secgrouprules.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package models
  15. import (
  16. "context"
  17. "net"
  18. "strings"
  19. "yunion.io/x/cloudmux/pkg/cloudprovider"
  20. "yunion.io/x/jsonutils"
  21. "yunion.io/x/log"
  22. "yunion.io/x/pkg/errors"
  23. "yunion.io/x/pkg/util/compare"
  24. "yunion.io/x/pkg/util/rbacscope"
  25. "yunion.io/x/pkg/util/regutils"
  26. "yunion.io/x/pkg/util/secrules"
  27. "yunion.io/x/pkg/util/stringutils"
  28. "yunion.io/x/sqlchemy"
  29. "yunion.io/x/onecloud/pkg/apis"
  30. api "yunion.io/x/onecloud/pkg/apis/compute"
  31. "yunion.io/x/onecloud/pkg/cloudcommon/db"
  32. "yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
  33. "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
  34. "yunion.io/x/onecloud/pkg/cloudcommon/validators"
  35. "yunion.io/x/onecloud/pkg/httperrors"
  36. "yunion.io/x/onecloud/pkg/mcclient"
  37. "yunion.io/x/onecloud/pkg/util/logclient"
  38. "yunion.io/x/onecloud/pkg/util/stringutils2"
  39. )
  40. // +onecloud:swagger-gen-model-singular=secgrouprule
  41. // +onecloud:swagger-gen-model-plural=secgrouprules
  42. type SSecurityGroupRuleManager struct {
  43. db.SResourceBaseManager
  44. db.SStatusResourceBaseManager
  45. db.SExternalizedResourceBaseManager
  46. SSecurityGroupResourceBaseManager
  47. }
  48. var SecurityGroupRuleManager *SSecurityGroupRuleManager
  49. func init() {
  50. SecurityGroupRuleManager = &SSecurityGroupRuleManager{
  51. SResourceBaseManager: db.NewResourceBaseManager(
  52. SSecurityGroupRule{},
  53. "secgrouprules_tbl",
  54. "secgrouprule",
  55. "secgrouprules",
  56. ),
  57. }
  58. SecurityGroupRuleManager.SetVirtualObject(SecurityGroupRuleManager)
  59. }
  60. type SSecurityGroupRule struct {
  61. db.SResourceBase
  62. db.SStatusResourceBase `default:"available"`
  63. db.SExternalizedResourceBase
  64. SSecurityGroupResourceBase `create:"required"`
  65. Id string `width:"128" charset:"ascii" primary:"true" list:"user"`
  66. Priority int `list:"user" update:"user" list:"user"`
  67. Protocol string `width:"32" charset:"ascii" nullable:"false" list:"user" update:"user" create:"required"`
  68. Ports string `width:"256" charset:"ascii" list:"user" update:"user" create:"optional"`
  69. Direction string `width:"3" charset:"ascii" list:"user" create:"required"`
  70. CIDR string `width:"256" charset:"ascii" list:"user" update:"user" create:"optional"`
  71. Action string `width:"5" charset:"ascii" nullable:"false" list:"user" update:"user" create:"required"`
  72. Description string `width:"256" charset:"utf8" list:"user" update:"user" create:"optional"`
  73. }
  74. func (self *SSecurityGroupRule) GetId() string {
  75. return self.Id
  76. }
  77. func (manager *SSecurityGroupRuleManager) CreateByInsertOrUpdate() bool {
  78. return false
  79. }
  80. func (manager *SSecurityGroupRuleManager) FetchUniqValues(ctx context.Context, data jsonutils.JSONObject) jsonutils.JSONObject {
  81. secgroupId, _ := data.GetString("secgroup_id")
  82. return jsonutils.Marshal(map[string]string{"secgroup_id": secgroupId})
  83. }
  84. func (manager *SSecurityGroupRuleManager) FilterByUniqValues(q *sqlchemy.SQuery, values jsonutils.JSONObject) *sqlchemy.SQuery {
  85. secgroupId, _ := values.GetString("secgroup_id")
  86. if len(secgroupId) > 0 {
  87. q = q.Equals("secgroup_id", secgroupId)
  88. }
  89. return q
  90. }
  91. func (manager *SSecurityGroupRuleManager) FetchOwnerId(ctx context.Context, data jsonutils.JSONObject) (mcclient.IIdentityProvider, error) {
