¡@

Home 

OpenStack Study: security_groups.py

OpenStack Index

**** CubicPower OpenStack Study ****

# Copyright 2011 OpenStack Foundation

# Copyright 2012 Justin Santa Barbara

# All Rights Reserved.

#

# Licensed under the Apache License, Version 2.0 (the "License"); you may

# not use this file except in compliance with the License. You may obtain

# a copy of the License at

#

# http://www.apache.org/licenses/LICENSE-2.0

#

# Unless required by applicable law or agreed to in writing, software

# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT

# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the

# License for the specific language governing permissions and limitations

# under the License.

"""The security groups extension."""

import contextlib

import json

import webob

from webob import exc

from nova.api.openstack import common

from nova.api.openstack import extensions

from nova.api.openstack import wsgi

from nova.api.openstack import xmlutil

from nova import compute

from nova.compute import api as compute_api

from nova import exception

from nova.network.security_group import neutron_driver

from nova.network.security_group import openstack_driver

from nova.openstack.common.gettextutils import _

from nova.openstack.common import xmlutils

from nova.virt import netutils

authorize = extensions.extension_authorizer('compute', 'security_groups')

softauth = extensions.soft_extension_authorizer('compute', 'security_groups')

**** CubicPower OpenStack Study ****

def make_rule(elem):

    elem.set('id')

    elem.set('parent_group_id')

    proto = xmlutil.SubTemplateElement(elem, 'ip_protocol')

    proto.text = 'ip_protocol'

    from_port = xmlutil.SubTemplateElement(elem, 'from_port')

    from_port.text = 'from_port'

    to_port = xmlutil.SubTemplateElement(elem, 'to_port')

    to_port.text = 'to_port'

    group = xmlutil.SubTemplateElement(elem, 'group', selector='group')

    name = xmlutil.SubTemplateElement(group, 'name')

    name.text = 'name'

    tenant_id = xmlutil.SubTemplateElement(group, 'tenant_id')

    tenant_id.text = 'tenant_id'

    ip_range = xmlutil.SubTemplateElement(elem, 'ip_range',

                                          selector='ip_range')

    cidr = xmlutil.SubTemplateElement(ip_range, 'cidr')

    cidr.text = 'cidr'

**** CubicPower OpenStack Study ****

def make_sg(elem):

    elem.set('id')

    elem.set('tenant_id')

    elem.set('name')

    desc = xmlutil.SubTemplateElement(elem, 'description')

    desc.text = 'description'

    rules = xmlutil.SubTemplateElement(elem, 'rules')

    rule = xmlutil.SubTemplateElement(rules, 'rule', selector='rules')

    make_rule(rule)

**** CubicPower OpenStack Study ****

def _authorize_context(req):

    context = req.environ['nova.context']

    authorize(context)

    return context

sg_nsmap = {None: wsgi.XMLNS_V11}

**** CubicPower OpenStack Study ****

class SecurityGroupRuleTemplate(xmlutil.TemplateBuilder):

**** CubicPower OpenStack Study ****

    def construct(self):

        root = xmlutil.TemplateElement('security_group_rule',

                                       selector='security_group_rule')

        make_rule(root)

        return xmlutil.MasterTemplate(root, 1, nsmap=sg_nsmap)

**** CubicPower OpenStack Study ****

class SecurityGroupTemplate(xmlutil.TemplateBuilder):

**** CubicPower OpenStack Study ****

    def construct(self):

        root = xmlutil.TemplateElement('security_group',

                                       selector='security_group')

        make_sg(root)

        return xmlutil.MasterTemplate(root, 1, nsmap=sg_nsmap)

**** CubicPower OpenStack Study ****

class SecurityGroupsTemplate(xmlutil.TemplateBuilder):

**** CubicPower OpenStack Study ****

    def construct(self):

        root = xmlutil.TemplateElement('security_groups')

        elem = xmlutil.SubTemplateElement(root, 'security_group',

                                          selector='security_groups')

        make_sg(elem)

        return xmlutil.MasterTemplate(root, 1, nsmap=sg_nsmap)

**** CubicPower OpenStack Study ****

class SecurityGroupXMLDeserializer(wsgi.MetadataXMLDeserializer):

"""Deserializer to handle xml-formatted security group requests."""

