summaryrefslogtreecommitdiffstats
path: root/nova/api
diff options
context:
space:
mode:
authorvladimir.p <vladimir@zadarastorage.com>2011-08-17 16:44:34 -0700
committervladimir.p <vladimir@zadarastorage.com>2011-08-17 16:44:34 -0700
commit2bc1e302910d9f66448618ddf140b72e85292d0f (patch)
treec27d1f58f7bfe281f1a41caeb720ad1ebf99e74a /nova/api
parentcabf9cc8f29ad8c99971c434516e1b911f07f32f (diff)
parentaca07a42fabb7f506cf132b995b4ad0139987b02 (diff)
merged with nova-1450
Diffstat (limited to 'nova/api')
-rw-r--r--nova/api/ec2/__init__.py4
-rw-r--r--nova/api/ec2/cloud.py2
-rw-r--r--nova/api/openstack/common.py15
-rw-r--r--nova/api/openstack/contrib/floating_ips.py13
-rw-r--r--nova/api/openstack/contrib/quotas.py100
-rw-r--r--nova/api/openstack/contrib/security_groups.py466
-rw-r--r--nova/api/openstack/create_instance_helper.py4
-rw-r--r--nova/api/openstack/extensions.py11
-rw-r--r--nova/api/openstack/servers.py29
-rw-r--r--nova/api/openstack/views/servers.py8
10 files changed, 621 insertions, 31 deletions
diff --git a/nova/api/ec2/__init__.py b/nova/api/ec2/__init__.py
index 8b6e47cfb..96df97393 100644
--- a/nova/api/ec2/__init__.py
+++ b/nova/api/ec2/__init__.py
@@ -358,6 +358,10 @@ class Executor(wsgi.Application):
LOG.debug(_('InvalidParameterValue raised: %s'), unicode(ex),
context=context)
return self._error(req, context, type(ex).__name__, unicode(ex))
+ except exception.InvalidPortRange as ex:
+ LOG.debug(_('InvalidPortRange raised: %s'), unicode(ex),
+ context=context)
+ return self._error(req, context, type(ex).__name__, unicode(ex))
except Exception as ex:
extra = {'environment': req.environ}
LOG.exception(_('Unexpected error raised: %s'), unicode(ex),
diff --git a/nova/api/ec2/cloud.py b/nova/api/ec2/cloud.py
index 87bba58c3..9aebf92e3 100644
--- a/nova/api/ec2/cloud.py
+++ b/nova/api/ec2/cloud.py
@@ -305,7 +305,7 @@ class CloudController(object):
'hostname': hostname,
'instance-action': 'none',
'instance-id': ec2_id,
- 'instance-type': instance_ref['instance_type'],
+ 'instance-type': instance_ref['instance_type']['name'],
'local-hostname': hostname,
'local-ipv4': address,
'placement': {'availability-zone': availability_zone},
diff --git a/nova/api/openstack/common.py b/nova/api/openstack/common.py
index dfdd62201..b2a675653 100644
--- a/nova/api/openstack/common.py
+++ b/nova/api/openstack/common.py
@@ -169,13 +169,20 @@ def get_id_from_href(href):
Returns: 123
"""
- if re.match(r'\d+$', str(href)):
+ LOG.debug(_("Attempting to treat %(href)s as an integer ID.") % locals())
+
+ try:
return int(href)
+ except ValueError:
+ pass
+
+ LOG.debug(_("Attempting to treat %(href)s as a URL.") % locals())
+
try:
return int(urlparse.urlsplit(href).path.split('/')[-1])
- except ValueError, e:
- LOG.debug(_("Error extracting id from href: %s") % href)
- raise ValueError(_('could not parse id from href'))
+ except ValueError as error:
+ LOG.debug(_("Failed to parse ID from %(href)s: %(error)s") % locals())
+ raise
def remove_version_from_href(href):
diff --git a/nova/api/openstack/contrib/floating_ips.py b/nova/api/openstack/contrib/floating_ips.py
index 2aba1068a..44b35c385 100644
--- a/nova/api/openstack/contrib/floating_ips.py
+++ b/nova/api/openstack/contrib/floating_ips.py
@@ -43,8 +43,8 @@ def _translate_floating_ip_view(floating_ip):
def _translate_floating_ips_view(floating_ips):
- return {'floating_ips': [_translate_floating_ip_view(floating_ip)
- for floating_ip in floating_ips]}
+ return {'floating_ips': [_translate_floating_ip_view(ip)['floating_ip']
+ for ip in floating_ips]}
class FloatingIPController(object):
@@ -104,12 +104,9 @@ class FloatingIPController(object):
