2019-03-21 11:19:28 -04:00
#!/usr/bin/env python3
2019-10-13 12:11:23 -04:00
# pvc-api.py - PVC HTTP API interface
2019-03-21 11:19:28 -04:00
# Part of the Parallel Virtual Cluster (PVC) system
#
2019-10-13 12:09:51 -04:00
# Copyright (C) 2018-2019 Joshua M. Boniface <joshua@boniface.me>
2019-03-21 11:19:28 -04:00
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <https://www.gnu.org/licenses/>.
#
###############################################################################
import flask
2019-04-12 16:59:26 -04:00
import json
2019-07-06 01:48:45 -04:00
import yaml
import os
2019-03-21 11:19:28 -04:00
2019-07-06 01:48:45 -04:00
import gevent . pywsgi
2019-07-05 13:20:06 -04:00
2019-10-13 12:07:57 -04:00
import api_lib . api as pvcapi
2019-03-21 11:19:28 -04:00
2019-07-06 01:48:45 -04:00
# Parse the configuration file
try :
pvc_config_file = os . environ [ ' PVC_CONFIG_FILE ' ]
except :
print ( ' Error: The " PVC_CONFIG_FILE " environment variable must be set before starting pvc-api. ' )
exit ( 1 )
2019-07-07 15:44:47 -04:00
print ( ' Starting PVC API daemon ' )
2019-07-06 01:48:45 -04:00
# Read in the config
try :
with open ( pvc_config_file , ' r ' ) as cfgfile :
o_config = yaml . load ( cfgfile )
except Exception as e :
print ( ' ERROR: Failed to parse configuration file: {} ' . format ( e ) )
exit ( 1 )
try :
# Create the config object
config = {
2019-07-25 15:42:17 -04:00
' debug ' : o_config [ ' pvc ' ] [ ' debug ' ] ,
2019-07-06 02:35:37 -04:00
' coordinators ' : o_config [ ' pvc ' ] [ ' coordinators ' ] ,
2019-07-06 01:48:45 -04:00
' listen_address ' : o_config [ ' pvc ' ] [ ' api ' ] [ ' listen_address ' ] ,
' listen_port ' : int ( o_config [ ' pvc ' ] [ ' api ' ] [ ' listen_port ' ] ) ,
2019-07-07 00:15:05 -04:00
' auth_enabled ' : o_config [ ' pvc ' ] [ ' api ' ] [ ' authentication ' ] [ ' enabled ' ] ,
' auth_secret_key ' : o_config [ ' pvc ' ] [ ' api ' ] [ ' authentication ' ] [ ' secret_key ' ] ,
' auth_tokens ' : o_config [ ' pvc ' ] [ ' api ' ] [ ' authentication ' ] [ ' tokens ' ] ,
2019-07-06 23:28:29 -04:00
' ssl_enabled ' : o_config [ ' pvc ' ] [ ' api ' ] [ ' ssl ' ] [ ' enabled ' ] ,
' ssl_key_file ' : o_config [ ' pvc ' ] [ ' api ' ] [ ' ssl ' ] [ ' key_file ' ] ,
' ssl_cert_file ' : o_config [ ' pvc ' ] [ ' api ' ] [ ' ssl ' ] [ ' cert_file ' ]
2019-07-06 01:48:45 -04:00
}
2019-07-06 23:28:29 -04:00
2019-07-06 01:48:45 -04:00
# Set the config object in the pvcapi namespace
pvcapi . config = config
except Exception as e :
print ( ' ERROR: {} . ' . format ( e ) )
exit ( 1 )
2019-07-25 15:42:17 -04:00
api = flask . Flask ( __name__ )
if config [ ' debug ' ] :
api . config [ ' DEBUG ' ] = True
2019-07-07 00:15:05 -04:00
if config [ ' auth_enabled ' ] :
api . config [ " SECRET_KEY " ] = config [ ' auth_secret_key ' ]
2019-07-06 23:28:29 -04:00
2019-07-28 23:12:53 -04:00
# Authentication decorator function
2019-07-06 01:48:45 -04:00
def authenticator ( function ) :
def authenticate ( * args , * * kwargs ) :
2019-07-28 23:12:53 -04:00
# No authentication required
2019-07-07 00:15:05 -04:00
if not config [ ' auth_enabled ' ] :
2019-07-07 00:08:02 -04:00
return function ( * args , * * kwargs )
2019-07-28 23:12:53 -04:00
# Session-based authentication
if ' token ' in flask . session :
return function ( * args , * * kwargs )
# Key header-based authentication
if ' X-Api-Key ' in flask . request . headers :
if any ( token for token in secret_tokens if flask . request . headers . get ( ' X-Api-Key ' ) == token ) :
2019-07-07 00:08:02 -04:00
return function ( * args , * * kwargs )
2019-07-28 23:12:53 -04:00
else :
return " X-Api-Key Authentication failed \n " , 401
2019-07-07 00:08:02 -04:00
2019-07-28 23:12:53 -04:00
# All authentications failed
return " X-Api-Key Authentication required \n " , 401
2019-07-07 00:08:02 -04:00
2019-07-06 01:48:45 -04:00
authenticate . __name__ = function . __name__
return authenticate
2019-03-21 11:19:28 -04:00
2019-07-05 14:11:01 -04:00
@api.route ( ' /api/v1 ' , methods = [ ' GET ' ] )
2019-03-21 11:19:28 -04:00
def api_root ( ) :
2019-07-06 01:48:45 -04:00
return flask . jsonify ( { " message " : " PVC API version 1 " } ) , 209
2019-03-21 11:19:28 -04:00
2019-07-07 00:08:02 -04:00
@api.route ( ' /api/v1/auth/login ' , methods = [ ' GET ' , ' POST ' ] )
def api_auth_login ( ) :
2019-07-07 00:15:05 -04:00
# Just return a 200 if auth is disabled
if not config [ ' auth_enabled ' ] :
return flask . jsonify ( { " message " : " Authentication is disabled. " } ) , 200
2019-07-28 23:12:53 -04:00
if flask . request . method == ' GET ' :
return '''
< form method = " post " >
< p >
Enter your authentication token :
< input type = text name = token style = ' width:24em ' >
< input type = submit value = Login >
< / p >
< / form >
'''
2019-07-07 00:08:02 -04:00
if flask . request . method == ' POST ' :
2019-07-07 00:15:05 -04:00
if any ( token for token in config [ ' auth_tokens ' ] if flask . request . values [ ' token ' ] in token [ ' token ' ] ) :
2019-07-07 00:08:02 -04:00
flask . session [ ' token ' ] = flask . request . form [ ' token ' ]
return flask . redirect ( flask . url_for ( ' api_root ' ) )
else :
