Chiradeep Vittal
51af0db682
mass merge 2.2.10
2011-08-11 16:41:52 -07:00
alena
5080e8ba33
No need to apply static nat for ip which is not static nat enabled
2011-08-11 16:00:16 -07:00
alena
477e5d6389
bug 10561: reapply static nat on the backend as a part of domR restart and network restart
2011-08-11 11:19:09 -07:00
alena
278f2a401f
bug 10561: intermediate checkin for enable/disableStaticNat.
...
1) On enableStaticNat command we actually send the command to the backend (we used to just upgrade the DB in the past). The backend command carries sourceIp and destIp, and creates IP to IP mapping on the domR.
2) On disableStaticNat for the Ip address in addition to cleaning up port ranges, we also delete IP to IP mapping on the domR.
2011-08-11 10:19:22 -07:00
alena
fe3dd44bec
ICMP protocol is supported in createFirewallRule command only; throw an error if specified in createPF/StaticNat/LB rule
2011-08-10 12:56:25 -07:00
alena
32b53351ff
Fixed response processing in createFirewallRule command
2011-08-10 11:36:34 -07:00
Abhinandan Prateek
949ad3f4c4
bug 10561: readding source cidr changes to firewall rules
2011-08-10 13:55:37 +05:30
Abhinandan Prateek
9bba09857e
bug 10561: readding source cidr changes to firewall rules
2011-08-10 13:52:42 +05:30
Abhinandan Prateek
311afeae23
bug 10731: reverting back source cidr changes for loadbalancer and portforwarding
2011-08-09 16:01:48 +05:30
alena
06d007337a
bug 10561: intermidiate checkin for FirewallRuleFeature
...
1) Added new apis: createFirewallRule, deleteFirewallRule, listFirewallRules
2) Modified existing apis - added boolean openFirewall parameter to createPortForwardingRule/createIpForwardingRule/createRemoteAccessVpn. If parameter is set to true, open firewall on the domR before creating an actual PF rule there
Modified backend calls appropriately.
3) Schema changes for firewall_rules table:
* startPort/endPort can be null now
* added icmp_type, icmp_code fields (can be not null only when protocol is icmp)
4) Added new manager - FirewallManagerImpl
2011-08-08 20:59:40 -07:00
Naredula Janardhana Reddy
9e9ae52dbf
Revert "bug 10561: Allowing ICMP traffic through static NAT"
...
This reverts commit 5e74e24bb359456967866cb2c6cc0f6f73570f97.
2011-08-09 00:08:07 +05:30
Naredula Janardhana Reddy
46427fef91
bug 10561: Allowing ICMP traffic through static NAT
2011-08-03 21:15:02 +05:30
Abhinandan Prateek
de34d6089d
bug 10731: sending source cidrs to the required router element, on domR allowing these source cidrs thru iptables
...
status 10731: resolved fixed
2011-07-21 13:40:06 +05:30
kishan
ddd416a492
bug 10382: wrapped usage events in txn
2011-07-20 11:19:39 +05:30
alena
b9325a28dd
bug 9579: allow domain name suffix update for existing networks.
...
Block update only in these cases:
* when DNS capability AllowDnsSuffixModification is false for the network
* when target network has running network elements (dhcps or domRs)
2011-06-09 16:10:24 -07:00
Alex Huang
d9e0bcfa1e
bug 10126: Renamed getPodId() to getPodIdToDeployIn()
2011-06-03 22:17:08 -07:00
Murali Reddy
5769fde46b
bug 7194:New API for adding range of public & private ports in port forwarding rule addition
...
adding support for port ranges in port forwarding rules.
2011-05-19 18:32:09 +05:30
Abhinandan Prateek
d752a94838
bug 8115: Source IP filtering in Virtual Router
...
Passing the additional source cidrs paramter to the xapi.
2011-05-12 13:37:43 +05:30
Abhinandan Prateek
2984b0607f
bug 8115: source ip filtering
...
Created a table for source cidrs list.
