get_content_type()
|
||||
|
||||
if not body:
|
||||
raise webob.exc.HTTPBadRequest()
|
||||
|
||||
image_type = body["image"].get("image_type", "snapshot")
|
||||
|
||||
try:
|
||||
server_id = self._server_id_from_req(req, body)
|
||||
image_name = body["image"]["name"]
|
||||
except KeyError:
|
||||
raise webob.exc.HTTPBadRequest()
|
||||
|
||||
image_name = get_param("name")
|
||||
props = self._get_extra_properties(req, body)
|
||||
|
||||
image = self._compute_service.snapshot(context, server_id,
|
||||
image_name, props)
|
||||
if image_type == "snapshot":
|
||||
image = self._compute_service.snapshot(
|
||||
context, server_id, image_name,
|
||||
extra_properties=props)
|
||||
elif image_type == "backup":
|
||||
# NOTE(sirp): Unlike snapshot, backup is not a customer facing
|
||||
# API call; rather, it's used by the internal backup scheduler
|
||||
if not FLAGS.allow_admin_api:
|
||||
raise webob.exc.HTTPBadRequest(
|
||||
explanation="Admin API Required")
|
||||
|
||||
backup_type = get_param("backup_type")
|
||||
rotation = int(get_param("rotation"))
|
||||
|
||||
image = self._compute_service.backup(
|
||||
context, server_id, image_name,
|
||||
backup_type, rotation, extra_properties=props)
|
||||
else:
|
||||
LOG.error(_("Invalid image_type '%s' passed") % image_type)
|
||||
raise webob.exc.HTTPBadRequest(explanation="Invalue image_type: "
|
||||
"%s" % image_type)
|
||||
|
||||
return dict(image=self.get_builder(req).build(image, detail=True))
|
||||
|
||||
def get_builder(self, request):
|
||||
"""Indicates that you must use a Controller subclass."""
|
||||
raise NotImplementedError
|
||||
raise NotImplementedError()
|
||||
|
||||
def _server_id_from_req(self, req, data):
|
||||
raise NotImplementedError()
|
||||
@@ -181,9 +219,9 @@ class ControllerV11(Controller):
|
||||
"""
|
||||
context = req.environ['nova.context']
|
||||
filters = self._get_filters(req)
|
||||
(marker, limit) = common.get_pagination_params(req)
|
||||
images = self._image_service.index(
|
||||
context, filters=filters, marker=marker, limit=limit)
|
||||
page_params = common.get_pagination_params(req)
|
||||
images = self._image_service.index(context, filters=filters,
|
||||
**page_params)
|
||||
builder = self.get_builder(req).build
|
||||
return dict(images=[builder(image, detail=False) for image in images])
|
||||
|
||||
@@ -195,9 +233,9 @@ class ControllerV11(Controller):
|
||||
"""
|
||||
context = req.environ['nova.context']
|
||||
filters = self._get_filters(req)
|
||||
(marker, limit) = common.get_pagination_params(req)
|
||||
images = self._image_service.detail(
|
||||
context, filters=filters, marker=marker, limit=limit)
|
||||
page_params = common.get_pagination_params(req)
|
||||
images = self._image_service.detail(context, filters=filters,
|
||||
**page_params)
|
||||
builder = self.get_builder(req).build
|
||||
return dict(images=[builder(image, detail=True) for image in images])
|
||||
|
||||
@@ -224,16 +262,7 @@ class ControllerV11(Controller):
|
||||
return {'instance_ref': server_ref}
|
||||
|
||||
|
||||
def create_resource(version='1.0'):
|
||||
controller = {
|
||||
'1.0': ControllerV10,
|
||||
'1.1': ControllerV11,
|
||||
}[version]()
|
||||
|
||||
xmlns = {
|
||||
'1.0': wsgi.XMLNS_V10,
|
||||
'1.1': wsgi.XMLNS_V11,
|
||||
}[version]
|
||||
class ImageXMLSerializer(wsgi.XMLDictSerializer):
|
||||
|
||||
metadata = {
|
||||
"attributes": {
|
||||
@@ -243,9 +272,74 @@ def create_resource(version='1.0'):
|
||||
},
|
||||
}
|
||||
|
||||
xmlns = wsgi.XMLNS_V11
|
||||
|
||||
def __init__(self):
|
||||
self.metadata_serializer = image_metadata.ImageMetadataXMLSerializer()
|
||||
|
||||
def _image_to_xml(self, xml_doc, image):
|
||||
try:
|
||||
metadata = image.pop('metadata').items()
|
||||
except Exception:
|
||||
LOG.debug(_("Image object missing metadata attribute"))
|
||||
metadata = {}
|
||||
|
||||
node = self._to_xml_node(xml_doc, self.metadata, 'image', image)
|
||||
metadata_node = self.metadata_serializer.meta_list_to_xml(xml_doc,
|
||||
metadata)
|
||||
node.appendChild(metadata_node)
|
||||
return node
|
||||
|
||||
def _image_list_to_xml(self, xml_doc, images):
|
||||
container_node = xml_doc.createElement('images')
|
||||
for image in images:
|
||||
item_node = self._image_to_xml(xml_doc, image)
|
||||
container_node.appendChild(item_node)
|
||||
return container_node
|
||||
|
||||
def _image_to_xml_string(self, image):
|
||||
xml_doc = minidom.Document()
|
||||
item_node = self._image_to_xml(xml_doc, image)
|
||||
self._add_xmlns(item_node)
|
||||
return item_node.toprettyxml(indent=' ')
|
||||
|
||||
def _image_list_to_xml_string(self, images):
|
||||
xml_doc = minidom.Document()
|
||||
container_node = self._image_list_to_xml(xml_doc, images)
|
||||
self._add_xmlns(container_node)
|
||||
return container_node.toprettyxml(indent=' ')
|
||||
|
||||
def detail(self, images_dict):
|
||||
return self._image_list_to_xml_string(images_dict['images'])
|
||||
|
||||
def show(self, image_dict):
|
||||
return self._image_to_xml_string(image_dict['image'])
|
||||
|
||||
def create(self, image_dict):
|
||||
return self._image_to_xml_string(image_dict['image'])
|
||||
|
||||
|
||||
def create_resource(version='1.0'):
|
||||
controller = {
|
||||
'1.0': ControllerV10,
|
||||
'1.1': ControllerV11,
|
||||
}[version]()
|
||||
|
||||
metadata = {
|
||||
"attributes": {
|
||||
"image": ["id", "name", "updated", "created", "status",
|
||||
"serverId", "progress", "serverRef"],
|
||||
"link": ["rel", "type", "href"],
|
||||
},
|
||||
}
|
||||
|
||||
xml_serializer = {
|
||||
'1.0': wsgi.XMLDictSerializer(metadata, wsgi.XMLNS_V10),
|
||||
'1.1': ImageXMLSerializer(),
|
||||
}[version]
|
||||
|
||||
serializers = {
|
||||
'application/xml': wsgi.XMLDictSerializer(xmlns=xmlns,
|
||||
metadata=metadata),
|
||||
'application/xml': xml_serializer,
|
||||
}
|
||||
|
||||
return wsgi.Resource(controller, serializers=serializers)
|
||||
|
||||
@@ -76,10 +76,17 @@ class Controller(object):
|
||||
|
||||
builder - the response model builder
|
||||
"""
|
||||
reservation_id = req.str_GET.get('reservation_id')
|
||||
query_str = req.str_GET
|
||||
reservation_id = query_str.get('reservation_id')
|
||||
project_id = query_str.get('project_id')
|
||||
fixed_ip = query_str.get('fixed_ip')
|
||||
recurse_zones = utils.bool_from_str(query_str.get('recurse_zones'))
|
||||
instance_list = self.compute_api.get_all(
|
||||
req.environ['nova.context'],
|
||||
reservation_id=reservation_id)
|
||||
req.environ['nova.context'],
|
||||
reservation_id=reservation_id,
|
||||
project_id=project_id,
|
||||
fixed_ip=fixed_ip,
|
||||
recurse_zones=recurse_zones)
|
||||
limited_list = self._limit_items(instance_list, req)
|
||||
builder = self._get_view_builder(req)
|
||||
servers = [builder.build(inst, is_detail)['server']
|
||||
@@ -111,14 +118,15 @@ class Controller(object):
|
||||
extra_values = None
|
||||
result = None
|
||||
try:
|
||||
extra_values, result = self.helper.create_instance(
|
||||
req, body, self.compute_api.create)
|
||||
extra_values, instances = self.helper.create_instance(
|
||||
req, body, self.compute_api.create)
|
||||
except faults.Fault, f:
|
||||
return f
|
||||
|
||||
instances = result
|
||||
|
||||
(inst, ) = instances
|
||||
# We can only return 1 instance via the API, if we happen to
|
||||
# build more than one... instances is a list, so we'll just
|
||||
# use the first one..
|
||||
inst = instances[0]
|
||||
for key in ['instance_type', 'image_ref']:
|
||||
inst[key] = extra_values[key]
|
||||
|
||||
|
||||
@@ -33,16 +33,18 @@ class ViewBuilderV10(ViewBuilder):
|
||||
return dict(public=public_ips, private=private_ips)
|
||||
|
||||
def build_public_parts(self, inst):
|
||||
return utils.get_from_path(inst, 'fixed_ip/floating_ips/address')
|
||||
return utils.get_from_path(inst, 'fixed_ips/floating_ips/address')
|
||||
|
||||
def build_private_parts(self, inst):
|
||||
return utils.get_from_path(inst, 'fixed_ip/address')
|
||||
return utils.get_from_path(inst, 'fixed_ips/address')
|
||||
|
||||
|
||||
class ViewBuilderV11(ViewBuilder):
|
||||
def build(self, inst):
|
||||
private_ips = utils.get_from_path(inst, 'fixed_ip/address')
|
||||
# TODO(tr3buchet) - this shouldn't be hard coded to 4...
|
||||
private_ips = utils.get_from_path(inst, 'fixed_ips/address')
|
||||
private_ips = [dict(version=4, addr=a) for a in private_ips]
|
||||
public_ips = utils.get_from_path(inst, 'fixed_ip/floating_ips/address')
|
||||
public_ips = utils.get_from_path(inst,
|
||||
'fixed_ips/floating_ips/address')
|
||||
public_ips = [dict(version=4, addr=a) for a in public_ips]
|
||||
return dict(public=public_ips, private=private_ips)
|
||||
|
||||
@@ -105,6 +105,9 @@ class ViewBuilderV11(ViewBuilder):
|
||||
image = ViewBuilder.build(self, image_obj, detail)
|
||||
href = self.generate_href(image_obj["id"])
|
||||
|
||||
if detail:
|
||||
image["metadata"] = image_obj.get("properties", {})
|
||||
|
||||
image["links"] = [{
|
||||
"rel": "self",
|
||||
"href": href,
|
||||
|
||||
@@ -358,7 +358,7 @@ class Resource(wsgi.Application):
|
||||
def __call__(self, request):
|
||||
"""WSGI method that controls (de)serialization and method dispatch."""
|
||||
|
||||
LOG.debug("%(method)s %(url)s" % {"method": request.method,
|
||||
LOG.info("%(method)s %(url)s" % {"method": request.method,
|
||||
"url": request.url})
|
||||
|
||||
try:
|
||||
@@ -386,7 +386,7 @@ class Resource(wsgi.Application):
|
||||
msg_dict = dict(url=request.url, e=e)
|
||||
msg = _("%(url)s returned a fault: %(e)s" % msg_dict)
|
||||
|
||||
LOG.debug(msg)
|
||||
LOG.info(msg)
|
||||
|
||||
return response
|
||||
|
||||
|
||||
@@ -100,6 +100,11 @@ class OBJECT_CLASS_VIOLATION(Exception): # pylint: disable=C0103
|
||||
pass
|
||||
|
||||
|
||||
class SERVER_DOWN(Exception): # pylint: disable=C0103
|
||||
"""Duplicate exception class from real LDAP module."""
|
||||
pass
|
||||
|
||||
|
||||
def initialize(_uri):
|
||||
"""Opens a fake connection with an LDAP server."""
|
||||
return FakeLDAP()
|
||||
@@ -202,25 +207,38 @@ def _to_json(unencoded):
|
||||
return json.dumps(list(unencoded))
|
||||
|
||||
|
||||
server_fail = False
|
||||
|
||||
|
||||
class FakeLDAP(object):
|
||||
"""Fake LDAP connection."""
|
||||
|
||||
def simple_bind_s(self, dn, password):
|
||||
"""This method is ignored, but provided for compatibility."""
|
||||
if server_fail:
|
||||
raise SERVER_DOWN
|
||||
pass
|
||||
|
||||
def unbind_s(self):
|
||||
"""This method is ignored, but provided for compatibility."""
|
||||
if server_fail:
|
||||
raise SERVER_DOWN
|
||||
pass
|
||||
|
||||
def add_s(self, dn, attr):
|
||||
"""Add an object with the specified attributes at dn."""
|
||||
if server_fail:
|
||||
raise SERVER_DOWN
|
||||
|
||||
key = "%s%s" % (self.__prefix, dn)
|
||||
value_dict = dict([(k, _to_json(v)) for k, v in attr])
|
||||
Store.instance().hmset(key, value_dict)
|
||||
|
||||
def delete_s(self, dn):
|
||||
"""Remove the ldap object at specified dn."""
|
||||
if server_fail:
|
||||
raise SERVER_DOWN
|
||||
|
||||
Store.instance().delete("%s%s" % (self.__prefix, dn))
|
||||
|
||||
def modify_s(self, dn, attrs):
|
||||
@@ -232,6 +250,9 @@ class FakeLDAP(object):
|
||||
([MOD_ADD | MOD_DELETE | MOD_REPACE], attribute, value)
|
||||
|
||||
"""
|
||||
if server_fail:
|
||||
raise SERVER_DOWN
|
||||
|
||||
store = Store.instance()
|
||||
key = "%s%s" % (self.__prefix, dn)
|
||||
|
||||
@@ -255,6 +276,9 @@ class FakeLDAP(object):
|
||||
fields -- fields to return. Returns all fields if not specified
|
||||
|
||||
"""
|
||||
if server_fail:
|
||||
raise SERVER_DOWN
|
||||
|
||||
if scope != SCOPE_BASE and scope != SCOPE_SUBTREE:
|
||||
raise NotImplementedError(str(scope))
|
||||
store = Store.instance()
|
||||
|
||||
+37
-2
@@ -101,6 +101,41 @@ def sanitize(fn):
|
||||
return _wrapped
|
||||
|
||||
|
||||
class LDAPWrapper(object):
|
||||
def __init__(self, ldap, url, user, password):
|
||||
self.ldap = ldap
|
||||
self.url = url
|
||||
self.user = user
|
||||
self.password = password
|
||||
self.conn = None
|
||||
|
||||
def __wrap_reconnect(f):
|
||||
def inner(self, *args, **kwargs):
|
||||
if self.conn is None:
|
||||
self.connect()
|
||||
return f(self.conn)(*args, **kwargs)
|
||||
else:
|
||||
try:
|
||||
return f(self.conn)(*args, **kwargs)
|
||||
except self.ldap.SERVER_DOWN:
|
||||
self.connect()
|
||||
return f(self.conn)(*args, **kwargs)
|
||||
return inner
|
||||
|
||||
def connect(self):
|
||||
try:
|
||||
self.conn = self.ldap.initialize(self.url)
|
||||
self.conn.simple_bind_s(self.user, self.password)
|
||||
except self.ldap.SERVER_DOWN:
|
||||
self.conn = None
|
||||
raise
|
||||
|
||||
search_s = __wrap_reconnect(lambda conn: conn.search_s)
|
||||
add_s = __wrap_reconnect(lambda conn: conn.add_s)
|
||||
delete_s = __wrap_reconnect(lambda conn: conn.delete_s)
|
||||
modify_s = __wrap_reconnect(lambda conn: conn.modify_s)
|
||||
|
||||
|
||||
class LdapDriver(object):
|
||||
"""Ldap Auth driver
|
||||
|
||||
@@ -124,8 +159,8 @@ class LdapDriver(object):
|
||||
LdapDriver.project_objectclass = 'novaProject'
|
||||
self.__cache = None
|
||||
if LdapDriver.conn is None:
|
||||
LdapDriver.conn = self.ldap.initialize(FLAGS.ldap_url)
|
||||
LdapDriver.conn.simple_bind_s(FLAGS.ldap_user_dn,
|
||||
LdapDriver.conn = LDAPWrapper(self.ldap, FLAGS.ldap_url,
|
||||
FLAGS.ldap_user_dn,
|
||||
FLAGS.ldap_password)
|
||||
if LdapDriver.mc is None:
|
||||
LdapDriver.mc = memcache.Client(FLAGS.memcached_servers, debug=0)
|
||||
|
||||
+10
-6
@@ -630,13 +630,17 @@ class AuthManager(object):
|
||||
not been allocated for user.
|
||||
"""
|
||||
|
||||
network_ref = db.project_get_network(context.get_admin_context(),
|
||||
Project.safe_id(project), False)
|
||||
|
||||
if not network_ref:
|
||||
networks = db.project_get_networks(context.get_admin_context(),
|
||||
Project.safe_id(project), False)
|
||||
if not networks:
|
||||
return (None, None)
|
||||
return (network_ref['vpn_public_address'],
|
||||
network_ref['vpn_public_port'])
|
||||
|
||||
# TODO(tr3buchet): not sure what you guys plan on doing with this
|
||||
# but it's possible for a project to have multiple sets of vpn data
|
||||
# for now I'm just returning the first one
|
||||
network = networks[0]
|
||||
return (network['vpn_public_address'],
|
||||
network['vpn_public_port'])
|
||||
|
||||
def delete_project(self, project):
|
||||
"""Deletes a project"""
|
||||
|
||||
+194
-94
@@ -48,9 +48,27 @@ flags.DEFINE_integer('find_host_timeout', 30,
|
||||
'Timeout after NN seconds when looking for a host.')
|
||||
|
||||
|
||||
def generate_default_hostname(instance_id):
|
||||
def generate_default_hostname(instance):
|
||||
"""Default function to generate a hostname given an instance reference."""
|
||||
return str(instance_id)
|
||||
display_name = instance['display_name']
|
||||
if display_name is None:
|
||||
return 'server_%d' % (instance['id'],)
|
||||
table = ''
|
||||
deletions = ''
|
||||
for i in xrange(256):
|
||||
c = chr(i)
|
||||
if ('a' <= c <= 'z') or ('0' <= c <= '9') or (c == '-'):
|
||||
table += c
|
||||
elif c == ' ':
|
||||
table += '_'
|
||||
elif ('A' <= c <= 'Z'):
|
||||
table += c.lower()
|
||||
else:
|
||||
table += '\0'
|
||||
deletions += c
|
||||
if isinstance(display_name, unicode):
|
||||
display_name = display_name.encode('latin-1', 'ignore')
|
||||
return display_name.translate(table, deletions)
|
||||
|
||||
|
||||
def _is_able_to_shutdown(instance, instance_id):
|
||||
@@ -83,23 +101,6 @@ class API(base.Base):
|
||||
self.hostname_factory = hostname_factory
|
||||
super(API, self).__init__(**kwargs)
|
||||
|
||||
def get_network_topic(self, context, instance_id):
|
||||
"""Get the network topic for an instance."""
|
||||
try:
|
||||
instance = self.get(context, instance_id)
|
||||
except exception.NotFound:
|
||||
LOG.warning(_("Instance %d was not found in get_network_topic"),
|
||||
instance_id)
|
||||
raise
|
||||
|
||||
host = instance['host']
|
||||
if not host:
|
||||
raise exception.Error(_("Instance %d has no host") % instance_id)
|
||||
topic = self.db.queue_get_for(context, FLAGS.compute_topic, host)
|
||||
return rpc.call(context,
|
||||
topic,
|
||||
{"method": "get_network_topic", "args": {'fake': 1}})
|
||||
|
||||
def _check_injected_file_quota(self, context, injected_files):
|
||||
"""Enforce quota limits on injected files.
|
||||
|
||||
@@ -143,7 +144,7 @@ class API(base.Base):
|
||||
|
||||
def _check_create_parameters(self, context, instance_type,
|
||||
image_href, kernel_id=None, ramdisk_id=None,
|
||||
min_count=1, max_count=1,
|
||||
min_count=None, max_count=None,
|
||||
display_name='', display_description='',
|
||||
key_name=None, key_data=None, security_group='default',
|
||||
availability_zone=None, user_data=None, metadata={},
|
||||
@@ -154,6 +155,10 @@ class API(base.Base):
|
||||
|
||||
if not instance_type:
|
||||
instance_type = instance_types.get_default_instance_type()
|
||||
if not min_count:
|
||||
min_count = 1
|
||||
if not max_count:
|
||||
max_count = min_count
|
||||
|
||||
num_instances = quota.allowed_instances(context, max_count,
|
||||
instance_type)
|
||||
@@ -203,18 +208,7 @@ class API(base.Base):
|
||||
if ramdisk_id:
|
||||
image_service.show(context, ramdisk_id)
|
||||
|
||||
if security_group is None:
|
||||
security_group = ['default']
|
||||
if not type(security_group) is list:
|
||||
security_group = [security_group]
|
||||
|
||||
security_groups = []
|
||||
self.ensure_default_security_group(context)
|
||||
for security_group_name in security_group:
|
||||
group = db.security_group_get_by_name(context,
|
||||
context.project_id,
|
||||
security_group_name)
|
||||
security_groups.append(group['id'])
|
||||
|
||||
if key_data is None and key_name:
|
||||
key_pair = db.key_pair_get(context, context.user_id, key_name)
|
||||
@@ -249,29 +243,42 @@ class API(base.Base):
|
||||
'architecture': architecture,
|
||||
'vm_mode': vm_mode}
|
||||
|
||||
return (num_instances, base_options, security_groups)
|
||||
return (num_instances, base_options)
|
||||
|
||||
def create_db_entry_for_new_instance(self, context, base_options,
|
||||
security_groups, block_device_mapping, num=1):
|
||||
security_group, block_device_mapping, num=1):
|
||||
"""Create an entry in the DB for this new instance,
|
||||
including any related table updates (such as security
|
||||
groups, MAC address, etc). This will called by create()
|
||||
in the majority of situations, but all-at-once style
|
||||
Schedulers may initiate the call."""
|
||||
instance = dict(mac_address=utils.generate_mac(),
|
||||
launch_index=num,
|
||||
**base_options)
|
||||
including any related table updates (such as security group,
|
||||
etc).
|
||||
|
||||
This will called by create() in the majority of situations,
|
||||
but create_all_at_once() style Schedulers may initiate the call.
|
||||
If you are changing this method, be sure to update both
|
||||
call paths.
|
||||
"""
|
||||
instance = dict(launch_index=num, **base_options)
|
||||
instance = self.db.instance_create(context, instance)
|
||||
instance_id = instance['id']
|
||||
|
||||
elevated = context.elevated()
|
||||
if not security_groups:
|
||||
security_groups = []
|
||||
if security_group is None:
|
||||
security_group = ['default']
|
||||
if not isinstance(security_group, list):
|
||||
security_group = [security_group]
|
||||
|
||||
security_groups = []
|
||||
for security_group_name in security_group:
|
||||
group = db.security_group_get_by_name(context,
|
||||
context.project_id,
|
||||
security_group_name)
|
||||
security_groups.append(group['id'])
|
||||
|
||||
for security_group_id in security_groups:
|
||||
self.db.instance_add_security_group(elevated,
|
||||
instance_id,
|
||||
security_group_id)
|
||||
|
||||
block_device_mapping = block_device_mapping or []
|
||||
# NOTE(yamahata)
|
||||
# tell vm driver to attach volume at boot time by updating
|
||||
# BlockDeviceMapping
|
||||
@@ -290,10 +297,12 @@ class API(base.Base):
|
||||
self.db.block_device_mapping_create(elevated, values)
|
||||
|
||||
# Set sane defaults if not specified
|
||||
updates = dict(hostname=self.hostname_factory(instance_id))
|
||||
updates = {}
|
||||
if (not hasattr(instance, 'display_name') or
|
||||
instance.display_name is None):
|
||||
updates['display_name'] = "Server %s" % instance_id
|
||||
instance['display_name'] = updates['display_name']
|
||||
updates['hostname'] = self.hostname_factory(instance)
|
||||
|
||||
instance = self.update(context, instance_id, **updates)
|
||||
|
||||
@@ -338,17 +347,16 @@ class API(base.Base):
|
||||
|
||||
def create_all_at_once(self, context, instance_type,
|
||||
image_href, kernel_id=None, ramdisk_id=None,
|
||||
min_count=1, max_count=1,
|
||||
min_count=None, max_count=None,
|
||||
display_name='', display_description='',
|
||||
key_name=None, key_data=None, security_group='default',
|
||||
availability_zone=None, user_data=None, metadata={},
|
||||
injected_files=None, admin_password=None, zone_blob=None,
|
||||
reservation_id=None):
|
||||
reservation_id=None, block_device_mapping=None):
|
||||
"""Provision the instances by passing the whole request to
|
||||
the Scheduler for execution. Returns a Reservation ID
|
||||
related to the creation of all of these instances."""
|
||||
num_instances, base_options, security_groups = \
|
||||
self._check_create_parameters(
|
||||
num_instances, base_options = self._check_create_parameters(
|
||||
context, instance_type,
|
||||
image_href, kernel_id, ramdisk_id,
|
||||
min_count, max_count,
|
||||
@@ -368,7 +376,7 @@ class API(base.Base):
|
||||
|
||||
def create(self, context, instance_type,
|
||||
image_href, kernel_id=None, ramdisk_id=None,
|
||||
min_count=1, max_count=1,
|
||||
min_count=None, max_count=None,
|
||||
display_name='', display_description='',
|
||||
key_name=None, key_data=None, security_group='default',
|
||||
availability_zone=None, user_data=None, metadata={},
|
||||
@@ -380,11 +388,13 @@ class API(base.Base):
|
||||
Scheduler drivers, but may remove the effectiveness of the
|
||||
more complicated drivers.
|
||||
|
||||
NOTE: If you change this method, be sure to change
|
||||
create_all_at_once() at the same time!
|
||||
|
||||
Returns a list of instance dicts.
|
||||
"""
|
||||
|
||||
num_instances, base_options, security_groups = \
|
||||
self._check_create_parameters(
|
||||
num_instances, base_options = self._check_create_parameters(
|
||||
context, instance_type,
|
||||
image_href, kernel_id, ramdisk_id,
|
||||
min_count, max_count,
|
||||
@@ -394,12 +404,11 @@ class API(base.Base):
|
||||
injected_files, admin_password, zone_blob,
|
||||
reservation_id)
|
||||
|
||||
block_device_mapping = block_device_mapping or []
|
||||
instances = []
|
||||
LOG.debug(_("Going to run %s instances..."), num_instances)
|
||||
for num in range(num_instances):
|
||||
instance = self.create_db_entry_for_new_instance(context,
|
||||
base_options, security_groups,
|
||||
base_options, security_group,
|
||||
block_device_mapping, num=num)
|
||||
instances.append(instance)
|
||||
instance_id = instance['id']
|
||||
@@ -613,17 +622,53 @@ class API(base.Base):
|
||||
"""
|
||||
return self.get(context, instance_id)
|
||||
|
||||
def get_all_across_zones(self, context, reservation_id):
|
||||
"""Get all instances with this reservation_id, across
|
||||
all available Zones (if any).
|
||||
"""
|
||||
context = context.elevated()
|
||||
instances = self.db.instance_get_all_by_reservation(
|
||||
context, reservation_id)
|
||||
def get_all(self, context, project_id=None, reservation_id=None,
|
||||
fixed_ip=None, recurse_zones=False):
|
||||
"""Get all instances filtered by one of the given parameters.
|
||||
|
||||
children = scheduler_api.call_zone_method(context, "list",
|
||||
novaclient_collection_name="servers",
|
||||
reservation_id=reservation_id)
|
||||
If there is no filter and the context is an admin, it will retreive
|
||||
all instances in the system.
|
||||
"""
|
||||
|
||||
if reservation_id is not None:
|
||||
recurse_zones = True
|
||||
instances = self.db.instance_get_all_by_reservation(
|
||||
context, reservation_id)
|
||||
elif fixed_ip is not None:
|
||||
try:
|
||||
instances = self.db.fixed_ip_get_instance(context, fixed_ip)
|
||||
except exception.FloatingIpNotFound, e:
|
||||
if not recurse_zones:
|
||||
raise
|
||||
instances = None
|
||||
elif project_id or not context.is_admin:
|
||||
if not context.project:
|
||||
instances = self.db.instance_get_all_by_user(
|
||||
context, context.user_id)
|
||||
else:
|
||||
if project_id is None:
|
||||
project_id = context.project_id
|
||||
instances = self.db.instance_get_all_by_project(
|
||||
context, project_id)
|
||||
else:
|
||||
instances = self.db.instance_get_all(context)
|
||||
|
||||
if instances is None:
|
||||
instances = []
|
||||
elif not isinstance(instances, list):
|
||||
instances = [instances]
|
||||
|
||||
if not recurse_zones:
|
||||
return instances
|
||||
|
||||
admin_context = context.elevated()
|
||||
children = scheduler_api.call_zone_method(admin_context,
|
||||
"list",
|
||||
novaclient_collection_name="servers",
|
||||
reservation_id=reservation_id,
|
||||
project_id=project_id,
|
||||
fixed_ip=fixed_ip,
|
||||
recurse_zones=True)
|
||||
|
||||
for zone, servers in children:
|
||||
for server in servers:
|
||||
@@ -632,32 +677,6 @@ class API(base.Base):
|
||||
instances.append(server._info)
|
||||
return instances
|
||||
|
||||
def get_all(self, context, project_id=None, reservation_id=None,
|
||||
fixed_ip=None):
|
||||
"""Get all instances filtered by one of the given parameters.
|
||||
|
||||
If there is no filter and the context is an admin, it will retreive
|
||||
all instances in the system.
|
||||
"""
|
||||
if reservation_id is not None:
|
||||
return self.get_all_across_zones(context, reservation_id)
|
||||
|
||||
if fixed_ip is not None:
|
||||
return self.db.fixed_ip_get_instance(context, fixed_ip)
|
||||
|
||||
if project_id or not context.is_admin:
|
||||
if not context.project:
|
||||
return self.db.instance_get_all_by_user(
|
||||
context, context.user_id)
|
||||
|
||||
if project_id is None:
|
||||
project_id = context.project_id
|
||||
|
||||
return self.db.instance_get_all_by_project(
|
||||
context, project_id)
|
||||
|
||||
return self.db.instance_get_all(context)
|
||||
|
||||
def _cast_compute_message(self, method, context, instance_id, host=None,
|
||||
params=None):
|
||||
"""Generic handler for RPC casts to compute.
|
||||
@@ -690,7 +709,7 @@ class API(base.Base):
|
||||
params = {}
|
||||
if not host:
|
||||
instance = self.get(context, instance_id)
|
||||
host = instance["host"]
|
||||
host = instance['host']
|
||||
queue = self.db.queue_get_for(context, FLAGS.compute_topic, host)
|
||||
params['instance_id'] = instance_id
|
||||
kwargs = {'method': method, 'args': params}
|
||||
@@ -711,19 +730,60 @@ class API(base.Base):
|
||||
raise exception.Error(_("Unable to find host for Instance %s")
|
||||
% instance_id)
|
||||
|
||||
def backup(self, context, instance_id, name, backup_type, rotation,
|
||||
extra_properties=None):
|
||||
"""Backup the given instance
|
||||
|
||||
:param instance_id: nova.db.sqlalchemy.models.Instance.Id
|
||||
:param name: name of the backup or snapshot
|
||||
name = backup_type # daily backups are called 'daily'
|
||||
:param rotation: int representing how many backups to keep around;
|
||||
None if rotation shouldn't be used (as in the case of snapshots)
|
||||
:param extra_properties: dict of extra image properties to include
|
||||
"""
|
||||
recv_meta = self._create_image(context, instance_id, name, 'backup',
|
||||
backup_type=backup_type, rotation=rotation,
|
||||
extra_properties=extra_properties)
|
||||
return recv_meta
|
||||
|
||||
def snapshot(self, context, instance_id, name, extra_properties=None):
|
||||
"""Snapshot the given instance.
|
||||
|
||||
:param instance_id: nova.db.sqlalchemy.models.Instance.Id
|
||||
:param name: name of the backup or snapshot
|
||||
:param extra_properties: dict of extra image properties to include
|
||||
|
||||
:returns: A dict containing image metadata
|
||||
"""
|
||||
properties = {'instance_id': str(instance_id),
|
||||
return self._create_image(context, instance_id, name, 'snapshot',
|
||||
extra_properties=extra_properties)
|
||||
|
||||
def _create_image(self, context, instance_id, name, image_type,
|
||||
backup_type=None, rotation=None, extra_properties=None):
|
||||
"""Create snapshot or backup for an instance on this host.
|
||||
|
||||
:param context: security context
|
||||
:param instance_id: nova.db.sqlalchemy.models.Instance.Id
|
||||
:param name: string for name of the snapshot
|
||||
:param image_type: snapshot | backup
|
||||
:param backup_type: daily | weekly
|
||||
:param rotation: int representing how many backups to keep around;
|
||||
None if rotation shouldn't be used (as in the case of snapshots)
|
||||
:param extra_properties: dict of extra image properties to include
|
||||
|
||||
"""
|
||||
instance = db.api.instance_get(context, instance_id)
|
||||
properties = {'instance_uuid': instance['uuid'],
|
||||
'user_id': str(context.user_id),
|
||||
'image_state': 'creating'}
|
||||
'image_state': 'creating',
|
||||
'image_type': image_type,
|
||||
'backup_type': backup_type}
|
||||
properties.update(extra_properties or {})
|
||||
sent_meta = {'name': name, 'is_public': False,
|
||||
'status': 'creating', 'properties': properties}
|
||||
recv_meta = self.image_service.create(context, sent_meta)
|
||||
params = {'image_id': recv_meta['id']}
|
||||
params = {'image_id': recv_meta['id'], 'image_type': image_type,
|
||||
'backup_type': backup_type, 'rotation': rotation}
|
||||
self._cast_compute_message('snapshot_instance', context, instance_id,
|
||||
params=params)
|
||||
return recv_meta
|
||||
@@ -825,6 +885,23 @@ class API(base.Base):
|
||||
"instance_id": instance_id,
|
||||
"flavor_id": flavor_id}})
|
||||
|
||||
@scheduler_api.reroute_compute("add_fixed_ip")
|
||||
def add_fixed_ip(self, context, instance_id, network_id):
|
||||
"""Add fixed_ip from specified network to given instance."""
|
||||
self._cast_compute_message('add_fixed_ip_to_instance', context,
|
||||
instance_id,
|
||||
network_id)
|
||||
|
||||
#TODO(tr3buchet): how to run this in the correct zone?
|
||||
def add_network_to_project(self, context, project_id):
|
||||
"""Force adds a network to the project."""
|
||||
# this will raise if zone doesn't know about project so the decorator
|
||||
# can catch it and pass it down
|
||||
self.db.project_get(context, project_id)
|
||||
|
||||
# didn't raise so this is the correct zone
|
||||
self.network_api.add_network_to_project(context, project_id)
|
||||
|
||||
@scheduler_api.reroute_compute("pause")
|
||||
def pause(self, context, instance_id):
|
||||
"""Pause the given instance."""
|
||||
@@ -967,11 +1044,34 @@ class API(base.Base):
|
||||
return instance
|
||||
|
||||
def associate_floating_ip(self, context, instance_id, address):
|
||||
"""Associate a floating ip with an instance."""
|
||||
"""Makes calls to network_api to associate_floating_ip.
|
||||
|
||||
:param address: is a string floating ip address
|
||||
"""
|
||||
instance = self.get(context, instance_id)
|
||||
|
||||
# TODO(tr3buchet): currently network_info doesn't contain floating IPs
|
||||
# in its info, if this changes, the next few lines will need to
|
||||
# accomodate the info containing floating as well as fixed ip addresses
|
||||
fixed_ip_addrs = []
|
||||
for info in self.network_api.get_instance_nw_info(context,
|
||||
instance):
|
||||
ips = info[1]['ips']
|
||||
fixed_ip_addrs.extend([ip_dict['ip'] for ip_dict in ips])
|
||||
|
||||
# TODO(tr3buchet): this will associate the floating IP with the first
|
||||
# fixed_ip (lowest id) an instance has. This should be changed to
|
||||
# support specifying a particular fixed_ip if multiple exist.
|
||||
if not fixed_ip_addrs:
|
||||
msg = _("instance |%s| has no fixed_ips. "
|
||||
"unable to associate floating ip") % instance_id
|
||||
raise exception.ApiError(msg)
|
||||
if len(fixed_ip_addrs) > 1:
|
||||
LOG.warning(_("multiple fixed_ips exist, using the first: %s"),
|
||||
fixed_ip_addrs[0])
|
||||
self.network_api.associate_floating_ip(context,
|
||||
floating_ip=address,
|
||||
fixed_ip=instance['fixed_ip'])
|
||||
fixed_ip=fixed_ip_addrs[0])
|
||||
|
||||
def get_instance_metadata(self, context, instance_id):
|
||||
"""Get all metadata associated with an instance."""
|
||||
|
||||
+166
-100
@@ -46,6 +46,7 @@ from eventlet import greenthread
|
||||
|
||||
from nova import exception
|
||||
from nova import flags
|
||||
import nova.image
|
||||
from nova import log as logging
|
||||
from nova import manager
|
||||
from nova import network
|
||||
@@ -53,6 +54,7 @@ from nova import rpc
|
||||
from nova import utils
|
||||
from nova import volume
|
||||
from nova.compute import power_state
|
||||
from nova.notifier import api as notifier_api
|
||||
from nova.compute.utils import terminate_volumes
|
||||
from nova.virt import driver
|
||||
|
||||
@@ -129,9 +131,9 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
LOG.error(_("Unable to load the virtualization driver: %s") % (e))
|
||||
sys.exit(1)
|
||||
|
||||
self.network_api = network.API()
|
||||
self.network_manager = utils.import_object(FLAGS.network_manager)
|
||||
self.volume_manager = utils.import_object(FLAGS.volume_manager)
|
||||
self.network_api = network.API()
|
||||
self._last_host_check = 0
|
||||
super(ComputeManager, self).__init__(service_name="compute",
|
||||
*args, **kwargs)
|
||||
@@ -178,20 +180,6 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
FLAGS.console_topic,
|
||||
FLAGS.console_host)
|
||||
|
||||
def get_network_topic(self, context, **kwargs):
|
||||
"""Retrieves the network host for a project on this host."""
|
||||
# TODO(vish): This method should be memoized. This will make
|
||||
# the call to get_network_host cheaper, so that
|
||||
# it can pas messages instead of checking the db
|
||||
# locally.
|
||||
if FLAGS.stub_network:
|
||||
host = FLAGS.network_host
|
||||
else:
|
||||
host = self.network_manager.get_network_host(context)
|
||||
return self.db.queue_get_for(context,
|
||||
FLAGS.network_topic,
|
||||
host)
|
||||
|
||||
def get_console_pool_info(self, context, console_type):
|
||||
return self.driver.get_console_pool_info(console_type)
|
||||
|
||||
@@ -279,10 +267,10 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
def _run_instance(self, context, instance_id, **kwargs):
|
||||
"""Launch a new instance with specified options."""
|
||||
context = context.elevated()
|
||||
instance_ref = self.db.instance_get(context, instance_id)
|
||||
instance_ref.injected_files = kwargs.get('injected_files', [])
|
||||
instance_ref.admin_pass = kwargs.get('admin_password', None)
|
||||
if instance_ref['name'] in self.driver.list_instances():
|
||||
instance = self.db.instance_get(context, instance_id)
|
||||
instance.injected_files = kwargs.get('injected_files', [])
|
||||
instance.admin_pass = kwargs.get('admin_password', None)
|
||||
if instance['name'] in self.driver.list_instances():
|
||||
raise exception.Error(_("Instance has already been created"))
|
||||
LOG.audit(_("instance %s: starting..."), instance_id,
|
||||
context=context)
|
||||
@@ -295,54 +283,45 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
power_state.NOSTATE,
|
||||
'networking')
|
||||
|
||||
is_vpn = instance_ref['image_ref'] == str(FLAGS.vpn_image_id)
|
||||
is_vpn = instance['image_ref'] == str(FLAGS.vpn_image_id)
|
||||
try:
|
||||
# NOTE(vish): This could be a cast because we don't do anything
|
||||
# with the address currently, but I'm leaving it as
|
||||
# a call to ensure that network setup completes. We
|
||||
# will eventually also need to save the address here.
|
||||
if not FLAGS.stub_network:
|
||||
address = rpc.call(context,
|
||||
self.get_network_topic(context),
|
||||
{"method": "allocate_fixed_ip",
|
||||
"args": {"instance_id": instance_id,
|
||||
"vpn": is_vpn}})
|
||||
|
||||
network_info = self.network_api.allocate_for_instance(context,
|
||||
instance, vpn=is_vpn)
|
||||
LOG.debug(_("instance network_info: |%s|"), network_info)
|
||||
self.network_manager.setup_compute_network(context,
|
||||
instance_id)
|
||||
else:
|
||||
# TODO(tr3buchet) not really sure how this should be handled.
|
||||
# virt requires network_info to be passed in but stub_network
|
||||
# is enabled. Setting to [] for now will cause virt to skip
|
||||
# all vif creation and network injection, maybe this is correct
|
||||
network_info = []
|
||||
|
||||
block_device_mapping = self._setup_block_device_mapping(
|
||||
context,
|
||||
instance_id)
|
||||
bd_mapping = self._setup_block_device_mapping(context, instance_id)
|
||||
|
||||
# TODO(vish) check to make sure the availability zone matches
|
||||
self._update_state(context, instance_id, power_state.BUILDING)
|
||||
|
||||
try:
|
||||
self.driver.spawn(instance_ref,
|
||||
block_device_mapping=block_device_mapping)
|
||||
self.driver.spawn(instance, network_info, bd_mapping)
|
||||
except Exception as ex: # pylint: disable=W0702
|
||||
msg = _("Instance '%(instance_id)s' failed to spawn. Is "
|
||||
"virtualization enabled in the BIOS? Details: "
|
||||
"%(ex)s") % locals()
|
||||
LOG.exception(msg)
|
||||
|
||||
if not FLAGS.stub_network and FLAGS.auto_assign_floating_ip:
|
||||
public_ip = self.network_api.allocate_floating_ip(context)
|
||||
|
||||
self.db.floating_ip_set_auto_assigned(context, public_ip)
|
||||
fixed_ip = self.db.fixed_ip_get_by_address(context, address)
|
||||
floating_ip = self.db.floating_ip_get_by_address(context,
|
||||
public_ip)
|
||||
|
||||
self.network_api.associate_floating_ip(
|
||||
context,
|
||||
floating_ip,
|
||||
fixed_ip,
|
||||
affect_auto_assigned=True)
|
||||
|
||||
self._update_launched_at(context, instance_id)
|
||||
self._update_state(context, instance_id)
|
||||
usage_info = utils.usage_from_instance(instance)
|
||||
notifier_api.notify('compute.%s' % self.host,
|
||||
'compute.instance.create',
|
||||
notifier_api.INFO,
|
||||
usage_info)
|
||||
except exception.InstanceNotFound:
|
||||
# FIXME(wwolf): We are just ignoring InstanceNotFound
|
||||
# exceptions here in case the instance was immediately
|
||||
@@ -365,53 +344,24 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
def _shutdown_instance(self, context, instance_id, action_str):
|
||||
"""Shutdown an instance on this host."""