ip = self.network_api.get_floating_ip(context, id)
if 'fixed_ip' in ip:
- try:
- self.disassociate(req, id, '')
- except Exception as e:
- LOG.exception(_("Error disassociating fixed_ip %s"), e)
+ self.disassociate(req, id)
- self.network_api.release_floating_ip(context, address=ip)
+ self.network_api.release_floating_ip(context, address=ip['address'])
return {'released': {
"id": ip['id'],
@@ -134,7 +131,7 @@ class FloatingIPController(object):
"floating_ip": floating_ip,
"fixed_ip": fixed_ip}}
- def disassociate(self, req, id):
+ def disassociate(self, req, id, body=None):
""" POST /floating_ips/{id}/disassociate """
context = req.environ['nova.context']
floating_ip = self.network_api.get_floating_ip(context, id)
diff --git a/nova/api/openstack/contrib/quotas.py b/nova/api/openstack/contrib/quotas.py
new file mode 100644
index 000000000..459b71dfd
--- /dev/null
+++ b/nova/api/openstack/contrib/quotas.py
@@ -0,0 +1,100 @@
+# vim: tabstop=4 shiftwidth=4 softtabstop=4
+
+# Copyright 2011 OpenStack LLC.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+import webob
+
+from nova import db
+from nova import exception
+from nova import quota
+from nova.api.openstack import extensions
+
+
+class QuotaSetsController(object):
+
+ def _format_quota_set(self, project_id, quota_set):
+ """Convert the quota object to a result dict"""
+
+ return {'quota_set': {
+ 'id': str(project_id),
+ 'metadata_items': quota_set['metadata_items'],
+ 'injected_file_content_bytes':
+ quota_set['injected_file_content_bytes'],
+ 'volumes': quota_set['volumes'],
+ 'gigabytes': quota_set['gigabytes'],
+ 'ram': quota_set['ram'],
+ 'floating_ips': quota_set['floating_ips'],
+ 'instances': quota_set['instances'],
+ 'injected_files': quota_set['injected_files'],
+ 'cores': quota_set['cores'],
+ }}
+
+ def show(self, req, id):
+ context = req.environ['nova.context']
+ try:
+ db.sqlalchemy.api.authorize_project_context(context, id)
+ return self._format_quota_set(id,
+ quota.get_project_quotas(context, id))
+ except exception.NotAuthorized:
+ return webob.Response(status_int=403)
+
+ def update(self, req, id, body):
+ context = req.environ['nova.context']
+ project_id = id
+ resources = ['metadata_items', 'injected_file_content_bytes',
+ 'volumes', 'gigabytes', 'ram', 'floating_ips', 'instances',
+ 'injected_files', 'cores']
+ for key in body['quota_set'].keys():
+ if key in resources:
+ value = int(body['quota_set'][key])
+ try:
+ db.quota_update(context, project_id, key, value)
+ except exception.ProjectQuotaNotFound:
+ db.quota_create(context, project_id, key, value)
+ except exception.AdminRequired:
+ return webob.Response(status_int=403)
+ return {'quota_set': quota.get_project_quotas(context, project_id)}
+
+ def defaults(self, req, id):
+ return self._format_quota_set(id, quota._get_default_quotas())
+
+
+class Quotas(extensions.ExtensionDescriptor):
+
+ def get_name(self):
+ return "Quotas"
+
+ def get_alias(self):
+ return "os-quota-sets"
+
+ def get_description(self):
+ return "Quotas management support"
+
+ def get_namespace(self):
+ return "http://docs.openstack.org/ext/quotas-sets/api/v1.1"
+
+ def get_updated(self):
+ return "2011-08-08T00:00:00+00:00"
+
+ def get_resources(self):
+ resources = []
+
+ res = extensions.ResourceExtension('os-quota-sets',
+ QuotaSetsController(),
+ member_actions={'defaults': 'GET'})
+ resources.append(res)
+
+ return resources
diff --git a/nova/api/openstack/contrib/security_groups.py b/nova/api/openstack/contrib/security_groups.py
new file mode 100644
index 000000000..6c57fbb51
--- /dev/null
+++ b/nova/api/openstack/contrib/security_groups.py
@@ -0,0 +1,466 @@
+# Copyright 2011 OpenStack LLC.
