| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package models
- import (
- "context"
- "crypto/tls"
- "database/sql"
- "fmt"
- "strings"
- "sync"
- "time"
- "yunion.io/x/jsonutils"
- "yunion.io/x/log"
- "yunion.io/x/pkg/errors"
- "yunion.io/x/pkg/gotypes"
- "yunion.io/x/pkg/tristate"
- "yunion.io/x/sqlchemy"
- "yunion.io/x/onecloud/pkg/apis"
- api "yunion.io/x/onecloud/pkg/apis/identity"
- "yunion.io/x/onecloud/pkg/cloudcommon/db"
- "yunion.io/x/onecloud/pkg/cloudcommon/etcd"
- "yunion.io/x/onecloud/pkg/cloudcommon/informer"
- "yunion.io/x/onecloud/pkg/httperrors"
- "yunion.io/x/onecloud/pkg/keystone/options"
- "yunion.io/x/onecloud/pkg/mcclient"
- "yunion.io/x/onecloud/pkg/util/logclient"
- "yunion.io/x/onecloud/pkg/util/seclib2"
- "yunion.io/x/onecloud/pkg/util/stringutils2"
- )
- type SEndpointManager struct {
- db.SStandaloneResourceBaseManager
- SServiceResourceBaseManager
- SRegionResourceBaseManager
- informerBackends map[string]informer.IInformerBackend
- informerSetter sync.Once
- }
- var EndpointManager *SEndpointManager
- func init() {
- EndpointManager = &SEndpointManager{
- SStandaloneResourceBaseManager: db.NewStandaloneResourceBaseManager(
- SEndpoint{},
- "endpoint",
- "endpoint",
- "endpoints",
- ),
- }
- EndpointManager.SetVirtualObject(EndpointManager)
- }
- /*
- +--------------------+--------------+------+-----+---------+-------+
- | Field | Type | Null | Key | Default | Extra |
- +--------------------+--------------+------+-----+---------+-------+
- | id | varchar(64) | NO | PRI | NULL | |
- | legacy_endpoint_id | varchar(64) | YES | | NULL | |
- | interface | varchar(8) | NO | | NULL | |
- | service_id | varchar(64) | NO | MUL | NULL | |
- | url | text | NO | | NULL | |
- | extra | text | YES | | NULL | |
- | enabled | tinyint(1) | NO | | 1 | |
- | region_id | varchar(255) | YES | MUL | NULL | |
- | created_at | datetime | YES | | NULL | |
- +--------------------+--------------+------+-----+---------+-------+
- */
- type SEndpoint struct {
- db.SStandaloneResourceBase
- LegacyEndpointId string `width:"64" charset:"ascii" nullable:"true"`
- Interface string `width:"8" charset:"ascii" nullable:"false" list:"admin" create:"admin_required"`
- ServiceId string `width:"64" charset:"ascii" nullable:"false" list:"admin" create:"admin_required"`
- Url string `charset:"utf8" nullable:"false" list:"admin" update:"admin" create:"admin_required"`
- Extra *jsonutils.JSONDict `nullable:"true"`
- Enabled tristate.TriState `default:"true" list:"admin" update:"admin" create:"admin_optional"`
- RegionId string `width:"255" charset:"utf8" nullable:"true" list:"admin" create:"admin_required"`
- ServiceCertificateId string `nullable:"true" create:"admin_optional" update:"admin"`
- }
- func (manager *SEndpointManager) InitializeData() error {
- q := manager.Query()
- q = q.IsNullOrEmpty("name")
- eps := make([]SEndpoint, 0)
- err := db.FetchModelObjects(manager, q, &eps)
- if err != nil {
- return err
- }
- for i := range eps {
- if gotypes.IsNil(eps[i].Extra) {
- continue
- }
- name, _ := eps[i].Extra.GetString("name")
- desc, _ := eps[i].Extra.GetString("description")
- if len(name) == 0 {
- serv := eps[i].getService()
- if serv != nil {
- name = fmt.Sprintf("%s-%s", serv.Type, eps[i].Interface)
- }
- }
- if len(name) > 0 {
- db.Update(&eps[i], func() error {
- eps[i].Name = name
- eps[i].Description = desc
- return nil
- })
- }
- }
- if err := manager.SetInformerBackend(); err != nil {
- log.Errorf("init informer backend error: %v", err)
- }
- return nil
- }
- func (manager *SEndpointManager) SetInformerBackend() error {
- informerEp, err := manager.fetchInformerEndpoint()
- if err != nil {
- return errors.Wrap(err, "fetch informer endpoint")
- }
- manager.SetInformerBackendUntilSuccess(informerEp)
- return nil