**** CubicPower OpenStack Study ****

    def default(self, string):

        """Deserialize an xml-formatted security group create request."""

        dom = xmlutil.safe_minidom_parse_string(string)

        security_group = {}

        sg_node = self.find_first_child_named(dom,

                                               'security_group')

        if sg_node is not None:

            if sg_node.hasAttribute('name'):

                security_group['name'] = sg_node.getAttribute('name')

            desc_node = self.find_first_child_named(sg_node,

                                                     "description")

            if desc_node:

                security_group['description'] = self.extract_text(desc_node)

        return {'body': {'security_group': security_group}}

**** CubicPower OpenStack Study ****

class SecurityGroupRulesXMLDeserializer(wsgi.MetadataXMLDeserializer):

"""Deserializer to handle xml-formatted security group requests."""

**** CubicPower OpenStack Study ****

    def default(self, string):

        """Deserialize an xml-formatted security group create request."""

        dom = xmlutil.safe_minidom_parse_string(string)

        security_group_rule = self._extract_security_group_rule(dom)

        return {'body': {'security_group_rule': security_group_rule}}

**** CubicPower OpenStack Study ****

    def _extract_security_group_rule(self, node):

        """Marshal the security group rule attribute of a parsed request."""

        sg_rule = {}

        sg_rule_node = self.find_first_child_named(node,

                                                   'security_group_rule')

        if sg_rule_node is not None:

            ip_protocol_node = self.find_first_child_named(sg_rule_node,

                                                           "ip_protocol")

            if ip_protocol_node is not None:

                sg_rule['ip_protocol'] = self.extract_text(ip_protocol_node)

            from_port_node = self.find_first_child_named(sg_rule_node,

                                                         "from_port")

            if from_port_node is not None:

                sg_rule['from_port'] = self.extract_text(from_port_node)

            to_port_node = self.find_first_child_named(sg_rule_node, "to_port")

            if to_port_node is not None:

                sg_rule['to_port'] = self.extract_text(to_port_node)

            parent_group_id_node = self.find_first_child_named(sg_rule_node,

                                                            "parent_group_id")

            if parent_group_id_node is not None:

                sg_rule['parent_group_id'] = self.extract_text(

                                                         parent_group_id_node)

            group_id_node = self.find_first_child_named(sg_rule_node,

                                                        "group_id")

            if group_id_node is not None:

                sg_rule['group_id'] = self.extract_text(group_id_node)

            cidr_node = self.find_first_child_named(sg_rule_node, "cidr")

            if cidr_node is not None:

                sg_rule['cidr'] = self.extract_text(cidr_node)

        return sg_rule

@contextlib.contextmanager

def translate_exceptions():

    """Translate nova exceptions to http exceptions."""

    try:

        yield

    except exception.Invalid as exp:

        msg = exp.format_message()

        raise exc.HTTPBadRequest(explanation=msg)

    except exception.SecurityGroupNotFound as exp:

        msg = exp.format_message()

        raise exc.HTTPNotFound(explanation=msg)

    except exception.InstanceNotFound as exp:

        msg = exp.format_message()

        raise exc.HTTPNotFound(explanation=msg)

    except exception.SecurityGroupLimitExceeded as exp:

        msg = exp.format_message()

        raise exc.HTTPRequestEntityTooLarge(explanation=msg)

    except exception.NoUniqueMatch as exp:

        msg = exp.format_message()

        raise exc.HTTPConflict(explanation=msg)

**** CubicPower OpenStack Study ****

def translate_exceptions():

    """Translate nova exceptions to http exceptions."""

    try:

        yield

    except exception.Invalid as exp:

        msg = exp.format_message()

        raise exc.HTTPBadRequest(explanation=msg)

    except exception.SecurityGroupNotFound as exp:

        msg = exp.format_message()

        raise exc.HTTPNotFound(explanation=msg)

    except exception.InstanceNotFound as exp:

        msg = exp.format_message()

        raise exc.HTTPNotFound(explanation=msg)

    except exception.SecurityGroupLimitExceeded as exp:

        msg = exp.format_message()

        raise exc.HTTPRequestEntityTooLarge(explanation=msg)

    except exception.NoUniqueMatch as exp:

        msg = exp.format_message()

        raise exc.HTTPConflict(explanation=msg)

**** CubicPower OpenStack Study ****

class SecurityGroupControllerBase(object):

"""Base class for Security Group controllers."""