+# All Rights Reserved.
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+"""The security groups extension."""
+
+import netaddr
+import urllib
+from webob import exc
+import webob
+
+from nova import compute
+from nova import db
+from nova import exception
+from nova import flags
+from nova import log as logging
+from nova.api.openstack import common
+from nova.api.openstack import extensions
+from nova.api.openstack import wsgi
+
+
+from xml.dom import minidom
+
+
+LOG = logging.getLogger("nova.api.contrib.security_groups")
+FLAGS = flags.FLAGS
+
+
+class SecurityGroupController(object):
+ """The Security group API controller for the OpenStack API."""
+
+ def __init__(self):
+ self.compute_api = compute.API()
+ super(SecurityGroupController, self).__init__()
+
+ def _format_security_group_rule(self, context, rule):
+ sg_rule = {}
+ sg_rule['id'] = rule.id
+ sg_rule['parent_group_id'] = rule.parent_group_id
+ sg_rule['ip_protocol'] = rule.protocol
+ sg_rule['from_port'] = rule.from_port
+ sg_rule['to_port'] = rule.to_port
+ sg_rule['group'] = {}
+ sg_rule['ip_range'] = {}
+ if rule.group_id:
+ source_group = db.security_group_get(context, rule.group_id)
+ sg_rule['group'] = {'name': source_group.name,
+ 'tenant_id': source_group.project_id}
+ else:
+ sg_rule['ip_range'] = {'cidr': rule.cidr}
+ return sg_rule
+
+ def _format_security_group(self, context, group):
+ security_group = {}
+ security_group['id'] = group.id
+ security_group['description'] = group.description
+ security_group['name'] = group.name
+ security_group['tenant_id'] = group.project_id
+ security_group['rules'] = []
+ for rule in group.rules:
+ security_group['rules'] += [self._format_security_group_rule(
+ context, rule)]
+ return security_group
+
+ def show(self, req, id):
+ """Return data about the given security group."""
+ context = req.environ['nova.context']
+ try:
+ id = int(id)
+ security_group = db.security_group_get(context, id)
+ except ValueError:
+ msg = _("Security group id is not integer")
+ return exc.HTTPBadRequest(explanation=msg)
+ except exception.NotFound as exp:
+ return exc.HTTPNotFound(explanation=unicode(exp))
+
+ return {'security_group': self._format_security_group(context,
+ security_group)}
+
+ def delete(self, req, id):
+ """Delete a security group."""