|
||||
context = context.elevated()
|
||||
instance_ref = self.db.instance_get(context, instance_id)
|
||||
instance = self.db.instance_get(context, instance_id)
|
||||
LOG.audit(_("%(action_str)s instance %(instance_id)s") %
|
||||
{'action_str': action_str, 'instance_id': instance_id},
|
||||
context=context)
|
||||
|
||||
fixed_ip = instance_ref.get('fixed_ip')
|
||||
if not FLAGS.stub_network and fixed_ip:
|
||||
floating_ips = fixed_ip.get('floating_ips') or []
|
||||
for floating_ip in floating_ips:
|
||||
address = floating_ip['address']
|
||||
LOG.debug("Disassociating address %s", address,
|
||||
context=context)
|
||||
# NOTE(vish): Right now we don't really care if the ip is
|
||||
# disassociated. We may need to worry about
|
||||
# checking this later.
|
||||
self.network_api.disassociate_floating_ip(context,
|
||||
address,
|
||||
True)
|
||||
if (FLAGS.auto_assign_floating_ip
|
||||
and floating_ip.get('auto_assigned')):
|
||||
LOG.debug(_("Deallocating floating ip %s"),
|
||||
floating_ip['address'],
|
||||
context=context)
|
||||
self.network_api.release_floating_ip(context,
|
||||
address,
|
||||
True)
|
||||
if not FLAGS.stub_network:
|
||||
self.network_api.deallocate_for_instance(context, instance)
|
||||
|
||||
address = fixed_ip['address']
|
||||
if address:
|
||||
LOG.debug(_("Deallocating address %s"), address,
|
||||
context=context)
|
||||
# NOTE(vish): Currently, nothing needs to be done on the
|
||||
# network node until release. If this changes,
|
||||
# we will need to cast here.
|
||||
self.network_manager.deallocate_fixed_ip(context.elevated(),
|
||||
address)
|
||||
|
||||
volumes = instance_ref.get('volumes') or []
|
||||
volumes = instance.get('volumes') or []
|
||||
for volume in volumes:
|
||||
self._detach_volume(context, instance_id, volume['id'], False)
|
||||
|
||||
if (instance_ref['state'] == power_state.SHUTOFF and
|
||||
instance_ref['state_description'] != 'stopped'):
|
||||
if (instance['state'] == power_state.SHUTOFF and
|
||||
instance['state_description'] != 'stopped'):
|
||||
self.db.instance_destroy(context, instance_id)
|
||||
raise exception.Error(_('trying to destroy already destroyed'
|
||||
' instance: %s') % instance_id)
|
||||
self.driver.destroy(instance_ref)
|
||||
self.driver.destroy(instance)
|
||||
|
||||
if action_str == 'Terminating':
|
||||
terminate_volumes(self.db, context, instance_id)
|
||||
@@ -421,9 +371,15 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
def terminate_instance(self, context, instance_id):
|
||||
"""Terminate an instance on this host."""
|
||||
self._shutdown_instance(context, instance_id, 'Terminating')
|
||||
instance = self.db.instance_get(context.elevated(), instance_id)
|
||||
|
||||
# TODO(ja): should we keep it in a terminated state for a bit?
|
||||
self.db.instance_destroy(context, instance_id)
|
||||
usage_info = utils.usage_from_instance(instance)
|
||||
notifier_api.notify('compute.%s' % self.host,
|
||||
'compute.instance.delete',
|
||||
notifier_api.INFO,
|
||||
usage_info)
|
||||
|
||||
@exception.wrap_exception
|
||||
@checks_instance_lock
|
||||
@@ -460,6 +416,12 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
self._update_image_ref(context, instance_id, image_ref)
|
||||
self._update_launched_at(context, instance_id)
|
||||
self._update_state(context, instance_id)
|
||||
usage_info = utils.usage_from_instance(instance_ref,
|
||||
image_ref=image_ref)
|
||||
notifier_api.notify('compute.%s' % self.host,
|
||||
'compute.instance.rebuild',
|
||||
notifier_api.INFO,
|
||||
usage_info)
|
||||
|
||||
@exception.wrap_exception
|
||||
@checks_instance_lock
|
||||
@@ -487,8 +449,19 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
self._update_state(context, instance_id)
|
||||
|
||||
@exception.wrap_exception
|
||||
def snapshot_instance(self, context, instance_id, image_id):
|
||||
"""Snapshot an instance on this host."""
|
||||
def snapshot_instance(self, context, instance_id, image_id,
|
||||
image_type='snapshot', backup_type=None,
|
||||
rotation=None):
|
||||
"""Snapshot an instance on this host.
|
||||
|
||||
:param context: security context
|
||||
:param instance_id: nova.db.sqlalchemy.models.Instance.Id
|
||||
:param image_id: glance.db.sqlalchemy.models.Image.Id
|
||||
:param image_type: snapshot | backup
|
||||
:param backup_type: daily | weekly
|
||||
:param rotation: int representing how many backups to keep around;
|
||||
None if rotation shouldn't be used (as in the case of snapshots)
|
||||
"""
|
||||
context = context.elevated()
|
||||
instance_ref = self.db.instance_get(context, instance_id)
|
||||
|
||||
@@ -508,6 +481,65 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
|
||||
self.driver.snapshot(instance_ref, image_id)
|
||||
|
||||
if image_type == 'snapshot':
|
||||
if rotation:
|
||||
raise exception.ImageRotationNotAllowed()
|
||||
elif image_type == 'backup':
|
||||
if rotation:
|
||||
instance_uuid = instance_ref['uuid']
|
||||
self.rotate_backups(context, instance_uuid, backup_type,
|
||||
rotation)
|
||||
else:
|
||||
raise exception.RotationRequiredForBackup()
|
||||
else:
|
||||
raise Exception(_('Image type not recognized %s') % image_type)
|
||||
|
||||
def rotate_backups(self, context, instance_uuid, backup_type, rotation):
|
||||
"""Delete excess backups associated to an instance.
|
||||
|
||||
Instances are allowed a fixed number of backups (the rotation number);
|
||||
this method deletes the oldest backups that exceed the rotation
|
||||
threshold.
|
||||
|
||||
:param context: security context
|
||||
:param instance_uuid: string representing uuid of instance
|
||||
:param backup_type: daily | weekly
|
||||
:param rotation: int representing how many backups to keep around;
|
||||
None if rotation shouldn't be used (as in the case of snapshots)
|
||||
"""
|
||||
# NOTE(jk0): Eventually extract this out to the ImageService?
|
||||
def fetch_images():
|
||||
images = []
|
||||
marker = None
|
||||
while True:
|
||||
batch = image_service.detail(context, filters=filters,
|
||||
marker=marker, sort_key='created_at', sort_dir='desc')
|
||||
if not batch:
|
||||
break
|
||||
images += batch
|
||||
marker = batch[-1]['id']
|
||||
return images
|
||||
|
||||
image_service = nova.image.get_default_image_service()
|
||||
filters = {'property-image_type': 'backup',
|
||||
'property-backup_type': backup_type,
|
||||
'property-instance_uuid': instance_uuid}
|
||||
|
||||
images = fetch_images()
|
||||
num_images = len(images)
|
||||
LOG.debug(_("Found %(num_images)d images (rotation: %(rotation)d)"
|
||||
% locals()))
|
||||
if num_images > rotation:
|
||||
# NOTE(sirp): this deletes all backups that exceed the rotation
|
||||
# limit
|
||||
excess = len(images) - rotation
|
||||
LOG.debug(_("Rotating out %d backups" % excess))
|
||||
for i in xrange(excess):
|
||||
image = images.pop()
|
||||
image_id = image['id']
|
||||
LOG.debug(_("Deleting image %d" % image_id))
|
||||
image_service.delete(context, image_id)
|
||||
|
||||
@exception.wrap_exception
|
||||
@checks_instance_lock
|
||||
def set_admin_password(self, context, instance_id, new_pass=None):
|
||||
@@ -637,6 +669,11 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
context = context.elevated()
|
||||
instance_ref = self.db.instance_get(context, instance_id)
|
||||
self.driver.destroy(instance_ref)
|
||||
usage_info = utils.usage_from_instance(instance_ref)
|
||||
notifier_api.notify('compute.%s' % self.host,
|
||||
'compute.instance.resize.confirm',
|
||||
notifier_api.INFO,
|
||||
usage_info)
|
||||
|
||||
@exception.wrap_exception
|
||||
@checks_instance_lock
|
||||
@@ -684,6 +721,11 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
self.driver.revert_resize(instance_ref)
|
||||
self.db.migration_update(context, migration_id,
|
||||
{'status': 'reverted'})
|
||||
usage_info = utils.usage_from_instance(instance_ref)
|
||||
notifier_api.notify('compute.%s' % self.host,
|
||||
'compute.instance.resize.revert',
|
||||
notifier_api.INFO,
|
||||
usage_info)
|
||||
|
||||
@exception.wrap_exception
|
||||
@checks_instance_lock
|
||||
@@ -720,6 +762,13 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
'migration_id': migration_ref['id'],
|
||||
'instance_id': instance_id, },
|
||||
})
|
||||
usage_info = utils.usage_from_instance(instance_ref,
|
||||
new_instance_type=instance_type['name'],
|
||||
new_instance_type_id=instance_type['id'])
|
||||
notifier_api.notify('compute.%s' % self.host,
|
||||
'compute.instance.resize.prep',
|
||||
notifier_api.INFO,
|
||||
usage_info)
|
||||
|
||||
@exception.wrap_exception
|
||||
@checks_instance_lock
|
||||
@@ -771,12 +820,26 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
|
||||
# reload the updated instance ref
|
||||
# FIXME(mdietz): is there reload functionality?
|
||||
instance_ref = self.db.instance_get(context, instance_id)
|
||||
self.driver.finish_resize(instance_ref, disk_info)
|
||||
instance = self.db.instance_get(context, instance_id)
|
||||
network_info = self.network_api.get_instance_nw_info(context,
|
||||
instance)
|
||||
self.driver.finish_resize(instance, disk_info, network_info)
|
||||
|
||||
self.db.migration_update(context, migration_id,
|
||||
{'status': 'finished', })
|
||||
|
||||
@exception.wrap_exception
|
||||
@checks_instance_lock
|
||||
def add_fixed_ip_to_instance(self, context, instance_id, network_id):
|
||||
"""Calls network_api to add new fixed_ip to instance
|
||||
then injects the new network info and resets instance networking.
|
||||
|
||||
"""
|
||||
self.network_api.add_fixed_ip_to_instance(context, instance_id,
|
||||
network_id)
|
||||
self.inject_network_info(context, instance_id)
|
||||
self.reset_network(context, instance_id)
|
||||
|
||||
@exception.wrap_exception
|
||||
@checks_instance_lock
|
||||
def pause_instance(self, context, instance_id):
|
||||
@@ -880,20 +943,22 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
@checks_instance_lock
|
||||
def reset_network(self, context, instance_id):
|
||||
"""Reset networking on the given instance."""
|
||||
context = context.elevated()
|
||||
instance_ref = self.db.instance_get(context, instance_id)
|
||||
instance = self.db.instance_get(context, instance_id)
|
||||
LOG.debug(_('instance %s: reset network'), instance_id,
|
||||
context=context)
|
||||
self.driver.reset_network(instance_ref)
|
||||
self.driver.reset_network(instance)
|
||||
|
||||
@checks_instance_lock
|
||||
def inject_network_info(self, context, instance_id):
|
||||
"""Inject network info for the given instance."""
|
||||
context = context.elevated()
|
||||
instance_ref = self.db.instance_get(context, instance_id)
|
||||
LOG.debug(_('instance %s: inject network info'), instance_id,
|
||||
context=context)
|
||||
self.driver.inject_network_info(instance_ref)
|
||||
instance = self.db.instance_get(context, instance_id)
|
||||
network_info = self.network_api.get_instance_nw_info(context,
|
||||
instance)
|
||||
LOG.debug(_("network_info to inject: |%s|"), network_info)
|
||||
|
||||
self.driver.inject_network_info(instance, network_info)
|
||||
|
||||
@exception.wrap_exception
|
||||
def get_console_output(self, context, instance_id):
|
||||
@@ -1087,16 +1152,16 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
|
||||
# Getting instance info
|
||||
instance_ref = self.db.instance_get(context, instance_id)
|
||||
ec2_id = instance_ref['hostname']
|
||||
hostname = instance_ref['hostname']
|
||||
|
||||
# Getting fixed ips
|
||||
fixed_ip = self.db.instance_get_fixed_address(context, instance_id)
|
||||
if not fixed_ip:
|
||||
raise exception.NoFixedIpsFoundForInstance(instance_id=instance_id)
|
||||
fixed_ips = self.db.instance_get_fixed_addresses(context, instance_id)
|
||||
if not fixed_ips:
|
||||
raise exception.FixedIpNotFoundForInstance(instance_id=instance_id)
|
||||
|
||||
# If any volume is mounted, prepare here.
|
||||
if not instance_ref['volumes']:
|
||||
LOG.info(_("%s has no volume."), ec2_id)
|
||||
LOG.info(_("%s has no volume."), hostname)
|
||||
else:
|
||||
for v in instance_ref['volumes']:
|
||||
self.volume_manager.setup_compute_volume(context, v['id'])
|
||||
@@ -1119,7 +1184,7 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
raise
|
||||
else:
|
||||
LOG.warn(_("setup_compute_network() failed %(cnt)d."
|
||||
"Retry up to %(max_retry)d for %(ec2_id)s.")
|
||||
"Retry up to %(max_retry)d for %(hostname)s.")
|
||||
% locals())
|
||||
time.sleep(1)
|
||||
|
||||
@@ -1216,9 +1281,10 @@ class ComputeManager(manager.SchedulerDependentManager):
|
||||
{'host': dest})
|
||||
except exception.NotFound:
|
||||
LOG.info(_('No floating_ip is found for %s.'), i_name)
|
||||
except:
|
||||
LOG.error(_("Live migration: Unexpected error:"
|
||||
"%s cannot inherit floating ip..") % i_name)
|
||||
except Exception, e:
|
||||
LOG.error(_("Live migration: Unexpected error: "
|
||||
"%(i_name)s cannot inherit floating "
|
||||
"ip.\n%(e)s") % (locals()))
|
||||
|
||||
# Restore instance/volume state
|
||||
self.recover_live_migration(ctxt, instance_ref, dest)
|
||||
|
||||
+124
-41
@@ -55,11 +55,6 @@ IMPL = utils.LazyPluggable(FLAGS['db_backend'],
|
||||
sqlalchemy='nova.db.sqlalchemy.api')
|
||||
|
||||
|
||||
class NoMoreAddresses(exception.Error):
|
||||
"""No more available addresses."""
|
||||
pass
|
||||
|
||||
|
||||
class NoMoreBlades(exception.Error):
|
||||
"""No more available blades."""
|
||||
pass
|
||||
@@ -223,14 +218,17 @@ def certificate_update(context, certificate_id, values):
|
||||
|
||||
###################
|
||||
|
||||
def floating_ip_get(context, id):
|
||||
return IMPL.floating_ip_get(context, id)
|
||||
|
||||
def floating_ip_allocate_address(context, host, project_id):
|
||||
|
||||
def floating_ip_allocate_address(context, project_id):
|
||||
"""Allocate free floating ip and return the address.
|
||||
|
||||
Raises if one is not available.
|
||||
|
||||
"""
|
||||
return IMPL.floating_ip_allocate_address(context, host, project_id)
|
||||
return IMPL.floating_ip_allocate_address(context, project_id)
|
||||
|
||||
|
||||
def floating_ip_create(context, values):
|
||||
@@ -321,6 +319,7 @@ def migration_get_by_instance_and_status(context, instance_id, status):
|
||||
return IMPL.migration_get_by_instance_and_status(context, instance_id,
|
||||
status)
|
||||
|
||||
|
||||
####################
|
||||
|
||||
|
||||
@@ -372,9 +371,14 @@ def fixed_ip_get_by_address(context, address):
|
||||
return IMPL.fixed_ip_get_by_address(context, address)
|
||||
|
||||
|
||||
def fixed_ip_get_all_by_instance(context, instance_id):
|
||||
def fixed_ip_get_by_instance(context, instance_id):
|
||||
"""Get fixed ips by instance or raise if none exist."""
|
||||
return IMPL.fixed_ip_get_all_by_instance(context, instance_id)
|
||||
return IMPL.fixed_ip_get_by_instance(context, instance_id)
|
||||
|
||||
|
||||
def fixed_ip_get_by_virtual_interface(context, vif_id):
|
||||
"""Get fixed ips by virtual interface or raise if none exist."""
|
||||
return IMPL.fixed_ip_get_by_virtual_interface(context, vif_id)
|
||||
|
||||
|
||||
def fixed_ip_get_instance(context, address):
|
||||
@@ -399,6 +403,62 @@ def fixed_ip_update(context, address, values):
|
||||
####################
|
||||
|
||||
|
||||
def virtual_interface_create(context, values):
|
||||
"""Create a virtual interface record in the database."""
|
||||
return IMPL.virtual_interface_create(context, values)
|
||||
|
||||
|
||||
def virtual_interface_update(context, vif_id, values):
|
||||
"""Update a virtual interface record in the database."""
|
||||
return IMPL.virtual_interface_update(context, vif_id, values)
|
||||
|
||||
|
||||
def virtual_interface_get(context, vif_id):
|
||||
"""Gets a virtual interface from the table,"""
|
||||
return IMPL.virtual_interface_get(context, vif_id)
|
||||
|
||||
|
||||
def virtual_interface_get_by_address(context, address):
|
||||
"""Gets a virtual interface from the table filtering on address."""
|
||||
return IMPL.virtual_interface_get_by_address(context, address)
|
||||
|
||||
|
||||
def virtual_interface_get_by_fixed_ip(context, fixed_ip_id):
|
||||
"""Gets the virtual interface fixed_ip is associated with."""
|
||||
return IMPL.virtual_interface_get_by_fixed_ip(context, fixed_ip_id)
|
||||
|
||||
|
||||
def virtual_interface_get_by_instance(context, instance_id):
|
||||
"""Gets all virtual_interfaces for instance."""
|
||||
return IMPL.virtual_interface_get_by_instance(context, instance_id)
|
||||
|
||||
|
||||
def virtual_interface_get_by_instance_and_network(context, instance_id,
|
||||
network_id):
|
||||
"""Gets all virtual interfaces for instance."""
|
||||
return IMPL.virtual_interface_get_by_instance_and_network(context,
|
||||
instance_id,
|
||||
network_id)
|
||||
|
||||
|
||||
def virtual_interface_get_by_network(context, network_id):
|
||||
"""Gets all virtual interfaces on network."""
|
||||
return IMPL.virtual_interface_get_by_network(context, network_id)
|
||||
|
||||
|
||||
def virtual_interface_delete(context, vif_id):
|
||||
"""Delete virtual interface record from the database."""
|
||||
return IMPL.virtual_interface_delete(context, vif_id)
|
||||
|
||||
|
||||
def virtual_interface_delete_by_instance(context, instance_id):
|
||||
"""Delete virtual interface records associated with instance."""
|
||||
return IMPL.virtual_interface_delete_by_instance(context, instance_id)
|
||||
|
||||
|
||||
####################
|
||||
|
||||
|
||||
def instance_create(context, values):
|
||||
"""Create an instance from the values dictionary."""
|
||||
return IMPL.instance_create(context, values)
|
||||
@@ -434,6 +494,11 @@ def instance_get_all(context):
|
||||
return IMPL.instance_get_all(context)
|
||||
|
||||
|
||||
def instance_get_active_by_window(context, begin, end=None):
|
||||
"""Get instances active during a certain time window."""
|
||||
return IMPL.instance_get_active_by_window(context, begin, end)
|
||||
|
||||
|
||||
def instance_get_all_by_user(context, user_id):
|
||||
"""Get all instances."""
|
||||
return IMPL.instance_get_all_by_user(context, user_id)
|
||||
@@ -454,13 +519,13 @@ def instance_get_all_by_reservation(context, reservation_id):
|
||||
return IMPL.instance_get_all_by_reservation(context, reservation_id)
|
||||
|
||||
|
||||
def instance_get_fixed_address(context, instance_id):
|
||||
def instance_get_fixed_addresses(context, instance_id):
|
||||
"""Get the fixed ip address of an instance."""
|
||||
return IMPL.instance_get_fixed_address(context, instance_id)
|
||||
return IMPL.instance_get_fixed_addresses(context, instance_id)
|
||||
|
||||
|
||||
def instance_get_fixed_address_v6(context, instance_id):
|
||||
return IMPL.instance_get_fixed_address_v6(context, instance_id)
|
||||
def instance_get_fixed_addresses_v6(context, instance_id):
|
||||
return IMPL.instance_get_fixed_addresses_v6(context, instance_id)
|
||||
|
||||
|
||||
def instance_get_floating_address(context, instance_id):
|
||||
@@ -555,9 +620,9 @@ def key_pair_get_all_by_user(context, user_id):
|
||||
####################
|
||||
|
||||
|
||||
def network_associate(context, project_id):
|
||||
def network_associate(context, project_id, force=False):
|
||||
"""Associate a free network to a project."""
|
||||
return IMPL.network_associate(context, project_id)
|
||||
return IMPL.network_associate(context, project_id, force)
|
||||
|
||||
|
||||
def network_count(context):
|
||||
@@ -650,6 +715,11 @@ def network_get_all_by_instance(context, instance_id):
|
||||
return IMPL.network_get_all_by_instance(context, instance_id)
|
||||
|
||||
|
||||
def network_get_all_by_host(context, host):
|
||||
"""All networks for which the given host is the network host."""
|
||||
return IMPL.network_get_all_by_host(context, host)
|
||||
|
||||
|
||||
def network_get_index(context, network_id):
|
||||
"""Get non-conflicting index for network."""
|
||||
return IMPL.network_get_index(context, network_id)
|
||||
@@ -682,23 +752,6 @@ def network_update(context, network_id, values):
|
||||
###################
|
||||
|
||||
|
||||
def project_get_network(context, project_id, associate=True):
|
||||
"""Return the network associated with the project.
|
||||
|
||||
If associate is true, it will attempt to associate a new
|
||||
network if one is not found, otherwise it returns None.
|
||||
|
||||
"""
|
||||
return IMPL.project_get_network(context, project_id, associate)
|
||||
|
||||
|
||||
def project_get_network_v6(context, project_id):
|
||||
return IMPL.project_get_network_v6(context, project_id)
|
||||
|
||||
|
||||
###################
|
||||
|
||||
|
||||
def queue_get_for(context, topic, physical_node_id):
|
||||
"""Return a channel to send a message to a node with a topic."""
|
||||
return IMPL.queue_get_for(context, topic, physical_node_id)
|
||||
@@ -1122,6 +1175,9 @@ def user_update(context, user_id, values):
|
||||
return IMPL.user_update(context, user_id, values)
|
||||
|
||||
|
||||
###################
|
||||
|
||||
|
||||
def project_get(context, id):
|
||||
"""Get project by id."""
|
||||
return IMPL.project_get(context, id)
|
||||
@@ -1162,17 +1218,23 @@ def project_delete(context, project_id):
|
||||
return IMPL.project_delete(context, project_id)
|
||||
|
||||
|
||||
def project_get_networks(context, project_id, associate=True):
|
||||
"""Return the network associated with the project.
|
||||
|
||||
If associate is true, it will attempt to associate a new
|
||||
network if one is not found, otherwise it returns None.
|
||||
|
||||
"""
|
||||
return IMPL.project_get_networks(context, project_id, associate)
|
||||
|
||||
|
||||
def project_get_networks_v6(context, project_id):
|
||||
return IMPL.project_get_networks_v6(context, project_id)
|
||||
|
||||
|
||||
###################
|
||||
|
||||
|
||||
def host_get_networks(context, host):
|
||||
"""All networks for which the given host is the network host."""
|
||||
return IMPL.host_get_networks(context, host)
|
||||
|
||||
|
||||
##################
|
||||
|
||||
|
||||
def console_pool_create(context, values):
|
||||
"""Create console pool."""
|
||||
return IMPL.console_pool_create(context, values)
|
||||
@@ -1276,7 +1338,7 @@ def zone_create(context, values):
|
||||
|
||||
def zone_update(context, zone_id, values):
|
||||
"""Update a child Zone entry."""
|
||||
return IMPL.zone_update(context, values)
|
||||
return IMPL.zone_update(context, zone_id, values)
|
||||
|
||||
|
||||
def zone_delete(context, zone_id):
|
||||
@@ -1339,3 +1401,24 @@ def agent_build_destroy(context, agent_update_id):
|
||||
def agent_build_update(context, agent_build_id, values):
|
||||
"""Update agent build entry."""
|
||||
IMPL.agent_build_update(context, agent_build_id, values)
|
||||
|
||||
|
||||
####################
|
||||
|
||||
|
||||
def instance_type_extra_specs_get(context, instance_type_id):
|
||||
"""Get all extra specs for an instance type."""
|
||||
return IMPL.instance_type_extra_specs_get(context, instance_type_id)
|
||||
|
||||
|
||||
def instance_type_extra_specs_delete(context, instance_type_id, key):
|
||||
"""Delete the given extra specs item."""
|
||||
IMPL.instance_type_extra_specs_delete(context, instance_type_id, key)
|
||||
|
||||
|
||||
def instance_type_extra_specs_update_or_create(context, instance_type_id,
|
||||
extra_specs):
|
||||
"""Create or update instance type extra specs. This adds or modifies the
|
||||
key/value pairs specified in the extra specs dict argument"""
|
||||
IMPL.instance_type_extra_specs_update_or_create(context, instance_type_id,
|
||||
extra_specs)
|
||||
|
||||
+600
-205
File diff suppressed because it is too large
Load Diff
@@ -58,8 +58,7 @@ provider_fw_rules = Table('provider_fw_rules', meta,
|
||||
Column('to_port', Integer()),
|
||||
Column('cidr',
|
||||
String(length=255, convert_unicode=False, assert_unicode=None,
|
||||
unicode_error=None, _warn_on_bytestring=False))
|
||||
)
|
||||
unicode_error=None, _warn_on_bytestring=False)))
|
||||
|
||||
|
||||
def upgrade(migrate_engine):
|
||||
|
||||
@@ -0,0 +1,67 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2011 University of Southern California
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
from sqlalchemy import Boolean, Column, DateTime, ForeignKey, Integer
|
||||
from sqlalchemy import MetaData, String, Table
|
||||
from nova import log as logging
|
||||
|
||||
meta = MetaData()
|
||||
|
||||
# Just for the ForeignKey and column creation to succeed, these are not the
|
||||
# actual definitions of instances or services.
|
||||
instance_types = Table('instance_types', meta,
|
||||
Column('id', Integer(), primary_key=True, nullable=False),
|
||||
)
|
||||
|
||||
#
|
||||
# New Tables
|
||||
#
|
||||
|
||||
instance_type_extra_specs_table = Table('instance_type_extra_specs', meta,
|
||||
Column('created_at', DateTime(timezone=False)),
|
||||
Column('updated_at', DateTime(timezone=False)),
|
||||
Column('deleted_at', DateTime(timezone=False)),
|
||||
Column('deleted', Boolean(create_constraint=True, name=None)),
|
||||
Column('id', Integer(), primary_key=True, nullable=False),
|
||||
Column('instance_type_id',
|
||||
Integer(),
|
||||
ForeignKey('instance_types.id'),
|
||||
nullable=False),
|
||||
Column('key',
|
||||
String(length=255, convert_unicode=False, assert_unicode=None,
|
||||
unicode_error=None, _warn_on_bytestring=False)),
|
||||
Column('value',
|
||||
String(length=255, convert_unicode=False, assert_unicode=None,
|
||||
unicode_error=None, _warn_on_bytestring=False)))
|
||||
|
||||
|
||||
def upgrade(migrate_engine):
|
||||
# Upgrade operations go here. Don't create your own engine;
|
||||
# bind migrate_engine to your metadata
|
||||
meta.bind = migrate_engine
|
||||
for table in (instance_type_extra_specs_table, ):
|
||||
try:
|
||||
table.create()
|
||||
except Exception:
|
||||
logging.info(repr(table))
|
||||
logging.exception('Exception while creating table')
|
||||
raise
|
||||
|
||||
|
||||
def downgrade(migrate_engine):
|
||||
# Operations to reverse the above upgrade go here.
|
||||
for table in (instance_type_extra_specs_table, ):
|
||||
table.drop()
|
||||
@@ -0,0 +1,38 @@
|
||||
# Copyright 2011 OpenStack LLC.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
from sqlalchemy import Column, Float, Integer, MetaData, Table
|
||||
|
||||
meta = MetaData()
|
||||
|
||||
zones = Table('zones', meta,
|
||||
Column('id', Integer(), primary_key=True, nullable=False),
|
||||
)
|
||||
|
||||
weight_offset = Column('weight_offset', Float(), default=0.0)
|
||||
weight_scale = Column('weight_scale', Float(), default=1.0)
|
||||
|
||||
|
||||
def upgrade(migrate_engine):
|
||||
meta.bind = migrate_engine
|
||||
|
||||
zones.create_column(weight_offset)
|
||||
zones.create_column(weight_scale)
|
||||
|
||||
|
||||
def downgrade(migrate_engine):
|
||||
meta.bind = migrate_engine
|
||||
|
||||
zones.drop_column(weight_offset)
|
||||
zones.drop_column(weight_scale)
|
||||
@@ -0,0 +1,125 @@
|
||||
# Copyright 2011 OpenStack LLC.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import datetime
|
||||
|
||||
from sqlalchemy import *
|
||||
from migrate import *
|
||||
|
||||
from nova import log as logging
|
||||
from nova import utils
|
||||
|
||||
meta = MetaData()
|
||||
|
||||
# virtual interface table to add to DB
|
||||
virtual_interfaces = Table('virtual_interfaces', meta,
|
||||
Column('created_at', DateTime(timezone=False),
|
||||
default=utils.utcnow()),
|
||||
Column('updated_at', DateTime(timezone=False),
|
||||
onupdate=utils.utcnow()),
|
||||
Column('deleted_at', DateTime(timezone=False)),
|
||||
Column('deleted', Boolean(create_constraint=True, name=None)),
|
||||
Column('id', Integer(), primary_key=True, nullable=False),
|
||||
Column('address',
|
||||
String(length=255, convert_unicode=False, assert_unicode=None,
|
||||
unicode_error=None, _warn_on_bytestring=False),
|
||||
unique=True),
|
||||
Column('network_id',
|
||||
Integer(),
|
||||
ForeignKey('networks.id')),
|
||||
Column('instance_id',
|
||||
Integer(),
|
||||
ForeignKey('instances.id'),
|
||||
nullable=False),
|
||||
mysql_engine='InnoDB')
|
||||
|
||||
|
||||
# bridge_interface column to add to networks table
|
||||
interface = Column('bridge_interface',
|
||||
String(length=255, convert_unicode=False,
|
||||
assert_unicode=None, unicode_error=None,
|
||||
_warn_on_bytestring=False))
|
||||
|
||||
|
||||
# virtual interface id column to add to fixed_ips table
|
||||
# foreignkey added in next migration
|
||||
virtual_interface_id = Column('virtual_interface_id',
|
||||
Integer())
|
||||
|
||||
|
||||
def upgrade(migrate_engine):
|
||||
meta.bind = migrate_engine
|
||||
|
||||
# grab tables and (column for dropping later)
|
||||
instances = Table('instances', meta, autoload=True)
|
||||
networks = Table('networks', meta, autoload=True)
|
||||
fixed_ips = Table('fixed_ips', meta, autoload=True)
|
||||
c = instances.columns['mac_address']
|
||||
|
||||
# add interface column to networks table
|
||||
# values will have to be set manually before running nova
|
||||
try:
|
||||
networks.create_column(interface)
|
||||
except Exception:
|
||||
logging.error(_("interface column not added to networks table"))
|
||||
raise
|
||||
|
||||
# create virtual_interfaces table
|
||||
try:
|
||||
virtual_interfaces.create()
|
||||
except Exception:
|
||||
logging.error(_("Table |%s| not created!"), repr(virtual_interfaces))
|
||||
raise
|
||||
|
||||
# add virtual_interface_id column to fixed_ips table
|
||||
try:
|
||||
fixed_ips.create_column(virtual_interface_id)
|
||||
except Exception:
|
||||
logging.error(_("VIF column not added to fixed_ips table"))
|
||||
raise
|
||||
|
||||
# populate the virtual_interfaces table
|
||||
# extract data from existing instance and fixed_ip tables
|
||||
s = select([instances.c.id, instances.c.mac_address,
|
||||
fixed_ips.c.network_id],
|
||||
fixed_ips.c.instance_id == instances.c.id)
|
||||
keys = ('instance_id', 'address', 'network_id')
|
||||
join_list = [dict(zip(keys, row)) for row in s.execute()]
|
||||
logging.debug(_("join list for moving mac_addresses |%s|"), join_list)
|
||||
|
||||
# insert data into the table
|
||||
if join_list:
|
||||
i = virtual_interfaces.insert()
|
||||
i.execute(join_list)
|
||||
|
||||
# populate the fixed_ips virtual_interface_id column
|
||||
s = select([fixed_ips.c.id, fixed_ips.c.instance_id],
|
||||
fixed_ips.c.instance_id != None)
|
||||
|
||||
for row in s.execute():
|
||||
m = select([virtual_interfaces.c.id]).\
|
||||
where(virtual_interfaces.c.instance_id == row['instance_id']).\
|
||||
as_scalar()
|
||||
u = fixed_ips.update().values(virtual_interface_id=m).\
|
||||
where(fixed_ips.c.id == row['id'])
|
||||
u.execute()
|
||||
|
||||
# drop the mac_address column from instances
|
||||
c.drop()
|
||||
|
||||
|
||||
def downgrade(migrate_engine):
|
||||
logging.error(_("Can't downgrade without losing data"))
|
||||
raise Exception
|
||||
@@ -0,0 +1,56 @@
|
||||
# Copyright 2011 OpenStack LLC.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import datetime
|
||||
|
||||
from sqlalchemy import *
|
||||
from migrate import *
|
||||
|
||||
from nova import log as logging
|
||||
from nova import utils
|
||||
|
||||
meta = MetaData()
|
||||
|
||||
|
||||
def upgrade(migrate_engine):
|
||||
meta.bind = migrate_engine
|
||||
dialect = migrate_engine.url.get_dialect().name
|
||||
|
||||
# grab tables
|
||||
fixed_ips = Table('fixed_ips', meta, autoload=True)
|
||||
virtual_interfaces = Table('virtual_interfaces', meta, autoload=True)
|
||||
|
||||
# add foreignkey if not sqlite
|
||||
try:
|
||||
if not dialect.startswith('sqlite'):
|
||||
ForeignKeyConstraint(columns=[fixed_ips.c.virtual_interface_id],
|
||||
refcolumns=[virtual_interfaces.c.id]).create()
|
||||
except Exception:
|
||||
logging.error(_("foreign key constraint couldn't be added"))
|
||||
raise
|
||||
|
||||
|
||||
def downgrade(migrate_engine):
|
||||
meta.bind = migrate_engine
|
||||
dialect = migrate_engine.url.get_dialect().name
|
||||
|
||||
# drop foreignkey if not sqlite
|
||||
try:
|
||||
if not dialect.startswith('sqlite'):
|
||||
ForeignKeyConstraint(columns=[fixed_ips.c.virtual_interface_id],
|
||||
refcolumns=[virtual_interfaces.c.id]).drop()
|
||||
except Exception:
|
||||
logging.error(_("foreign key constraint couldn't be dropped"))
|
||||
raise
|
||||
@@ -0,0 +1,48 @@
|
||||
BEGIN TRANSACTION;
|
||||
|
||||
CREATE TEMPORARY TABLE fixed_ips_backup (
|
||||
id INTEGER NOT NULL,
|
||||
address VARCHAR(255),
|
||||
virtual_interface_id INTEGER,
|
||||
network_id INTEGER,
|
||||
instance_id INTEGER,
|
||||
allocated BOOLEAN default FALSE,
|
||||
leased BOOLEAN default FALSE,
|
||||
reserved BOOLEAN default FALSE,
|
||||
created_at DATETIME NOT NULL,
|
||||
updated_at DATETIME,
|
||||
deleted_at DATETIME,
|
||||
deleted BOOLEAN NOT NULL,
|
||||
PRIMARY KEY (id),
|
||||
FOREIGN KEY(virtual_interface_id) REFERENCES virtual_interfaces (id)
|
||||
);
|
||||
|
||||
INSERT INTO fixed_ips_backup
|
||||
SELECT id, address, virtual_interface_id, network_id, instance_id, allocated, leased, reserved, created_at, updated_at, deleted_at, deleted
|
||||
FROM fixed_ips;
|
||||
|
||||
DROP TABLE fixed_ips;
|
||||
|
||||
CREATE TABLE fixed_ips (
|
||||
id INTEGER NOT NULL,
|
||||
address VARCHAR(255),
|
||||
virtual_interface_id INTEGER,
|
||||
network_id INTEGER,
|
||||
instance_id INTEGER,
|
||||
allocated BOOLEAN default FALSE,
|
||||
leased BOOLEAN default FALSE,
|
||||
reserved BOOLEAN default FALSE,
|
||||
created_at DATETIME NOT NULL,
|
||||
updated_at DATETIME,
|
||||
deleted_at DATETIME,
|
||||
deleted BOOLEAN NOT NULL,
|
||||
PRIMARY KEY (id)
|
||||
);
|
||||
|
||||
INSERT INTO fixed_ips
|
||||
SELECT id, address, virtual_interface_id, network_id, instance_id, allocated, leased, reserved, created_at, updated_at, deleted_at, deleted
|
||||
FROM fixed_ips;
|
||||
|
||||
DROP TABLE fixed_ips_backup;
|
||||
|
||||
COMMIT;
|
||||
@@ -0,0 +1,48 @@
|
||||
BEGIN TRANSACTION;
|
||||
|
||||
CREATE TEMPORARY TABLE fixed_ips_backup (
|
||||
id INTEGER NOT NULL,
|
||||
address VARCHAR(255),
|
||||
virtual_interface_id INTEGER,
|
||||
network_id INTEGER,
|
||||
instance_id INTEGER,
|
||||
allocated BOOLEAN default FALSE,
|
||||
leased BOOLEAN default FALSE,
|
||||
reserved BOOLEAN default FALSE,
|
||||
created_at DATETIME NOT NULL,
|
||||
updated_at DATETIME,
|
||||
deleted_at DATETIME,
|
||||
deleted BOOLEAN NOT NULL,
|
||||
PRIMARY KEY (id)
|
||||
);
|
||||
|
||||
INSERT INTO fixed_ips_backup
|
||||
SELECT id, address, virtual_interface_id, network_id, instance_id, allocated, leased, reserved, created_at, updated_at, deleted_at, deleted
|
||||
FROM fixed_ips;
|
||||
|
||||
DROP TABLE fixed_ips;
|
||||
|
||||
CREATE TABLE fixed_ips (
|
||||
id INTEGER NOT NULL,
|
||||
address VARCHAR(255),
|
||||
virtual_interface_id INTEGER,
|
||||
network_id INTEGER,
|
||||
instance_id INTEGER,
|
||||
allocated BOOLEAN default FALSE,
|
||||
leased BOOLEAN default FALSE,
|
||||
reserved BOOLEAN default FALSE,
|
||||
created_at DATETIME NOT NULL,
|
||||
updated_at DATETIME,
|
||||
deleted_at DATETIME,
|
||||
deleted BOOLEAN NOT NULL,
|
||||
PRIMARY KEY (id),
|
||||
FOREIGN KEY(virtual_interface_id) REFERENCES virtual_interfaces (id)
|
||||
);
|
||||
|
||||
INSERT INTO fixed_ips
|
||||
SELECT id, address, virtual_interface_id, network_id, instance_id, allocated, leased, reserved, created_at, updated_at, deleted_at, deleted
|
||||
FROM fixed_ips;
|
||||
|
||||
DROP TABLE fixed_ips_backup;
|
||||
|
||||
COMMIT;
|
||||
@@ -21,7 +21,7 @@ SQLAlchemy models for nova data.
|
||||
|
||||
from sqlalchemy.orm import relationship, backref, object_mapper
|
||||
from sqlalchemy import Column, Integer, String, schema
|
||||
from sqlalchemy import ForeignKey, DateTime, Boolean, Text
|
||||
from sqlalchemy import ForeignKey, DateTime, Boolean, Text, Float
|
||||
from sqlalchemy.exc import IntegrityError
|
||||
from sqlalchemy.ext.declarative import declarative_base
|
||||
from sqlalchemy.schema import ForeignKeyConstraint
|
||||
@@ -209,12 +209,12 @@ class Instance(BASE, NovaBase):
|
||||
hostname = Column(String(255))
|
||||
host = Column(String(255)) # , ForeignKey('hosts.id'))
|
||||
|
||||
# aka flavor_id
|
||||
instance_type_id = Column(Integer)
|
||||
|
||||
user_data = Column(Text)
|
||||
|
||||
reservation_id = Column(String(255))
|
||||
mac_address = Column(String(255))
|
||||
|
||||
scheduled_at = Column(DateTime)
|
||||
launched_at = Column(DateTime)
|
||||
@@ -548,6 +548,7 @@ class Network(BASE, NovaBase):
|
||||
netmask_v6 = Column(String(255))
|
||||
netmask = Column(String(255))
|
||||
bridge = Column(String(255))
|
||||
bridge_interface = Column(String(255))
|
||||
gateway = Column(String(255))
|
||||
broadcast = Column(String(255))
|
||||
dns = Column(String(255))
|
||||
@@ -558,13 +559,67 @@ class Network(BASE, NovaBase):
|
||||
vpn_private_address = Column(String(255))
|
||||
dhcp_start = Column(String(255))
|
||||
|
||||
# NOTE(vish): The unique constraint below helps avoid a race condition
|
||||
# when associating a network, but it also means that we
|
||||
# can't associate two networks with one project.
|
||||
project_id = Column(String(255), unique=True)
|
||||
project_id = Column(String(255))
|
||||
host = Column(String(255)) # , ForeignKey('hosts.id'))
|
||||
|
||||
|
||||
class VirtualInterface(BASE, NovaBase):
|
||||
"""Represents a virtual interface on an instance."""
|
||||
__tablename__ = 'virtual_interfaces'
|
||||
id = Column(Integer, primary_key=True)
|
||||
address = Column(String(255), unique=True)
|
||||
network_id = Column(Integer, ForeignKey('networks.id'))
|
||||
network = relationship(Network, backref=backref('virtual_interfaces'))
|
||||
|
||||
# TODO(tr3buchet): cut the cord, removed foreign key and backrefs
|
||||
instance_id = Column(Integer, ForeignKey('instances.id'), nullable=False)
|
||||
instance = relationship(Instance, backref=backref('virtual_interfaces'))
|
||||
|
||||
|
||||
# TODO(vish): can these both come from the same baseclass?
|
||||
class FixedIp(BASE, NovaBase):
|
||||
"""Represents a fixed ip for an instance."""
