| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package models
- import (
- "context"
- "net"
- "strings"
- "yunion.io/x/cloudmux/pkg/cloudprovider"
- "yunion.io/x/jsonutils"
- "yunion.io/x/log"
- "yunion.io/x/pkg/errors"
- "yunion.io/x/pkg/util/compare"
- "yunion.io/x/pkg/util/rbacscope"
- "yunion.io/x/pkg/util/regutils"
- "yunion.io/x/pkg/util/secrules"
- "yunion.io/x/pkg/util/stringutils"
- "yunion.io/x/sqlchemy"
- "yunion.io/x/onecloud/pkg/apis"
- api "yunion.io/x/onecloud/pkg/apis/compute"
- "yunion.io/x/onecloud/pkg/cloudcommon/db"
- "yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
- "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
- "yunion.io/x/onecloud/pkg/cloudcommon/validators"
- "yunion.io/x/onecloud/pkg/httperrors"
- "yunion.io/x/onecloud/pkg/mcclient"
- "yunion.io/x/onecloud/pkg/util/logclient"
- "yunion.io/x/onecloud/pkg/util/stringutils2"
- )
- // +onecloud:swagger-gen-model-singular=secgrouprule
- // +onecloud:swagger-gen-model-plural=secgrouprules
- type SSecurityGroupRuleManager struct {
- db.SResourceBaseManager
- db.SStatusResourceBaseManager
- db.SExternalizedResourceBaseManager
- SSecurityGroupResourceBaseManager
- }
- var SecurityGroupRuleManager *SSecurityGroupRuleManager
- func init() {
- SecurityGroupRuleManager = &SSecurityGroupRuleManager{
- SResourceBaseManager: db.NewResourceBaseManager(
- SSecurityGroupRule{},
- "secgrouprules_tbl",
- "secgrouprule",
- "secgrouprules",
- ),
- }
- SecurityGroupRuleManager.SetVirtualObject(SecurityGroupRuleManager)
- }
- type SSecurityGroupRule struct {
- db.SResourceBase
- db.SStatusResourceBase `default:"available"`
- db.SExternalizedResourceBase
- SSecurityGroupResourceBase `create:"required"`
- Id string `width:"128" charset:"ascii" primary:"true" list:"user"`
- Priority int `list:"user" update:"user" list:"user"`
- Protocol string `width:"32" charset:"ascii" nullable:"false" list:"user" update:"user" create:"required"`
- Ports string `width:"256" charset:"ascii" list:"user" update:"user" create:"optional"`
- Direction string `width:"3" charset:"ascii" list:"user" create:"required"`
- CIDR string `width:"256" charset:"ascii" list:"user" update:"user" create:"optional"`
- Action string `width:"5" charset:"ascii" nullable:"false" list:"user" update:"user" create:"required"`
- Description string `width:"256" charset:"utf8" list:"user" update:"user" create:"optional"`
- }
- func (self *SSecurityGroupRule) GetId() string {
- return self.Id
- }
- func (manager *SSecurityGroupRuleManager) CreateByInsertOrUpdate() bool {
- return false
- }
- func (manager *SSecurityGroupRuleManager) FetchUniqValues(ctx context.Context, data jsonutils.JSONObject) jsonutils.JSONObject {
- secgroupId, _ := data.GetString("secgroup_id")
- return jsonutils.Marshal(map[string]string{"secgroup_id": secgroupId})
- }
- func (manager *SSecurityGroupRuleManager) FilterByUniqValues(q *sqlchemy.SQuery, values jsonutils.JSONObject) *sqlchemy.SQuery {
- secgroupId, _ := values.GetString("secgroup_id")
- if len(secgroupId) > 0 {
- q = q.Equals("secgroup_id", secgroupId)
- }
- return q
- }
- func (manager *SSecurityGroupRuleManager) FetchOwnerId(ctx context.Context, data jsonutils.JSONObject) (mcclient.IIdentityProvider, error) {
- secgroupId, _ := data.GetString("secgroup_id")
- if len(secgroupId) > 0 {
- secgroup, err := db.FetchById(SecurityGroupManager, secgroupId)
- if err != nil {
- return nil, errors.Wrapf(err, "db.FetchById(SecurityGroupManager, %s)", secgroupId)
- }
- return secgroup.(*SSecurityGroup).GetOwnerId(), nil
- }
- return db.FetchProjectInfo(ctx, data)
- }
- func (manager *SSecurityGroupRuleManager) FilterByOwner(ctx context.Context, q *sqlchemy.SQuery, man db.FilterByOwnerProvider, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, scope rbacscope.TRbacScope) *sqlchemy.SQuery {