+ context = req.environ['nova.context']
+ try:
+ id = int(id)
+ security_group = db.security_group_get(context, id)
+ except ValueError:
+ msg = _("Security group id is not integer")
+ return exc.HTTPBadRequest(explanation=msg)
+ except exception.SecurityGroupNotFound as exp:
+ return exc.HTTPNotFound(explanation=unicode(exp))
+
+ LOG.audit(_("Delete security group %s"), id, context=context)
+ db.security_group_destroy(context, security_group.id)
+
+ return exc.HTTPAccepted()
+
+ def index(self, req):
+ """Returns a list of security groups"""
+ context = req.environ['nova.context']
+
+ self.compute_api.ensure_default_security_group(context)
+ groups = db.security_group_get_by_project(context,
+ context.project_id)
+ limited_list = common.limited(groups, req)
+ result = [self._format_security_group(context, group)
+ for group in limited_list]
+
+ return {'security_groups':
+ list(sorted(result,
+ key=lambda k: (k['tenant_id'], k['name'])))}
+
+ def create(self, req, body):
+ """Creates a new security group."""
+ context = req.environ['nova.context']
+ if not body:
+ return exc.HTTPUnprocessableEntity()
+
+ security_group = body.get('security_group', None)
+
+ if security_group is None:
+ return exc.HTTPUnprocessableEntity()
+
+ group_name = security_group.get('name', None)
+ group_description = security_group.get('description', None)
+
+ self._validate_security_group_property(group_name, "name")
+ self._validate_security_group_property(group_description,
+ "description")
+ group_name = group_name.strip()
+ group_description = group_description.strip()
+
+ LOG.audit(_("Create Security Group %s"), group_name, context=context)
+ self.compute_api.ensure_default_security_group(context)
+ if db.security_group_exists(context, context.project_id, group_name):
+ msg = _('Security group %s already exists') % group_name
+ raise exc.HTTPBadRequest(explanation=msg)
+
+ group = {'user_id': context.user_id,
+ 'project_id': context.project_id,
+ 'name': group_name,
+ 'description': group_description}
+ group_ref = db.security_group_create(context, group)
+
+ return {'security_group': self._format_security_group(context,
+ group_ref)}
+
+ def _validate_security_group_property(self, value, typ):
+ """ typ will be either 'name' or 'description',
+ depending on the caller
+ """
+ try:
+ val = value.strip()
+ except AttributeError:
+ msg = _("Security group %s is not a string or unicode") % typ
+ raise exc.HTTPBadRequest(explanation=msg)
+ if not val:
+ msg = _("Security group %s cannot be empty.") % typ
+ raise exc.HTTPBadRequest(explanation=msg)
+ if len(val) > 255:
+ msg = _("Security group %s should not be greater "
+ "than 255 characters.") % typ
+ raise exc.HTTPBadRequest(explanation=msg)
+
+
+class SecurityGroupRulesController(SecurityGroupController):
+
+ def create(self, req, body):
+ context = req.environ['nova.context']
+
+ if not body:
+ raise exc.HTTPUnprocessableEntity()
+
+ if not 'security_group_rule' in body:
+ raise exc.HTTPUnprocessableEntity()
+
+ self.compute_api.ensure_default_security_group(context)
+
+ sg_rule = body['security_group_rule']
+ parent_group_id = sg_rule.get('parent_group_id', None)
+ try:
+ parent_group_id = int(parent_group_id)
+ security_group = db.security_group_get(context, parent_group_id)
+ except ValueError:
+ msg = _("Parent group id is not integer")
+ return exc.HTTPBadRequest(explanation=msg)
+ except exception.NotFound as exp:
+ msg = _("Security group (%s) not found") % parent_group_id
+ return exc.HTTPNotFound(explanation=msg)
+
+ msg = _("Authorize security group ingress %s")
+ LOG.audit(msg, security_group['name'], context=context)
+
+ try:
+ values = self._rule_args_to_dict(context,
+ to_port=sg_rule.get('to_port'),
+ from_port=sg_rule.get('from_port'),
+ parent_group_id=sg_rule.get('parent_group_id'),
+ ip_protocol=sg_rule.get('ip_protocol'),
+ cidr=sg_rule.get('cidr'),
+ group_id=sg_rule.get('group_id'))
+ except Exception as exp:
+ raise exc.HTTPBadRequest(explanation=unicode(exp))
+
+ if values is None:
+ msg = _("Not enough parameters to build a "
+ "valid rule.")