|
||||
__tablename__ = 'fixed_ips'
|
||||
id = Column(Integer, primary_key=True)
|
||||
address = Column(String(255))
|
||||
network_id = Column(Integer, ForeignKey('networks.id'), nullable=True)
|
||||
network = relationship(Network, backref=backref('fixed_ips'))
|
||||
virtual_interface_id = Column(Integer, ForeignKey('virtual_interfaces.id'),
|
||||
nullable=True)
|
||||
virtual_interface = relationship(VirtualInterface,
|
||||
backref=backref('fixed_ips'))
|
||||
instance_id = Column(Integer, ForeignKey('instances.id'), nullable=True)
|
||||
instance = relationship(Instance,
|
||||
backref=backref('fixed_ips'),
|
||||
foreign_keys=instance_id,
|
||||
primaryjoin='and_('
|
||||
'FixedIp.instance_id == Instance.id,'
|
||||
'FixedIp.deleted == False)')
|
||||
# associated means that a fixed_ip has its instance_id column set
|
||||
# allocated means that a fixed_ip has a its virtual_interface_id column set
|
||||
allocated = Column(Boolean, default=False)
|
||||
# leased means dhcp bridge has leased the ip
|
||||
leased = Column(Boolean, default=False)
|
||||
reserved = Column(Boolean, default=False)
|
||||
|
||||
|
||||
class FloatingIp(BASE, NovaBase):
|
||||
"""Represents a floating ip that dynamically forwards to a fixed ip."""
|
||||
__tablename__ = 'floating_ips'
|
||||
id = Column(Integer, primary_key=True)
|
||||
address = Column(String(255))
|
||||
fixed_ip_id = Column(Integer, ForeignKey('fixed_ips.id'), nullable=True)
|
||||
fixed_ip = relationship(FixedIp,
|
||||
backref=backref('floating_ips'),
|
||||
foreign_keys=fixed_ip_id,
|
||||
primaryjoin='and_('
|
||||
'FloatingIp.fixed_ip_id == FixedIp.id,'
|
||||
'FloatingIp.deleted == False)')
|
||||
project_id = Column(String(255))
|
||||
host = Column(String(255)) # , ForeignKey('hosts.id'))
|
||||
auto_assigned = Column(Boolean, default=False, nullable=False)
|
||||
|
||||
|
||||
class AuthToken(BASE, NovaBase):
|
||||
"""Represents an authorization token for all API transactions.
|
||||
|
||||
@@ -580,26 +635,6 @@ class AuthToken(BASE, NovaBase):
|
||||
cdn_management_url = Column(String(255))
|
||||
|
||||
|
||||
# TODO(vish): can these both come from the same baseclass?
|
||||
class FixedIp(BASE, NovaBase):
|
||||
"""Represents a fixed ip for an instance."""
|
||||
__tablename__ = 'fixed_ips'
|
||||
id = Column(Integer, primary_key=True)
|
||||
address = Column(String(255))
|
||||
network_id = Column(Integer, ForeignKey('networks.id'), nullable=True)
|
||||
network = relationship(Network, backref=backref('fixed_ips'))
|
||||
instance_id = Column(Integer, ForeignKey('instances.id'), nullable=True)
|
||||
instance = relationship(Instance,
|
||||
backref=backref('fixed_ip', uselist=False),
|
||||
foreign_keys=instance_id,
|
||||
primaryjoin='and_('
|
||||
'FixedIp.instance_id == Instance.id,'
|
||||
'FixedIp.deleted == False)')
|
||||
allocated = Column(Boolean, default=False)
|
||||
leased = Column(Boolean, default=False)
|
||||
reserved = Column(Boolean, default=False)
|
||||
|
||||
|
||||
class User(BASE, NovaBase):
|
||||
"""Represents a user."""
|
||||
__tablename__ = 'users'
|
||||
@@ -660,23 +695,6 @@ class UserProjectAssociation(BASE, NovaBase):
|
||||
project_id = Column(String(255), ForeignKey(Project.id), primary_key=True)
|
||||
|
||||
|
||||
class FloatingIp(BASE, NovaBase):
|
||||
"""Represents a floating ip that dynamically forwards to a fixed ip."""
|
||||
__tablename__ = 'floating_ips'
|
||||
id = Column(Integer, primary_key=True)
|
||||
address = Column(String(255))
|
||||
fixed_ip_id = Column(Integer, ForeignKey('fixed_ips.id'), nullable=True)
|
||||
fixed_ip = relationship(FixedIp,
|
||||
backref=backref('floating_ips'),
|
||||
foreign_keys=fixed_ip_id,
|
||||
primaryjoin='and_('
|
||||
'FloatingIp.fixed_ip_id == FixedIp.id,'
|
||||
'FloatingIp.deleted == False)')
|
||||
project_id = Column(String(255))
|
||||
host = Column(String(255)) # , ForeignKey('hosts.id'))
|
||||
auto_assigned = Column(Boolean, default=False, nullable=False)
|
||||
|
||||
|
||||
class ConsolePool(BASE, NovaBase):
|
||||
"""Represents pool of consoles on the same physical node."""
|
||||
__tablename__ = 'console_pools'
|
||||
@@ -716,6 +734,21 @@ class InstanceMetadata(BASE, NovaBase):
|
||||
'InstanceMetadata.deleted == False)')
|
||||
|
||||
|
||||
class InstanceTypeExtraSpecs(BASE, NovaBase):
|
||||
"""Represents additional specs as key/value pairs for an instance_type"""
|
||||
__tablename__ = 'instance_type_extra_specs'
|
||||
id = Column(Integer, primary_key=True)
|
||||
key = Column(String(255))
|
||||
value = Column(String(255))
|
||||
instance_type_id = Column(Integer, ForeignKey('instance_types.id'),
|
||||
nullable=False)
|
||||
instance_type = relationship(InstanceTypes, backref="extra_specs",
|
||||
foreign_keys=instance_type_id,
|
||||
primaryjoin='and_('
|
||||
'InstanceTypeExtraSpecs.instance_type_id == InstanceTypes.id,'
|
||||
'InstanceTypeExtraSpecs.deleted == False)')
|
||||
|
||||
|
||||
class Zone(BASE, NovaBase):
|
||||
"""Represents a child zone of this zone."""
|
||||
__tablename__ = 'zones'
|
||||
@@ -723,6 +756,8 @@ class Zone(BASE, NovaBase):
|
||||
api_url = Column(String(255))
|
||||
username = Column(String(255))
|
||||
password = Column(String(255))
|
||||
weight_offset = Column(Float(), default=0.0)
|
||||
weight_scale = Column(Float(), default=1.0)
|
||||
|
||||
|
||||
class AgentBuild(BASE, NovaBase):
|
||||
@@ -750,7 +785,7 @@ def register_models():
|
||||
Network, SecurityGroup, SecurityGroupIngressRule,
|
||||
SecurityGroupInstanceAssociation, AuthToken, User,
|
||||
Project, Certificate, ConsolePool, Console, Zone,
|
||||
AgentBuild, InstanceMetadata, Migration)
|
||||
AgentBuild, InstanceMetadata, InstanceTypeExtraSpecs, Migration)
|
||||
engine = create_engine(FLAGS.sql_connection, echo=False)
|
||||
for model in models:
|
||||
model.metadata.create_all(engine)
|
||||
|
||||
+73
-15
@@ -118,6 +118,15 @@ class NovaException(Exception):
|
||||
return self._error_string
|
||||
|
||||
|
||||
class VirtualInterfaceCreateException(NovaException):
|
||||
message = _("Virtual Interface creation failed")
|
||||
|
||||
|
||||
class VirtualInterfaceMacAddressException(NovaException):
|
||||
message = _("5 attempts to create virtual interface"
|
||||
"with unique mac address failed")
|
||||
|
||||
|
||||
class NotAuthorized(NovaException):
|
||||
message = _("Not authorized.")
|
||||
|
||||
@@ -356,28 +365,56 @@ class DatastoreNotFound(NotFound):
|
||||
message = _("Could not find the datastore reference(s) which the VM uses.")
|
||||
|
||||
|
||||
class NoFixedIpsFoundForInstance(NotFound):
|
||||
class FixedIpNotFound(NotFound):
|
||||
message = _("No fixed IP associated with id %(id)s.")
|
||||
|
||||
|
||||
class FixedIpNotFoundForAddress(FixedIpNotFound):
|
||||
message = _("Fixed ip not found for address %(address)s.")
|
||||
|
||||
|
||||
class FixedIpNotFoundForInstance(FixedIpNotFound):
|
||||
message = _("Instance %(instance_id)s has zero fixed ips.")
|
||||
|
||||
|
||||
class FixedIpNotFoundForVirtualInterface(FixedIpNotFound):
|
||||
message = _("Virtual interface %(vif_id)s has zero associated fixed ips.")
|
||||
|
||||
|
||||
class FixedIpNotFoundForHost(FixedIpNotFound):
|
||||
message = _("Host %(host)s has zero fixed ips.")
|
||||
|
||||
|
||||
class NoMoreFixedIps(Error):
|
||||
message = _("Zero fixed ips available.")
|
||||
|
||||
|
||||
class NoFixedIpsDefined(NotFound):
|
||||
message = _("Zero fixed ips could be found.")
|
||||
|
||||
|
||||
class FloatingIpNotFound(NotFound):
|
||||
message = _("Floating ip not found for fixed address %(fixed_ip)s.")
|
||||
message = _("Floating ip not found for id %(id)s.")
|
||||
|
||||
|
||||
class FloatingIpNotFoundForAddress(FloatingIpNotFound):
|
||||
message = _("Floating ip not found for address %(address)s.")
|
||||
|
||||
|
||||
class FloatingIpNotFoundForProject(FloatingIpNotFound):
|
||||
message = _("Floating ip not found for project %(project_id)s.")
|
||||
|
||||
|
||||
class FloatingIpNotFoundForHost(FloatingIpNotFound):
|
||||
message = _("Floating ip not found for host %(host)s.")
|
||||
|
||||
|
||||
class NoMoreFloatingIps(FloatingIpNotFound):
|
||||
message = _("Zero floating ips available.")
|
||||
|
||||
|
||||
class NoFloatingIpsDefined(NotFound):
|
||||
message = _("Zero floating ips could be found.")
|
||||
|
||||
|
||||
class NoFloatingIpsDefinedForHost(NoFloatingIpsDefined):
|
||||
message = _("Zero floating ips defined for host %(host)s.")
|
||||
|
||||
|
||||
class NoFloatingIpsDefinedForInstance(NoFloatingIpsDefined):
|
||||
message = _("Zero floating ips defined for instance %(instance_id)s.")
|
||||
|
||||
|
||||
class NoMoreFloatingIps(NotFound):
|
||||
message = _("Zero floating ips available.")
|
||||
message = _("Zero floating ips exist.")
|
||||
|
||||
|
||||
class KeypairNotFound(NotFound):
|
||||
@@ -504,6 +541,11 @@ class InstanceMetadataNotFound(NotFound):
|
||||
"key %(metadata_key)s.")
|
||||
|
||||
|
||||
class InstanceTypeExtraSpecsNotFound(NotFound):
|
||||
message = _("Instance Type %(instance_type_id)s has no extra specs with "
|
||||
"key %(extra_specs_key)s.")
|
||||
|
||||
|
||||
class LDAPObjectNotFound(NotFound):
|
||||
message = _("LDAP object could not be found")
|
||||
|
||||
@@ -549,6 +591,14 @@ class GlobalRoleNotAllowed(NotAllowed):
|
||||
message = _("Unable to use global role %(role_id)s")
|
||||
|
||||
|
||||
class ImageRotationNotAllowed(NovaException):
|
||||
message = _("Rotation is not allowed for snapshots")
|
||||
|
||||
|
||||
class RotationRequiredForBackup(NovaException):
|
||||
message = _("Rotation param is required for backup image_type")
|
||||
|
||||
|
||||
#TODO(bcwaldon): EOL this exception!
|
||||
class Duplicate(NovaException):
|
||||
pass
|
||||
@@ -589,3 +639,11 @@ class MigrationError(NovaException):
|
||||
|
||||
class MalformedRequestBody(NovaException):
|
||||
message = _("Malformed message body: %(reason)s")
|
||||
|
||||
|
||||
class PasteConfigNotFound(NotFound):
|
||||
message = _("Could not find paste config at %(path)s")
|
||||
|
||||
|
||||
class PasteAppNotFound(NotFound):
|
||||
message = _("Could not load paste app '%(name)s' from %(path)s")
|
||||
|
||||
+11
@@ -314,3 +314,14 @@ logging.setLoggerClass(NovaLogger)
|
||||
def audit(msg, *args, **kwargs):
|
||||
"""Shortcut for logging to root log with sevrity 'AUDIT'."""
|
||||
logging.root.log(AUDIT, msg, *args, **kwargs)
|
||||
|
||||
|
||||
class WritableLogger(object):
|
||||
"""A thin wrapper that responds to `write` and logs."""
|
||||
|
||||
def __init__(self, logger, level=logging.INFO):
|
||||
self.logger = logger
|
||||
self.level = level
|
||||
|
||||
def write(self, msg):
|
||||
self.logger.log(self.level, msg)
|
||||
|
||||
+74
-14
@@ -22,7 +22,6 @@ from nova import db
|
||||
from nova import exception
|
||||
from nova import flags
|
||||
from nova import log as logging
|
||||
from nova import quota
|
||||
from nova import rpc
|
||||
from nova.db import base
|
||||
|
||||
@@ -34,13 +33,21 @@ LOG = logging.getLogger('nova.network')
|
||||
class API(base.Base):
|
||||
"""API for interacting with the network manager."""
|
||||
|
||||
def get_floating_ip(self, context, id):
|
||||
rv = self.db.floating_ip_get(context, id)
|
||||
return dict(rv.iteritems())
|
||||
|
||||
def get_floating_ip_by_ip(self, context, address):
|
||||
res = self.db.floating_ip_get_by_address(context, address)
|
||||
return dict(res.iteritems())
|
||||
|
||||
def list_floating_ips(self, context):
|
||||
ips = self.db.floating_ip_get_all_by_project(context,
|
||||
context.project_id)
|
||||
return ips
|
||||
|
||||
def allocate_floating_ip(self, context):
|
||||
if quota.allowed_floating_ips(context, 1) < 1:
|
||||
LOG.warn(_('Quota exceeeded for %s, tried to allocate '
|
||||
'address'),
|
||||
context.project_id)
|
||||
raise quota.QuotaError(_('Address quota exceeded. You cannot '
|
||||
'allocate any more addresses'))
|
||||
"""Adds a floating ip to a project."""
|
||||
# NOTE(vish): We don't know which network host should get the ip
|
||||
# when we allocate, so just send it to any one. This
|
||||
# will probably need to move into a network supervisor
|
||||
@@ -52,6 +59,7 @@ class API(base.Base):
|
||||
|
||||
def release_floating_ip(self, context, address,
|
||||
affect_auto_assigned=False):
|
||||
"""Removes floating ip with address from a project."""
|
||||
floating_ip = self.db.floating_ip_get_by_address(context, address)
|
||||
if not affect_auto_assigned and floating_ip.get('auto_assigned'):
|
||||
return
|
||||
@@ -65,8 +73,19 @@ class API(base.Base):
|
||||
'args': {'floating_address': floating_ip['address']}})
|
||||
|
||||
def associate_floating_ip(self, context, floating_ip, fixed_ip,
|
||||
affect_auto_assigned=False):
|
||||
if isinstance(fixed_ip, str) or isinstance(fixed_ip, unicode):
|
||||
affect_auto_assigned=False):
|
||||
"""Associates a floating ip with a fixed ip.
|
||||
|
||||
ensures floating ip is allocated to the project in context
|
||||
|
||||
:param fixed_ip: is either fixed_ip object or a string fixed ip address
|
||||
:param floating_ip: is a string floating ip address
|
||||
"""
|
||||
# NOTE(tr3buchet): i don't like the "either or" argument type
|
||||
# funcationility but i've left it alone for now
|
||||
# TODO(tr3buchet): this function needs to be rewritten to move
|
||||
# the network related db lookups into the network host code
|
||||
if isinstance(fixed_ip, basestring):
|
||||
fixed_ip = self.db.fixed_ip_get_by_address(context, fixed_ip)
|
||||
floating_ip = self.db.floating_ip_get_by_address(context, floating_ip)
|
||||
if not affect_auto_assigned and floating_ip.get('auto_assigned'):
|
||||
@@ -86,8 +105,6 @@ class API(base.Base):
|
||||
'(%(project)s)') %
|
||||
{'address': floating_ip['address'],
|
||||
'project': context.project_id})
|
||||
# NOTE(vish): Perhaps we should just pass this on to compute and
|
||||
# let compute communicate with network.
|
||||
host = fixed_ip['network']['host']
|
||||
rpc.cast(context,
|
||||
self.db.queue_get_for(context, FLAGS.network_topic, host),
|
||||
@@ -97,15 +114,58 @@ class API(base.Base):
|
||||
|
||||
def disassociate_floating_ip(self, context, address,
|
||||
affect_auto_assigned=False):
|
||||
"""Disassociates a floating ip from fixed ip it is associated with."""
|
||||
floating_ip = self.db.floating_ip_get_by_address(context, address)
|
||||
if not affect_auto_assigned and floating_ip.get('auto_assigned'):
|
||||
return
|
||||
if not floating_ip.get('fixed_ip'):
|
||||
raise exception.ApiError('Address is not associated.')
|
||||
# NOTE(vish): Get the topic from the host name of the network of
|
||||
# the associated fixed ip.
|
||||
host = floating_ip['fixed_ip']['network']['host']
|
||||
rpc.cast(context,
|
||||
rpc.call(context,
|
||||
self.db.queue_get_for(context, FLAGS.network_topic, host),
|
||||
{'method': 'disassociate_floating_ip',
|
||||
'args': {'floating_address': floating_ip['address']}})
|
||||
|
||||
def allocate_for_instance(self, context, instance, **kwargs):
|
||||
"""Allocates all network structures for an instance.
|
||||
|
||||
:returns: network info as from get_instance_nw_info() below
|
||||
"""
|
||||
args = kwargs
|
||||
args['instance_id'] = instance['id']
|
||||
args['project_id'] = instance['project_id']
|
||||
args['instance_type_id'] = instance['instance_type_id']
|
||||
return rpc.call(context, FLAGS.network_topic,
|
||||
{'method': 'allocate_for_instance',
|
||||
'args': args})
|
||||
|
||||
def deallocate_for_instance(self, context, instance, **kwargs):
|
||||
"""Deallocates all network structures related to instance."""
|
||||
args = kwargs
|
||||
args['instance_id'] = instance['id']
|
||||
args['project_id'] = instance['project_id']
|
||||
rpc.cast(context, FLAGS.network_topic,
|
||||
{'method': 'deallocate_for_instance',
|
||||
'args': args})
|
||||
|
||||
def add_fixed_ip_to_instance(self, context, instance_id, network_id):
|
||||
"""Adds a fixed ip to instance from specified network."""
|
||||
args = {'instance_id': instance_id,
|
||||
'network_id': network_id}
|
||||
rpc.cast(context, FLAGS.network_topic,
|
||||
{'method': 'add_fixed_ip_to_instance',
|
||||
'args': args})
|
||||
|
||||
def add_network_to_project(self, context, project_id):
|
||||
"""Force adds another network to a project."""
|
||||
rpc.cast(context, FLAGS.network_topic,
|
||||
{'method': 'add_network_to_project',
|
||||
'args': {'project_id': project_id}})
|
||||
|
||||
def get_instance_nw_info(self, context, instance):
|
||||
"""Returns all network info related to an instance."""
|
||||
args = {'instance_id': instance['id'],
|
||||
'instance_type_id': instance['instance_type_id']}
|
||||
return rpc.call(context, FLAGS.network_topic,
|
||||
{'method': 'get_instance_nw_info',
|
||||
'args': args})
|
||||
|
||||
@@ -451,20 +451,20 @@ def floating_forward_rules(floating_ip, fixed_ip):
|
||||
'-s %s -j SNAT --to %s' % (fixed_ip, floating_ip))]
|
||||
|
||||
|
||||
def ensure_vlan_bridge(vlan_num, bridge, net_attrs=None):
|
||||
def ensure_vlan_bridge(vlan_num, bridge, bridge_interface, net_attrs=None):
|
||||
"""Create a vlan and bridge unless they already exist."""
|
||||
interface = ensure_vlan(vlan_num)
|
||||
interface = ensure_vlan(vlan_num, bridge_interface)
|
||||
ensure_bridge(bridge, interface, net_attrs)
|
||||
|
||||
|
||||
@utils.synchronized('ensure_vlan', external=True)
|
||||
def ensure_vlan(vlan_num):
|
||||
def ensure_vlan(vlan_num, bridge_interface):
|
||||
"""Create a vlan unless it already exists."""
|
||||
interface = 'vlan%s' % vlan_num
|
||||
if not _device_exists(interface):
|
||||
LOG.debug(_('Starting VLAN inteface %s'), interface)
|
||||
_execute('sudo', 'vconfig', 'set_name_type', 'VLAN_PLUS_VID_NO_PAD')
|
||||
_execute('sudo', 'vconfig', 'add', FLAGS.vlan_interface, vlan_num)
|
||||
_execute('sudo', 'vconfig', 'add', bridge_interface, vlan_num)
|
||||
_execute('sudo', 'ip', 'link', 'set', interface, 'up')
|
||||
return interface
|
||||
|
||||
@@ -666,7 +666,7 @@ def _host_lease(fixed_ip_ref):
|
||||
seconds_since_epoch = calendar.timegm(timestamp.utctimetuple())
|
||||
|
||||
return '%d %s %s %s *' % (seconds_since_epoch + FLAGS.dhcp_lease_time,
|
||||
instance_ref['mac_address'],
|
||||
fixed_ip_ref['virtual_interface']['address'],
|
||||
fixed_ip_ref['address'],
|
||||
instance_ref['hostname'] or '*')
|
||||
|
||||
@@ -674,7 +674,7 @@ def _host_lease(fixed_ip_ref):
|
||||
def _host_dhcp(fixed_ip_ref):
|
||||
"""Return a host string for an address in dhcp-host format."""
|
||||
instance_ref = fixed_ip_ref['instance']
|
||||
return '%s,%s.%s,%s' % (instance_ref['mac_address'],
|
||||
return '%s,%s.%s,%s' % (fixed_ip_ref['virtual_interface']['address'],
|
||||
instance_ref['hostname'],
|
||||
FLAGS.dhcp_domain,
|
||||
fixed_ip_ref['address'])
|
||||
|
||||
+520
-278
File diff suppressed because it is too large
Load Diff
@@ -33,7 +33,7 @@ FLAGS = flags.FLAGS
|
||||
FLAGS['vlan_interface'].SetDefault('vmnic0')
|
||||
|
||||
|
||||
def ensure_vlan_bridge(vlan_num, bridge, net_attrs=None):
|
||||
def ensure_vlan_bridge(vlan_num, bridge, bridge_interface, net_attrs=None):
|
||||
"""Create a vlan and bridge unless they already exist."""
|
||||
# Open vmwareapi session
|
||||
host_ip = FLAGS.vmwareapi_host_ip
|
||||
@@ -46,7 +46,7 @@ def ensure_vlan_bridge(vlan_num, bridge, net_attrs=None):
|
||||
'connection_type=vmwareapi'))
|
||||
session = VMWareAPISession(host_ip, host_username, host_password,
|
||||
FLAGS.vmwareapi_api_retry_count)
|
||||
vlan_interface = FLAGS.vlan_interface
|
||||
vlan_interface = bridge_interface
|
||||
# Check if the vlan_interface physical network adapter exists on the host
|
||||
if not network_utils.check_if_vlan_interface_exists(session,
|
||||
vlan_interface):
|
||||
|
||||
@@ -34,7 +34,7 @@ LOG = logging.getLogger("nova.xenapi_net")
|
||||
FLAGS = flags.FLAGS
|
||||
|
||||
|
||||
def ensure_vlan_bridge(vlan_num, bridge, net_attrs=None):
|
||||
def ensure_vlan_bridge(vlan_num, bridge, bridge_interface, net_attrs=None):
|
||||
"""Create a vlan and bridge unless they already exist."""
|
||||
# Open xenapi session
|
||||
LOG.debug('ENTERING ensure_vlan_bridge in xenapi net')
|
||||
@@ -59,13 +59,13 @@ def ensure_vlan_bridge(vlan_num, bridge, net_attrs=None):
|
||||
# NOTE(salvatore-orlando): using double quotes inside single quotes
|
||||
# as xapi filter only support tokens in double quotes
|
||||
expr = 'field "device" = "%s" and \
|
||||
field "VLAN" = "-1"' % FLAGS.vlan_interface
|
||||
field "VLAN" = "-1"' % bridge_interface
|
||||
pifs = session.call_xenapi('PIF.get_all_records_where', expr)
|
||||
pif_ref = None
|
||||
# Multiple PIF are ok: we are dealing with a pool
|
||||
if len(pifs) == 0:
|
||||
raise Exception(
|
||||
_('Found no PIF for device %s') % FLAGS.vlan_interface)
|
||||
_('Found no PIF for device %s') % bridge_interface)
|
||||
# 3 - create vlan for network
|
||||
for pif_ref in pifs.keys():
|
||||
session.call_xenapi('VLAN.create',
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
# Copyright 2011 OpenStack LLC.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import json
|
||||
|
||||
from nova import flags
|
||||
from nova import log as logging
|
||||
|
||||
FLAGS = flags.FLAGS
|
||||
|
||||
NOTIFICATIONS = []
|
||||
|
||||
|
||||
def notify(message):
|
||||
"""Test notifier, stores notifications in memory for unittests."""
|
||||
NOTIFICATIONS.append(message)
|
||||
@@ -275,6 +275,11 @@ class FanoutAdapterConsumer(AdapterConsumer):
|
||||
unique = uuid.uuid4().hex
|
||||
self.queue = '%s_fanout_%s' % (topic, unique)
|
||||
self.durable = False
|
||||
# Fanout creates unique queue names, so we should auto-remove
|
||||
# them when done, so they're not left around on restart.
|
||||
# Also, we're the only one that should be consuming. exclusive
|
||||
# implies auto_delete, so we'll just set that..
|
||||
self.exclusive = True
|
||||
LOG.info(_('Created "%(exchange)s" fanout exchange '
|
||||
'with "%(key)s" routing key'),
|
||||
dict(exchange=self.exchange, key=self.routing_key))
|
||||
@@ -355,6 +360,7 @@ class FanoutPublisher(Publisher):
|
||||
self.exchange = '%s_fanout' % topic
|
||||
self.queue = '%s_fanout' % topic
|
||||
self.durable = False
|
||||
self.auto_delete = True
|
||||
LOG.info(_('Creating "%(exchange)s" fanout exchange'),
|
||||
dict(exchange=self.exchange))
|
||||
super(FanoutPublisher, self).__init__(connection=connection)
|
||||
|
||||
+40
-16
@@ -114,7 +114,8 @@ def _process(func, zone):
|
||||
|
||||
|
||||
def call_zone_method(context, method_name, errors_to_ignore=None,
|
||||
novaclient_collection_name='zones', *args, **kwargs):
|
||||
novaclient_collection_name='zones', zones=None,
|
||||
*args, **kwargs):
|
||||
"""Returns a list of (zone, call_result) objects."""
|
||||
if not isinstance(errors_to_ignore, (list, tuple)):
|
||||
# This will also handle the default None
|
||||
@@ -122,7 +123,9 @@ def call_zone_method(context, method_name, errors_to_ignore=None,
|
||||
|
||||
pool = greenpool.GreenPool()
|
||||
results = []
|
||||
for zone in db.zone_get_all(context):
|
||||
if zones is None:
|
||||
zones = db.zone_get_all(context)
|
||||
for zone in zones:
|
||||
try:
|
||||
nova = novaclient.OpenStack(zone.username, zone.password, None,
|
||||
zone.api_url)
|
||||
@@ -162,32 +165,53 @@ def child_zone_helper(zone_list, func):
|
||||
_wrap_method(_process, func), zone_list)]
|
||||
|
||||
|
||||
def _issue_novaclient_command(nova, zone, collection, method_name, item_id):
|
||||
def _issue_novaclient_command(nova, zone, collection,
|
||||
method_name, *args, **kwargs):
|
||||
"""Use novaclient to issue command to a single child zone.
|
||||
One of these will be run in parallel for each child zone."""
|
||||
One of these will be run in parallel for each child zone.
|
||||
"""
|
||||
manager = getattr(nova, collection)
|
||||
result = None
|
||||
try:
|
||||
|
||||
# NOTE(comstud): This is not ideal, but we have to do this based on
|
||||
# how novaclient is implemented right now.
|
||||
# 'find' is special cased as novaclient requires kwargs for it to
|
||||
# filter on a 'get_all'.
|
||||
# Every other method first needs to do a 'get' on the first argument
|
||||
# passed, which should be a UUID. If it's 'get' itself that we want,
|
||||
# we just return the result. Otherwise, we next call the real method
|
||||
# that's wanted... passing other arguments that may or may not exist.
|
||||
if method_name in ['find', 'findall']:
|
||||
try:
|
||||
result = manager.get(int(item_id))
|
||||
except ValueError, e:
|
||||
result = manager.find(name=item_id)
|
||||
return getattr(manager, method_name)(**kwargs)
|
||||
except novaclient.NotFound:
|
||||
url = zone.api_url
|
||||
LOG.debug(_("%(collection)s.%(method_name)s didn't find "
|
||||
"anything matching '%(kwargs)s' on '%(url)s'" %
|
||||
locals()))
|
||||
return None
|
||||
|
||||
args = list(args)
|
||||
# pop off the UUID to look up
|
||||
item = args.pop(0)
|
||||
try:
|
||||
result = manager.get(item)
|
||||
except novaclient.NotFound:
|
||||
url = zone.api_url
|
||||
LOG.debug(_("%(collection)s '%(item_id)s' not found on '%(url)s'" %
|
||||
LOG.debug(_("%(collection)s '%(item)s' not found on '%(url)s'" %
|
||||
locals()))
|
||||
return None
|
||||
|
||||
if method_name.lower() not in ['get', 'find']:
|
||||
result = getattr(result, method_name)()
|
||||
if method_name.lower() != 'get':
|
||||
# if we're doing something other than 'get', call it passing args.
|
||||
result = getattr(result, method_name)(*args, **kwargs)
|
||||
return result
|
||||
|
||||
|
||||
def wrap_novaclient_function(f, collection, method_name, item_id):
|
||||
"""Appends collection, method_name and item_id to the incoming
|
||||
def wrap_novaclient_function(f, collection, method_name, *args, **kwargs):
|
||||
"""Appends collection, method_name and arguments to the incoming
|
||||
(nova, zone) call from child_zone_helper."""
|
||||
def inner(nova, zone):
|
||||
return f(nova, zone, collection, method_name, item_id)
|
||||
return f(nova, zone, collection, method_name, *args, **kwargs)
|
||||
|
||||
return inner
|
||||
|
||||
@@ -220,7 +244,7 @@ class reroute_compute(object):
|
||||
the wrapped method. (This ensures that zone-local code can
|
||||
continue to use integer IDs).
|
||||
|
||||
4. If the item was not found, we delgate the call to a child zone
|
||||
4. If the item was not found, we delegate the call to a child zone
|
||||
using the UUID.
|
||||
"""
|
||||
def __init__(self, method_name):
|
||||
|
||||
@@ -129,8 +129,7 @@ class Scheduler(object):
|
||||
# Checking instance is running.
|
||||
if (power_state.RUNNING != instance_ref['state'] or \
|
||||
'running' != instance_ref['state_description']):
|
||||
ec2_id = instance_ref['hostname']
|
||||
raise exception.InstanceNotRunning(instance_id=ec2_id)
|
||||
raise exception.InstanceNotRunning(instance_id=instance_ref['id'])
|
||||
|
||||
# Checing volume node is running when any volumes are mounted
|
||||
# to the instance.
|
||||
@@ -168,9 +167,9 @@ class Scheduler(object):
|
||||
# and dest is not same.
|
||||
src = instance_ref['host']
|
||||
if dest == src:
|
||||
ec2_id = instance_ref['hostname']
|
||||
raise exception.UnableToMigrateToSelf(instance_id=ec2_id,
|
||||
host=dest)
|
||||
raise exception.UnableToMigrateToSelf(
|
||||
instance_id=instance_ref['id'],
|
||||
host=dest)
|
||||
|
||||
# Checking dst host still has enough capacities.
|
||||
self.assert_compute_node_has_enough_resources(context,
|
||||
@@ -245,7 +244,7 @@ class Scheduler(object):
|
||||
"""
|
||||
|
||||
# Getting instance information
|
||||
ec2_id = instance_ref['hostname']
|
||||
hostname = instance_ref['hostname']
|
||||
|
||||
# Getting host information
|
||||
service_refs = db.service_get_all_compute_by_host(context, dest)
|
||||
@@ -256,8 +255,9 @@ class Scheduler(object):
|
||||
mem_avail = mem_total - mem_used
|
||||
mem_inst = instance_ref['memory_mb']
|
||||
if mem_avail <= mem_inst:
|
||||
reason = _("Unable to migrate %(ec2_id)s to destination: %(dest)s "
|
||||
"(host:%(mem_avail)s <= instance:%(mem_inst)s)")
|
||||
reason = _("Unable to migrate %(hostname)s to destination: "
|
||||
"%(dest)s (host:%(mem_avail)s <= instance:"
|
||||
"%(mem_inst)s)")
|
||||
raise exception.MigrationError(reason=reason % locals())
|
||||
|
||||
def mounted_on_same_shared_storage(self, context, instance_ref, dest):
|
||||
|
||||
@@ -93,6 +93,26 @@ class InstanceTypeFilter(HostFilter):
|
||||
"""Use instance_type to filter hosts."""
|
||||
return (self._full_name(), instance_type)
|
||||
|
||||
def _satisfies_extra_specs(self, capabilities, instance_type):
|
||||
"""Check that the capabilities provided by the compute service
|
||||
satisfy the extra specs associated with the instance type"""
|
||||
|
||||
if 'extra_specs' not in instance_type:
|
||||
return True
|
||||
|
||||
# Note(lorinh): For now, we are just checking exact matching on the
|
||||
# values. Later on, we want to handle numerical
|
||||
# values so we can represent things like number of GPU cards
|
||||
|
||||
try:
|
||||
for key, value in instance_type['extra_specs'].iteritems():
|
||||
if capabilities[key] != value:
|
||||
return False
|
||||
except KeyError:
|
||||
return False
|
||||
|
||||
return True
|
||||
|
||||
def filter_hosts(self, zone_manager, query):
|
||||
"""Return a list of hosts that can create instance_type."""
|
||||
instance_type = query
|
||||
@@ -103,7 +123,11 @@ class InstanceTypeFilter(HostFilter):
|
||||
disk_bytes = capabilities['disk_available']
|
||||
spec_ram = instance_type['memory_mb']
|
||||
spec_disk = instance_type['local_gb']
|
||||
if host_ram_mb >= spec_ram and disk_bytes >= spec_disk:
|
||||
extra_specs = instance_type['extra_specs']
|
||||
|
||||
if host_ram_mb >= spec_ram and \
|
||||
disk_bytes >= spec_disk and \
|
||||
self._satisfies_extra_specs(capabilities, instance_type):
|
||||
selected_hosts.append((host, capabilities))
|
||||
return selected_hosts
|
||||
|
||||
@@ -227,8 +251,7 @@ class JsonFilter(HostFilter):
|
||||
required_disk = instance_type['local_gb']
|
||||
query = ['and',
|
||||
['>=', '$compute.host_memory_free', required_ram],
|
||||
['>=', '$compute.disk_available', required_disk],
|
||||
]
|
||||
['>=', '$compute.disk_available', required_disk]]
|
||||
return (self._full_name(), json.dumps(query))
|
||||
|
||||
def _parse_string(self, string, host, services):
|
||||
@@ -305,8 +328,9 @@ class HostFilterScheduler(zone_aware_scheduler.ZoneAwareScheduler):
|
||||
'instance_type': <InstanceType dict>}
|
||||
"""
|
||||
|
||||
def filter_hosts(self, num, request_spec):
|
||||
def filter_hosts(self, topic, request_spec, hosts=None):
|
||||
"""Filter the full host list (from the ZoneManager)"""
|
||||
|
||||
filter_name = request_spec.get('filter', None)
|
||||
host_filter = choose_host_filter(filter_name)
|
||||
|
||||
@@ -317,8 +341,9 @@ class HostFilterScheduler(zone_aware_scheduler.ZoneAwareScheduler):
|
||||
name, query = host_filter.instance_type_to_filter(instance_type)
|
||||
return host_filter.filter_hosts(self.zone_manager, query)
|
||||
|
||||
def weigh_hosts(self, num, request_spec, hosts):
|
||||
def weigh_hosts(self, topic, request_spec, hosts):
|
||||
"""Derived classes must override this method and return
|
||||
a lists of hosts in [{weight, hostname}] format.
|
||||
"""
|
||||
return [dict(weight=1, hostname=host) for host, caps in hosts]
|
||||
return [dict(weight=1, hostname=hostname, capabilities=caps)
|
||||
for hostname, caps in hosts]
|
||||
|
||||
@@ -48,25 +48,43 @@ def noop_cost_fn(host):
|
||||
return 1
|
||||
|
||||
|
||||
flags.DEFINE_integer('fill_first_cost_fn_weight', 1,
|
||||
flags.DEFINE_integer('compute_fill_first_cost_fn_weight', 1,
|
||||
'How much weight to give the fill-first cost function')
|
||||
|
||||
|
||||
def fill_first_cost_fn(host):
|
||||
def compute_fill_first_cost_fn(host):
|
||||
"""Prefer hosts that have less ram available, filter_hosts will exclude
|
||||
hosts that don't have enough ram"""
|
||||
hostname, caps = host
|
||||
free_mem = caps['compute']['host_memory_free']
|
||||
free_mem = caps['host_memory_free']
|
||||
return free_mem
|
||||
|
||||
|
||||
class LeastCostScheduler(zone_aware_scheduler.ZoneAwareScheduler):
|
||||
def get_cost_fns(self):
|
||||
def __init__(self, *args, **kwargs):
|
||||
self.cost_fns_cache = {}
|
||||
super(LeastCostScheduler, self).__init__(*args, **kwargs)
|
||||
|
||||
def get_cost_fns(self, topic):
|
||||
"""Returns a list of tuples containing weights and cost functions to
|
||||
use for weighing hosts
|
||||
"""
|
||||
|
||||
if topic in self.cost_fns_cache:
|
||||
return self.cost_fns_cache[topic]
|
||||
|
||||
cost_fns = []
|
||||
for cost_fn_str in FLAGS.least_cost_scheduler_cost_functions:
|
||||
if '.' in cost_fn_str:
|
||||
short_name = cost_fn_str.split('.')[-1]
|
||||
else:
|
||||
short_name = cost_fn_str
|
||||
cost_fn_str = "%s.%s.%s" % (
|
||||
__name__, self.__class__.__name__, short_name)
|
||||
|
||||
if not (short_name.startswith('%s_' % topic) or
|
||||
short_name.startswith('noop')):
|
||||
continue
|
||||
|
||||
try:
|
||||
# NOTE(sirp): import_class is somewhat misnamed since it can
|
||||
@@ -84,23 +102,23 @@ class LeastCostScheduler(zone_aware_scheduler.ZoneAwareScheduler):
|
||||
|
||||
cost_fns.append((weight, cost_fn))
|
||||
|
||||
self.cost_fns_cache[topic] = cost_fns
|
||||
return cost_fns
|
||||
|
||||
def weigh_hosts(self, num, request_spec, hosts):
|
||||
def weigh_hosts(self, topic, request_spec, hosts):
|
||||
"""Returns a list of dictionaries of form:
|
||||
[ {weight: weight, hostname: hostname} ]"""
|
||||
[ {weight: weight, hostname: hostname, capabilities: capabs} ]
|
||||
"""
|
||||
|
||||
# FIXME(sirp): weigh_hosts should handle more than just instances
|
||||
hostnames = [hostname for hostname, caps in hosts]
|
||||
|
||||
cost_fns = self.get_cost_fns()
|
||||
cost_fns = self.get_cost_fns(topic)
|
||||
costs = weighted_sum(domain=hosts, weighted_fns=cost_fns)
|
||||
|
||||
weighted = []
|
||||
weight_log = []
|
||||
for cost, hostname in zip(costs, hostnames):
|
||||
for cost, (hostname, caps) in zip(costs, hosts):
|
||||
weight_log.append("%s: %s" % (hostname, "%.2f" % cost))
|
||||
weight_dict = dict(weight=cost, hostname=hostname)
|
||||
weight_dict = dict(weight=cost, hostname=hostname,
|
||||
capabilities=caps)
|
||||
weighted.append(weight_dict)
|
||||
|
||||
LOG.debug(_("Weighted Costs => %s") % weight_log)
|
||||
@@ -127,7 +145,8 @@ def weighted_sum(domain, weighted_fns, normalize=True):
|
||||
weighted_fns - list of weights and functions like:
|
||||
[(weight, objective-functions)]
|
||||
|
||||
Returns an unsorted of scores. To pair with hosts do: zip(scores, hosts)
|
||||
Returns an unsorted list of scores. To pair with hosts do:
|
||||
zip(scores, hosts)
|
||||
"""
|
||||
# Table of form:
|
||||
# { domain1: [score1, score2, ..., scoreM]
|
||||
@@ -150,7 +169,6 @@ def weighted_sum(domain, weighted_fns, normalize=True):
|
||||
domain_scores = []
|
||||
for idx in sorted(score_table):
|
||||
elem_score = sum(score_table[idx])
|
||||
elem = domain[idx]
|
||||
domain_scores.append(elem_score)
|
||||
|
||||
return domain_scores
|
||||
|
||||
@@ -33,6 +33,7 @@ from nova import flags
|
||||
from nova import log as logging
|
||||
from nova import rpc
|
||||
|
||||
from nova.compute import api as compute_api
|
||||
from nova.scheduler import api
|
||||
from nova.scheduler import driver
|
||||
|
||||
@@ -48,14 +49,25 @@ class InvalidBlob(exception.NovaException):
|
||||
class ZoneAwareScheduler(driver.Scheduler):
|
||||
"""Base class for creating Zone Aware Schedulers."""
|
||||
|
||||
def _call_zone_method(self, context, method, specs):
|
||||
def _call_zone_method(self, context, method, specs, zones):
|
||||
"""Call novaclient zone method. Broken out for testing."""
|
||||
return api.call_zone_method(context, method, specs=specs)
|
||||
return api.call_zone_method(context, method, specs=specs, zones=zones)
|
||||
|
||||
def _provision_resource_locally(self, context, item, instance_id, kwargs):
|
||||
def _provision_resource_locally(self, context, build_plan_item,
|
||||
request_spec, kwargs):
|
||||
"""Create the requested resource in this Zone."""
|
||||
host = item['hostname']
|
||||
host = build_plan_item['hostname']
|
||||
base_options = request_spec['instance_properties']
|
||||
|
||||
# TODO(sandy): I guess someone needs to add block_device_mapping
|
||||
# support at some point? Also, OS API has no concept of security
|
||||
# groups.
|
||||
instance = compute_api.API().create_db_entry_for_new_instance(context,
|
||||
base_options, None, [])
|
||||
|
||||
instance_id = instance['id']
|
||||
kwargs['instance_id'] = instance_id
|
||||
|
||||
rpc.cast(context,
|
||||
db.queue_get_for(context, "compute", host),
|
||||
{"method": "run_instance",
|
||||
@@ -115,8 +127,8 @@ class ZoneAwareScheduler(driver.Scheduler):
|
||||
nova.servers.create(name, image_ref, flavor_id, ipgroup, meta, files,
|
||||
child_blob, reservation_id=reservation_id)
|
||||
|
||||
def _provision_resource_from_blob(self, context, item, instance_id,
|
||||
request_spec, kwargs):
|
||||
def _provision_resource_from_blob(self, context, build_plan_item,
|
||||
instance_id, request_spec, kwargs):
|
||||
"""Create the requested resource locally or in a child zone
|
||||
based on what is stored in the zone blob info.
|
||||
|
||||
@@ -132,12 +144,12 @@ class ZoneAwareScheduler(driver.Scheduler):
|
||||
request."""
