diff options
author | Huang Haibin <haibin.huang@intel.com> | 2018-01-29 21:44:06 +0800 |
---|---|---|
committer | Huang Haibin <haibin.huang@intel.com> | 2018-01-29 21:44:06 +0800 |
commit | 46c8339def7417ac7efff724c2400fa745103fbf (patch) | |
tree | 2e02ebaa44ac6ca8f99ac8345fc54bb97f1f6e0e /share/newton_base | |
parent | 0da0d736adccf1cd236e19dd91f2191653efc696 (diff) |
Move dnsaasdelegate from newton to newton_base
Change-Id: I7cb81a290b2fb51592c1eae9ca3ff4d95483e2a3
Issue-ID: MULTICLOUD-138
Signed-off-by: Huang Haibin <haibin.huang@intel.com>
Diffstat (limited to 'share/newton_base')
-rw-r--r-- | share/newton_base/proxy/dnsaasdelegate.py | 195 |
1 files changed, 195 insertions, 0 deletions
diff --git a/share/newton_base/proxy/dnsaasdelegate.py b/share/newton_base/proxy/dnsaasdelegate.py new file mode 100644 index 00000000..85bcbfde --- /dev/null +++ b/share/newton_base/proxy/dnsaasdelegate.py @@ -0,0 +1,195 @@ +# Copyright (c) 2017-2018 Wind River Systems, Inc. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +import logging +import json +import traceback + +from keystoneauth1.exceptions import HttpError +import re +from rest_framework.permissions import BasePermission +from rest_framework.response import Response +from rest_framework import status +from rest_framework.views import APIView + +from newton_base.proxy.services import Services + +from newton_base.proxy.proxy_utils import ProxyUtils +from newton.pub.exceptions import VimDriverNewtonException +from newton.pub.msapi import extsys +from newton.requests.views.util import VimDriverUtils + + +logger = logging.getLogger(__name__) + +DEBUG=True + +class DnsaasDelegate(Services): + ''' + DNSaaS delegate service + ''' + + def __init__(self): + self._logger = logger + + + def _do_action(self, action, request, vim_id, servicetype, requri): + tmp_auth_token = self._get_token(request) + try: + # fetch the auth_state out of cache + auth_state_str, metadata_catalog_str = VimDriverUtils.get_token_cache(tmp_auth_token) + + if not auth_state_str: + #invalid token + return Response(data={'error': "request token %s is not valid" % (tmp_auth_token)}, + status=status.HTTP_404_NOT_FOUND) + + # get project name from auth_state + auth_state = json.loads(auth_state_str) + if not auth_state: + # invalid token + return Response(data={'error': "request token %s is broken" % (tmp_auth_token)}, + status=status.HTTP_404_NOT_FOUND) + + tenant_name = auth_state['body']['token']['project']['name'] + #tenant_id = auth_state['body']['token']['project']['id'] + + #find out the delegated DNSaaS provider + viminfo = VimDriverUtils.get_vim_info(vim_id) + if not viminfo: + return Response(data={'error': "vimid %s is not found" % (vim_id)}, + status=status.HTTP_404_NOT_FOUND) + + cloud_dns_delegate_info = None + cloud_extra_info_str = viminfo.get('cloud_extra_info') + if cloud_extra_info_str: + cloud_extra_info = json.loads(cloud_extra_info_str) + cloud_dns_delegate_info = cloud_extra_info.get("dns-delegate") + + if not cloud_dns_delegate_info \ + or not cloud_dns_delegate_info.get("cloud-owner") \ + or not cloud_dns_delegate_info.get("cloud-region-id"): + return Response(data={'error': "dns-delegate for vimid %s is not configured" + % (vim_id)}, + status=status.HTTP_404_NOT_FOUND) + + vimid_delegate = cloud_dns_delegate_info.get("cloud-owner") \ + + "_" \ + + cloud_dns_delegate_info.get("cloud-region-id") + + + #now forward request to delegated DNS service endpoint + vim = VimDriverUtils.get_vim_info(vimid_delegate) + if not vim: + return Response(data={'error': "vimid %s is not found" % (vimid_delegate)}, + status=status.HTTP_404_NOT_FOUND) + + sess = VimDriverUtils.get_session(vim, tenant_name=tenant_name) + + cloud_owner, regionid = extsys.decode_vim_id(vimid_delegate) + interface = 'public' + service = { + 'service_type': servicetype, + 'interface': interface, + 'region_id': regionid + } + + req_resource = requri + querystr = VimDriverUtils.get_query_part(request) + if querystr: + req_resource += "?" + querystr + + self._logger.debug("service " + action + " request uri %s" % (req_resource)) + if(action == "get"): + resp = sess.get(req_resource, endpoint_filter=service, + headers={"Content-Type": "application/json", + "Accept": "application/json"}) + elif(action == "post"): + resp = sess.post(req_resource, data=json.JSONEncoder().encode(request.data), + endpoint_filter=service, + headers={"Content-Type": "application/json", + "Accept": "application/json"}) + elif(action == "put"): + resp = sess.put(req_resource, data=json.JSONEncoder().encode(request.data), + endpoint_filter=service, + headers={"Content-Type": "application/json", + "Accept": "application/json"}) + elif(action == "patch"): + resp = sess.patch(req_resource, data=json.JSONEncoder().encode(request.data), + endpoint_filter=service, + headers={"Content-Type": "application/json", + "Accept": "application/json"}) + elif (action == "delete"): + resp = sess.delete(req_resource, endpoint_filter=service, + headers={"Content-Type": "application/json", + "Accept": "application/json"}) + content = resp.json() if resp.content else None + self._logger.debug("service " + action + " response: %s, %s" % (resp.status_code, content)) + + if (action == "delete"): + return Response(headers={'X-Subject-Token': tmp_auth_token}, status=resp.status_code) + else: + #content = ProxyUtils.update_dnsaas_project_id(content, tenant_id) + return Response(headers={'X-Subject-Token': tmp_auth_token}, data=content, status=resp.status_code) + + except VimDriverNewtonException as e: + return Response(data={'error': e.content}, status=e.status_code) + except HttpError as e: + self._logger.error("HttpError: status:%s, response:%s" % (e.http_status, e.response.json())) + return Response(data=e.response.json(), status=e.http_status) + except Exception as e: + self._logger.error(traceback.format_exc()) + return Response(data={'error': str(e)}, + status=status.HTTP_500_INTERNAL_SERVER_ERROR) + + def get(self, request, vimid="", servicetype="dns-delegate", requri=""): + self._logger.debug("DnsaasDelegate--get::META> %s" % request.META) + self._logger.debug("DnsaasDelegate--get::data> %s" % request.data) + self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s" + % (vimid, servicetype, requri)) + return self._do_action("get", request, vimid, "dns", requri) + + def head(self, request, vimid="", servicetype="dns-delegate", requri=""): + self._logger.debug("DnsaasDelegate--get::META> %s" % request.META) + self._logger.debug("DnsaasDelegate--get::data> %s" % request.data) + self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s" + % (vimid, servicetype, requri)) + return self._do_action("head", request, vimid, "dns", requri) + + def post(self, request, vimid="", servicetype="dns-delegate", requri=""): + self._logger.debug("DnsaasDelegate--get::META> %s" % request.META) + self._logger.debug("DnsaasDelegate--get::data> %s" % request.data) + self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s" + % (vimid, servicetype, requri)) + return self._do_action("post", request, vimid, "dns", requri) + + def put(self, request, vimid="", servicetype="dns-delegate", requri=""): + self._logger.debug("DnsaasDelegate--get::META> %s" % request.META) + self._logger.debug("DnsaasDelegate--get::data> %s" % request.data) + self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s" + % (vimid, servicetype, requri)) + return self._do_action("put", request, vimid, "dns", requri) + + def patch(self, request, vimid="", servicetype="dns-delegate", requri=""): + self._logger.debug("DnsaasDelegate--get::META> %s" % request.META) + self._logger.debug("DnsaasDelegate--get::data> %s" % request.data) + self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s" + % (vimid, servicetype, requri)) + return self._do_action("patch", request, vimid, "dns", requri) + + def delete(self, request, vimid="", servicetype="dns-delegate", requri=""): + self._logger.debug("DnsaasDelegate--get::META> %s" % request.META) + self._logger.debug("DnsaasDelegate--get::data> %s" % request.data) + self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s" + % (vimid, servicetype, requri)) + return self._do_action("delete", request, vimid, "dns", requri) |