X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=planetstack%2Fcore%2Fadmin.py;h=73fd3dbbcc64aa3b0458660b636e187c8b07fb9c;hb=74d8e62359b115121796cb31b7e48ff1a8952c58;hp=9c7cc5466eb2de1103527bdbaaa7a714f1a1fabf;hpb=bf1153a32d6f27291dd7a3238bc1a9451e9d6154;p=plstackapi.git diff --git a/planetstack/core/admin.py b/planetstack/core/admin.py index 9c7cc54..73fd3db 100644 --- a/planetstack/core/admin.py +++ b/planetstack/core/admin.py @@ -11,10 +11,14 @@ from django.contrib.admin.widgets import FilteredSelectMultiple from django.contrib.auth.forms import ReadOnlyPasswordHashField from django.contrib.auth.signals import user_logged_in from django.utils import timezone +from django.contrib.contenttypes import generic + import django_evolution +class PlStackTabularInline(admin.TabularInline): + exclude = ['enacted'] -class ReadonlyTabularInline(admin.TabularInline): +class ReadonlyTabularInline(PlStackTabularInline): can_delete = False extra = 0 editable_fields = [] @@ -30,43 +34,151 @@ class ReadonlyTabularInline(admin.TabularInline): def has_add_permission(self, request): return False -class SliverInline(admin.TabularInline): +class TagInline(generic.GenericTabularInline): + model = Tag + exclude = ['enacted'] + extra = 1 + +class NetworkLookerUpper: + """ This is a callable that looks up a network name in a sliver and returns + the ip address for that network. + """ + + def __init__(self, name): + self.short_description = name + self.__name__ = name + self.network_name = name + + def __call__(self, obj): + if obj is not None: + for nbs in obj.networksliver_set.all(): + if (nbs.network.name == self.network_name): + return nbs.ip + return "" + + def __str__(self): + return self.network_name + +class SliverInline(PlStackTabularInline): model = Sliver - fields = ['ip', 'instance_name', 'slice', 'numberCores', 'image', 'key', 'node', 'deploymentNetwork'] + fields = ['ip', 'instance_name', 'slice', 'numberCores', 'image', 'node', 'deploymentNetwork'] extra = 0 - #readonly_fields = ['ip', 'instance_name', 'image'] readonly_fields = ['ip', 'instance_name'] -class SiteInline(admin.TabularInline): + + def _declared_fieldsets(self): + # Return None so django will call get_fieldsets and we can insert our + # dynamic fields + return None + + def get_readonly_fields(self, request, obj=None): + readonly_fields = super(SliverInline, self).get_readonly_fields(request, obj) + + # Lookup the networks that are bound to the slivers, and add those + # network names to the list of readonly fields. + + for sliver in obj.slivers.all(): + for nbs in sliver.networksliver_set.all(): + if nbs.ip is not None: + network_name = nbs.network.name + if network_name not in [str(x) for x in readonly_fields]: + readonly_fields.append(NetworkLookerUpper(network_name)) + + return readonly_fields + + def get_fieldsets(self, request, obj=None): + form = self.get_formset(request, obj).form + # fields = the read/write files + the read-only fields + fields = self.fields + for fieldName in self.get_readonly_fields(request,obj): + if not fieldName in fields: + fields.append(fieldName) + + return [(None, {'fields': fields})] + + +class SiteInline(PlStackTabularInline): model = Site extra = 0 -class UserInline(admin.TabularInline): +class UserInline(PlStackTabularInline): model = User fields = ['email', 'firstname', 'lastname'] extra = 0 -class SliceInline(admin.TabularInline): +class SliceInline(PlStackTabularInline): model = Slice extra = 0 -class RoleInline(admin.TabularInline): +class RoleInline(PlStackTabularInline): model = Role extra = 0 -class NodeInline(admin.TabularInline): +class NodeInline(PlStackTabularInline): model = Node extra = 0 -class SitePrivilegeInline(admin.TabularInline): +class SitePrivilegeInline(PlStackTabularInline): model = SitePrivilege extra = 0 -class SliceMembershipInline(admin.TabularInline): + def formfield_for_foreignkey(self, db_field, request, **kwargs): + if db_field.name == 'site': + if not request.user.is_admin: + # only show sites where