mount_targets.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package models
  15. import (
  16. "context"
  17. "fmt"
  18. "yunion.io/x/cloudmux/pkg/cloudprovider"
  19. "yunion.io/x/jsonutils"
  20. "yunion.io/x/log"
  21. "yunion.io/x/pkg/errors"
  22. "yunion.io/x/pkg/util/compare"
  23. "yunion.io/x/pkg/util/rbacscope"
  24. "yunion.io/x/pkg/utils"
  25. "yunion.io/x/sqlchemy"
  26. api "yunion.io/x/onecloud/pkg/apis/compute"
  27. "yunion.io/x/onecloud/pkg/cloudcommon/db"
  28. "yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
  29. "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
  30. "yunion.io/x/onecloud/pkg/cloudcommon/validators"
  31. "yunion.io/x/onecloud/pkg/httperrors"
  32. "yunion.io/x/onecloud/pkg/mcclient"
  33. "yunion.io/x/onecloud/pkg/util/stringutils2"
  34. )
  35. type SMountTargetManager struct {
  36. db.SStatusStandaloneResourceBaseManager
  37. db.SExternalizedResourceBaseManager
  38. SVpcResourceBaseManager
  39. SNetworkResourceBaseManager
  40. SAccessGroupResourceBaseManager
  41. }
  42. var MountTargetManager *SMountTargetManager
  43. func init() {
  44. MountTargetManager = &SMountTargetManager{
  45. SStatusStandaloneResourceBaseManager: db.NewStatusStandaloneResourceBaseManager(
  46. SMountTarget{},
  47. "mount_targets_tbl",
  48. "mount_target",
  49. "mount_targets",
  50. ),
  51. }
  52. MountTargetManager.SetVirtualObject(MountTargetManager)
  53. }
  54. type SMountTarget struct {
  55. db.SStatusStandaloneResourceBase
  56. db.SExternalizedResourceBase
  57. SVpcResourceBase
  58. SNetworkResourceBase
  59. SAccessGroupResourceBase
  60. NetworkType string `width:"8" charset:"ascii" nullable:"false" create:"required" index:"true" list:"user" default:"vpc"`
  61. DomainName string `charset:"utf8" nullable:"true" create:"optional" list:"user"`
  62. FileSystemId string `width:"36" charset:"ascii" nullable:"false" create:"required" index:"true" list:"user"`
  63. }
  64. func (manager *SMountTargetManager) ResourceScope() rbacscope.TRbacScope {
  65. return rbacscope.ScopeDomain
  66. }
  67. func (self *SMountTarget) GetFileSystem() (*SFileSystem, error) {
  68. fs, err := FileSystemManager.FetchById(self.FileSystemId)
  69. if err != nil {
  70. return nil, errors.Wrapf(err, "FileSystemManager.FetchById(%s)", self.FileSystemId)
  71. }
  72. return fs.(*SFileSystem), nil
  73. }
  74. func (manager *SMountTargetManager) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, input api.MountTargetCreateInput) (api.MountTargetCreateInput, error) {
  75. if len(input.FileSystemId) == 0 {
  76. return input, httperrors.NewMissingParameterError("file_system_id")
  77. }
  78. _fs, err := validators.ValidateModel(ctx, userCred, FileSystemManager, &input.FileSystemId)
  79. if err != nil {
  80. return input, err
  81. }
  82. fs := _fs.(*SFileSystem)
  83. if fs.MountTargetCountLimit > -1 {
  84. mts, err := fs.GetMountTargets()
  85. if err != nil {
  86. return input, httperrors.NewGeneralError(errors.Wrapf(err, "fs.GetMountTargets"))
  87. }
  88. if len(mts) > fs.MountTargetCountLimit {
  89. return input, httperrors.NewOutOfLimitError("Mount target reached the upper limit")
  90. }
  91. }
  92. if len(input.NetworkType) == 0 {
  93. input.NetworkType = api.NETWORK_TYPE_VPC
  94. }
  95. if !utils.IsInStringArray(input.NetworkType, []string{api.NETWORK_TYPE_VPC, api.NETWORK_TYPE_CLASSIC}) {
  96. return input, httperrors.NewInputParameterError("invalid network type %s", input.NetworkType)
  97. }
