access_groups.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package models
  15. import (
  16. "context"
  17. "yunion.io/x/cloudmux/pkg/cloudprovider"
  18. "yunion.io/x/jsonutils"
  19. "yunion.io/x/log"
  20. "yunion.io/x/pkg/errors"
  21. "yunion.io/x/pkg/util/compare"
  22. "yunion.io/x/sqlchemy"
  23. "yunion.io/x/onecloud/pkg/apis"
  24. api "yunion.io/x/onecloud/pkg/apis/compute"
  25. "yunion.io/x/onecloud/pkg/cloudcommon/db"
  26. "yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
  27. "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
  28. "yunion.io/x/onecloud/pkg/cloudcommon/validators"
  29. "yunion.io/x/onecloud/pkg/httperrors"
  30. "yunion.io/x/onecloud/pkg/mcclient"
  31. "yunion.io/x/onecloud/pkg/util/stringutils2"
  32. )
  33. type SAccessGroupManager struct {
  34. db.SStatusInfrasResourceBaseManager
  35. db.SExternalizedResourceBaseManager
  36. SManagedResourceBaseManager
  37. SCloudregionResourceBaseManager
  38. }
  39. var AccessGroupManager *SAccessGroupManager
  40. func init() {
  41. AccessGroupManager = &SAccessGroupManager{
  42. SStatusInfrasResourceBaseManager: db.NewStatusInfrasResourceBaseManager(
  43. SAccessGroup{},
  44. "access_groups_tbl",
  45. "access_group",
  46. "access_groups",
  47. ),
  48. }
  49. AccessGroupManager.SetVirtualObject(AccessGroupManager)
  50. }
  51. type SAccessGroup struct {
  52. db.SStatusInfrasResourceBase
  53. db.SExternalizedResourceBase
  54. SCloudregionResourceBase
  55. SManagedResourceBase
  56. // 已关联的挂载点数量
  57. MountTargetCount int `nullable:"false" list:"user" json:"mount_target_count"`
  58. FileSystemType string `width:"16" charset:"ascii" nullable:"false" index:"true" list:"user"`
  59. NetworkType string `width:"8" charset:"ascii" nullable:"false" index:"true" list:"user" default:"vpc"`
  60. }
  61. func (manager *SAccessGroupManager) ListItemFilter(
  62. ctx context.Context,
  63. q *sqlchemy.SQuery,
  64. userCred mcclient.TokenCredential,
  65. query api.AccessGroupListInput,
  66. ) (*sqlchemy.SQuery, error) {
  67. var err error
  68. q, err = manager.SStatusInfrasResourceBaseManager.ListItemFilter(ctx, q, userCred, query.StatusInfrasResourceBaseListInput)
  69. if err != nil {
  70. return nil, errors.Wrapf(err, "SStatusInfrasResourceBaseManager.ListItemFilter")
  71. }
  72. q, err = manager.SExternalizedResourceBaseManager.ListItemFilter(ctx, q, userCred, query.ExternalizedResourceBaseListInput)
  73. if err != nil {
  74. return nil, errors.Wrapf(err, "SExternalizedResourceBaseManager.ListItemFilter")
  75. }
  76. q, err = manager.SManagedResourceBaseManager.ListItemFilter(ctx, q, userCred, query.ManagedResourceListInput)
  77. if err != nil {
  78. return nil, errors.Wrapf(err, "SManagedResourceBaseManager.ListItemFilter")
  79. }
  80. q, err = manager.SCloudregionResourceBaseManager.ListItemFilter(ctx, q, userCred, query.RegionalFilterListInput)
  81. if err != nil {
  82. return nil, errors.Wrapf(err, "SCloudregionResourceBaseManager.ListItemFilter")
  83. }
  84. return q, nil
  85. }
  86. func (manager SAccessGroupManager) FetchCustomizeColumns(
  87. ctx context.Context,
  88. userCred mcclient.TokenCredential,
  89. query jsonutils.JSONObject,
  90. objs []interface{},
  91. fields stringutils2.SSortedStrings,
  92. isList bool,
  93. ) []api.AccessGroupDetails {
  94. rows := make([]api.AccessGroupDetails, len(objs))
  95. stdRows := manager.SStatusInfrasResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  96. manRows := manager.SManagedResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  97. regRows := manager.SCloudregionResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  98. for i := range rows {
  99. rows[i] = api.AccessGroupDetails{
  100. StatusInfrasResourceBaseDetails: stdRows[i],
  101. ManagedResourceInfo: manRows[i],
  102. CloudregionResourceInfo: regRows[i],
  103. }
  104. }
  105. return rows