  92. secgroupId, _ := data.GetString("secgroup_id")
  93. if len(secgroupId) > 0 {
  94. secgroup, err := db.FetchById(SecurityGroupManager, secgroupId)
  95. if err != nil {
  96. return nil, errors.Wrapf(err, "db.FetchById(SecurityGroupManager, %s)", secgroupId)
  97. }
  98. return secgroup.(*SSecurityGroup).GetOwnerId(), nil
  99. }
  100. return db.FetchProjectInfo(ctx, data)
  101. }
  102. func (manager *SSecurityGroupRuleManager) FilterByOwner(ctx context.Context, q *sqlchemy.SQuery, man db.FilterByOwnerProvider, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, scope rbacscope.TRbacScope) *sqlchemy.SQuery {
  103. sq := SecurityGroupManager.Query("id")
  104. sq = db.SharableManagerFilterByOwner(ctx, SecurityGroupManager, sq, userCred, ownerId, scope)
  105. return q.In("secgroup_id", sq.SubQuery())
  106. }
  107. func (manager *SSecurityGroupRuleManager) FilterById(q *sqlchemy.SQuery, idStr string) *sqlchemy.SQuery {
  108. return q.Equals("id", idStr)
  109. }
  110. func (manager *SSecurityGroupRuleManager) FilterByName(q *sqlchemy.SQuery, idStr string) *sqlchemy.SQuery {
  111. return q.Equals("id", idStr)
  112. }
  113. // 安全组规则列表
  114. func (manager *SSecurityGroupRuleManager) ListItemFilter(
  115. ctx context.Context,
  116. q *sqlchemy.SQuery,
  117. userCred mcclient.TokenCredential,
  118. query api.SecurityGroupRuleListInput,
  119. ) (*sqlchemy.SQuery, error) {
  120. sql, err := manager.SResourceBaseManager.ListItemFilter(ctx, q, userCred, query.ResourceBaseListInput)
  121. if err != nil {
  122. return nil, errors.Wrap(err, "SResourceBaseManager.ListItemFilter")
  123. }
  124. q, err = manager.SExternalizedResourceBaseManager.ListItemFilter(ctx, q, userCred, query.ExternalizedResourceBaseListInput)
  125. if err != nil {
  126. return nil, errors.Wrap(err, "SExternalizedResourceBaseManager.ListItemFilter")
  127. }
  128. sql, err = manager.SSecurityGroupResourceBaseManager.ListItemFilter(ctx, q, userCred, query.SecgroupFilterListInput)
  129. if err != nil {
  130. return nil, errors.Wrap(err, "SSecurityGroupResourceBaseManager.ListItemFilter")
  131. }
  132. if len(query.Projects) > 0 {
  133. sq := SecurityGroupManager.Query("id")
  134. tenants := db.TenantCacheManager.GetTenantQuery().SubQuery()
  135. subq := tenants.Query(tenants.Field("id")).Filter(sqlchemy.OR(
  136. sqlchemy.In(tenants.Field("id"), query.Projects),
  137. sqlchemy.In(tenants.Field("name"), query.Projects),
  138. )).SubQuery()
  139. sq = sq.In("tenant_id", subq)
  140. sql = sql.In("secgroup_id", sq.SubQuery())
  141. }
  142. if len(query.Direction) > 0 {
  143. sql = sql.Equals("direction", query.Direction)
  144. }
  145. if len(query.Action) > 0 {
  146. sql = sql.Equals("action", query.Action)
  147. }
  148. if len(query.Protocol) > 0 {
  149. sql = sql.Equals("protocol", query.Protocol)
  150. }
  151. if len(query.Ports) > 0 {
  152. sql = sql.Equals("ports", query.Ports)
  153. }
  154. if len(query.Ip) > 0 {
  155. sql = sql.Like("cidr", "%"+query.Ip+"%")
  156. }
  157. return sql, nil
  158. }
  159. func (manager *SSecurityGroupRuleManager) FetchCustomizeColumns(
  160. ctx context.Context,
  161. userCred mcclient.TokenCredential,
  162. query jsonutils.JSONObject,
  163. objs []interface{},
  164. fields stringutils2.SSortedStrings,
  165. isList bool,
  166. ) []api.SecgroupRuleDetails {
  167. rows := make([]api.SecgroupRuleDetails, len(objs))