- sq := SecurityGroupManager.Query("id")
- sq = db.SharableManagerFilterByOwner(ctx, SecurityGroupManager, sq, userCred, ownerId, scope)
- return q.In("secgroup_id", sq.SubQuery())
- }
- func (manager *SSecurityGroupRuleManager) FilterById(q *sqlchemy.SQuery, idStr string) *sqlchemy.SQuery {
- return q.Equals("id", idStr)
- }
- func (manager *SSecurityGroupRuleManager) FilterByName(q *sqlchemy.SQuery, idStr string) *sqlchemy.SQuery {
- return q.Equals("id", idStr)
- }
- // 安全组规则列表
- func (manager *SSecurityGroupRuleManager) ListItemFilter(
- ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- query api.SecurityGroupRuleListInput,
- ) (*sqlchemy.SQuery, error) {
- sql, err := manager.SResourceBaseManager.ListItemFilter(ctx, q, userCred, query.ResourceBaseListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SResourceBaseManager.ListItemFilter")
- }
- q, err = manager.SExternalizedResourceBaseManager.ListItemFilter(ctx, q, userCred, query.ExternalizedResourceBaseListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SExternalizedResourceBaseManager.ListItemFilter")
- }
- sql, err = manager.SSecurityGroupResourceBaseManager.ListItemFilter(ctx, q, userCred, query.SecgroupFilterListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SSecurityGroupResourceBaseManager.ListItemFilter")
- }
- if len(query.Projects) > 0 {
- sq := SecurityGroupManager.Query("id")
- tenants := db.TenantCacheManager.GetTenantQuery().SubQuery()
- subq := tenants.Query(tenants.Field("id")).Filter(sqlchemy.OR(
- sqlchemy.In(tenants.Field("id"), query.Projects),
- sqlchemy.In(tenants.Field("name"), query.Projects),
- )).SubQuery()
- sq = sq.In("tenant_id", subq)
- sql = sql.In("secgroup_id", sq.SubQuery())
- }
- if len(query.Direction) > 0 {
- sql = sql.Equals("direction", query.Direction)
- }
- if len(query.Action) > 0 {
- sql = sql.Equals("action", query.Action)
- }
- if len(query.Protocol) > 0 {
- sql = sql.Equals("protocol", query.Protocol)
- }
- if len(query.Ports) > 0 {
- sql = sql.Equals("ports", query.Ports)
- }
- if len(query.Ip) > 0 {
- sql = sql.Like("cidr", "%"+query.Ip+"%")
- }
- return sql, nil
- }
- func (manager *SSecurityGroupRuleManager) FetchCustomizeColumns(
- ctx context.Context,
- userCred mcclient.TokenCredential,
- query jsonutils.JSONObject,
- objs []interface{},
- fields stringutils2.SSortedStrings,
- isList bool,
- ) []api.SecgroupRuleDetails {
- rows := make([]api.SecgroupRuleDetails, len(objs))
- bRows := manager.SResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
- secRows := manager.SSecurityGroupResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
- secIds := make([]string, len(objs))
- for i := range rows {
- rows[i] = api.SecgroupRuleDetails{
- ResourceBaseDetails: bRows[i],
- SecurityGroupResourceInfo: secRows[i],
- }
- rule := objs[i].(*SSecurityGroupRule)
- secIds[i] = rule.SecgroupId
- }
- secgroups := make(map[string]SSecurityGroup)
- err := db.FetchStandaloneObjectsByIds(SecurityGroupManager, secIds, &secgroups)
- if err != nil {
- log.Errorf("FetchStandaloneObjectsByIds fail: %v", err)
- return rows
- }
- virObjs := make([]interface{}, len(objs))
- for i := range rows {
- if secgroup, ok := secgroups[secIds[i]]; ok {
- virObjs[i] = &secgroup
- rows[i].ProjectId = secgroup.ProjectId
- }
- }
- projRows := SecurityGroupManager.SProjectizedResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, virObjs, fields, isList)
- for i := range rows {
- rows[i].ProjectizedResourceInfo = projRows[i]
- }
- return rows
- }
- func (manager *SSecurityGroupRuleManager) OrderByExtraFields(
- ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- query api.SecurityGroupRuleListInput,
