| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package models
- import (
- "context"
- "yunion.io/x/cloudmux/pkg/cloudprovider"
- "yunion.io/x/jsonutils"
- "yunion.io/x/pkg/errors"
- "yunion.io/x/pkg/util/compare"
- "yunion.io/x/pkg/util/regutils"
- "yunion.io/x/sqlchemy"
- api "yunion.io/x/onecloud/pkg/apis/compute"
- "yunion.io/x/onecloud/pkg/cloudcommon/db"
- "yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
- "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
- "yunion.io/x/onecloud/pkg/cloudcommon/validators"
- "yunion.io/x/onecloud/pkg/httperrors"
- "yunion.io/x/onecloud/pkg/mcclient"
- "yunion.io/x/onecloud/pkg/util/stringutils2"
- )
- // +onecloud:swagger-gen-model-singular=natdentry
- // +onecloud:swagger-gen-model-plural=natdentries
- type SNatDEntryManager struct {
- SNatEntryManager
- }
- var NatDEntryManager *SNatDEntryManager
- func init() {
- NatDEntryManager = &SNatDEntryManager{
- SNatEntryManager: NewNatEntryManager(
- SNatDEntry{},
- "natdtables_tbl",
- "natdentry",
- "natdentries",
- ),
- }
- NatDEntryManager.SetVirtualObject(NatDEntryManager)
- }
- type SNatDEntry struct {
- SNatEntry
- ExternalIP string `width:"17" charset:"ascii" list:"user" create:"required"`
- ExternalPort int `list:"user" create:"required"`
- InternalIP string `width:"17" charset:"ascii" list:"user" create:"required"`
- InternalPort int `list:"user" create:"required"`
- IpProtocol string `width:"8" charset:"ascii" list:"user" create:"required"`
- }
- // NAT网关的目的地址转换规则列表
- func (man *SNatDEntryManager) ListItemFilter(
- ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- query api.NatDEntryListInput,
- ) (*sqlchemy.SQuery, error) {
- q, err := man.SNatEntryManager.ListItemFilter(ctx, q, userCred, query.NatEntryListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SNatEntryManager.ListItemFilter")
- }
- if len(query.ExternalIP) > 0 {
- q = q.In("external_ip", query.ExternalIP)
- }
- if len(query.ExternalPort) > 0 {
- q = q.In("external_port", query.ExternalPort)
- }
- if len(query.InternalIP) > 0 {
- q = q.In("internal_ip", query.InternalIP)
- }
- if len(query.InternalPort) > 0 {
- q = q.In("internal_port", query.InternalPort)
- }
- if len(query.IpProtocol) > 0 {
- q = q.In("ip_protocol", query.IpProtocol)
- }
- return q, nil
- }
- func (manager *SNatDEntryManager) OrderByExtraFields(
- ctx context.Context,
- q *sqlchemy.SQuery,
- userCred mcclient.TokenCredential,
- query api.NatDEntryListInput,
- ) (*sqlchemy.SQuery, error) {
- q, err := manager.SNatEntryManager.OrderByExtraFields(ctx, q, userCred, query.NatEntryListInput)
- if err != nil {
- return nil, errors.Wrap(err, "SNatEntryManager.OrderByExtraFields")
- }
- return q, nil
- }
- func (manager *SNatDEntryManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
- var err error
- q, err = manager.SNatEntryManager.QueryDistinctExtraField(q, field)
- if err == nil {
- return q, nil
- }
- return q, httperrors.ErrNotFound
- }
- func (self *SNatDEntry) GetUniqValues() jsonutils.JSONObject {
- return jsonutils.Marshal(map[string]string{"natgateway_id": self.NatgatewayId})
- }
- func (manager *SNatDEntryManager) FetchUniqValues(ctx context.Context, data jsonutils.JSONObject) jsonutils.JSONObject {
- natId, _ := data.GetString("natgateway_id")
- return jsonutils.Marshal(map[string]string{"natgateway_id": natId})
- }
- func (manager *SNatDEntryManager) FilterByUniqValues(q *sqlchemy.SQuery, values jsonutils.JSONObject) *sqlchemy.SQuery {
- natId, _ := values.GetString("natgateway_id")
- if len(natId) > 0 {
- q = q.Equals("natgateway_id", natId)
- }
- return q
- }
- func (man *SNatDEntryManager) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, input *api.SNatDCreateInput) (*api.SNatDCreateInput, error) {
- if len(input.NatgatewayId) == 0 {
- return nil, httperrors.NewMissingParameterError("natgateway_id")
- }
- if len(input.Eip) == 0 {
- return nil, httperrors.NewMissingParameterError("eip")
- }
- if input.ExternalPort < 1 || input.ExternalPort > 65535 {
- return nil, httperrors.NewInputParameterError("Port value error")
- }
- if input.InternalPort < 1 || input.InternalPort > 65535 {
- return nil, httperrors.NewInputParameterError("Port value error")
- }
- if !regutils.MatchIPAddr(input.InternalIp) {