Created necessary Daos and VOs.
Updated PortForwardingRulesDao to persist/update non null list of cidrs.
For deletion depending on ON DELETE CASCADE.
2011-05-09 17:41:50 +05:30
kishan
76a30cc76f
bug 9686,9676,9677: Create usage events for existing resources for port forwarding, load balancer and network offering usage
...
status 9686,9676,9677: resolved fixed
2011-05-03 20:01:28 +05:30
alena
1a6d78eae4
Code cleanup. No need to declare runtime exceptions (CloudRuntimeException, InvalidParameterException, PermissionDenied exceptions)
2011-04-21 16:26:53 -07:00
alena
98baa7392e
bug 9383: createStaticNat rule - allow opening the same port for tcp/udp traffic
...
status 9383: resolved fixed
2011-04-18 17:55:41 -07:00
Frank
92155522f2
Add license header to files
2011-04-14 11:23:14 -07:00
Frank
105db3b15a
Merge branch 'baremetal' to master
...
modifies:
api/src/com/cloud/api/ApiConstants.java
api/src/com/cloud/api/commands/AddHostCmd.java
api/src/com/cloud/api/commands/CreatePodCmd.java
api/src/com/cloud/api/commands/DeployVMCmd.java
api/src/com/cloud/dc/Pod.java
api/src/com/cloud/network/NetworkService.java
server/src/com/cloud/agent/manager/AgentManagerImpl.java
server/src/com/cloud/configuration/ConfigurationManagerImpl.java
server/src/com/cloud/dc/HostPodVO.java
server/src/com/cloud/network/NetworkManager.java
server/src/com/cloud/network/NetworkManagerImpl.java
server/src/com/cloud/vm/UserVmManagerImpl.java
setup/db/create-schema.sql
utils/src/com/cloud/utils/SerialVersionUID.java
2011-04-11 14:21:41 -07:00
nit
debe236a8d
bug 8710: CONTD....Introducing a new user role in cloudstack called RESOURCE_DOMAIN_ADMIN. The role would have all the domain_admin rights and the rights to list zone,pods,clusters and so on. More info in the bug
2011-04-11 19:40:37 +05:30
alena
7ce9845fb7
No need to check if user vm exists during static nat port range creation. We already do it when enableStaticNat for the ip address
2011-03-29 13:46:18 -07:00
alena
96e83fe97f
bug 8146: Elastic IP support in Basic zone.
...
Following was done as a part of checkin:
1) NetworkOffering/Network:
* add PF service support for default Guest network offering.
* Add one more additional network - Public.
* Allow to enable external firewall in Basic zone.
2) Don't allow to deployVm in Public Network.
3) Allow to add vlan ip ranges to Public networks in Basic zone.
4) Associate IP - allow to associate with Direct vms.
5) Allow to create PF/Static nat rules. Rules are being sent to External Firewall Rule only.
6) Add PF support to External Firewall element.
2011-03-17 17:19:36 -07:00
alena
95faeb620e
bug 8863: generate usage event when PF/LB/StaticNat rule is set with Revoke status, not when it's actually removed on the backend.
...
status 8863: resolved fixed
2011-03-16 09:41:50 -07:00
alena
a8e70cf9b4
bug 8763: Fixed account cleanup process - don't destroy networks when vm expunge failed
...
status 8763: resolved fixed
Conflicts:
server/src/com/cloud/user/AccountManagerImpl.java
2011-03-01 14:25:09 -08:00
alena
62b3d548d6
bug 8753: never release public Ip address without ensuring that all corresponding resources (PF/StaticNat/Lb rules) are cleaned up.
...
Fixed couple of other problems along:
* when expunge PF/Static nat rules as a part of vmExpunge/IpRelease process, first mark all rules as Revoke, and then send commands to the backend. Group commands by Ip address.
Before we used to do Revoke/Send per rule basis.
* When release source nat rule, make sure that corresponding vpn (if exists) is being expunged.