return flask . jsonify ( { " message " : " Authentication failed " } ) , 401
@api.route ( ' /api/v1/auth/logout ' , methods = [ ' GET ' , ' POST ' ] )
def api_auth_logout ( ) :
2019-07-07 00:15:05 -04:00
# Just return a 200 if auth is disabled
if not config [ ' auth_enabled ' ] :
return flask . jsonify ( { " message " : " Authentication is disabled. " } ) , 200
2019-07-07 00:08:02 -04:00
# remove the username from the session if it's there
flask . session . pop ( ' token ' , None )
return flask . redirect ( flask . url_for ( ' api_root ' ) )
2019-07-05 01:19:39 -04:00
#
# Node endpoints
#
2019-07-05 14:11:01 -04:00
@api.route ( ' /api/v1/node ' , methods = [ ' GET ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_node_root ( ) :
2019-07-05 18:24:14 -04:00
# Get name limit
if ' limit ' in flask . request . values :
limit = flask . request . values [ ' limit ' ]
else :
limit = None
2019-07-05 13:20:06 -04:00
2019-07-05 18:24:14 -04:00
return pvcapi . node_list ( limit )
@api.route ( ' /api/v1/node/<node> ' , methods = [ ' GET ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_node_element ( node ) :
2019-07-05 18:24:14 -04:00
# Same as specifying /node?limit=NODE
return pvcapi . node_list ( node )
2019-03-21 11:19:28 -04:00
2019-07-28 23:31:59 -04:00
@api.route ( ' /api/v1/node/<node>/daemon-state ' , methods = [ ' GET ' ] )
@authenticator
def api_node_daemon_state ( node ) :
if flask . request . method == ' GET ' :
return pvcapi . node_daemon_state ( node )
2019-03-21 11:19:28 -04:00
2019-07-25 15:42:17 -04:00
@api.route ( ' /api/v1/node/<node>/coordinator-state ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-25 15:42:17 -04:00
def api_node_coordinator_state ( node ) :
if flask . request . method == ' GET ' :
2019-07-28 23:31:59 -04:00
return pvcapi . node_coordinator_state ( node )
2019-04-12 16:59:26 -04:00
2019-07-25 15:42:17 -04:00
if flask . request . method == ' POST ' :
2019-07-25 16:50:17 -04:00
if not ' coordinator-state ' in flask . request . values :
2019-07-25 15:42:17 -04:00
flask . abort ( 400 )
new_state = flask . request . values [ ' coordinator-state ' ]
if new_state == ' primary ' :
return pvcapi . node_primary ( node )
if new_state == ' secondary ' :
return pvcapi . node_secondary ( node )
flask . abort ( 400 )
@api.route ( ' /api/v1/node/<node>/domain-state ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-25 15:42:17 -04:00
def api_node_domain_state ( node ) :
if flask . request . method == ' GET ' :
2019-07-28 23:31:59 -04:00
return pvcapi . node_domain_state ( node )
2019-07-25 15:42:17 -04:00
if flask . request . method == ' POST ' :
2019-07-25 16:50:17 -04:00
if not ' domain-state ' in flask . request . values :
2019-07-25 15:42:17 -04:00
flask . abort ( 400 )
new_state = flask . request . values [ ' domain-state ' ]
if new_state == ' ready ' :
return pvcapi . node_ready ( node )
if new_state == ' flush ' :
return pvcapi . node_flush ( node )
flask . abort ( 400 )
2019-04-12 16:59:26 -04:00
2019-07-05 13:20:06 -04:00
#
# VM endpoints
#
2019-07-25 15:42:17 -04:00
@api.route ( ' /api/v1/vm ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_vm_root ( ) :
2019-07-25 15:42:17 -04:00
if flask . request . method == ' GET ' :
# Get node limit
if ' node ' in flask . request . values :
node = flask . request . values [ ' node ' ]
else :
node = None
2019-07-26 11:00:11 -04:00
2019-07-25 15:42:17 -04:00
# Get state limit
if ' state ' in flask . request . values :
state = flask . request . values [ ' state ' ]
else :
state = None
2019-07-26 11:00:11 -04:00
2019-07-25 15:42:17 -04:00
# Get name limit
if ' limit ' in flask . request . values :
limit = flask . request . values [ ' limit ' ]
else :
limit = None
2019-07-26 11:00:11 -04:00
2019-07-25 15:42:17 -04:00
return pvcapi . vm_list ( node , state , limit )
2019-07-05 13:20:06 -04:00
2019-07-25 15:42:17 -04:00
if flask . request . method == ' POST ' :
# Get XML data
if ' xml ' in flask . request . values :
libvirt_xml = flask . request . values [ ' xml ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A Libvirt XML document must be specified. " } ) , 400
2019-07-26 11:00:11 -04:00
2019-07-25 15:42:17 -04:00
# Get node name
if ' node ' in flask . request . values :
node = flask . request . values [ ' node ' ]
else :
node = None
2019-07-26 11:00:11 -04:00
2019-10-12 01:17:39 -04:00
# Set target limit metadata
if ' limit ' in flask . request . values :
limit = flask . request . values [ ' limit ' ]
else :
limit = None
# Set target selector metadata
2019-07-25 15:42:17 -04:00
if ' selector ' in flask . request . values :
selector = flask . request . values [ ' selector ' ]
else :
2019-10-12 01:17:39 -04:00
selector = ' mem '
# Set target autostart metadata
if ' autostart ' in flask . request . values :
autostart = True
else :
autostart = False
2019-07-26 11:00:11 -04:00
2019-07-25 15:42:17 -04:00
return pvcapi . vm_define ( vm , libvirt_xml , node , selector )
2019-07-05 13:20:06 -04:00
2019-07-25 15:42:17 -04:00
@api.route ( ' /api/v1/vm/<vm> ' , methods = [ ' GET ' , ' POST ' , ' PUT ' , ' DELETE ' ] )
@authenticator
2019-07-26 11:00:11 -04:00
def api_vm_element ( vm ) :