  106. }
  107. func (manager *SAccessGroupManager) ListItemExportKeys(ctx context.Context,
  108. q *sqlchemy.SQuery,
  109. userCred mcclient.TokenCredential,
  110. keys stringutils2.SSortedStrings,
  111. ) (*sqlchemy.SQuery, error) {
  112. var err error
  113. q, err = manager.SStatusInfrasResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  114. if err != nil {
  115. return nil, errors.Wrap(err, "SStatusInfrasResourceBaseManager.ListItemExportKeys")
  116. }
  117. if keys.ContainsAny(manager.SManagedResourceBaseManager.GetExportKeys()...) {
  118. q, err = manager.SManagedResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  119. if err != nil {
  120. return nil, errors.Wrap(err, "SManagedResourceBaseManager.ListItemExportKeys")
  121. }
  122. }
  123. if keys.ContainsAny(manager.SCloudregionResourceBaseManager.GetExportKeys()...) {
  124. q, err = manager.SCloudregionResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  125. if err != nil {
  126. return nil, errors.Wrap(err, "SCloudregionResourceBaseManager.ListItemExportKeys")
  127. }
  128. }
  129. return q, nil
  130. }
  131. func (manager *SAccessGroupManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
  132. var err error
  133. q, err = manager.SStatusInfrasResourceBaseManager.QueryDistinctExtraField(q, field)
  134. if err == nil {
  135. return q, nil
  136. }
  137. q, err = manager.SManagedResourceBaseManager.QueryDistinctExtraField(q, field)
  138. if err == nil {
  139. return q, nil
  140. }
  141. q, err = manager.SCloudregionResourceBaseManager.QueryDistinctExtraField(q, field)
  142. if err == nil {
  143. return q, nil
  144. }
  145. return q, nil
  146. }
  147. func (manager *SAccessGroupManager) QueryDistinctExtraFields(q *sqlchemy.SQuery, resource string, fields []string) (*sqlchemy.SQuery, error) {
  148. var err error
  149. q, err = manager.SManagedResourceBaseManager.QueryDistinctExtraFields(q, resource, fields)
  150. if err == nil {
  151. return q, nil
  152. }
  153. return q, httperrors.ErrNotFound
  154. }
  155. func (manager *SAccessGroupManager) OrderByExtraFields(
  156. ctx context.Context,
  157. q *sqlchemy.SQuery,
  158. userCred mcclient.TokenCredential,
  159. query api.AccessGroupListInput,
  160. ) (*sqlchemy.SQuery, error) {
  161. var err error
  162. q, err = manager.SStatusInfrasResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.StatusInfrasResourceBaseListInput)
  163. if err != nil {
  164. return nil, errors.Wrap(err, "SStatusInfrasResourceBaseManager.OrderByExtraFields")
  165. }
  166. q, err = manager.SManagedResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.ManagedResourceListInput)
  167. if err != nil {
  168. return nil, errors.Wrap(err, "SManagedResourceBaseManager.OrderByExtraFields")
  169. }
  170. q, err = manager.SCloudregionResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.RegionalFilterListInput)
  171. if err != nil {
  172. return nil, errors.Wrap(err, "SCloudregionResourceBaseManager.OrderByExtraFields")
  173. }
  174. return q, nil
  175. }
  176. func (self *SAccessGroup) GetChangeOwnerCandidateDomainIds() []string {
  177. return []string{}
  178. }
  179. func (self *SAccessGroup) GetAccessGroupRules() ([]SAccessGroupRule, error) {
  180. rules := []SAccessGroupRule{}
  181. q := AccessGroupRuleManager.Query().Equals("access_group_id", self.Id)
  182. err := db.FetchModelObjects(AccessGroupRuleManager, q, &rules)
  183. if err != nil {
  184. return nil, errors.Wrapf(err, "db.FetchModelObjects")
  185. }
  186. return rules, nil
  187. }
  188. func (manager *SAccessGroupManager) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, input *api.AccessGroupCreateInput) (*api.AccessGroupCreateInput, error) {
  189. var err error
  190. if len(input.CloudregionId) == 0 {
  191. return nil, httperrors.NewMissingParameterError("cloudregion_id")
  192. }