**** CubicPower OpenStack Study ****

    def __init__(self):

        self.security_group_api = (

            openstack_driver.get_openstack_security_group_driver())

        self.compute_api = compute.API(

                                   security_group_api=self.security_group_api)

**** CubicPower OpenStack Study ****

    def _format_security_group_rule(self, context, rule):

        sg_rule = {}

        sg_rule['id'] = rule['id']

        sg_rule['parent_group_id'] = rule['parent_group_id']

        sg_rule['ip_protocol'] = rule['protocol']

        sg_rule['from_port'] = rule['from_port']

        sg_rule['to_port'] = rule['to_port']

        sg_rule['group'] = {}

        sg_rule['ip_range'] = {}

        if rule['group_id']:

            with translate_exceptions():

                source_group = self.security_group_api.get(context,

                                                           id=rule['group_id'])

            sg_rule['group'] = {'name': source_group.get('name'),

                             'tenant_id': source_group.get('project_id')}

        else:

            sg_rule['ip_range'] = {'cidr': rule['cidr']}

        return sg_rule

**** CubicPower OpenStack Study ****

    def _format_security_group(self, context, group):

        security_group = {}

        security_group['id'] = group['id']

        security_group['description'] = group['description']

        security_group['name'] = group['name']

        security_group['tenant_id'] = group['project_id']

        security_group['rules'] = []

        for rule in group['rules']:

            security_group['rules'] += [self._format_security_group_rule(

                    context, rule)]

        return security_group

**** CubicPower OpenStack Study ****

    def _from_body(self, body, key):

        if not body:

            raise exc.HTTPUnprocessableEntity()

        value = body.get(key, None)

        if value is None:

            raise exc.HTTPUnprocessableEntity()

        return value

**** CubicPower OpenStack Study ****

class SecurityGroupController(SecurityGroupControllerBase):

"""The Security group API controller for the OpenStack API."""

@wsgi.serializers(xml=SecurityGroupTemplate)

**** CubicPower OpenStack Study ****

    def show(self, req, id):

        """Return data about the given security group."""

        context = _authorize_context(req)

        with translate_exceptions():

            id = self.security_group_api.validate_id(id)

            security_group = self.security_group_api.get(context, None, id,

                                                         map_exception=True)

        return {'security_group': self._format_security_group(context,

                                                              security_group)}

**** CubicPower OpenStack Study ****

    def delete(self, req, id):

        """Delete a security group."""

        context = _authorize_context(req)

        with translate_exceptions():

            id = self.security_group_api.validate_id(id)

            security_group = self.security_group_api.get(context, None, id,

                                                         map_exception=True)

            self.security_group_api.destroy(context, security_group)

        return webob.Response(status_int=202)

    @wsgi.serializers(xml=SecurityGroupsTemplate)

**** CubicPower OpenStack Study ****

    def index(self, req):

        """Returns a list of security groups."""

        context = _authorize_context(req)

        search_opts = {}

        search_opts.update(req.GET)

        with translate_exceptions():

            project_id = context.project_id

            raw_groups = self.security_group_api.list(context,

                                                      project=project_id,

                                                      search_opts=search_opts)

        limited_list = common.limited(raw_groups, req)

        result = [self._format_security_group(context, group)

                    for group in limited_list]

        return {'security_groups':

                list(sorted(result,

                            key=lambda k: (k['tenant_id'], k['name'])))}

    @wsgi.serializers(xml=SecurityGroupTemplate)

    @wsgi.deserializers(xml=SecurityGroupXMLDeserializer)

**** CubicPower OpenStack Study ****

    def create(self, req, body):

        """Creates a new security group."""

        context = _authorize_context(req)

        security_group = self._from_body(body, 'security_group')

        group_name = security_group.get('name', None)

        group_description = security_group.get('description', None)

        with translate_exceptions():

            self.security_group_api.validate_property(group_name, 'name', None)

            self.security_group_api.validate_property(group_description,

                                                      'description', None)

            group_ref = self.security_group_api.create_security_group(

                context, group_name, group_description)

        return {'security_group': self._format_security_group(context,

                                                              group_ref)}

    @wsgi.serializers(xml=SecurityGroupTemplate)

**** CubicPower OpenStack Study ****

    def update(self, req, id, body):

        """Update a security group."""