- ) (*sqlchemy.SQuery, error) {
- var err error
- q, err = manager.SResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.ResourceBaseListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SResourceBaseManager.OrderByExtraFields")
- }
- q, err = manager.SSecurityGroupResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.SecgroupFilterListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SSecurityGroupResourceBaseManager.OrderByExtraFields")
- }
- return q, nil
- }
- func (manager *SSecurityGroupRuleManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
- var err error
- q, err = manager.SResourceBaseManager.QueryDistinctExtraField(q, field)
- if err == nil {
- return q, nil
- }
- q, err = manager.SSecurityGroupResourceBaseManager.QueryDistinctExtraField(q, field)
- if err == nil {
- return q, nil
- }
- return q, httperrors.ErrNotFound
- }
- func (manager *SSecurityGroupRuleManager) QueryDistinctExtraFields(q *sqlchemy.SQuery, resource string, fields []string) (*sqlchemy.SQuery, error) {
- var err error
- q, err = manager.SSecurityGroupResourceBaseManager.QueryDistinctExtraFields(q, resource, fields)
- if err == nil {
- return q, nil
- }
- return q, httperrors.ErrNotFound
- }
- func (self *SSecurityGroupRule) Delete(ctx context.Context, userCred mcclient.TokenCredential) error {
- return nil
- }
- func (self *SSecurityGroupRule) RealDelete(ctx context.Context, userCred mcclient.TokenCredential) error {
- return db.DeleteModel(ctx, userCred, self)
- }
- func (self *SSecurityGroupRule) BeforeInsert() {
- if len(self.Id) == 0 {
- self.Id = stringutils.UUID4()
- }
- }
- func (manager *SSecurityGroupRuleManager) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, input *api.SSecgroupRuleCreateInput) (*api.SSecgroupRuleCreateInput, error) {
- _secgroup, err := validators.ValidateModel(ctx, userCred, SecurityGroupManager, &input.SecgroupId)
- if err != nil {
- return input, err
- }
- input.Status = apis.STATUS_CREATING
- secgroup := _secgroup.(*SSecurityGroup)
- driver, err := secgroup.GetRegionDriver()
- if err != nil {
- return nil, err
- }
- opts := &api.SSecgroupCreateInput{}
- opts.Rules = []api.SSecgroupRuleCreateInput{*input}
- _, err = driver.ValidateCreateSecurityGroupInput(ctx, userCred, opts)
- if err != nil {
- return nil, err
- }
- if !secgroup.IsOwner(userCred) && !userCred.HasSystemAdminPrivilege() {
- return input, httperrors.NewForbiddenError("not enough privilege")
- }
- input.ResourceBaseCreateInput, err = manager.SResourceBaseManager.ValidateCreateData(ctx, userCred, ownerId, query, input.ResourceBaseCreateInput)
- if err != nil {
- return input, err
- }
- return input, nil
- }
- func (self *SSecurityGroupRule) ValidateUpdateData(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.SSecgroupRuleUpdateInput) (*api.SSecgroupRuleUpdateInput, error) {
- secgrp, err := self.GetSecGroup()
- if err != nil {
- return nil, err
- }
- if input.CIDR == nil {
- // input.CIDR = &self.CIDR
- }
- driver, err := secgrp.GetRegionDriver()
- if err != nil {
- return nil, err
- }
- input, err = driver.ValidateUpdateSecurityGroupRuleInput(ctx, userCred, input)
- if err != nil {
- return nil, err
- }
- input.ResourceBaseUpdateInput, err = self.SResourceBase.ValidateUpdateData(ctx, userCred, query, input.ResourceBaseUpdateInput)
- if err != nil {
- return input, errors.Wrap(err, "SResourceBase.ValidateUpdateData")
- }
- return input, nil
- }
- func (self *SSecurityGroupRule) String() string {
- rule, err := self.toRule()
- if err != nil {
- return ""
- }
- return rule.String()
- }
- func (self *SSecurityGroupRule) toRule() (*secrules.SecurityRule, error) {
- rule := secrules.SecurityRule{
- Priority: int(self.Priority),
- Direction: secrules.TSecurityRuleDirection(self.Direction),