+ raise exc.HTTPBadRequest(explanation=msg)
+
+ values['parent_group_id'] = security_group.id
+
+ if self._security_group_rule_exists(security_group, values):
+ msg = _('This rule already exists in group %s') % parent_group_id
+ raise exc.HTTPBadRequest(explanation=msg)
+
+ security_group_rule = db.security_group_rule_create(context, values)
+
+ self.compute_api.trigger_security_group_rules_refresh(context,
+ security_group_id=security_group['id'])
+
+ return {'security_group_rule': self._format_security_group_rule(
+ context,
+ security_group_rule)}
+
+ def _security_group_rule_exists(self, security_group, values):
+ """Indicates whether the specified rule values are already
+ defined in the given security group.
+ """
+ for rule in security_group.rules:
+ if 'group_id' in values:
+ if rule['group_id'] == values['group_id']:
+ return True
+ else:
+ is_duplicate = True
+ for key in ('cidr', 'from_port', 'to_port', 'protocol'):
+ if rule[key] != values[key]:
+ is_duplicate = False
+ break
+ if is_duplicate:
+ return True
+ return False
+
+ def _rule_args_to_dict(self, context, to_port=None, from_port=None,
+ parent_group_id=None, ip_protocol=None,
+ cidr=None, group_id=None):
+ values = {}
+
+ if group_id:
+ try:
+ parent_group_id = int(parent_group_id)
+ group_id = int(group_id)
+ except ValueError:
+ msg = _("Parent or group id is not integer")
+ raise exception.InvalidInput(reason=msg)
+
+ if parent_group_id == group_id:
+ msg = _("Parent group id and group id cannot be same")
+ raise exception.InvalidInput(reason=msg)
+
+ values['group_id'] = group_id
+ #check if groupId exists
+ db.security_group_get(context, group_id)
+ elif cidr:
+ # If this fails, it throws an exception. This is what we want.
+ try:
+ cidr = urllib.unquote(cidr).decode()
+ netaddr.IPNetwork(cidr)
+ except Exception:
+ raise exception.InvalidCidr(cidr=cidr)
+ values['cidr'] = cidr
+ else:
+ values['cidr'] = '0.0.0.0/0'
+
+ if ip_protocol and from_port and to_port:
+
+ try:
+ from_port = int(from_port)
+ to_port = int(to_port)
+ except ValueError:
+ raise exception.InvalidPortRange(from_port=from_port,
+ to_port=to_port)
+ ip_protocol = str(ip_protocol)
+ if ip_protocol.upper() not in ['TCP', 'UDP', 'ICMP']:
+ raise exception.InvalidIpProtocol(protocol=ip_protocol)
+ if ((min(from_port, to_port) < -1) or
+ (max(from_port, to_port) > 65535)):
+ raise exception.InvalidPortRange(from_port=from_port,
+ to_port=to_port)
+
+ values['protocol'] = ip_protocol
+ values['from_port'] = from_port
+ values['to_port'] = to_port
+ else:
+ # If cidr based filtering, protocol and ports are mandatory
+ if 'cidr' in values:
+ return None
+
+ return values
+
+ def delete(self, req, id):
+ context = req.environ['nova.context']
+
+ self.compute_api.ensure_default_security_group(context)
+ try:
+ id = int(id)
+ rule = db.security_group_rule_get(context, id)