2019-07-25 15:42:17 -04:00
if flask . request . method == ' GET ' :
# Same as specifying /vm?limit=VM
return pvcapi . vm_list ( None , None , vm , is_fuzzy = False )
2019-07-04 12:56:17 -04:00
2019-07-25 15:42:17 -04:00
if flask . request . method == ' POST ' :
2019-10-12 01:17:39 -04:00
# Set target limit metadata
if ' limit ' in flask . request . values :
limit = flask . request . values [ ' limit ' ]
else :
limit = None
# Set target selector metadata
if ' selector ' in flask . request . values :
selector = flask . request . values [ ' selector ' ]
else :
selector = None
# Set target autostart metadata
if ' no-autostart ' in flask . request . values :
autostart = False
elif ' autostart ' in flask . request . values :
autostart = True
else :
autostart = None
return pvcapi . vm_meta ( vm , limit , selector , autostart )
2019-07-25 15:42:17 -04:00
if flask . request . method == ' PUT ' :
libvirt_xml = flask . request . data
2019-07-26 11:00:11 -04:00
2019-07-25 15:42:17 -04:00
if ' restart ' in flask . request . values and flask . request . values [ ' restart ' ] :
flag_restart = True
else :
flag_restart = False
2019-07-26 11:00:11 -04:00
2019-07-25 15:42:17 -04:00
return pvcapi . vm_modify ( vm , flag_restart , libvirt_xml )
2019-04-12 16:59:26 -04:00
2019-07-25 15:42:17 -04:00
if flask . request . method == ' DELETE ' :
if ' delete_disks ' in flask . request . values and flask . request . values [ ' delete_disks ' ] :
return pvcapi . vm_remove ( vm )
else :
return pvcapi . vm_undefine ( vm )
2019-07-05 18:24:14 -04:00
2019-07-25 15:42:17 -04:00
@api.route ( ' /api/v1/vm/<vm>/state ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-25 15:42:17 -04:00
def api_vm_state ( vm ) :
if flask . request . method == ' GET ' :
2019-08-07 14:24:16 -04:00
return pvcapi . vm_state ( vm )
2019-07-05 18:24:14 -04:00
2019-07-25 15:42:17 -04:00
if flask . request . method == ' POST ' :
2019-07-25 16:50:17 -04:00
if not ' state ' in flask . request . values :
2019-07-25 15:42:17 -04:00
flask . abort ( 400 )
new_state = flask . request . values [ ' state ' ]
if new_state == ' start ' :
return pvcapi . vm_start ( vm )
if new_state == ' shutdown ' :
return pvcapi . vm_shutdown ( vm )
if new_state == ' stop ' :
return pvcapi . vm_stop ( vm )
if new_state == ' restart ' :
return pvcapi . vm_restart ( vm )
flask . abort ( 400 )
@api.route ( ' /api/v1/vm/<vm>/node ' , methods = [ ' GET ' , ' POST ' ] )
@authenticator
def api_vm_node ( vm ) :
if flask . request . method == ' GET ' :
2019-08-07 14:24:16 -04:00
return pvcapi . vm_node ( vm )
2019-07-26 11:00:11 -04:00
2019-07-25 15:42:17 -04:00
if flask . request . method == ' POST ' :
if ' action ' in flask . request . values :
action = flask . request . values [ ' action ' ]
else :
flask . abort ( 400 )
2019-07-26 11:00:11 -04:00
2019-07-25 15:42:17 -04:00
# Get node name
if ' node ' in flask . request . values :
node = flask . request . values [ ' node ' ]
else :
node = None
# Get permanent flag
if ' permanent ' in flask . request . values and flask . request . values [ ' permanent ' ] :
flag_permanent = True
else :
flag_permanent = False
# Get force flag
if ' force ' in flask . request . values and flask . request . values [ ' force ' ] :
flag_force = True
else :
flag_force = False
2019-07-05 18:24:14 -04:00
2019-07-25 15:42:17 -04:00
# Check if VM is presently migrated
is_migrated = pvcapi . vm_is_migrated ( vm )
2019-07-05 01:19:39 -04:00
2019-07-25 15:42:17 -04:00
if action == ' migrate ' and not flag_permanent :
2019-10-12 01:45:44 -04:00
return pvcapi . vm_migrate ( vm , node , flag_force )
2019-07-25 15:42:17 -04:00
if action == ' migrate ' and flag_permanent :
2019-10-12 01:45:44 -04:00
return pvcapi . vm_move ( vm , node )
2019-07-25 15:42:17 -04:00
if action == ' unmigrate ' and is_migrated :
return pvcapi . vm_unmigrate ( vm )
2019-07-05 18:24:14 -04:00
2019-07-25 15:42:17 -04:00
flask . abort ( 400 )
2019-07-05 18:24:14 -04:00
2019-08-07 14:24:16 -04:00
@api.route ( ' /api/v1/vm/<vm>/locks ' , methods = [ ' GET ' , ' POST ' ] )
@authenticator
def api_vm_locks ( vm ) :
if flask . request . method == ' GET ' :
return " Not implemented " , 400
if flask . request . method == ' POST ' :
return pvcapi . vm_flush_locks ( vm )
2019-07-05 01:19:39 -04:00
2019-07-05 13:20:06 -04:00
#
# Network endpoints
#
2019-07-26 09:41:17 -04:00
@api.route ( ' /api/v1/network ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_net_root ( ) :
2019-07-26 09:41:17 -04:00
if flask . request . method == ' GET ' :
# Get name limit
if ' limit ' in flask . request . values :
limit = flask . request . values [ ' limit ' ]
else :
limit = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
return pvcapi . net_list ( limit )
2019-07-04 12:56:17 -04:00
2019-07-26 09:41:17 -04:00
if flask . request . method == ' POST ' :
# Get network VNI
if ' vni ' in flask . request . values :
vni = flask . request . values [ ' vni ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A VNI must be specified for the virtual network. " } ) , 520
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get network description
if ' description ' in flask . request . values :
