Source code for horizon.dashboards.nova.access_and_security.security_groups.forms

# vim: tabstop=4 shiftwidth=4 softtabstop=4

# Copyright 2012 United States Government as represented by the
# Administrator of the National Aeronautics and Space Administration.
# All Rights Reserved.
#
# Copyright 2012 Nebula, Inc.
#
#    Licensed under the Apache License, Version 2.0 (the "License"); you may
#    not use this file except in compliance with the License. You may obtain
#    a copy of the License at
#
#         http://www.apache.org/licenses/LICENSE-2.0
#
#    Unless required by applicable law or agreed to in writing, software
#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
#    License for the specific language governing permissions and limitations
#    under the License.

import logging

from django import shortcuts
from django.contrib import messages
from django.core import validators
from django.forms import ValidationError
from django.utils.translation import ugettext_lazy as _
from novaclient import exceptions as novaclient_exceptions

from horizon import api
from horizon import exceptions
from horizon import forms
from horizon.utils.validators import validate_ipv4_cidr
from horizon.utils.validators import validate_port_range


LOG = logging.getLogger(__name__)


[docs]class CreateGroup(forms.SelfHandlingForm): name = forms.CharField(label=_("Name"), validators=[validators.validate_slug]) description = forms.CharField(label=_("Description"))
[docs] def handle(self, request, data): try: api.security_group_create(request, data['name'], data['description']) messages.success(request, _('Successfully created security_group: %s') % data['name']) except: exceptions.handle(request, _('Unable to create security group.')) return shortcuts.redirect('horizon:nova:access_and_security:index')
[docs]class AddRule(forms.SelfHandlingForm): ip_protocol = forms.ChoiceField(label=_('IP Protocol'), choices=[('tcp', 'TCP'), ('udp', 'UDP'), ('icmp', 'ICMP')], widget=forms.Select(attrs={'class': 'switchable'})) from_port = forms.IntegerField(label=_("From Port"), help_text=_("TCP/UDP: Enter integer value " "between 1 and 65535. ICMP: " "enter a value for ICMP type " "in the range (-1: 255)"), widget=forms.TextInput( attrs={'data': _('From Port'), 'data-icmp': _('Type')}), validators=[validate_port_range]) to_port = forms.IntegerField(label=_("To Port"), help_text=_("TCP/UDP: Enter integer value " "between 1 and 65535. ICMP: " "enter a value for ICMP code " "in the range (-1: 255)"), widget=forms.TextInput( attrs={'data': _('To Port'), 'data-icmp': _('Code')}), validators=[validate_port_range]) source_group = forms.ChoiceField(label=_('Source Group'), required=False) cidr = forms.CharField(label=_("CIDR"), required=False, initial="0.0.0.0/0", help_text=_("Classless Inter-Domain Routing " "(e.g. 192.168.0.0/24)"), validators=[validate_ipv4_cidr]) security_group_id = forms.IntegerField(widget=forms.HiddenInput()) def __init__(self, *args, **kwargs): super(AddRule, self).__init__(*args, **kwargs) initials = kwargs.get("initial", {}) current_group_id = initials.get('security_group_id', 0) security_groups = initials.get('security_group_list', []) security_groups_choices = [("", "CIDR")] # default choice is CIDR group_choices = [s for s in security_groups if str(s[0]) != current_group_id] if len(group_choices): # add group choice if available security_groups_choices.append(('Security Group', group_choices)) self.fields['source_group'].choices = security_groups_choices
[docs] def clean(self): cleaned_data = super(AddRule, self).clean() from_port = cleaned_data.get("from_port", None) to_port = cleaned_data.get("to_port", None) cidr = cleaned_data.get("cidr", None) source_group = cleaned_data.get("source_group", None) if from_port == None: msg = _('The "from" port number is invalid.') raise ValidationError(msg) if to_port == None: msg = _('The "to" port number is invalid.') raise ValidationError(msg) if to_port < from_port: msg = _('The "to" port number must be greater than or equal to ' 'the "from" port number.') raise ValidationError(msg) if source_group and cidr != self.fields['cidr'].initial: # Specifying a source group *and* a custom CIDR is invalid. msg = _('Either CIDR or Source Group may be specified, ' 'but not both.') raise ValidationError(msg) elif source_group: # If a source group is specified, clear the CIDR from its default cleaned_data['cidr'] = None else: # If only cidr is specified, clear the source_group entirely cleaned_data['source_group'] = None return cleaned_data
[docs] def handle(self, request, data): try: rule = api.security_group_rule_create(request, data['security_group_id'], data['ip_protocol'], data['from_port'], data['to_port'], data['cidr'], data['source_group']) messages.success(request, _('Successfully added rule: %s') \ % unicode(rule)) except novaclient_exceptions.ClientException, e: LOG.exception("ClientException in AddRule") messages.error(request, _('Error adding rule security group: %s') % e.message) return shortcuts.redirect("horizon:nova:access_and_security:index")