user is an admin or pi + roles = Role.objects.filter(role_type__in=['admin', 'pi']) + site_privileges = SitePrivilege.objects.filter(user=request.user).filter(role__in=roles) + login_bases = [site_privilege.site.login_base for site_privilege in site_privileges] + sites = Site.objects.filter(login_base__in=login_bases) + kwargs['queryset'] = sites + + if db_field.name == 'user': + if not request.user.is_admin: + # only show users from sites where caller has admin or pi role + roles = Role.objects.filter(role_type__in=['admin', 'pi']) + site_privileges = SitePrivilege.objects.filter(user=request.user).filter(role__in=roles) + sites = [site_privilege.site for site_privilege in site_privileges] + site_privileges = SitePrivilege.objects.filter(site__in=sites) + emails = [site_privilege.user.email for site_privilege in site_privileges] + users = User.objects.filter(email__in=emails) + kwargs['queryset'] = users + return super(SitePrivilegeInline, self).formfield_for_foreignkey(db_field, request, **kwargs) + +class SliceMembershipInline(PlStackTabularInline): model = SliceMembership extra = 0 + fields = ('user', 'role') + + def formfield_for_foreignkey(self, db_field, request, **kwargs): + if db_field.name == 'slice': + if not request.user.is_admin: + # only show slices at sites where caller has admin or pi role + roles = Role.objects.filter(role_type__in=['admin', 'pi']) + site_privileges = SitePrivilege.objects.filter(user=request.user).filter(role__in=roles) + sites = [site_privilege.site for site_privilege in site_privileges] + slices = Slice.objects.filter(site__in=sites) + kwargs['queryset'] = slices + if db_field.name == 'user': + if not request.user.is_admin: + # only show users from sites where caller has admin or pi role + roles = Role.objects.filter(role_type__in=['admin', 'pi']) + site_privileges = SitePrivilege.objects.filter(user=request.user).filter(role__in=roles) + sites = [site_privilege.site for site_privilege in site_privileges] + site_privileges = SitePrivilege.objects.filter(site__in=sites) + emails = [site_privilege.user.email for site_privilege in site_privileges] + users = User.objects.filter(email__in=emails) + kwargs['queryset'] = list(users) + + return super(SliceMembershipInline, self).formfield_for_foreignkey(db_field, request, **kwargs) + +class SliceNetworkInline(admin.TabularInline): + # exclude = ['enacted'] + model = Network.slices.through + extra = 0 + verbose_name = "Network Connection" + verbose_name_plural = "Network Connections" -class SliceTagInline(admin.TabularInline): +class SliceTagInline(PlStackTabularInline): model = SliceTag extra = 0 @@ -80,25 +192,9 @@ class PlainTextWidget(forms.HiddenInput): class PlanetStackBaseAdmin(admin.ModelAdmin): save_on_top = False + exclude = ['enacted'] -class OSModelAdmin(PlanetStackBaseAdmin): - """Attach client connection to openstack on delete() and save()""" - - def save_model(self, request, obj, form, change): - if request.user.site: - auth = request.session.get('auth', {}) - auth['tenant'] = request.user.site.login_base - obj.os_manager = OpenStackManager(auth=auth, caller=request.user) - obj.save() - - def delete_model(self, request, obj): - if request.user.site: - auth = request.session.get('auth', {}) - auth['tenant'] = request.user.site.login_base - obj.os_manager = OpenStackManager(auth=auth, caller=request.user) - obj.delete() - -class RoleAdmin(OSModelAdmin): +class RoleAdmin(PlanetStackBaseAdmin): fieldsets = [ ('Role', {'fields': ['role_type']}) ] @@ -149,15 +245,14 @@ class DeploymentAdmin(PlanetStackBaseAdmin): inline.model.os_manager = OpenStackManager(auth=auth, caller=request.user) yield inline.get_formset(request, obj) -class SiteAdmin(OSModelAdmin): +class SiteAdmin(PlanetStackBaseAdmin): fieldsets = [ - (None, {'fields': ['name', 'site_url', 'enabled', 'is_public', 'login_base']}), - ('Location', {'fields': ['latitude', 'longitude']}), + (None, {'fields': ['name', 'site_url', 'enabled', 'is_public', 'login_base', 'location']}), ('Deployment