| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package models
- import (
- "context"
- "database/sql"
- "golang.org/x/sync/errgroup"
- "yunion.io/x/jsonutils"
- "yunion.io/x/log"
- "yunion.io/x/pkg/errors"
- "yunion.io/x/pkg/tristate"
- "yunion.io/x/pkg/util/netutils"
- "yunion.io/x/pkg/util/rbacscope"
- "yunion.io/x/pkg/util/sets"
- "yunion.io/x/sqlchemy"
- "yunion.io/x/onecloud/pkg/apis"
- billing_api "yunion.io/x/onecloud/pkg/apis/billing"
- api "yunion.io/x/onecloud/pkg/apis/compute"
- "yunion.io/x/onecloud/pkg/cloudcommon/db"
- "yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
- "yunion.io/x/onecloud/pkg/cloudcommon/db/quotas"
- "yunion.io/x/onecloud/pkg/cloudcommon/policy"
- "yunion.io/x/onecloud/pkg/httperrors"
- "yunion.io/x/onecloud/pkg/mcclient"
- "yunion.io/x/onecloud/pkg/util/logclient"
- "yunion.io/x/onecloud/pkg/util/stringutils2"
- )
- const (
- REDIS_TYPE = "REDIS"
- RDS_TYPE = "RDS"
- )
- // +onecloud:swagger-gen-model-singular=instancegroup
- // +onecloud:swagger-gen-model-plural=instancegroups
- type SGroupManager struct {
- db.SVirtualResourceBaseManager
- db.SEnabledResourceBaseManager
- SZoneResourceBaseManager
- }
- var GroupManager *SGroupManager
- func init() {
- // GroupManager's Keyword and KeywordPlural is instancegroup and instancegroups because group has been used by
- // keystone.
- GroupManager = &SGroupManager{
- SVirtualResourceBaseManager: db.NewVirtualResourceBaseManager(
- SGroup{},
- "groups_tbl",
- "instancegroup",
- "instancegroups",
- ),
- }
- GroupManager.SetVirtualObject(GroupManager)
- }
- type SGroup struct {
- db.SVirtualResourceBase
- SZoneResourceBase `width:"36" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
- db.SEnabledResourceBase `nullable:"false" default:"true" create:"optional" list:"user" update:"user"`
- // 服务类型
- ServiceType string `width:"36" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
- ParentId string `width:"36" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
- // 可用区Id
- // example: zone1
- // ZoneId string `width:"36" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
- // 调度策略
- SchedStrategy string `width:"16" charset:"ascii" nullable:"true" default:"" list:"user" update:"user" create:"optional"`
- // the upper limit number of guests with this group in a host
- Granularity int `nullable:"false" list:"user" get:"user" create:"optional" update:"user" default:"1"`
- ForceDispersion tristate.TriState `list:"user" get:"user" create:"optional" update:"user" default:"true"`
- // 是否启用
- // Enabled tristate.TriState `default:"true" create:"optional" list:"user" update:"user"`
- }
- // 主机组列表
- func (sm *SGroupManager) ListItemFilter(
- ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- input api.InstanceGroupListInput,
- ) (*sqlchemy.SQuery, error) {
- var err error
- q, err = sm.SVirtualResourceBaseManager.ListItemFilter(ctx, q, userCred, input.VirtualResourceListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SVirtualResourceBaseManager.ListItemFilter")
- }
- q, err = sm.SEnabledResourceBaseManager.ListItemFilter(ctx, q, userCred, input.EnabledResourceBaseListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SEnabledResourceBaseManager.ListItemFilter")
- }
- q, err = sm.SZoneResourceBaseManager.ListItemFilter(ctx, q, userCred, input.ZonalFilterListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SZoneResourceBaseManager.ListItemFilter")
- }
- guestFilter := input.ServerId
- if len(guestFilter) != 0 {
- guestObj, err := GuestManager.FetchByIdOrName(ctx, userCred, guestFilter)
