1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
|
# Copyright (c) 2017-2018 Wind River Systems, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import logging
import json
import traceback
from keystoneauth1.exceptions import HttpError
import re
from rest_framework.permissions import BasePermission
from rest_framework.response import Response
from rest_framework import status
from rest_framework.views import APIView
from newton_base.proxy.services import Services
from newton_base.proxy.proxy_utils import ProxyUtils
from common.exceptions import VimDriverNewtonException
from common.msapi import extsys
from newton_base.util import VimDriverUtils
logger = logging.getLogger(__name__)
# DEBUG=True
class DnsaasDelegate(Services):
'''
DNSaaS delegate service
'''
def __init__(self):
self._logger = logger
def _do_action(self, action, request, vim_id, servicetype, requri):
tmp_auth_token = self._get_token(request)
try:
# fetch the auth_state out of cache
auth_state_str, metadata_catalog_str = VimDriverUtils.get_token_cache(tmp_auth_token)
if not auth_state_str:
#invalid token
return Response(data={'error': "request token %s is not valid" % (tmp_auth_token)},
status=status.HTTP_404_NOT_FOUND)
# get project name from auth_state
auth_state = json.loads(auth_state_str)
if not auth_state:
# invalid token
return Response(data={'error': "request token %s is broken" % (tmp_auth_token)},
status=status.HTTP_404_NOT_FOUND)
tenant_name = auth_state['body']['token']['project']['name']
#tenant_id = auth_state['body']['token']['project']['id']
#find out the delegated DNSaaS provider
viminfo = VimDriverUtils.get_vim_info(vim_id)
if not viminfo:
return Response(data={'error': "vimid %s is not found" % (vim_id)},
status=status.HTTP_404_NOT_FOUND)
cloud_dns_delegate_info = None
cloud_extra_info_str = viminfo.get('cloud_extra_info')
if cloud_extra_info_str:
cloud_extra_info = json.loads(cloud_extra_info_str)
cloud_dns_delegate_info = cloud_extra_info.get("dns-delegate")
if not cloud_dns_delegate_info \
or not cloud_dns_delegate_info.get("cloud-owner") \
or not cloud_dns_delegate_info.get("cloud-region-id"):
return Response(data={'error': "dns-delegate for vimid %s is not configured"
% (vim_id)},
status=status.HTTP_404_NOT_FOUND)
vimid_delegate = cloud_dns_delegate_info.get("cloud-owner") \
+ "_" \
+ cloud_dns_delegate_info.get("cloud-region-id")
#now forward request to delegated DNS service endpoint
vim = VimDriverUtils.get_vim_info(vimid_delegate)
if not vim:
return Response(data={'error': "vimid %s is not found" % (vimid_delegate)},
status=status.HTTP_404_NOT_FOUND)
sess = VimDriverUtils.get_session(vim, tenant_name=tenant_name)
cloud_owner, regionid = extsys.decode_vim_id(vimid_delegate)
interface = 'public'
service = {
'service_type': servicetype,
'interface': interface,
'region_id': regionid
}
req_resource = requri
querystr = VimDriverUtils.get_query_part(request)
if querystr:
req_resource += "?" + querystr
self._logger.debug("service " + action + " request uri %s" % (req_resource))
if(action == "get"):
resp = sess.get(req_resource, endpoint_filter=service,
headers={"Content-Type": "application/json",
"Accept": "application/json"})
elif(action == "post"):
resp = sess.post(req_resource, data=json.JSONEncoder().encode(request.data),
endpoint_filter=service,
headers={"Content-Type": "application/json",
"Accept": "application/json"})
elif(action == "put"):
resp = sess.put(req_resource, data=json.JSONEncoder().encode(request.data),
endpoint_filter=service,
headers={"Content-Type": "application/json",
"Accept": "application/json"})
elif(action == "patch"):
resp = sess.patch(req_resource, data=json.JSONEncoder().encode(request.data),
endpoint_filter=service,
headers={"Content-Type": "application/json",
"Accept": "application/json"})
elif (action == "delete"):
resp = sess.delete(req_resource, endpoint_filter=service,
headers={"Content-Type": "application/json",
"Accept": "application/json"})
content = resp.json() if resp.content else None
self._logger.debug("service " + action + " response: %s, %s" % (resp.status_code, content))
if (action == "delete"):
return Response(headers={'X-Subject-Token': tmp_auth_token}, status=resp.status_code)
else:
#content = ProxyUtils.update_dnsaas_project_id(content, tenant_id)
return Response(headers={'X-Subject-Token': tmp_auth_token}, data=content, status=resp.status_code)
except VimDriverNewtonException as e:
return Response(data={'error': e.content}, status=e.status_code)
except HttpError as e:
self._logger.error("HttpError: status:%s, response:%s" % (e.http_status, e.response.json()))
return Response(data=e.response.json(), status=e.http_status)
except Exception as e:
self._logger.error(traceback.format_exc())
return Response(data={'error': str(e)},
status=status.HTTP_500_INTERNAL_SERVER_ERROR)
def get(self, request, vimid="", servicetype="dns-delegate", requri=""):
self._logger.debug("DnsaasDelegate--get::META> %s" % request.META)
self._logger.debug("DnsaasDelegate--get::data> %s" % request.data)
self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s"
% (vimid, servicetype, requri))
return self._do_action("get", request, vimid, "dns", requri)
def head(self, request, vimid="", servicetype="dns-delegate", requri=""):
self._logger.debug("DnsaasDelegate--get::META> %s" % request.META)
self._logger.debug("DnsaasDelegate--get::data> %s" % request.data)
self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s"
% (vimid, servicetype, requri))
return self._do_action("head", request, vimid, "dns", requri)
def post(self, request, vimid="", servicetype="dns-delegate", requri=""):
self._logger.debug("DnsaasDelegate--get::META> %s" % request.META)
self._logger.debug("DnsaasDelegate--get::data> %s" % request.data)
self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s"
% (vimid, servicetype, requri))
return self._do_action("post", request, vimid, "dns", requri)
def put(self, request, vimid="", servicetype="dns-delegate", requri=""):
self._logger.debug("DnsaasDelegate--get::META> %s" % request.META)
self._logger.debug("DnsaasDelegate--get::data> %s" % request.data)
self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s"
% (vimid, servicetype, requri))
return self._do_action("put", request, vimid, "dns", requri)
def patch(self, request, vimid="", servicetype="dns-delegate", requri=""):
self._logger.debug("DnsaasDelegate--get::META> %s" % request.META)
self._logger.debug("DnsaasDelegate--get::data> %s" % request.data)
self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s"
% (vimid, servicetype, requri))
return self._do_action("patch", request, vimid, "dns", requri)
def delete(self, request, vimid="", servicetype="dns-delegate", requri=""):
self._logger.debug("DnsaasDelegate--get::META> %s" % request.META)
self._logger.debug("DnsaasDelegate--get::data> %s" % request.data)
self._logger.debug("DnsaasDelegate--get::vimid, servicetype, requri> %s,%s,%s"
% (vimid, servicetype, requri))
return self._do_action("delete", request, vimid, "dns", requri)
|