Networks', {'fields': ['deployments']}) ] list_display = ('name', 'login_base','site_url', 'enabled') filter_horizontal = ('deployments',) - inlines = [NodeInline, UserInline, SitePrivilegeInline] + inlines = [TagInline, NodeInline, UserInline, SitePrivilegeInline] search_fields = ['name'] def queryset(self, request): @@ -176,10 +271,17 @@ class SiteAdmin(OSModelAdmin): # hide MyInline in the add view if obj is None: continue - # give inline object access to driver and caller - auth = request.session.get('auth', {}) - #auth['tenant'] = request.user.site.login_base - inline.model.os_manager = OpenStackManager(auth=auth, caller=request.user) + if isinstance(inline, SliceInline): + inline.model.caller = request.user + yield inline.get_formset(request, obj) + + def get_formsets(self, request, obj=None): + for inline in self.get_inline_instances(request, obj): + # hide MyInline in the add view + if obj is None: + continue + if isinstance(inline, SliverInline): + inline.model.caller = request.user yield inline.get_formset(request, obj) class SitePrivilegeAdmin(PlanetStackBaseAdmin): @@ -188,52 +290,57 @@ class SitePrivilegeAdmin(PlanetStackBaseAdmin): ] list_display = ('user', 'site', 'role') + def formfield_for_foreignkey(self, db_field, request, **kwargs): + if db_field.name == 'site': + if not request.user.is_admin: + # only show sites where user is an admin or pi + sites = set() + for site_privilege in SitePrivilege.objects.filer(user=request.user): + if site_privilege.role.role_type in ['admin', 'pi']: + sites.add(site_privilege.site) + kwargs['queryset'] = Site.objects.filter(site__in=list(sites)) + + if db_field.name == 'user': + if not request.user.is_admin: + # only show users from sites where caller has admin or pi role + roles = Role.objects.filter(role_type__in=['admin', 'pi']) + site_privileges = SitePrivilege.objects.filter(user=request.user).filter(role__in=roles) + sites = [site_privilege.site for site_privilege in site_privileges] + site_privileges = SitePrivilege.objects.filter(site__in=sites) + emails = [site_privilege.user.email for site_privilege in site_privileges] + users = User.objects.filter(email__in=emails) + kwargs['queryset'] = users + + return super(SitePrivilegeAdmin, self).formfield_for_foreignkey(db_field, request, **kwargs) + def queryset(self, request): # admins can see all privileges. Users can only see privileges at sites - # where they have the admin role. + # where they have the admin role or pi role. qs = super(SitePrivilegeAdmin, self).queryset(request) if not request.user.is_admin: - roles = request.user.get_roles() - tenants = [] - for (role, tenant_list) in roles: - if role == 'admin': - tenants.extend(tenant_list) - valid_sites = Sites.objects.filter(login_base__in=tenants) - qs = qs.filter(site__in=valid_sites) + roles = Role.objects.filter(role_type__in=['admin', 'pi']) + site_privileges = SitePrivilege.objects.filter(user=request.user).filter(role__in=roles) + login_bases = [site_privilege.site.login_base for site_privilege in site_privileges] + sites = Site.objects.filter(login_base__in=login_bases) + qs = qs.filter(site__in=sites) return qs - def save_model(self, request, obj, form, change): - # update openstack connection to use this site/tenant - auth = request.session.get('auth', {}) - #auth['tenant'] = obj.site.login_base - obj.os_manager = OpenStackManager(auth=auth, caller=request.user) - obj.save() - - def delete_model(self, request, obj): - # update openstack connection to use this site/tenant - auth = request.session.get('auth', {}) - #auth['tenant'] = obj.site.login_base - obj.os_manager = OpenStackManager(auth=auth, caller=request.user) - obj.delete() - -class KeyAdmin(OSModelAdmin): - fieldsets = [ - ('Key', {'fields': ['key', 'type', 'blacklisted']}) - ] - list_display = ['key', 'type', 'blacklisted'] - - #def queryset(self, request): - # admins can see all keys. Users can only see their own key. - #if request.user.is_admin: - # qs = super(KeyAdmin, self).queryset(request) - #else: - # qs = Key.objects.filter(user=request.user) - #return qs - -class SliceAdmin(OSModelAdmin): +class SliceAdmin(PlanetStackBaseAdmin): fields = ['name', 'site', 'serviceClass', 'description', 'slice_url'] list_display = ('name', 'site','serviceClass', 'slice_url') - inlines = [SliverInline, SliceMembershipInline, SliceTagInline] + inlines = [SliverInline, SliceMembershipInline, TagInline, SliceTagInline, SliceNetworkInline] + + def formfield_for_foreignkey(self, db_field, request, **kwargs): + if db_field.name == 'site': + if not request.user.is_admin: + # only show sites where user is a pi or admin + roles = Role.objects.filter(role_type__in=['admin', 'pi']) + site_privileges = SitePrivilege.objects.filter(user=request.user).filter(role__in=roles) + login_bases = [site_privilege.site.login_base for site_privilege in site_privileges] + sites = Site.objects.filter(login_base__in=login_bases) + kwargs['queryset'] = sites + + return super(SliceAdmin, self).formfield_for_foreignkey(db_field, request, **kwargs) def queryset(self, request): # admins can see all keys. Users can only see slices they belong to. @@ -251,10 +358,8 @@ class SliceAdmin(OSModelAdmin): # hide MyInline in the add view if obj is None: continue - # give inline object access to driver and caller - auth = request.session.get('auth', {}) - auth['tenant'] = obj.name # meed to connect using slice's tenant - inline.model.os_manager = OpenStackManager(auth=auth, caller=request.user) + if isinstance(inline, SliverInline): + inline.model.caller = request.user yield inline.get_formset(request, obj) def get_queryset(self, request): @@ -262,7 +367,12 @@ class SliceAdmin(OSModelAdmin): if request.user.is_superuser: return qs # users can only see slices at their site - return qs.filter(site=request.user.site) + return qs.filter(site=request.user.site) + + def save_model(self, request, obj, form, change): + # update openstack connection to use this site/tenant + obj.caller = request.user + obj.save() class SliceMembershipAdmin(PlanetStackBaseAdmin): fieldsets = [ @@ -270,18 +380,40 @@ class SliceMembershipAdmin(PlanetStackBaseAdmin): ] list_display = ('user', 'slice', 'role') + def formfield_for_foreignkey(self, db_field, request, **kwargs): + if db_field.name == 'slice': + if not request.user.is_admin: + # only show slices at sites where caller has admin or pi role + roles = Role.objects.filter(role_type__in=['admin', 'pi']) + site_privileges = SitePrivilege.objects.filter(user=request.user).filter(role__in=roles) + sites = [site_privilege.site for site_privilege in site_privileges] + slices = Slice.objects.filter(site__in=sites) + kwargs['queryset'] = slices + + if db_field.name == 'user': + if not request.user.is_admin: + # only show users from sites where caller has admin or pi role + roles = Role.objects.filter(role_type__in=['admin', 'pi']) + site_privileges = SitePrivilege.objects.filter(user=request.user).filter(role__in=roles) + sites = [site_privilege.site for site_privilege in site_privileges] + site_privileges = SitePrivilege.objects.filter(site__in=sites) + emails = [site_privilege.user.email for site_privilege in site_privileges] + users = User.objects.filter(email__in=emails) + kwargs['queryset'] = users + + return super(SliceMembershipAdmin, self).formfield_for_foreignkey(db_field, request, **kwargs) + def queryset(self, request): # admins can see all memberships. Users can only see memberships of # slices where they have the admin role. qs = super(SliceMembershipAdmin, self).queryset(request) if not request.user.is_admin: - roles = request.user.get_roles() - tenants = [] - for (role, tenant_list) in roles: - if role == 'admin': - tenants.extend(tenant_list) - valid_slices = Slice.objects.filter(name__in=tenants) - qs = qs.filter(slice__in=valid_slices) + roles = Role.objects.filter(role_type__in=['admin', 'pi']) + site_privileges = SitePrivilege.objects.filter(user=request.user).filter(role__in=roles) + login_bases = [site_privilege.site.login_base for