        context = _authorize_context(req)

        with translate_exceptions():

            id = self.security_group_api.validate_id(id)

            security_group = self.security_group_api.get(context, None, id,

                                                         map_exception=True)

        security_group_data = self._from_body(body, 'security_group')

        group_name = security_group_data.get('name', None)

        group_description = security_group_data.get('description', None)

        with translate_exceptions():

            self.security_group_api.validate_property(group_name, 'name', None)

            self.security_group_api.validate_property(group_description,

                                                      'description', None)

            group_ref = self.security_group_api.update_security_group(

                context, security_group, group_name, group_description)

        return {'security_group': self._format_security_group(context,

                                                              group_ref)}

**** CubicPower OpenStack Study ****

class SecurityGroupRulesController(SecurityGroupControllerBase):

@wsgi.serializers(xml=SecurityGroupRuleTemplate)

@wsgi.deserializers(xml=SecurityGroupRulesXMLDeserializer)

**** CubicPower OpenStack Study ****

    def create(self, req, body):

        context = _authorize_context(req)

        sg_rule = self._from_body(body, 'security_group_rule')

        with translate_exceptions():

            parent_group_id = self.security_group_api.validate_id(

                sg_rule.get('parent_group_id', None))

            security_group = self.security_group_api.get(context, None,

                                                         parent_group_id,

                                                         map_exception=True)

        try:

            new_rule = self._rule_args_to_dict(context,

                              to_port=sg_rule.get('to_port'),

                              from_port=sg_rule.get('from_port'),

                              ip_protocol=sg_rule.get('ip_protocol'),

                              cidr=sg_rule.get('cidr'),

                              group_id=sg_rule.get('group_id'))

        except Exception as exp:

            raise exc.HTTPBadRequest(explanation=unicode(exp))

        if new_rule is None:

            msg = _("Not enough parameters to build a valid rule.")

            raise exc.HTTPBadRequest(explanation=msg)

        new_rule['parent_group_id'] = security_group['id']

        if 'cidr' in new_rule:

            net, prefixlen = netutils.get_net_and_prefixlen(new_rule['cidr'])

            if net not in ('0.0.0.0', '::') and prefixlen == '0':

                msg = _("Bad prefix for network in cidr %s") % new_rule['cidr']

                raise exc.HTTPBadRequest(explanation=msg)

        with translate_exceptions():

            security_group_rule = (

                self.security_group_api.create_security_group_rule(

                    context, security_group, new_rule))

        return {"security_group_rule": self._format_security_group_rule(

                                                        context,

                                                        security_group_rule)}

**** CubicPower OpenStack Study ****

    def _rule_args_to_dict(self, context, to_port=None, from_port=None,

                           ip_protocol=None, cidr=None, group_id=None):

        if group_id is not None:

            group_id = self.security_group_api.validate_id(group_id)

            # check if groupId exists

            self.security_group_api.get(context, id=group_id)

            return self.security_group_api.new_group_ingress_rule(

                                    group_id, ip_protocol, from_port, to_port)

        else:

            cidr = self.security_group_api.parse_cidr(cidr)

            return self.security_group_api.new_cidr_ingress_rule(

                                        cidr, ip_protocol, from_port, to_port)

**** CubicPower OpenStack Study ****

    def delete(self, req, id):

        context = _authorize_context(req)

        with translate_exceptions():

            id = self.security_group_api.validate_id(id)

            rule = self.security_group_api.get_rule(context, id)

            group_id = rule['parent_group_id']

            security_group = self.security_group_api.get(context, None,

                                                         group_id,

                                                         map_exception=True)

            self.security_group_api.remove_rules(context, security_group,

                                                 [rule['id']])

        return webob.Response(status_int=202)

**** CubicPower OpenStack Study ****

class ServerSecurityGroupController(SecurityGroupControllerBase):

@wsgi.serializers(xml=SecurityGroupsTemplate)

**** CubicPower OpenStack Study ****

    def index(self, req, server_id):

        """Returns a list of security groups for the given instance."""

        context = _authorize_context(req)

        self.security_group_api.ensure_default(context)

        with translate_exceptions():

            instance = self.compute_api.get(context, server_id)

            groups = self.security_group_api.get_instance_security_groups(

                context, instance['uuid'], True)

        result = [self._format_security_group(context, group)

                    for group in groups]

        return {'security_groups':

                list(sorted(result,

                            key=lambda k: (k['tenant_id'], k['name'])))}

**** CubicPower OpenStack Study ****

class SecurityGroupActionController(wsgi.Controller):

**** CubicPower OpenStack Study ****

    def __init__(self, *args, **kwargs):

        super(SecurityGroupActionController, self).__init__(*args, **kwargs)

        self.security_group_api = (

            openstack_driver.get_openstack_security_group_driver())

        self.compute_api = compute.API(

                                   security_group_api=self.security_group_api)