- if err != nil {
- return nil, err
- }
- ggSub := GroupguestManager.Query("group_id").Equals("guest_id", guestObj.GetId()).SubQuery()
- q = q.Join(ggSub, sqlchemy.Equals(ggSub.Field("group_id"), q.Field("id")))
- }
- if len(input.ParentId) > 0 {
- q = q.Equals("parent_id", input.ParentId)
- }
- if len(input.ServiceType) > 0 {
- q = q.Equals("service_type", input.ServiceType)
- }
- if len(input.SchedStrategy) > 0 {
- q = q.Equals("sched_strategy", input.SchedStrategy)
- }
- return q, nil
- }
- func (sm *SGroupManager) OrderByExtraFields(
- ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- input api.InstanceGroupListInput,
- ) (*sqlchemy.SQuery, error) {
- var err error
- q, err = sm.SVirtualResourceBaseManager.OrderByExtraFields(ctx, q, userCred, input.VirtualResourceListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SVirtualResourceBaseManager.OrderByExtraFields")
- }
- q, err = sm.SZoneResourceBaseManager.OrderByExtraFields(ctx, q, userCred, input.ZonalFilterListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SZoneResourceBaseManager.OrderByExtraFields")
- }
- if db.NeedOrderQuery([]string{input.OrderByVips}) {
- gnQ := GroupnetworkManager.Query()
- gnQ = gnQ.AppendField(gnQ.Field("group_id"), sqlchemy.COUNT("vips", gnQ.Field("ip_addr")))
- gnQ = gnQ.GroupBy("group_id")
- gnSQ := gnQ.SubQuery()
- q = q.LeftJoin(gnSQ, sqlchemy.Equals(gnSQ.Field("group_id"), q.Field("id")))
- q.AppendField(q.QueryFields()...)
- q.AppendField(gnSQ.Field("vips"))
- q = db.OrderByFields(q, []string{input.OrderByVips}, []sqlchemy.IQueryField{q.Field("vips")})
- }
- if db.NeedOrderQuery([]string{input.OrderByGuestCount}) {
- ggQ := GroupguestManager.Query()
- ggQ = ggQ.AppendField(ggQ.Field("group_id"), sqlchemy.COUNT("guest_count"))
- ggQ = ggQ.GroupBy("group_id")
- ggSQ := ggQ.SubQuery()
- q = q.LeftJoin(ggSQ, sqlchemy.Equals(ggSQ.Field("group_id"), q.Field("id")))
- q.AppendField(q.QueryFields()...)
- q.AppendField(ggSQ.Field("guest_count"))
- q = db.OrderByFields(q, []string{input.OrderByGuestCount}, []sqlchemy.IQueryField{q.Field("guest_count")})
- }
- return q, nil
- }
- func (sm *SGroupManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
- var err error
- q, err = sm.SVirtualResourceBaseManager.QueryDistinctExtraField(q, field)
- if err == nil {
- return q, nil
- }
- q, err = sm.SZoneResourceBaseManager.QueryDistinctExtraField(q, field)
- if err == nil {
- return q, nil
- }
- return q, httperrors.ErrNotFound
- }
- func (sm *SGroupManager) FetchCustomizeColumns(
- ctx context.Context,
- userCred mcclient.TokenCredential,
- query jsonutils.JSONObject,
- objs []interface{},
- fields stringutils2.SSortedStrings,
- isList bool,
- ) []api.InstanceGroupDetail {
- rows := make([]api.InstanceGroupDetail, len(objs))
- virtRows := sm.SVirtualResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
- zoneRows := sm.SZoneResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
- for i := range rows {
- rows[i] = api.InstanceGroupDetail{
- VirtualResourceDetails: virtRows[i],
- ZoneResourceInfo: zoneRows[i],
- }
- rows[i].GuestCount = objs[i].(*SGroup).GetGuestCount()
- rows[i].Vips, _ = GroupnetworkManager.getVips(objs[i].(*SGroup).Id)
- net, _ := objs[i].(*SGroup).getAttachedNetwork()
- if net != nil {
- rows[i].NetworkId = net.Id
- rows[i].Network = net.Name
- }
- eip, _ := objs[i].(*SGroup).getElasticIp()
- if eip != nil {
- rows[i].VipEip = eip.IpAddr
- }
- }
- return rows
- }
- func (group *SGroup) GetGuestCount() int {