  168. bRows := manager.SResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  169. secRows := manager.SSecurityGroupResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  170. secIds := make([]string, len(objs))
  171. for i := range rows {
  172. rows[i] = api.SecgroupRuleDetails{
  173. ResourceBaseDetails: bRows[i],
  174. SecurityGroupResourceInfo: secRows[i],
  175. }
  176. rule := objs[i].(*SSecurityGroupRule)
  177. secIds[i] = rule.SecgroupId
  178. }
  179. secgroups := make(map[string]SSecurityGroup)
  180. err := db.FetchStandaloneObjectsByIds(SecurityGroupManager, secIds, &secgroups)
  181. if err != nil {
  182. log.Errorf("FetchStandaloneObjectsByIds fail: %v", err)
  183. return rows
  184. }
  185. virObjs := make([]interface{}, len(objs))
  186. for i := range rows {
  187. if secgroup, ok := secgroups[secIds[i]]; ok {
  188. virObjs[i] = &secgroup
  189. rows[i].ProjectId = secgroup.ProjectId
  190. }
  191. }
  192. projRows := SecurityGroupManager.SProjectizedResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, virObjs, fields, isList)
  193. for i := range rows {
  194. rows[i].ProjectizedResourceInfo = projRows[i]
  195. }
  196. return rows
  197. }
  198. func (manager *SSecurityGroupRuleManager) OrderByExtraFields(
  199. ctx context.Context,
  200. q *sqlchemy.SQuery,
  201. userCred mcclient.TokenCredential,
  202. query api.SecurityGroupRuleListInput,
  203. ) (*sqlchemy.SQuery, error) {
  204. var err error
  205. q, err = manager.SResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.ResourceBaseListInput)
  206. if err != nil {
  207. return nil, errors.Wrap(err, "SResourceBaseManager.OrderByExtraFields")
  208. }
  209. q, err = manager.SSecurityGroupResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.SecgroupFilterListInput)
  210. if err != nil {
  211. return nil, errors.Wrap(err, "SSecurityGroupResourceBaseManager.OrderByExtraFields")
  212. }
  213. return q, nil
  214. }
  215. func (manager *SSecurityGroupRuleManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
  216. var err error
  217. q, err = manager.SResourceBaseManager.QueryDistinctExtraField(q, field)
  218. if err == nil {
  219. return q, nil
  220. }
  221. q, err = manager.SSecurityGroupResourceBaseManager.QueryDistinctExtraField(q, field)
  222. if err == nil {
  223. return q, nil
  224. }
  225. return q, httperrors.ErrNotFound
  226. }
  227. func (manager *SSecurityGroupRuleManager) QueryDistinctExtraFields(q *sqlchemy.SQuery, resource string, fields []string) (*sqlchemy.SQuery, error) {
  228. var err error
  229. q, err = manager.SSecurityGroupResourceBaseManager.QueryDistinctExtraFields(q, resource, fields)
  230. if err == nil {
  231. return q, nil
  232. }
  233. return q, httperrors.ErrNotFound
  234. }
  235. func (self *SSecurityGroupRule) Delete(ctx context.Context, userCred mcclient.TokenCredential) error {
  236. return nil
  237. }
  238. func (self *SSecurityGroupRule) RealDelete(ctx context.Context, userCred mcclient.TokenCredential) error {
  239. return db.DeleteModel(ctx, userCred, self)
  240. }
  241. func (self *SSecurityGroupRule) BeforeInsert() {
  242. if len(self.Id) == 0 {
  243. self.Id = stringutils.UUID4()
  244. }
  245. }
  246. func (manager *SSecurityGroupRuleManager) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, input *api.SSecgroupRuleCreateInput) (*api.SSecgroupRuleCreateInput, error) {
  247. _secgroup, err := validators.ValidateModel(ctx, userCred, SecurityGroupManager, &input.SecgroupId)
  248. if err != nil {
  249. return input, err
  250. }
  251. input.Status = apis.STATUS_CREATING