  98. if input.NetworkType == api.NETWORK_TYPE_VPC {
  99. if len(input.NetworkId) == 0 {
  100. return input, httperrors.NewMissingParameterError("network_id")
  101. }
  102. _network, err := validators.ValidateModel(ctx, userCred, NetworkManager, &input.NetworkId)
  103. if err != nil {
  104. return input, err
  105. }
  106. network := _network.(*SNetwork)
  107. vpc, _ := network.GetVpc()
  108. if vpc == nil {
  109. return input, httperrors.NewGeneralError(fmt.Errorf("failed to found vpc for network %s", input.NetworkId))
  110. }
  111. if vpc.ManagerId != fs.ManagerId {
  112. return input, httperrors.NewConflictError("network and filesystem do not belong to the same account")
  113. }
  114. if vpc.CloudregionId != fs.CloudregionId {
  115. return input, httperrors.NewConflictError("network and filesystem are not in the same region")
  116. }
  117. input.VpcId = vpc.Id
  118. }
  119. if len(input.AccessGroupId) == 0 {
  120. return input, httperrors.NewMissingParameterError("access_group_id")
  121. }
  122. groupObj, err := validators.ValidateModel(ctx, userCred, AccessGroupManager, &input.AccessGroupId)
  123. if err != nil {
  124. return input, err
  125. }
  126. group := groupObj.(*SAccessGroup)
  127. if group.ManagerId != fs.ManagerId {
  128. return input, httperrors.NewConflictError("access group and filesystem do not belong to the same account")
  129. }
  130. if group.CloudregionId != fs.CloudregionId {
  131. return input, httperrors.NewConflictError("access group and filesystem are not in the same region")
  132. }
  133. input.StatusStandaloneResourceCreateInput, err = manager.SStatusStandaloneResourceBaseManager.ValidateCreateData(ctx, userCred, ownerId, query, input.StatusStandaloneResourceCreateInput)
  134. if err != nil {
  135. return input, err
  136. }
  137. return input, nil
  138. }
  139. func (self *SMountTarget) PostCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) {
  140. self.SStatusStandaloneResourceBase.PostCreate(ctx, userCred, ownerId, query, data)
  141. if self.NetworkType == api.NETWORK_TYPE_CLASSIC {
  142. db.Update(self, func() error {
  143. self.VpcId = ""
  144. self.NetworkId = ""
  145. return nil
  146. })
  147. }
  148. self.StartCreateTask(ctx, userCred, "")
  149. }
  150. func (self *SMountTarget) StartCreateTask(ctx context.Context, userCred mcclient.TokenCredential, parentTaskId string) error {
  151. var err = func() error {
  152. task, err := taskman.TaskManager.NewTask(ctx, "MountTargetCreateTask", self, userCred, nil, parentTaskId, "", nil)
  153. if err != nil {
  154. return errors.Wrapf(err, "NewTask")
  155. }
  156. return task.ScheduleRun(nil)
  157. }()
  158. if err != nil {
  159. self.SetStatus(ctx, userCred, api.MOUNT_TARGET_STATUS_CREATE_FAILED, err.Error())
  160. return nil
  161. }
  162. self.SetStatus(ctx, userCred, api.MOUNT_TARGET_STATUS_CREATING, "")
  163. return nil
  164. }
  165. func (manager *SMountTargetManager) ListItemFilter(
  166. ctx context.Context,
  167. q *sqlchemy.SQuery,
  168. userCred mcclient.TokenCredential,
  169. query api.MountTargetListInput,
  170. ) (*sqlchemy.SQuery, error) {
  171. var err error
  172. q, err = manager.SStatusStandaloneResourceBaseManager.ListItemFilter(ctx, q, userCred, query.StatusStandaloneResourceListInput)
  173. if err != nil {
  174. return nil, errors.Wrapf(err, "SStatusStandaloneResourceBaseManager.ListItemFilter")
  175. }
  176. q, err = manager.SExternalizedResourceBaseManager.ListItemFilter(ctx, q, userCred, query.ExternalizedResourceBaseListInput)