- q := GroupguestManager.Query().Equals("group_id", group.Id)
- count, _ := q.CountWithError()
- return count
- }
- func (group *SGroup) GetGuests() []SGuest {
- ggm := GroupguestManager.Query().SubQuery()
- q := GuestManager.Query()
- q = q.Join(ggm, sqlchemy.Equals(q.Field("id"), ggm.Field("guest_id")))
- q = q.Filter(sqlchemy.Equals(ggm.Field("group_id"), group.Id))
- guests := make([]SGuest, 0)
- err := db.FetchModelObjects(GuestManager, q, &guests)
- if err != nil && errors.Cause(err) != sql.ErrNoRows {
- return nil
- }
- return guests
- }
- func (group *SGroup) ValidateDeleteCondition(ctx context.Context, info jsonutils.JSONObject) error {
- eip, err := group.getElasticIp()
- if err != nil {
- return errors.Wrap(err, "getElasticIp")
- }
- if eip != nil {
- return errors.Wrapf(httperrors.ErrNotEmpty, "group associate with eip %s", eip.IpAddr)
- }
- q := GroupguestManager.Query().Equals("group_id", group.Id)
- count, err := q.CountWithError()
- if err != nil {
- return errors.Wrapf(err, "fail to check that if there are any guest in this group %s", group.Name)
- }
- if count > 0 {
- return httperrors.NewUnsupportOperationError("please retry after unbind all guests in group")
- }
- return nil
- }
- func (group *SGroup) GetNetworks() ([]SGroupnetwork, error) {
- q := GroupnetworkManager.Query().Equals("group_id", group.Id)
- groupnets := make([]SGroupnetwork, 0)
- err := db.FetchModelObjects(GroupnetworkManager, q, &groupnets)
- if err != nil {
- return nil, err
- }
- return groupnets, nil
- }
- func (group *SGroup) PerformBindGuests(ctx context.Context, userCred mcclient.TokenCredential,
- query jsonutils.JSONObject, data jsonutils.JSONObject) (jsonutils.JSONObject, error) {
- if group.Enabled.IsFalse() {
- return nil, httperrors.NewForbiddenError("can not bind guest from disabled guest")
- }
- guestIdSet, hostIds, err := group.checkGuests(ctx, userCred, query, data)
- if err != nil {
- return nil, err
- }
- groupGuests, err := GroupguestManager.FetchByGroupId(group.Id)
- if err != nil {
- logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_ASSOCIATE, nil, userCred, false)
- return nil, err
- }
- for i := range groupGuests {
- guestId := groupGuests[i].GuestId
- if guestIdSet.Has(guestId) {
- guestIdSet.Delete(guestId)
- }
- }
- var networkId string
- gns, err := group.GetNetworks()
- if err != nil {
- return nil, errors.Wrap(err, "GetNetworks")
- }
- if len(gns) > 0 {
- networkId = gns[0].NetworkId
- }
- for _, guestId := range guestIdSet.UnsortedList() {
- if len(networkId) > 0 {
- // need to check consistency of network
- gns, err := GuestnetworkManager.FetchByGuestId(guestId)
- if err != nil {
- return nil, errors.Wrap(err, "")
- }
- if len(gns) != 1 {
- return nil, errors.Wrap(httperrors.ErrNotSupported, "cannot join a guest without network or with more than one network to a group with VIP")
- }
- if gns[0].NetworkId != networkId {
- return nil, errors.Wrap(httperrors.ErrConflict, "cannot join a guest with network inconsist with VIP")
- }
- }
- _, err := GroupguestManager.Attach(ctx, group.Id, guestId)
- if err != nil {
- logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_ASSOCIATE, nil, userCred, false)
- return nil, errors.Wrapf(err, "fail to attch guest %s to group %s", guestId, group.Id)
- }
- }
- err = group.clearSchedDescCache(hostIds)
- if err != nil {
- log.Errorf("fail to clear scheduler desc cache after binding guests successfully: %s", err.Error())
- }
- logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_ASSOCIATE, nil, userCred, true)