- }
- func (manager *SEndpointManager) getSessionEndpointType() string {
- epType := api.EndpointInterfaceInternal
- if options.Options.SessionEndpointType != "" {
- epType = options.Options.SessionEndpointType
- }
- return epType
- }
- func (manager *SEndpointManager) IsEtcdInformerBackend(ep *SEndpoint) bool {
- if ep == nil {
- return false
- }
- svc := ep.getService()
- if svc == nil {
- return false
- }
- if svc.GetName() != apis.SERVICE_TYPE_ETCD {
- return false
- }
- epType := manager.getSessionEndpointType()
- if ep.Interface != epType {
- return false
- }
- return true
- }
- func (manager *SEndpointManager) SetInformerBackendUntilSuccess(ep *SEndpoint) {
- if informer.GetDefaultBackend() != nil {
- log.Infof("Informer backend has been setted")
- return
- }
- manager.informerSetter.Do(func() {
- go func() {
- for {
- if err := manager.SetEtcdInformerBackend(ep); err != nil {
- log.Errorf("Set etcd informer backend failed: %s", err)
- time.Sleep(time.Second * 30)
- } else {
- break
- }
- }
- }()
- })
- }
- func (manager *SEndpointManager) SetInformerBackendByEndpoint(ep *SEndpoint) {
- if !manager.IsEtcdInformerBackend(ep) {
- return
- }
- manager.SetInformerBackendUntilSuccess(ep)
- }
- func (manager *SEndpointManager) fetchInformerEndpoint() (*SEndpoint, error) {
- epType := manager.getSessionEndpointType()
- endpoints := manager.Query().SubQuery()
- services := ServiceManager.Query().SubQuery()
- regions := RegionManager.Query().SubQuery()
- q := endpoints.Query()
- q = q.Join(regions, sqlchemy.Equals(endpoints.Field("region_id"), regions.Field("id")))
- q = q.Join(services, sqlchemy.Equals(endpoints.Field("service_id"), services.Field("id")))
- q = q.Filter(sqlchemy.AND(
- sqlchemy.Equals(endpoints.Field("interface"), epType),
- sqlchemy.IsTrue(endpoints.Field("enabled"))))
- q = q.Filter(sqlchemy.AND(
- sqlchemy.IsTrue(services.Field("enabled")),
- sqlchemy.Equals(services.Field("type"), apis.SERVICE_TYPE_ETCD)))
- informerEp := new(SEndpoint)
- if err := q.First(informerEp); err != nil {
- return nil, err
- }
- informerEp.SetModelManager(manager, informerEp)
- return informerEp, nil
- }
- func (manager *SEndpointManager) newEtcdInformerBackend(ep *SEndpoint) (informer.IInformerBackend, error) {
- useTLS := false
- var (
- tlsCfg *tls.Config
- )
- if ep.ServiceCertificateId != "" {
- useTLS = true
- cert, err := ep.getServiceCertificate()
- if err != nil {
- return nil, errors.Wrap(err, "get service certificate")
- }
- caData := []byte(cert.CaCertificate)
- certData := []byte(cert.Certificate)
- keyData := []byte(cert.PrivateKey)
- cfg, err := seclib2.InitTLSConfigByData(caData, certData, keyData)
- if err != nil {
- return nil, errors.Wrap(err, "build TLS config")
- }
- // always set insecure skip verify
- cfg.InsecureSkipVerify = true
- tlsCfg = cfg
- }
- opt := &etcd.SEtcdOptions{
- EtcdEndpoint: []string{ep.Url},
- EtcdTimeoutSeconds: 5,
- EtcdRequestTimeoutSeconds: 10,
- EtcdLeaseExpireSeconds: 5,
- }
- if useTLS {
- opt.TLSConfig = tlsCfg
- opt.EtcdEnabldSsl = true
- }
- return informer.NewEtcdBackend(opt, nil)
- }
- func (manager *SEndpointManager) SetEtcdInformerBackend(ep *SEndpoint) error {
- be, err := manager.newEtcdInformerBackend(ep)
- if err != nil {
- return errors.Wrap(err, "new etcd informer backend")
- }
- informer.Set(be)
- log.Infof("Informer set etcd backend success")
- return nil
- }
- func (ep *SEndpoint) getService() *SService {
- srvObj, err := ServiceManager.FetchById(ep.ServiceId)
- if err != nil {
- return nil
- }
- return srvObj.(*SService)
- }
- type SEndpointExtended struct {
- Id string `json:"id"`
- Name string `json:"name"`
- Interface string `json:"interface"`
- Url string `json:"url"`
- Region string `json:"region"`
- RegionId string `json:"region_id"`
