blob: 4dcd0fa3b6ee98a0d5ffae1049ee97a66e6c2de3 [file] [log] [blame]
Murat Parlakisik2a4cdf52017-05-31 11:10:24 +03001sync_attributes = ("private_ip", "private_mac",
2 "ceilometer_ip", "ceilometer_mac",
3 "nat_ip", "nat_mac", "ceilometer_port",)
4
5default_attributes = {}
6def __init__(self, *args, **kwargs):
7 ceilometer_services = CeilometerService.get_service_objects().all()
8 if ceilometer_services:
9 self._meta.get_field("provider_service").default = ceilometer_services[0].id
10 super(MonitoringChannel, self).__init__(*args, **kwargs)
11 self.set_attribute("use_same_instance_for_multiple_tenants", True)
12
13def can_update(self, user):
14 #Allow creation of this model instances for non-admin users also
15 return True
16
17def save(self, *args, **kwargs):
18 if not self.creator:
19 if not getattr(self, "caller", None):
20 # caller must be set when creating a monitoring channel since it creates a slice
21 raise XOSProgrammingError("MonitoringChannel's self.caller was not set")
22 self.creator = self.caller
23 if not self.creator:
24 raise XOSProgrammingError("MonitoringChannel's self.creator was not set")
25
26 if self.pk is None:
27 #Allow only one monitoring channel per user
28 channel_count = sum ( [1 for channel in MonitoringChannel.get_tenant_objects().all() if (channel.creator == self.creator)] )
29 if channel_count > 0:
30 raise XOSValidationError("Already %s channels exist for user Can only create max 1 MonitoringChannel instance per user" % str(channel_count))
31
32 super(MonitoringChannel, self).save(*args, **kwargs)
33 model_policy_monitoring_channel(self.pk)
34
35def delete(self, *args, **kwargs):
36 self.cleanup_container()
37 super(MonitoringChannel, self).delete(*args, **kwargs)
38
39@property
40def addresses(self):
41 if (not self.id) or (not self.instance):
42 return {}
43
44 addresses = {}
45 for ns in self.instance.ports.all():
46 if "private" in ns.network.name.lower():
47 addresses["private"] = (ns.ip, ns.mac)
48 elif ("nat" in ns.network.name.lower()) or ("management" in ns.network.name.lower()):
49 addresses["nat"] = (ns.ip, ns.mac)
50 #TODO: Do we need this client_access_network. Revisit in VTN context
51 #elif "ceilometer_client_access" in ns.network.labels.lower():
52 # addresses["ceilometer"] = (ns.ip, ns.mac)
53 return addresses
54
55@property
56def nat_ip(self):
57 return self.addresses.get("nat", (None, None))[0]
58
59@property
60def nat_mac(self):
61 return self.addresses.get("nat", (None, None))[1]
62
63@property
64def private_ip(self):
65 return self.addresses.get("private", (None, None))[0]
66
67@property
68def private_mac(self):
69 return self.addresses.get("private", (None, None))[1]
70
71@property
72def ceilometer_ip(self):
73 return self.addresses.get("ceilometer", (None, None))[0]
74
75@property
76def ceilometer_mac(self):
77 return self.addresses.get("ceilometer", (None, None))[1]
78
79@property
80def site_tenant_list(self):
81 tenant_ids = Set()
82 for sp in SitePrivilege.objects.filter(user=self.creator):
83 site = sp.site
84 for cs in site.controllersite.all():
85 if cs.tenant_id:
86 tenant_ids.add(cs.tenant_id)
87 return tenant_ids
88
89@property
90def slice_tenant_list(self):
91 tenant_ids = Set()
92 for sp in SlicePrivilege.objects.filter(user=self.creator):
93 slice = sp.slice
94 for cs in slice.controllerslices.all():
95 if cs.tenant_id:
96 tenant_ids.add(cs.tenant_id)
97 for slice in Slice.objects.filter(creator=self.creator):
98 for cs in slice.controllerslices.all():
99 if cs.tenant_id:
100 tenant_ids.add(cs.tenant_id)
101 if self.creator.is_admin:
102 #TODO: Ceilometer publishes the SDN meters without associating to any tenant IDs.
103 #For now, ceilometer code is changed to pusblish all such meters with tenant
104 #id as "default_admin_tenant". Here add that default tenant as authroized tenant_id
105 #for all admin users.
106 tenant_ids.add("default_admin_tenant")
107 return tenant_ids
108
109@property
110def tenant_list(self):
111 return self.slice_tenant_list | self.site_tenant_list
112
113@property
114def tenant_list_str(self):
115 return ", ".join(self.tenant_list)
116
117@property
118def ceilometer_port(self):
119 # TODO: Find a better logic to choose unique ceilometer port number for each instance
120 if not self.id:
121 return None
122 return 8888+self.id
123
124@property
125def ssh_proxy_tunnel(self):
126 return self.get_attribute("ssh_proxy_tunnel", False)
127
128@ssh_proxy_tunnel.setter
129def ssh_proxy_tunnel(self, value):
130 self.set_attribute("ssh_proxy_tunnel", value)
131
132@property
133def ssh_tunnel_port(self):
134 return self.get_attribute("ssh_tunnel_port")
135
136@ssh_tunnel_port.setter
137def ssh_tunnel_port(self, value):
138 self.set_attribute("ssh_tunnel_port", value)
139
140@property
141def ssh_tunnel_ip(self):
142 return self.get_attribute("ssh_tunnel_ip")
143
144@ssh_tunnel_ip.setter
145def ssh_tunnel_ip(self, value):
146 self.set_attribute("ssh_tunnel_ip", value)
147
148@property
149def ceilometer_url(self):
150 if self.private_ip and self.ceilometer_port:
151 return "http://" + self.private_ip + ":" + str(self.ceilometer_port) + "/"
152 else:
153 return None
154
155@property
156def ceilometer_ssh_proxy_url(self):
157 if self.ssh_proxy_tunnel:
158 if self.ssh_tunnel_ip and self.ssh_tunnel_port:
159 return "http://" + self.ssh_tunnel_ip + ":" + str(self.ssh_tunnel_port) + "/"
160 else:
161 return None
162 else:
163 return None
164
165@property
166def kafka_url(self):
167 ceilometer_services = CeilometerService.get_service_objects().all()
168 if not ceilometer_services:
169 return None
170 return ceilometer_services[0].kafka_url