+ except ValueError:
+ msg = _("Rule id is not integer")
+ return exc.HTTPBadRequest(explanation=msg)
+ except exception.NotFound as exp:
+ msg = _("Rule (%s) not found") % id
+ return exc.HTTPNotFound(explanation=msg)
+
+ group_id = rule.parent_group_id
+ self.compute_api.ensure_default_security_group(context)
+ security_group = db.security_group_get(context, group_id)
+
+ msg = _("Revoke security group ingress %s")
+ LOG.audit(msg, security_group['name'], context=context)
+
+ db.security_group_rule_destroy(context, rule['id'])
+ self.compute_api.trigger_security_group_rules_refresh(context,
+ security_group_id=security_group['id'])
+
+ return exc.HTTPAccepted()
+
+
+class Security_groups(extensions.ExtensionDescriptor):
+ def get_name(self):
+ return "SecurityGroups"
+
+ def get_alias(self):
+ return "security_groups"
+
+ def get_description(self):
+ return "Security group support"
+
+ def get_namespace(self):
+ return "http://docs.openstack.org/ext/securitygroups/api/v1.1"
+
+ def get_updated(self):
+ return "2011-07-21T00:00:00+00:00"
+
+ def get_resources(self):
+ resources = []
+
+ metadata = _get_metadata()
+ body_serializers = {
+ 'application/xml': wsgi.XMLDictSerializer(metadata=metadata,
+ xmlns=wsgi.XMLNS_V11),
+ }
+ serializer = wsgi.ResponseSerializer(body_serializers, None)
+
+ body_deserializers = {
+ 'application/xml': SecurityGroupXMLDeserializer(),
+ }
+ deserializer = wsgi.RequestDeserializer(body_deserializers)
+
+ res = extensions.ResourceExtension('os-security-groups',
+ controller=SecurityGroupController(),
+ deserializer=deserializer,
+ serializer=serializer)
+
+ resources.append(res)
+
+ body_deserializers = {
+ 'application/xml': SecurityGroupRulesXMLDeserializer(),
+ }
+ deserializer = wsgi.RequestDeserializer(body_deserializers)
+
+ res = extensions.ResourceExtension('os-security-group-rules',
+ controller=SecurityGroupRulesController(),
+ deserializer=deserializer,
+ serializer=serializer)
+ resources.append(res)
+ return resources
+
+
+class SecurityGroupXMLDeserializer(wsgi.MetadataXMLDeserializer):
+ """
+ Deserializer to handle xml-formatted security group requests.
+ """
+ def create(self, string):
+ """Deserialize an xml-formatted security group create request"""
+ dom = minidom.parseString(string)
+ security_group = {}
+ sg_node = self.find_first_child_named(dom,
+ 'security_group')
+ if sg_node is not None:
+ if sg_node.hasAttribute('name'):
+ security_group['name'] = sg_node.getAttribute('name')
+ desc_node = self.find_first_child_named(sg_node,
+ "description")
+ if desc_node:
+ security_group['description'] = self.extract_text(desc_node)
+ return {'body': {'security_group': security_group}}
+
+
+class SecurityGroupRulesXMLDeserializer(wsgi.MetadataXMLDeserializer):
+ """
+ Deserializer to handle xml-formatted security group requests.