- Action: secrules.TSecurityRuleAction(self.Action),
- Protocol: self.Protocol,
- Description: self.Description,
- }
- if regutils.MatchCIDR(self.CIDR) || regutils.MatchCIDR6(self.CIDR) {
- _, rule.IPNet, _ = net.ParseCIDR(self.CIDR)
- } else if regutils.MatchIP4Addr(self.CIDR) {
- rule.IPNet = &net.IPNet{
- IP: net.ParseIP(self.CIDR),
- Mask: net.CIDRMask(32, 32),
- }
- } else if regutils.MatchIP6Addr(self.CIDR) {
- rule.IPNet = &net.IPNet{
- IP: net.ParseIP(self.CIDR),
- Mask: net.CIDRMask(128, 128),
- }
- } else {
- // any
- rule.IPNet = nil
- /* &net.IPNet{
- IP: net.IPv4zero,
- Mask: net.CIDRMask(0, 32),
- } */
- }
- err := rule.ParsePorts(self.Ports)
- if err != nil {
- return nil, err
- }
- return &rule, rule.ValidateRule()
- }
- func (self *SSecurityGroupRule) PostCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) {
- self.SResourceBase.PostCreate(ctx, userCred, ownerId, query, data)
- log.Debugf("POST Create %s", data)
- if secgroup, _ := self.GetSecGroup(); secgroup != nil {
- logclient.AddSimpleActionLog(secgroup, logclient.ACT_ALLOCATE, data, userCred, true)
- if len(secgroup.ManagerId) == 0 {
- self.SetStatus(ctx, userCred, apis.STATUS_AVAILABLE, "")
- secgroup.DoSync(ctx, userCred)
- return
- }
- secgroup.StartSecurityGroupRuleCreateTask(ctx, userCred, self.Id, "")
- }
- }
- func (self *SSecurityGroupRule) PreDelete(ctx context.Context, userCred mcclient.TokenCredential) {
- self.SResourceBase.PreDelete(ctx, userCred)
- if secgroup, _ := self.GetSecGroup(); secgroup != nil {
- logclient.AddSimpleActionLog(secgroup, logclient.ACT_DELETE, jsonutils.Marshal(self), userCred, true)
- if len(secgroup.ManagerId) == 0 {
- self.RealDelete(ctx, userCred)
- secgroup.DoSync(ctx, userCred)
- return
- }
- self.SetStatus(ctx, userCred, apis.STATUS_DELETING, "")
- secgroup.StartSecurityGroupRuleDeleteTask(ctx, userCred, self.Id, "")
- }
- }
- func (self *SSecurityGroupRule) PostUpdate(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) {
- self.SResourceBase.PostUpdate(ctx, userCred, query, data)
- if self.Protocol == secrules.PROTO_ICMP || self.Protocol == secrules.PROTO_ANY {
- db.Update(self, func() error {
- self.Ports = ""
- return nil
- })
- }
- log.Debugf("POST Update %s", data)
- if secgroup, _ := self.GetSecGroup(); secgroup != nil {
- logclient.AddSimpleActionLog(secgroup, logclient.ACT_UPDATE, data, userCred, true)
- if len(secgroup.ManagerId) == 0 {
- secgroup.DoSync(ctx, userCred)
- return
- }
- self.SetStatus(ctx, userCred, apis.STATUS_SYNC_STATUS, "")
- secgroup.StartSecurityGroupRuleUpdateTask(ctx, userCred, self.Id, "")
- }
- }
- func (self *SSecurityGroup) StartSecurityGroupRuleUpdateTask(ctx context.Context, userCred mcclient.TokenCredential, ruleId, parentTaskId string) error {
- params := jsonutils.NewDict()
- params.Set("rule_id", jsonutils.NewString(ruleId))
- task, err := taskman.TaskManager.NewTask(ctx, "SecurityGroupRuleUpdateTask", self, userCred, params, parentTaskId, "", nil)
- if err != nil {
- return errors.Wrapf(err, "NewTask")
- }
- return task.ScheduleRun(nil)
- }
- func (manager *SSecurityGroupRuleManager) getRulesBySecurityGroup(secgroup *SSecurityGroup) ([]SSecurityGroupRule, error) {
- rules := make([]SSecurityGroupRule, 0)
- q := manager.Query().Equals("secgroup_id", secgroup.Id)
- if err := db.FetchModelObjects(manager, q, &rules); err != nil {
- return nil, err
- }
- return rules, nil
- }
- func (self *SSecurityGroupRule) GetOwnerId() mcclient.IIdentityProvider {
- secgrp, _ := self.GetSecGroup()
- if secgrp != nil {
- return secgrp.GetOwnerId()
- }
- return nil
- }
- func (manager *SSecurityGroupRuleManager) ResourceScope() rbacscope.TRbacScope {
- return rbacscope.ScopeProject
- }