  177. if err != nil {
  178. return nil, errors.Wrapf(err, "SExternalizedResourceBaseManager.ListItemFilter")
  179. }
  180. q, err = manager.SAccessGroupResourceBaseManager.ListItemFilter(ctx, q, userCred, query.AccessGroupFilterListInput)
  181. if err != nil {
  182. return nil, errors.Wrapf(err, "SAccessGroupResourceBaseManager.ListItemFilter")
  183. }
  184. q, err = manager.SVpcResourceBaseManager.ListItemFilter(ctx, q, userCred, query.VpcFilterListInput)
  185. if err != nil {
  186. return nil, errors.Wrapf(err, "SVpcResourceBaseManager.ListItemFilter")
  187. }
  188. q, err = manager.SNetworkResourceBaseManager.ListItemFilter(ctx, q, userCred, query.NetworkFilterListInput)
  189. if err != nil {
  190. return nil, errors.Wrapf(err, "SNetworkResourceBaseManager.ListItemFilter")
  191. }
  192. if len(query.FileSystemId) > 0 {
  193. _, err := validators.ValidateModel(ctx, userCred, FileSystemManager, &query.FileSystemId)
  194. if err != nil {
  195. return nil, err
  196. }
  197. q = q.Equals("file_system_id", query.FileSystemId)
  198. }
  199. return q, nil
  200. }
  201. func (manager *SMountTargetManager) OrderByExtraFields(
  202. ctx context.Context,
  203. q *sqlchemy.SQuery,
  204. userCred mcclient.TokenCredential,
  205. query api.MountTargetListInput,
  206. ) (*sqlchemy.SQuery, error) {
  207. var err error
  208. q, err = manager.SStatusStandaloneResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.StatusStandaloneResourceListInput)
  209. if err != nil {
  210. return nil, errors.Wrap(err, "SStatusStandaloneResourceBaseManager.OrderByExtraFields")
  211. }
  212. q, err = manager.SAccessGroupResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.AccessGroupFilterListInput)
  213. if err != nil {
  214. return nil, errors.Wrapf(err, "SAccessGroupResourceBaseManager.OrderByExtraFields")
  215. }
  216. q, err = manager.SVpcResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.VpcFilterListInput)
  217. if err != nil {
  218. return nil, errors.Wrapf(err, "SVpcResourceBaseManager.OrderByExtraFields")
  219. }
  220. q, err = manager.SNetworkResourceBaseManager.OrderByExtraFields(ctx, q, userCred, query.NetworkFilterListInput)
  221. if err != nil {
  222. return nil, errors.Wrapf(err, "SNetworkResourceBaseManager.OrderByExtraFields")
  223. }
  224. return q, nil
  225. }
  226. func (manager *SMountTargetManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
  227. var err error
  228. q, err = manager.SStatusStandaloneResourceBaseManager.QueryDistinctExtraField(q, field)
  229. if err == nil {
  230. return q, nil
  231. }
  232. q, err = manager.SAccessGroupResourceBaseManager.QueryDistinctExtraField(q, field)
  233. if err == nil {
  234. return q, nil
  235. }
  236. q, err = manager.SVpcResourceBaseManager.QueryDistinctExtraField(q, field)
  237. if err == nil {
  238. return q, nil
  239. }
  240. q, err = manager.SNetworkResourceBaseManager.QueryDistinctExtraField(q, field)
  241. if err == nil {
  242. return q, nil
  243. }
  244. return q, httperrors.ErrNotFound
  245. }
  246. func (manager *SMountTargetManager) QueryDistinctExtraFields(q *sqlchemy.SQuery, resource string, fields []string) (*sqlchemy.SQuery, error) {
  247. var err error
  248. q, err = manager.SVpcResourceBaseManager.QueryDistinctExtraFields(q, resource, fields)
  249. if err == nil {
  250. return q, nil
  251. }
  252. return q, httperrors.ErrNotFound
  253. }
  254. func (self *SMountTarget) GetOwnerId() mcclient.IIdentityProvider {