  193. _, err = validators.ValidateModel(ctx, userCred, CloudregionManager, &input.CloudregionId)
  194. if err != nil {
  195. return nil, err
  196. }
  197. _, err = validators.ValidateModel(ctx, userCred, CloudproviderManager, &input.CloudproviderId)
  198. if err != nil {
  199. return nil, err
  200. }
  201. input.ManagerId = input.CloudproviderId
  202. input.StatusInfrasResourceBaseCreateInput, err = manager.SStatusInfrasResourceBaseManager.ValidateCreateData(ctx, userCred, ownerId, query, input.StatusInfrasResourceBaseCreateInput)
  203. if err != nil {
  204. return input, err
  205. }
  206. input.Status = apis.STATUS_CREATING
  207. return input, nil
  208. }
  209. func (self *SAccessGroup) PostCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) {
  210. self.StartCreateTask(ctx, userCred)
  211. }
  212. func (self *SAccessGroup) StartCreateTask(ctx context.Context, userCred mcclient.TokenCredential) error {
  213. task, err := taskman.TaskManager.NewTask(ctx, "AccessGroupCreateTask", self, userCred, nil, "", "", nil)
  214. if err != nil {
  215. return errors.Wrapf(err, "NewTask")
  216. }
  217. return task.ScheduleRun(nil)
  218. }
  219. func (self *SAccessGroup) CustomizeDelete(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) error {
  220. return self.StartDeleteTask(ctx, userCred, "")
  221. }
  222. func (self *SAccessGroup) StartDeleteTask(ctx context.Context, userCred mcclient.TokenCredential, parentTaskId string) error {
  223. var err = func() error {
  224. task, err := taskman.TaskManager.NewTask(ctx, "AccessGroupDeleteTask", self, userCred, nil, parentTaskId, "", nil)
  225. if err != nil {
  226. return errors.Wrapf(err, "NewTask")
  227. }
  228. return task.ScheduleRun(nil)
  229. }()
  230. if err != nil {
  231. self.SetStatus(ctx, userCred, api.ACCESS_GROUP_STATUS_DELETE_FAILED, err.Error())
  232. return nil
  233. }
  234. self.SetStatus(ctx, userCred, api.ACCESS_GROUP_STATUS_DELETING, "")
  235. return nil
  236. }
  237. func (self *SAccessGroup) GetMountTargets() ([]SMountTarget, error) {
  238. mts := []SMountTarget{}
  239. q := MountTargetManager.Query().Equals("access_group_id", self.Id)
  240. err := db.FetchModelObjects(MountTargetManager, q, &mts)
  241. if err != nil {
  242. return nil, errors.Wrapf(err, "db.FetchModelObjects")
  243. }
  244. return mts, nil
  245. }
  246. func (self *SAccessGroup) Delete(ctx context.Context, userCred mcclient.TokenCredential) error {
  247. return nil
  248. }
  249. func (self *SAccessGroup) RealDelete(ctx context.Context, userCred mcclient.TokenCredential) error {
  250. return self.SStatusInfrasResourceBase.Delete(ctx, userCred)
  251. }
  252. func (self *SAccessGroup) ValidateDeleteCondition(ctx context.Context, info jsonutils.JSONObject) error {
  253. if self.MountTargetCount > 0 {
  254. return httperrors.NewNotEmptyError("access group not empty, please delete mount target first")
  255. }
  256. return self.SStatusInfrasResourceBase.ValidateDeleteCondition(ctx, nil)
  257. }
  258. // 同步权限组状态
  259. func (self *SAccessGroup) PerformSyncstatus(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.MountTargetSyncstatusInput) (jsonutils.JSONObject, error) {
  260. return nil, self.StartSyncstatus(ctx, userCred, "")
  261. }
  262. func (self *SAccessGroup) StartSyncstatus(ctx context.Context, userCred mcclient.TokenCredential, parentTaskId string) error {
  263. return StartResourceSyncStatusTask(ctx, userCred, self, "AccessGroupSyncstatusTask", parentTaskId)
  264. }
  265. func (self *SCloudregion) GetAccessGroups(managerId string) ([]SAccessGroup, error) {
  266. q := AccessGroupManager.Query().Equals("cloudregion_id", self.Id)
  267. if len(managerId) > 0 {
  268. q = q.Equals("manager_id", managerId)
  269. }
  270. ret := []SAccessGroup{}
  271. err := db.FetchModelObjects(AccessGroupManager, q, &ret)
  272. if err != nil {
  273. return nil, err
  274. }
  275. return ret, nil