- return nil, nil
- }
- func (group *SGroup) PerformUnbindGuests(ctx context.Context, userCred mcclient.TokenCredential,
- query jsonutils.JSONObject, data jsonutils.JSONObject) (jsonutils.JSONObject, error) {
- if group.Enabled.IsFalse() {
- return nil, httperrors.NewForbiddenError("can not unbind guest from disabled guest")
- }
- guestIdSet, hostIds, err := group.checkGuests(ctx, userCred, query, data)
- if err != nil {
- return nil, err
- }
- groupGuests, err := GroupguestManager.FetchByGroupId(group.Id)
- if err != nil {
- logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_DISSOCIATE, nil, userCred, false)
- return nil, err
- }
- for i := range groupGuests {
- joint := groupGuests[i]
- if !guestIdSet.Has(joint.GuestId) {
- continue
- }
- err := joint.Detach(ctx, userCred)
- if err != nil {
- logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_DISSOCIATE, nil, userCred, false)
- return nil, errors.Wrapf(err, "fail to detach guest %s to group %s", joint.GuestId, group.Id)
- }
- }
- err = group.clearSchedDescCache(hostIds)
- if err != nil {
- log.Errorf("fail to clear scheduler desc cache after unbinding guests successfully: %s", err.Error())
- }
- logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_DISSOCIATE, nil, userCred, true)
- return nil, nil
- }
- func (group *SGroup) checkGuests(ctx context.Context, userCred mcclient.TokenCredential,
- query jsonutils.JSONObject, data jsonutils.JSONObject) (guestIdSet sets.String, hostIds []string, err error) {
- guestIdArr := jsonutils.GetArrayOfPrefix(data, "guest")
- if len(guestIdArr) == 0 {
- return nil, nil, httperrors.NewMissingParameterError("guest.0 guest.1 ... ")
- }
- guestIdSet = sets.NewString()
- hostIdSet := sets.NewString()
- for i := range guestIdArr {
- guestIdStr, _ := guestIdArr[i].GetString()
- model, err := GuestManager.FetchByIdOrName(ctx, userCred, guestIdStr)
- if err == sql.ErrNoRows {
- return nil, nil, httperrors.NewInputParameterError("no such model %s", guestIdStr)
- }
- if err != nil {
- return nil, nil, errors.Wrapf(err, "fail to fetch model by id or name %s", guestIdStr)
- }
- guest := model.(*SGuest)
- if guest.ProjectId != group.ProjectId {
- return nil, nil, httperrors.NewForbiddenError("guest and instance group should belong to same project")
- }
- guestIdSet.Insert(guest.GetId())
- hostIdSet.Insert(guest.HostId)
- }
- hostIds = hostIdSet.List()
- return
- }
- func (group *SGroup) PerformEnable(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input apis.PerformEnableInput) (jsonutils.JSONObject, error) {
- err := db.EnabledPerformEnable(group, ctx, userCred, true)
- if err != nil {
- return nil, errors.Wrap(err, "EnabledPerformEnable")
- }
- return nil, nil
- }
- func (group *SGroup) PerformDisable(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input apis.PerformDisableInput) (jsonutils.JSONObject, error) {
- err := db.EnabledPerformEnable(group, ctx, userCred, false)
- if err != nil {
- return nil, errors.Wrap(err, "EnabledPerformEnable")
- }
- return nil, nil
- }
- func (group *SGroup) ClearAllScheDescCache() error {
- guests, err := group.fetchAllGuests()
- if err != nil {
- return errors.Wrapf(err, "fail to fetch all guest of group %s", group.Id)
- }
- hostIdSet := sets.NewString()
- for i := range guests {
- hostIdSet.Insert(guests[i].HostId)
- }
- return group.clearSchedDescCache(hostIdSet.List())
- }
- func (group *SGroup) clearSchedDescCache(hostIds []string) error {
- var g errgroup.Group
- for i := range hostIds {
- hostId := hostIds[i]