  255. fs, err := self.GetFileSystem()
  256. if err != nil {
  257. return &db.SOwnerId{}
  258. }
  259. return &db.SOwnerId{DomainId: fs.DomainId}
  260. }
  261. func (manager *SMountTargetManager) FilterByOwner(ctx context.Context, q *sqlchemy.SQuery, man db.FilterByOwnerProvider, userCred mcclient.TokenCredential, owner mcclient.IIdentityProvider, scope rbacscope.TRbacScope) *sqlchemy.SQuery {
  262. if owner != nil {
  263. sq := FileSystemManager.Query("id")
  264. if scope == rbacscope.ScopeDomain && len(owner.GetProjectDomainId()) > 0 {
  265. sq = sq.Equals("domain_id", owner.GetProjectDomainId())
  266. return q.In("file_system_id", sq)
  267. }
  268. }
  269. return q
  270. }
  271. func (manager *SMountTargetManager) FetchCustomizeColumns(
  272. ctx context.Context,
  273. userCred mcclient.TokenCredential,
  274. query jsonutils.JSONObject,
  275. objs []interface{},
  276. fields stringutils2.SSortedStrings,
  277. isList bool,
  278. ) []api.MountTargetDetails {
  279. rows := make([]api.MountTargetDetails, len(objs))
  280. stdRows := manager.SStatusStandaloneResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  281. vpcRows := manager.SVpcResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  282. netRows := manager.SNetworkResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  283. acRows := manager.SAccessGroupResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  284. fsIds := make([]string, len(objs))
  285. for i := range rows {
  286. rows[i] = api.MountTargetDetails{
  287. StatusStandaloneResourceDetails: stdRows[i],
  288. VpcResourceInfo: vpcRows[i],
  289. NetworkResourceInfo: netRows[i],
  290. AccessGroupResourceInfo: acRows[i],
  291. }
  292. mount := objs[i].(*SMountTarget)
  293. fsIds[i] = mount.FileSystemId
  294. }
  295. fsMaps, err := db.FetchIdNameMap2(FileSystemManager, fsIds)
  296. if err != nil {
  297. return rows
  298. }
  299. for i := range rows {
  300. rows[i].FileSystem, _ = fsMaps[fsIds[i]]
  301. }
  302. return rows
  303. }
  304. func (manager *SMountTargetManager) ListItemExportKeys(ctx context.Context,
  305. q *sqlchemy.SQuery,
  306. userCred mcclient.TokenCredential,
  307. keys stringutils2.SSortedStrings,
  308. ) (*sqlchemy.SQuery, error) {
  309. var err error
  310. q, err = manager.SStatusStandaloneResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  311. if err != nil {
  312. return nil, errors.Wrap(err, "SStatusStandaloneResourceBaseManager.ListItemExportKeys")
  313. }
  314. q, err = manager.SNetworkResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  315. if err != nil {
  316. return nil, errors.Wrapf(err, "SNetworkResourceBaseManager.ListItemExportKeys")
  317. }
  318. q, err = manager.SAccessGroupResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  319. if err != nil {
  320. return nil, errors.Wrapf(err, "SAccessGroupResourceBaseManager.ListItemExportKeys")
  321. }
  322. return q, nil
  323. }
  324. func (self *SMountTarget) ValidateDeleteCondition(ctx context.Context, info jsonutils.JSONObject) error {
  325. fs, err := self.GetFileSystem()
  326. if err != nil {
  327. return httperrors.NewGeneralError(errors.Wrapf(err, "GetFileSystem"))
  328. }
  329. region, err := fs.GetRegion()
  330. if err != nil {
  331. return httperrors.NewGeneralError(errors.Wrapf(err, "GetRegion"))
  332. }
  333. if utils.IsInStringArray(region.Provider, []string{api.CLOUD_PROVIDER_HUAWEI, api.CLOUD_PROVIDER_HCSO, api.CLOUD_PROVIDER_HCS}) {
  334. return httperrors.NewNotSupportedError("not allow to delete")