  252. secgroup := _secgroup.(*SSecurityGroup)
  253. driver, err := secgroup.GetRegionDriver()
  254. if err != nil {
  255. return nil, err
  256. }
  257. opts := &api.SSecgroupCreateInput{}
  258. opts.Rules = []api.SSecgroupRuleCreateInput{*input}
  259. _, err = driver.ValidateCreateSecurityGroupInput(ctx, userCred, opts)
  260. if err != nil {
  261. return nil, err
  262. }
  263. if !secgroup.IsOwner(userCred) && !userCred.HasSystemAdminPrivilege() {
  264. return input, httperrors.NewForbiddenError("not enough privilege")
  265. }
  266. input.ResourceBaseCreateInput, err = manager.SResourceBaseManager.ValidateCreateData(ctx, userCred, ownerId, query, input.ResourceBaseCreateInput)
  267. if err != nil {
  268. return input, err
  269. }
  270. return input, nil
  271. }
  272. func (self *SSecurityGroupRule) ValidateUpdateData(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.SSecgroupRuleUpdateInput) (*api.SSecgroupRuleUpdateInput, error) {
  273. secgrp, err := self.GetSecGroup()
  274. if err != nil {
  275. return nil, err
  276. }
  277. if input.CIDR == nil {
  278. // input.CIDR = &self.CIDR
  279. }
  280. driver, err := secgrp.GetRegionDriver()
  281. if err != nil {
  282. return nil, err
  283. }
  284. input, err = driver.ValidateUpdateSecurityGroupRuleInput(ctx, userCred, input)
  285. if err != nil {
  286. return nil, err
  287. }
  288. input.ResourceBaseUpdateInput, err = self.SResourceBase.ValidateUpdateData(ctx, userCred, query, input.ResourceBaseUpdateInput)
  289. if err != nil {
  290. return input, errors.Wrap(err, "SResourceBase.ValidateUpdateData")
  291. }
  292. return input, nil
  293. }
  294. func (self *SSecurityGroupRule) String() string {
  295. rule, err := self.toRule()
  296. if err != nil {
  297. return ""
  298. }
  299. return rule.String()
  300. }
  301. func (self *SSecurityGroupRule) toRule() (*secrules.SecurityRule, error) {
  302. rule := secrules.SecurityRule{
  303. Priority: int(self.Priority),
  304. Direction: secrules.TSecurityRuleDirection(self.Direction),
  305. Action: secrules.TSecurityRuleAction(self.Action),
  306. Protocol: self.Protocol,
  307. Description: self.Description,
  308. }
  309. if regutils.MatchCIDR(self.CIDR) || regutils.MatchCIDR6(self.CIDR) {
  310. _, rule.IPNet, _ = net.ParseCIDR(self.CIDR)
  311. } else if regutils.MatchIP4Addr(self.CIDR) {
  312. rule.IPNet = &net.IPNet{
  313. IP: net.ParseIP(self.CIDR),
  314. Mask: net.CIDRMask(32, 32),
  315. }
  316. } else if regutils.MatchIP6Addr(self.CIDR) {
  317. rule.IPNet = &net.IPNet{
  318. IP: net.ParseIP(self.CIDR),
  319. Mask: net.CIDRMask(128, 128),
  320. }
  321. } else {
  322. // any
  323. rule.IPNet = nil
  324. /* &net.IPNet{
  325. IP: net.IPv4zero,
  326. Mask: net.CIDRMask(0, 32),
  327. } */
  328. }
  329. err := rule.ParsePorts(self.Ports)
  330. if err != nil {
  331. return nil, err
  332. }
  333. return &rule, rule.ValidateRule()
  334. }
  335. func (self *SSecurityGroupRule) PostCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) {
  336. self.SResourceBase.PostCreate(ctx, userCred, ownerId, query, data)
  337. log.Debugf("POST Create %s", data)
  338. if secgroup, _ := self.GetSecGroup(); secgroup != nil {
  339. logclient.AddSimpleActionLog(secgroup, logclient.ACT_ALLOCATE, data, userCred, true)
  340. if len(secgroup.ManagerId) == 0 {
  341. self.SetStatus(ctx, userCred, apis.STATUS_AVAILABLE, "")
  342. secgroup.DoSync(ctx, userCred)
  343. return
  344. }