- g.Go(func() error {
- return HostManager.ClearSchedDescCache(hostId)
- })
- }
- return g.Wait()
- }
- func (group *SGroup) fetchAllGuests() ([]SGuest, error) {
- ggSub := GroupguestManager.Query("guest_id").Equals("group_id", group.GetId()).SubQuery()
- guestSub := GuestManager.Query().SubQuery()
- q := guestSub.Query().Join(ggSub, sqlchemy.Equals(ggSub.Field("guest_id"), guestSub.Field("id")))
- guests := make([]SGuest, 0, 2)
- err := db.FetchModelObjects(GuestManager, q, &guests)
- if err != nil {
- return nil, err
- }
- return guests, nil
- }
- func (manager *SGroupManager) ListItemExportKeys(ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- keys stringutils2.SSortedStrings,
- ) (*sqlchemy.SQuery, error) {
- var err error
- q, err = manager.SVirtualResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
- if err != nil {
- return nil, errors.Wrap(err, "SVirtualResourceBaseManager.ListItemExportKeys")
- }
- if keys.ContainsAny(manager.SZoneResourceBaseManager.GetExportKeys()...) {
- q, err = manager.SZoneResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
- if err != nil {
- return nil, errors.Wrap(err, "SZoneResourceBaseManager.ListItemExportKeys")
- }
- }
- return q, nil
- }
- func (grp *SGroup) getAttachedNetwork() (*SNetwork, error) {
- var netId string
- guests := grp.GetGuests()
- for i := range guests {
- guest := guests[i]
- nets, err := guest.GetNetworks("")
- if err != nil {
- return nil, errors.Wrapf(err, "guest.GestNetworks(%s)", guest.Name)
- }
- if len(nets) != 1 {
- return nil, errors.Wrapf(httperrors.ErrInvalidStatus, "guest (%s) has %d networks", guest.Name, len(nets))
- }
- if len(netId) == 0 {
- netId = nets[0].NetworkId
- } else if netId != nets[0].NetworkId {
- return nil, errors.Wrapf(httperrors.ErrInvalidStatus, "inconsistent networkId for member servers")
- }
- }
- if len(netId) == 0 {
- gns, err := GroupnetworkManager.FetchByGroupId(grp.Id)
- if err != nil {
- return nil, errors.Wrap(err, "GroupnetworkManager.FetchByGroupId")
- }
- for _, gn := range gns {
- netId = gn.NetworkId
- }
- }
- if len(netId) == 0 {
- return nil, nil
- }
- netObj, err := NetworkManager.FetchById(netId)
- if err != nil {
- return nil, errors.Wrapf(err, "NetworkManager.FetchById %s", netId)
- }
- return netObj.(*SNetwork), nil
- }
- func (net *SNetwork) GetRegionalQuotaKeys(ownerId mcclient.IIdentityProvider) (quotas.IQuotaKeys, error) {
- vpc, err := net.GetVpc()
- if err != nil {
- return nil, errors.Wrap(err, "getVpc")
- }
- provider := vpc.GetCloudprovider()
- if provider == nil && len(vpc.ManagerId) > 0 {
- return nil, errors.Wrap(httperrors.ErrInvalidStatus, "no valid manager")
- }
- region, _ := net.GetRegion()
- if region == nil {
- return nil, errors.Wrap(httperrors.ErrInvalidStatus, "no valid region")
- }
- return fetchRegionalQuotaKeys(rbacscope.ScopeProject, ownerId, region, provider), nil
- }
- func (grp *SGroup) PerformDetachnetwork(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.GroupDetachNetworkInput) (*api.SGroup, error) {
- net, err := grp.getAttachedNetwork()
- if err != nil {
- return nil, errors.Wrap(err, "getAttachedNetwork")
- }
- if net == nil {
- // no guest and no attached network
- return nil, nil
- }
- gns, err := GroupnetworkManager.FetchByGroupId(grp.Id)
- if err != nil {
- return nil, errors.Wrap(err, "GroupnetworkManager.FetchByGroupId")
- }
- if len(gns) == 0 {
- return nil, nil
- }
- for _, gn := range gns {
- if len(input.IpAddr) == 0 || gn.IpAddr == input.IpAddr || gn.Ip6Addr == input.IpAddr {