+ """
+
+ def create(self, string):
+ """Deserialize an xml-formatted security group create request"""
+ dom = minidom.parseString(string)
+ security_group_rule = self._extract_security_group_rule(dom)
+ return {'body': {'security_group_rule': security_group_rule}}
+
+ def _extract_security_group_rule(self, node):
+ """Marshal the security group rule attribute of a parsed request"""
+ sg_rule = {}
+ sg_rule_node = self.find_first_child_named(node,
+ 'security_group_rule')
+ if sg_rule_node is not None:
+ ip_protocol_node = self.find_first_child_named(sg_rule_node,
+ "ip_protocol")
+ if ip_protocol_node is not None:
+ sg_rule['ip_protocol'] = self.extract_text(ip_protocol_node)
+
+ from_port_node = self.find_first_child_named(sg_rule_node,
+ "from_port")
+ if from_port_node is not None:
+ sg_rule['from_port'] = self.extract_text(from_port_node)
+
+ to_port_node = self.find_first_child_named(sg_rule_node, "to_port")
+ if to_port_node is not None:
+ sg_rule['to_port'] = self.extract_text(to_port_node)
+
+ parent_group_id_node = self.find_first_child_named(sg_rule_node,
+ "parent_group_id")
+ if parent_group_id_node is not None:
+ sg_rule['parent_group_id'] = self.extract_text(
+ parent_group_id_node)
+
+ group_id_node = self.find_first_child_named(sg_rule_node,
+ "group_id")
+ if group_id_node is not None:
+ sg_rule['group_id'] = self.extract_text(group_id_node)
+
+ cidr_node = self.find_first_child_named(sg_rule_node, "cidr")
+ if cidr_node is not None:
+ sg_rule['cidr'] = self.extract_text(cidr_node)
+
+ return sg_rule
+
+
+def _get_metadata():
+ metadata = {
+ "attributes": {
+ "security_group": ["id", "tenant_id", "name"],
+ "rule": ["id", "parent_group_id"],
+ "security_group_rule": ["id", "parent_group_id"],
+ }
+ }
+ return metadata
diff --git a/nova/api/openstack/create_instance_helper.py b/nova/api/openstack/create_instance_helper.py
index 1425521a9..4e1da549e 100644
--- a/nova/api/openstack/create_instance_helper.py
+++ b/nova/api/openstack/create_instance_helper.py
@@ -122,6 +122,7 @@ class CreateInstanceHelper(object):
raise exc.HTTPBadRequest(explanation=msg)
zone_blob = server_dict.get('blob')
+ availability_zone = server_dict.get('availability_zone')
name = server_dict['name']
self._validate_server_name(name)
name = name.strip()
@@ -161,7 +162,8 @@ class CreateInstanceHelper(object):
zone_blob=zone_blob,
reservation_id=reservation_id,
min_count=min_count,
- max_count=max_count))
+ max_count=max_count,
+ availability_zone=availability_zone))
except quota.QuotaError as error:
self._handle_quota_error(error)
except exception.ImageNotFound as error:
diff --git a/nova/api/openstack/extensions.py b/nova/api/openstack/extensions.py
index b1538950f..bb407a045 100644
--- a/nova/api/openstack/extensions.py
+++ b/nova/api/openstack/extensions.py
@@ -266,9 +266,13 @@ class ExtensionMiddleware(base_wsgi.Middleware):
for resource in ext_mgr.get_resources():
LOG.debug(_('Extended resource: %s'),
resource.collection)
+ if resource.serializer is None:
+ resource.serializer = serializer
+
mapper.resource(resource.collection, resource.collection,
controller=wsgi.Resource(
- resource.controller, serializer=serializer),
+ resource.controller, resource.deserializer,
+ resource.serializer),
collection=resource.collection_actions,
member=resource.member_actions,
parent_resource=resource.parent)
@@ -461,7 +465,8 @@ class ResourceExtension(object):
"""Add top level resources to the OpenStack API in nova."""