description = flask . request . values [ ' vni ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A VNI must be specified for the virtual network. " } ) , 520
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get network type
if ' nettype ' in flask . request . values :
nettype = flask . request . values [ ' nettype ' ]
if not ' managed ' in nettype and not ' bridged ' in nettype :
return flask . jsonify ( { " message " : " ERROR: A valid nettype must be specified: ' managed ' or ' bridged ' . " } ) , 520
else :
return flask . jsonify ( { " message " : " ERROR: A nettype must be specified for the virtual network. " } ) , 520
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get network domain
if ' domain ' in flask . request . values :
domain = flask . request . values [ ' domain ' ]
else :
domain = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv4 network
if ' ip4_network ' in flask . request . values :
ip4_network = flask . request . values [ ' ip4_network ' ]
else :
ip4_network = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv4 gateway
if ' ip4_gateway ' in flask . request . values :
ip4_gateway = flask . request . values [ ' ip4_gateway ' ]
else :
ip4_gateway = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv6 network
if ' ip6_network ' in flask . request . values :
ip6_network = flask . request . values [ ' ip6_network ' ]
else :
ip6_network = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv6 gateway
if ' ip6_gateway ' in flask . request . values :
ip6_gateway = flask . request . values [ ' ip6_gateway ' ]
else :
ip6_gateway = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv4 DHCP flag
if ' dhcp4 ' in flask . request . values and flask . request . values [ ' dhcp4 ' ] :
dhcp4_flag = True
else :
dhcp4_flag = False
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv4 DHCP start
if ' dhcp4_start ' in flask . request . values :
dhcp4_start = flask . request . values [ ' dhcp4_start ' ]
else :
dhcp4_start = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv4 DHCP end
if ' dhcp4_end ' in flask . request . values :
dhcp4_end = flask . request . values [ ' dhcp4_end ' ]
else :
dhcp4_end = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
return pvcapi . net_add ( vni , description , nettype , domain ,
ip4_network , ip4_gateway , ip6_network , ip6_gateway ,
dhcp4_flag , dhcp4_start , dhcp4_end )
2019-07-04 12:56:17 -04:00
2019-07-26 09:41:17 -04:00
@api.route ( ' /api/v1/network/<network> ' , methods = [ ' GET ' , ' PUT ' , ' DELETE ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_net_element ( network ) :
2019-07-05 18:24:14 -04:00
# Same as specifying /network?limit=NETWORK
2019-07-26 09:41:17 -04:00
if flask . request . method == ' GET ' :
return pvcapi . net_list ( network )
2019-07-05 21:39:04 -04:00
2019-07-26 09:41:17 -04:00
if flask . request . method == ' PUT ' :
# Get network description
if ' description ' in flask . request . values :
description = flask . request . values [ ' description ' ]
else :
description = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get network domain
if ' domain ' in flask . request . values :
domain = flask . request . values [ ' domain ' ]
else :
domain = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv4 network
if ' ip4_network ' in flask . request . values :
ip4_network = flask . request . values [ ' ip4_network ' ]
else :
ip4_network = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv4 gateway
if ' ip4_gateway ' in flask . request . values :
ip4_gateway = flask . request . values [ ' ip4_gateway ' ]
else :
ip4_gateway = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv6 network
if ' ip6_network ' in flask . request . values :
ip6_network = flask . request . values [ ' ip6_network ' ]
else :
ip6_network = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv6 gateway
if ' ip6_gateway ' in flask . request . values :
ip6_gateway = flask . request . values [ ' ip6_gateway ' ]
else :
ip6_gateway = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv4 DHCP flag
if ' dhcp4 ' in flask . request . values and flask . request . values [ ' dhcp4 ' ] :
dhcp4_flag = True
else :
dhcp4_flag = False
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv4 DHCP start
if ' dhcp4_start ' in flask . request . values :
dhcp4_start = flask . request . values [ ' dhcp4_start ' ]
else :
dhcp4_start = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get ipv4 DHCP end
if ' dhcp4_end ' in flask . request . values :
dhcp4_end = flask . request . values [ ' dhcp4_end ' ]
else :
dhcp4_end = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
return pvcapi . net_modify ( network , description , domain ,
ip4_network , ip4_gateway ,
ip6_network , ip6_gateway ,
dhcp4_flag , dhcp4_start , dhcp4_end )
2019-07-05 01:19:39 -04:00
2019-07-26 09:41:17 -04:00
if flask . request . method == ' DELETE ' :
return pvcapi . net_remove ( network )
2019-07-05 01:19:39 -04:00
2019-07-26 09:41:17 -04:00
@api.route ( ' /api/v1/network/<network>/lease ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_net_lease_root ( network ) :
2019-07-26 09:41:17 -04:00
if flask . request . method == ' GET ' :