- func (manager *SSecurityGroupRuleManager) ListItemExportKeys(ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- keys stringutils2.SSortedStrings,
- ) (*sqlchemy.SQuery, error) {
- var err error
- q, err = manager.SResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
- if err != nil {
- return nil, errors.Wrap(err, "SResourceBaseManager.ListItemExportKeys")
- }
- q, err = manager.SSecurityGroupResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
- if err != nil {
- return nil, errors.Wrap(err, "SSecurityGroupResourceBaseManager.ListItemExportKeys")
- }
- return q, nil
- }
- func (self *SSecurityGroup) SyncRules(
- ctx context.Context,
- userCred mcclient.TokenCredential,
- exts []cloudprovider.ISecurityGroupRule,
- ) compare.SyncResult {
- lockman.LockRawObject(ctx, SecurityGroupManager.Keyword(), self.Id)
- defer lockman.ReleaseRawObject(ctx, SecurityGroupManager.Keyword(), self.Id)
- result := compare.SyncResult{}
- dbRules, err := self.GetSecurityRules()
- if err != nil {
- result.Error(err)
- return result
- }
- removed := make([]SSecurityGroupRule, 0)
- commondb := make([]SSecurityGroupRule, 0)
- commonext := make([]cloudprovider.ISecurityGroupRule, 0)
- added := make([]cloudprovider.ISecurityGroupRule, 0)
- err = compare.CompareSets(dbRules, exts, &removed, &commondb, &commonext, &added)
- if err != nil {
- result.Error(err)
- return result
- }
- for i := 0; i < len(removed); i += 1 {
- err = removed[i].RealDelete(ctx, userCred)
- if err != nil {
- result.DeleteError(err)
- continue
- }
- result.Delete()
- }
- for i := 0; i < len(commondb); i += 1 {
- err = commondb[i].syncWithCloudRule(ctx, userCred, commonext[i])
- if err != nil {
- result.UpdateError(err)
- continue
- }
- result.Update()
- }
- for i := 0; i < len(added); i += 1 {
- err := self.newFromCloudRule(ctx, userCred, added[i])
- if err != nil {
- result.AddError(err)
- continue
- }
- result.Add()
- }
- return result
- }
- func (rule *SSecurityGroupRule) syncWithCloudRule(ctx context.Context, userCred mcclient.TokenCredential, ext cloudprovider.ISecurityGroupRule) error {
- _, err := db.Update(rule, func() error {
- rule.Action = string(ext.GetAction())
- rule.Direction = string(ext.GetDirection())
- rule.Protocol = string(ext.GetProtocol())
- rule.Description = string(ext.GetDescription())
- rule.CIDR = strings.Join(ext.GetCIDRs(), ",")
- rule.Priority = ext.GetPriority()
- rule.Ports = ext.GetPorts()
- rule.Status = apis.STATUS_AVAILABLE
- return nil
- })
- return err
- }
- func (self *SSecurityGroup) newFromCloudRule(ctx context.Context, userCred mcclient.TokenCredential, ext cloudprovider.ISecurityGroupRule) error {
- rule := &SSecurityGroupRule{}
- rule.SetModelManager(SecurityGroupRuleManager, rule)
- rule.SecgroupId = self.Id
- rule.Action = string(ext.GetAction())
- rule.Direction = string(ext.GetDirection())
- rule.Protocol = string(ext.GetProtocol())
- rule.Description = string(ext.GetDescription())
- rule.CIDR = strings.Join(ext.GetCIDRs(), ",")
- rule.Priority = ext.GetPriority()
- rule.Ports = ext.GetPorts()
- rule.ExternalId = ext.GetGlobalId()
- rule.Status = apis.STATUS_AVAILABLE
- return SecurityGroupRuleManager.TableSpec().Insert(ctx, rule)
- }
- func (self *SSecurityGroupRule) SetStatus(ctx context.Context, userCred mcclient.TokenCredential, status, reason string) error {
- if self.Status == status {
- return nil
- }
- _, err := db.Update(self, func() error {
- self.Status = status
- return nil
- })
- return err
- }
- func (manager *SSecurityGroupRuleManager) FetchRuleById(id string) (*SSecurityGroupRule, error) {
- rule, err := db.FetchById(manager, id)
- if err != nil {
- return nil, errors.Wrapf(err, "FetchById(%s)", id)
- }
- return rule.(*SSecurityGroupRule), nil
- }
|