~ubuntu-branches/ubuntu/vivid/neutron/vivid-updates

« back to all changes in this revision

Viewing changes to neutron/plugins/ml2/extensions/port_security.py

  • Committer: Package Import Robot
  • Author(s): James Page
  • Date: 2015-03-30 11:17:19 UTC
  • mfrom: (1.1.21)
  • Revision ID: package-import@ubuntu.com-20150330111719-h0gx7233p4jkkgfh
Tags: 1:2015.1~b3-0ubuntu1
* New upstream milestone release:
  - d/control: Align version requirements with upstream.
  - d/control: Add new dependency on oslo-log.
  - d/p/*: Rebase.
  - d/control,d/neutron-plugin-hyperv*: Dropped, decomposed into
    separate project upstream.
  - d/control,d/neutron-plugin-openflow*: Dropped, decomposed into
    separate project upstream.
  - d/neutron-common.install: Add neutron-rootwrap-daemon and 
    neutron-keepalived-state-change binaries.
  - d/rules: Ignore neutron-hyperv-agent when installing; only for Windows.
  - d/neutron-plugin-cisco.install: Drop neutron-cisco-cfg-agent as
    decomposed into separate project upstream.
  - d/neutron-plugin-vmware.install: Drop neutron-check-nsx-config and
    neutron-nsx-manage as decomposed into separate project upstream.
  - d/control: Add dependency on python-neutron-fwaas to neutron-l3-agent.
* d/pydist-overrides: Add overrides for oslo packages.
* d/control: Fixup type in package description (LP: #1263539).
* d/p/fixup-driver-test-execution.patch: Cherry pick fix from upstream VCS
  to support unit test exection in out-of-tree vendor drivers.
* d/neutron-common.postinst: Allow general access to /etc/neutron but limit
  access to root/neutron to /etc/neutron/neutron.conf to support execution
  of unit tests in decomposed vendor drivers.
* d/control: Add dependency on python-neutron-fwaas to neutron-l3-agent
  package.

Show diffs side-by-side

added added

removed removed

Lines of Context:
 
1
# Copyright 2015 Intel Corporation.
 
2
# All Rights Reserved.
 
3
#
 
4
#    Licensed under the Apache License, Version 2.0 (the "License"); you may
 
5
#    not use this file except in compliance with the License. You may obtain
 
6
#    a copy of the License at
 
7
#
 
8
#         http://www.apache.org/licenses/LICENSE-2.0
 
9
#
 
10
#    Unless required by applicable law or agreed to in writing, software
 
11
#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 
12
#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 
13
#    License for the specific language governing permissions and limitations
 
14
#    under the License.
 
15
 
 
16
from neutron.api.v2 import attributes as attrs
 
17
from neutron.db import common_db_mixin
 
18
from neutron.db import portsecurity_db_common as ps_db_common
 
19
from neutron.extensions import portsecurity as psec
 
20
from neutron.i18n import _LI
 
21
from neutron.plugins.ml2 import driver_api as api
 
22
from oslo_log import log as logging
 
23
 
 
24
LOG = logging.getLogger(__name__)
 
25
 
 
26
 
 
27
class PortSecurityExtensionDriver(api.ExtensionDriver,
 
28
                                  ps_db_common.PortSecurityDbCommon,
 
29
                                  common_db_mixin.CommonDbMixin):
 
30
    _supported_extension_alias = 'port-security'
 
31
 
 
32
    def initialize(self):
 
33
        LOG.info(_LI("PortSecurityExtensionDriver initialization complete"))
 
34
 
 
35
    @property
 
36
    def extension_alias(self):
 
37
        return self._supported_extension_alias
 
38
 
 
39
    def process_create_network(self, context, data, result):
 
40
        # Create the network extension attributes.
 
41
        if psec.PORTSECURITY in data:
 
42
            self._process_network_port_security_create(context, data, result)
 
43
 
 
44
    def process_update_network(self, context, data, result):
 
45
        # Update the network extension attributes.
 
46
        if psec.PORTSECURITY in data:
 
47
            self._process_network_port_security_update(context, data, result)
 
48
 
 
49
    def process_create_port(self, context, data, result):
 
50
        # Create the port extension attributes.
 
51
        data[psec.PORTSECURITY] = self._determine_port_security(context, data)
 
52
        self._process_port_port_security_create(context, data, result)
 
53
 
 
54
    def process_update_port(self, context, data, result):
 
55
        if psec.PORTSECURITY in data:
 
56
            self._process_port_port_security_update(
 
57
                context, data, result)
 
58
 
 
59
    def extend_network_dict(self, session, db_data, result):
 
60
        self._extend_port_security_dict(result, db_data)
 
61
 
 
62
    def extend_port_dict(self, session, db_data, result):
 
63
        self._extend_port_security_dict(result, db_data)
 
64
 
 
65
    def _extend_port_security_dict(self, response_data, db_data):
 
66
        response_data[psec.PORTSECURITY] = (
 
67
                                db_data['port_security'][psec.PORTSECURITY])
 
68
 
 
69
    def _determine_port_security(self, context, port):
 
70
        """Returns a boolean (port_security_enabled).
 
71
 
 
72
        Port_security is the value associated with the port if one is present
 
73
        otherwise the value associated with the network is returned.
 
74
        """
 
75
        # we don't apply security groups for dhcp, router
 
76
        if (port.get('device_owner') and
 
77
                port['device_owner'].startswith('network:')):
 
78
            return False
 
79
 
 
80
        if attrs.is_attr_set(port.get(psec.PORTSECURITY)):
 
81
            port_security_enabled = port[psec.PORTSECURITY]
 
82
        else:
 
83
            port_security_enabled = self._get_network_security_binding(
 
84
                context, port['network_id'])
 
85
 
 
86
        return port_security_enabled