**** CubicPower OpenStack Study ****

    def _parse(self, body, action):

        try:

            body = body[action]

            group_name = body['name']

        except TypeError:

            msg = _("Missing parameter dict")

            raise webob.exc.HTTPBadRequest(explanation=msg)

        except KeyError:

            msg = _("Security group not specified")

            raise webob.exc.HTTPBadRequest(explanation=msg)

        if not group_name or group_name.strip() == '':

            msg = _("Security group name cannot be empty")

            raise webob.exc.HTTPBadRequest(explanation=msg)

        return group_name

**** CubicPower OpenStack Study ****

    def _invoke(self, method, context, id, group_name):

        with translate_exceptions():

            instance = self.compute_api.get(context, id)

            method(context, instance, group_name)

        return webob.Response(status_int=202)

    @wsgi.action('addSecurityGroup')

**** CubicPower OpenStack Study ****

    def _addSecurityGroup(self, req, id, body):

        context = req.environ['nova.context']

        authorize(context)

        group_name = self._parse(body, 'addSecurityGroup')

        return self._invoke(self.security_group_api.add_to_instance,

                            context, id, group_name)

    @wsgi.action('removeSecurityGroup')

**** CubicPower OpenStack Study ****

    def _removeSecurityGroup(self, req, id, body):

        context = req.environ['nova.context']

        authorize(context)

        group_name = self._parse(body, 'removeSecurityGroup')

        return self._invoke(self.security_group_api.remove_from_instance,

                            context, id, group_name)

**** CubicPower OpenStack Study ****

class SecurityGroupsOutputController(wsgi.Controller):

**** CubicPower OpenStack Study ****

    def __init__(self, *args, **kwargs):

        super(SecurityGroupsOutputController, self).__init__(*args, **kwargs)

        self.compute_api = compute.API()

        self.security_group_api = (

            openstack_driver.get_openstack_security_group_driver())

**** CubicPower OpenStack Study ****

    def _extend_servers(self, req, servers):

        # TODO(arosen) this function should be refactored to reduce duplicate

        # code and use get_instance_security_groups instead of get_db_instance.

        if not len(servers):

            return

        key = "security_groups"

        context = _authorize_context(req)

        if not openstack_driver.is_neutron_security_groups():

            for server in servers:

                instance = req.get_db_instance(server['id'])

                groups = instance.get(key)

                if groups:

                    server[key] = [{"name": group["name"]} for group in groups]

        else:

            # If method is a POST we get the security groups intended for an

            # instance from the request. The reason for this is if using

            # neutron security groups the requested security groups for the

            # instance are not in the db and have not been sent to neutron yet.

            if req.method != 'POST':

                sg_instance_bindings = (

                        self.security_group_api

                        .get_instances_security_groups_bindings(context,

                                                                servers))

                for server in servers:

                    groups = sg_instance_bindings.get(server['id'])

                    if groups:

                        server[key] = groups

            # In this section of code len(servers) == 1 as you can only POST

            # one server in an API request.

            else:

                try:

                    # try converting to json

                    req_obj = json.loads(req.body)

                    # Add security group to server, if no security group was in

                    # request add default since that is the group it is part of

                    servers[0][key] = req_obj['server'].get(

                        key, [{'name': 'default'}])

                except ValueError:

                    root = xmlutils.safe_minidom_parse_string(req.body)

                    sg_root = root.getElementsByTagName(key)

                    groups = []

                    if sg_root:

                        security_groups = sg_root[0].getElementsByTagName(

                            'security_group')

                        for security_group in security_groups:

                            groups.append(

                                {'name': security_group.getAttribute('name')})

                    if not groups:

                        groups = [{'name': 'default'}]

                    servers[0][key] = groups

**** CubicPower OpenStack Study ****

    def _show(self, req, resp_obj):

        if not softauth(req.environ['nova.context']):

            return

        if 'server' in resp_obj.obj:

            resp_obj.attach(xml=SecurityGroupServerTemplate())

            self._extend_servers(req, [resp_obj.obj['server']])

    @wsgi.extends

**** CubicPower OpenStack Study ****

    def show(self, req, resp_obj, id):

        return self._show(req, resp_obj)

    @wsgi.extends

**** CubicPower OpenStack Study ****

    def create(self, req, resp_obj, body):

        return self._show(req, resp_obj)