- ServiceId string `json:"service_id"`
- ServiceType string `json:"service_type"`
- ServiceName string `json:"service_name"`
- }
- type SServiceCatalog []SEndpointExtended
- func (manager *SEndpointManager) FetchAll() (SServiceCatalog, error) {
- endpoints := manager.Query().SubQuery()
- services := ServiceManager.Query().SubQuery()
- regions := RegionManager.Query().SubQuery()
- q := endpoints.Query(
- endpoints.Field("id"),
- endpoints.Field("name"),
- endpoints.Field("interface"),
- endpoints.Field("url"),
- endpoints.Field("region_id"),
- regions.Field("name", "region"),
- endpoints.Field("service_id"),
- services.Field("type", "service_type"),
- services.Field("name", "service_name"),
- )
- q = q.Join(regions, sqlchemy.Equals(endpoints.Field("region_id"), regions.Field("id")))
- q = q.Join(services, sqlchemy.Equals(endpoints.Field("service_id"), services.Field("id")))
- q = q.Filter(sqlchemy.IsTrue(endpoints.Field("enabled")))
- q = q.Filter(sqlchemy.IsTrue(services.Field("enabled")))
- eps := make([]SEndpointExtended, 0)
- err := q.All(&eps)
- if err != nil && err != sql.ErrNoRows {
- return nil, err
- }
- return eps, nil
- }
- func (cata SServiceCatalog) GetKeystoneCatalogV3() mcclient.KeystoneServiceCatalogV3 {
- ksCata := make(map[string]mcclient.KeystoneServiceV3)
- for i := range cata {
- srvId := cata[i].ServiceId
- srv, ok := ksCata[srvId]
- if !ok {
- srv = mcclient.KeystoneServiceV3{
- Id: srvId,
- Name: cata[i].ServiceName,
- Type: cata[i].ServiceType,
- Endpoints: make([]mcclient.KeystoneEndpointV3, 0),
- }
- }
- ep := mcclient.KeystoneEndpointV3{
- Id: cata[i].Id,
- Name: cata[i].Name,
- Interface: cata[i].Interface,
- Region: cata[i].Region,
- RegionId: cata[i].RegionId,
- Url: cata[i].Url,
- }
- srv.Endpoints = append(srv.Endpoints, ep)
- ksCata[cata[i].ServiceId] = srv
- }
- results := make([]mcclient.KeystoneServiceV3, 0)
- for k := range ksCata {
- results = append(results, ksCata[k])
- }
- return results
- }
- func (cata SServiceCatalog) GetKeystoneCatalogV2() mcclient.KeystoneServiceCatalogV2 {
- ksCata := make(map[string]mcclient.KeystoneServiceV2)
- for i := range cata {
- srvId := cata[i].ServiceId
- srv, ok := ksCata[srvId]
- if !ok {
- srv = mcclient.KeystoneServiceV2{
- Name: cata[i].ServiceName,
- Type: cata[i].ServiceType,
- Endpoints: make([]mcclient.KeystoneEndpointV2, 0),
- }
- }
- findIdx := -1
- for j := range srv.Endpoints {
- if srv.Endpoints[j].Region == cata[i].RegionId {
- findIdx = j
- }
- }
- if findIdx < 0 {
- ep := mcclient.KeystoneEndpointV2{
- Id: cata[i].Id,
- Region: cata[i].RegionId,
- }
- srv.Endpoints = append(srv.Endpoints, ep)
- findIdx = len(srv.Endpoints) - 1
- }
- switch cata[i].Interface {
- case api.EndpointInterfacePublic:
- srv.Endpoints[findIdx].PublicURL = cata[i].Url
- case api.EndpointInterfaceInternal:
- srv.Endpoints[findIdx].InternalURL = cata[i].Url
- case api.EndpointInterfaceAdmin:
- srv.Endpoints[findIdx].AdminURL = cata[i].Url
- }
- ksCata[cata[i].ServiceId] = srv
- }
- results := make([]mcclient.KeystoneServiceV2, 0)
- for k := range ksCata {
- results = append(results, ksCata[k])
- }
- return results
- }
- func (endpoint *SEndpoint) getMoreDetails(details api.EndpointDetails) (api.EndpointDetails, error) {
- if len(endpoint.ServiceCertificateId) > 0 {
- cert, _ := endpoint.getServiceCertificate()
- if cert != nil {
- certOutput := cert.ToOutput()
- details.CertificateDetails = *certOutput
- }
- }
- return details, nil
- }
- func (endpoint *SEndpoint) getServiceCertificate() (*SServiceCertificate, error) {
- certId := endpoint.ServiceCertificateId
- if certId == "" {
- return nil, nil
- }
- icert, err := ServiceCertificateManager.FetchById(certId)
- if err != nil {
- return nil, err
- }
- return icert.(*SServiceCertificate), nil
- }