|
||||
|
||||
host_info = None
|
||||
if "blob" in item:
|
||||
if "blob" in build_plan_item:
|
||||
# Request was passed in from above. Is it for us?
|
||||
host_info = self._decrypt_blob(item['blob'])
|
||||
elif "child_blob" in item:
|
||||
host_info = self._decrypt_blob(build_plan_item['blob'])
|
||||
elif "child_blob" in build_plan_item:
|
||||
# Our immediate child zone provided this info ...
|
||||
host_info = item
|
||||
host_info = build_plan_item
|
||||
|
||||
if not host_info:
|
||||
raise InvalidBlob()
|
||||
@@ -147,19 +159,44 @@ class ZoneAwareScheduler(driver.Scheduler):
|
||||
self._ask_child_zone_to_create_instance(context, host_info,
|
||||
request_spec, kwargs)
|
||||
else:
|
||||
self._provision_resource_locally(context, host_info,
|
||||
instance_id, kwargs)
|
||||
self._provision_resource_locally(context, host_info, request_spec,
|
||||
kwargs)
|
||||
|
||||
def _provision_resource(self, context, item, instance_id, request_spec,
|
||||
kwargs):
|
||||
def _provision_resource(self, context, build_plan_item, instance_id,
|
||||
request_spec, kwargs):
|
||||
"""Create the requested resource in this Zone or a child zone."""
|
||||
if "hostname" in item:
|
||||
self._provision_resource_locally(context, item, instance_id,
|
||||
kwargs)
|
||||
if "hostname" in build_plan_item:
|
||||
self._provision_resource_locally(context, build_plan_item,
|
||||
request_spec, kwargs)
|
||||
return
|
||||
|
||||
self._provision_resource_from_blob(context, item, instance_id,
|
||||
request_spec, kwargs)
|
||||
self._provision_resource_from_blob(context, build_plan_item,
|
||||
instance_id, request_spec, kwargs)
|
||||
|
||||
def _adjust_child_weights(self, child_results, zones):
|
||||
"""Apply the Scale and Offset values from the Zone definition
|
||||
to adjust the weights returned from the child zones. Alters
|
||||
child_results in place.
|
||||
"""
|
||||
for zone, result in child_results:
|
||||
if not result:
|
||||
continue
|
||||
|
||||
for zone_rec in zones:
|
||||
if zone_rec['api_url'] != zone:
|
||||
continue
|
||||
|
||||
for item in result:
|
||||
try:
|
||||
offset = zone_rec['weight_offset']
|
||||
scale = zone_rec['weight_scale']
|
||||
raw_weight = item['weight']
|
||||
cooked_weight = offset + scale * raw_weight
|
||||
item['weight'] = cooked_weight
|
||||
item['raw_weight'] = raw_weight
|
||||
except KeyError:
|
||||
LOG.exception(_("Bad child zone scaling values "
|
||||
"for Zone: %(zone)s") % locals())
|
||||
|
||||
def schedule_run_instance(self, context, instance_id, request_spec,
|
||||
*args, **kwargs):
|
||||
@@ -180,18 +217,22 @@ class ZoneAwareScheduler(driver.Scheduler):
|
||||
request_spec, kwargs)
|
||||
return None
|
||||
|
||||
num_instances = request_spec.get('num_instances', 1)
|
||||
LOG.debug(_("Attempting to build %(num_instances)d instance(s)") %
|
||||
locals())
|
||||
|
||||
# Create build plan and provision ...
|
||||
build_plan = self.select(context, request_spec)
|
||||
if not build_plan:
|
||||
raise driver.NoValidHost(_('No hosts were available'))
|
||||
|
||||
for num in xrange(request_spec['num_instances']):
|
||||
for num in xrange(num_instances):
|
||||
if not build_plan:
|
||||
break
|
||||
|
||||
item = build_plan.pop(0)
|
||||
self._provision_resource(context, item, instance_id, request_spec,
|
||||
kwargs)
|
||||
build_plan_item = build_plan.pop(0)
|
||||
self._provision_resource(context, build_plan_item, instance_id,
|
||||
request_spec, kwargs)
|
||||
|
||||
# Returning None short-circuits the routing to Compute (since
|
||||
# we've already done it here)
|
||||
@@ -224,23 +265,43 @@ class ZoneAwareScheduler(driver.Scheduler):
|
||||
raise NotImplemented(_("Zone Aware Scheduler only understands "
|
||||
"Compute nodes (for now)"))
|
||||
|
||||
#TODO(sandy): how to infer this from OS API params?
|
||||
num_instances = 1
|
||||
num_instances = request_spec.get('num_instances', 1)
|
||||
instance_type = request_spec['instance_type']
|
||||
|
||||
# Filter local hosts based on requirements ...
|
||||
host_list = self.filter_hosts(num_instances, request_spec)
|
||||
weighted = []
|
||||
host_list = None
|
||||
|
||||
# TODO(sirp): weigh_hosts should also be a function of 'topic' or
|
||||
# resources, so that we can apply different objective functions to it
|
||||
for i in xrange(num_instances):
|
||||
# Filter local hosts based on requirements ...
|
||||
#
|
||||
# The first pass through here will pass 'None' as the
|
||||
# host_list.. which tells the filter to build the full
|
||||
# list of hosts.
|
||||
# On a 2nd pass, the filter can modify the host_list with
|
||||
# any updates it needs to make based on resources that
|
||||
# may have been consumed from a previous build..
|
||||
host_list = self.filter_hosts(topic, request_spec, host_list)
|
||||
if not host_list:
|
||||
LOG.warn(_("Filter returned no hosts after processing "
|
||||
"%(i)d of %(num_instances)d instances") % locals())
|
||||
break
|
||||
|
||||
# then weigh the selected hosts.
|
||||
# weighted = [{weight=weight, name=hostname}, ...]
|
||||
weighted = self.weigh_hosts(num_instances, request_spec, host_list)
|
||||
# then weigh the selected hosts.
|
||||
# weighted = [{weight=weight, hostname=hostname,
|
||||
# capabilities=capabs}, ...]
|
||||
weights = self.weigh_hosts(topic, request_spec, host_list)
|
||||
weights.sort(key=operator.itemgetter('weight'))
|
||||
best_weight = weights[0]
|
||||
weighted.append(best_weight)
|
||||
self.consume_resources(topic, best_weight['capabilities'],
|
||||
instance_type)
|
||||
|
||||
# Next, tack on the best weights from the child zones ...
|
||||
json_spec = json.dumps(request_spec)
|
||||
all_zones = db.zone_get_all(context)
|
||||
child_results = self._call_zone_method(context, "select",
|
||||
specs=json_spec)
|
||||
specs=json_spec, zones=all_zones)
|
||||
self._adjust_child_weights(child_results, all_zones)
|
||||
for child_zone, result in child_results:
|
||||
for weighting in result:
|
||||
# Remember the child_zone so we can get back to
|
||||
@@ -254,18 +315,65 @@ class ZoneAwareScheduler(driver.Scheduler):
|
||||
weighted.sort(key=operator.itemgetter('weight'))
|
||||
return weighted
|
||||
|
||||
def filter_hosts(self, num, request_spec):
|
||||
"""Derived classes must override this method and return
|
||||
a list of hosts in [(hostname, capability_dict)] format.
|
||||
def compute_filter(self, hostname, capabilities, request_spec):
|
||||
"""Return whether or not we can schedule to this compute node.
|
||||
Derived classes should override this and return True if the host
|
||||
is acceptable for scheduling.
|
||||
"""
|
||||
# NOTE(sirp): The default logic is the equivalent to AllHostsFilter
|
||||
service_states = self.zone_manager.service_states
|
||||
return [(host, services)
|
||||
for host, services in service_states.iteritems()]
|
||||
instance_type = request_spec['instance_type']
|
||||
requested_mem = instance_type['memory_mb'] * 1024 * 1024
|
||||
return capabilities['host_memory_free'] >= requested_mem
|
||||
|
||||
def weigh_hosts(self, num, request_spec, hosts):
|
||||
def filter_hosts(self, topic, request_spec, host_list=None):
|
||||
"""Return a list of hosts which are acceptable for scheduling.
|
||||
Return value should be a list of (hostname, capability_dict)s.
|
||||
Derived classes may override this, but may find the
|
||||
'<topic>_filter' function more appropriate.
|
||||
"""
|
||||
|
||||
def _default_filter(self, hostname, capabilities, request_spec):
|
||||
"""Default filter function if there's no <topic>_filter"""
|
||||
# NOTE(sirp): The default logic is the equivalent to
|
||||
# AllHostsFilter
|
||||
return True
|
||||
|
||||
filter_func = getattr(self, '%s_filter' % topic, _default_filter)
|
||||
|
||||
if host_list is None:
|
||||
first_run = True
|
||||
host_list = self.zone_manager.service_states.iteritems()
|
||||
else:
|
||||
first_run = False
|
||||
|
||||
filtered_hosts = []
|
||||
for host, services in host_list:
|
||||
if first_run:
|
||||
if topic not in services:
|
||||
continue
|
||||
services = services[topic]
|
||||
if filter_func(host, services, request_spec):
|
||||
filtered_hosts.append((host, services))
|
||||
return filtered_hosts
|
||||
|
||||
def weigh_hosts(self, topic, request_spec, hosts):
|
||||
"""Derived classes may override this to provide more sophisticated
|
||||
scheduling objectives
|
||||
"""
|
||||
# NOTE(sirp): The default logic is the same as the NoopCostFunction
|
||||
return [dict(weight=1, hostname=host) for host, caps in hosts]
|
||||
return [dict(weight=1, hostname=hostname, capabilities=capabilities)
|
||||
for hostname, capabilities in hosts]
|
||||
|
||||
def compute_consume(self, capabilities, instance_type):
|
||||
"""Consume compute resources for selected host"""
|
||||
|
||||
requested_mem = max(instance_type['memory_mb'], 0) * 1024 * 1024
|
||||
capabilities['host_memory_free'] -= requested_mem
|
||||
|
||||
def consume_resources(self, topic, capabilities, instance_type):
|
||||
"""Consume resources for a specific host. 'host' is a tuple
|
||||
of the hostname and the services"""
|
||||
|
||||
consume_func = getattr(self, '%s_consume' % topic, None)
|
||||
if not consume_func:
|
||||
return
|
||||
consume_func(capabilities, instance_type)
|
||||
|
||||
+101
-76
@@ -19,10 +19,12 @@
|
||||
|
||||
"""Generic Node baseclass for all workers that run on hosts."""
|
||||
|
||||
import greenlet
|
||||
import inspect
|
||||
import multiprocessing
|
||||
import os
|
||||
|
||||
import greenlet
|
||||
|
||||
from eventlet import greenthread
|
||||
|
||||
from nova import context
|
||||
@@ -36,6 +38,8 @@ from nova import version
|
||||
from nova import wsgi
|
||||
|
||||
|
||||
LOG = logging.getLogger('nova.service')
|
||||
|
||||
FLAGS = flags.FLAGS
|
||||
flags.DEFINE_integer('report_interval', 10,
|
||||
'seconds between nodes reporting state to datastore',
|
||||
@@ -53,6 +57,63 @@ flags.DEFINE_string('api_paste_config', "api-paste.ini",
|
||||
'File name for the paste.deploy config for nova-api')
|
||||
|
||||
|
||||
class Launcher(object):
|
||||
"""Launch one or more services and wait for them to complete."""
|
||||
|
||||
def __init__(self):
|
||||
"""Initialize the service launcher.
|
||||
|
||||
:returns: None
|
||||
|
||||
"""
|
||||
self._services = []
|
||||
|
||||
@staticmethod
|
||||
def run_service(service):
|
||||
"""Start and wait for a service to finish.
|
||||
|
||||
:param service: Service to run and wait for.
|
||||
:returns: None
|
||||
|
||||
"""
|
||||
service.start()
|
||||
try:
|
||||
service.wait()
|
||||
except KeyboardInterrupt:
|
||||
service.stop()
|
||||
|
||||
def launch_service(self, service):
|
||||
"""Load and start the given service.
|
||||
|
||||
:param service: The service you would like to start.
|
||||
:returns: None
|
||||
|
||||
"""
|
||||
process = multiprocessing.Process(target=self.run_service,
|
||||
args=(service,))
|
||||
process.start()
|
||||
self._services.append(process)
|
||||
|
||||
def stop(self):
|
||||
"""Stop all services which are currently running.
|
||||
|
||||
:returns: None
|
||||
|
||||
"""
|
||||
for service in self._services:
|
||||
if service.is_alive():
|
||||
service.terminate()
|
||||
|
||||
def wait(self):
|
||||
"""Waits until all services have been stopped, and then returns.
|
||||
|
||||
:returns: None
|
||||
|
||||
"""
|
||||
for service in self._services:
|
||||
service.join()
|
||||
|
||||
|
||||
class Service(object):
|
||||
"""Base class for workers that run on hosts."""
|
||||
|
||||
@@ -232,45 +293,54 @@ class Service(object):
|
||||
logging.exception(_('model server went away'))
|
||||
|
||||
|
||||
class WsgiService(object):
|
||||
"""Base class for WSGI based services.
|
||||
class WSGIService(object):
|
||||
"""Provides ability to launch API from a 'paste' configuration."""
|
||||
|
||||
For each api you define, you must also define these flags:
|
||||
:<api>_listen: The address on which to listen
|
||||
:<api>_listen_port: The port on which to listen
|
||||
def __init__(self, name, loader=None):
|
||||
"""Initialize, but do not start the WSGI service.
|
||||
|
||||
"""
|
||||
:param name: The name of the WSGI service given to the loader.
|
||||
:param loader: Loads the WSGI application using the given name.
|
||||
:returns: None
|
||||
|
||||
def __init__(self, conf, apis):
|
||||
self.conf = conf
|
||||
self.apis = apis
|
||||
self.wsgi_app = None
|
||||
"""
|
||||
self.name = name
|
||||
self.loader = loader or wsgi.Loader()
|
||||
self.app = self.loader.load_app(name)
|
||||
self.host = getattr(FLAGS, '%s_listen' % name, "0.0.0.0")
|
||||
self.port = getattr(FLAGS, '%s_listen_port' % name, 0)
|
||||
self.server = wsgi.Server(name,
|
||||
self.app,
|
||||
host=self.host,
|
||||
port=self.port)
|
||||
|
||||
def start(self):
|
||||
self.wsgi_app = _run_wsgi(self.conf, self.apis)
|
||||
"""Start serving this service using loaded configuration.
|
||||
|
||||
Also, retrieve updated port number in case '0' was passed in, which
|
||||
indicates a random port should be used.
|
||||
|
||||
:returns: None
|
||||
|
||||
"""
|
||||
self.server.start()
|
||||
self.port = self.server.port
|
||||
|
||||
def stop(self):
|
||||
"""Stop serving this API.
|
||||
|
||||
:returns: None
|
||||
|
||||
"""
|
||||
self.server.stop()
|
||||
|
||||
def wait(self):
|
||||
self.wsgi_app.wait()
|
||||
"""Wait for the service to stop serving this API.
|
||||
|
||||
def get_socket_info(self, api_name):
|
||||
"""Returns the (host, port) that an API was started on."""
|
||||
return self.wsgi_app.socket_info[api_name]
|
||||
:returns: None
|
||||
|
||||
|
||||
class ApiService(WsgiService):
|
||||
"""Class for our nova-api service."""
|
||||
|
||||
@classmethod
|
||||
def create(cls, conf=None):
|
||||
if not conf:
|
||||
conf = wsgi.paste_config_file(FLAGS.api_paste_config)
|
||||
if not conf:
|
||||
message = (_('No paste configuration found for: %s'),
|
||||
FLAGS.api_paste_config)
|
||||
raise exception.Error(message)
|
||||
api_endpoints = ['ec2', 'osapi']
|
||||
service = cls(conf, api_endpoints)
|
||||
return service
|
||||
"""
|
||||
self.server.wait()
|
||||
|
||||
|
||||
def serve(*services):
|
||||
@@ -302,48 +372,3 @@ def serve(*services):
|
||||
def wait():
|
||||
while True:
|
||||
greenthread.sleep(5)
|
||||
|
||||
|
||||
def serve_wsgi(cls, conf=None):
|
||||
try:
|
||||
service = cls.create(conf)
|
||||
except Exception:
|
||||
logging.exception('in WsgiService.create()')
|
||||
raise
|
||||
finally:
|
||||
# After we've loaded up all our dynamic bits, check
|
||||
# whether we should print help
|
||||
flags.DEFINE_flag(flags.HelpFlag())
|
||||
flags.DEFINE_flag(flags.HelpshortFlag())
|
||||
flags.DEFINE_flag(flags.HelpXMLFlag())
|
||||
FLAGS.ParseNewFlags()
|
||||
|
||||
service.start()
|
||||
|
||||
return service
|
||||
|
||||
|
||||
def _run_wsgi(paste_config_file, apis):
|
||||
logging.debug(_('Using paste.deploy config at: %s'), paste_config_file)
|
||||
apps = []
|
||||
for api in apis:
|
||||
config = wsgi.load_paste_configuration(paste_config_file, api)
|
||||
if config is None:
|
||||
logging.debug(_('No paste configuration for app: %s'), api)
|
||||
continue
|
||||
logging.debug(_('App Config: %(api)s\n%(config)r') % locals())
|
||||
logging.info(_('Running %s API'), api)
|
||||
app = wsgi.load_paste_app(paste_config_file, api)
|
||||
apps.append((app,
|
||||
getattr(FLAGS, '%s_listen_port' % api),
|
||||
getattr(FLAGS, '%s_listen' % api),
|
||||
api))
|
||||
if len(apps) == 0:
|
||||
logging.error(_('No known API applications configured in %s.'),
|
||||
paste_config_file)
|
||||
return
|
||||
|
||||
server = wsgi.Server()
|
||||
for app in apps:
|
||||
server.start(*app)
|
||||
return server
|
||||
|
||||
+19
-23
@@ -30,15 +30,17 @@ import uuid
|
||||
import unittest
|
||||
|
||||
import mox
|
||||
import nose.plugins.skip
|
||||
import shutil
|
||||
import stubout
|
||||
from eventlet import greenthread
|
||||
|
||||
from nova import fakerabbit
|
||||
from nova import flags
|
||||
from nova import log
|
||||
from nova import rpc
|
||||
from nova import utils
|
||||
from nova import service
|
||||
from nova import wsgi
|
||||
from nova.virt import fake
|
||||
|
||||
|
||||
@@ -48,6 +50,22 @@ flags.DEFINE_string('sqlite_clean_db', 'clean.sqlite',
|
||||
flags.DEFINE_bool('fake_tests', True,
|
||||
'should we use everything for testing')
|
||||
|
||||
LOG = log.getLogger('nova.tests')
|
||||
|
||||
|
||||
class skip_test(object):
|
||||
"""Decorator that skips a test."""
|
||||
def __init__(self, msg):
|
||||
self.message = msg
|
||||
|
||||
def __call__(self, func):
|
||||
def _skipper(*args, **kw):
|
||||
"""Wrapped skipper function."""
|
||||
raise nose.SkipTest(self.message)
|
||||
_skipper.__name__ = func.__name__
|
||||
_skipper.__doc__ = func.__doc__
|
||||
return _skipper
|
||||
|
||||
|
||||
def skip_if_fake(func):
|
||||
"""Decorator that skips a test if running in fake mode."""
|
||||
@@ -81,7 +99,6 @@ class TestCase(unittest.TestCase):
|
||||
self.injected = []
|
||||
self._services = []
|
||||
self._monkey_patch_attach()
|
||||
self._monkey_patch_wsgi()
|
||||
self._original_flags = FLAGS.FlagValuesDict()
|
||||
rpc.ConnectionPool = rpc.Pool(max_size=FLAGS.rpc_conn_pool_size)
|
||||
|
||||
@@ -107,7 +124,6 @@ class TestCase(unittest.TestCase):
|
||||
|
||||
# Reset our monkey-patches
|
||||
rpc.Consumer.attach_to_eventlet = self.original_attach
|
||||
wsgi.Server.start = self.original_start
|
||||
|
||||
# Stop any timers
|
||||
for x in self.injected:
|
||||
@@ -163,26 +179,6 @@ class TestCase(unittest.TestCase):
|
||||
_wrapped.func_name = self.original_attach.func_name
|
||||
rpc.Consumer.attach_to_eventlet = _wrapped
|
||||
|
||||
def _monkey_patch_wsgi(self):
|
||||
"""Allow us to kill servers spawned by wsgi.Server."""
|
||||
self.original_start = wsgi.Server.start
|
||||
|
||||
@functools.wraps(self.original_start)
|
||||
def _wrapped_start(inner_self, *args, **kwargs):
|
||||
original_spawn_n = inner_self.pool.spawn_n
|
||||
|
||||
@functools.wraps(original_spawn_n)
|
||||
def _wrapped_spawn_n(*args, **kwargs):
|
||||
rv = greenthread.spawn(*args, **kwargs)
|
||||
self._services.append(rv)
|
||||
|
||||
inner_self.pool.spawn_n = _wrapped_spawn_n
|
||||
self.original_start(inner_self, *args, **kwargs)
|
||||
inner_self.pool.spawn_n = original_spawn_n
|
||||
|
||||
_wrapped_start.func_name = self.original_start.func_name
|
||||
wsgi.Server.start = _wrapped_start
|
||||
|
||||
# Useful assertions
|
||||
def assertDictMatch(self, d1, d2, approx_equal=False, tolerance=0.001):
|
||||
"""Assert two dicts are equivalent.
|
||||
|
||||
+17
-9
@@ -42,6 +42,7 @@ def setup():
|
||||
|
||||
from nova import context
|
||||
from nova import flags
|
||||
from nova import db
|
||||
from nova.db import migration
|
||||
from nova.network import manager as network_manager
|
||||
from nova.tests import fake_flags
|
||||
@@ -50,17 +51,24 @@ def setup():
|
||||
|
||||
testdb = os.path.join(FLAGS.state_path, FLAGS.sqlite_db)
|
||||
if os.path.exists(testdb):
|
||||
os.unlink(testdb)
|
||||
return
|
||||
migration.db_sync()
|
||||
ctxt = context.get_admin_context()
|
||||
network_manager.VlanManager().create_networks(ctxt,
|
||||
FLAGS.fixed_range,
|
||||
FLAGS.num_networks,
|
||||
FLAGS.network_size,
|
||||
FLAGS.fixed_range_v6,
|
||||
FLAGS.vlan_start,
|
||||
FLAGS.vpn_start,
|
||||
)
|
||||
network = network_manager.VlanManager()
|
||||
bridge_interface = FLAGS.flat_interface or FLAGS.vlan_interface
|
||||
network.create_networks(ctxt,
|
||||
label='test',
|
||||
cidr=FLAGS.fixed_range,
|
||||
num_networks=FLAGS.num_networks,
|
||||
network_size=FLAGS.network_size,
|
||||
cidr_v6=FLAGS.fixed_range_v6,
|
||||
gateway_v6=FLAGS.gateway_v6,
|
||||
bridge=FLAGS.flat_network_bridge,
|
||||
bridge_interface=bridge_interface,
|
||||
vpn_start=FLAGS.vpn_start,
|
||||
vlan_start=FLAGS.vlan_start)
|
||||
for net in db.network_get_all(ctxt):
|
||||
network.set_network_host(ctxt, net['id'])
|
||||
|
||||
cleandb = os.path.join(FLAGS.state_path, FLAGS.sqlite_clean_db)
|
||||
shutil.copyfile(testdb, cleandb)
|
||||
|
||||
@@ -0,0 +1,19 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2011 Openstack LLC.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
# NOTE(vish): this forces the fixtures from tests/__init.py:setup() to work
|
||||
from nova.tests import *
|
||||
|
||||
@@ -15,6 +15,9 @@
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
# NOTE(vish): this forces the fixtures from tests/__init.py:setup() to work
|
||||
from nova.tests import *
|
||||
|
||||
import webob.dec
|
||||
from nova import test
|
||||
|
||||
|
||||
@@ -0,0 +1,15 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2011 OpenStack LLC
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
@@ -0,0 +1,186 @@
|
||||
# Copyright 2011 Eldar Nugaev
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import json
|
||||
import stubout
|
||||
import webob
|
||||
|
||||
from nova import context
|
||||
from nova import db
|
||||
from nova import test
|
||||
from nova import network
|
||||
from nova.tests.api.openstack import fakes
|
||||
|
||||
|
||||
from nova.api.openstack.contrib.floating_ips import FloatingIPController
|
||||
from nova.api.openstack.contrib.floating_ips import _translate_floating_ip_view
|
||||
|
||||
|
||||
def network_api_get_floating_ip(self, context, id):
|
||||
return {'id': 1, 'address': '10.10.10.10',
|
||||
'fixed_ip': {'address': '11.0.0.1'}}
|
||||
|
||||
|
||||
def network_api_list_floating_ips(self, context):
|
||||
return [{'id': 1,
|
||||
'address': '10.10.10.10',
|
||||
'instance': {'id': 11},
|
||||
'fixed_ip': {'address': '10.0.0.1'}},
|
||||
{'id': 2,
|
||||
'address': '10.10.10.11'}]
|
||||
|
||||
|
||||
def network_api_allocate(self, context):
|
||||
return '10.10.10.10'
|
||||
|
||||
|
||||
def network_api_release(self, context, address):
|
||||
pass
|
||||
|
||||
|
||||
def network_api_associate(self, context, floating_ip, fixed_ip):
|
||||
pass
|
||||
|
||||
|
||||
def network_api_disassociate(self, context, floating_address):
|
||||
pass
|
||||
|
||||
|
||||
class FloatingIpTest(test.TestCase):
|
||||
address = "10.10.10.10"
|
||||
|
||||
def _create_floating_ip(self):
|
||||
"""Create a floating ip object."""
|
||||
host = "fake_host"
|
||||
return db.floating_ip_create(self.context,
|
||||
{'address': self.address,
|
||||
'host': host})
|
||||
|
||||
def _delete_floating_ip(self):
|
||||
db.floating_ip_destroy(self.context, self.address)
|
||||
|
||||
def setUp(self):
|
||||
super(FloatingIpTest, self).setUp()
|
||||
self.controller = FloatingIPController()
|
||||
self.stubs = stubout.StubOutForTesting()
|
||||
fakes.FakeAuthManager.reset_fake_data()
|
||||
fakes.FakeAuthDatabase.data = {}
|
||||
fakes.stub_out_networking(self.stubs)
|
||||
fakes.stub_out_rate_limiting(self.stubs)
|
||||
fakes.stub_out_auth(self.stubs)
|
||||
self.stubs.Set(network.api.API, "get_floating_ip",
|
||||
network_api_get_floating_ip)
|
||||
self.stubs.Set(network.api.API, "list_floating_ips",
|
||||
network_api_list_floating_ips)
|
||||
self.stubs.Set(network.api.API, "allocate_floating_ip",
|
||||
network_api_allocate)
|
||||
self.stubs.Set(network.api.API, "release_floating_ip",
|
||||
network_api_release)
|
||||
self.stubs.Set(network.api.API, "associate_floating_ip",
|
||||
network_api_associate)
|
||||
self.stubs.Set(network.api.API, "disassociate_floating_ip",
|
||||
network_api_disassociate)
|
||||
self.context = context.get_admin_context()
|
||||
self._create_floating_ip()
|
||||
|
||||
def tearDown(self):
|
||||
self.stubs.UnsetAll()
|
||||
self._delete_floating_ip()
|
||||
super(FloatingIpTest, self).tearDown()
|
||||
|
||||
def test_translate_floating_ip_view(self):
|
||||
floating_ip_address = self._create_floating_ip()
|
||||
floating_ip = db.floating_ip_get_by_address(self.context,
|
||||
floating_ip_address)
|
||||
view = _translate_floating_ip_view(floating_ip)
|
||||
self.assertTrue('floating_ip' in view)
|
||||
self.assertTrue(view['floating_ip']['id'])
|
||||
self.assertEqual(view['floating_ip']['ip'], self.address)
|
||||
self.assertEqual(view['floating_ip']['fixed_ip'], None)
|
||||
self.assertEqual(view['floating_ip']['instance_id'], None)
|
||||
|
||||
def test_floating_ips_list(self):
|
||||
req = webob.Request.blank('/v1.1/os-floating-ips')
|
||||
res = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(res.status_int, 200)
|
||||
res_dict = json.loads(res.body)
|
||||
response = {'floating_ips': [{'floating_ip': {'instance_id': 11,
|
||||
'ip': '10.10.10.10',
|
||||
'fixed_ip': '10.0.0.1',
|
||||
'id': 1}},
|
||||
{'floating_ip': {'instance_id': None,
|
||||
'ip': '10.10.10.11',
|
||||
'fixed_ip': None,
|
||||
'id': 2}}]}
|
||||
self.assertEqual(res_dict, response)
|
||||
|
||||
def test_floating_ip_show(self):
|
||||
req = webob.Request.blank('/v1.1/os-floating-ips/1')
|
||||
res = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(res.status_int, 200)
|
||||
res_dict = json.loads(res.body)
|
||||
self.assertEqual(res_dict['floating_ip']['id'], 1)
|
||||
self.assertEqual(res_dict['floating_ip']['ip'], '10.10.10.10')
|
||||
self.assertEqual(res_dict['floating_ip']['fixed_ip'], '11.0.0.1')
|
||||
self.assertEqual(res_dict['floating_ip']['instance_id'], None)
|
||||
|
||||
def test_floating_ip_allocate(self):
|
||||
req = webob.Request.blank('/v1.1/os-floating-ips')
|
||||
req.method = 'POST'
|
||||
res = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(res.status_int, 200)
|
||||
ip = json.loads(res.body)['allocated']
|
||||
expected = {
|
||||
"id": 1,
|
||||
"floating_ip": '10.10.10.10'}
|
||||
self.assertEqual(ip, expected)
|
||||
|
||||
def test_floating_ip_release(self):
|
||||
req = webob.Request.blank('/v1.1/os-floating-ips/1')
|
||||
req.method = 'DELETE'
|
||||
res = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(res.status_int, 200)
|
||||
actual = json.loads(res.body)['released']
|
||||
expected = {
|
||||
"id": 1,
|
||||
"floating_ip": '10.10.10.10'}
|
||||
self.assertEqual(actual, expected)
|
||||
|
||||
def test_floating_ip_associate(self):
|
||||
body = dict(associate_address=dict(fixed_ip='1.2.3.4'))
|
||||
req = webob.Request.blank('/v1.1/os-floating-ips/1/associate')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
req.headers["content-type"] = "application/json"
|
||||
|
||||
res = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(res.status_int, 200)
|
||||
actual = json.loads(res.body)['associated']
|
||||
expected = {
|
||||
"floating_ip_id": '1',
|
||||
"floating_ip": "10.10.10.10",
|
||||
"fixed_ip": "1.2.3.4"}
|
||||
self.assertEqual(actual, expected)
|
||||
|
||||
def test_floating_ip_disassociate(self):
|
||||
req = webob.Request.blank('/v1.1/os-floating-ips/1/disassociate')
|
||||
req.method = 'POST'
|
||||
res = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(res.status_int, 200)
|
||||
ip = json.loads(res.body)['disassociated']
|
||||
expected = {
|
||||
"floating_ip": '10.10.10.10',
|
||||
"fixed_ip": '11.0.0.1'}
|
||||
self.assertEqual(ip, expected)
|
||||
@@ -0,0 +1,198 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2011 University of Southern California
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
import json
|
||||
import stubout
|
||||
import unittest
|
||||
import webob
|
||||
import os.path
|
||||
|
||||
|
||||
from nova import flags
|
||||
from nova.api import openstack
|
||||
from nova.api.openstack import auth
|
||||
from nova.api.openstack import extensions
|
||||
from nova.tests.api.openstack import fakes
|
||||
import nova.wsgi
|
||||
|
||||
FLAGS = flags.FLAGS
|
||||
|
||||
|
||||
def return_create_flavor_extra_specs(context, flavor_id, extra_specs):
|
||||
return stub_flavor_extra_specs()
|
||||
|
||||
|
||||
def return_flavor_extra_specs(context, flavor_id):
|
||||
return stub_flavor_extra_specs()
|
||||
|
||||
|
||||
def return_flavor_extra_specs(context, flavor_id):
|
||||
return stub_flavor_extra_specs()
|
||||
|
||||
|
||||
def return_empty_flavor_extra_specs(context, flavor_id):
|
||||
return {}
|
||||
|
||||
|
||||
def delete_flavor_extra_specs(context, flavor_id, key):
|
||||
pass
|
||||
|
||||
|
||||
def stub_flavor_extra_specs():
|
||||
specs = {
|
||||
"key1": "value1",
|
||||
"key2": "value2",
|
||||
"key3": "value3",
|
||||
"key4": "value4",
|
||||
"key5": "value5"}
|
||||
return specs
|
||||
|
||||
|
||||
class FlavorsExtraSpecsTest(unittest.TestCase):
|
||||
|
||||
def setUp(self):
|
||||
super(FlavorsExtraSpecsTest, self).setUp()
|
||||
FLAGS.osapi_extensions_path = os.path.join(os.path.dirname(__file__),
|
||||
"extensions")
|
||||
self.stubs = stubout.StubOutForTesting()
|
||||
fakes.FakeAuthManager.auth_data = {}
|
||||
fakes.FakeAuthDatabase.data = {}
|
||||
fakes.stub_out_auth(self.stubs)
|
||||
fakes.stub_out_key_pair_funcs(self.stubs)
|
||||
self.mware = auth.AuthMiddleware(
|
||||
extensions.ExtensionMiddleware(
|
||||
openstack.APIRouterV11()))
|
||||
|
||||
def tearDown(self):
|
||||
self.stubs.UnsetAll()
|
||||
super(FlavorsExtraSpecsTest, self).tearDown()
|
||||
|
||||
def test_index(self):
|
||||
self.stubs.Set(nova.db.api, 'instance_type_extra_specs_get',
|
||||
return_flavor_extra_specs)
|
||||
request = webob.Request.blank('/flavors/1/os-extra_specs')
|
||||
res = request.get_response(self.mware)
|
||||
self.assertEqual(200, res.status_int)
|
||||
res_dict = json.loads(res.body)
|
||||
self.assertEqual('application/json', res.headers['Content-Type'])
|
||||
self.assertEqual('value1', res_dict['extra_specs']['key1'])
|
||||
|
||||
def test_index_no_data(self):
|
||||
self.stubs.Set(nova.db.api, 'instance_type_extra_specs_get',
|
||||
return_empty_flavor_extra_specs)
|
||||
req = webob.Request.blank('/flavors/1/os-extra_specs')
|
||||
res = req.get_response(self.mware)
|
||||
res_dict = json.loads(res.body)
|
||||
self.assertEqual(200, res.status_int)
|
||||
self.assertEqual('application/json', res.headers['Content-Type'])
|
||||
self.assertEqual(0, len(res_dict['extra_specs']))
|
||||
|
||||
def test_show(self):
|
||||
self.stubs.Set(nova.db.api, 'instance_type_extra_specs_get',
|
||||
return_flavor_extra_specs)
|
||||
req = webob.Request.blank('/flavors/1/os-extra_specs/key5')
|
||||
res = req.get_response(self.mware)
|
||||
self.assertEqual(200, res.status_int)
|
||||
res_dict = json.loads(res.body)
|
||||
self.assertEqual('application/json', res.headers['Content-Type'])
|
||||
self.assertEqual('value5', res_dict['key5'])
|
||||
|
||||
def test_show_spec_not_found(self):
|
||||
self.stubs.Set(nova.db.api, 'instance_type_extra_specs_get',
|
||||
return_empty_flavor_extra_specs)
|
||||
req = webob.Request.blank('/flavors/1/os-extra_specs/key6')
|
||||
res = req.get_response(self.mware)
|
||||
res_dict = json.loads(res.body)
|
||||
self.assertEqual(404, res.status_int)
|
||||
|
||||
def test_delete(self):
|
||||
self.stubs.Set(nova.db.api, 'instance_type_extra_specs_delete',
|
||||
delete_flavor_extra_specs)
|
||||
req = webob.Request.blank('/flavors/1/os-extra_specs/key5')
|
||||
req.method = 'DELETE'
|
||||
res = req.get_response(self.mware)
|
||||
self.assertEqual(200, res.status_int)
|
||||
|
||||
def test_create(self):
|
||||
self.stubs.Set(nova.db.api,
|
||||
'instance_type_extra_specs_update_or_create',
|
||||
return_create_flavor_extra_specs)
|
||||
req = webob.Request.blank('/flavors/1/os-extra_specs')
|
||||
req.method = 'POST'
|
||||
req.body = '{"extra_specs": {"key1": "value1"}}'
|
||||
req.headers["content-type"] = "application/json"
|
||||
res = req.get_response(self.mware)
|
||||
res_dict = json.loads(res.body)
|
||||
self.assertEqual(200, res.status_int)
|
||||
self.assertEqual('application/json', res.headers['Content-Type'])
|
||||
self.assertEqual('value1', res_dict['extra_specs']['key1'])
|
||||
|
||||
def test_create_empty_body(self):
|
||||
self.stubs.Set(nova.db.api,
|
||||
'instance_type_extra_specs_update_or_create',
|
||||
return_create_flavor_extra_specs)
|
||||
req = webob.Request.blank('/flavors/1/os-extra_specs')
|
||||
req.method = 'POST'
|
||||
req.headers["content-type"] = "application/json"
|
||||
res = req.get_response(self.mware)
|
||||
self.assertEqual(400, res.status_int)
|
||||
|
||||
def test_update_item(self):
|
||||
self.stubs.Set(nova.db.api,
|
||||
'instance_type_extra_specs_update_or_create',
|
||||
return_create_flavor_extra_specs)
|
||||
req = webob.Request.blank('/flavors/1/os-extra_specs/key1')
|
||||
req.method = 'PUT'
|
||||
req.body = '{"key1": "value1"}'
|
||||
req.headers["content-type"] = "application/json"
|
||||
res = req.get_response(self.mware)
|
||||
self.assertEqual(200, res.status_int)
|
||||
self.assertEqual('application/json', res.headers['Content-Type'])
|
||||
res_dict = json.loads(res.body)
|
||||
self.assertEqual('value1', res_dict['key1'])
|
||||
|
||||
def test_update_item_empty_body(self):
|
||||
self.stubs.Set(nova.db.api,
|
||||
'instance_type_extra_specs_update_or_create',
|
||||
return_create_flavor_extra_specs)
|
||||
req = webob.Request.blank('/flavors/1/os-extra_specs/key1')
|
||||
req.method = 'PUT'
|
||||
req.headers["content-type"] = "application/json"
|
||||
res = req.get_response(self.mware)
|
||||
self.assertEqual(400, res.status_int)
|
||||
|
||||
def test_update_item_too_many_keys(self):
|
||||
self.stubs.Set(nova.db.api,
|
||||
'instance_type_extra_specs_update_or_create',
|
||||
return_create_flavor_extra_specs)
|
||||
req = webob.Request.blank('/flavors/1/os-extra_specs/key1')
|
||||
req.method = 'PUT'
|
||||
req.body = '{"key1": "value1", "key2": "value2"}'
|
||||
req.headers["content-type"] = "application/json"
|
||||
res = req.get_response(self.mware)
|
||||
self.assertEqual(400, res.status_int)
|
||||
|
||||
def test_update_item_body_uri_mismatch(self):
|
||||
self.stubs.Set(nova.db.api,
|
||||
'instance_type_extra_specs_update_or_create',
|
||||
return_create_flavor_extra_specs)
|
||||
req = webob.Request.blank('/flavors/1/os-extra_specs/bad')
|
||||
req.method = 'PUT'
|
||||
req.body = '{"key1": "value1"}'
|
||||
req.headers["content-type"] = "application/json"
|
||||
res = req.get_response(self.mware)
|
||||
self.assertEqual(400, res.status_int)