- if len(gn.EipId) > 0 {
- logclient.AddSimpleActionLog(grp, logclient.ACT_DETACH_NETWORK, "eip associated", userCred, false)
- return nil, errors.Wrap(httperrors.ErrInvalidStatus, "cannot detach network with eip")
- }
- // delete
- notes := gn.GetShortDesc(ctx)
- err := gn.Detach(ctx, userCred)
- if err != nil {
- logclient.AddSimpleActionLog(grp, logclient.ACT_DETACH_NETWORK, notes, userCred, false)
- return nil, errors.Wrap(err, "Detach")
- }
- logclient.AddSimpleActionLog(grp, logclient.ACT_DETACH_NETWORK, notes, userCred, true)
- }
- }
- return nil, nil
- }
- func (grp *SGroup) PerformAttachnetwork(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.GroupAttachNetworkInput) (*api.SGroup, error) {
- net, err := grp.getAttachedNetwork()
- if err != nil {
- return nil, errors.Wrap(err, "getAttachedNetwork")
- }
- if len(input.NetworkId) > 0 {
- netObj, err := NetworkManager.FetchByIdOrName(ctx, userCred, input.NetworkId)
- if err != nil {
- if errors.Cause(err) == sql.ErrNoRows {
- return nil, httperrors.NewResourceNotFoundError2(NetworkManager.Keyword(), input.NetworkId)
- } else {
- return nil, errors.Wrap(err, "NetworkManager.FetchByIdOrName")
- }
- }
- if net != nil {
- if net.Id != netObj.GetId() {
- return nil, errors.Wrap(httperrors.ErrConflict, "provided network inconsistent with existing network")
- }
- } else {
- net = netObj.(*SNetwork)
- }
- } else if net == nil {
- return nil, errors.Wrap(httperrors.ErrInputParameter, "please specify network")
- }
- if len(input.IpAddr) > 0 {
- addr, err := netutils.NewIPV4Addr(input.IpAddr)
- if err != nil {
- return nil, errors.Wrapf(httperrors.ErrInputParameter, "invalid ip_addr %s", input.IpAddr)
- }
- if !net.GetIPRange().Contains(addr) {
- return nil, errors.Wrapf(httperrors.ErrInputParameter, "ip_addr %s not in range", input.IpAddr)
- }
- }
- if (len(input.Ip6Addr) > 0 || input.RequireIPv6) && !net.IsSupportIPv6() {
- return nil, errors.Wrap(httperrors.ErrInputParameter, "network is not ipv6 enabled")
- }
- if len(input.Ip6Addr) > 0 {
- addr6, err := netutils.NewIPV6Addr(input.Ip6Addr)
- if err != nil {
- return nil, errors.Wrapf(httperrors.ErrInputParameter, "invalid ip6_addr %s", input.Ip6Addr)
- }
- if !net.getIPRange6().Contains(addr6) {
- return nil, errors.Wrapf(httperrors.ErrInputParameter, "ip6_addr %s not in range", input.Ip6Addr)
- }
- input.Ip6Addr = addr6.String()
- }
- // check quota
- var inicCnt, enicCnt int
- var saveQuota bool
- if net.IsExitNetwork() {
- enicCnt = 1
- } else {
- inicCnt = 1
- }
- pendingUsage := &SRegionQuota{
- Port: inicCnt,
- Eport: enicCnt,
- }
- keys, err := net.GetRegionalQuotaKeys(grp.GetOwnerId())
- if err != nil {
- return nil, errors.Wrap(err, "GetRegionalQuotaKeys")
- }
- pendingUsage.SetKeys(keys)
- err = quotas.CheckSetPendingQuota(ctx, userCred, pendingUsage)
- if err != nil {
- return nil, httperrors.NewOutOfQuotaError("%v", err)
- }
- defer quotas.CancelPendingUsage(ctx, userCred, pendingUsage, pendingUsage, saveQuota)
- lockman.LockObject(ctx, net)
- defer lockman.ReleaseObject(ctx, net)
- ipAddr, err := net.GetFreeIP(ctx, userCred, nil, nil, input.IpAddr, input.AllocDir, input.Reserved != nil && *input.Reserved, api.AddressTypeIPv4)
- if err != nil {
- return nil, errors.Wrap(err, "GetFreeIPv4")
- }
- if len(input.IpAddr) > 0 && ipAddr != input.IpAddr && input.RequireDesignatedIp != nil && *input.RequireDesignatedIp {
- return nil, errors.Wrapf(httperrors.ErrConflict, "candidate ip %s is occupied!", input.IpAddr)
- }
- var ip6Addr string
