summaryrefslogtreecommitdiff
path: root/openstackclient/network
diff options
context:
space:
mode:
Diffstat (limited to 'openstackclient/network')
-rw-r--r--openstackclient/network/utils.py41
-rw-r--r--openstackclient/network/v2/security_group.py108
-rw-r--r--openstackclient/network/v2/security_group_rule.py31
3 files changed, 151 insertions, 29 deletions
diff --git a/openstackclient/network/utils.py b/openstackclient/network/utils.py
new file mode 100644
index 00000000..287f0271
--- /dev/null
+++ b/openstackclient/network/utils.py
@@ -0,0 +1,41 @@
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+
+
+# Transform compute security group rule for display.
+def transform_compute_security_group_rule(sg_rule):
+ info = {}
+ info.update(sg_rule)
+ from_port = info.pop('from_port')
+ to_port = info.pop('to_port')
+ if isinstance(from_port, int) and isinstance(to_port, int):
+ port_range = {'port_range': "%u:%u" % (from_port, to_port)}
+ elif from_port is None and to_port is None:
+ port_range = {'port_range': ""}
+ else:
+ port_range = {'port_range': "%s:%s" % (from_port, to_port)}
+ info.update(port_range)
+ if 'cidr' in info['ip_range']:
+ info['ip_range'] = info['ip_range']['cidr']
+ else:
+ info['ip_range'] = ''
+ if info['ip_protocol'] is None:
+ info['ip_protocol'] = ''
+ elif info['ip_protocol'].lower() == 'icmp':
+ info['port_range'] = ''
+ group = info.pop('group')
+ if 'name' in group:
+ info['remote_security_group'] = group['name']
+ else:
+ info['remote_security_group'] = ''
+ return info
diff --git a/openstackclient/network/v2/security_group.py b/openstackclient/network/v2/security_group.py
index 62699ffd..64717945 100644
--- a/openstackclient/network/v2/security_group.py
+++ b/openstackclient/network/v2/security_group.py
@@ -14,9 +14,81 @@
"""Security Group action implementations"""
import argparse
+import six
from openstackclient.common import utils
from openstackclient.network import common
+from openstackclient.network import utils as network_utils
+
+
+def _format_network_security_group_rules(sg_rules):
+ # For readability and to align with formatting compute security group
+ # rules, trim keys with caller known (e.g. security group and tenant ID)
+ # or empty values.
+ for sg_rule in sg_rules:
+ empty_keys = [k for k, v in six.iteritems(sg_rule) if not v]
+ for key in empty_keys:
+ sg_rule.pop(key)
+ sg_rule.pop('security_group_id', None)
+ sg_rule.pop('tenant_id', None)
+ return utils.format_list_of_dicts(sg_rules)
+
+
+def _format_compute_security_group_rule(sg_rule):
+ info = network_utils.transform_compute_security_group_rule(sg_rule)
+ # Trim parent security group ID since caller has this information.
+ info.pop('parent_group_id', None)
+ # Trim keys with empty string values.
+ keys_to_trim = [
+ 'ip_protocol',
+ 'ip_range',
+ 'port_range',
+ 'remote_security_group',
+ ]
+ for key in keys_to_trim:
+ if key in info and not info[key]:
+ info.pop(key)
+ return utils.format_dict(info)
+
+
+def _format_compute_security_group_rules(sg_rules):
+ rules = []
+ for sg_rule in sg_rules:
+ rules.append(_format_compute_security_group_rule(sg_rule))
+ return utils.format_list(rules, separator='\n')
+
+
+_formatters_network = {
+ 'security_group_rules': _format_network_security_group_rules,
+}
+
+
+_formatters_compute = {
+ 'rules': _format_compute_security_group_rules,
+}
+
+
+def _get_columns(item):
+ # Build the display columns and a list of the property columns
+ # that need to be mapped (display column name, property name).
+ columns = list(item.keys())
+ property_column_mappings = []
+ if 'security_group_rules' in columns:
+ columns.append('rules')
+ columns.remove('security_group_rules')
+ property_column_mappings.append(('rules', 'security_group_rules'))
+ if 'tenant_id' in columns:
+ columns.append('project_id')
+ columns.remove('tenant_id')
+ property_column_mappings.append(('project_id', 'tenant_id'))
+ display_columns = sorted(columns)
+
+ # Build the property columns and apply any column mappings.
+ property_columns = sorted(columns)
+ for property_column_mapping in property_column_mappings:
+ property_index = property_columns.index(property_column_mapping[0])
+ property_columns[property_index] = property_column_mapping[1]
+ return tuple(display_columns), property_columns
class DeleteSecurityGroup(common.NetworkAndComputeCommand):
@@ -143,3 +215,39 @@ class SetSecurityGroup(common.NetworkAndComputeCommand):
data.name,
data.description,
)
+
+
+class ShowSecurityGroup(common.NetworkAndComputeShowOne):
+ """Display security group details"""
+
+ def update_parser_common(self, parser):
+ parser.add_argument(
+ 'group',
+ metavar='<group>',
+ help='Security group to display (name or ID)',
+ )
+ return parser
+
+ def take_action_network(self, client, parsed_args):
+ obj = client.find_security_group(parsed_args.group,
+ ignore_missing=False)
+ display_columns, property_columns = _get_columns(obj)
+ data = utils.get_item_properties(
+ obj,
+ property_columns,
+ formatters=_formatters_network
+ )
+ return (display_columns, data)
+
+ def take_action_compute(self, client, parsed_args):
+ obj = utils.find_resource(
+ client.security_groups,
+ parsed_args.group,
+ )
+ display_columns, property_columns = _get_columns(obj._info)
+ data = utils.get_dict_properties(
+ obj._info,
+ property_columns,
+ formatters=_formatters_compute
+ )
+ return (display_columns, data)
diff --git a/openstackclient/network/v2/security_group_rule.py b/openstackclient/network/v2/security_group_rule.py
index a61e3233..92f28cce 100644
--- a/openstackclient/network/v2/security_group_rule.py
+++ b/openstackclient/network/v2/security_group_rule.py
@@ -18,38 +18,11 @@ import six
from openstackclient.common import exceptions
from openstackclient.common import utils
from openstackclient.network import common
-
-
-def _xform_security_group_rule(sgroup):
- info = {}
- info.update(sgroup)
- from_port = info.pop('from_port')
- to_port = info.pop('to_port')
- if isinstance(from_port, int) and isinstance(to_port, int):
- port_range = {'port_range': "%u:%u" % (from_port, to_port)}
- elif from_port is None and to_port is None:
- port_range = {'port_range': ""}
- else:
- port_range = {'port_range': "%s:%s" % (from_port, to_port)}
- info.update(port_range)
- if 'cidr' in info['ip_range']:
- info['ip_range'] = info['ip_range']['cidr']
- else:
- info['ip_range'] = ''
- if info['ip_protocol'] is None:
- info['ip_protocol'] = ''
- elif info['ip_protocol'].lower() == 'icmp':
- info['port_range'] = ''
- group = info.pop('group')
- if 'name' in group:
- info['remote_security_group'] = group['name']
- else:
- info['remote_security_group'] = ''
- return info
+from openstackclient.network import utils as network_utils
def _format_security_group_rule_show(obj):
- data = _xform_security_group_rule(obj)
+ data = network_utils.transform_compute_security_group_rule(obj)
return zip(*sorted(six.iteritems(data)))