access_group_rules.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package models
  15. import (
  16. "context"
  17. "yunion.io/x/cloudmux/pkg/cloudprovider"
  18. "yunion.io/x/jsonutils"
  19. "yunion.io/x/pkg/errors"
  20. "yunion.io/x/pkg/util/rbacscope"
  21. "yunion.io/x/pkg/util/regutils"
  22. "yunion.io/x/pkg/utils"
  23. "yunion.io/x/sqlchemy"
  24. "yunion.io/x/onecloud/pkg/apis"
  25. api "yunion.io/x/onecloud/pkg/apis/compute"
  26. "yunion.io/x/onecloud/pkg/cloudcommon/db"
  27. "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
  28. "yunion.io/x/onecloud/pkg/cloudcommon/validators"
  29. "yunion.io/x/onecloud/pkg/httperrors"
  30. "yunion.io/x/onecloud/pkg/mcclient"
  31. "yunion.io/x/onecloud/pkg/util/stringutils2"
  32. )
  33. type SAccessGroupRuleManager struct {
  34. db.SStandaloneAnonResourceBaseManager
  35. SAccessGroupResourceBaseManager
  36. }
  37. var AccessGroupRuleManager *SAccessGroupRuleManager
  38. func init() {
  39. AccessGroupRuleManager = &SAccessGroupRuleManager{
  40. SStandaloneAnonResourceBaseManager: db.NewStandaloneAnonResourceBaseManager(
  41. SAccessGroupRule{},
  42. "access_group_rules_tbl",
  43. "access_group_rule",
  44. "access_group_rules",
  45. ),
  46. }
  47. AccessGroupRuleManager.SetVirtualObject(AccessGroupRuleManager)
  48. }
  49. type SAccessGroupRule struct {
  50. db.SStandaloneAnonResourceBase
  51. db.SStatusResourceBase `default:"available"`
  52. SAccessGroupResourceBase
  53. // 云上Id, 对应云上资源自身Id
  54. ExternalId string `width:"256" charset:"utf8" index:"true" list:"user" create:"domain_optional" update:"admin" json:"external_id"`
  55. Priority int `default:"1" list:"user" update:"user" list:"user"`
  56. Source string `width:"16" charset:"ascii" list:"user" update:"user" create:"required"`
  57. RWAccessType string `width:"16" charset:"ascii" list:"user" update:"user" create:"required"`
  58. UserAccessType string `width:"16" charset:"ascii" list:"user" update:"user" create:"required"`
  59. }
  60. func (manager *SAccessGroupRuleManager) ResourceScope() rbacscope.TRbacScope {
  61. return rbacscope.ScopeDomain
  62. }
  63. func (manager *SAccessGroupRuleManager) FetchUniqValues(ctx context.Context, data jsonutils.JSONObject) jsonutils.JSONObject {
  64. groupId, _ := data.GetString("access_group_id")
  65. return jsonutils.Marshal(map[string]string{"access_group_id": groupId})
  66. }
  67. func (manager *SAccessGroupRuleManager) FilterByUniqValues(q *sqlchemy.SQuery, values jsonutils.JSONObject) *sqlchemy.SQuery {
  68. groupId, _ := values.GetString("access_group_id")
  69. if len(groupId) > 0 {
  70. q = q.Equals("access_group_id", groupId)
  71. }
  72. return q
  73. }
  74. func (manager *SAccessGroupRuleManager) FetchOwnerId(ctx context.Context, data jsonutils.JSONObject) (mcclient.IIdentityProvider, error) {
  75. groupId, _ := data.GetString("access_group_id")
  76. if len(groupId) > 0 {
  77. accessGroup, err := db.FetchById(AccessGroupManager, groupId)
  78. if err != nil {
  79. return nil, errors.Wrapf(err, "db.FetchById(%s)", groupId)
  80. }
  81. return accessGroup.(*SAccessGroup).GetOwnerId(), nil
  82. }
  83. return db.FetchDomainInfo(ctx, data)
  84. }
  85. func (manager *SAccessGroupRuleManager) FilterByOwner(ctx context.Context, q *sqlchemy.SQuery, man db.FilterByOwnerProvider, userCred mcclient.TokenCredential, owner mcclient.IIdentityProvider, scope rbacscope.TRbacScope) *sqlchemy.SQuery {
  86. sq := AccessGroupManager.Query("id")