- if len(input.Ip6Addr) > 0 || input.RequireIPv6 {
- ip6Addr, err = net.GetFreeIP(ctx, userCred, nil, nil, input.Ip6Addr, input.AllocDir, input.Reserved != nil && *input.Reserved, api.AddressTypeIPv6)
- if err != nil {
- return nil, errors.Wrap(err, "GetFreeIPv6")
- }
- if len(input.Ip6Addr) > 0 && ip6Addr != input.Ip6Addr && input.RequireDesignatedIp != nil && *input.RequireDesignatedIp {
- return nil, errors.Wrapf(httperrors.ErrConflict, "candidate v6 ip %s is occupied!", input.Ip6Addr)
- }
- }
- gn := SGroupnetwork{}
- gn.NetworkId = net.Id
- gn.GroupId = grp.Id
- gn.IpAddr = ipAddr
- gn.Ip6Addr = ip6Addr
- gn.SetModelManager(GroupnetworkManager, &gn)
- err = GroupnetworkManager.TableSpec().Insert(ctx, &gn)
- if err != nil {
- return nil, errors.Wrap(err, "Insert")
- }
- notes := gn.GetShortDesc(ctx)
- db.OpsLog.LogAttachEvent(ctx, grp, net, userCred, notes)
- logclient.AddActionLogWithContext(ctx, grp, logclient.ACT_ATTACH_NETWORK, notes, userCred, true)
- saveQuota = true
- guests := grp.GetGuests()
- for _, g := range guests {
- host, _ := g.GetHost()
- host.ClearSchedDescCache()
- g.StartSyncTask(ctx, userCred, false, "")
- }
- return nil, nil
- }
- func (grp *SGroup) GetVpc() (*SVpc, error) {
- net, err := grp.getAttachedNetwork()
- if err != nil {
- return nil, errors.Wrap(err, "getAttachedNetwork")
- }
- return net.GetVpc()
- }
- func (grp *SGroup) isEipAssociable() (*SNetwork, error) {
- err := ValidateAssociateEip(grp)
- if err != nil {
- return nil, err
- }
- net, err := grp.getAttachedNetwork()
- if err != nil {
- return nil, errors.Wrap(err, "getAttachedNetwork")
- }
- if net == nil {
- return nil, errors.Wrap(httperrors.ErrInvalidStatus, "group no attached network")
- }
- if !IsOneCloudVpcResource(net) {
- return nil, errors.Wrap(httperrors.ErrInvalidStatus, "group network is not a VPC network")
- }
- gns, err := grp.GetNetworks()
- if err != nil {
- return nil, errors.Wrap(err, "GetNetworks")
- }
- if len(gns) == 0 {
- return nil, errors.Wrap(httperrors.ErrInvalidStatus, "group no vips")
- }
- return net, nil
- }
- func (grp *SGroup) PerformAssociateEip(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.ServerAssociateEipInput) (jsonutils.JSONObject, error) {
- net, err := grp.isEipAssociable()
- if err != nil {
- return nil, errors.Wrap(err, "grp.isEipAssociable")
- }
- eipStr := input.EipId
- if len(eipStr) == 0 {
- return nil, httperrors.NewMissingParameterError("eip_id")
- }
- eipObj, err := ElasticipManager.FetchByIdOrName(ctx, userCred, eipStr)
- if err != nil {
- if err == sql.ErrNoRows {
- return nil, httperrors.NewResourceNotFoundError("eip %s not found", eipStr)
- } else {
- return nil, httperrors.NewGeneralError(err)
- }
- }
- eip := eipObj.(*SElasticip)
- if eip.Mode == api.EIP_MODE_INSTANCE_PUBLICIP {
- return nil, httperrors.NewUnsupportOperationError("fixed eip cannot be associated")
- }
- if eip.IsAssociated() {
- return nil, httperrors.NewConflictError("eip has been associated")
- }
- if net.Id == eip.NetworkId {
- return nil, httperrors.NewInputParameterError("cannot associate eip with same network")
- }
- eipZone, _ := eip.GetZone()
- if eipZone != nil {
- insZone, _ := net.GetZone()
- if eipZone.Id != insZone.Id {
- return nil, httperrors.NewInputParameterError("cannot associate eip and instance in different zone")
- }
- }
- grp.SetStatus(ctx, userCred, api.INSTANCE_ASSOCIATE_EIP, "associate eip")
- params := jsonutils.NewDict()
- params.Add(jsonutils.NewString(grp.Id), "instance_id")