  345. secgroup.StartSecurityGroupRuleCreateTask(ctx, userCred, self.Id, "")
  346. }
  347. }
  348. func (self *SSecurityGroupRule) PreDelete(ctx context.Context, userCred mcclient.TokenCredential) {
  349. self.SResourceBase.PreDelete(ctx, userCred)
  350. if secgroup, _ := self.GetSecGroup(); secgroup != nil {
  351. logclient.AddSimpleActionLog(secgroup, logclient.ACT_DELETE, jsonutils.Marshal(self), userCred, true)
  352. if len(secgroup.ManagerId) == 0 {
  353. self.RealDelete(ctx, userCred)
  354. secgroup.DoSync(ctx, userCred)
  355. return
  356. }
  357. self.SetStatus(ctx, userCred, apis.STATUS_DELETING, "")
  358. secgroup.StartSecurityGroupRuleDeleteTask(ctx, userCred, self.Id, "")
  359. }
  360. }
  361. func (self *SSecurityGroupRule) PostUpdate(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) {
  362. self.SResourceBase.PostUpdate(ctx, userCred, query, data)
  363. if self.Protocol == secrules.PROTO_ICMP || self.Protocol == secrules.PROTO_ANY {
  364. db.Update(self, func() error {
  365. self.Ports = ""
  366. return nil
  367. })
  368. }
  369. log.Debugf("POST Update %s", data)
  370. if secgroup, _ := self.GetSecGroup(); secgroup != nil {
  371. logclient.AddSimpleActionLog(secgroup, logclient.ACT_UPDATE, data, userCred, true)
  372. if len(secgroup.ManagerId) == 0 {
  373. secgroup.DoSync(ctx, userCred)
  374. return
  375. }
  376. self.SetStatus(ctx, userCred, apis.STATUS_SYNC_STATUS, "")
  377. secgroup.StartSecurityGroupRuleUpdateTask(ctx, userCred, self.Id, "")
  378. }
  379. }
  380. func (self *SSecurityGroup) StartSecurityGroupRuleUpdateTask(ctx context.Context, userCred mcclient.TokenCredential, ruleId, parentTaskId string) error {
  381. params := jsonutils.NewDict()
  382. params.Set("rule_id", jsonutils.NewString(ruleId))
  383. task, err := taskman.TaskManager.NewTask(ctx, "SecurityGroupRuleUpdateTask", self, userCred, params, parentTaskId, "", nil)
  384. if err != nil {
  385. return errors.Wrapf(err, "NewTask")
  386. }
  387. return task.ScheduleRun(nil)
  388. }
  389. func (manager *SSecurityGroupRuleManager) getRulesBySecurityGroup(secgroup *SSecurityGroup) ([]SSecurityGroupRule, error) {
  390. rules := make([]SSecurityGroupRule, 0)
  391. q := manager.Query().Equals("secgroup_id", secgroup.Id)
  392. if err := db.FetchModelObjects(manager, q, &rules); err != nil {
  393. return nil, err
  394. }
  395. return rules, nil
  396. }
  397. func (self *SSecurityGroupRule) GetOwnerId() mcclient.IIdentityProvider {
  398. secgrp, _ := self.GetSecGroup()
  399. if secgrp != nil {
  400. return secgrp.GetOwnerId()
  401. }
  402. return nil
  403. }
  404. func (manager *SSecurityGroupRuleManager) ResourceScope() rbacscope.TRbacScope {
  405. return rbacscope.ScopeProject
  406. }
  407. func (manager *SSecurityGroupRuleManager) ListItemExportKeys(ctx context.Context,
  408. q *sqlchemy.SQuery,
  409. userCred mcclient.TokenCredential,
  410. keys stringutils2.SSortedStrings,
  411. ) (*sqlchemy.SQuery, error) {
  412. var err error
  413. q, err = manager.SResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  414. if err != nil {
  415. return nil, errors.Wrap(err, "SResourceBaseManager.ListItemExportKeys")
  416. }
  417. q, err = manager.SSecurityGroupResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  418. if err != nil {
  419. return nil, errors.Wrap(err, "SSecurityGroupResourceBaseManager.ListItemExportKeys")
  420. }
  421. return q, nil
  422. }
  423. func (self *SSecurityGroup) SyncRules(
  424. ctx context.Context,