    @wsgi.extends

**** CubicPower OpenStack Study ****

    def detail(self, req, resp_obj):

        if not softauth(req.environ['nova.context']):

            return

        resp_obj.attach(xml=SecurityGroupServersTemplate())

        self._extend_servers(req, list(resp_obj.obj['servers']))

**** CubicPower OpenStack Study ****

class SecurityGroupsTemplateElement(xmlutil.TemplateElement):

**** CubicPower OpenStack Study ****

    def will_render(self, datum):

        return "security_groups" in datum

def make_server(elem):

    secgrps = SecurityGroupsTemplateElement('security_groups')

    elem.append(secgrps)

    secgrp = xmlutil.SubTemplateElement(secgrps, 'security_group',

                                        selector="security_groups")

    secgrp.set('name')

**** CubicPower OpenStack Study ****

def make_server(elem):

    secgrps = SecurityGroupsTemplateElement('security_groups')

    elem.append(secgrps)

    secgrp = xmlutil.SubTemplateElement(secgrps, 'security_group',

                                        selector="security_groups")

    secgrp.set('name')

**** CubicPower OpenStack Study ****

class SecurityGroupServerTemplate(xmlutil.TemplateBuilder):

**** CubicPower OpenStack Study ****

    def construct(self):

        root = xmlutil.TemplateElement('server')

        make_server(root)

        return xmlutil.SlaveTemplate(root, 1)

**** CubicPower OpenStack Study ****

class SecurityGroupServersTemplate(xmlutil.TemplateBuilder):

**** CubicPower OpenStack Study ****

    def construct(self):

        root = xmlutil.TemplateElement('servers')

        elem = xmlutil.SubTemplateElement(root, 'server', selector='servers')

        make_server(elem)

        return xmlutil.SlaveTemplate(root, 1)

**** CubicPower OpenStack Study ****

class Security_groups(extensions.ExtensionDescriptor):

"""Security group support."""

name = "SecurityGroups"

alias = "os-security-groups"

namespace = "http://docs.openstack.org/compute/ext/securitygroups/api/v1.1"

updated = "2013-05-28T00:00:00+00:00"

**** CubicPower OpenStack Study ****

    def get_controller_extensions(self):

        controller = SecurityGroupActionController()

        actions = extensions.ControllerExtension(self, 'servers', controller)

        controller = SecurityGroupsOutputController()

        output = extensions.ControllerExtension(self, 'servers', controller)

        return [actions, output]

**** CubicPower OpenStack Study ****

    def get_resources(self):

        resources = []

        res = extensions.ResourceExtension('os-security-groups',

                                controller=SecurityGroupController())

        resources.append(res)

        res = extensions.ResourceExtension('os-security-group-rules',

                                controller=SecurityGroupRulesController())

        resources.append(res)

        res = extensions.ResourceExtension(

            'os-security-groups',

            controller=ServerSecurityGroupController(),

            parent=dict(member_name='server', collection_name='servers'))

        resources.append(res)

        return resources

**** CubicPower OpenStack Study ****

class NativeSecurityGroupExceptions(object):

@staticmethod

**** CubicPower OpenStack Study ****

    def raise_invalid_property(msg):

        raise exception.Invalid(msg)

    @staticmethod

**** CubicPower OpenStack Study ****

    def raise_group_already_exists(msg):

        raise exception.Invalid(msg)

    @staticmethod

**** CubicPower OpenStack Study ****

    def raise_invalid_group(msg):

        raise exception.Invalid(msg)

    @staticmethod

**** CubicPower OpenStack Study ****

    def raise_invalid_cidr(cidr, decoding_exception=None):

        raise exception.InvalidCidr(cidr=cidr)

    @staticmethod

**** CubicPower OpenStack Study ****

    def raise_over_quota(msg):

        raise exception.SecurityGroupLimitExceeded(msg)

    @staticmethod

**** CubicPower OpenStack Study ****

    def raise_not_found(msg):

        raise exception.SecurityGroupNotFound(msg)

**** CubicPower OpenStack Study ****

class NativeNovaSecurityGroupAPI(NativeSecurityGroupExceptions, compute_api.SecurityGroupAPI):

pass

**** CubicPower OpenStack Study ****

class NativeNeutronSecurityGroupAPI(NativeSecurityGroupExceptions, neutron_driver.SecurityGroupAPI):

pass