- params.Add(jsonutils.NewString(api.EIP_ASSOCIATE_TYPE_INSTANCE_GROUP), "instance_type")
- if len(input.IpAddr) > 0 {
- params.Add(jsonutils.NewString(input.IpAddr), "ip_addr")
- }
- err = eip.StartEipAssociateTask(ctx, userCred, params, "")
- return nil, err
- }
- func (grp *SGroup) PerformCreateEip(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.ServerCreateEipInput) (jsonutils.JSONObject, error) {
- net, err := grp.isEipAssociable()
- if err != nil {
- return nil, errors.Wrap(err, "grp.isEipAssociable")
- }
- var (
- region, _ = net.GetRegion()
- regionDriver = region.GetDriver()
- bw = input.Bandwidth
- chargeType = input.ChargeType
- bgpType = input.BgpType
- autoDellocate = (input.AutoDellocate != nil && *input.AutoDellocate)
- )
- if len(chargeType) == 0 {
- chargeType = billing_api.TNetChargeType(regionDriver.GetEipDefaultChargeType())
- }
- if chargeType == billing_api.NET_CHARGE_TYPE_BY_BANDWIDTH {
- if bw == 0 {
- return nil, httperrors.NewMissingParameterError("bandwidth")
- }
- }
- eipPendingUsage := &SRegionQuota{Eip: 1}
- keys, err := net.GetRegionalQuotaKeys(grp.GetOwnerId())
- if err != nil {
- return nil, errors.Wrap(err, "")
- }
- eipPendingUsage.SetKeys(keys)
- err = quotas.CheckSetPendingQuota(ctx, userCred, eipPendingUsage)
- if err != nil {
- return nil, httperrors.NewOutOfQuotaError("Out of eip quota: %s", err)
- }
- eip, err := ElasticipManager.NewEipForVMOnHost(ctx, userCred, &NewEipForVMOnHostArgs{
- Bandwidth: int(bw),
- BgpType: bgpType,
- ChargeType: chargeType,
- AutoDellocate: autoDellocate,
- Group: grp,
- PendingUsage: eipPendingUsage,
- })
- if err != nil {
- quotas.CancelPendingUsage(ctx, userCred, eipPendingUsage, eipPendingUsage, false)
- return nil, httperrors.NewGeneralError(err)
- }
- opts := api.ElasticipAssociateInput{
- InstanceId: grp.Id,
- InstanceType: api.EIP_ASSOCIATE_TYPE_INSTANCE_GROUP,
- IpAddr: input.IpAddr,
- }
- err = eip.AllocateAndAssociateInstance(ctx, userCred, grp, opts, "")
- if err != nil {
- return nil, httperrors.NewGeneralError(err)
- }
- return nil, nil
- }
- func (grp *SGroup) getElasticIp() (*SElasticip, error) {
- return ElasticipManager.getEip(api.EIP_ASSOCIATE_TYPE_INSTANCE_GROUP, grp.Id, api.EIP_MODE_STANDALONE_EIP)
- }
- func (grp *SGroup) PerformDissociateEip(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.ServerDissociateEipInput) (jsonutils.JSONObject, error) {
- eip, err := grp.getElasticIp()
- if err != nil {
- log.Errorf("Fail to get Eip %s", err)
- return nil, httperrors.NewGeneralError(err)
- }
- if eip == nil {
- return nil, httperrors.NewInvalidStatusError("No eip to dissociate")
- }
- err = db.IsObjectRbacAllowed(ctx, eip, userCred, policy.PolicyActionGet)
- if err != nil {
- return nil, errors.Wrap(err, "eip is not accessible")
- }
- grp.SetStatus(ctx, userCred, api.INSTANCE_DISSOCIATE_EIP, "associate eip")
- autoDelete := (input.AudoDelete != nil && *input.AudoDelete)
- err = eip.StartEipDissociateTask(ctx, userCred, autoDelete, "")
- if err != nil {
- log.Errorf("fail to start dissociate task %s", err)
- return nil, httperrors.NewGeneralError(err)
- }
- return nil, nil
- }
- func (grp *SGroup) Delete(ctx context.Context, userCred mcclient.TokenCredential) error {
- // cleanup groupnetwork
- grpnets, err := grp.GetNetworks()
- if err != nil {
- return errors.Wrap(err, "GetNetworks")
- }
- for i := range grpnets {
- err := grpnets[i].Delete(ctx, userCred)
- if err != nil {
- return errors.Wrap(err, "groupnetwork.Delete")
- }
- }
- return grp.SVirtualResourceBase.Delete(ctx, userCred)
- }
|