  276. }
  277. func (self *SCloudregion) SyncAccessGroups(
  278. ctx context.Context,
  279. userCred mcclient.TokenCredential,
  280. provider *SCloudprovider,
  281. iAccessGroups []cloudprovider.ICloudAccessGroup,
  282. xor bool,
  283. ) compare.SyncResult {
  284. lockman.LockRawObject(ctx, self.Id, AccessGroupManager.Keyword())
  285. defer lockman.ReleaseRawObject(ctx, self.Id, AccessGroupManager.Keyword())
  286. result := compare.SyncResult{}
  287. dbGroups, err := self.GetAccessGroups(provider.Id)
  288. if err != nil {
  289. result.Error(errors.Wrapf(err, "self.GetAccessGroup"))
  290. return result
  291. }
  292. removed := make([]SAccessGroup, 0)
  293. commondb := make([]SAccessGroup, 0)
  294. commonext := make([]cloudprovider.ICloudAccessGroup, 0)
  295. added := make([]cloudprovider.ICloudAccessGroup, 0)
  296. err = compare.CompareSets(dbGroups, iAccessGroups, &removed, &commondb, &commonext, &added)
  297. if err != nil {
  298. result.Error(errors.Wrapf(err, "compare.CompareSets"))
  299. return result
  300. }
  301. for i := 0; i < len(removed); i += 1 {
  302. err = removed[i].RealDelete(ctx, userCred)
  303. if err != nil {
  304. result.DeleteError(err)
  305. continue
  306. }
  307. result.Delete()
  308. }
  309. if !xor {
  310. for i := 0; i < len(commondb); i += 1 {
  311. err = commondb[i].SyncWithAccessGroup(ctx, userCred, commonext[i])
  312. if err != nil {
  313. result.UpdateError(err)
  314. continue
  315. }
  316. result.Update()
  317. }
  318. }
  319. for i := 0; i < len(added); i += 1 {
  320. err := provider.newFromCloudAccessGroup(ctx, userCred, self, added[i])
  321. if err != nil {
  322. result.AddError(err)
  323. continue
  324. }
  325. result.Add()
  326. }
  327. return result
  328. }
  329. func (self *SCloudprovider) newFromCloudAccessGroup(ctx context.Context, userCred mcclient.TokenCredential, region *SCloudregion, iAccessGroup cloudprovider.ICloudAccessGroup) error {
  330. ret := &SAccessGroup{}
  331. ret.SetModelManager(AccessGroupManager, ret)
  332. ret.CloudregionId = region.Id
  333. ret.ManagerId = self.Id
  334. ret.DomainId = self.DomainId
  335. ret.Status = api.ACCESS_GROUP_STATUS_AVAILABLE
  336. ret.init(iAccessGroup)
  337. var err error
  338. err = func() error {
  339. lockman.LockRawObject(ctx, AccessGroupManager.Keyword(), "name")
  340. defer lockman.ReleaseRawObject(ctx, AccessGroupManager.Keyword(), "name")
  341. ret.Name, err = db.GenerateName(ctx, AccessGroupManager, self.GetOwnerId(), iAccessGroup.GetName())
  342. if err != nil {
  343. return errors.Wrapf(err, "db.GenerateName")
  344. }
  345. return AccessGroupManager.TableSpec().Insert(ctx, ret)
  346. }()
  347. if err != nil {
  348. return errors.Wrapf(err, "Insert")
  349. }
  350. rules, err := iAccessGroup.GetRules()
  351. if err != nil {
  352. return errors.Wrapf(err, "GetRules")
  353. }
  354. ret.SyncRules(ctx, userCred, rules)
  355. return nil
  356. }
  357. func (self *SAccessGroup) init(iAccessGroup cloudprovider.ICloudAccessGroup) {
  358. self.Name = iAccessGroup.GetName()
  359. self.ExternalId = iAccessGroup.GetGlobalId()
  360. self.NetworkType = iAccessGroup.GetNetworkType()
  361. self.FileSystemType = iAccessGroup.GetFileSystemType()
  362. self.MountTargetCount = iAccessGroup.GetMountTargetCount()
  363. self.ExternalId = iAccessGroup.GetGlobalId()
  364. self.Description = iAccessGroup.GetDesc()
  365. self.Status = api.ACCESS_GROUP_STATUS_AVAILABLE
  366. }
  367. func (self *SAccessGroup) syncAccessGroupBaseInfo(ctx context.Context, userCred mcclient.TokenCredential, iAccessGroup cloudprovider.ICloudAccessGroup) error {
  368. _, err := db.Update(self, func() error {
  369. self.init(iAccessGroup)
  370. return nil
  371. })
  372. return errors.Wrapf(err, "db.Update")
  373. }
  374. func (self *SAccessGroup) SyncWithAccessGroup(ctx context.Context, userCred mcclient.TokenCredential, iAccessGroup cloudprovider.ICloudAccessGroup) error {