site_privilege in site_privileges] + sites = Site.objects.filter(login_base__in=login_bases) + slices = Slice.objects.filter(site__in=sites) + qs = qs.filter(slice__in=slices) return qs def save_model(self, request, obj, form, change): @@ -305,6 +437,7 @@ class ImageAdmin(admin.ModelAdmin): class NodeAdmin(admin.ModelAdmin): list_display = ('name', 'site', 'deployment') list_filter = ('deployment',) + inlines = [TagInline] class SliverForm(forms.ModelForm): @@ -317,12 +450,27 @@ class SliverForm(forms.ModelForm): 'instance_name': PlainTextWidget(), } +class ProjectAdmin(admin.ModelAdmin): + exclude = ['enacted'] + +class TagAdmin(admin.ModelAdmin): + exclude = ['enacted'] + class SliverAdmin(PlanetStackBaseAdmin): form = SliverForm fieldsets = [ - ('Sliver', {'fields': ['ip', 'instance_name', 'slice', 'numberCores', 'image', 'key', 'node', 'deploymentNetwork']}) + ('Sliver', {'fields': ['ip', 'instance_name', 'slice', 'numberCores', 'image', 'node', 'deploymentNetwork']}) ] - list_display = ['ip', 'instance_name', 'slice', 'numberCores', 'image', 'key', 'node', 'deploymentNetwork'] + list_display = ['ip', 'instance_name', 'slice', 'numberCores', 'image', 'node', 'deploymentNetwork'] + inlines = [TagInline] + + def formfield_for_foreignkey(self, db_field, request, **kwargs): + if db_field.name == 'slice': + if not request.user.is_admin: + slices = set([sm.slice.name for sm in SliceMembership.objects.filter(user=request.user)]) + kwargs['queryset'] = Slice.objects.filter(name__in=list(slices)) + + return super(SliverAdmin, self).formfield_for_foreignkey(db_field, request, **kwargs) def queryset(self, request): # admins can see all slivers. Users can only see slivers of @@ -361,6 +509,7 @@ class SliverAdmin(PlanetStackBaseAdmin): auth = request.session.get('auth', {}) auth['tenant'] = obj.slice.name obj.os_manager = OpenStackManager(auth=auth, caller=request.user) + obj.creator = request.user obj.save() def delete_model(self, request, obj): @@ -378,7 +527,7 @@ class UserCreationForm(forms.ModelForm): class Meta: model = User - fields = ('email', 'firstname', 'lastname', 'phone', 'key', 'site') + fields = ('email', 'firstname', 'lastname', 'phone', 'public_key', 'site') def clean_password2(self): # Check that the two password entries match @@ -415,7 +564,7 @@ class UserChangeForm(forms.ModelForm): return self.initial["password"] -class UserAdmin(UserAdmin, OSModelAdmin): +class UserAdmin(UserAdmin): class Meta: app_label = "core" @@ -431,28 +580,43 @@ class UserAdmin(UserAdmin, OSModelAdmin): inlines = [SitePrivilegeInline, SliceMembershipInline] fieldsets = ( (None, {'fields': ('email', 'password', 'site', 'is_admin', 'timezone')}), - ('Personal info', {'fields': ('firstname','lastname','phone', 'key')}), + ('Personal info', {'fields': ('firstname','lastname','phone', 'public_key')}), #('Important dates', {'fields': ('last_login',)}), ) add_fieldsets = ( (None, { 'classes': ('wide',), - 'fields': ('email', 'firstname', 'lastname', 'phone', 'site', 'key','password1', 'password2', 'is_admin')} + 'fields': ('email', 'firstname', 'lastname', 'phone', 'site', 'public_key','password1', 'password2', 'is_admin')} ), ) search_fields = ('email',) ordering = ('email',) filter_horizontal = () + def formfield_for_foreignkey(self, db_field, request, **kwargs): + if db_field.name == 'site': + if not request.user.is_admin: + # show sites where caller is an admin or pi + sites = [] + for site_privilege in SitePrivilege.objects.filer(user=request.user): + if site_privilege.role.role_type in ['admin', 'pi']: + sites.append(site_privilege.site.login_base) + kwargs['queryset'] = Site.objects.filter(login_base__in(list(sites))) + + return super(UserAdmin, self).formfield_for_foreignkey(db_field, request, **kwargs) + class ServiceResourceInline(admin.TabularInline): + exclude = ['enacted'] model = ServiceResource extra = 0 class ServiceClassAdmin(admin.ModelAdmin): + exclude = ['enacted'] list_display = ('name', 'commitment', 'membershipFee') inlines = [ServiceResourceInline] class ReservedResourceInline(admin.TabularInline): + exclude = ['enacted'] model = ReservedResource extra = 0 @@ -521,6 +685,7 @@ class ReservationAddRefreshForm(ReservationAddForm): return False class ReservationAdmin(admin.ModelAdmin): + exclude = ['enacted'] list_display = ('startTime', 'duration') inlines = [ReservedResourceInline] form = ReservationAddForm @@ -550,27 +715,67 @@ class ReservationAdmin(admin.ModelAdmin): return super(ReservationAdmin, self).changelist_view(request, extra_context) def get_form(self, request, obj=None, **kwargs): - request._obj_ = obj - if obj is not None: - # For changes, set request._slice to the slice already set in the - # object. - request._slice = obj.slice - self.form = ReservationChangeForm - else: - if getattr(request, "_refresh", False): - self.form = ReservationAddRefreshForm - else: - self.form = ReservationAddForm - return super(ReservationAdmin, self).get_form(request, obj, **kwargs) - + request._obj_ = obj + if obj is not None: + # For changes, set request._slice to the slice already set in the + # object. + request._slice = obj.slice + self.form = ReservationChangeForm + else: + if getattr(request, "_refresh", False): + self.form = ReservationAddRefreshForm + else: + self.form = ReservationAddForm + return super(ReservationAdmin, self).get_form(request, obj, **kwargs) + def get_readonly_fields(self, request, obj=None): - if (obj is not None): - # Prevent slice from being changed after the reservation has been - # created. - return ['slice'] - else: + if (obj is not None): + # Prevent slice from being changed after the reservation has been + # created. + return ['slice'] + else: return [] +class NetworkParameterTypeAdmin(admin.ModelAdmin): + exclude = ['enacted'] + list_display = ("name", ) + +class RouterAdmin(admin.ModelAdmin): + exclude = ['enacted'] + list_display = ("name", ) + +class RouterInline(admin.TabularInline): + # exclude = ['enacted'] + model = Router.networks.through + extra = 0 + verbose_name_plural = "Routers" + verbose_name = "Router" + +class NetworkParameterInline(generic.GenericTabularInline): + exclude = ['enacted'] + model = NetworkParameter + extra = 1 + verbose_name_plural = "Parameters" + verbose_name = "Parameter" + +class NetworkSliversInline(admin.TabularInline): + exclude = ['enacted'] + readonly_fields = ("ip", ) + model = NetworkSliver + extra = 0 + verbose_name_plural = "Slivers" + verbose_name = "Sliver" + +class NetworkAdmin(admin.ModelAdmin): + exclude = ['enacted'] + list_display = ("name", "subnet", "ports", "labels") + readonly_fields = ("subnet", ) + inlines = [NetworkParameterInline, NetworkSliversInline, RouterInline] + +class NetworkTemplateAdmin(admin.ModelAdmin): + exclude = ['enacted'] + list_display = ("name", "guaranteedBandwidth", "visibility") + # register a signal that caches the user's credentials when they log in def cache_credentials(sender, user, request, **kwds): auth = {'username': request.POST['username'], @@ -597,17 +802,20 @@ showAll = False admin.site.register(Deployment, DeploymentAdmin) admin.site.register(Site, SiteAdmin) admin.site.register(Slice, SliceAdmin) -#admin.site.register(Subnet) -admin.site.register(Key, KeyAdmin) - +admin.site.register(Project, ProjectAdmin) +admin.site.register(ServiceClass, ServiceClassAdmin) +admin.site.register(Reservation, ReservationAdmin) +admin.site.register(Network, NetworkAdmin) +admin.site.register(Router, RouterAdmin) +admin.site.register(NetworkParameterType, NetworkParameterTypeAdmin) +admin.site.register(NetworkTemplate, NetworkTemplateAdmin) if showAll: + admin.site.register(Tag, TagAdmin) admin.site.register(Node, NodeAdmin) admin.site.register(SliceMembership, SliceMembershipAdmin) admin.site.register(SitePrivilege, SitePrivilegeAdmin) admin.site.register(Role, RoleAdmin) admin.site.register(Sliver, SliverAdmin) - admin.site.register(ServiceClass, ServiceClassAdmin) - admin.site.register(Reservation, ReservationAdmin) admin.site.register(Image, ImageAdmin)