  87. sq = db.SharableManagerFilterByOwner(ctx, AccessGroupManager, sq, userCred, owner, scope)
  88. return q.In("access_group_id", sq.SubQuery())
  89. }
  90. func (manager *SAccessGroupRuleManager) FilterById(q *sqlchemy.SQuery, idStr string) *sqlchemy.SQuery {
  91. return q.Equals("id", idStr)
  92. }
  93. // 权限组规则列表
  94. func (manager *SAccessGroupRuleManager) ListItemFilter(
  95. ctx context.Context,
  96. q *sqlchemy.SQuery,
  97. userCred mcclient.TokenCredential,
  98. query api.AccessGroupRuleListInput,
  99. ) (*sqlchemy.SQuery, error) {
  100. var err error
  101. q, err = manager.SResourceBaseManager.ListItemFilter(ctx, q, userCred, query.ResourceBaseListInput)
  102. if err != nil {
  103. return nil, errors.Wrap(err, "SResourceBaseManager.ListItemFilter")
  104. }
  105. q, err = manager.SAccessGroupResourceBaseManager.ListItemFilter(ctx, q, userCred, query.AccessGroupFilterListInput)
  106. if err != nil {
  107. return nil, errors.Wrapf(err, "SAccessGroupResourceBaseManager.ListItemFilter")
  108. }
  109. return q, nil
  110. }
  111. func (manager *SAccessGroupRuleManager) FetchCustomizeColumns(
  112. ctx context.Context,
  113. userCred mcclient.TokenCredential,
  114. query jsonutils.JSONObject,
  115. objs []interface{},
  116. fields stringutils2.SSortedStrings,
  117. isList bool,
  118. ) []api.AccessGroupRuleDetails {
  119. rows := make([]api.AccessGroupRuleDetails, len(objs))
  120. bRows := manager.SResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  121. gRows := manager.SAccessGroupResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  122. for i := range rows {
  123. rows[i] = api.AccessGroupRuleDetails{
  124. ResourceBaseDetails: bRows[i],
  125. AccessGroupResourceInfo: gRows[i],
  126. }
  127. }
  128. return rows
  129. }
  130. func (manager *SAccessGroupRuleManager) OrderByExtraFields(
  131. ctx context.Context,
  132. q *sqlchemy.SQuery,
  133. userCred mcclient.TokenCredential,
  134. query api.AccessGroupRuleListInput,
  135. ) (*sqlchemy.SQuery, error) {
  136. var err error
  137. q, err = manager.SResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.ResourceBaseListInput)
  138. if err != nil {
  139. return nil, errors.Wrap(err, "SResourceBaseManager.OrderByExtraFields")
  140. }
  141. q, err = manager.SAccessGroupResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.AccessGroupFilterListInput)
  142. if err != nil {
  143. return nil, errors.Wrapf(err, "SAccessGroupResourceBaseManager.OrderByExtraFields")
  144. }
  145. return q, nil
  146. }
  147. func (manager *SAccessGroupRuleManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
  148. var err error
  149. q, err = manager.SResourceBaseManager.QueryDistinctExtraField(q, field)
  150. if err == nil {
  151. return q, nil
  152. }
  153. q, err = manager.SAccessGroupResourceBaseManager.QueryDistinctExtraField(q, field)
  154. if err == nil {
  155. return q, nil
  156. }
  157. return q, httperrors.ErrNotFound
  158. }
  159. func (self *SAccessGroupRule) Delete(ctx context.Context, userCred mcclient.TokenCredential) error {
  160. return nil
  161. }
  162. func (self *SAccessGroupRule) RealDelete(ctx context.Context, userCred mcclient.TokenCredential) error {
  163. return db.DeleteModel(ctx, userCred, self)
  164. }
  165. func (self *SAccessGroupRule) SyncWithAccessGroupRule(ctx context.Context, userCred mcclient.TokenCredential, ext cloudprovider.IAccessGroupRule) error {
  166. _, err := db.Update(self, func() error {