|
||||
@@ -16,7 +16,6 @@
|
||||
# under the License.
|
||||
|
||||
import copy
|
||||
import json
|
||||
import random
|
||||
import string
|
||||
|
||||
@@ -29,11 +28,11 @@ from glance.common import exception as glance_exc
|
||||
|
||||
from nova import context
|
||||
from nova import exception as exc
|
||||
from nova import flags
|
||||
from nova import utils
|
||||
import nova.api.openstack.auth
|
||||
from nova.api import openstack
|
||||
from nova.api.openstack import auth
|
||||
from nova.api.openstack import extensions
|
||||
from nova.api.openstack import versions
|
||||
from nova.api.openstack import limits
|
||||
from nova.auth.manager import User, Project
|
||||
@@ -82,7 +81,8 @@ def wsgi_app(inner_app10=None, inner_app11=None):
|
||||
api10 = openstack.FaultWrapper(auth.AuthMiddleware(
|
||||
limits.RateLimitingMiddleware(inner_app10)))
|
||||
api11 = openstack.FaultWrapper(auth.AuthMiddleware(
|
||||
limits.RateLimitingMiddleware(inner_app11)))
|
||||
limits.RateLimitingMiddleware(
|
||||
extensions.ExtensionMiddleware(inner_app11))))
|
||||
mapper['/v1.0'] = api10
|
||||
mapper['/v1.1'] = api11
|
||||
mapper['/'] = openstack.FaultWrapper(versions.Versions())
|
||||
@@ -147,6 +147,16 @@ def stub_out_compute_api_snapshot(stubs):
|
||||
stubs.Set(nova.compute.API, 'snapshot', snapshot)
|
||||
|
||||
|
||||
def stub_out_compute_api_backup(stubs):
|
||||
def backup(self, context, instance_id, name, backup_type, rotation,
|
||||
extra_properties=None):
|
||||
props = dict(instance_id=instance_id, instance_ref=instance_id,
|
||||
backup_type=backup_type, rotation=rotation)
|
||||
props.update(extra_properties or {})
|
||||
return dict(id='123', status='ACTIVE', name=name, properties=props)
|
||||
stubs.Set(nova.compute.API, 'backup', backup)
|
||||
|
||||
|
||||
def stub_out_glance_add_image(stubs, sent_to_glance):
|
||||
"""
|
||||
We return the metadata sent to glance by modifying the sent_to_glance dict
|
||||
|
||||
@@ -161,12 +161,12 @@ class PaginationParamsTest(test.TestCase):
|
||||
def test_no_params(self):
|
||||
""" Test no params. """
|
||||
req = Request.blank('/')
|
||||
self.assertEqual(common.get_pagination_params(req), (0, 0))
|
||||
self.assertEqual(common.get_pagination_params(req), {})
|
||||
|
||||
def test_valid_marker(self):
|
||||
""" Test valid marker param. """
|
||||
req = Request.blank('/?marker=1')
|
||||
self.assertEqual(common.get_pagination_params(req), (1, 0))
|
||||
self.assertEqual(common.get_pagination_params(req), {'marker': 1})
|
||||
|
||||
def test_invalid_marker(self):
|
||||
""" Test invalid marker param. """
|
||||
@@ -177,10 +177,16 @@ class PaginationParamsTest(test.TestCase):
|
||||
def test_valid_limit(self):
|
||||
""" Test valid limit param. """
|
||||
req = Request.blank('/?limit=10')
|
||||
self.assertEqual(common.get_pagination_params(req), (0, 10))
|
||||
self.assertEqual(common.get_pagination_params(req), {'limit': 10})
|
||||
|
||||
def test_invalid_limit(self):
|
||||
""" Test invalid limit param. """
|
||||
req = Request.blank('/?limit=-2')
|
||||
self.assertRaises(
|
||||
webob.exc.HTTPBadRequest, common.get_pagination_params, req)
|
||||
|
||||
def test_valid_limit_and_marker(self):
|
||||
""" Test valid limit and marker parameters. """
|
||||
req = Request.blank('/?limit=20&marker=40')
|
||||
self.assertEqual(common.get_pagination_params(req),
|
||||
{'marker': 40, 'limit': 20})
|
||||
|
||||
@@ -87,6 +87,19 @@ class FlavorsTest(test.TestCase):
|
||||
]
|
||||
self.assertEqual(flavors, expected)
|
||||
|
||||
def test_get_empty_flavor_list_v1_0(self):
|
||||
def _return_empty(self):
|
||||
return {}
|
||||
self.stubs.Set(nova.db.api, "instance_type_get_all",
|
||||
_return_empty)
|
||||
|
||||
req = webob.Request.blank('/v1.0/flavors')
|
||||
res = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(res.status_int, 200)
|
||||
flavors = json.loads(res.body)["flavors"]
|
||||
expected = []
|
||||
self.assertEqual(flavors, expected)
|
||||
|
||||
def test_get_flavor_list_detail_v1_0(self):
|
||||
req = webob.Request.blank('/v1.0/flavors/detail')
|
||||
res = req.get_response(fakes.wsgi_app())
|
||||
@@ -261,3 +274,16 @@ class FlavorsTest(test.TestCase):
|
||||
},
|
||||
]
|
||||
self.assertEqual(flavor, expected)
|
||||
|
||||
def test_get_empty_flavor_list_v1_1(self):
|
||||
def _return_empty(self):
|
||||
return {}
|
||||
self.stubs.Set(nova.db.api, "instance_type_get_all",
|
||||
_return_empty)
|
||||
|
||||
req = webob.Request.blank('/v1.1/flavors')
|
||||
res = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(res.status_int, 200)
|
||||
flavors = json.loads(res.body)["flavors"]
|
||||
expected = []
|
||||
self.assertEqual(flavors, expected)
|
||||
|
||||
@@ -24,6 +24,7 @@ import xml.dom.minidom as minidom
|
||||
|
||||
from nova import flags
|
||||
from nova.api import openstack
|
||||
from nova import test
|
||||
from nova.tests.api.openstack import fakes
|
||||
import nova.wsgi
|
||||
|
||||
@@ -31,7 +32,7 @@ import nova.wsgi
|
||||
FLAGS = flags.FLAGS
|
||||
|
||||
|
||||
class ImageMetaDataTest(unittest.TestCase):
|
||||
class ImageMetaDataTest(test.TestCase):
|
||||
|
||||
IMAGE_FIXTURES = [
|
||||
{'status': 'active',
|
||||
@@ -112,30 +113,6 @@ class ImageMetaDataTest(unittest.TestCase):
|
||||
for (key, value) in res_dict['metadata'].items():
|
||||
self.assertEqual(value, res_dict['metadata'][key])
|
||||
|
||||
def test_index_xml(self):
|
||||
serializer = openstack.image_metadata.ImageMetadataXMLSerializer()
|
||||
fixture = {
|
||||
'metadata': {
|
||||
'one': 'two',
|
||||
'three': 'four',
|
||||
},
|
||||
}
|
||||
output = serializer.index(fixture)
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected = minidom.parseString("""
|
||||
<metadata xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<meta key="three">
|
||||
four
|
||||
</meta>
|
||||
<meta key="one">
|
||||
two
|
||||
</meta>
|
||||
</metadata>
|
||||
""".replace(" ", ""))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_show(self):
|
||||
req = webob.Request.blank('/v1.1/images/1/meta/key1')
|
||||
req.environ['api.version'] = '1.1'
|
||||
@@ -146,24 +123,6 @@ class ImageMetaDataTest(unittest.TestCase):
|
||||
self.assertEqual(len(res_dict['meta']), 1)
|
||||
self.assertEqual('value1', res_dict['meta']['key1'])
|
||||
|
||||
def test_show_xml(self):
|
||||
serializer = openstack.image_metadata.ImageMetadataXMLSerializer()
|
||||
fixture = {
|
||||
'meta': {
|
||||
'one': 'two',
|
||||
},
|
||||
}
|
||||
output = serializer.show(fixture)
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected = minidom.parseString("""
|
||||
<meta xmlns="http://docs.openstack.org/compute/api/v1.1" key="one">
|
||||
two
|
||||
</meta>
|
||||
""".replace(" ", ""))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_show_not_found(self):
|
||||
req = webob.Request.blank('/v1.1/images/1/meta/key9')
|
||||
req.environ['api.version'] = '1.1'
|
||||
@@ -185,34 +144,6 @@ class ImageMetaDataTest(unittest.TestCase):
|
||||
self.assertEqual('value2', res_dict['metadata']['key2'])
|
||||
self.assertEqual(1, len(res_dict))
|
||||
|
||||
def test_create_xml(self):
|
||||
serializer = openstack.image_metadata.ImageMetadataXMLSerializer()
|
||||
fixture = {
|
||||
'metadata': {
|
||||
'key9': 'value9',
|
||||
'key2': 'value2',
|
||||
'key1': 'value1',
|
||||
},
|
||||
}
|
||||
output = serializer.create(fixture)
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected = minidom.parseString("""
|
||||
<metadata xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<meta key="key2">
|
||||
value2
|
||||
</meta>
|
||||
<meta key="key9">
|
||||
value9
|
||||
</meta>
|
||||
<meta key="key1">
|
||||
value1
|
||||
</meta>
|
||||
</metadata>
|
||||
""".replace(" ", ""))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_update_item(self):
|
||||
req = webob.Request.blank('/v1.1/images/1/meta/key1')
|
||||
req.environ['api.version'] = '1.1'
|
||||
@@ -235,24 +166,6 @@ class ImageMetaDataTest(unittest.TestCase):
|
||||
res = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(400, res.status_int)
|
||||
|
||||
def test_update_item_xml(self):
|
||||
serializer = openstack.image_metadata.ImageMetadataXMLSerializer()
|
||||
fixture = {
|
||||
'meta': {
|
||||
'one': 'two',
|
||||
},
|
||||
}
|
||||
output = serializer.update(fixture)
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected = minidom.parseString("""
|
||||
<meta xmlns="http://docs.openstack.org/compute/api/v1.1" key="one">
|
||||
two
|
||||
</meta>
|
||||
""".replace(" ", ""))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_update_item_too_many_keys(self):
|
||||
req = webob.Request.blank('/v1.1/images/1/meta/key1')
|
||||
req.environ['api.version'] = '1.1'
|
||||
@@ -306,3 +219,134 @@ class ImageMetaDataTest(unittest.TestCase):
|
||||
req.headers["content-type"] = "application/json"
|
||||
res = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(400, res.status_int)
|
||||
|
||||
|
||||
class ImageMetadataXMLSerializationTest(test.TestCase):
|
||||
|
||||
def test_index_xml(self):
|
||||
serializer = openstack.image_metadata.ImageMetadataXMLSerializer()
|
||||
fixture = {
|
||||
'metadata': {
|
||||
'one': 'two',
|
||||
'three': 'four',
|
||||
},
|
||||
}
|
||||
output = serializer.serialize(fixture, 'index')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected = minidom.parseString("""
|
||||
<metadata xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<meta key="three">
|
||||
four
|
||||
</meta>
|
||||
<meta key="one">
|
||||
two
|
||||
</meta>
|
||||
</metadata>
|
||||
""".replace(" ", ""))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_index_xml_null(self):
|
||||
serializer = openstack.image_metadata.ImageMetadataXMLSerializer()
|
||||
fixture = {
|
||||
'metadata': {
|
||||
None: None,
|
||||
},
|
||||
}
|
||||
output = serializer.serialize(fixture, 'index')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected = minidom.parseString("""
|
||||
<metadata xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<meta key="None">
|
||||
None
|
||||
</meta>
|
||||
</metadata>
|
||||
""".replace(" ", ""))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_index_xml_unicode(self):
|
||||
serializer = openstack.image_metadata.ImageMetadataXMLSerializer()
|
||||
fixture = {
|
||||
'metadata': {
|
||||
u'three': u'Jos\xe9',
|
||||
},
|
||||
}
|
||||
output = serializer.serialize(fixture, 'index')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected = minidom.parseString(u"""
|
||||
<metadata xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<meta key="three">
|
||||
Jos\xe9
|
||||
</meta>
|
||||
</metadata>
|
||||
""".encode("UTF-8").replace(" ", ""))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_show_xml(self):
|
||||
serializer = openstack.image_metadata.ImageMetadataXMLSerializer()
|
||||
fixture = {
|
||||
'meta': {
|
||||
'one': 'two',
|
||||
},
|
||||
}
|
||||
output = serializer.serialize(fixture, 'show')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected = minidom.parseString("""
|
||||
<meta xmlns="http://docs.openstack.org/compute/api/v1.1" key="one">
|
||||
two
|
||||
</meta>
|
||||
""".replace(" ", ""))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_update_item_xml(self):
|
||||
serializer = openstack.image_metadata.ImageMetadataXMLSerializer()
|
||||
fixture = {
|
||||
'meta': {
|
||||
'one': 'two',
|
||||
},
|
||||
}
|
||||
output = serializer.serialize(fixture, 'update')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected = minidom.parseString("""
|
||||
<meta xmlns="http://docs.openstack.org/compute/api/v1.1" key="one">
|
||||
two
|
||||
</meta>
|
||||
""".replace(" ", ""))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_create_xml(self):
|
||||
serializer = openstack.image_metadata.ImageMetadataXMLSerializer()
|
||||
fixture = {
|
||||
'metadata': {
|
||||
'key9': 'value9',
|
||||
'key2': 'value2',
|
||||
'key1': 'value1',
|
||||
},
|
||||
}
|
||||
output = serializer.serialize(fixture, 'create')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected = minidom.parseString("""
|
||||
<metadata xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<meta key="key2">
|
||||
value2
|
||||
</meta>
|
||||
<meta key="key9">
|
||||
value9
|
||||
</meta>
|
||||
<meta key="key1">
|
||||
value1
|
||||
</meta>
|
||||
</metadata>
|
||||
""".replace(" ", ""))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
@@ -340,6 +340,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
self.fixtures = self._make_image_fixtures()
|
||||
fakes.stub_out_glance(self.stubs, initial_fixtures=self.fixtures)
|
||||
fakes.stub_out_compute_api_snapshot(self.stubs)
|
||||
fakes.stub_out_compute_api_backup(self.stubs)
|
||||
|
||||
def tearDown(self):
|
||||
"""Run after each test."""
|
||||
@@ -364,10 +365,10 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
response_list = response_dict["images"]
|
||||
|
||||
expected = [{'id': 123, 'name': 'public image'},
|
||||
{'id': 124, 'name': 'queued backup'},
|
||||
{'id': 125, 'name': 'saving backup'},
|
||||
{'id': 126, 'name': 'active backup'},
|
||||
{'id': 127, 'name': 'killed backup'},
|
||||
{'id': 124, 'name': 'queued snapshot'},
|
||||
{'id': 125, 'name': 'saving snapshot'},
|
||||
{'id': 126, 'name': 'active snapshot'},
|
||||
{'id': 127, 'name': 'killed snapshot'},
|
||||
{'id': 129, 'name': None}]
|
||||
|
||||
self.assertDictListMatch(response_list, expected)
|
||||
@@ -393,20 +394,25 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
self.assertEqual(expected_image, actual_image)
|
||||
|
||||
def test_get_image_v1_1(self):
|
||||
request = webob.Request.blank('/v1.1/images/123')
|
||||
request = webob.Request.blank('/v1.1/images/124')
|
||||
response = request.get_response(fakes.wsgi_app())
|
||||
|
||||
actual_image = json.loads(response.body)
|
||||
|
||||
href = "http://localhost/v1.1/images/123"
|
||||
href = "http://localhost/v1.1/images/124"
|
||||
|
||||
expected_image = {
|
||||
"image": {
|
||||
"id": 123,
|
||||
"name": "public image",
|
||||
"id": 124,
|
||||
"name": "queued snapshot",
|
||||
"serverRef": "http://localhost/v1.1/servers/42",
|
||||
"updated": self.NOW_API_FORMAT,
|
||||
"created": self.NOW_API_FORMAT,
|
||||
"status": "ACTIVE",
|
||||
"status": "QUEUED",
|
||||
"metadata": {
|
||||
"instance_ref": "http://localhost/v1.1/servers/42",
|
||||
"user_id": "1",
|
||||
},
|
||||
"links": [{
|
||||
"rel": "self",
|
||||
"href": href,
|
||||
@@ -464,34 +470,6 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
|
||||
self.assertEqual(expected_image.toxml(), actual_image.toxml())
|
||||
|
||||
def test_get_image_v1_1_xml(self):
|
||||
request = webob.Request.blank('/v1.1/images/123')
|
||||
request.accept = "application/xml"
|
||||
response = request.get_response(fakes.wsgi_app())
|
||||
|
||||
actual_image = minidom.parseString(response.body.replace(" ", ""))
|
||||
|
||||
expected_href = "http://localhost/v1.1/images/123"
|
||||
expected_now = self.NOW_API_FORMAT
|
||||
expected_image = minidom.parseString("""
|
||||
<image id="123"
|
||||
name="public image"
|
||||
updated="%(expected_now)s"
|
||||
created="%(expected_now)s"
|
||||
status="ACTIVE"
|
||||
xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<links>
|
||||
<link href="%(expected_href)s" rel="self"/>
|
||||
<link href="%(expected_href)s" rel="bookmark"
|
||||
type="application/json" />
|
||||
<link href="%(expected_href)s" rel="bookmark"
|
||||
type="application/xml" />
|
||||
</links>
|
||||
</image>
|
||||
""".replace(" ", "") % (locals()))
|
||||
|
||||
self.assertEqual(expected_image.toxml(), actual_image.toxml())
|
||||
|
||||
def test_get_image_404_json(self):
|
||||
request = webob.Request.blank('/v1.0/images/NonExistantImage')
|
||||
response = request.get_response(fakes.wsgi_app())
|
||||
@@ -617,14 +595,14 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
},
|
||||
{
|
||||
'id': 124,
|
||||
'name': 'queued backup',
|
||||
'name': 'queued snapshot',
|
||||
'updated': self.NOW_API_FORMAT,
|
||||
'created': self.NOW_API_FORMAT,
|
||||
'status': 'QUEUED',
|
||||
},
|
||||
{
|
||||
'id': 125,
|
||||
'name': 'saving backup',
|
||||
'name': 'saving snapshot',
|
||||
'updated': self.NOW_API_FORMAT,
|
||||
'created': self.NOW_API_FORMAT,
|
||||
'status': 'SAVING',
|
||||
@@ -632,14 +610,14 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
},
|
||||
{
|
||||
'id': 126,
|
||||
'name': 'active backup',
|
||||
'name': 'active snapshot',
|
||||
'updated': self.NOW_API_FORMAT,
|
||||
'created': self.NOW_API_FORMAT,
|
||||
'status': 'ACTIVE'
|
||||
},
|
||||
{
|
||||
'id': 127,
|
||||
'name': 'killed backup',
|
||||
'name': 'killed snapshot',
|
||||
'updated': self.NOW_API_FORMAT,
|
||||
'created': self.NOW_API_FORMAT,
|
||||
'status': 'FAILED',
|
||||
@@ -664,6 +642,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
expected = [{
|
||||
'id': 123,
|
||||
'name': 'public image',
|
||||
'metadata': {},
|
||||
'updated': self.NOW_API_FORMAT,
|
||||
'created': self.NOW_API_FORMAT,
|
||||
'status': 'ACTIVE',
|
||||
@@ -684,8 +663,12 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
},
|
||||
{
|
||||
'id': 124,
|
||||
'name': 'queued backup',
|
||||
'serverRef': "http://localhost:8774/v1.1/servers/42",
|
||||
'name': 'queued snapshot',
|
||||
'metadata': {
|
||||
u'instance_ref': u'http://localhost/v1.1/servers/42',
|
||||
u'user_id': u'1',
|
||||
},
|
||||
'serverRef': "http://localhost/v1.1/servers/42",
|
||||
'updated': self.NOW_API_FORMAT,
|
||||
'created': self.NOW_API_FORMAT,
|
||||
'status': 'QUEUED',
|
||||
@@ -706,8 +689,12 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
},
|
||||
{
|
||||
'id': 125,
|
||||
'name': 'saving backup',
|
||||
'serverRef': "http://localhost:8774/v1.1/servers/42",
|
||||
'name': 'saving snapshot',
|
||||
'metadata': {
|
||||
u'instance_ref': u'http://localhost/v1.1/servers/42',
|
||||
u'user_id': u'1',
|
||||
},
|
||||
'serverRef': "http://localhost/v1.1/servers/42",
|
||||
'updated': self.NOW_API_FORMAT,
|
||||
'created': self.NOW_API_FORMAT,
|
||||
'status': 'SAVING',
|
||||
@@ -729,8 +716,12 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
},
|
||||
{
|
||||
'id': 126,
|
||||
'name': 'active backup',
|
||||
'serverRef': "http://localhost:8774/v1.1/servers/42",
|
||||
'name': 'active snapshot',
|
||||
'metadata': {
|
||||
u'instance_ref': u'http://localhost/v1.1/servers/42',
|
||||
u'user_id': u'1',
|
||||
},
|
||||
'serverRef': "http://localhost/v1.1/servers/42",
|
||||
'updated': self.NOW_API_FORMAT,
|
||||
'created': self.NOW_API_FORMAT,
|
||||
'status': 'ACTIVE',
|
||||
@@ -751,8 +742,12 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
},
|
||||
{
|
||||
'id': 127,
|
||||
'name': 'killed backup',
|
||||
'serverRef': "http://localhost:8774/v1.1/servers/42",
|
||||
'name': 'killed snapshot',
|
||||
'metadata': {
|
||||
u'instance_ref': u'http://localhost/v1.1/servers/42',
|
||||
u'user_id': u'1',
|
||||
},
|
||||
'serverRef': "http://localhost/v1.1/servers/42",
|
||||
'updated': self.NOW_API_FORMAT,
|
||||
'created': self.NOW_API_FORMAT,
|
||||
'status': 'FAILED',
|
||||
@@ -774,6 +769,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
{
|
||||
'id': 129,
|
||||
'name': None,
|
||||
'metadata': {},
|
||||
'updated': self.NOW_API_FORMAT,
|
||||
'created': self.NOW_API_FORMAT,
|
||||
'status': 'ACTIVE',
|
||||
@@ -802,7 +798,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
context = object()
|
||||
filters = {'name': 'testname'}
|
||||
image_service.index(
|
||||
context, filters=filters, marker=0, limit=0).AndReturn([])
|
||||
context, filters=filters).AndReturn([])
|
||||
mocker.ReplayAll()
|
||||
request = webob.Request.blank(
|
||||
'/v1.1/images?name=testname')
|
||||
@@ -817,7 +813,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
context = object()
|
||||
filters = {'status': 'ACTIVE'}
|
||||
image_service.index(
|
||||
context, filters=filters, marker=0, limit=0).AndReturn([])
|
||||
context, filters=filters).AndReturn([])
|
||||
mocker.ReplayAll()
|
||||
request = webob.Request.blank(
|
||||
'/v1.1/images?status=ACTIVE')
|
||||
@@ -832,7 +828,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
context = object()
|
||||
filters = {'property-test': '3'}
|
||||
image_service.index(
|
||||
context, filters=filters, marker=0, limit=0).AndReturn([])
|
||||
context, filters=filters).AndReturn([])
|
||||
mocker.ReplayAll()
|
||||
request = webob.Request.blank(
|
||||
'/v1.1/images?property-test=3')
|
||||
@@ -847,7 +843,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
context = object()
|
||||
filters = {'status': 'ACTIVE'}
|
||||
image_service.index(
|
||||
context, filters=filters, marker=0, limit=0).AndReturn([])
|
||||
context, filters=filters).AndReturn([])
|
||||
mocker.ReplayAll()
|
||||
request = webob.Request.blank(
|
||||
'/v1.1/images?status=ACTIVE&UNSUPPORTEDFILTER=testname')
|
||||
@@ -862,7 +858,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
context = object()
|
||||
filters = {}
|
||||
image_service.index(
|
||||
context, filters=filters, marker=0, limit=0).AndReturn([])
|
||||
context, filters=filters).AndReturn([])
|
||||
mocker.ReplayAll()
|
||||
request = webob.Request.blank(
|
||||
'/v1.1/images')
|
||||
@@ -877,7 +873,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
context = object()
|
||||
filters = {'name': 'testname'}
|
||||
image_service.detail(
|
||||
context, filters=filters, marker=0, limit=0).AndReturn([])
|
||||
context, filters=filters).AndReturn([])
|
||||
mocker.ReplayAll()
|
||||
request = webob.Request.blank(
|
||||
'/v1.1/images/detail?name=testname')
|
||||
@@ -892,7 +888,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
context = object()
|
||||
filters = {'status': 'ACTIVE'}
|
||||
image_service.detail(
|
||||
context, filters=filters, marker=0, limit=0).AndReturn([])
|
||||
context, filters=filters).AndReturn([])
|
||||
mocker.ReplayAll()
|
||||
request = webob.Request.blank(
|
||||
'/v1.1/images/detail?status=ACTIVE')
|
||||
@@ -907,7 +903,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
context = object()
|
||||
filters = {'property-test': '3'}
|
||||
image_service.detail(
|
||||
context, filters=filters, marker=0, limit=0).AndReturn([])
|
||||
context, filters=filters).AndReturn([])
|
||||
mocker.ReplayAll()
|
||||
request = webob.Request.blank(
|
||||
'/v1.1/images/detail?property-test=3')
|
||||
@@ -922,7 +918,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
context = object()
|
||||
filters = {'status': 'ACTIVE'}
|
||||
image_service.detail(
|
||||
context, filters=filters, marker=0, limit=0).AndReturn([])
|
||||
context, filters=filters).AndReturn([])
|
||||
mocker.ReplayAll()
|
||||
request = webob.Request.blank(
|
||||
'/v1.1/images/detail?status=ACTIVE&UNSUPPORTEDFILTER=testname')
|
||||
@@ -937,7 +933,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
context = object()
|
||||
filters = {}
|
||||
image_service.detail(
|
||||
context, filters=filters, marker=0, limit=0).AndReturn([])
|
||||
context, filters=filters).AndReturn([])
|
||||
mocker.ReplayAll()
|
||||
request = webob.Request.blank(
|
||||
'/v1.1/images/detail')
|
||||
@@ -969,8 +965,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
self.assertEqual(res.status_int, 404)
|
||||
|
||||
def test_create_image(self):
|
||||
|
||||
body = dict(image=dict(serverId='123', name='Backup 1'))
|
||||
body = dict(image=dict(serverId='123', name='Snapshot 1'))
|
||||
req = webob.Request.blank('/v1.0/images')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
@@ -978,9 +973,95 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
response = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(200, response.status_int)
|
||||
|
||||
def test_create_snapshot_no_name(self):
|
||||
"""Name is required for snapshots"""
|
||||
body = dict(image=dict(serverId='123'))
|
||||
req = webob.Request.blank('/v1.0/images')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
req.headers["content-type"] = "application/json"
|
||||
response = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(400, response.status_int)
|
||||
|
||||
def test_create_backup_no_name(self):
|
||||
"""Name is also required for backups"""
|
||||
body = dict(image=dict(serverId='123', image_type='backup',
|
||||
backup_type='daily', rotation=1))
|
||||
req = webob.Request.blank('/v1.0/images')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
req.headers["content-type"] = "application/json"
|
||||
response = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(400, response.status_int)
|
||||
|
||||
def test_create_backup_with_rotation_and_backup_type(self):
|
||||
"""The happy path for creating backups
|
||||
|
||||
Creating a backup is an admin-only operation, as opposed to snapshots
|
||||
which are available to anybody.
|
||||
"""
|
||||
# FIXME(sirp): teardown needed?
|
||||
FLAGS.allow_admin_api = True
|
||||
|
||||
# FIXME(sirp): should the fact that backups are admin_only be a FLAG
|
||||
body = dict(image=dict(serverId='123', image_type='backup',
|
||||
name='Backup 1',
|
||||
backup_type='daily', rotation=1))
|
||||
req = webob.Request.blank('/v1.0/images')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
req.headers["content-type"] = "application/json"
|
||||
response = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(200, response.status_int)
|
||||
|
||||
def test_create_backup_no_rotation(self):
|
||||
"""Rotation is required for backup requests"""
|
||||
# FIXME(sirp): teardown needed?
|
||||
FLAGS.allow_admin_api = True
|
||||
|
||||
# FIXME(sirp): should the fact that backups are admin_only be a FLAG
|
||||
body = dict(image=dict(serverId='123', name='daily',
|
||||
image_type='backup', backup_type='daily'))
|
||||
req = webob.Request.blank('/v1.0/images')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
req.headers["content-type"] = "application/json"
|
||||
response = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(400, response.status_int)
|
||||
|
||||
def test_create_backup_no_backup_type(self):
|
||||
"""Backup Type (daily or weekly) is required for backup requests"""
|
||||
# FIXME(sirp): teardown needed?
|
||||
FLAGS.allow_admin_api = True
|
||||
|
||||
# FIXME(sirp): should the fact that backups are admin_only be a FLAG
|
||||
body = dict(image=dict(serverId='123', name='daily',
|
||||
image_type='backup', rotation=1))
|
||||
req = webob.Request.blank('/v1.0/images')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
req.headers["content-type"] = "application/json"
|
||||
response = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(400, response.status_int)
|
||||
|
||||
def test_create_image_with_invalid_image_type(self):
|
||||
"""Valid image_types are snapshot | daily | weekly"""
|
||||
# FIXME(sirp): teardown needed?
|
||||
FLAGS.allow_admin_api = True
|
||||
|
||||
# FIXME(sirp): should the fact that backups are admin_only be a FLAG
|
||||
body = dict(image=dict(serverId='123', image_type='monthly',
|
||||
rotation=1))
|
||||
req = webob.Request.blank('/v1.0/images')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
req.headers["content-type"] = "application/json"
|
||||
response = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(400, response.status_int)
|
||||
|
||||
def test_create_image_no_server_id(self):
|
||||
|
||||
body = dict(image=dict(name='Backup 1'))
|
||||
body = dict(image=dict(name='Snapshot 1'))
|
||||
req = webob.Request.blank('/v1.0/images')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
@@ -990,7 +1071,7 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
|
||||
def test_create_image_v1_1(self):
|
||||
|
||||
body = dict(image=dict(serverRef='123', name='Backup 1'))
|
||||
body = dict(image=dict(serverRef='123', name='Snapshot 1'))
|
||||
req = webob.Request.blank('/v1.1/images')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
@@ -1022,42 +1103,9 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
response = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(400, response.status_int)
|
||||
|
||||
def test_create_image_v1_1_xml_serialization(self):
|
||||
|
||||
body = dict(image=dict(serverRef='123', name='Backup 1'))
|
||||
req = webob.Request.blank('/v1.1/images')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
req.headers["content-type"] = "application/json"
|
||||
req.headers["accept"] = "application/xml"
|
||||
response = req.get_response(fakes.wsgi_app())
|
||||
self.assertEqual(200, response.status_int)
|
||||
resp_xml = minidom.parseString(response.body.replace(" ", ""))
|
||||
expected_href = "http://localhost/v1.1/images/123"
|
||||
expected_image = minidom.parseString("""
|
||||
<image
|
||||
created="None"
|
||||
id="123"
|
||||
name="Backup 1"
|
||||
serverRef="http://localhost/v1.1/servers/123"
|
||||
status="ACTIVE"
|
||||
updated="None"
|
||||
xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<links>
|
||||
<link href="%(expected_href)s" rel="self"/>
|
||||
<link href="%(expected_href)s" rel="bookmark"
|
||||
type="application/json" />
|
||||
<link href="%(expected_href)s" rel="bookmark"
|
||||
type="application/xml" />
|
||||
</links>
|
||||
</image>
|
||||
""".replace(" ", "") % (locals()))
|
||||
|
||||
self.assertEqual(expected_image.toxml(), resp_xml.toxml())
|
||||
|
||||
def test_create_image_v1_1_no_server_ref(self):
|
||||
|
||||
body = dict(image=dict(name='Backup 1'))
|
||||
body = dict(image=dict(name='Snapshot 1'))
|
||||
req = webob.Request.blank('/v1.1/images')
|
||||
req.method = 'POST'
|
||||
req.body = json.dumps(body)
|
||||
@@ -1084,19 +1132,21 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
status='active', properties={})
|
||||
image_id += 1
|
||||
|
||||
# Backup for User 1
|
||||
server_ref = 'http://localhost:8774/v1.1/servers/42'
|
||||
backup_properties = {'instance_ref': server_ref, 'user_id': '1'}
|
||||
# Snapshot for User 1
|
||||
server_ref = 'http://localhost/v1.1/servers/42'
|
||||
snapshot_properties = {'instance_ref': server_ref, 'user_id': '1'}
|
||||
for status in ('queued', 'saving', 'active', 'killed'):
|
||||
add_fixture(id=image_id, name='%s backup' % status,
|
||||
add_fixture(id=image_id, name='%s snapshot' % status,
|
||||
is_public=False, status=status,
|
||||
properties=backup_properties)
|
||||
properties=snapshot_properties)
|
||||
image_id += 1
|
||||
|
||||
# Backup for User 2
|
||||
other_backup_properties = {'instance_id': '43', 'user_id': '2'}
|
||||
add_fixture(id=image_id, name='someone elses backup', is_public=False,
|
||||
status='active', properties=other_backup_properties)
|
||||
# Snapshot for User 2
|
||||
other_snapshot_properties = {'instance_id': '43', 'user_id': '2'}
|
||||
add_fixture(id=image_id, name='someone elses snapshot',
|
||||
is_public=False, status='active',
|
||||
properties=other_snapshot_properties)
|
||||
|
||||
image_id += 1
|
||||
|
||||
# Image without a name
|
||||
@@ -1105,3 +1155,382 @@ class ImageControllerWithGlanceServiceTest(test.TestCase):
|
||||
image_id += 1
|
||||
|
||||
return fixtures
|
||||
|
||||
|
||||
class ImageXMLSerializationTest(test.TestCase):
|
||||
|
||||
TIMESTAMP = "2010-10-11T10:30:22Z"
|
||||
SERVER_HREF = 'http://localhost/v1.1/servers/123'
|
||||
IMAGE_HREF = 'http://localhost/v1.1/images/%s'
|
||||
|
||||
def test_show(self):
|
||||
serializer = images.ImageXMLSerializer()
|
||||
|
||||
fixture = {
|
||||
'image': {
|
||||
'id': 1,
|
||||
'name': 'Image1',
|
||||
'created': self.TIMESTAMP,
|
||||
'updated': self.TIMESTAMP,
|
||||
'serverRef': self.SERVER_HREF,
|
||||
'status': 'ACTIVE',
|
||||
'metadata': {
|
||||
'key1': 'value1',
|
||||
},
|
||||
'links': [
|
||||
{
|
||||
'href': self.IMAGE_HREF % (1,),
|
||||
'rel': 'bookmark',
|
||||
'type': 'application/json',
|
||||
},
|
||||
],
|
||||
},
|
||||
}
|
||||
|
||||
output = serializer.serialize(fixture, 'show')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected_server_href = self.SERVER_HREF
|
||||
expected_href = self.IMAGE_HREF % (1, )
|
||||
expected_now = self.TIMESTAMP
|
||||
expected = minidom.parseString("""
|
||||
<image id="1"
|
||||
name="Image1"
|
||||
serverRef="%(expected_server_href)s"
|
||||
updated="%(expected_now)s"
|
||||
created="%(expected_now)s"
|
||||
status="ACTIVE"
|
||||
xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<links>
|
||||
<link href="%(expected_href)s" rel="bookmark"
|
||||
type="application/json" />
|
||||
</links>
|
||||
<metadata>
|
||||
<meta key="key1">
|
||||
value1
|
||||
</meta>
|
||||
</metadata>
|
||||
</image>
|
||||
""".replace(" ", "") % (locals()))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_show_zero_metadata(self):
|
||||
serializer = images.ImageXMLSerializer()
|
||||
|
||||
fixture = {
|
||||
'image': {
|
||||
'id': 1,
|
||||
'name': 'Image1',
|
||||
'created': self.TIMESTAMP,
|
||||
'updated': self.TIMESTAMP,
|
||||
'serverRef': self.SERVER_HREF,
|
||||
'status': 'ACTIVE',
|
||||
'metadata': {},
|
||||
'links': [
|
||||
{
|
||||
'href': self.IMAGE_HREF % (1,),
|
||||
'rel': 'bookmark',
|
||||
'type': 'application/json',
|
||||
},
|
||||
],
|
||||
},
|
||||
}
|
||||
|
||||
output = serializer.serialize(fixture, 'show')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected_server_href = self.SERVER_HREF
|
||||
expected_href = self.IMAGE_HREF % (1, )
|
||||
expected_now = self.TIMESTAMP
|
||||
expected = minidom.parseString("""
|
||||
<image id="1"
|
||||
name="Image1"
|
||||
serverRef="%(expected_server_href)s"
|
||||
updated="%(expected_now)s"
|
||||
created="%(expected_now)s"
|
||||
status="ACTIVE"
|
||||
xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<links>
|
||||
<link href="%(expected_href)s" rel="bookmark"
|
||||
type="application/json" />
|
||||
</links>
|
||||
<metadata />
|
||||
</image>
|
||||
""".replace(" ", "") % (locals()))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_show_image_no_metadata_key(self):
|
||||
serializer = images.ImageXMLSerializer()
|
||||
|
||||
fixture = {
|
||||
'image': {
|
||||
'id': 1,
|
||||
'name': 'Image1',
|
||||
'created': self.TIMESTAMP,
|
||||
'updated': self.TIMESTAMP,
|
||||
'serverRef': self.SERVER_HREF,
|
||||
'status': 'ACTIVE',
|
||||
'links': [
|
||||
{
|
||||
'href': self.IMAGE_HREF % (1,),
|
||||
'rel': 'bookmark',
|
||||
'type': 'application/json',
|
||||
},
|
||||
],
|
||||
|
||||
},
|
||||
}
|
||||
|
||||
output = serializer.serialize(fixture, 'show')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected_server_href = self.SERVER_HREF
|
||||
expected_href = self.IMAGE_HREF % (1, )
|
||||
expected_now = self.TIMESTAMP
|
||||
expected = minidom.parseString("""
|
||||
<image id="1"
|
||||
name="Image1"
|
||||
serverRef="%(expected_server_href)s"
|
||||
updated="%(expected_now)s"
|
||||
created="%(expected_now)s"
|
||||
status="ACTIVE"
|
||||
xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<links>
|
||||
<link href="%(expected_href)s" rel="bookmark"
|
||||
type="application/json" />
|
||||
</links>
|
||||
<metadata />
|
||||
</image>
|
||||
""".replace(" ", "") % (locals()))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_index(self):
|
||||
serializer = images.ImageXMLSerializer()
|
||||
|
||||
fixtures = {
|
||||
'images': [
|
||||
{
|
||||
'id': 1,
|
||||
'name': 'Image1',
|
||||
'created': self.TIMESTAMP,
|
||||
'updated': self.TIMESTAMP,
|
||||
'serverRef': self.SERVER_HREF,
|
||||
'status': 'ACTIVE',
|
||||
'links': [
|
||||
{
|
||||
'href': 'http://localhost/v1.1/images/1',
|
||||
'rel': 'bookmark',
|
||||
'type': 'application/json',
|
||||
},
|
||||
],
|
||||
},
|
||||
{
|
||||
'id': 2,
|
||||
'name': 'queued image',
|
||||
'created': self.TIMESTAMP,
|
||||
'updated': self.TIMESTAMP,
|
||||
'serverRef': self.SERVER_HREF,
|
||||
'status': 'QUEUED',
|
||||
'links': [
|
||||
{
|
||||
'href': 'http://localhost/v1.1/images/2',
|
||||
'rel': 'bookmark',
|
||||
'type': 'application/json',
|
||||
},
|
||||
],
|
||||
},
|
||||
],
|
||||
}
|
||||
|
||||
output = serializer.serialize(fixtures, 'index')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected_serverRef = self.SERVER_HREF
|
||||
expected_now = self.TIMESTAMP
|
||||
expected = minidom.parseString("""
|
||||
<images xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<image id="1"
|
||||
name="Image1"
|
||||
serverRef="%(expected_serverRef)s"
|
||||
updated="%(expected_now)s"
|
||||
created="%(expected_now)s"
|
||||
status="ACTIVE">
|
||||
<links>
|
||||
<link href="http://localhost/v1.1/images/1" rel="bookmark"
|
||||
type="application/json" />
|
||||
</links>
|
||||
</image>
|
||||
<image id="2"
|
||||
name="queued image"
|
||||
serverRef="%(expected_serverRef)s"
|
||||
updated="%(expected_now)s"
|
||||
created="%(expected_now)s"
|
||||
status="QUEUED">
|
||||
<links>
|
||||
<link href="http://localhost/v1.1/images/2" rel="bookmark"
|
||||
type="application/json" />
|
||||
</links>
|
||||
</image>
|
||||
</images>
|
||||
""".replace(" ", "") % (locals()))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_index_zero_images(self):
|
||||
serializer = images.ImageXMLSerializer()
|
||||
|
||||
fixtures = {
|
||||
'images': [],
|
||||
}
|
||||
|
||||
output = serializer.serialize(fixtures, 'index')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected_serverRef = self.SERVER_HREF
|
||||
expected_now = self.TIMESTAMP
|
||||
expected = minidom.parseString("""
|
||||
<images xmlns="http://docs.openstack.org/compute/api/v1.1" />
|
||||
""".replace(" ", "") % (locals()))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_detail(self):
|
||||
serializer = images.ImageXMLSerializer()
|
||||
|
||||
fixtures = {
|
||||
'images': [
|
||||
{
|
||||
'id': 1,
|
||||
'name': 'Image1',
|
||||
'created': self.TIMESTAMP,
|
||||
'updated': self.TIMESTAMP,
|
||||
'serverRef': self.SERVER_HREF,
|
||||
'status': 'ACTIVE',
|
||||
'metadata': {
|
||||
'key1': 'value1',
|
||||
'key2': 'value2',
|
||||
},
|
||||
'links': [
|
||||
{
|
||||
'href': 'http://localhost/v1.1/images/1',
|
||||
'rel': 'bookmark',
|
||||
'type': 'application/json',
|
||||
},
|
||||
],
|
||||
},
|
||||
{
|
||||
'id': 2,
|
||||
'name': 'queued image',
|
||||
'created': self.TIMESTAMP,
|
||||
'updated': self.TIMESTAMP,
|
||||
'serverRef': self.SERVER_HREF,
|
||||
'metadata': {},
|
||||
'status': 'QUEUED',
|
||||
'links': [
|
||||
{
|
||||
'href': 'http://localhost/v1.1/images/2',
|
||||
'rel': 'bookmark',
|
||||
'type': 'application/json',
|
||||
},
|
||||
],
|
||||
},
|
||||
],
|
||||
}
|
||||
|
||||
output = serializer.serialize(fixtures, 'detail')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected_serverRef = self.SERVER_HREF
|
||||
expected_now = self.TIMESTAMP
|
||||
expected = minidom.parseString("""
|
||||
<images xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<image id="1"
|
||||
name="Image1"
|
||||
serverRef="%(expected_serverRef)s"
|
||||
updated="%(expected_now)s"
|
||||
created="%(expected_now)s"
|
||||
status="ACTIVE">
|
||||
<links>
|
||||
<link href="http://localhost/v1.1/images/1" rel="bookmark"
|
||||
type="application/json" />
|
||||
</links>
|
||||
<metadata>
|
||||
<meta key="key2">
|
||||
value2
|
||||
</meta>
|
||||
<meta key="key1">
|
||||
value1
|
||||
</meta>
|
||||
</metadata>
|
||||
</image>
|
||||
<image id="2"
|
||||
name="queued image"
|
||||
serverRef="%(expected_serverRef)s"
|
||||
updated="%(expected_now)s"
|
||||
created="%(expected_now)s"
|
||||
status="QUEUED">
|
||||
<links>
|
||||
<link href="http://localhost/v1.1/images/2" rel="bookmark"
|
||||
type="application/json" />
|
||||
</links>
|
||||
<metadata />
|
||||
</image>
|
||||
</images>
|
||||
""".replace(" ", "") % (locals()))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
def test_create(self):
|
||||
serializer = images.ImageXMLSerializer()
|
||||
|
||||
fixture = {
|
||||
'image': {
|
||||
'id': 1,
|
||||
'name': 'Image1',
|
||||
'created': self.TIMESTAMP,
|
||||
'updated': self.TIMESTAMP,
|
||||
'serverRef': self.SERVER_HREF,
|
||||
'status': 'ACTIVE',
|
||||
'metadata': {
|
||||
'key1': 'value1',
|
||||
},
|
||||
'links': [
|
||||
{
|
||||
'href': self.IMAGE_HREF % (1,),
|
||||
'rel': 'bookmark',
|
||||
'type': 'application/json',
|
||||
},
|
||||
],
|
||||
},
|
||||
}
|
||||
|
||||
output = serializer.serialize(fixture, 'create')
|
||||
actual = minidom.parseString(output.replace(" ", ""))
|
||||
|
||||
expected_server_href = self.SERVER_HREF
|
||||
expected_href = self.IMAGE_HREF % (1, )
|
||||
expected_now = self.TIMESTAMP
|
||||
expected = minidom.parseString("""
|
||||
<image id="1"
|
||||
name="Image1"
|
||||
serverRef="%(expected_server_href)s"
|
||||
updated="%(expected_now)s"
|
||||
created="%(expected_now)s"
|
||||
status="ACTIVE"
|
||||
xmlns="http://docs.openstack.org/compute/api/v1.1">
|
||||
<links>
|
||||
<link href="%(expected_href)s" rel="bookmark"
|
||||
type="application/json" />
|
||||
</links>
|
||||
<metadata>
|
||||
<meta key="key1">
|
||||
value1
|
||||
</meta>
|
||||
</metadata>
|
||||
</image>
|
||||
""".replace(" ", "") % (locals()))
|
||||
|
||||
self.assertEqual(expected.toxml(), actual.toxml())
|
||||
|
||||
@@ -118,7 +118,7 @@ def instance_update(context, instance_id, kwargs):
|
||||
return stub_instance(instance_id)
|
||||
|
||||
|
||||
def instance_address(context, instance_id):
|
||||
def instance_addresses(context, instance_id):
|
||||
return None
|
||||
|
||||
|
||||
@@ -173,7 +173,7 @@ def stub_instance(id, user_id=1, private_address=None, public_addresses=None,
|
||||
"metadata": metadata,
|
||||
"uuid": uuid}
|
||||
|
||||
instance["fixed_ip"] = {
|
||||
instance["fixed_ips"] = {
|
||||
"address": private_address,
|
||||
"floating_ips": [{"address":ip} for ip in public_addresses]}
|
||||
|
||||
@@ -220,10 +220,10 @@ class ServersTest(test.TestCase):
|
||||
self.stubs.Set(nova.db.api, 'instance_add_security_group',
|
||||
return_security_group)
|
||||
self.stubs.Set(nova.db.api, 'instance_update', instance_update)
|
||||
self.stubs.Set(nova.db.api, 'instance_get_fixed_address',
|
||||
instance_address)
|
||||
self.stubs.Set(nova.db.api, 'instance_get_fixed_addresses',
|
||||
instance_addresses)
|
||||
self.stubs.Set(nova.db.api, 'instance_get_floating_address',
|
||||
instance_address)
|
||||
instance_addresses)
|
||||
self.stubs.Set(nova.compute.API, 'pause', fake_compute_api)
|
||||
self.stubs.Set(nova.compute.API, 'unpause', fake_compute_api)
|
||||
self.stubs.Set(nova.compute.API, 'suspend', fake_compute_api)
|
||||
@@ -427,12 +427,13 @@ class ServersTest(test.TestCase):
|
||||
self.assertEqual(res_dict['server']['id'], 1)
|
||||
self.assertEqual(res_dict['server']['name'], 'server1')
|
||||
addresses = res_dict['server']['addresses']
|
||||
self.assertEqual(len(addresses["public"]), len(public))
|
||||
self.assertEqual(addresses["public"][0],
|
||||
{"version": 4, "addr": public[0]})
|
||||
self.assertEqual(len(addresses["private"]), 1)
|
||||
self.assertEqual(addresses["private"][0],
|
||||
{"version": 4, "addr": private})
|
||||
# RM(4047): Figure otu what is up with the 1.1 api and multi-nic
|
||||
#self.assertEqual(len(addresses["public"]), len(public))
|
||||
#self.assertEqual(addresses["public"][0],
|
||||
# {"version": 4, "addr": public[0]})
|
||||
#self.assertEqual(len(addresses["private"]), 1)
|
||||
#self.assertEqual(addresses["private"][0],
|
||||
# {"version": 4, "addr": private})
|
||||
|
||||
def test_get_server_list(self):
|
||||
req = webob.Request.blank('/v1.0/servers')
|
||||
@@ -596,7 +597,7 @@ class ServersTest(test.TestCase):
|
||||
def fake_method(*args, **kwargs):
|
||||
pass
|
||||
|
||||
def project_get_network(context, user_id):
|
||||
def project_get_networks(context, user_id):
|
||||
return dict(id='1', host='localhost')
|
||||
|
||||
def queue_get_for(context, *args):
|
||||
@@ -608,7 +609,8 @@ class ServersTest(test.TestCase):
|
||||
def image_id_from_hash(*args, **kwargs):
|
||||
return 2
|
||||
|
||||
self.stubs.Set(nova.db.api, 'project_get_network', project_get_network)
|
||||
self.stubs.Set(nova.db.api, 'project_get_networks',
|
||||
project_get_networks)
|
||||
self.stubs.Set(nova.db.api, 'instance_create', instance_create)
|
||||
self.stubs.Set(nova.rpc, 'cast', fake_method)
|
||||
self.stubs.Set(nova.rpc, 'call', fake_method)
|
||||
|
||||
@@ -34,7 +34,7 @@ FLAGS.verbose = True
|
||||
|
||||
def zone_get(context, zone_id):
|
||||
return dict(id=1, api_url='http://example.com', username='bob',
|
||||
password='xxx')
|
||||
password='xxx', weight_scale=1.0, weight_offset=0.0)
|
||||
|
||||
|
||||
def zone_create(context, values):
|
||||
@@ -57,9 +57,9 @@ def zone_delete(context, zone_id):
|
||||
def zone_get_all_scheduler(*args):
|
||||
return [
|
||||
dict(id=1, api_url='http://example.com', username='bob',
|
||||
password='xxx'),
|
||||
password='xxx', weight_scale=1.0, weight_offset=0.0),
|
||||
dict(id=2, api_url='http://example.org', username='alice',
|
||||
password='qwerty'),
|
||||
password='qwerty', weight_scale=1.0, weight_offset=0.0),
|
||||
]
|
||||
|
||||
|
||||
@@ -70,9 +70,9 @@ def zone_get_all_scheduler_empty(*args):
|
||||
def zone_get_all_db(context):
|
||||
return [
|
||||
dict(id=1, api_url='http://example.com', username='bob',
|
||||
password='xxx'),
|
||||
password='xxx', weight_scale=1.0, weight_offset=0.0),
|
||||
dict(id=2, api_url='http://example.org', username='alice',
|
||||
password='qwerty'),
|
||||
password='qwerty', weight_scale=1.0, weight_offset=0.0),
|
||||
]
|
||||
|
||||
|
||||
|
||||
+332
-33
@@ -20,10 +20,327 @@
|
||||
import time
|
||||
|
||||
from nova import db
|
||||
from nova import exception
|
||||
from nova import test
|
||||
from nova import utils
|
||||
|
||||
|
||||
class FakeModel(object):
|
||||
"""Stubs out for model."""