# Get name limit
if ' limit ' in flask . request . values :
limit = flask . request . values [ ' limit ' ]
else :
limit = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get static-only flag
if ' static ' in flask . request . values and flask . request . values [ ' static ' ] :
flag_static = True
else :
flag_static = False
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
return pvcapi . net_dhcp_list ( network , limit . flag_static )
2019-07-05 01:19:39 -04:00
2019-07-26 09:41:17 -04:00
if flask . request . method == ' POST ' :
# Get lease macaddr
if ' macaddress ' in flask . request . values :
macaddress = flask . request . values [ ' macaddress ' ]
else :
return flask . jsonify ( { " message " : " ERROR: An IP address must be specified for the lease. " } ) , 400
# Get lease ipaddress
if ' ipaddress ' in flask . request . values :
ipaddress = flask . request . values [ ' ipaddress ' ]
else :
return flask . jsonify ( { " message " : " ERROR: An IP address must be specified for the lease. " } ) , 400
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get lease hostname
if ' hostname ' in flask . request . values :
hostname = flask . request . values [ ' hostname ' ]
else :
hostname = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
return pvcapi . net_dhcp_add ( network , ipaddress , lease , hostname )
2019-07-05 18:24:14 -04:00
2019-07-26 09:41:17 -04:00
@api.route ( ' /api/v1/network/<network>/lease/<lease> ' , methods = [ ' GET ' , ' DELETE ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_net_lease_element ( network , lease ) :
2019-07-26 09:41:17 -04:00
if flask . request . method == ' GET ' :
# Same as specifying /network?limit=NETWORK
return pvcapi . net_dhcp_list ( network , lease , False )
2019-07-05 01:19:39 -04:00
2019-07-26 09:41:17 -04:00
if flask . request . method == ' DELETE ' :
return pvcapi . net_dhcp_remove ( network , lease )
2019-07-05 01:19:39 -04:00
2019-07-26 09:41:17 -04:00
@api.route ( ' /api/v1/network/<network>/acl ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_net_acl_root ( network ) :
2019-07-26 09:41:17 -04:00
if flask . request . method == ' GET ' :
# Get name limit
if ' limit ' in flask . request . values :
limit = flask . request . values [ ' limit ' ]
else :
limit = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get direction limit
if ' direction ' in flask . request . values :
direction = flask . request . values [ ' direction ' ]
if not ' in ' in direction and not ' out ' in direction :
return flash . jsonify ( { " message " : " ERROR: Direction must be either ' in ' or ' out ' ; for both, do not specify a direction. " } ) , 400
else :
direction = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
return pvcapi . net_acl_list ( network , limit , direction )
2019-07-05 01:19:39 -04:00
2019-07-26 09:41:17 -04:00
if flask . request . method == ' POST ' :
# Get ACL description
if ' description ' in flask . request . values :
description = flask . request . values [ ' description ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A description must be provided. " } ) , 400
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get rule direction
if ' direction ' in flask . request . values :
direction = flask . request . values [ ' limit ' ]
if not ' in ' in direction and not ' out ' in direction :
return flask . jsonify ( { " message " : " ERROR: Direction must be either ' in ' or ' out ' . " } ) , 400
else :
return flask . jsonify ( { " message " : " ERROR: A direction must be specified for the ACL. " } ) , 400
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get rule data
if ' rule ' in flask . request . values :
rule = flask . request . values [ ' rule ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A valid NFT rule line must be specified for the ACL. " } ) , 400
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
# Get order value
if ' order ' in flask . request . values :
order = flask . request . values [ ' order ' ]
else :
order = None
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
return pvcapi . net_acl_add ( network , direction , acl , rule , order )
2019-07-05 01:19:39 -04:00
2019-07-26 09:41:17 -04:00
@api.route ( ' /api/v1/network/<network>/acl/<acl> ' , methods = [ ' GET ' , ' DELETE ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_net_acl_element ( network , acl ) :
2019-07-26 09:41:17 -04:00
if flask . request . method == ' GET ' :
# Same as specifying /network?limit=NETWORK
return pvcapi . net_acl_list ( network , acl , None )
2019-07-05 21:39:04 -04:00
2019-07-26 09:41:17 -04:00
if flask . request . method == ' DELETE ' :
# Get rule direction
if ' direction ' in flask . request . values :
direction = flask . request . values [ ' limit ' ]
if not ' in ' in direction and not ' out ' in direction :
return flask . jsonify ( { " message " : " ERROR: Direction must be either ' in ' or ' out ' . " } ) , 400
else :
return flask . jsonify ( { " message " : " ERROR: A direction must be specified for the ACL. " } ) , 400
2019-07-26 11:00:11 -04:00
2019-07-26 09:41:17 -04:00
return pvcapi . net_acl_remove ( network , direction , acl )