  167. self.ExternalId = ext.GetGlobalId()
  168. self.Source = ext.GetSource()
  169. self.RWAccessType = string(ext.GetRWAccessType())
  170. self.UserAccessType = string(ext.GetUserAccessType())
  171. self.Priority = ext.GetPriority()
  172. self.Status = apis.STATUS_AVAILABLE
  173. return nil
  174. })
  175. return err
  176. }
  177. // 创建权限组规则
  178. func (manager *SAccessGroupRuleManager) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, input api.AccessGroupRuleCreateInput) (api.AccessGroupRuleCreateInput, error) {
  179. if len(input.AccessGroupId) == 0 {
  180. return input, httperrors.NewMissingParameterError("access_group_id")
  181. }
  182. _ag, err := validators.ValidateModel(ctx, userCred, AccessGroupManager, &input.AccessGroupId)
  183. if err != nil {
  184. return input, err
  185. }
  186. ag := _ag.(*SAccessGroup)
  187. if !ag.IsOwner(userCred) && !userCred.HasSystemAdminPrivilege() {
  188. return input, httperrors.NewForbiddenError("not enough privilege")
  189. }
  190. if ag.Status != api.ACCESS_GROUP_STATUS_AVAILABLE {
  191. return input, httperrors.NewInvalidStatusError("access group %s status is not available", ag.Name)
  192. }
  193. if len(input.Source) == 0 {
  194. return input, httperrors.NewMissingParameterError("source")
  195. }
  196. if !regutils.MatchCIDR(input.Source) && !regutils.MatchIP4Addr(input.Source) {
  197. return input, httperrors.NewInputParameterError("invalid source %s", input.Source)
  198. }
  199. if input.Priority < 1 || input.Priority > 100 {
  200. return input, httperrors.NewOutOfRangeError("Invalid priority %d, must be in range or 1 ~ 100", input.Priority)
  201. }
  202. if len(input.RWAccessType) == 0 {
  203. return input, httperrors.NewMissingParameterError("rw_access_type")
  204. }
  205. if isIn, _ := utils.InArray(cloudprovider.TRWAccessType(input.RWAccessType), []cloudprovider.TRWAccessType{
  206. cloudprovider.RWAccessTypeR,
  207. cloudprovider.RWAccessTypeRW,
  208. }); !isIn {
  209. return input, httperrors.NewInputParameterError("invalid rw_access_type %s", input.RWAccessType)
  210. }
  211. if len(input.UserAccessType) == 0 {
  212. return input, httperrors.NewMissingParameterError("user_access_type")
  213. }
  214. if isIn, _ := utils.InArray(cloudprovider.TUserAccessType(input.UserAccessType), []cloudprovider.TUserAccessType{
  215. cloudprovider.UserAccessTypeAllSquash,
  216. cloudprovider.UserAccessTypeRootSquash,
  217. cloudprovider.UserAccessTypeNoRootSquash,
  218. }); !isIn {
  219. return input, httperrors.NewInputParameterError("invalid user_access_type %s", input.UserAccessType)
  220. }
  221. input.ResourceBaseCreateInput, err = manager.SResourceBaseManager.ValidateCreateData(ctx, userCred, ownerId, query, input.ResourceBaseCreateInput)
  222. if err != nil {
  223. return input, err
  224. }
  225. return input, nil
  226. }
  227. func (self *SAccessGroupRule) PostCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) {
  228. self.StartCreateTask(ctx, userCred)
  229. }
  230. func (self *SAccessGroupRule) SetName(name string) {
  231. }
  232. func (self *SAccessGroupRule) StartCreateTask(ctx context.Context, userCred mcclient.TokenCredential) error {
  233. task, err := taskman.TaskManager.NewTask(ctx, "AccessGroupRuleCreateTask", self, userCred, nil, "", "", nil)
  234. if err != nil {
  235. return errors.Wrapf(err, "NewTask")
  236. }
  237. return task.ScheduleRun(nil)
  238. }