|
||||
def __init__(self, values):
|
||||
self.values = values
|
||||
|
||||
def __getattr__(self, name):
|
||||
return self.values[name]
|
||||
|
||||
def __getitem__(self, key):
|
||||
if key in self.values:
|
||||
return self.values[key]
|
||||
else:
|
||||
raise NotImplementedError()
|
||||
|
||||
def __repr__(self):
|
||||
return '<FakeModel: %s>' % self.values
|
||||
|
||||
|
||||
def stub_out(stubs, funcs):
|
||||
"""Set the stubs in mapping in the db api."""
|
||||
for func in funcs:
|
||||
func_name = '_'.join(func.__name__.split('_')[1:])
|
||||
stubs.Set(db, func_name, func)
|
||||
|
||||
|
||||
def stub_out_db_network_api(stubs):
|
||||
network_fields = {'id': 0,
|
||||
'cidr': '192.168.0.0/24',
|
||||
'netmask': '255.255.255.0',
|
||||
'cidr_v6': 'dead:beef::/64',
|
||||
'netmask_v6': '64',
|
||||
'project_id': 'fake',
|
||||
'label': 'fake',
|
||||
'gateway': '192.168.0.1',
|
||||
'bridge': 'fa0',
|
||||
'bridge_interface': 'fake_fa0',
|
||||
'broadcast': '192.168.0.255',
|
||||
'gateway_v6': 'dead:beef::1',
|
||||
'dns': '192.168.0.1',
|
||||
'vlan': None,
|
||||
'host': None,
|
||||
'injected': False,
|
||||
'vpn_public_address': '192.168.0.2'}
|
||||
|
||||
fixed_ip_fields = {'id': 0,
|
||||
'network_id': 0,
|
||||
'network': FakeModel(network_fields),
|
||||
'address': '192.168.0.100',
|
||||
'instance': False,
|
||||
'instance_id': 0,
|
||||
'allocated': False,
|
||||
'virtual_interface_id': 0,
|
||||
'virtual_interface': None,
|
||||
'floating_ips': []}
|
||||
|
||||
flavor_fields = {'id': 0,
|
||||
'rxtx_cap': 3}
|
||||
|
||||
floating_ip_fields = {'id': 0,
|
||||
'address': '192.168.1.100',
|
||||
'fixed_ip_id': None,
|
||||
'fixed_ip': None,
|
||||
'project_id': None,
|
||||
'auto_assigned': False}
|
||||
|
||||
virtual_interface_fields = {'id': 0,
|
||||
'address': 'DE:AD:BE:EF:00:00',
|
||||
'network_id': 0,
|
||||
'instance_id': 0,
|
||||
'network': FakeModel(network_fields)}
|
||||
|
||||
fixed_ips = [fixed_ip_fields]
|
||||
floating_ips = [floating_ip_fields]
|
||||
virtual_interfacees = [virtual_interface_fields]
|
||||
networks = [network_fields]
|
||||
|
||||
def fake_floating_ip_allocate_address(context, project_id):
|
||||
ips = filter(lambda i: i['fixed_ip_id'] == None \
|
||||
and i['project_id'] == None,
|
||||
floating_ips)
|
||||
if not ips:
|
||||
raise exception.NoMoreFloatingIps()
|
||||
ips[0]['project_id'] = project_id
|
||||
return FakeModel(ips[0])
|
||||
|
||||
def fake_floating_ip_deallocate(context, address):
|
||||
ips = filter(lambda i: i['address'] == address,
|
||||
floating_ips)
|
||||
if ips:
|
||||
ips[0]['project_id'] = None
|
||||
ips[0]['auto_assigned'] = False
|
||||
|
||||
def fake_floating_ip_disassociate(context, address):
|
||||
ips = filter(lambda i: i['address'] == address,
|
||||
floating_ips)
|
||||
if ips:
|
||||
fixed_ip_address = None
|
||||
if ips[0]['fixed_ip']:
|
||||
fixed_ip_address = ips[0]['fixed_ip']['address']
|
||||
ips[0]['fixed_ip'] = None
|
||||
return fixed_ip_address
|
||||
|
||||
def fake_floating_ip_fixed_ip_associate(context, floating_address,
|
||||
fixed_address):
|
||||
float = filter(lambda i: i['address'] == floating_address,
|
||||
floating_ips)
|
||||
fixed = filter(lambda i: i['address'] == fixed_address,
|
||||
fixed_ips)
|
||||
if float and fixed:
|
||||
float[0]['fixed_ip'] = fixed[0]
|
||||
float[0]['fixed_ip_id'] = fixed[0]['id']
|
||||
|
||||
def fake_floating_ip_get_all_by_host(context, host):
|
||||
# TODO(jkoelker): Once we get the patches that remove host from
|
||||
# the floating_ip table, we'll need to stub
|
||||
# this out
|
||||
pass
|
||||
|
||||
def fake_floating_ip_get_by_address(context, address):
|
||||
if isinstance(address, FakeModel):
|
||||
# NOTE(tr3buchet): yo dawg, i heard you like addresses
|
||||
address = address['address']
|
||||
ips = filter(lambda i: i['address'] == address,
|
||||
floating_ips)
|
||||
if not ips:
|
||||
raise exception.FloatingIpNotFoundForAddress(address=address)
|
||||
return FakeModel(ips[0])
|
||||
|
||||
def fake_floating_ip_set_auto_assigned(contex, address):
|
||||
ips = filter(lambda i: i['address'] == address,
|
||||
floating_ips)
|
||||
if ips:
|
||||
ips[0]['auto_assigned'] = True
|
||||
|
||||
def fake_fixed_ip_associate(context, address, instance_id):
|
||||
ips = filter(lambda i: i['address'] == address,
|
||||
fixed_ips)
|
||||
if not ips:
|
||||
raise exception.NoMoreFixedIps()
|
||||
ips[0]['instance'] = True
|
||||
ips[0]['instance_id'] = instance_id
|
||||
|
||||
def fake_fixed_ip_associate_pool(context, network_id, instance_id):
|
||||
ips = filter(lambda i: (i['network_id'] == network_id \
|
||||
or i['network_id'] is None) \
|
||||
and not i['instance'],
|
||||
fixed_ips)
|
||||
if not ips:
|
||||
raise exception.NoMoreFixedIps()
|
||||
ips[0]['instance'] = True
|
||||
ips[0]['instance_id'] = instance_id
|
||||
return ips[0]['address']
|
||||
|
||||
def fake_fixed_ip_create(context, values):
|
||||
ip = dict(fixed_ip_fields)
|
||||
ip['id'] = max([i['id'] for i in fixed_ips] or [-1]) + 1
|
||||
for key in values:
|
||||
ip[key] = values[key]
|
||||
return ip['address']
|
||||
|
||||
def fake_fixed_ip_disassociate(context, address):
|
||||
ips = filter(lambda i: i['address'] == address,
|
||||
fixed_ips)
|
||||
if ips:
|
||||
ips[0]['instance_id'] = None
|
||||
ips[0]['instance'] = None
|
||||
ips[0]['virtual_interface'] = None
|
||||
ips[0]['virtual_interface_id'] = None
|
||||
|
||||
def fake_fixed_ip_disassociate_all_by_timeout(context, host, time):
|
||||
return 0
|
||||
|
||||
def fake_fixed_ip_get_by_instance(context, instance_id):
|
||||
ips = filter(lambda i: i['instance_id'] == instance_id,
|
||||
fixed_ips)
|
||||
return [FakeModel(i) for i in ips]
|
||||
|
||||
def fake_fixed_ip_get_by_address(context, address):
|
||||
ips = filter(lambda i: i['address'] == address,
|
||||
fixed_ips)
|
||||
if ips:
|
||||
return FakeModel(ips[0])
|
||||
|
||||
def fake_fixed_ip_get_network(context, address):
|
||||
ips = filter(lambda i: i['address'] == address,
|
||||
fixed_ips)
|
||||
if ips:
|
||||
nets = filter(lambda n: n['id'] == ips[0]['network_id'],
|
||||
networks)
|
||||
if nets:
|
||||
return FakeModel(nets[0])
|
||||
|
||||
def fake_fixed_ip_update(context, address, values):
|
||||
ips = filter(lambda i: i['address'] == address,
|
||||
fixed_ips)
|
||||
if ips:
|
||||
for key in values:
|
||||
ips[0][key] = values[key]
|
||||
if key == 'virtual_interface_id':
|
||||
vif = filter(lambda x: x['id'] == values[key],
|
||||
virtual_interfacees)
|
||||
if not vif:
|
||||
continue
|
||||
fixed_ip_fields['virtual_interface'] = FakeModel(vif[0])
|
||||
|
||||
def fake_instance_type_get_by_id(context, id):
|
||||
if flavor_fields['id'] == id:
|
||||
return FakeModel(flavor_fields)
|
||||
|
||||
def fake_virtual_interface_create(context, values):
|
||||
vif = dict(virtual_interface_fields)
|
||||
vif['id'] = max([m['id'] for m in virtual_interfacees] or [-1]) + 1
|
||||
for key in values:
|
||||
vif[key] = values[key]
|
||||
return FakeModel(vif)
|
||||
|
||||
def fake_virtual_interface_delete_by_instance(context, instance_id):
|
||||
addresses = [m for m in virtual_interfacees \
|
||||
if m['instance_id'] == instance_id]
|
||||
try:
|
||||
for address in addresses:
|
||||
virtual_interfacees.remove(address)
|
||||
except ValueError:
|
||||
pass
|
||||
|
||||
def fake_virtual_interface_get_by_instance(context, instance_id):
|
||||
return [FakeModel(m) for m in virtual_interfacees \
|
||||
if m['instance_id'] == instance_id]
|
||||
|
||||
def fake_virtual_interface_get_by_instance_and_network(context,
|
||||
instance_id,
|
||||
network_id):
|
||||
vif = filter(lambda m: m['instance_id'] == instance_id and \
|
||||
m['network_id'] == network_id,
|
||||
virtual_interfacees)
|
||||
if not vif:
|
||||
return None
|
||||
return FakeModel(vif[0])
|
||||
|
||||
def fake_network_create_safe(context, values):
|
||||
net = dict(network_fields)
|
||||
net['id'] = max([n['id'] for n in networks] or [-1]) + 1
|
||||
for key in values:
|
||||
net[key] = values[key]
|
||||
return FakeModel(net)
|
||||
|
||||
def fake_network_get(context, network_id):
|
||||
net = filter(lambda n: n['id'] == network_id, networks)
|
||||
if not net:
|
||||
return None
|
||||
return FakeModel(net[0])
|
||||
|
||||
def fake_network_get_all(context):
|
||||
return [FakeModel(n) for n in networks]
|
||||
|
||||
def fake_network_get_all_by_host(context, host):
|
||||
nets = filter(lambda n: n['host'] == host, networks)
|
||||
return [FakeModel(n) for n in nets]
|
||||
|
||||
def fake_network_get_all_by_instance(context, instance_id):
|
||||
nets = filter(lambda n: n['instance_id'] == instance_id, networks)
|
||||
return [FakeModel(n) for n in nets]
|
||||
|
||||
def fake_network_set_host(context, network_id, host_id):
|
||||
nets = filter(lambda n: n['id'] == network_id, networks)
|
||||
for net in nets:
|
||||
net['host'] = host_id
|
||||
return host_id
|
||||
|
||||
def fake_network_update(context, network_id, values):
|
||||
nets = filter(lambda n: n['id'] == network_id, networks)
|
||||
for net in nets:
|
||||
for key in values:
|
||||
net[key] = values[key]
|
||||
|
||||
def fake_project_get_networks(context, project_id):
|
||||
return [FakeModel(n) for n in networks \
|
||||
if n['project_id'] == project_id]
|
||||
|
||||
def fake_queue_get_for(context, topic, node):
|
||||
return "%s.%s" % (topic, node)
|
||||
|
||||
funcs = [fake_floating_ip_allocate_address,
|
||||
fake_floating_ip_deallocate,
|
||||
fake_floating_ip_disassociate,
|
||||
fake_floating_ip_fixed_ip_associate,
|
||||
fake_floating_ip_get_all_by_host,
|
||||
fake_floating_ip_get_by_address,
|
||||
fake_floating_ip_set_auto_assigned,
|
||||
fake_fixed_ip_associate,
|
||||
fake_fixed_ip_associate_pool,
|
||||
fake_fixed_ip_create,
|
||||
fake_fixed_ip_disassociate,
|
||||
fake_fixed_ip_disassociate_all_by_timeout,
|
||||
fake_fixed_ip_get_by_instance,
|
||||
fake_fixed_ip_get_by_address,
|
||||
fake_fixed_ip_get_network,
|
||||
fake_fixed_ip_update,
|
||||
fake_instance_type_get_by_id,
|
||||
fake_virtual_interface_create,
|
||||
fake_virtual_interface_delete_by_instance,
|
||||
fake_virtual_interface_get_by_instance,
|
||||
fake_virtual_interface_get_by_instance_and_network,
|
||||
fake_network_create_safe,
|
||||
fake_network_get,
|
||||
fake_network_get_all,
|
||||
fake_network_get_all_by_host,
|
||||
fake_network_get_all_by_instance,
|
||||
fake_network_set_host,
|
||||
fake_network_update,
|
||||
fake_project_get_networks,
|
||||
fake_queue_get_for]
|
||||
|
||||
stub_out(stubs, funcs)
|
||||
|
||||
|
||||
def stub_out_db_instance_api(stubs, injected=True):
|
||||
"""Stubs out the db API for creating Instances."""
|
||||
|
||||
@@ -92,20 +409,6 @@ def stub_out_db_instance_api(stubs, injected=True):
|
||||
'address_v6': 'fe80::a00:3',
|
||||
'network_id': 'fake_flat'}
|
||||
|
||||
class FakeModel(object):
|
||||
"""Stubs out for model."""
|
||||
def __init__(self, values):
|
||||
self.values = values
|
||||
|
||||
def __getattr__(self, name):
|
||||
return self.values[name]
|
||||
|
||||
def __getitem__(self, key):
|
||||
if key in self.values:
|
||||
return self.values[key]
|
||||
else:
|
||||
raise NotImplementedError()
|
||||
|
||||
def fake_instance_type_get_all(context, inactive=0):
|
||||
return INSTANCE_TYPES
|
||||
|
||||
@@ -132,26 +435,22 @@ def stub_out_db_instance_api(stubs, injected=True):
|
||||
else:
|
||||
return [FakeModel(flat_network_fields)]
|
||||
|
||||
def fake_instance_get_fixed_address(context, instance_id):
|
||||
return FakeModel(fixed_ip_fields).address
|
||||
def fake_instance_get_fixed_addresses(context, instance_id):
|
||||
return [FakeModel(fixed_ip_fields).address]
|
||||
|
||||
def fake_instance_get_fixed_address_v6(context, instance_id):
|
||||
return FakeModel(fixed_ip_fields).address
|
||||
def fake_instance_get_fixed_addresses_v6(context, instance_id):
|
||||
return [FakeModel(fixed_ip_fields).address]
|
||||
|
||||
def fake_fixed_ip_get_all_by_instance(context, instance_id):
|
||||
def fake_fixed_ip_get_by_instance(context, instance_id):
|
||||
return [FakeModel(fixed_ip_fields)]
|
||||
|
||||
stubs.Set(db, 'network_get_by_instance', fake_network_get_by_instance)
|
||||
stubs.Set(db, 'network_get_all_by_instance',
|
||||
fake_network_get_all_by_instance)
|
||||
stubs.Set(db, 'instance_type_get_all', fake_instance_type_get_all)
|
||||
stubs.Set(db, 'instance_type_get_by_name', fake_instance_type_get_by_name)
|
||||
stubs.Set(db, 'instance_type_get_by_id', fake_instance_type_get_by_id)
|
||||
stubs.Set(db, 'instance_get_fixed_address',
|
||||
fake_instance_get_fixed_address)
|
||||
stubs.Set(db, 'instance_get_fixed_address_v6',
|
||||
fake_instance_get_fixed_address_v6)
|
||||
stubs.Set(db, 'network_get_all_by_instance',
|
||||
fake_network_get_all_by_instance)
|
||||
stubs.Set(db, 'fixed_ip_get_all_by_instance',
|
||||
fake_fixed_ip_get_all_by_instance)
|
||||
funcs = [fake_network_get_by_instance,
|
||||
fake_network_get_all_by_instance,
|
||||
fake_instance_type_get_all,
|
||||
fake_instance_type_get_by_name,
|
||||
fake_instance_type_get_by_id,
|
||||
fake_instance_get_fixed_addresses,
|
||||
fake_instance_get_fixed_addresses_v6,
|
||||
fake_network_get_all_by_instance,
|
||||
fake_fixed_ip_get_by_instance]
|
||||
stub_out(stubs, funcs)
|
||||
|
||||
@@ -64,8 +64,8 @@ class FakeGlance(object):
|
||||
pass
|
||||
|
||||
def get_image_meta(self, image_id):
|
||||
return self.IMAGE_FIXTURES[image_id]['image_meta']
|
||||
return self.IMAGE_FIXTURES[int(image_id)]['image_meta']
|
||||
|
||||
def get_image(self, image_id):
|
||||
image = self.IMAGE_FIXTURES[image_id]
|
||||
image = self.IMAGE_FIXTURES[int(image_id)]
|
||||
return image['image_meta'], image['image_data']
|
||||
|
||||
@@ -14,3 +14,6 @@
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
# NOTE(vish): this forces the fixtures from tests/__init.py:setup() to work
|
||||
from nova.tests import *
|
||||
|
||||
@@ -18,3 +18,5 @@
|
||||
:mod:`integrated` -- Tests whole systems, using mock services where needed
|
||||
=================================
|
||||
"""
|
||||
# NOTE(vish): this forces the fixtures from tests/__init.py:setup() to work
|
||||
from nova.tests import *
|
||||
|
||||
@@ -171,16 +171,10 @@ class _IntegratedTestBase(test.TestCase):
|
||||
self.api = self.user.openstack_api
|
||||
|
||||
def _start_api_service(self):
|
||||
api_service = service.ApiService.create()
|
||||
api_service.start()
|
||||
|
||||
if not api_service:
|
||||
raise Exception("API Service was None")
|
||||
|
||||
self.api_service = api_service
|
||||
|
||||
host, port = api_service.get_socket_info('osapi')
|
||||
self.auth_url = 'http://%s:%s/v1.1' % (host, port)
|
||||
osapi = service.WSGIService("osapi")
|
||||
osapi.start()
|
||||
self.auth_url = 'http://%s:%s/v1.1' % (osapi.host, osapi.port)
|
||||
LOG.warn(self.auth_url)
|
||||
|
||||
def tearDown(self):
|
||||
self.context.cleanup()
|
||||
|
||||
@@ -1,67 +0,0 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2010 United States Government as represented by the
|
||||
# Administrator of the National Aeronautics and Space Administration.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
"""
|
||||
Utility methods
|
||||
"""
|
||||
import os
|
||||
|
||||
from nova import context
|
||||
from nova import db
|
||||
from nova import flags
|
||||
from nova import log as logging
|
||||
from nova import utils
|
||||
|
||||
FLAGS = flags.FLAGS
|
||||
LOG = logging.getLogger('nova.tests.network')
|
||||
|
||||
|
||||
def binpath(script):
|
||||
"""Returns the absolute path to a script in bin"""
|
||||
return os.path.abspath(os.path.join(__file__, "../../../../bin", script))
|
||||
|
||||
|
||||
def lease_ip(private_ip):
|
||||
"""Run add command on dhcpbridge"""
|
||||
network_ref = db.fixed_ip_get_network(context.get_admin_context(),
|
||||
private_ip)
|
||||
instance_ref = db.fixed_ip_get_instance(context.get_admin_context(),
|
||||
private_ip)
|
||||
cmd = (binpath('nova-dhcpbridge'), 'add',
|
||||
instance_ref['mac_address'],
|
||||
private_ip, 'fake')
|
||||
env = {'DNSMASQ_INTERFACE': network_ref['bridge'],
|
||||
'TESTING': '1',
|
||||
'FLAGFILE': FLAGS.dhcpbridge_flagfile}
|
||||
(out, err) = utils.execute(*cmd, addl_env=env)
|
||||
LOG.debug("ISSUE_IP: %s, %s ", out, err)
|
||||
|
||||
|
||||
def release_ip(private_ip):
|
||||
"""Run del command on dhcpbridge"""
|
||||
network_ref = db.fixed_ip_get_network(context.get_admin_context(),
|
||||
private_ip)
|
||||
instance_ref = db.fixed_ip_get_instance(context.get_admin_context(),
|
||||
private_ip)
|
||||
cmd = (binpath('nova-dhcpbridge'), 'del',
|
||||
instance_ref['mac_address'],
|
||||
private_ip, 'fake')
|
||||
env = {'DNSMASQ_INTERFACE': network_ref['bridge'],
|
||||
'TESTING': '1',
|
||||
'FLAGFILE': FLAGS.dhcpbridge_flagfile}
|
||||
(out, err) = utils.execute(*cmd, addl_env=env)
|
||||
LOG.debug("RELEASE_IP: %s, %s ", out, err)
|
||||
@@ -1,155 +0,0 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2010 United States Government as represented by the
|
||||
# Administrator of the National Aeronautics and Space Administration.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
"""
|
||||
Base class of Unit Tests for all network models
|
||||
"""
|
||||
import netaddr
|
||||
import os
|
||||
|
||||
from nova import context
|
||||
from nova import db
|
||||
from nova import exception
|
||||
from nova import flags
|
||||
from nova import ipv6
|
||||
from nova import log as logging
|
||||
from nova import test
|
||||
from nova import utils
|
||||
from nova.auth import manager
|
||||
|
||||
FLAGS = flags.FLAGS
|
||||
LOG = logging.getLogger('nova.tests.network')
|
||||
|
||||
|
||||
class NetworkTestCase(test.TestCase):
|
||||
"""Test cases for network code"""
|
||||
def setUp(self):
|
||||
super(NetworkTestCase, self).setUp()
|
||||
# NOTE(vish): if you change these flags, make sure to change the
|
||||
# flags in the corresponding section in nova-dhcpbridge
|
||||
self.flags(connection_type='fake',
|
||||
fake_call=True,
|
||||
fake_network=True)
|
||||
self.manager = manager.AuthManager()
|
||||
self.user = self.manager.create_user('netuser', 'netuser', 'netuser')
|
||||
self.projects = []
|
||||
self.network = utils.import_object(FLAGS.network_manager)
|
||||
self.context = context.RequestContext(project=None, user=self.user)
|
||||
for i in range(FLAGS.num_networks):
|
||||
name = 'project%s' % i
|
||||
project = self.manager.create_project(name, 'netuser', name)
|
||||
self.projects.append(project)
|
||||
# create the necessary network data for the project
|
||||
user_context = context.RequestContext(project=self.projects[i],
|
||||
user=self.user)
|
||||
host = self.network.get_network_host(user_context.elevated())
|
||||
instance_ref = self._create_instance(0)
|
||||
self.instance_id = instance_ref['id']
|
||||
instance_ref = self._create_instance(1)
|
||||
self.instance2_id = instance_ref['id']
|
||||
|
||||
def tearDown(self):
|
||||
# TODO(termie): this should really be instantiating clean datastores
|
||||
# in between runs, one failure kills all the tests
|
||||
db.instance_destroy(context.get_admin_context(), self.instance_id)
|
||||
db.instance_destroy(context.get_admin_context(), self.instance2_id)
|
||||
for project in self.projects:
|
||||
self.manager.delete_project(project)
|
||||
self.manager.delete_user(self.user)
|
||||
super(NetworkTestCase, self).tearDown()
|
||||
|
||||
def _create_instance(self, project_num, mac=None):
|
||||
if not mac:
|
||||
mac = utils.generate_mac()
|
||||
project = self.projects[project_num]
|
||||
self.context._project = project
|
||||
self.context.project_id = project.id
|
||||
return db.instance_create(self.context,
|
||||
{'project_id': project.id,
|
||||
'mac_address': mac})
|
||||
|
||||
def _create_address(self, project_num, instance_id=None):
|
||||
"""Create an address in given project num"""
|
||||
if instance_id is None:
|
||||
instance_id = self.instance_id
|
||||
self.context._project = self.projects[project_num]
|
||||
self.context.project_id = self.projects[project_num].id
|
||||
return self.network.allocate_fixed_ip(self.context, instance_id)
|
||||
|
||||
def _deallocate_address(self, project_num, address):
|
||||
self.context._project = self.projects[project_num]
|
||||
self.context.project_id = self.projects[project_num].id
|
||||
self.network.deallocate_fixed_ip(self.context, address)
|
||||
|
||||
def _is_allocated_in_project(self, address, project_id):
|
||||
"""Returns true if address is in specified project"""
|
||||
project_net = db.network_get_by_bridge(context.get_admin_context(),
|
||||
FLAGS.flat_network_bridge)
|
||||
network = db.fixed_ip_get_network(context.get_admin_context(),
|
||||
address)
|
||||
instance = db.fixed_ip_get_instance(context.get_admin_context(),
|
||||
address)
|
||||
# instance exists until release
|
||||
return instance is not None and network['id'] == project_net['id']
|
||||
|
||||
def test_private_ipv6(self):
|
||||
"""Make sure ipv6 is OK"""
|
||||
if FLAGS.use_ipv6:
|
||||
instance_ref = self._create_instance(0)
|
||||
address = self._create_address(0, instance_ref['id'])
|
||||
network_ref = db.project_get_network(
|
||||
context.get_admin_context(),
|
||||
self.context.project_id)
|
||||
address_v6 = db.instance_get_fixed_address_v6(
|
||||
context.get_admin_context(),
|
||||
instance_ref['id'])
|
||||
self.assertEqual(instance_ref['mac_address'],
|
||||
ipv6.to_mac(address_v6))
|
||||
instance_ref2 = db.fixed_ip_get_instance_v6(
|
||||
context.get_admin_context(),
|
||||
address_v6)
|
||||
self.assertEqual(instance_ref['id'], instance_ref2['id'])
|
||||
self.assertEqual(address_v6,
|
||||
ipv6.to_global(network_ref['cidr_v6'],
|
||||
instance_ref['mac_address'],
|
||||
'test'))
|
||||
self._deallocate_address(0, address)
|
||||
db.instance_destroy(context.get_admin_context(),
|
||||
instance_ref['id'])
|
||||
|
||||
def test_available_ips(self):
|
||||
"""Make sure the number of available ips for the network is correct
|
||||
|
||||
The number of available IP addresses depends on the test
|
||||
environment's setup.
|
||||
|
||||
Network size is set in test fixture's setUp method.
|
||||
|
||||
There are ips reserved at the bottom and top of the range.
|
||||
services (network, gateway, CloudPipe, broadcast)
|
||||
"""
|
||||
network = db.project_get_network(context.get_admin_context(),
|
||||
self.projects[0].id)
|
||||
net_size = flags.FLAGS.network_size
|
||||
admin_context = context.get_admin_context()
|
||||
total_ips = (db.network_count_available_ips(admin_context,
|
||||
network['id']) +
|
||||
db.network_count_reserved_ips(admin_context,
|
||||
network['id']) +
|
||||
db.network_count_allocated_ips(admin_context,
|
||||
network['id']))
|
||||
self.assertEqual(total_ips, net_size)
|
||||
@@ -0,0 +1,19 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2011 Openstack LLC.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
# NOTE(vish): this forces the fixtures from tests/__init.py:setup() to work
|
||||
from nova.tests import *
|
||||
|
||||
@@ -67,7 +67,18 @@ class HostFilterTestCase(test.TestCase):
|
||||
flavorid=1,
|
||||
swap=500,
|
||||
rxtx_quota=30000,
|
||||
rxtx_cap=200)
|
||||
rxtx_cap=200,
|
||||
extra_specs={})
|
||||
self.gpu_instance_type = dict(name='tiny.gpu',
|
||||
memory_mb=50,
|
||||
vcpus=10,
|
||||
local_gb=500,
|
||||
flavorid=2,
|
||||
swap=500,
|
||||
rxtx_quota=30000,
|
||||
rxtx_cap=200,
|
||||
extra_specs={'xpu_arch': 'fermi',
|
||||
'xpu_info': 'Tesla 2050'})
|
||||
|
||||
self.zone_manager = FakeZoneManager()
|
||||
states = {}
|
||||
@@ -75,6 +86,18 @@ class HostFilterTestCase(test.TestCase):
|
||||
states['host%02d' % (x + 1)] = {'compute': self._host_caps(x)}
|
||||
self.zone_manager.service_states = states
|
||||
|
||||
# Add some extra capabilities to some hosts
|
||||
host07 = self.zone_manager.service_states['host07']['compute']
|
||||
host07['xpu_arch'] = 'fermi'
|
||||
host07['xpu_info'] = 'Tesla 2050'
|
||||
|
||||
host08 = self.zone_manager.service_states['host08']['compute']
|
||||
host08['xpu_arch'] = 'radeon'
|
||||
|
||||
host09 = self.zone_manager.service_states['host09']['compute']
|
||||
host09['xpu_arch'] = 'fermi'
|
||||
host09['xpu_info'] = 'Tesla 2150'
|
||||
|
||||
def tearDown(self):
|
||||
FLAGS.default_host_filter = self.old_flag
|
||||
|
||||
@@ -116,6 +139,17 @@ class HostFilterTestCase(test.TestCase):
|
||||
self.assertEquals('host05', just_hosts[0])
|
||||
self.assertEquals('host10', just_hosts[5])
|
||||
|
||||
def test_instance_type_filter_extra_specs(self):
|
||||
hf = host_filter.InstanceTypeFilter()
|
||||
# filter all hosts that can support 50 ram and 500 disk
|
||||
name, cooked = hf.instance_type_to_filter(self.gpu_instance_type)
|
||||
self.assertEquals('nova.scheduler.host_filter.InstanceTypeFilter',
|
||||
name)
|
||||
hosts = hf.filter_hosts(self.zone_manager, cooked)
|
||||
self.assertEquals(1, len(hosts))
|
||||
just_hosts = [host for host, caps in hosts]
|
||||
self.assertEquals('host07', just_hosts[0])
|
||||
|
||||
def test_json_filter(self):
|
||||
hf = host_filter.JsonFilter()
|
||||
# filter all hosts that can support 50 ram and 500 disk
|
||||
|
||||
@@ -122,15 +122,16 @@ class LeastCostSchedulerTestCase(test.TestCase):
|
||||
for hostname, caps in hosts]
|
||||
self.assertWeights(expected, num, request_spec, hosts)
|
||||
|
||||
def test_fill_first_cost_fn(self):
|
||||
def test_compute_fill_first_cost_fn(self):
|
||||
FLAGS.least_cost_scheduler_cost_functions = [
|
||||
'nova.scheduler.least_cost.fill_first_cost_fn',
|
||||
'nova.scheduler.least_cost.compute_fill_first_cost_fn',
|
||||
]
|
||||
FLAGS.fill_first_cost_fn_weight = 1
|
||||
FLAGS.compute_fill_first_cost_fn_weight = 1
|
||||
|
||||
num = 1
|
||||
request_spec = {}
|
||||
hosts = self.sched.filter_hosts(num, request_spec)
|
||||
instance_type = {'memory_mb': 1024}
|
||||
request_spec = {'instance_type': instance_type}
|
||||
hosts = self.sched.filter_hosts('compute', request_spec, None)
|
||||
|
||||
expected = []
|
||||
for idx, (hostname, caps) in enumerate(hosts):
|
||||
|
||||
@@ -268,7 +268,6 @@ class SimpleDriverTestCase(test.TestCase):
|
||||
inst['user_id'] = self.user.id
|
||||
inst['project_id'] = self.project.id
|
||||
inst['instance_type_id'] = '1'
|
||||
inst['mac_address'] = utils.generate_mac()
|
||||
inst['vcpus'] = kwargs.get('vcpus', 1)
|
||||
inst['ami_launch_index'] = 0
|
||||
inst['availability_zone'] = kwargs.get('availability_zone', None)
|
||||
@@ -1074,7 +1073,7 @@ class DynamicNovaClientTest(test.TestCase):
|
||||
|
||||
self.assertEquals(api._issue_novaclient_command(
|
||||
FakeNovaClient(FakeServerCollection()),
|
||||
zone, "servers", "find", "name").b, 22)
|
||||
zone, "servers", "find", name="test").b, 22)
|
||||
|
||||
self.assertEquals(api._issue_novaclient_command(
|
||||
FakeNovaClient(FakeServerCollection()),
|
||||
@@ -1088,7 +1087,7 @@ class DynamicNovaClientTest(test.TestCase):
|
||||
|
||||
self.assertEquals(api._issue_novaclient_command(
|
||||
FakeNovaClient(FakeEmptyServerCollection()),
|
||||
zone, "servers", "find", "name"), None)
|
||||
zone, "servers", "find", name="test"), None)
|
||||
|
||||
self.assertEquals(api._issue_novaclient_command(
|
||||
FakeNovaClient(FakeEmptyServerCollection()),
|
||||
|
||||
@@ -16,6 +16,8 @@
|
||||
Tests For Zone Aware Scheduler.
|
||||
"""
|
||||
|
||||
import nova.db
|
||||
|
||||
from nova import exception
|
||||
from nova import test
|
||||
from nova.scheduler import driver
|
||||
@@ -55,29 +57,21 @@ def fake_zone_manager_service_states(num_hosts):
|
||||
|
||||
|
||||
class FakeZoneAwareScheduler(zone_aware_scheduler.ZoneAwareScheduler):
|
||||
def filter_hosts(self, num, specs):
|
||||
# NOTE(sirp): this is returning [(hostname, services)]
|
||||
return self.zone_manager.service_states.items()
|
||||
|
||||
def weigh_hosts(self, num, specs, hosts):
|
||||
fake_weight = 99
|
||||
weighted = []
|
||||
for hostname, caps in hosts:
|
||||
weighted.append(dict(weight=fake_weight, name=hostname))
|
||||
return weighted
|
||||
# No need to stub anything at the moment
|
||||
pass
|
||||
|
||||
|
||||
class FakeZoneManager(zone_manager.ZoneManager):
|
||||
def __init__(self):
|
||||
self.service_states = {
|
||||
'host1': {
|
||||
'compute': {'ram': 1000},
|
||||
'compute': {'host_memory_free': 1073741824},
|
||||
},
|
||||
'host2': {
|
||||
'compute': {'ram': 2000},
|
||||
'compute': {'host_memory_free': 2147483648},
|
||||
},
|
||||
'host3': {
|
||||
'compute': {'ram': 3000},
|
||||
'compute': {'host_memory_free': 3221225472},
|
||||
},
|
||||
}
|
||||
|
||||
@@ -87,7 +81,7 @@ class FakeEmptyZoneManager(zone_manager.ZoneManager):
|
||||
self.service_states = {}
|
||||
|
||||
|
||||
def fake_empty_call_zone_method(context, method, specs):
|
||||
def fake_empty_call_zone_method(context, method, specs, zones):
|
||||
return []
|
||||
|
||||
|
||||
@@ -106,7 +100,7 @@ def fake_ask_child_zone_to_create_instance(context, zone_info,
|
||||
was_called = True
|
||||
|
||||
|
||||
def fake_provision_resource_locally(context, item, instance_id, kwargs):
|
||||
def fake_provision_resource_locally(context, build_plan, request_spec, kwargs):
|
||||
global was_called
|
||||
was_called = True
|
||||
|
||||
@@ -126,7 +120,7 @@ def fake_decrypt_blob_returns_child_info(blob):
|
||||
'child_blob': True} # values aren't important. Keys are.
|
||||
|
||||
|
||||
def fake_call_zone_method(context, method, specs):
|
||||
def fake_call_zone_method(context, method, specs, zones):
|
||||
return [
|
||||
('zone1', [
|
||||
dict(weight=1, blob='AAAAAAA'),
|
||||
@@ -149,28 +143,67 @@ def fake_call_zone_method(context, method, specs):
|
||||
]
|
||||
|
||||
|
||||
def fake_zone_get_all(context):
|
||||
return [
|
||||
dict(id=1, api_url='zone1',
|
||||
username='admin', password='password',
|
||||
weight_offset=0.0, weight_scale=1.0),
|
||||
dict(id=2, api_url='zone2',
|
||||
username='admin', password='password',
|
||||
weight_offset=1000.0, weight_scale=1.0),
|
||||
dict(id=3, api_url='zone3',
|
||||
username='admin', password='password',
|
||||
weight_offset=0.0, weight_scale=1000.0),
|
||||
]
|
||||
|
||||
|
||||
class ZoneAwareSchedulerTestCase(test.TestCase):
|
||||
"""Test case for Zone Aware Scheduler."""
|
||||
|
||||
def test_zone_aware_scheduler(self):
|
||||
"""
|
||||
Create a nested set of FakeZones, ensure that a select call returns the
|
||||
appropriate build plan.
|
||||
Create a nested set of FakeZones, try to build multiple instances
|
||||
and ensure that a select call returns the appropriate build plan.
|
||||
"""
|
||||
sched = FakeZoneAwareScheduler()
|
||||
self.stubs.Set(sched, '_call_zone_method', fake_call_zone_method)
|
||||
self.stubs.Set(nova.db, 'zone_get_all', fake_zone_get_all)
|
||||
|
||||
zm = FakeZoneManager()
|
||||
sched.set_zone_manager(zm)
|
||||
|
||||
fake_context = {}
|
||||
build_plan = sched.select(fake_context, {})
|
||||
build_plan = sched.select(fake_context,
|
||||
{'instance_type': {'memory_mb': 512},
|
||||
'num_instances': 4})
|
||||
|
||||
self.assertEqual(15, len(build_plan))
|
||||
# 4 from local zones, 12 from remotes
|
||||
self.assertEqual(16, len(build_plan))
|
||||
|
||||
hostnames = [plan_item['name']
|
||||
for plan_item in build_plan if 'name' in plan_item]
|
||||
self.assertEqual(3, len(hostnames))
|
||||
hostnames = [plan_item['hostname']
|
||||
for plan_item in build_plan if 'hostname' in plan_item]
|
||||
# 4 local hosts
|
||||
self.assertEqual(4, len(hostnames))
|
||||
|
||||
def test_adjust_child_weights(self):
|
||||
"""Make sure the weights returned by child zones are
|
||||
properly adjusted based on the scale/offset in the zone
|
||||
db entries.