2019-07-05 13:20:06 -04:00
2019-07-05 01:19:39 -04:00
#
2019-07-10 15:14:17 -04:00
# Storage (Ceph) endpoints
2019-07-05 01:19:39 -04:00
#
2019-07-10 15:14:17 -04:00
# Note: The prefix `/storage` allows future potential storage subsystems.
# Since Ceph is the only section not abstracted by PVC directly
# (i.e. it references Ceph-specific concepts), this makes more
# sense in the long-term.
#
@api.route ( ' /api/v1/storage ' , methods = [ ' GET ' ] )
def api_storage ( ) :
return flask . jsonify ( { " message " : " Manage the storage of the PVC cluster. " } ) , 200
@api.route ( ' /api/v1/storage/ceph ' , methods = [ ' GET ' ] )
@api.route ( ' /api/v1/storage/ceph/status ' , methods = [ ' GET ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-08 10:56:33 -04:00
def api_ceph_status ( ) :
2019-07-05 14:11:01 -04:00
return pvcapi . ceph_status ( )
2019-07-05 01:19:39 -04:00
2019-07-10 15:14:17 -04:00
@api.route ( ' /api/v1/storage/ceph/df ' , methods = [ ' GET ' ] )
2019-07-08 10:56:33 -04:00
@authenticator
def api_ceph_radosdf ( ) :
return pvcapi . ceph_radosdf ( )
2019-07-26 11:23:19 -04:00
@api.route ( ' /api/v1/storage/ceph/cluster-option ' , methods = [ ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_ceph_cluster_option ( ) :
if flask . request . method == ' POST ' :
# Get action
if ' action ' in flask . request . values :
action = flask . request . values [ ' action ' ]
if not ' set ' in action and not ' unset ' in action :
return flask . jsonify ( { " message " : " ERROR: Action must be one of: set, unset " } ) , 400
else :
return flask . jsonify ( { " message " : " ERROR: An action must be specified. " } ) , 400
# Get option
if ' option ' in flask . request . values :
option = flask . request . values [ ' option ' ]
else :
return flask . jsonify ( { " message " : " ERROR: An option must be specified. " } ) , 400
2019-07-05 22:14:45 -04:00
2019-07-26 11:00:11 -04:00
if action == ' set ' :
return pvcapi . ceph_osd_set ( option )
if action == ' unset ' :
return pvcapi . ceph_osd_unset ( option )
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
@api.route ( ' /api/v1/storage/ceph/osd ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_ceph_osd_root ( ) :
if flask . request . method == ' GET ' :
# Get name limit
if ' limit ' in flask . request . values :
limit = flask . request . values [ ' limit ' ]
else :
limit = None
2019-07-05 22:14:45 -04:00
2019-07-26 11:00:11 -04:00
return pvcapi . ceph_osd_list ( limit )
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
if flask . request . method == ' POST ' :
# Get OSD node
if ' node ' in flask . request . values :
node = flask . request . values [ ' node ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A node must be specified. " } ) , 400
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
# Get OSD device
if ' device ' in flask . request . values :
device = flask . request . values [ ' device ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A block device must be specified. " } ) , 400
2019-07-05 22:14:45 -04:00
2019-07-26 11:00:11 -04:00
# Get OSD weight
if ' weight ' in flask . request . values :
weight = flask . request . values [ ' weight ' ]
else :
return flask . jsonify ( { " message " : " ERROR: An OSD weight must be specified. " } ) , 400
2019-07-05 22:14:45 -04:00
2019-07-26 11:00:11 -04:00
return pvcapi . ceph_osd_add ( node , device , weight )
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
@api.route ( ' /api/v1/storage/ceph/osd/<osd> ' , methods = [ ' GET ' , ' DELETE ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_ceph_osd_element ( osd ) :
if flask . request . method == ' GET ' :
# Same as specifying /osd?limit=OSD
return pvcapi . ceph_osd_list ( osd )
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
if flask . request . method == ' DELETE ' :
# Verify yes-i-really-mean-it flag
if not ' yes_i_really_mean_it ' in flask . request . values :
return flask . jsonify ( { " message " : " ERROR: This command can have unintended consequences and should not be automated; if you ' re sure you know what you ' re doing, resend with the argument ' yes_i_really_mean_it ' . " } ) , 400
2019-07-05 18:24:14 -04:00
2019-07-26 11:00:11 -04:00
return pvcapi . ceph_osd_remove ( osd )
2019-03-21 11:19:28 -04:00
2019-07-26 11:00:11 -04:00
@api.route ( ' /api/v1/storage/ceph/osd/<osd>/state ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_ceph_osd_state ( osd ) :
if flask . request . method == ' GET ' :
2019-07-26 11:23:19 -04:00
return pvcapi . ceph_osd_state ( osd )
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
if flask . request . method == ' POST ' :
if ' state ' in flask . request . values :
state = flask . request . values [ ' state ' ]
if not ' in ' in state and not ' out ' in state :
return flask . jsonify ( { " message " : " ERROR: State must be one of: in, out. " } ) , 400