  335. }
  336. return self.SStatusStandaloneResourceBase.ValidateDeleteCondition(ctx, nil)
  337. }
  338. func (self *SMountTarget) Delete(ctx context.Context, userCred mcclient.TokenCredential) error {
  339. return nil
  340. }
  341. func (self *SMountTarget) RealDelete(ctx context.Context, userCred mcclient.TokenCredential) error {
  342. return self.SStatusStandaloneResourceBase.Delete(ctx, userCred)
  343. }
  344. // 删除挂载点
  345. func (self *SMountTarget) CustomizeDelete(ctx context.Context, userCred mcclient.TokenCredential, query api.ServerDeleteInput, input api.NatgatewayDeleteInput) error {
  346. return self.StartDeleteTask(ctx, userCred, "")
  347. }
  348. func (self *SMountTarget) StartDeleteTask(ctx context.Context, userCred mcclient.TokenCredential, parentTaskId string) error {
  349. var err = func() error {
  350. task, err := taskman.TaskManager.NewTask(ctx, "MountTargetDeleteTask", self, userCred, nil, parentTaskId, "", nil)
  351. if err != nil {
  352. return errors.Wrapf(err, "NewTask")
  353. }
  354. return task.ScheduleRun(nil)
  355. }()
  356. if err != nil {
  357. self.SetStatus(ctx, userCred, api.MOUNT_TARGET_STATUS_DELETE_FAILED, err.Error())
  358. return err
  359. }
  360. return self.SetStatus(ctx, userCred, api.MOUNT_TARGET_STATUS_DELETING, "")
  361. }
  362. func (self *SFileSystem) GetMountTargets() ([]SMountTarget, error) {
  363. mounts := []SMountTarget{}
  364. q := MountTargetManager.Query().Equals("file_system_id", self.Id)
  365. err := db.FetchModelObjects(MountTargetManager, q, &mounts)
  366. if err != nil {
  367. return nil, errors.Wrapf(err, "db.FetchModelObjects")
  368. }
  369. return mounts, nil
  370. }
  371. func (self *SFileSystem) SyncMountTargets(
  372. ctx context.Context,
  373. userCred mcclient.TokenCredential,
  374. extMounts []cloudprovider.ICloudMountTarget,
  375. xor bool,
  376. ) compare.SyncResult {
  377. lockman.LockRawObject(ctx, self.Id, MountTargetManager.KeywordPlural())
  378. lockman.ReleaseRawObject(ctx, self.Id, MountTargetManager.KeywordPlural())
  379. result := compare.SyncResult{}
  380. dbMounts, err := self.GetMountTargets()
  381. if err != nil {
  382. result.Error(errors.Wrapf(err, "self.GetMountTargets"))
  383. return result
  384. }
  385. removed := make([]SMountTarget, 0)
  386. commondb := make([]SMountTarget, 0)
  387. commonext := make([]cloudprovider.ICloudMountTarget, 0)
  388. added := make([]cloudprovider.ICloudMountTarget, 0)
  389. err = compare.CompareSets(dbMounts, extMounts, &removed, &commondb, &commonext, &added)
  390. if err != nil {
  391. result.Error(errors.Wrapf(err, "compare.CompareSets"))
  392. return result
  393. }
  394. for i := 0; i < len(removed); i += 1 {
  395. err = removed[i].RealDelete(ctx, userCred)
  396. if err != nil {
  397. result.DeleteError(err)
  398. continue
  399. }
  400. result.Delete()
  401. }
  402. if !xor {
  403. for i := 0; i < len(commondb); i += 1 {
  404. err = commondb[i].SyncWithMountTarget(ctx, userCred, self.ManagerId, commonext[i])
  405. if err != nil {
  406. result.UpdateError(err)
  407. continue
  408. }
  409. result.Update()
  410. }
  411. }
  412. for i := 0; i < len(added); i += 1 {
  413. err := self.newFromCloudMountTarget(ctx, userCred, added[i])
  414. if err != nil {
  415. result.AddError(err)
  416. continue
  417. }
  418. result.Add()
  419. }
  420. return result
  421. }
  422. func (self *SMountTarget) SyncWithMountTarget(ctx context.Context, userCred mcclient.TokenCredential, managerId string, m cloudprovider.ICloudMountTarget) error {