  425. userCred mcclient.TokenCredential,
  426. exts []cloudprovider.ISecurityGroupRule,
  427. ) compare.SyncResult {
  428. lockman.LockRawObject(ctx, SecurityGroupManager.Keyword(), self.Id)
  429. defer lockman.ReleaseRawObject(ctx, SecurityGroupManager.Keyword(), self.Id)
  430. result := compare.SyncResult{}
  431. dbRules, err := self.GetSecurityRules()
  432. if err != nil {
  433. result.Error(err)
  434. return result
  435. }
  436. removed := make([]SSecurityGroupRule, 0)
  437. commondb := make([]SSecurityGroupRule, 0)
  438. commonext := make([]cloudprovider.ISecurityGroupRule, 0)
  439. added := make([]cloudprovider.ISecurityGroupRule, 0)
  440. err = compare.CompareSets(dbRules, exts, &removed, &commondb, &commonext, &added)
  441. if err != nil {
  442. result.Error(err)
  443. return result
  444. }
  445. for i := 0; i < len(removed); i += 1 {
  446. err = removed[i].RealDelete(ctx, userCred)
  447. if err != nil {
  448. result.DeleteError(err)
  449. continue
  450. }
  451. result.Delete()
  452. }
  453. for i := 0; i < len(commondb); i += 1 {
  454. err = commondb[i].syncWithCloudRule(ctx, userCred, commonext[i])
  455. if err != nil {
  456. result.UpdateError(err)
  457. continue
  458. }
  459. result.Update()
  460. }
  461. for i := 0; i < len(added); i += 1 {
  462. err := self.newFromCloudRule(ctx, userCred, added[i])
  463. if err != nil {
  464. result.AddError(err)
  465. continue
  466. }
  467. result.Add()
  468. }
  469. return result
  470. }
  471. func (rule *SSecurityGroupRule) syncWithCloudRule(ctx context.Context, userCred mcclient.TokenCredential, ext cloudprovider.ISecurityGroupRule) error {
  472. _, err := db.Update(rule, func() error {
  473. rule.Action = string(ext.GetAction())
  474. rule.Direction = string(ext.GetDirection())
  475. rule.Protocol = string(ext.GetProtocol())
  476. rule.Description = string(ext.GetDescription())
  477. rule.CIDR = strings.Join(ext.GetCIDRs(), ",")
  478. rule.Priority = ext.GetPriority()
  479. rule.Ports = ext.GetPorts()
  480. rule.Status = apis.STATUS_AVAILABLE
  481. return nil
  482. })
  483. return err
  484. }
  485. func (self *SSecurityGroup) newFromCloudRule(ctx context.Context, userCred mcclient.TokenCredential, ext cloudprovider.ISecurityGroupRule) error {
  486. rule := &SSecurityGroupRule{}
  487. rule.SetModelManager(SecurityGroupRuleManager, rule)
  488. rule.SecgroupId = self.Id
  489. rule.Action = string(ext.GetAction())
  490. rule.Direction = string(ext.GetDirection())
  491. rule.Protocol = string(ext.GetProtocol())
  492. rule.Description = string(ext.GetDescription())
  493. rule.CIDR = strings.Join(ext.GetCIDRs(), ",")
  494. rule.Priority = ext.GetPriority()
  495. rule.Ports = ext.GetPorts()
  496. rule.ExternalId = ext.GetGlobalId()
  497. rule.Status = apis.STATUS_AVAILABLE
  498. return SecurityGroupRuleManager.TableSpec().Insert(ctx, rule)
  499. }
  500. func (self *SSecurityGroupRule) SetStatus(ctx context.Context, userCred mcclient.TokenCredential, status, reason string) error {
  501. if self.Status == status {
  502. return nil
  503. }
  504. _, err := db.Update(self, func() error {
  505. self.Status = status
  506. return nil
  507. })
  508. return err
  509. }
  510. func (manager *SSecurityGroupRuleManager) FetchRuleById(id string) (*SSecurityGroupRule, error) {
  511. rule, err := db.FetchById(manager, id)
  512. if err != nil {
  513. return nil, errors.Wrapf(err, "FetchById(%s)", id)
  514. }
  515. return rule.(*SSecurityGroupRule), nil
  516. }