def __init__(self, collection, controller, parent=None,
- collection_actions=None, member_actions=None):
+ collection_actions=None, member_actions=None,
+ deserializer=None, serializer=None):
if not collection_actions:
collection_actions = {}
if not member_actions:
@@ -471,6 +476,8 @@ class ResourceExtension(object):
self.parent = parent
self.collection_actions = collection_actions
self.member_actions = member_actions
+ self.deserializer = deserializer
+ self.serializer = serializer
class ExtensionsXMLSerializer(wsgi.XMLDictSerializer):
diff --git a/nova/api/openstack/servers.py b/nova/api/openstack/servers.py
index 736fdf6ce..335ecad86 100644
--- a/nova/api/openstack/servers.py
+++ b/nova/api/openstack/servers.py
@@ -163,7 +163,7 @@ class Controller(object):
@scheduler_api.redirect_handler
def update(self, req, id, body):
- """ Updates the server name or password """
+ """Update server name then pass on to version-specific controller"""
if len(req.body) == 0:
raise exc.HTTPUnprocessableEntity()
@@ -178,17 +178,15 @@ class Controller(object):
self.helper._validate_server_name(name)
update_dict['display_name'] = name.strip()
- self._parse_update(ctxt, id, body, update_dict)
-
try:
self.compute_api.update(ctxt, id, **update_dict)
except exception.NotFound:
raise exc.HTTPNotFound()
- return exc.HTTPNoContent()
+ return self._update(ctxt, req, id, body)
- def _parse_update(self, context, id, inst_dict, update_dict):
- pass
+ def _update(self, context, req, id, inst_dict):
+ return exc.HTTPNotImplemented()
@scheduler_api.redirect_handler
def action(self, req, id, body):
@@ -210,11 +208,15 @@ class Controller(object):
}
self.actions.update(admin_actions)
- for key in self.actions.keys():
- if key in body:
+ for key in body:
+ if key in self.actions:
return self.actions[key](body, req, id)
+ else:
+ msg = _("There is no such server action: %s") % (key,)
+ raise exc.HTTPBadRequest(explanation=msg)
- raise exc.HTTPNotImplemented()
+ msg = _("Invalid request body")
+ raise exc.HTTPBadRequest(explanation=msg)
def _action_create_backup(self, input_dict, req, instance_id):
"""Backup a server instance.
@@ -568,10 +570,11 @@ class ControllerV10(Controller):
def _limit_items(self, items, req):
return common.limited(items, req)
- def _parse_update(self, context, server_id, inst_dict, update_dict):
+ def _update(self, context, req, id, inst_dict):
if 'adminPass' in inst_dict['server']:
- self.compute_api.set_admin_password(context, server_id,
+ self.compute_api.set_admin_password(context, id,
inst_dict['server']['adminPass'])
+ return exc.HTTPNoContent()
def _action_resize(self, input_dict, req, id):
""" Resizes a given instance to the flavor size requested """
@@ -693,6 +696,10 @@ class ControllerV11(Controller):
LOG.info(msg)
raise exc.HTTPBadRequest(explanation=msg)
+ def _update(self, context, req, id, inst_dict):
+ instance = self.compute_api.routing_get(context, id)
+ return self._build_view(req, instance, is_detail=True)
+
def _action_resize(self, input_dict, req, id):
""" Resizes a given instance to the flavor size requested """
try:
diff --git a/nova/api/openstack/views/servers.py b/nova/api/openstack/views/servers.py
index 8222f6766..edc328129 100644
--- a/nova/api/openstack/views/servers.py
+++ b/nova/api/openstack/views/servers.py
@@ -111,14 +111,14 @@ class ViewBuilderV10(ViewBuilder):
response['uuid'] = inst['uuid']
def _build_image(self, response, inst):
- if 'image_ref' in dict(inst):
+ if inst.get('image_ref', None):
image_ref = inst['image_ref']
if str(image_ref).startswith('http'):
raise exception.ListingImageRefsNotSupported()
response['imageId'] = int(image_ref)
def _build_flavor(self, response, inst):
- if 'instance_type' in dict(inst):
+ if inst.get('instance_type', None):
response['flavorId'] = inst['instance_type']['flavorid']
def _build_addresses(self, response, inst):
@@ -146,7 +146,7 @@ class ViewBuilderV11(ViewBuilder):
return response
def _build_image(self, response, inst):
- if 'image_ref' in dict(inst):
+ if inst.get("image_ref", None):
image_href = inst['image_ref']
image_id = str(common.get_id_from_href(image_href))
_bookmark = self.image_builder.generate_bookmark(image_id)
@@ -161,7 +161,7 @@ class ViewBuilderV11(ViewBuilder):
}
def _build_flavor(self, response, inst):
- if "instance_type" in dict(inst):
+ if inst.get("instance_type", None):
flavor_id = inst["instance_type"]['flavorid']
flavor_ref = self.flavor_builder.generate_href(flavor_id)
flavor_bookmark = self.flavor_builder.generate_bookmark(flavor_id)