- func (manager *SEndpointManager) FetchCustomizeColumns(
- ctx context.Context,
- userCred mcclient.TokenCredential,
- query jsonutils.JSONObject,
- objs []interface{},
- fields stringutils2.SSortedStrings,
- isList bool,
- ) []api.EndpointDetails {
- rows := make([]api.EndpointDetails, len(objs))
- stdRows := manager.SStandaloneResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
- serviceIds := stringutils2.SSortedStrings{}
- for i := range objs {
- rows[i] = api.EndpointDetails{
- StandaloneResourceDetails: stdRows[i],
- }
- ep := objs[i].(*SEndpoint)
- serviceIds = stringutils2.Append(serviceIds, ep.ServiceId)
- ep.SetModelManager(manager, ep)
- rows[i], _ = ep.getMoreDetails(rows[i])
- }
- if len(fields) == 0 || fields.Contains("service_name") || fields.Contains("service_type") {
- svs := fetchServices(serviceIds)
- if svs != nil {
- for i := range rows {
- ep := objs[i].(*SEndpoint)
- if srv, ok := svs[ep.ServiceId]; ok {
- if len(fields) == 0 || fields.Contains("service_name") {
- rows[i].ServiceName = srv.Name
- }
- if len(fields) == 0 || fields.Contains("service_type") {
- rows[i].ServiceType = srv.Type
- }
- }
- }
- }
- }
- return rows
- }
- func fetchServices(srvIds []string) map[string]SService {
- q := ServiceManager.Query().In("id", srvIds)
- srvs := make([]SService, 0)
- err := db.FetchModelObjects(ServiceManager, q, &srvs)
- if err != nil {
- return nil
- }
- ret := make(map[string]SService)
- for i := range srvs {
- ret[srvs[i].Id] = srvs[i]
- }
- return ret
- }
- func (endpoint *SEndpoint) ValidateDeleteCondition(ctx context.Context, info jsonutils.JSONObject) error {
- if endpoint.Enabled.IsTrue() {
- return httperrors.NewInvalidStatusError("endpoint is enabled")
- }
- return endpoint.SStandaloneResourceBase.ValidateDeleteCondition(ctx, nil)
- }
- func (manager *SEndpointManager) ValidateCreateData(
- ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider,
- query jsonutils.JSONObject, data *jsonutils.JSONDict,
- ) (*jsonutils.JSONDict, error) {
- infname, _ := data.GetString("interface")
- if len(infname) == 0 {
- return nil, httperrors.NewInputParameterError("missing input field interface")
- }
- serviceStr := jsonutils.GetAnyString(data, []string{"service_id", "service"})
- if len(serviceStr) > 0 {
- servObj, err := ServiceManager.FetchByIdOrName(ctx, userCred, serviceStr)
- if err != nil {
- if err == sql.ErrNoRows {
- return nil, httperrors.NewResourceNotFoundError2(ServiceManager.Keyword(), serviceStr)
- } else {
- return nil, httperrors.NewGeneralError(err)
- }
- }
- service := servObj.(*SService)
- if !data.Contains("name") {
- nameStr := fmt.Sprintf("%s-%s", service.Type, infname)
- data.Set("name", jsonutils.NewString(nameStr))
- }
- data.Set("service_id", jsonutils.NewString(service.Id))
- } else {
- return nil, httperrors.NewInputParameterError("missing input field service/service_id")
- }
- if certId, _ := data.GetString("service_certificate"); len(certId) > 0 {
- cert, err := ServiceCertificateManager.FetchByIdOrName(ctx, userCred, certId)
- if err == sql.ErrNoRows {
- return nil, httperrors.NewNotFoundError("not found cert %s", certId)
- }
- if err != nil {
- return nil, err
- }
- data.Set("service_certificate_id", jsonutils.NewString(cert.GetId()))
- }
- input := apis.StandaloneResourceCreateInput{}
- err := data.Unmarshal(&input)
- if err != nil {
- return nil, httperrors.NewInternalServerError("unmarshal StandaloneResourceCreateInput fail %s", err)
- }
- input, err = manager.SStandaloneResourceBaseManager.ValidateCreateData(ctx, userCred, ownerId, query, input)
- if err != nil {
- return nil, err
- }
- data.Update(jsonutils.Marshal(input))
- return data, nil
- }
- // 服务地址列表
- func (manager *SEndpointManager) ListItemFilter(
- ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- query api.EndpointListInput,