  423. _, err := db.Update(self, func() error {
  424. self.Status = m.GetStatus()
  425. self.Name = m.GetName()
  426. self.DomainName = m.GetDomainName()
  427. self.ExternalId = m.GetGlobalId()
  428. if groupId := m.GetAccessGroupId(); len(groupId) > 0 {
  429. _group, _ := db.FetchByExternalIdAndManagerId(AccessGroupManager, groupId, func(q *sqlchemy.SQuery) *sqlchemy.SQuery {
  430. return q.Equals("manager_id", managerId)
  431. })
  432. if _group != nil {
  433. group := _group.(*SAccessGroup)
  434. self.AccessGroupId = group.Id
  435. }
  436. }
  437. return nil
  438. })
  439. return errors.Wrapf(err, "db.Update")
  440. }
  441. func (self *SFileSystem) newFromCloudMountTarget(ctx context.Context, userCred mcclient.TokenCredential, m cloudprovider.ICloudMountTarget) error {
  442. mount := &SMountTarget{}
  443. mount.SetModelManager(MountTargetManager, mount)
  444. mount.FileSystemId = self.Id
  445. mount.Name = m.GetName()
  446. mount.Status = m.GetStatus()
  447. mount.ExternalId = m.GetGlobalId()
  448. mount.DomainName = m.GetDomainName()
  449. mount.NetworkType = m.GetNetworkType()
  450. if mount.NetworkType == api.NETWORK_TYPE_VPC {
  451. if vpcId := m.GetVpcId(); len(vpcId) > 0 {
  452. vpc, err := db.FetchByExternalIdAndManagerId(VpcManager, vpcId, func(q *sqlchemy.SQuery) *sqlchemy.SQuery {
  453. return q.Equals("manager_id", self.ManagerId)
  454. })
  455. if err != nil {
  456. log.Errorf("failed to found vpc for mount point %s by externalId: %s", mount.Name, vpcId)
  457. } else {
  458. mount.VpcId = vpc.GetId()
  459. }
  460. }
  461. if networkId := m.GetNetworkId(); len(networkId) > 0 {
  462. network, err := db.FetchByExternalIdAndManagerId(NetworkManager, networkId, func(q *sqlchemy.SQuery) *sqlchemy.SQuery {
  463. wire := WireManager.Query().SubQuery()
  464. vpc := VpcManager.Query().SubQuery()
  465. return q.Join(wire, sqlchemy.Equals(wire.Field("id"), q.Field("wire_id"))).
  466. Join(vpc, sqlchemy.Equals(vpc.Field("id"), wire.Field("vpc_id"))).
  467. Filter(sqlchemy.Equals(vpc.Field("manager_id"), self.ManagerId))
  468. })
  469. if err != nil {
  470. log.Errorf("failed to found network for mount point %s by externalId: %s", mount.Name, networkId)
  471. } else {
  472. mount.NetworkId = network.GetId()
  473. }
  474. }
  475. }
  476. return MountTargetManager.TableSpec().Insert(ctx, mount)
  477. }
  478. func (self *SMountTarget) GetNetwork() (*SNetwork, error) {
  479. network, err := NetworkManager.FetchById(self.NetworkId)
  480. if err != nil {
  481. return nil, errors.Wrapf(err, "NetworkManager.FetchById(%s)", self.NetworkId)
  482. }
  483. return network.(*SNetwork), nil
  484. }
  485. func (self *SMountTarget) GetVpc() (*SVpc, error) {
  486. vpc, err := VpcManager.FetchById(self.VpcId)
  487. if err != nil {
  488. return nil, errors.Wrapf(err, "VpcManager.FetchById(%s)", self.VpcId)
  489. }
  490. return vpc.(*SVpc), nil
  491. }
  492. // 同步挂载点状态
  493. func (self *SMountTarget) PerformSyncstatus(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.MountTargetSyncstatusInput) (jsonutils.JSONObject, error) {
  494. return nil, self.StartSyncstatus(ctx, userCred, "")
  495. }
  496. func (self *SMountTarget) StartSyncstatus(ctx context.Context, userCred mcclient.TokenCredential, parentTaskId string) error {
  497. return StartResourceSyncStatusTask(ctx, userCred, self, "MountTargetSyncstatusTask", parentTaskId)
  498. }