  375. err := self.syncAccessGroupBaseInfo(ctx, userCred, iAccessGroup)
  376. if err != nil {
  377. return errors.Wrapf(err, "syncAccessGroupBaseInfo")
  378. }
  379. rules, err := iAccessGroup.GetRules()
  380. if err != nil {
  381. return errors.Wrapf(err, "GetRules")
  382. }
  383. result := self.SyncRules(ctx, userCred, rules)
  384. log.Debugf("sync rules for access group %s result: %s", self.Name, result.Result())
  385. return nil
  386. }
  387. func (self *SAccessGroup) SyncRules(ctx context.Context, userCred mcclient.TokenCredential, rules []cloudprovider.IAccessGroupRule) compare.SyncResult {
  388. lockman.LockRawObject(ctx, self.Id, AccessGroupManager.Keyword())
  389. defer lockman.ReleaseRawObject(ctx, self.Id, AccessGroupManager.Keyword())
  390. result := compare.SyncResult{}
  391. dbRules, err := self.GetAccessGroupRules()
  392. if err != nil {
  393. result.Error(errors.Wrapf(err, "GetAccessGroupRules"))
  394. return result
  395. }
  396. removed := make([]SAccessGroupRule, 0)
  397. commondb := make([]SAccessGroupRule, 0)
  398. commonext := make([]cloudprovider.IAccessGroupRule, 0)
  399. added := make([]cloudprovider.IAccessGroupRule, 0)
  400. err = compare.CompareSets(dbRules, rules, &removed, &commondb, &commonext, &added)
  401. if err != nil {
  402. result.Error(errors.Wrapf(err, "compare.CompareSets"))
  403. return result
  404. }
  405. for i := 0; i < len(removed); i += 1 {
  406. err = removed[i].RealDelete(ctx, userCred)
  407. if err != nil {
  408. result.DeleteError(err)
  409. continue
  410. }
  411. result.Delete()
  412. }
  413. for i := 0; i < len(commondb); i += 1 {
  414. err = commondb[i].SyncWithAccessGroupRule(ctx, userCred, commonext[i])
  415. if err != nil {
  416. result.UpdateError(err)
  417. continue
  418. }
  419. result.Update()
  420. }
  421. for i := 0; i < len(added); i += 1 {
  422. err := self.newAccessGroupRule(ctx, userCred, added[i])
  423. if err != nil {
  424. result.AddError(err)
  425. continue
  426. }
  427. result.Add()
  428. }
  429. return result
  430. }
  431. func (self *SAccessGroup) newAccessGroupRule(ctx context.Context, userCred mcclient.TokenCredential, ext cloudprovider.IAccessGroupRule) error {
  432. rule := &SAccessGroupRule{}
  433. rule.SetModelManager(AccessGroupRuleManager, rule)
  434. rule.AccessGroupId = self.Id
  435. rule.Source = ext.GetSource()
  436. rule.ExternalId = ext.GetGlobalId()
  437. rule.RWAccessType = string(ext.GetRWAccessType())
  438. rule.UserAccessType = string(ext.GetUserAccessType())
  439. rule.Priority = ext.GetPriority()
  440. return AccessGroupRuleManager.TableSpec().Insert(ctx, rule)
  441. }
  442. func (self *SAccessGroup) GetIRegion(ctx context.Context) (cloudprovider.ICloudRegion, error) {
  443. if len(self.CloudregionId) == 0 {
  444. return nil, errors.Wrapf(cloudprovider.ErrNotFound, "empty cloudregion id")
  445. }
  446. provider, err := self.GetDriver(ctx)
  447. if err != nil {
  448. return nil, errors.Wrapf(err, "self.GetDriver")
  449. }
  450. region, err := self.GetRegion()
  451. if err != nil {
  452. return nil, errors.Wrapf(err, "self.GetRegion")
  453. }
  454. return provider.GetIRegionById(region.ExternalId)
  455. }
  456. func (self *SAccessGroup) GetICloudAccessGroup(ctx context.Context) (cloudprovider.ICloudAccessGroup, error) {
  457. if len(self.ExternalId) == 0 {
  458. return nil, errors.Wrapf(cloudprovider.ErrNotFound, "empty external id")
  459. }
  460. iRegion, err := self.GetIRegion(ctx)
  461. if err != nil {
  462. return nil, errors.Wrapf(err, "self.GetIRegion")
  463. }
  464. iAccessGroup, err := iRegion.GetICloudAccessGroupById(self.ExternalId)
  465. if err != nil {
  466. return nil, errors.Wrapf(err, "iRegion.GetICloudAccessGroupById(%s)", self.ExternalId)
  467. }
  468. return iAccessGroup, nil
  469. }