2011-02-28 09:21:05 -08:00
alena
f8993d9ec4
Fixed NPE in vm expunge process - when cleanup static nat rules after corresponding vm is expunged, make search for guest Nic including removed.
2011-02-24 18:27:55 -08:00
alena
b0aabc1b20
bug 8682: implemented search by id in listPortForwardingRules
...
status 8682: resolved fixed
2011-02-24 09:55:03 -08:00
alena
8978839d96
bug 8617: Disable firewall/lb/vpn service for Direct network offering, so when user tries to create PF/LB rule for direct IP address, it fails.
...
status 8617: resolved fixed
2011-02-17 14:31:05 -08:00
alena
42ddf74bc5
bug 8284: don't allow to create static nat rules for 2 different ip addresses and the same vm.
...
status 8284: resolved fixed
2011-02-15 13:52:00 -08:00
alena
9c2db92b63
Fixed the bug when port forwarding rules were not reset correctly on domR restart/start (multiple public ip addresses case)
2011-02-15 10:49:46 -08:00
alena
d80caf24fd
bug 8564: Changed implementation for static nat rules. Now we use separate interfaces instead of PortForwardingRules interfaces.
...
status 8564: resolved fixed
2011-02-15 10:45:28 -08:00
alena
8cd7426dd0
bug 8455: for static nat port range don't allow start port to be bigger than end port
...
status 8455: resolved fixed
2011-02-11 17:43:56 -08:00
alena
0938509bc0
bug 7341: introduced search by id/vmId to listIpForwardingRules command
...
status 7341: resolved fixed
2011-02-11 17:14:34 -08:00
alena
4054d7e2b5
Store ip address as String instead of Long in user_ip_address and port_forwarding_rules tables
2011-02-09 19:35:03 -08:00
kishan
2a6bef2750
seperating service API call form internal calls for revoke port forwarding rule
2011-02-08 12:34:04 +05:30
alena
0082b8435a
Fixed account security checks for domain admins in following commands:
...
* listPortForwardingRules
* listIpForwardingRules
* listRemoteAccessVpns
* listVpnUsers
2011-02-07 16:24:34 -08:00
alena
807562da50
bug 8424: fixed NPE in vmExpunge thread - set accountId for UserContext to the vm's ownerId (this value is being read by UsageEvents generator)
...
status 8424: resolved fixed
2011-02-07 12:13:59 -08:00
alena
6e399aa698
Vm expunge: when delete port forwarding rules as a part of vm expunge, do searchIncludingRemoved for the vm because vm can be marked for removal already.
2011-02-07 10:02:10 -08:00
kishan
56f3343911
Added action events for VM, volume, Ip and snapshot actions
2011-02-04 19:59:41 +05:30
alena
6f55c4dd7e
bug 8270: Synchronize on 1) ipAddress object when create/delete ipForwarding/portForwardingRule and vpn service 2) on networkId when assignTo/removeFrom/deleteLoadBalancer
...
status 8270: resolved fixed
2011-02-03 18:45:49 -08:00
kishan
5bedf10cbf
Added action events for Ip and net rules
2011-02-03 18:13:23 +05:30
alena
9aa9c34029
bug 8340: return networkId for private/public/guest networks in listRouters response. Implemented search by networkId
...
status 8340: resolved fixed
2011-02-02 13:25:28 -08:00
alena
5d2cc07768
bug 8201: accept "any" value for protocol when open port range for staticNat rule
...
status 8201: resolved fixed
2011-02-02 12:57:14 -08:00
alena
6544820e74
Moved networkRestart to the NetworkManager as it's up to the manager (not network elements) to decide what to do on restart (IpAssoc/ruleApply/etc..)
2011-02-01 12:16:19 -08:00
alena
f6f8a35c75
bug 8251: introduced "id" field for public IP address. In the DB id is a primary key in user_ip_address table; ip_address and source_network_id is a composite key
...
status 8251: resolved fixed
2011-02-01 12:16:18 -08:00