  239. func (self *SAccessGroupRule) CustomizeDelete(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) error {
  240. return self.StartDeleteTask(ctx, userCred, "")
  241. }
  242. func (self *SAccessGroupRule) SetStatus(ctx context.Context, userCred mcclient.TokenCredential, status string, reason string) error {
  243. _, err := db.Update(self, func() error {
  244. self.Status = status
  245. return nil
  246. })
  247. return err
  248. }
  249. func (self *SAccessGroupRule) StartDeleteTask(ctx context.Context, userCred mcclient.TokenCredential, parentTaskId string) error {
  250. var err = func() error {
  251. task, err := taskman.TaskManager.NewTask(ctx, "AccessGroupRuleDeleteTask", self, userCred, nil, parentTaskId, "", nil)
  252. if err != nil {
  253. return errors.Wrapf(err, "NewTask")
  254. }
  255. return task.ScheduleRun(nil)
  256. }()
  257. if err != nil {
  258. self.SetStatus(ctx, userCred, apis.STATUS_DELETE_FAILED, err.Error())
  259. return nil
  260. }
  261. self.SetStatus(ctx, userCred, apis.STATUS_DELETING, "")
  262. return nil
  263. }
  264. func (self *SAccessGroupRule) ValidateUpdateData(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.AccessGroupRuleUpdateInput) (api.AccessGroupRuleUpdateInput, error) {
  265. if input.Priority != nil && *input.Priority < 1 || *input.Priority > 100 {
  266. return input, httperrors.NewOutOfRangeError("Invalid priority %d, must be in range or 1 ~ 100", input.Priority)
  267. }
  268. if len(input.Source) > 0 && !regutils.MatchCIDR(input.Source) {
  269. return input, httperrors.NewInputParameterError("invalid source %s", input.Source)
  270. }
  271. if isIn, _ := utils.InArray(cloudprovider.TRWAccessType(input.RWAccessType), []cloudprovider.TRWAccessType{
  272. cloudprovider.RWAccessTypeR,
  273. cloudprovider.RWAccessTypeRW,
  274. }); !isIn && len(input.RWAccessType) > 0 {
  275. return input, httperrors.NewInputParameterError("invalid rw_access_type %s", input.RWAccessType)
  276. }
  277. if isIn, _ := utils.InArray(cloudprovider.TUserAccessType(input.UserAccessType), []cloudprovider.TUserAccessType{
  278. cloudprovider.UserAccessTypeAllSquash,
  279. cloudprovider.UserAccessTypeRootSquash,
  280. cloudprovider.UserAccessTypeNoRootSquash,
  281. }); !isIn && len(input.UserAccessType) > 0 {
  282. return input, httperrors.NewInputParameterError("invalid user_access_type %s", input.UserAccessType)
  283. }
  284. return input, nil
  285. }
  286. func (self *SAccessGroupRule) GetOwnerId() mcclient.IIdentityProvider {
  287. group, err := self.GetAccessGroup()
  288. if err != nil {
  289. return nil
  290. }
  291. return group.GetOwnerId()
  292. }
  293. func (manager *SAccessGroupRuleManager) ListItemExportKeys(ctx context.Context,
  294. q *sqlchemy.SQuery,
  295. userCred mcclient.TokenCredential,
  296. keys stringutils2.SSortedStrings,
  297. ) (*sqlchemy.SQuery, error) {
  298. var err error
  299. q, err = manager.SResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  300. if err != nil {
  301. return nil, errors.Wrap(err, "SResourceBaseManager.ListItemExportKeys")
  302. }
  303. q, err = manager.SAccessGroupResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  304. if err != nil {
  305. return nil, errors.Wrapf(err, "SAccessGroupResourceBaseManager.ListItemExportKeys")
  306. }
  307. return q, nil
  308. }
  309. func (self *SAccessGroupRule) ValidateDeleteCondition(ctx context.Context, info jsonutils.JSONObject) error {
  310. return self.SResourceBase.ValidateDeleteCondition(ctx, nil)
  311. }