|
||||
"""
|
||||
sched = FakeZoneAwareScheduler()
|
||||
child_results = fake_call_zone_method(None, None, None, None)
|
||||
zones = fake_zone_get_all(None)
|
||||
sched._adjust_child_weights(child_results, zones)
|
||||
scaled = [130000, 131000, 132000, 3000]
|
||||
for zone, results in child_results:
|
||||
for item in results:
|
||||
w = item['weight']
|
||||
if zone == 'zone1': # No change
|
||||
self.assertTrue(w < 1000.0)
|
||||
if zone == 'zone2': # Offset +1000
|
||||
self.assertTrue(w >= 1000.0 and w < 2000)
|
||||
if zone == 'zone3': # Scale x1000
|
||||
self.assertEqual(scaled.pop(0), w)
|
||||
|
||||
def test_empty_zone_aware_scheduler(self):
|
||||
"""
|
||||
@@ -178,6 +211,7 @@ class ZoneAwareSchedulerTestCase(test.TestCase):
|
||||
"""
|
||||
sched = FakeZoneAwareScheduler()
|
||||
self.stubs.Set(sched, '_call_zone_method', fake_empty_call_zone_method)
|
||||
self.stubs.Set(nova.db, 'zone_get_all', fake_zone_get_all)
|
||||
|
||||
zm = FakeEmptyZoneManager()
|
||||
sched.set_zone_manager(zm)
|
||||
@@ -185,8 +219,7 @@ class ZoneAwareSchedulerTestCase(test.TestCase):
|
||||
fake_context = {}
|
||||
self.assertRaises(driver.NoValidHost, sched.schedule_run_instance,
|
||||
fake_context, 1,
|
||||
dict(host_filter=None,
|
||||
request_spec={'instance_type': {}}))
|
||||
dict(host_filter=None, instance_type={}))
|
||||
|
||||
def test_schedule_do_not_schedule_with_hint(self):
|
||||
"""
|
||||
|
||||
@@ -56,7 +56,6 @@ class AdminApiTestCase(test.TestCase):
|
||||
self.project = self.manager.create_project('proj', 'admin', 'proj')
|
||||
self.context = context.RequestContext(user=self.user,
|
||||
project=self.project)
|
||||
host = self.network.get_network_host(self.context.elevated())
|
||||
|
||||
def fake_show(meh, context, id):
|
||||
return {'id': 1, 'properties': {'kernel_id': 1, 'ramdisk_id': 1,
|
||||
@@ -75,9 +74,6 @@ class AdminApiTestCase(test.TestCase):
|
||||
self.stubs.Set(rpc, 'cast', finish_cast)
|
||||
|
||||
def tearDown(self):
|
||||
network_ref = db.project_get_network(self.context,
|
||||
self.project.id)
|
||||
db.network_disassociate(self.context, network_ref['id'])
|
||||
self.manager.delete_project(self.project)
|
||||
self.manager.delete_user(self.user)
|
||||
super(AdminApiTestCase, self).tearDown()
|
||||
|
||||
@@ -25,6 +25,7 @@ from nova import log as logging
|
||||
from nova import test
|
||||
from nova.auth import manager
|
||||
from nova.api.ec2 import cloud
|
||||
from nova.auth import fakeldap
|
||||
|
||||
FLAGS = flags.FLAGS
|
||||
LOG = logging.getLogger('nova.tests.auth_unittest')
|
||||
@@ -369,6 +370,15 @@ class _AuthManagerBaseTestCase(test.TestCase):
|
||||
class AuthManagerLdapTestCase(_AuthManagerBaseTestCase):
|
||||
auth_driver = 'nova.auth.ldapdriver.FakeLdapDriver'
|
||||
|
||||
def test_reconnect_on_server_failure(self):
|
||||
self.manager.get_users()
|
||||
fakeldap.server_fail = True
|
||||
try:
|
||||
self.assertRaises(fakeldap.SERVER_DOWN, self.manager.get_users)
|
||||
finally:
|
||||
fakeldap.server_fail = False
|
||||
self.manager.get_users()
|
||||
|
||||
|
||||
class AuthManagerDbTestCase(_AuthManagerBaseTestCase):
|
||||
auth_driver = 'nova.auth.dbdriver.DbDriver'
|
||||
|
||||
+132
-6
@@ -64,7 +64,7 @@ class CloudTestCase(test.TestCase):
|
||||
self.project = self.manager.create_project('proj', 'admin', 'proj')
|
||||
self.context = context.RequestContext(user=self.user,
|
||||
project=self.project)
|
||||
host = self.network.get_network_host(self.context.elevated())
|
||||
host = self.network.host
|
||||
|
||||
def fake_show(meh, context, id):
|
||||
return {'id': 1, 'properties': {'kernel_id': 1, 'ramdisk_id': 1,
|
||||
@@ -83,9 +83,10 @@ class CloudTestCase(test.TestCase):
|
||||
self.stubs.Set(rpc, 'cast', finish_cast)
|
||||
|
||||
def tearDown(self):
|
||||
network_ref = db.project_get_network(self.context,
|
||||
self.project.id)
|
||||
db.network_disassociate(self.context, network_ref['id'])
|
||||
networks = db.project_get_networks(self.context, self.project.id,
|
||||
associate=False)
|
||||
for network in networks:
|
||||
db.network_disassociate(self.context, network['id'])
|
||||
self.manager.delete_project(self.project)
|
||||
self.manager.delete_user(self.user)
|
||||
super(CloudTestCase, self).tearDown()
|
||||
@@ -116,6 +117,7 @@ class CloudTestCase(test.TestCase):
|
||||
public_ip=address)
|
||||
db.floating_ip_destroy(self.context, address)
|
||||
|
||||
@test.skip_test("Skipping this pending future merge")
|
||||
def test_allocate_address(self):
|
||||
address = "10.10.10.10"
|
||||
allocate = self.cloud.allocate_address
|
||||
@@ -128,6 +130,7 @@ class CloudTestCase(test.TestCase):
|
||||
allocate,
|
||||
self.context)
|
||||
|
||||
@test.skip_test("Skipping this pending future merge")
|
||||
def test_associate_disassociate_address(self):
|
||||
"""Verifies associate runs cleanly without raising an exception"""
|
||||
address = "10.10.10.10"
|
||||
@@ -135,8 +138,27 @@ class CloudTestCase(test.TestCase):
|
||||
{'address': address,
|
||||
'host': self.network.host})
|
||||
self.cloud.allocate_address(self.context)
|
||||
inst = db.instance_create(self.context, {'host': self.compute.host})
|
||||
fixed = self.network.allocate_fixed_ip(self.context, inst['id'])
|
||||
# TODO(jkoelker) Probably need to query for instance_type_id and
|
||||
# make sure we get a valid one
|
||||
inst = db.instance_create(self.context, {'host': self.compute.host,
|
||||
'instance_type_id': 1})
|
||||
networks = db.network_get_all(self.context)
|
||||
for network in networks:
|
||||
self.network.set_network_host(self.context, network['id'])
|
||||
project_id = self.context.project_id
|
||||
type_id = inst['instance_type_id']
|
||||
ips = self.network.allocate_for_instance(self.context,
|
||||
instance_id=inst['id'],
|
||||
instance_type_id=type_id,
|
||||
project_id=project_id)
|
||||
# TODO(jkoelker) Make this mas bueno
|
||||
self.assertTrue(ips)
|
||||
self.assertTrue('ips' in ips[0][1])
|
||||
self.assertTrue(ips[0][1]['ips'])
|
||||
self.assertTrue('ip' in ips[0][1]['ips'][0])
|
||||
|
||||
fixed = ips[0][1]['ips'][0]['ip']
|
||||
|
||||
ec2_id = ec2utils.id_to_ec2_id(inst['id'])
|
||||
self.cloud.associate_address(self.context,
|
||||
instance_id=ec2_id,
|
||||
@@ -165,6 +187,102 @@ class CloudTestCase(test.TestCase):
|
||||
sec['name'])
|
||||
db.security_group_destroy(self.context, sec['id'])
|
||||
|
||||
def test_describe_security_groups_by_id(self):
|
||||
sec = db.security_group_create(self.context,
|
||||
{'project_id': self.context.project_id,
|
||||
'name': 'test'})
|
||||
result = self.cloud.describe_security_groups(self.context,
|
||||
group_id=[sec['id']])
|
||||
self.assertEqual(len(result['securityGroupInfo']), 1)
|
||||
self.assertEqual(
|
||||
result['securityGroupInfo'][0]['groupName'],
|
||||
sec['name'])
|
||||
default = db.security_group_get_by_name(self.context,
|
||||
self.context.project_id,
|
||||
'default')
|
||||
result = self.cloud.describe_security_groups(self.context,
|
||||
group_id=[default['id']])
|
||||
self.assertEqual(len(result['securityGroupInfo']), 1)
|
||||
self.assertEqual(
|
||||
result['securityGroupInfo'][0]['groupName'],
|
||||
'default')
|
||||
db.security_group_destroy(self.context, sec['id'])
|
||||
|
||||
def test_create_delete_security_group(self):
|
||||
descript = 'test description'
|
||||
create = self.cloud.create_security_group
|
||||
result = create(self.context, 'testgrp', descript)
|
||||
group_descript = result['securityGroupSet'][0]['groupDescription']
|
||||
self.assertEqual(descript, group_descript)
|
||||
delete = self.cloud.delete_security_group
|
||||
self.assertTrue(delete(self.context, 'testgrp'))
|
||||
|
||||
def test_delete_security_group_by_id(self):
|
||||
sec = db.security_group_create(self.context,
|
||||
{'project_id': self.context.project_id,
|
||||
'name': 'test'})
|
||||
delete = self.cloud.delete_security_group
|
||||
self.assertTrue(delete(self.context, group_id=sec['id']))
|
||||
|
||||
def test_delete_security_group_with_bad_name(self):
|
||||
delete = self.cloud.delete_security_group
|
||||
notfound = exception.SecurityGroupNotFound
|
||||
self.assertRaises(notfound, delete, self.context, 'badname')
|
||||
|
||||
def test_delete_security_group_with_bad_group_id(self):
|
||||
delete = self.cloud.delete_security_group
|
||||
notfound = exception.SecurityGroupNotFound
|
||||
self.assertRaises(notfound, delete, self.context, group_id=999)
|
||||
|
||||
def test_delete_security_group_no_params(self):
|
||||
delete = self.cloud.delete_security_group
|
||||
self.assertRaises(exception.ApiError, delete, self.context)
|
||||
|
||||
def test_authorize_revoke_security_group_ingress(self):
|
||||
kwargs = {'project_id': self.context.project_id, 'name': 'test'}
|
||||
sec = db.security_group_create(self.context, kwargs)
|
||||
authz = self.cloud.authorize_security_group_ingress
|
||||
kwargs = {'to_port': '999', 'from_port': '999', 'ip_protocol': 'tcp'}
|
||||
authz(self.context, group_name=sec['name'], **kwargs)
|
||||
revoke = self.cloud.revoke_security_group_ingress
|
||||
self.assertTrue(revoke(self.context, group_name=sec['name'], **kwargs))
|
||||
|
||||
def test_authorize_revoke_security_group_ingress_by_id(self):
|
||||
sec = db.security_group_create(self.context,
|
||||
{'project_id': self.context.project_id,
|
||||
'name': 'test'})
|
||||
authz = self.cloud.authorize_security_group_ingress
|
||||
kwargs = {'to_port': '999', 'from_port': '999', 'ip_protocol': 'tcp'}
|
||||
authz(self.context, group_id=sec['id'], **kwargs)
|
||||
revoke = self.cloud.revoke_security_group_ingress
|
||||
self.assertTrue(revoke(self.context, group_id=sec['id'], **kwargs))
|
||||
|
||||
def test_authorize_security_group_ingress_missing_protocol_params(self):
|
||||
sec = db.security_group_create(self.context,
|
||||
{'project_id': self.context.project_id,
|
||||
'name': 'test'})
|
||||
authz = self.cloud.authorize_security_group_ingress
|
||||
self.assertRaises(exception.ApiError, authz, self.context, 'test')
|
||||
|
||||
def test_authorize_security_group_ingress_missing_group_name_or_id(self):
|
||||
kwargs = {'project_id': self.context.project_id, 'name': 'test'}
|
||||
authz = self.cloud.authorize_security_group_ingress
|
||||
self.assertRaises(exception.ApiError, authz, self.context, **kwargs)
|
||||
|
||||
def test_authorize_security_group_ingress_already_exists(self):
|
||||
kwargs = {'project_id': self.context.project_id, 'name': 'test'}
|
||||
sec = db.security_group_create(self.context, kwargs)
|
||||
authz = self.cloud.authorize_security_group_ingress
|
||||
kwargs = {'to_port': '999', 'from_port': '999', 'ip_protocol': 'tcp'}
|
||||
authz(self.context, group_name=sec['name'], **kwargs)
|
||||
self.assertRaises(exception.ApiError, authz, self.context,
|
||||
group_name=sec['name'], **kwargs)
|
||||
|
||||
def test_revoke_security_group_ingress_missing_group_name_or_id(self):
|
||||
kwargs = {'to_port': '999', 'from_port': '999', 'ip_protocol': 'tcp'}
|
||||
revoke = self.cloud.revoke_security_group_ingress
|
||||
self.assertRaises(exception.ApiError, revoke, self.context, **kwargs)
|
||||
|
||||
def test_describe_volumes(self):
|
||||
"""Makes sure describe_volumes works and filters results."""
|
||||
vol1 = db.volume_create(self.context, {})
|
||||
@@ -217,6 +335,8 @@ class CloudTestCase(test.TestCase):
|
||||
db.service_destroy(self.context, service1['id'])
|
||||
db.service_destroy(self.context, service2['id'])
|
||||
|
||||
# NOTE(jkoelker): this test relies on fixed_ip being in instances
|
||||
@test.skip_test("EC2 stuff needs fixed_ip in instance_ref")
|
||||
def test_describe_snapshots(self):
|
||||
"""Makes sure describe_snapshots works and filters results."""
|
||||
vol = db.volume_create(self.context, {})
|
||||
@@ -548,6 +668,8 @@ class CloudTestCase(test.TestCase):
|
||||
self.assertEqual('c00l 1m4g3', inst['display_name'])
|
||||
db.instance_destroy(self.context, inst['id'])
|
||||
|
||||
# NOTE(jkoelker): This test relies on mac_address in instance
|
||||
@test.skip_test("EC2 stuff needs mac_address in instance_ref")
|
||||
def test_update_of_instance_wont_update_private_fields(self):
|
||||
inst = db.instance_create(self.context, {})
|
||||
ec2_id = ec2utils.id_to_ec2_id(inst['id'])
|
||||
@@ -611,6 +733,7 @@ class CloudTestCase(test.TestCase):
|
||||
elevated = self.context.elevated(read_deleted=True)
|
||||
self._wait_for_state(elevated, instance_id, is_deleted)
|
||||
|
||||
@test.skip_test("skipping, test is hanging with multinic for rpc reasons")
|
||||
def test_stop_start_instance(self):
|
||||
"""Makes sure stop/start instance works"""
|
||||
# enforce periodic tasks run in short time to avoid wait for 60s.
|
||||
@@ -666,6 +789,7 @@ class CloudTestCase(test.TestCase):
|
||||
self.assertEqual(vol['status'], "available")
|
||||
self.assertEqual(vol['attach_status'], "detached")
|
||||
|
||||
@test.skip_test("skipping, test is hanging with multinic for rpc reasons")
|
||||
def test_stop_start_with_volume(self):
|
||||
"""Make sure run instance with block device mapping works"""
|
||||
|
||||
@@ -734,6 +858,7 @@ class CloudTestCase(test.TestCase):
|
||||
|
||||
self._restart_compute_service()
|
||||
|
||||
@test.skip_test("skipping, test is hanging with multinic for rpc reasons")
|
||||
def test_stop_with_attached_volume(self):
|
||||
"""Make sure attach info is reflected to block device mapping"""
|
||||
# enforce periodic tasks run in short time to avoid wait for 60s.
|
||||
@@ -809,6 +934,7 @@ class CloudTestCase(test.TestCase):
|
||||
greenthread.sleep(0.3)
|
||||
return result['snapshotId']
|
||||
|
||||
@test.skip_test("skipping, test is hanging with multinic for rpc reasons")
|
||||
def test_run_with_snapshot(self):
|
||||
"""Makes sure run/stop/start instance with snapshot works."""
|
||||
vol = self._volume_create()
|
||||
|
||||
@@ -37,6 +37,7 @@ from nova import log as logging
|
||||
from nova import rpc
|
||||
from nova import test
|
||||
from nova import utils
|
||||
from nova.notifier import test_notifier
|
||||
|
||||
LOG = logging.getLogger('nova.tests.compute')
|
||||
FLAGS = flags.FLAGS
|
||||
@@ -62,6 +63,7 @@ class ComputeTestCase(test.TestCase):
|
||||
super(ComputeTestCase, self).setUp()
|
||||
self.flags(connection_type='fake',
|
||||
stub_network=True,
|
||||
notification_driver='nova.notifier.test_notifier',
|
||||
network_manager='nova.network.manager.FlatManager')
|
||||
self.compute = utils.import_object(FLAGS.compute_manager)
|
||||
self.compute_api = compute.API()
|
||||
@@ -69,6 +71,7 @@ class ComputeTestCase(test.TestCase):
|
||||
self.user = self.manager.create_user('fake', 'fake', 'fake')
|
||||
self.project = self.manager.create_project('fake', 'fake', 'fake')
|
||||
self.context = context.RequestContext('fake', 'fake', False)
|
||||
test_notifier.NOTIFICATIONS = []
|
||||
|
||||
def fake_show(meh, context, id):
|
||||
return {'id': 1, 'properties': {'kernel_id': 1, 'ramdisk_id': 1}}
|
||||
@@ -90,7 +93,6 @@ class ComputeTestCase(test.TestCase):
|
||||
inst['project_id'] = self.project.id
|
||||
type_id = instance_types.get_instance_type_by_name('m1.tiny')['id']
|
||||
inst['instance_type_id'] = type_id
|
||||
inst['mac_address'] = utils.generate_mac()
|
||||
inst['ami_launch_index'] = 0
|
||||
inst.update(params)
|
||||
return db.instance_create(self.context, inst)['id']
|
||||
@@ -128,7 +130,7 @@ class ComputeTestCase(test.TestCase):
|
||||
instance_ref = models.Instance()
|
||||
instance_ref['id'] = 1
|
||||
instance_ref['volumes'] = [vol1, vol2]
|
||||
instance_ref['hostname'] = 'i-00000001'
|
||||
instance_ref['hostname'] = 'hostname-1'
|
||||
instance_ref['host'] = 'dummy'
|
||||
return instance_ref
|
||||
|
||||
@@ -160,6 +162,18 @@ class ComputeTestCase(test.TestCase):
|
||||
db.security_group_destroy(self.context, group['id'])
|
||||
db.instance_destroy(self.context, ref[0]['id'])
|
||||
|
||||
def test_default_hostname_generator(self):
|
||||
cases = [(None, 'server_1'), ('Hello, Server!', 'hello_server'),
|
||||
('<}\x1fh\x10e\x08l\x02l\x05o\x12!{>', 'hello')]
|
||||
for display_name, hostname in cases:
|
||||
ref = self.compute_api.create(self.context,
|
||||
instance_types.get_default_instance_type(), None,
|
||||
display_name=display_name)
|
||||
try:
|
||||
self.assertEqual(ref[0]['hostname'], hostname)
|
||||
finally:
|
||||
db.instance_destroy(self.context, ref[0]['id'])
|
||||
|
||||
def test_destroy_instance_disassociates_security_groups(self):
|
||||
"""Make sure destroying disassociates security groups"""
|
||||
group = self._create_group()
|
||||
@@ -327,6 +341,50 @@ class ComputeTestCase(test.TestCase):
|
||||
self.assert_(console)
|
||||
self.compute.terminate_instance(self.context, instance_id)
|
||||
|
||||
def test_run_instance_usage_notification(self):
|
||||
"""Ensure run instance generates apropriate usage notification"""
|
||||
instance_id = self._create_instance()
|
||||
self.compute.run_instance(self.context, instance_id)
|
||||
self.assertEquals(len(test_notifier.NOTIFICATIONS), 1)
|
||||
msg = test_notifier.NOTIFICATIONS[0]
|
||||
self.assertEquals(msg['priority'], 'INFO')
|
||||
self.assertEquals(msg['event_type'], 'compute.instance.create')
|
||||
payload = msg['payload']
|
||||
self.assertEquals(payload['tenant_id'], self.project.id)
|
||||
self.assertEquals(payload['user_id'], self.user.id)
|
||||
self.assertEquals(payload['instance_id'], instance_id)
|
||||
self.assertEquals(payload['instance_type'], 'm1.tiny')
|
||||
type_id = instance_types.get_instance_type_by_name('m1.tiny')['id']
|
||||
self.assertEquals(str(payload['instance_type_id']), str(type_id))
|
||||
self.assertTrue('display_name' in payload)
|
||||
self.assertTrue('created_at' in payload)
|
||||
self.assertTrue('launched_at' in payload)
|
||||
self.assertEquals(payload['image_ref'], '1')
|
||||
self.compute.terminate_instance(self.context, instance_id)
|
||||
|
||||
def test_terminate_usage_notification(self):
|
||||
"""Ensure terminate_instance generates apropriate usage notification"""
|
||||
instance_id = self._create_instance()
|
||||
self.compute.run_instance(self.context, instance_id)
|
||||
test_notifier.NOTIFICATIONS = []
|
||||
self.compute.terminate_instance(self.context, instance_id)
|
||||
|
||||
self.assertEquals(len(test_notifier.NOTIFICATIONS), 1)
|
||||
msg = test_notifier.NOTIFICATIONS[0]
|
||||
self.assertEquals(msg['priority'], 'INFO')
|
||||
self.assertEquals(msg['event_type'], 'compute.instance.delete')
|
||||
payload = msg['payload']
|
||||
self.assertEquals(payload['tenant_id'], self.project.id)
|
||||
self.assertEquals(payload['user_id'], self.user.id)
|
||||
self.assertEquals(payload['instance_id'], instance_id)
|
||||
self.assertEquals(payload['instance_type'], 'm1.tiny')
|
||||
type_id = instance_types.get_instance_type_by_name('m1.tiny')['id']
|
||||
self.assertEquals(str(payload['instance_type_id']), str(type_id))
|
||||
self.assertTrue('display_name' in payload)
|
||||
self.assertTrue('created_at' in payload)
|
||||
self.assertTrue('launched_at' in payload)
|
||||
self.assertEquals(payload['image_ref'], '1')
|
||||
|
||||
def test_run_instance_existing(self):
|
||||
"""Ensure failure when running an instance that already exists"""
|
||||
instance_id = self._create_instance()
|
||||
@@ -363,6 +421,7 @@ class ComputeTestCase(test.TestCase):
|
||||
pass
|
||||
|
||||
self.stubs.Set(self.compute.driver, 'finish_resize', fake)
|
||||
self.stubs.Set(self.compute.network_api, 'get_instance_nw_info', fake)
|
||||
context = self.context.elevated()
|
||||
instance_id = self._create_instance()
|
||||
self.compute.prep_resize(context, instance_id, 1)
|
||||
@@ -378,6 +437,36 @@ class ComputeTestCase(test.TestCase):
|
||||
|
||||
self.compute.terminate_instance(self.context, instance_id)
|
||||
|
||||
def test_resize_instance_notification(self):
|
||||
"""Ensure notifications on instance migrate/resize"""
|
||||
instance_id = self._create_instance()
|
||||
context = self.context.elevated()
|
||||
|
||||
self.compute.run_instance(self.context, instance_id)
|
||||
test_notifier.NOTIFICATIONS = []
|
||||
|
||||
db.instance_update(self.context, instance_id, {'host': 'foo'})
|
||||
self.compute.prep_resize(context, instance_id, 1)
|
||||
migration_ref = db.migration_get_by_instance_and_status(context,
|
||||
instance_id, 'pre-migrating')
|
||||
|
||||
self.assertEquals(len(test_notifier.NOTIFICATIONS), 1)
|
||||
msg = test_notifier.NOTIFICATIONS[0]
|
||||
self.assertEquals(msg['priority'], 'INFO')
|
||||
self.assertEquals(msg['event_type'], 'compute.instance.resize.prep')
|
||||
payload = msg['payload']
|
||||
self.assertEquals(payload['tenant_id'], self.project.id)
|
||||
self.assertEquals(payload['user_id'], self.user.id)
|
||||
self.assertEquals(payload['instance_id'], instance_id)
|
||||
self.assertEquals(payload['instance_type'], 'm1.tiny')
|
||||
type_id = instance_types.get_instance_type_by_name('m1.tiny')['id']
|
||||
self.assertEquals(str(payload['instance_type_id']), str(type_id))
|
||||
self.assertTrue('display_name' in payload)
|
||||
self.assertTrue('created_at' in payload)
|
||||
self.assertTrue('launched_at' in payload)
|
||||
self.assertEquals(payload['image_ref'], '1')
|
||||
self.compute.terminate_instance(context, instance_id)
|
||||
|
||||
def test_resize_instance(self):
|
||||
"""Ensure instance can be migrated/resized"""
|
||||
instance_id = self._create_instance()
|
||||
@@ -456,7 +545,7 @@ class ComputeTestCase(test.TestCase):
|
||||
|
||||
dbmock = self.mox.CreateMock(db)
|
||||
dbmock.instance_get(c, i_id).AndReturn(instance_ref)
|
||||
dbmock.instance_get_fixed_address(c, i_id).AndReturn(None)
|
||||
dbmock.instance_get_fixed_addresses(c, i_id).AndReturn(None)
|
||||
|
||||
self.compute.db = dbmock
|
||||
self.mox.ReplayAll()
|
||||
@@ -476,7 +565,7 @@ class ComputeTestCase(test.TestCase):
|
||||
drivermock = self.mox.CreateMock(self.compute_driver)
|
||||
|
||||
dbmock.instance_get(c, i_ref['id']).AndReturn(i_ref)
|
||||
dbmock.instance_get_fixed_address(c, i_ref['id']).AndReturn('dummy')
|
||||
dbmock.instance_get_fixed_addresses(c, i_ref['id']).AndReturn('dummy')
|
||||
for i in range(len(i_ref['volumes'])):
|
||||
vid = i_ref['volumes'][i]['id']
|
||||
volmock.setup_compute_volume(c, vid).InAnyOrder('g1')
|
||||
@@ -504,7 +593,7 @@ class ComputeTestCase(test.TestCase):
|
||||
drivermock = self.mox.CreateMock(self.compute_driver)
|
||||
|
||||
dbmock.instance_get(c, i_ref['id']).AndReturn(i_ref)
|
||||
dbmock.instance_get_fixed_address(c, i_ref['id']).AndReturn('dummy')
|
||||
dbmock.instance_get_fixed_addresses(c, i_ref['id']).AndReturn('dummy')
|
||||
self.mox.StubOutWithMock(compute_manager.LOG, 'info')
|
||||
compute_manager.LOG.info(_("%s has no volume."), i_ref['hostname'])
|
||||
netmock.setup_compute_network(c, i_ref['id'])
|
||||
@@ -534,7 +623,7 @@ class ComputeTestCase(test.TestCase):
|
||||
volmock = self.mox.CreateMock(self.volume_manager)
|
||||
|
||||
dbmock.instance_get(c, i_ref['id']).AndReturn(i_ref)
|
||||
dbmock.instance_get_fixed_address(c, i_ref['id']).AndReturn('dummy')
|
||||
dbmock.instance_get_fixed_addresses(c, i_ref['id']).AndReturn('dummy')
|
||||
for i in range(len(i_ref['volumes'])):
|
||||
volmock.setup_compute_volume(c, i_ref['volumes'][i]['id'])
|
||||
for i in range(FLAGS.live_migration_retry_count):
|
||||
|
||||
@@ -61,7 +61,6 @@ class ConsoleTestCase(test.TestCase):
|
||||
inst['user_id'] = self.user.id
|
||||
inst['project_id'] = self.project.id
|
||||
inst['instance_type_id'] = 1
|
||||
inst['mac_address'] = utils.generate_mac()
|
||||
inst['ami_launch_index'] = 0
|
||||
return db.instance_create(self.context, inst)['id']
|
||||
|
||||
|
||||
+22
-21
@@ -105,24 +105,25 @@ class DirectTestCase(test.TestCase):
|
||||
self.assertEqual(rv['data'], 'baz')
|
||||
|
||||
|
||||
class DirectCloudTestCase(test_cloud.CloudTestCase):
|
||||
def setUp(self):
|
||||
super(DirectCloudTestCase, self).setUp()
|
||||
compute_handle = compute.API(image_service=self.cloud.image_service)
|
||||
volume_handle = volume.API()
|
||||
network_handle = network.API()
|
||||
direct.register_service('compute', compute_handle)
|
||||
direct.register_service('volume', volume_handle)
|
||||
direct.register_service('network', network_handle)
|
||||
|
||||
self.router = direct.JsonParamsMiddleware(direct.Router())
|
||||
proxy = direct.Proxy(self.router)
|
||||
self.cloud.compute_api = proxy.compute
|
||||
self.cloud.volume_api = proxy.volume
|
||||
self.cloud.network_api = proxy.network
|
||||
compute_handle.volume_api = proxy.volume
|
||||
compute_handle.network_api = proxy.network
|
||||
|
||||
def tearDown(self):
|
||||
super(DirectCloudTestCase, self).tearDown()
|
||||
direct.ROUTES = {}
|
||||
# NOTE(jkoelker): This fails using the EC2 api
|
||||
#class DirectCloudTestCase(test_cloud.CloudTestCase):
|
||||
# def setUp(self):
|
||||
# super(DirectCloudTestCase, self).setUp()
|
||||
# compute_handle = compute.API(image_service=self.cloud.image_service)
|
||||
# volume_handle = volume.API()
|
||||
# network_handle = network.API()
|
||||
# direct.register_service('compute', compute_handle)
|
||||
# direct.register_service('volume', volume_handle)
|
||||
# direct.register_service('network', network_handle)
|
||||
#
|
||||
# self.router = direct.JsonParamsMiddleware(direct.Router())
|
||||
# proxy = direct.Proxy(self.router)
|
||||
# self.cloud.compute_api = proxy.compute
|
||||
# self.cloud.volume_api = proxy.volume
|
||||
# self.cloud.network_api = proxy.network
|
||||
# compute_handle.volume_api = proxy.volume
|
||||
# compute_handle.network_api = proxy.network
|
||||
#
|
||||
# def tearDown(self):
|
||||
# super(DirectCloudTestCase, self).tearDown()
|
||||
# direct.ROUTES = {}
|
||||
|
||||
@@ -1,161 +0,0 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2010 United States Government as represented by the
|
||||
# Administrator of the National Aeronautics and Space Administration.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
"""
|
||||
Unit Tests for flat network code
|
||||
"""
|
||||
import netaddr
|
||||
import os
|
||||
import unittest
|
||||
|
||||
from nova import context
|
||||
from nova import db
|
||||
from nova import exception
|
||||
from nova import flags
|
||||
from nova import log as logging
|
||||
from nova import test
|
||||
from nova import utils
|
||||
from nova.auth import manager
|
||||
from nova.tests.network import base
|
||||
|
||||
|
||||
FLAGS = flags.FLAGS
|
||||
LOG = logging.getLogger('nova.tests.network')
|
||||
|
||||
|
||||
class FlatNetworkTestCase(base.NetworkTestCase):
|
||||
"""Test cases for network code"""
|
||||
def test_public_network_association(self):
|
||||
"""Makes sure that we can allocate a public ip"""
|
||||
# TODO(vish): better way of adding floating ips
|
||||
|
||||
self.context._project = self.projects[0]
|
||||
self.context.project_id = self.projects[0].id
|
||||
pubnet = netaddr.IPRange(flags.FLAGS.floating_range)
|
||||
address = str(list(pubnet)[0])
|
||||
try:
|
||||
db.floating_ip_get_by_address(context.get_admin_context(), address)
|
||||
except exception.NotFound:
|
||||
db.floating_ip_create(context.get_admin_context(),
|
||||
{'address': address,
|
||||
'host': FLAGS.host})
|
||||
|
||||
self.assertRaises(NotImplementedError,
|
||||
self.network.allocate_floating_ip,
|
||||
self.context, self.projects[0].id)
|
||||
|
||||
fix_addr = self._create_address(0)
|
||||
float_addr = address
|
||||
self.assertRaises(NotImplementedError,
|
||||
self.network.associate_floating_ip,
|
||||
self.context, float_addr, fix_addr)
|
||||
|
||||
address = db.instance_get_floating_address(context.get_admin_context(),
|
||||
self.instance_id)
|
||||
self.assertEqual(address, None)
|
||||
|
||||
self.assertRaises(NotImplementedError,
|
||||
self.network.disassociate_floating_ip,
|
||||
self.context, float_addr)
|
||||
|
||||
address = db.instance_get_floating_address(context.get_admin_context(),
|
||||
self.instance_id)
|
||||
self.assertEqual(address, None)
|
||||
|
||||
self.assertRaises(NotImplementedError,
|
||||
self.network.deallocate_floating_ip,
|
||||
self.context, float_addr)
|
||||
|
||||
self.network.deallocate_fixed_ip(self.context, fix_addr)
|
||||
db.floating_ip_destroy(context.get_admin_context(), float_addr)
|
||||
|
||||
def test_allocate_deallocate_fixed_ip(self):
|
||||
"""Makes sure that we can allocate and deallocate a fixed ip"""
|
||||
address = self._create_address(0)
|
||||
self.assertTrue(self._is_allocated_in_project(address,
|
||||
self.projects[0].id))
|
||||
self._deallocate_address(0, address)
|
||||
|
||||
# check if the fixed ip address is really deallocated
|
||||
self.assertFalse(self._is_allocated_in_project(address,
|
||||
self.projects[0].id))
|
||||
|
||||
def test_side_effects(self):
|
||||
"""Ensures allocating and releasing has no side effects"""
|
||||
address = self._create_address(0)
|
||||
address2 = self._create_address(1, self.instance2_id)
|
||||
|
||||
self.assertTrue(self._is_allocated_in_project(address,
|
||||
self.projects[0].id))
|
||||
self.assertTrue(self._is_allocated_in_project(address2,
|
||||
self.projects[1].id))
|
||||
|
||||
self._deallocate_address(0, address)
|
||||
self.assertFalse(self._is_allocated_in_project(address,
|
||||
self.projects[0].id))
|
||||
|
||||
# First address release shouldn't affect the second
|
||||
self.assertTrue(self._is_allocated_in_project(address2,
|
||||
self.projects[0].id))
|
||||
|
||||
self._deallocate_address(1, address2)
|
||||
self.assertFalse(self._is_allocated_in_project(address2,
|
||||
self.projects[1].id))
|
||||
|
||||
def test_ips_are_reused(self):
|
||||
"""Makes sure that ip addresses that are deallocated get reused"""
|
||||
address = self._create_address(0)
|
||||
self.network.deallocate_fixed_ip(self.context, address)
|
||||
|
||||
address2 = self._create_address(0)
|
||||
self.assertEqual(address, address2)
|
||||
|
||||
self.network.deallocate_fixed_ip(self.context, address2)
|
||||
|
||||
def test_too_many_addresses(self):
|
||||
"""Test for a NoMoreAddresses exception when all fixed ips are used.
|
||||
"""
|
||||
admin_context = context.get_admin_context()
|
||||
network = db.project_get_network(admin_context, self.projects[0].id)
|
||||
num_available_ips = db.network_count_available_ips(admin_context,
|
||||
network['id'])
|
||||
addresses = []
|
||||
instance_ids = []
|
||||
for i in range(num_available_ips):
|
||||
instance_ref = self._create_instance(0)
|
||||
instance_ids.append(instance_ref['id'])
|
||||
address = self._create_address(0, instance_ref['id'])
|
||||
addresses.append(address)
|
||||
|
||||
ip_count = db.network_count_available_ips(context.get_admin_context(),
|
||||
network['id'])
|
||||
self.assertEqual(ip_count, 0)
|
||||
self.assertRaises(db.NoMoreAddresses,
|
||||
self.network.allocate_fixed_ip,
|
||||
self.context,
|
||||
'foo')
|
||||
|
||||
for i in range(num_available_ips):
|
||||
self.network.deallocate_fixed_ip(self.context, addresses[i])
|
||||
db.instance_destroy(context.get_admin_context(), instance_ids[i])
|
||||
ip_count = db.network_count_available_ips(context.get_admin_context(),
|
||||
network['id'])
|
||||
self.assertEqual(ip_count, num_available_ips)
|
||||
|
||||
def run(self, result=None):
|
||||
if(FLAGS.network_manager == 'nova.network.manager.FlatManager'):
|
||||
super(FlatNetworkTestCase, self).run(result)
|
||||
@@ -67,7 +67,8 @@ class HostFilterTestCase(test.TestCase):
|
||||
flavorid=1,
|
||||
swap=500,
|
||||
rxtx_quota=30000,
|
||||
rxtx_cap=200)
|
||||
rxtx_cap=200,
|
||||
extra_specs={})
|
||||
|
||||
self.zone_manager = FakeZoneManager()
|
||||
states = {}
|
||||
|
||||
@@ -0,0 +1,165 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2011 University of Southern California
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
"""
|
||||
Unit Tests for instance types extra specs code
|
||||
"""
|
||||
|
||||
from nova import context
|
||||
from nova import db
|
||||
from nova import test
|
||||
from nova.db.sqlalchemy.session import get_session
|
||||
from nova.db.sqlalchemy import models
|
||||
|
||||
|
||||
class InstanceTypeExtraSpecsTestCase(test.TestCase):
|
||||
|
||||
def setUp(self):
|
||||
super(InstanceTypeExtraSpecsTestCase, self).setUp()
|
||||
self.context = context.get_admin_context()
|
||||
values = dict(name="cg1.4xlarge",
|
||||
memory_mb=22000,
|
||||
vcpus=8,
|
||||
local_gb=1690,
|
||||
flavorid=105)
|
||||
specs = dict(cpu_arch="x86_64",
|
||||
cpu_model="Nehalem",
|
||||
xpu_arch="fermi",
|
||||
xpus=2,
|
||||
xpu_model="Tesla 2050")
|
||||
values['extra_specs'] = specs
|
||||
ref = db.api.instance_type_create(self.context,
|
||||
values)
|
||||
self.instance_type_id = ref.id
|
||||
|
||||
def tearDown(self):
|
||||
# Remove the instance type from the database
|
||||
db.api.instance_type_purge(context.get_admin_context(), "cg1.4xlarge")
|
||||
super(InstanceTypeExtraSpecsTestCase, self).tearDown()
|
||||
|
||||
def test_instance_type_specs_get(self):
|
||||
expected_specs = dict(cpu_arch="x86_64",
|
||||
cpu_model="Nehalem",
|
||||
xpu_arch="fermi",
|
||||
xpus="2",
|
||||
xpu_model="Tesla 2050")
|
||||
actual_specs = db.api.instance_type_extra_specs_get(
|
||||
context.get_admin_context(),
|
||||
self.instance_type_id)
|
||||
self.assertEquals(expected_specs, actual_specs)
|
||||
|
||||
def test_instance_type_extra_specs_delete(self):
|
||||
expected_specs = dict(cpu_arch="x86_64",
|
||||
cpu_model="Nehalem",
|
||||
xpu_arch="fermi",
|
||||
xpus="2")
|
||||
db.api.instance_type_extra_specs_delete(context.get_admin_context(),
|
||||
self.instance_type_id,
|
||||
"xpu_model")
|
||||
actual_specs = db.api.instance_type_extra_specs_get(
|
||||
context.get_admin_context(),
|
||||
self.instance_type_id)
|
||||
self.assertEquals(expected_specs, actual_specs)
|
||||
|
||||
def test_instance_type_extra_specs_update(self):
|
||||
expected_specs = dict(cpu_arch="x86_64",
|
||||
cpu_model="Sandy Bridge",
|
||||
xpu_arch="fermi",
|
||||
xpus="2",
|
||||
xpu_model="Tesla 2050")
|
||||
db.api.instance_type_extra_specs_update_or_create(
|
||||
context.get_admin_context(),
|
||||
self.instance_type_id,
|
||||
dict(cpu_model="Sandy Bridge"))
|
||||
actual_specs = db.api.instance_type_extra_specs_get(
|
||||
context.get_admin_context(),
|
||||
self.instance_type_id)
|
||||
self.assertEquals(expected_specs, actual_specs)
|
||||
|
||||
def test_instance_type_extra_specs_create(self):
|
||||
expected_specs = dict(cpu_arch="x86_64",
|
||||
cpu_model="Nehalem",
|
||||
xpu_arch="fermi",
|
||||
xpus="2",
|
||||
xpu_model="Tesla 2050",
|
||||
net_arch="ethernet",
|
||||
net_mbps="10000")
|
||||
db.api.instance_type_extra_specs_update_or_create(
|
||||
context.get_admin_context(),
|
||||
self.instance_type_id,
|
||||
dict(net_arch="ethernet",
|
||||
net_mbps=10000))
|
||||
actual_specs = db.api.instance_type_extra_specs_get(
|
||||
context.get_admin_context(),
|
||||
self.instance_type_id)
|
||||
self.assertEquals(expected_specs, actual_specs)
|
||||
|
||||
def test_instance_type_get_by_id_with_extra_specs(self):
|
||||
instance_type = db.api.instance_type_get_by_id(
|
||||
context.get_admin_context(),
|
||||
self.instance_type_id)
|
||||
self.assertEquals(instance_type['extra_specs'],
|
||||
dict(cpu_arch="x86_64",
|
||||
cpu_model="Nehalem",
|
||||
xpu_arch="fermi",
|
||||
xpus="2",
|
||||
xpu_model="Tesla 2050"))
|
||||
instance_type = db.api.instance_type_get_by_id(
|
||||
context.get_admin_context(),
|
||||
5)
|
||||
self.assertEquals(instance_type['extra_specs'], {})
|
||||
|
||||
def test_instance_type_get_by_name_with_extra_specs(self):
|
||||
instance_type = db.api.instance_type_get_by_name(
|
||||
context.get_admin_context(),
|
||||
"cg1.4xlarge")
|
||||
self.assertEquals(instance_type['extra_specs'],
|
||||
dict(cpu_arch="x86_64",
|
||||
cpu_model="Nehalem",
|
||||
xpu_arch="fermi",
|
||||
xpus="2",
|
||||
xpu_model="Tesla 2050"))
|
||||
|
||||
instance_type = db.api.instance_type_get_by_name(
|
||||
context.get_admin_context(),
|
||||
"m1.small")
|
||||
self.assertEquals(instance_type['extra_specs'], {})
|
||||
|
||||
def test_instance_type_get_by_id_with_extra_specs(self):
|
||||
instance_type = db.api.instance_type_get_by_flavor_id(
|
||||
context.get_admin_context(),
|
||||
105)
|
||||
self.assertEquals(instance_type['extra_specs'],
|
||||
dict(cpu_arch="x86_64",
|
||||
cpu_model="Nehalem",
|
||||
xpu_arch="fermi",
|
||||
xpus="2",
|
||||
xpu_model="Tesla 2050"))
|
||||
|
||||
instance_type = db.api.instance_type_get_by_flavor_id(
|
||||
context.get_admin_context(),
|
||||
2)
|
||||
self.assertEquals(instance_type['extra_specs'], {})
|
||||
|
||||
def test_instance_type_get_all(self):
|
||||
specs = dict(cpu_arch="x86_64",
|
||||
cpu_model="Nehalem",
|
||||
xpu_arch="fermi",
|
||||
xpus='2',
|
||||
xpu_model="Tesla 2050")
|
||||
|
||||
types = db.api.instance_type_get_all(context.get_admin_context())
|
||||
|
||||
self.assertEquals(types['cg1.4xlarge']['extra_specs'], specs)
|
||||
self.assertEquals(types['m1.small']['extra_specs'], {})
|
||||
@@ -0,0 +1,164 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2010 United States Government as represented by the
|
||||
# Administrator of the National Aeronautics and Space Administration.
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
"""Unit Tests for network code."""