else :
return flask . jsonify ( { " message " : " ERROR: A state must be specified. " } ) , 400
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
if state == ' in ' :
return pvcapi . ceph_osd_in ( osd )
if state == ' out ' :
return pvcapi . ceph_osd_out ( osd )
2019-07-05 18:24:14 -04:00
2019-07-26 11:00:11 -04:00
@api.route ( ' /api/v1/storage/ceph/pool ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_ceph_pool_root ( ) :
if flask . request . method == ' GET ' :
# Get name limit
if ' limit ' in flask . request . values :
limit = flask . request . values [ ' limit ' ]
else :
limit = None
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
return pvcapi . ceph_pool_list ( limit )
2019-07-05 22:14:45 -04:00
2019-07-26 11:00:11 -04:00
if flask . request . method == ' POST ' :
# Get pool name
if ' pool ' in flask . request . values :
pool = flask . request . values [ ' pool ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A pool name must be specified. " } ) , 400
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
# Get placement groups
if ' pgs ' in flask . request . values :
pgs = flask . request . values [ ' pgs ' ]
else :
# We default to a very small number; DOCUMENT THIS
pgs = 128
2019-07-26 15:10:47 -04:00
2019-08-23 14:12:15 -04:00
# Get replication configuration
if ' replcfg ' in flask . request . values :
replcfg = flask . request . values [ ' replcfg ' ]
else :
# We default to copies=3,mincopies=2
replcfg = ' copies=3,mincopies=2 '
2019-07-26 11:00:11 -04:00
return pvcapi . ceph_pool_add ( pool , pgs )
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
@api.route ( ' /api/v1/storage/ceph/pool/<pool> ' , methods = [ ' GET ' , ' DELETE ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_ceph_pool_element ( pool ) :
if flask . request . method == ' GET ' :
# Same as specifying /pool?limit=POOL
return pvcapi . ceph_pool_list ( pool )
2019-07-05 22:14:45 -04:00
2019-07-26 11:00:11 -04:00
if flask . request . method == ' DELETE ' :
# Verify yes-i-really-mean-it flag
if not ' yes_i_really_mean_it ' in flask . request . values :
return flask . jsonify ( { " message " : " ERROR: This command can have unintended consequences and should not be automated; if you ' re sure you know what you ' re doing, resend with the argument ' yes_i_really_mean_it ' . " } ) , 400
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
return pvcapi . ceph_pool_remove ( pool )
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
@api.route ( ' /api/v1/storage/ceph/volume ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_ceph_volume_root ( ) :
if flask . request . method == ' GET ' :
# Get pool limit
if ' pool ' in flask . request . values :
pool = flask . request . values [ ' pool ' ]
else :
pool = None
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
# Get name limit
if ' limit ' in flask . request . values :
limit = flask . request . values [ ' limit ' ]
else :
limit = None
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
return pvcapi . ceph_volume_list ( pool , limit )
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
if flask . request . method == ' POST ' :
# Get volume name
if ' volume ' in flask . request . values :
volume = flask . request . values [ ' volume ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A volume name must be specified. " } ) , 400
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
# Get volume pool
if ' pool ' in flask . request . values :
pool = flask . request . values [ ' pool ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A pool name must be spcified. " } ) , 400
2019-07-26 15:10:47 -04:00
2019-10-10 14:37:35 -04:00
# Get source_volume
if ' source_volume ' in flask . request . values :
source_volume = flask . request . values [ ' source_volume ' ]
else :
source_volume = None
2019-07-26 11:00:11 -04:00
# Get volume size
if ' size ' in flask . request . values :
size = flask . request . values [ ' size ' ]
2019-10-10 14:37:35 -04:00
elif source_volume :
# We ignore size if we're cloning a volume
size = None
2019-07-26 11:00:11 -04:00
else :
return flask . jsonify ( { " message " : " ERROR: A volume size in bytes (or with an M/G/T suffix) must be specified. " } ) , 400
2019-07-26 15:10:47 -04:00
2019-10-10 14:37:35 -04:00
if source_volume :
return pvcapi . ceph_volume_clone ( pool , volume , source_volume )
else :
return pvcapi . ceph_volume_add ( pool , volume , size )
2019-07-05 18:24:14 -04:00
2019-07-26 11:23:19 -04:00
@api.route ( ' /api/v1/storage/ceph/volume/<pool>/<volume> ' , methods = [ ' GET ' , ' PUT ' , ' DELETE ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_ceph_volume_element ( pool , volume ) :
if flask . request . method == ' GET ' :
# Same as specifying /volume?limit=VOLUME
return pvcapi . ceph_volume_list ( pool , volume )