- ) (*sqlchemy.SQuery, error) {
- q, err := manager.SStandaloneResourceBaseManager.ListItemFilter(ctx, q, userCred, query.StandaloneResourceListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SStandaloneResourceBaseManager.ListItemFilter")
- }
- q, err = manager.SServiceResourceBaseManager.ListItemFilter(ctx, q, userCred, query.ServiceFilterListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SServiceResourceBaseManager.ListItemFilter")
- }
- q, err = manager.SRegionResourceBaseManager.ListItemFilter(ctx, q, userCred, query.RegionFilterListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SRegionResourceBaseManager.ListItemFilter")
- }
- if query.Enabled != nil {
- if *query.Enabled {
- q = q.IsTrue("enabled")
- } else {
- q = q.IsFalse("enabled")
- }
- }
- if len(query.Interface) > 0 {
- infType := strings.TrimSuffix(query.Interface, "URL")
- q = q.Equals("interface", infType)
- }
- return q, nil
- }
- func (manager *SEndpointManager) OrderByExtraFields(
- ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- query api.EndpointListInput,
- ) (*sqlchemy.SQuery, error) {
- var err error
- q, err = manager.SStandaloneResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.StandaloneResourceListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SStandaloneResourceBaseManager.OrderByExtraFields")
- }
- if db.NeedOrderQuery([]string{query.OrderByService}) {
- services := ServiceManager.Query("id", "name").SubQuery()
- q = q.LeftJoin(services, sqlchemy.Equals(q.Field("service_id"), services.Field("id")))
- if sqlchemy.SQL_ORDER_ASC.Equals(query.OrderByService) {
- q = q.Asc(services.Field("name"))
- } else {
- q = q.Desc(services.Field("name"))
- }
- }
- return q, nil
- }
- func (manager *SEndpointManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
- var err error
- q, err = manager.SStandaloneResourceBaseManager.QueryDistinctExtraField(q, field)
- if err == nil {
- return q, nil
- }
- return q, httperrors.ErrNotFound
- }
- func (endpoint *SEndpoint) trySetInformerBackend() {
- EndpointManager.SetInformerBackendByEndpoint(endpoint)
- }
- func (endpoint *SEndpoint) PostCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) {
- endpoint.SStandaloneResourceBase.PostCreate(ctx, userCred, ownerId, query, data)
- logclient.AddActionLogWithContext(ctx, endpoint, logclient.ACT_CREATE, data, userCred, true)
- refreshDefaultClientServiceCatalog()
- endpoint.trySetInformerBackend()
- }
- func (endpoint *SEndpoint) PostUpdate(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) {
- endpoint.SStandaloneResourceBase.PostUpdate(ctx, userCred, query, data)
- logclient.AddActionLogWithContext(ctx, endpoint, logclient.ACT_UPDATE, data, userCred, true)
- refreshDefaultClientServiceCatalog()
- endpoint.trySetInformerBackend()
- }
- func (endpoint *SEndpoint) PostDelete(ctx context.Context, userCred mcclient.TokenCredential) {
- endpoint.SStandaloneResourceBase.PostDelete(ctx, userCred)
- logclient.AddActionLogWithContext(ctx, endpoint, logclient.ACT_DELETE, nil, userCred, true)
- refreshDefaultClientServiceCatalog()
- if EndpointManager.IsEtcdInformerBackend(endpoint) {
- // remove informer backend
- informer.Set(nil)
- }
- }
- func (endpoint *SEndpoint) ValidateUpdateData(
- ctx context.Context, userCred mcclient.TokenCredential,
- query jsonutils.JSONObject, data *jsonutils.JSONDict,
- ) (*jsonutils.JSONDict, error) {
- if certId, _ := data.GetString("service_certificate"); len(certId) > 0 {
- cert, err := ServiceCertificateManager.FetchByIdOrName(ctx, userCred, certId)
- if err == sql.ErrNoRows {
- return nil, httperrors.NewNotFoundError("not found cert %s", certId)
- }
- if err != nil {
- return nil, err
- }
- data.Set("service_certificate_id", jsonutils.NewString(cert.GetId()))
- }
- return data, nil
- }
|