|
||||
|
||||
import os
|
||||
|
||||
from nova import test
|
||||
from nova.network import linux_net
|
||||
|
||||
|
||||
class IptablesManagerTestCase(test.TestCase):
|
||||
sample_filter = ['#Generated by iptables-save on Fri Feb 18 15:17:05 2011',
|
||||
'*filter',
|
||||
':INPUT ACCEPT [2223527:305688874]',
|
||||
':FORWARD ACCEPT [0:0]',
|
||||
':OUTPUT ACCEPT [2172501:140856656]',
|
||||
':nova-compute-FORWARD - [0:0]',
|
||||
':nova-compute-INPUT - [0:0]',
|
||||
':nova-compute-local - [0:0]',
|
||||
':nova-compute-OUTPUT - [0:0]',
|
||||
':nova-filter-top - [0:0]',
|
||||
'-A FORWARD -j nova-filter-top ',
|
||||
'-A OUTPUT -j nova-filter-top ',
|
||||
'-A nova-filter-top -j nova-compute-local ',
|
||||
'-A INPUT -j nova-compute-INPUT ',
|
||||
'-A OUTPUT -j nova-compute-OUTPUT ',
|
||||
'-A FORWARD -j nova-compute-FORWARD ',
|
||||
'-A INPUT -i virbr0 -p udp -m udp --dport 53 -j ACCEPT ',
|
||||
'-A INPUT -i virbr0 -p tcp -m tcp --dport 53 -j ACCEPT ',
|
||||
'-A INPUT -i virbr0 -p udp -m udp --dport 67 -j ACCEPT ',
|
||||
'-A INPUT -i virbr0 -p tcp -m tcp --dport 67 -j ACCEPT ',
|
||||
'-A FORWARD -s 192.168.122.0/24 -i virbr0 -j ACCEPT ',
|
||||
'-A FORWARD -i virbr0 -o virbr0 -j ACCEPT ',
|
||||
'-A FORWARD -o virbr0 -j REJECT --reject-with '
|
||||
'icmp-port-unreachable ',
|
||||
'-A FORWARD -i virbr0 -j REJECT --reject-with '
|
||||
'icmp-port-unreachable ',
|
||||
'COMMIT',
|
||||
'# Completed on Fri Feb 18 15:17:05 2011']
|
||||
|
||||
sample_nat = ['# Generated by iptables-save on Fri Feb 18 15:17:05 2011',
|
||||
'*nat',
|
||||
':PREROUTING ACCEPT [3936:762355]',
|
||||
':INPUT ACCEPT [2447:225266]',
|
||||
':OUTPUT ACCEPT [63491:4191863]',
|
||||
':POSTROUTING ACCEPT [63112:4108641]',
|
||||
':nova-compute-OUTPUT - [0:0]',
|
||||
':nova-compute-floating-ip-snat - [0:0]',
|
||||
':nova-compute-SNATTING - [0:0]',
|
||||
':nova-compute-PREROUTING - [0:0]',
|
||||
':nova-compute-POSTROUTING - [0:0]',
|
||||
':nova-postrouting-bottom - [0:0]',
|
||||
'-A PREROUTING -j nova-compute-PREROUTING ',
|
||||
'-A OUTPUT -j nova-compute-OUTPUT ',
|
||||
'-A POSTROUTING -j nova-compute-POSTROUTING ',
|
||||
'-A POSTROUTING -j nova-postrouting-bottom ',
|
||||
'-A nova-postrouting-bottom -j nova-compute-SNATTING ',
|
||||
'-A nova-compute-SNATTING -j nova-compute-floating-ip-snat ',
|
||||
'COMMIT',
|
||||
'# Completed on Fri Feb 18 15:17:05 2011']
|
||||
|
||||
def setUp(self):
|
||||
super(IptablesManagerTestCase, self).setUp()
|
||||
self.manager = linux_net.IptablesManager()
|
||||
|
||||
def test_filter_rules_are_wrapped(self):
|
||||
current_lines = self.sample_filter
|
||||
|
||||
table = self.manager.ipv4['filter']
|
||||
table.add_rule('FORWARD', '-s 1.2.3.4/5 -j DROP')
|
||||
new_lines = self.manager._modify_rules(current_lines, table)
|
||||
self.assertTrue('-A run_tests.py-FORWARD '
|
||||
'-s 1.2.3.4/5 -j DROP' in new_lines)
|
||||
|
||||
table.remove_rule('FORWARD', '-s 1.2.3.4/5 -j DROP')
|
||||
new_lines = self.manager._modify_rules(current_lines, table)
|
||||
self.assertTrue('-A run_tests.py-FORWARD '
|
||||
'-s 1.2.3.4/5 -j DROP' not in new_lines)
|
||||
|
||||
def test_nat_rules(self):
|
||||
current_lines = self.sample_nat
|
||||
new_lines = self.manager._modify_rules(current_lines,
|
||||
self.manager.ipv4['nat'])
|
||||
|
||||
for line in [':nova-compute-OUTPUT - [0:0]',
|
||||
':nova-compute-floating-ip-snat - [0:0]',
|
||||
':nova-compute-SNATTING - [0:0]',
|
||||
':nova-compute-PREROUTING - [0:0]',
|
||||
':nova-compute-POSTROUTING - [0:0]']:
|
||||
self.assertTrue(line in new_lines, "One of nova-compute's chains "
|
||||
"went missing.")
|
||||
|
||||
seen_lines = set()
|
||||
for line in new_lines:
|
||||
line = line.strip()
|
||||
self.assertTrue(line not in seen_lines,
|
||||
"Duplicate line: %s" % line)
|
||||
seen_lines.add(line)
|
||||
|
||||
last_postrouting_line = ''
|
||||
|
||||
for line in new_lines:
|
||||
if line.startswith('-A POSTROUTING'):
|
||||
last_postrouting_line = line
|
||||
|
||||
self.assertTrue('-j nova-postrouting-bottom' in last_postrouting_line,
|
||||
"Last POSTROUTING rule does not jump to "
|
||||
"nova-postouting-bottom: %s" % last_postrouting_line)
|
||||
|
||||
for chain in ['POSTROUTING', 'PREROUTING', 'OUTPUT']:
|
||||
self.assertTrue('-A %s -j run_tests.py-%s' \
|
||||
% (chain, chain) in new_lines,
|
||||
"Built-in chain %s not wrapped" % (chain,))
|
||||
|
||||
def test_filter_rules(self):
|
||||
current_lines = self.sample_filter
|
||||
new_lines = self.manager._modify_rules(current_lines,
|
||||
self.manager.ipv4['filter'])
|
||||
|
||||
for line in [':nova-compute-FORWARD - [0:0]',
|
||||
':nova-compute-INPUT - [0:0]',
|
||||
':nova-compute-local - [0:0]',
|
||||
':nova-compute-OUTPUT - [0:0]']:
|
||||
self.assertTrue(line in new_lines, "One of nova-compute's chains"
|
||||
" went missing.")
|
||||
|
||||
seen_lines = set()
|
||||
for line in new_lines:
|
||||
line = line.strip()
|
||||
self.assertTrue(line not in seen_lines,
|
||||
"Duplicate line: %s" % line)
|
||||
seen_lines.add(line)
|
||||
|
||||
for chain in ['FORWARD', 'OUTPUT']:
|
||||
for line in new_lines:
|
||||
if line.startswith('-A %s' % chain):
|
||||
self.assertTrue('-j nova-filter-top' in line,
|
||||
"First %s rule does not "
|
||||
"jump to nova-filter-top" % chain)
|
||||
break
|
||||
|
||||
self.assertTrue('-A nova-filter-top '
|
||||
'-j run_tests.py-local' in new_lines,
|
||||
"nova-filter-top does not jump to wrapped local chain")
|
||||
|
||||
for chain in ['INPUT', 'OUTPUT', 'FORWARD']:
|
||||
self.assertTrue('-A %s -j run_tests.py-%s' \
|
||||
% (chain, chain) in new_lines,
|
||||
"Built-in chain %s not wrapped" % (chain,))
|
||||
+72
-38
@@ -54,12 +54,12 @@ def _create_network_info(count=1, ipv6=None):
|
||||
fake_ip = '0.0.0.0/0'
|
||||
fake_ip_2 = '0.0.0.1/0'
|
||||
fake_ip_3 = '0.0.0.1/0'
|
||||
network = {'gateway': fake,
|
||||
'gateway_v6': fake,
|
||||
'bridge': fake,
|
||||
network = {'bridge': fake,
|
||||
'cidr': fake_ip,
|
||||
'cidr_v6': fake_ip}
|
||||
mapping = {'mac': fake,
|
||||
'gateway': fake,
|
||||
'gateway6': fake,
|
||||
'ips': [{'ip': fake_ip}, {'ip': fake_ip}]}
|
||||
if ipv6:
|
||||
mapping['ip6s'] = [{'ip': fake_ip},
|
||||
@@ -68,6 +68,24 @@ def _create_network_info(count=1, ipv6=None):
|
||||
return [(network, mapping) for x in xrange(0, count)]
|
||||
|
||||
|
||||
def _setup_networking(instance_id, ip='1.2.3.4'):
|
||||
ctxt = context.get_admin_context()
|
||||
network_ref = db.project_get_networks(ctxt,
|
||||
'fake',
|
||||
associate=True)[0]
|
||||
vif = {'address': '56:12:12:12:12:12',
|
||||
'network_id': network_ref['id'],
|
||||
'instance_id': instance_id}
|
||||
vif_ref = db.virtual_interface_create(ctxt, vif)
|
||||
|
||||
fixed_ip = {'address': ip,
|
||||
'network_id': network_ref['id'],
|
||||
'virtual_interface_id': vif_ref['id']}
|
||||
db.fixed_ip_create(ctxt, fixed_ip)
|
||||
db.fixed_ip_update(ctxt, ip, {'allocated': True,
|
||||
'instance_id': instance_id})
|
||||
|
||||
|
||||
class CacheConcurrencyTestCase(test.TestCase):
|
||||
def setUp(self):
|
||||
super(CacheConcurrencyTestCase, self).setUp()
|
||||
@@ -155,11 +173,15 @@ class LibvirtConnTestCase(test.TestCase):
|
||||
FLAGS.instances_path = ''
|
||||
self.call_libvirt_dependant_setup = False
|
||||
|
||||
def tearDown(self):
|
||||
self.manager.delete_project(self.project)
|
||||
self.manager.delete_user(self.user)
|
||||
super(LibvirtConnTestCase, self).tearDown()
|
||||
|
||||
test_ip = '10.11.12.13'
|
||||
test_instance = {'memory_kb': '1024000',
|
||||
'basepath': '/some/path',
|
||||
'bridge_name': 'br100',
|
||||
'mac_address': '02:12:34:46:56:67',
|
||||
'vcpus': 2,
|
||||
'project_id': 'fake',
|
||||
'bridge': 'br101',
|
||||
@@ -241,6 +263,7 @@ class LibvirtConnTestCase(test.TestCase):
|
||||
|
||||
return db.service_create(context.get_admin_context(), service_ref)
|
||||
|
||||
@test.skip_test("Please review this test to ensure intent")
|
||||
def test_preparing_xml_info(self):
|
||||
conn = connection.LibvirtConnection(True)
|
||||
instance_ref = db.instance_create(self.context, self.test_instance)
|
||||
@@ -272,23 +295,27 @@ class LibvirtConnTestCase(test.TestCase):
|
||||
self.assertTrue(params.find('PROJNETV6') > -1)
|
||||
self.assertTrue(params.find('PROJMASKV6') > -1)
|
||||
|
||||
@test.skip_test("skipping libvirt tests depends on get_network_info shim")
|
||||
def test_xml_and_uri_no_ramdisk_no_kernel(self):
|
||||
instance_data = dict(self.test_instance)
|
||||
self._check_xml_and_uri(instance_data,
|
||||
expect_kernel=False, expect_ramdisk=False)
|
||||
|
||||
@test.skip_test("skipping libvirt tests depends on get_network_info shim")
|
||||
def test_xml_and_uri_no_ramdisk(self):
|
||||
instance_data = dict(self.test_instance)
|
||||
instance_data['kernel_id'] = 'aki-deadbeef'
|
||||
self._check_xml_and_uri(instance_data,
|
||||
expect_kernel=True, expect_ramdisk=False)
|
||||
|
||||
@test.skip_test("skipping libvirt tests depends on get_network_info shim")
|
||||
def test_xml_and_uri_no_kernel(self):
|
||||
instance_data = dict(self.test_instance)
|
||||
instance_data['ramdisk_id'] = 'ari-deadbeef'
|
||||
self._check_xml_and_uri(instance_data,
|
||||
expect_kernel=False, expect_ramdisk=False)
|
||||
|
||||
@test.skip_test("skipping libvirt tests depends on get_network_info shim")
|
||||
def test_xml_and_uri(self):
|
||||
instance_data = dict(self.test_instance)
|
||||
instance_data['ramdisk_id'] = 'ari-deadbeef'
|
||||
@@ -296,6 +323,7 @@ class LibvirtConnTestCase(test.TestCase):
|
||||
self._check_xml_and_uri(instance_data,
|
||||
expect_kernel=True, expect_ramdisk=True)
|
||||
|
||||
@test.skip_test("skipping libvirt tests depends on get_network_info shim")
|
||||
def test_xml_and_uri_rescue(self):
|
||||
instance_data = dict(self.test_instance)
|
||||
instance_data['ramdisk_id'] = 'ari-deadbeef'
|
||||
@@ -303,6 +331,7 @@ class LibvirtConnTestCase(test.TestCase):
|
||||
self._check_xml_and_uri(instance_data, expect_kernel=True,
|
||||
expect_ramdisk=True, rescue=True)
|
||||
|
||||
@test.skip_test("skipping libvirt tests depends on get_network_info shim")
|
||||
def test_lxc_container_and_uri(self):
|
||||
instance_data = dict(self.test_instance)
|
||||
self._check_xml_and_container(instance_data)
|
||||
@@ -402,12 +431,18 @@ class LibvirtConnTestCase(test.TestCase):
|
||||
user_context = context.RequestContext(project=self.project,
|
||||
user=self.user)
|
||||
instance_ref = db.instance_create(user_context, instance)
|
||||
host = self.network.get_network_host(user_context.elevated())
|
||||
network_ref = db.project_get_network(context.get_admin_context(),
|
||||
self.project.id)
|
||||
# Re-get the instance so it's bound to an actual session
|
||||
instance_ref = db.instance_get(user_context, instance_ref['id'])
|
||||
network_ref = db.project_get_networks(context.get_admin_context(),
|
||||
self.project.id)[0]
|
||||
|
||||
vif = {'address': '56:12:12:12:12:12',
|
||||
'network_id': network_ref['id'],
|
||||
'instance_id': instance_ref['id']}
|
||||
vif_ref = db.virtual_interface_create(self.context, vif)
|
||||
fixed_ip = {'address': self.test_ip,
|
||||
'network_id': network_ref['id']}
|
||||
'network_id': network_ref['id'],
|
||||
'virtual_interface_id': vif_ref['id']}
|
||||
|
||||
ctxt = context.get_admin_context()
|
||||
fixed_ip_ref = db.fixed_ip_create(ctxt, fixed_ip)
|
||||
@@ -442,18 +477,10 @@ class LibvirtConnTestCase(test.TestCase):
|
||||
user_context = context.RequestContext(project=self.project,
|
||||
user=self.user)
|
||||
instance_ref = db.instance_create(user_context, instance)
|
||||
host = self.network.get_network_host(user_context.elevated())
|
||||
network_ref = db.project_get_network(context.get_admin_context(),
|
||||
self.project.id)
|
||||
network_ref = db.project_get_networks(context.get_admin_context(),
|
||||
self.project.id)[0]
|
||||
|
||||
fixed_ip = {'address': self.test_ip,
|
||||
'network_id': network_ref['id']}
|
||||
|
||||
ctxt = context.get_admin_context()
|
||||
fixed_ip_ref = db.fixed_ip_create(ctxt, fixed_ip)
|
||||
db.fixed_ip_update(ctxt, self.test_ip,
|
||||
{'allocated': True,
|
||||
'instance_id': instance_ref['id']})
|
||||
_setup_networking(instance_ref['id'], ip=self.test_ip)
|
||||
|
||||
type_uri_map = {'qemu': ('qemu:///system',
|
||||
[(lambda t: t.find('.').get('type'), 'qemu'),
|
||||
@@ -712,6 +739,7 @@ class LibvirtConnTestCase(test.TestCase):
|
||||
db.volume_destroy(self.context, volume_ref['id'])
|
||||
db.instance_destroy(self.context, instance_ref['id'])
|
||||
|
||||
@test.skip_test("test needs rewrite: instance no longer has mac_address")
|
||||
def test_spawn_with_network_info(self):
|
||||
# Skip if non-libvirt environment
|
||||
if not self.lazy_load_library_exists():
|
||||
@@ -730,8 +758,8 @@ class LibvirtConnTestCase(test.TestCase):
|
||||
conn.firewall_driver.setattr('setup_basic_filtering', fake_none)
|
||||
conn.firewall_driver.setattr('prepare_instance_filter', fake_none)
|
||||
|
||||
network = db.project_get_network(context.get_admin_context(),
|
||||
self.project.id)
|
||||
network = db.project_get_networks(context.get_admin_context(),
|
||||
self.project.id)[0]
|
||||
ip_dict = {'ip': self.test_ip,
|
||||
'netmask': network['netmask'],
|
||||
'enabled': '1'}
|
||||
@@ -756,11 +784,6 @@ class LibvirtConnTestCase(test.TestCase):
|
||||
ip = conn.get_host_ip_addr()
|
||||
self.assertEquals(ip, FLAGS.my_ip)
|
||||
|
||||
def tearDown(self):
|
||||
self.manager.delete_project(self.project)
|
||||
self.manager.delete_user(self.user)
|
||||
super(LibvirtConnTestCase, self).tearDown()
|
||||
|
||||
|
||||
class NWFilterFakes:
|
||||
def __init__(self):
|
||||
@@ -866,19 +889,24 @@ class IptablesFirewallTestCase(test.TestCase):
|
||||
return db.instance_create(self.context,
|
||||
{'user_id': 'fake',
|
||||
'project_id': 'fake',
|
||||
'mac_address': '56:12:12:12:12:12',
|
||||
'instance_type_id': 1})
|
||||
|
||||
@test.skip_test("skipping libvirt tests depends on get_network_info shim")
|
||||
def test_static_filters(self):
|
||||
instance_ref = self._create_instance_ref()
|
||||
ip = '10.11.12.13'
|
||||
|
||||
network_ref = db.project_get_network(self.context,
|
||||
'fake')
|
||||
network_ref = db.project_get_networks(self.context,
|
||||
'fake',
|
||||
associate=True)[0]
|
||||
vif = {'address': '56:12:12:12:12:12',
|
||||
'network_id': network_ref['id'],
|
||||
'instance_id': instance_ref['id']}
|
||||
vif_ref = db.virtual_interface_create(self.context, vif)
|
||||
|
||||
fixed_ip = {'address': ip,
|
||||
'network_id': network_ref['id']}
|
||||
|
||||
'network_id': network_ref['id'],
|
||||
'virtual_interface_id': vif_ref['id']}
|
||||
admin_ctxt = context.get_admin_context()
|
||||
db.fixed_ip_create(admin_ctxt, fixed_ip)
|
||||
db.fixed_ip_update(admin_ctxt, ip, {'allocated': True,
|
||||
@@ -1015,6 +1043,7 @@ class IptablesFirewallTestCase(test.TestCase):
|
||||
self.assertEquals(ipv6_network_rules,
|
||||
ipv6_rules_per_network * networks_count)
|
||||
|
||||
@test.skip_test("skipping libvirt tests")
|
||||
def test_do_refresh_security_group_rules(self):
|
||||
instance_ref = self._create_instance_ref()
|
||||
self.mox.StubOutWithMock(self.fw,
|
||||
@@ -1025,6 +1054,7 @@ class IptablesFirewallTestCase(test.TestCase):
|
||||
self.mox.ReplayAll()
|
||||
self.fw.do_refresh_security_group_rules("fake")
|
||||
|
||||
@test.skip_test("skip libvirt test project_get_network no longer exists")
|
||||
def test_unfilter_instance_undefines_nwfilter(self):
|
||||
# Skip if non-libvirt environment
|
||||
if not self.lazy_load_library_exists():
|
||||
@@ -1058,6 +1088,7 @@ class IptablesFirewallTestCase(test.TestCase):
|
||||
|
||||
db.instance_destroy(admin_ctxt, instance_ref['id'])
|
||||
|
||||
@test.skip_test("skip libvirt test project_get_network no longer exists")
|
||||
def test_provider_firewall_rules(self):
|
||||
# setup basic instance data
|
||||
instance_ref = self._create_instance_ref()
|
||||
@@ -1207,7 +1238,6 @@ class NWFilterTestCase(test.TestCase):
|
||||
return db.instance_create(self.context,
|
||||
{'user_id': 'fake',
|
||||
'project_id': 'fake',
|
||||
'mac_address': '00:A0:C9:14:C8:29',
|
||||
'instance_type_id': 1})
|
||||
|
||||
def _create_instance_type(self, params={}):
|
||||
@@ -1225,6 +1255,7 @@ class NWFilterTestCase(test.TestCase):
|
||||
inst.update(params)
|
||||
return db.instance_type_create(context, inst)['id']
|
||||
|
||||
@test.skip_test('Skipping this test')
|
||||
def test_creates_base_rule_first(self):
|
||||
# These come pre-defined by libvirt
|
||||
self.defined_filters = ['no-mac-spoofing',
|
||||
@@ -1258,13 +1289,15 @@ class NWFilterTestCase(test.TestCase):
|
||||
|
||||
ip = '10.11.12.13'
|
||||
|
||||
network_ref = db.project_get_network(self.context, 'fake')
|
||||
fixed_ip = {'address': ip, 'network_id': network_ref['id']}
|
||||
#network_ref = db.project_get_networks(self.context, 'fake')[0]
|
||||
#fixed_ip = {'address': ip, 'network_id': network_ref['id']}
|
||||
|
||||
admin_ctxt = context.get_admin_context()
|
||||
db.fixed_ip_create(admin_ctxt, fixed_ip)
|
||||
db.fixed_ip_update(admin_ctxt, ip, {'allocated': True,
|
||||
'instance_id': inst_id})
|
||||
#admin_ctxt = context.get_admin_context()
|
||||
#db.fixed_ip_create(admin_ctxt, fixed_ip)
|
||||
#db.fixed_ip_update(admin_ctxt, ip, {'allocated': True,
|
||||
# 'instance_id': inst_id})
|
||||
|
||||
self._setup_networking(instance_ref['id'], ip=ip)
|
||||
|
||||
def _ensure_all_called():
|
||||
instance_filter = 'nova-instance-%s-%s' % (instance_ref['name'],
|
||||
@@ -1299,6 +1332,7 @@ class NWFilterTestCase(test.TestCase):
|
||||
"fake")
|
||||
self.assertEquals(len(result), 3)
|
||||
|
||||
@test.skip_test("skip libvirt test project_get_network no longer exists")
|
||||
def test_unfilter_instance_undefines_nwfilters(self):
|
||||
admin_ctxt = context.get_admin_context()
|
||||
|
||||
|
||||
+207
-163
@@ -1,196 +1,240 @@
|
||||
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
||||
|
||||
# Copyright 2010 United States Government as represented by the
|
||||
# Administrator of the National Aeronautics and Space Administration.
|
||||
# Copyright 2011 Rackspace
|
||||
# All Rights Reserved.
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||
# not use this file except in compliance with the License. You may obtain
|
||||
# a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
"""
|
||||
Unit Tests for network code
|
||||
"""
|
||||
import netaddr
|
||||
import os
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||
# License for the specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
from nova import db
|
||||
from nova import flags
|
||||
from nova import log as logging
|
||||
from nova import test
|
||||
from nova.network import linux_net
|
||||
from nova.network import manager as network_manager
|
||||
|
||||
|
||||
class IptablesManagerTestCase(test.TestCase):
|
||||
sample_filter = ['#Generated by iptables-save on Fri Feb 18 15:17:05 2011',
|
||||
'*filter',
|
||||
':INPUT ACCEPT [2223527:305688874]',
|
||||
':FORWARD ACCEPT [0:0]',
|
||||
':OUTPUT ACCEPT [2172501:140856656]',
|
||||
':nova-compute-FORWARD - [0:0]',
|
||||
':nova-compute-INPUT - [0:0]',
|
||||
':nova-compute-local - [0:0]',
|
||||
':nova-compute-OUTPUT - [0:0]',
|
||||
':nova-filter-top - [0:0]',
|
||||
'-A FORWARD -j nova-filter-top ',
|
||||
'-A OUTPUT -j nova-filter-top ',
|
||||
'-A nova-filter-top -j nova-compute-local ',
|
||||
'-A INPUT -j nova-compute-INPUT ',
|
||||
'-A OUTPUT -j nova-compute-OUTPUT ',
|
||||
'-A FORWARD -j nova-compute-FORWARD ',
|
||||
'-A INPUT -i virbr0 -p udp -m udp --dport 53 -j ACCEPT ',
|
||||
'-A INPUT -i virbr0 -p tcp -m tcp --dport 53 -j ACCEPT ',
|
||||
'-A INPUT -i virbr0 -p udp -m udp --dport 67 -j ACCEPT ',
|
||||
'-A INPUT -i virbr0 -p tcp -m tcp --dport 67 -j ACCEPT ',
|
||||
'-A FORWARD -s 192.168.122.0/24 -i virbr0 -j ACCEPT ',
|
||||
'-A FORWARD -i virbr0 -o virbr0 -j ACCEPT ',
|
||||
'-A FORWARD -o virbr0 -j REJECT --reject-with '
|
||||
'icmp-port-unreachable ',
|
||||
'-A FORWARD -i virbr0 -j REJECT --reject-with '
|
||||
'icmp-port-unreachable ',
|
||||
'COMMIT',
|
||||
'# Completed on Fri Feb 18 15:17:05 2011']
|
||||
import mox
|
||||
|
||||
sample_nat = ['# Generated by iptables-save on Fri Feb 18 15:17:05 2011',
|
||||
'*nat',
|
||||
':PREROUTING ACCEPT [3936:762355]',
|
||||
':INPUT ACCEPT [2447:225266]',
|
||||
':OUTPUT ACCEPT [63491:4191863]',
|
||||
':POSTROUTING ACCEPT [63112:4108641]',
|
||||
':nova-compute-OUTPUT - [0:0]',
|
||||
':nova-compute-floating-ip-snat - [0:0]',
|
||||
':nova-compute-SNATTING - [0:0]',
|
||||
':nova-compute-PREROUTING - [0:0]',
|
||||
':nova-compute-POSTROUTING - [0:0]',
|
||||
':nova-postrouting-bottom - [0:0]',
|
||||
'-A PREROUTING -j nova-compute-PREROUTING ',
|
||||
'-A OUTPUT -j nova-compute-OUTPUT ',
|
||||
'-A POSTROUTING -j nova-compute-POSTROUTING ',
|
||||
'-A POSTROUTING -j nova-postrouting-bottom ',
|
||||
'-A nova-postrouting-bottom -j nova-compute-SNATTING ',
|
||||
'-A nova-compute-SNATTING -j nova-compute-floating-ip-snat ',
|
||||
'COMMIT',
|
||||
'# Completed on Fri Feb 18 15:17:05 2011']
|
||||
|
||||
FLAGS = flags.FLAGS
|
||||
LOG = logging.getLogger('nova.tests.network')
|
||||
|
||||
|
||||
HOST = "testhost"
|
||||
|
||||
|
||||
class FakeModel(dict):
|
||||
"""Represent a model from the db"""
|
||||
def __init__(self, *args, **kwargs):
|
||||
self.update(kwargs)
|
||||
|
||||
def __getattr__(self, name):
|
||||
return self[name]
|
||||
|
||||
|
||||
networks = [{'id': 0,
|
||||
'label': 'test0',
|
||||
'injected': False,
|
||||
'cidr': '192.168.0.0/24',
|
||||
'cidr_v6': '2001:db8::/64',
|
||||
'gateway_v6': '2001:db8::1',
|
||||
'netmask_v6': '64',
|
||||
'netmask': '255.255.255.0',
|
||||
'bridge': 'fa0',
|
||||
'bridge_interface': 'fake_fa0',
|
||||
'gateway': '192.168.0.1',
|
||||
'broadcast': '192.168.0.255',
|
||||
'dns': '192.168.0.1',
|
||||
'vlan': None,
|
||||
'host': None,
|
||||
'project_id': 'fake_project',
|
||||
'vpn_public_address': '192.168.0.2'},
|
||||
{'id': 1,
|
||||
'label': 'test1',
|
||||
'injected': False,
|
||||
'cidr': '192.168.1.0/24',
|
||||
'cidr_v6': '2001:db9::/64',
|
||||
'gateway_v6': '2001:db9::1',
|
||||
'netmask_v6': '64',
|
||||
'netmask': '255.255.255.0',
|
||||
'bridge': 'fa1',
|
||||
'bridge_interface': 'fake_fa1',
|
||||
'gateway': '192.168.1.1',
|
||||
'broadcast': '192.168.1.255',
|
||||
'dns': '192.168.0.1',
|
||||
'vlan': None,
|
||||
'host': None,
|
||||
'project_id': 'fake_project',
|
||||
'vpn_public_address': '192.168.1.2'}]
|
||||
|
||||
|
||||
fixed_ips = [{'id': 0,
|
||||
'network_id': 0,
|
||||
'address': '192.168.0.100',
|
||||
'instance_id': 0,
|
||||
'allocated': False,
|
||||
'virtual_interface_id': 0,
|
||||
'floating_ips': []},
|
||||
{'id': 0,
|
||||
'network_id': 1,
|
||||
'address': '192.168.1.100',
|
||||
'instance_id': 0,
|
||||
'allocated': False,
|
||||
'virtual_interface_id': 0,
|
||||
'floating_ips': []}]
|
||||
|
||||
|
||||
flavor = {'id': 0,
|
||||
'rxtx_cap': 3}
|
||||
|
||||
|
||||
floating_ip_fields = {'id': 0,
|
||||
'address': '192.168.10.100',
|
||||
'fixed_ip_id': 0,
|
||||
'project_id': None,
|
||||
'auto_assigned': False}
|
||||
|
||||
vifs = [{'id': 0,
|
||||
'address': 'DE:AD:BE:EF:00:00',
|
||||
'network_id': 0,
|
||||
'network': FakeModel(**networks[0]),
|
||||
'instance_id': 0},
|
||||
{'id': 1,
|
||||
'address': 'DE:AD:BE:EF:00:01',
|
||||
'network_id': 1,
|
||||
'network': FakeModel(**networks[1]),
|
||||
'instance_id': 0}]
|
||||
|
||||
|
||||
class FlatNetworkTestCase(test.TestCase):
|
||||
def setUp(self):
|
||||
super(IptablesManagerTestCase, self).setUp()
|
||||
self.manager = linux_net.IptablesManager()
|
||||
super(FlatNetworkTestCase, self).setUp()
|
||||
self.network = network_manager.FlatManager(host=HOST)
|
||||
self.network.db = db
|
||||
|
||||
def test_filter_rules_are_wrapped(self):
|
||||
current_lines = self.sample_filter
|
||||
def test_set_network_hosts(self):
|
||||
self.mox.StubOutWithMock(db, 'network_get_all')
|
||||
self.mox.StubOutWithMock(db, 'network_set_host')
|
||||
self.mox.StubOutWithMock(db, 'network_update')
|
||||
|
||||
table = self.manager.ipv4['filter']
|
||||
table.add_rule('FORWARD', '-s 1.2.3.4/5 -j DROP')
|
||||
new_lines = self.manager._modify_rules(current_lines, table)
|
||||
self.assertTrue('-A run_tests.py-FORWARD '
|
||||
'-s 1.2.3.4/5 -j DROP' in new_lines)
|
||||
db.network_get_all(mox.IgnoreArg()).AndReturn([networks[0]])
|
||||
db.network_set_host(mox.IgnoreArg(),
|
||||
networks[0]['id'],
|
||||
mox.IgnoreArg()).AndReturn(HOST)
|
||||
db.network_update(mox.IgnoreArg(), mox.IgnoreArg(), mox.IgnoreArg())
|
||||
self.mox.ReplayAll()
|
||||
|
||||
table.remove_rule('FORWARD', '-s 1.2.3.4/5 -j DROP')
|
||||
new_lines = self.manager._modify_rules(current_lines, table)
|
||||
self.assertTrue('-A run_tests.py-FORWARD '
|
||||
'-s 1.2.3.4/5 -j DROP' not in new_lines)
|
||||
self.network.set_network_hosts(None)
|
||||
|
||||
def test_nat_rules(self):
|
||||
current_lines = self.sample_nat
|
||||
new_lines = self.manager._modify_rules(current_lines,
|
||||
self.manager.ipv4['nat'])
|
||||
def test_get_instance_nw_info(self):
|
||||
self.mox.StubOutWithMock(db, 'fixed_ip_get_by_instance')
|
||||
self.mox.StubOutWithMock(db, 'virtual_interface_get_by_instance')
|
||||
self.mox.StubOutWithMock(db, 'instance_type_get_by_id')
|
||||
|
||||
for line in [':nova-compute-OUTPUT - [0:0]',
|
||||
':nova-compute-floating-ip-snat - [0:0]',
|
||||
':nova-compute-SNATTING - [0:0]',
|
||||
':nova-compute-PREROUTING - [0:0]',
|
||||
':nova-compute-POSTROUTING - [0:0]']:
|
||||
self.assertTrue(line in new_lines, "One of nova-compute's chains "
|
||||
"went missing.")
|
||||
db.fixed_ip_get_by_instance(mox.IgnoreArg(),
|
||||
mox.IgnoreArg()).AndReturn(fixed_ips)
|
||||
db.virtual_interface_get_by_instance(mox.IgnoreArg(),
|
||||
mox.IgnoreArg()).AndReturn(vifs)
|
||||
db.instance_type_get_by_id(mox.IgnoreArg(),
|
||||
mox.IgnoreArg()).AndReturn(flavor)
|
||||
self.mox.ReplayAll()
|
||||
|
||||
seen_lines = set()
|
||||
for line in new_lines:
|
||||
line = line.strip()
|
||||
self.assertTrue(line not in seen_lines,
|
||||
"Duplicate line: %s" % line)
|
||||
seen_lines.add(line)
|
||||
nw_info = self.network.get_instance_nw_info(None, 0, 0)
|
||||
|
||||
last_postrouting_line = ''
|
||||
self.assertTrue(nw_info)
|
||||
|
||||
for line in new_lines:
|
||||
if line.startswith('-A POSTROUTING'):
|
||||
last_postrouting_line = line
|
||||
for i, nw in enumerate(nw_info):
|
||||
i8 = i + 8
|
||||
check = {'bridge': 'fa%s' % i,
|
||||
'cidr': '192.168.%s.0/24' % i,
|
||||
'cidr_v6': '2001:db%s::/64' % i8,
|
||||
'id': i,
|
||||
'injected': 'DONTCARE'}
|
||||
|
||||
self.assertTrue('-j nova-postrouting-bottom' in last_postrouting_line,
|
||||
"Last POSTROUTING rule does not jump to "
|
||||
"nova-postouting-bottom: %s" % last_postrouting_line)
|
||||
self.assertDictMatch(nw[0], check)
|
||||
|
||||
for chain in ['POSTROUTING', 'PREROUTING', 'OUTPUT']:
|
||||
self.assertTrue('-A %s -j run_tests.py-%s' \
|
||||
% (chain, chain) in new_lines,
|
||||
"Built-in chain %s not wrapped" % (chain,))
|
||||
check = {'broadcast': '192.168.%s.255' % i,
|
||||
'dns': 'DONTCARE',
|
||||
'gateway': '192.168.%s.1' % i,
|
||||
'gateway6': '2001:db%s::1' % i8,
|
||||
'ip6s': 'DONTCARE',
|
||||
'ips': 'DONTCARE',
|
||||
'label': 'test%s' % i,
|
||||
'mac': 'DE:AD:BE:EF:00:0%s' % i,
|
||||
'rxtx_cap': 'DONTCARE'}
|
||||
self.assertDictMatch(nw[1], check)
|
||||
|
||||
def test_filter_rules(self):
|
||||
current_lines = self.sample_filter
|
||||
new_lines = self.manager._modify_rules(current_lines,
|
||||
self.manager.ipv4['filter'])
|
||||
check = [{'enabled': 'DONTCARE',
|
||||
'ip': '2001:db%s::dcad:beff:feef:%s' % (i8, i),
|
||||
'netmask': '64'}]
|
||||
self.assertDictListMatch(nw[1]['ip6s'], check)
|
||||
|
||||
for line in [':nova-compute-FORWARD - [0:0]',
|
||||
':nova-compute-INPUT - [0:0]',
|
||||
':nova-compute-local - [0:0]',
|
||||
':nova-compute-OUTPUT - [0:0]']:
|
||||
self.assertTrue(line in new_lines, "One of nova-compute's chains"
|
||||
" went missing.")
|
||||
check = [{'enabled': '1',
|
||||
'ip': '192.168.%s.100' % i,
|
||||
'netmask': '255.255.255.0'}]
|
||||
self.assertDictListMatch(nw[1]['ips'], check)
|
||||
|
||||
seen_lines = set()
|
||||
for line in new_lines:
|
||||
line = line.strip()
|
||||
self.assertTrue(line not in seen_lines,
|
||||
"Duplicate line: %s" % line)
|
||||
seen_lines.add(line)
|
||||
|
||||
for chain in ['FORWARD', 'OUTPUT']:
|
||||
for line in new_lines:
|
||||
if line.startswith('-A %s' % chain):
|
||||
self.assertTrue('-j nova-filter-top' in line,
|
||||
"First %s rule does not "
|
||||
"jump to nova-filter-top" % chain)
|
||||
break
|
||||
class VlanNetworkTestCase(test.TestCase):
|
||||
def setUp(self):
|
||||
super(VlanNetworkTestCase, self).setUp()
|
||||
self.network = network_manager.VlanManager(host=HOST)
|
||||
self.network.db = db
|
||||
|
||||
self.assertTrue('-A nova-filter-top '
|
||||
'-j run_tests.py-local' in new_lines,
|
||||
"nova-filter-top does not jump to wrapped local chain")
|
||||
def test_vpn_allocate_fixed_ip(self):
|
||||
self.mox.StubOutWithMock(db, 'fixed_ip_associate')
|
||||
self.mox.StubOutWithMock(db, 'fixed_ip_update')
|
||||
self.mox.StubOutWithMock(db,
|
||||
'virtual_interface_get_by_instance_and_network')
|
||||
|
||||
for chain in ['INPUT', 'OUTPUT', 'FORWARD']:
|
||||
self.assertTrue('-A %s -j run_tests.py-%s' \
|
||||
% (chain, chain) in new_lines,
|
||||
"Built-in chain %s not wrapped" % (chain,))
|
||||
db.fixed_ip_associate(mox.IgnoreArg(),
|
||||
mox.IgnoreArg(),
|
||||
mox.IgnoreArg()).AndReturn('192.168.0.1')
|
||||
db.fixed_ip_update(mox.IgnoreArg(),
|
||||
mox.IgnoreArg(),
|
||||
mox.IgnoreArg())
|
||||
db.virtual_interface_get_by_instance_and_network(mox.IgnoreArg(),
|
||||
mox.IgnoreArg(), mox.IgnoreArg()).AndReturn({'id': 0})
|
||||
self.mox.ReplayAll()
|
||||
|
||||
def test_will_empty_chain(self):
|
||||
self.manager.ipv4['filter'].add_chain('test-chain')
|
||||
self.manager.ipv4['filter'].add_rule('test-chain', '-j DROP')
|
||||
old_count = len(self.manager.ipv4['filter'].rules)
|
||||
self.manager.ipv4['filter'].empty_chain('test-chain')
|
||||
self.assertEqual(old_count - 1, len(self.manager.ipv4['filter'].rules))
|
||||
network = dict(networks[0])
|
||||
network['vpn_private_address'] = '192.168.0.2'
|
||||
self.network.allocate_fixed_ip(None, 0, network, vpn=True)
|
||||
|
||||
def test_will_empty_unwrapped_chain(self):
|
||||
self.manager.ipv4['filter'].add_chain('test-chain', wrap=False)
|
||||
self.manager.ipv4['filter'].add_rule('test-chain', '-j DROP',
|
||||
wrap=False)
|
||||
old_count = len(self.manager.ipv4['filter'].rules)
|
||||
self.manager.ipv4['filter'].empty_chain('test-chain', wrap=False)
|
||||
self.assertEqual(old_count - 1, len(self.manager.ipv4['filter'].rules))
|
||||
def test_allocate_fixed_ip(self):
|
||||
self.mox.StubOutWithMock(db, 'fixed_ip_associate_pool')
|
||||
self.mox.StubOutWithMock(db, 'fixed_ip_update')
|
||||
self.mox.StubOutWithMock(db,
|
||||
'virtual_interface_get_by_instance_and_network')
|
||||
|
||||
def test_will_not_empty_wrapped_when_unwrapped(self):
|
||||
self.manager.ipv4['filter'].add_chain('test-chain')
|
||||
self.manager.ipv4['filter'].add_rule('test-chain', '-j DROP')
|
||||
old_count = len(self.manager.ipv4['filter'].rules)
|
||||
self.manager.ipv4['filter'].empty_chain('test-chain', wrap=False)
|
||||
self.assertEqual(old_count, len(self.manager.ipv4['filter'].rules))
|
||||
db.fixed_ip_associate_pool(mox.IgnoreArg(),
|
||||
mox.IgnoreArg(),
|
||||
mox.IgnoreArg()).AndReturn('192.168.0.1')
|
||||
db.fixed_ip_update(mox.IgnoreArg(),
|
||||
mox.IgnoreArg(),
|
||||
mox.IgnoreArg())
|
||||
db.virtual_interface_get_by_instance_and_network(mox.IgnoreArg(),
|
||||
mox.IgnoreArg(), mox.IgnoreArg()).AndReturn({'id': 0})
|
||||
self.mox.ReplayAll()
|
||||
|
||||
def test_will_not_empty_unwrapped_when_wrapped(self):
|
||||
self.manager.ipv4['filter'].add_chain('test-chain', wrap=False)
|
||||
self.manager.ipv4['filter'].add_rule('test-chain', '-j DROP',
|
||||
wrap=False)
|
||||
old_count = len(self.manager.ipv4['filter'].rules)
|
||||
self.manager.ipv4['filter'].empty_chain('test-chain')
|
||||
self.assertEqual(old_count, len(self.manager.ipv4['filter'].rules))
|
||||
network = dict(networks[0])
|
||||
network['vpn_private_address'] = '192.168.0.2'
|
||||
self.network.allocate_fixed_ip(None, 0, network)
|
||||
|
||||
def test_create_networks_too_big(self):
|
||||
self.assertRaises(ValueError, self.network.create_networks, None,
|
||||
num_networks=4094, vlan_start=1)
|
||||
|
||||
def test_create_networks_too_many(self):
|
||||
self.assertRaises(ValueError, self.network.create_networks, None,
|
||||
num_networks=100, vlan_start=1,
|
||||
cidr='192.168.0.1/24', network_size=100)
|
||||
|
||||
@@ -70,11 +70,15 @@ class S3APITestCase(test.TestCase):
|
||||
os.mkdir(FLAGS.buckets_path)
|
||||
|
||||
router = s3server.S3Application(FLAGS.buckets_path)
|
||||
server = wsgi.Server()
|
||||
server.start(router, FLAGS.s3_port, host=FLAGS.s3_host)
|
||||
self.server = wsgi.Server("S3 Objectstore",
|
||||
router,
|
||||
host=FLAGS.s3_host,
|
||||
port=FLAGS.s3_port)
|
||||
self.server.start()
|
||||
|
||||
if not boto.config.has_section('Boto'):
|
||||
boto.config.add_section('Boto')
|
||||
|
||||
boto.config.set('Boto', 'num_retries', '0')
|
||||
conn = s3.S3Connection(aws_access_key_id=self.admin_user.access,
|
||||
aws_secret_access_key=self.admin_user.secret,
|
||||
@@ -145,4 +149,5 @@ class S3APITestCase(test.TestCase):
|
||||
"""Tear down auth and test server."""
|
||||
self.auth_manager.delete_user('admin')
|
||||
self.auth_manager.delete_project('admin')
|
||||
self.server.stop()
|
||||
super(S3APITestCase, self).tearDown()
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user