2019-07-05 01:19:39 -04:00
2019-07-26 11:23:19 -04:00
if flask . request . method == ' PUT ' :
2019-07-26 14:24:22 -04:00
if ' size ' in flask . request . values :
size = flask . request . values [ ' size ' ]
if ' name ' in flask . request . values :
name = flask . request . values [ ' name ' ]
if size and not name :
2019-07-26 15:10:47 -04:00
return pvcapi . ceph_volume_resize ( pool , volume , size )
2019-07-26 14:24:22 -04:00
if name and not size :
return pvcapi . ceph_volume_rename ( pool , volume , name )
return flask . jsonify ( { " message " : " ERROR: No name or size specified, or both specified; not changing anything. " } ) , 400
2019-07-26 11:23:19 -04:00
2019-07-26 11:00:11 -04:00
if flask . request . method == ' DELETE ' :
return pvcapi . ceph_volume_remove ( pool , volume )
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
@api.route ( ' /api/v1/storage/ceph/volume/snapshot ' , methods = [ ' GET ' , ' POST ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_ceph_volume_snapshot_root ( ) :
if flask . request . method == ' GET ' :
# Get pool limit
if ' pool ' in flask . request . values :
pool = flask . request . values [ ' pool ' ]
else :
pool = None
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
# Get volume limit
if ' volume ' in flask . request . values :
volume = flask . request . values [ ' volume ' ]
else :
volume = None
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
# Get name limit
if ' limit ' in flask . request . values :
limit = flask . request . values [ ' limit ' ]
else :
limit = None
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
return pvcapi . ceph_volume_snapshot_list ( pool , volume , limit )
2019-07-05 01:19:39 -04:00
2019-07-26 11:00:11 -04:00
if flask . request . method == ' POST ' :
# Get snapshot name
if ' snapshot ' in flask . request . values :
snapshot = flask . request . values [ ' snapshot ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A snapshot name must be specified. " } ) , 400
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
# Get volume name
if ' volume ' in flask . request . values :
volume = flask . request . values [ ' volume ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A volume name must be specified. " } ) , 400
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
# Get volume pool
if ' pool ' in flask . request . values :
pool = flask . request . values [ ' pool ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A pool name must be spcified. " } ) , 400
2019-07-26 15:10:47 -04:00
2019-07-26 11:00:11 -04:00
return pvcapi . ceph_volume_snapshot_add ( pool , volume , snapshot )
2019-07-05 01:19:39 -04:00
2019-07-05 18:24:14 -04:00
2019-07-26 11:23:19 -04:00
@api.route ( ' /api/v1/storage/ceph/volume/snapshot/<pool>/<volume>/<snapshot> ' , methods = [ ' GET ' , ' PUT ' , ' DELETE ' ] )
2019-07-06 01:48:45 -04:00
@authenticator
2019-07-26 11:00:11 -04:00
def api_ceph_volume_snapshot_element ( pool , volume , snapshot ) :
if flask . request . method == ' GET ' :
# Same as specifying /snapshot?limit=VOLUME
return pvcapi . ceph_volume_snapshot_list ( pool , volume , snapshot )
2019-07-05 01:19:39 -04:00
2019-07-26 11:23:19 -04:00
if flask . request . method == ' PUT ' :
2019-07-28 23:00:35 -04:00
if ' name ' in flask . request . values :
name = flask . request . values [ ' name ' ]
else :
return flask . jsonify ( { " message " : " ERROR: A new name must be specified. " } ) , 400
return pvcapi . ceph_volume_snapshot_rename ( pool , volume , snapshot , name )
2019-07-26 11:23:19 -04:00
2019-07-26 11:00:11 -04:00
if flask . request . method == ' DELETE ' :
return pvcapi . ceph_volume_snapshot_remove ( pool , volume , snapshot )
2019-07-05 01:19:39 -04:00
#
# Entrypoint
#
2019-07-25 15:42:17 -04:00
if config [ ' debug ' ] :
2019-10-13 12:15:54 -04:00
# Run in Flask standard mode
2019-07-25 15:42:17 -04:00
api . run ( config [ ' listen_address ' ] , config [ ' listen_port ' ] )
2019-07-06 23:28:29 -04:00
else :
2019-07-25 15:42:17 -04:00
if config [ ' ssl_enabled ' ] :
# Run the WSGI server with SSL
2019-10-13 12:15:54 -04:00
http_server = gevent . pywsgi . WSGIServer (
( config [ ' listen_address ' ] , config [ ' listen_port ' ] ) ,
api ,
keyfile = config [ ' ssl_key_file ' ] ,
certfile = config [ ' ssl_cert_file ' ]
)
2019-07-25 15:42:17 -04:00
else :
# Run the ?WSGI server without SSL
2019-10-13 12:15:54 -04:00
http_server = gevent . pywsgi . WSGIServer (
( config [ ' listen_address ' ] , config [ ' listen_port ' ] ) ,
api
)
2019-07-07 00:08:02 -04:00
2019-07-25 15:42:17 -04:00
print ( ' Starting PyWSGI server at {} : {} with SSL= {} , Authentication= {} ' . format ( config [ ' listen_address ' ] , config [ ' listen_port ' ] , config [ ' ssl_enabled ' ] , config [ ' auth_enabled ' ] ) )
http_server . serve_forever ( )