- return nil, httperrors.NewInputParameterError("invalid internal ip address: %s", input.InternalIp)
- }
- _eip, err := validators.ValidateModel(ctx, userCred, ElasticipManager, &input.Eip)
- if err != nil {
- return nil, err
- }
- eip := _eip.(*SElasticip)
- input.ExternalIp = eip.IpAddr
- q := man.Query().Equals("external_ip", input.ExternalIp).Equals("external_port", input.ExternalPort)
- count, err := q.CountWithError()
- if err != nil {
- return nil, errors.Wrap(err, "q.CountWithError")
- }
- if count > 0 {
- return nil, httperrors.NewInputParameterError("there are dnat rules with same external ip and external port")
- }
- // check that eip is suitable
- if len(eip.AssociateId) > 0 && eip.AssociateId != input.NatgatewayId {
- return nil, httperrors.NewInputParameterError("eip has been binding to another instance")
- }
- return input, nil
- }
- func (manager *SNatDEntryManager) SyncNatDTable(
- ctx context.Context,
- userCred mcclient.TokenCredential,
- provider *SCloudprovider,
- nat *SNatGateway,
- extDTable []cloudprovider.ICloudNatDEntry,
- xor bool,
- ) compare.SyncResult {
- syncOwnerId := provider.GetOwnerId()
- lockman.LockRawObject(ctx, manager.Keyword(), nat.Id)
- defer lockman.ReleaseRawObject(ctx, manager.Keyword(), nat.Id)
- result := compare.SyncResult{}
- dbNatDTables, err := nat.GetDTable()
- if err != nil {
- result.Error(err)
- return result
- }
- removed := make([]SNatDEntry, 0)
- commondb := make([]SNatDEntry, 0)
- commonext := make([]cloudprovider.ICloudNatDEntry, 0)
- added := make([]cloudprovider.ICloudNatDEntry, 0)
- if err := compare.CompareSets(dbNatDTables, extDTable, &removed, &commondb, &commonext, &added); err != nil {
- result.Error(err)
- return result
- }
- for i := 0; i < len(removed); i += 1 {
- err := removed[i].syncRemoveCloudNatDTable(ctx, userCred)
- if err != nil {
- result.DeleteError(err)
- } else {
- result.Delete()
- }
- }
- if !xor {
- for i := 0; i < len(commondb); i += 1 {
- err := commondb[i].SyncWithCloudNatDTable(ctx, userCred, commonext[i], provider)
- if err != nil {
- result.UpdateError(err)
- continue
- }
- result.Update()
- }
- }
- for i := 0; i < len(added); i += 1 {
- _, err := manager.newFromCloudNatDTable(ctx, userCred, syncOwnerId, nat, added[i])
- if err != nil {
- result.AddError(err)
- continue
- }
- result.Add()
- }
- return result
- }
- func (self *SNatDEntry) GetCloudproviderId() string {
- nat, _ := self.GetNatgateway()
- if nat != nil {
- return nat.GetCloudproviderId()
- }
- return ""
- }
- func (self *SNatDEntry) syncRemoveCloudNatDTable(ctx context.Context, userCred mcclient.TokenCredential) error {
- lockman.LockObject(ctx, self)
- defer lockman.ReleaseObject(ctx, self)
- err := self.ValidateDeleteCondition(ctx, nil)
- if err != nil { // cannot delete
- return self.SetStatus(ctx, userCred, api.VPC_STATUS_UNKNOWN, "sync to delete")
- }
- return self.RealDelete(ctx, userCred)
- }
- func (self *SNatDEntry) SyncWithCloudNatDTable(ctx context.Context, userCred mcclient.TokenCredential, extEntry cloudprovider.ICloudNatDEntry, provider *SCloudprovider) error {
- diff, err := db.UpdateWithLock(ctx, self, func() error {
- self.Status = extEntry.GetStatus()
- self.ExternalIP = extEntry.GetExternalIp()
- self.ExternalPort = extEntry.GetExternalPort()
- self.InternalIP = extEntry.GetInternalIp()
- self.InternalPort = extEntry.GetInternalPort()
- self.IpProtocol = extEntry.GetIpProtocol()
- return nil
- })
- if err != nil {
- return err
- }
- SyncCloudDomain(userCred, self, provider.GetOwnerId())
- if account, _ := provider.GetCloudaccount(); account != nil {
- syncMetadata(ctx, userCred, self, extEntry, account.ReadOnly)
- }
- db.OpsLog.LogSyncUpdate(self, diff, userCred)
- return nil
- }
- func (manager *SNatDEntryManager) newFromCloudNatDTable(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, nat *SNatGateway, extEntry cloudprovider.ICloudNatDEntry) (*SNatDEntry, error) {
- table := SNatDEntry{}
- table.SetModelManager(manager, &table)
- table.Status = extEntry.GetStatus()
- table.ExternalId = extEntry.GetGlobalId()
- table.IsEmulated = extEntry.IsEmulated()
- table.NatgatewayId = nat.Id
- table.ExternalIP = extEntry.GetExternalIp()
- table.ExternalPort = extEntry.GetExternalPort()
- table.InternalIP = extEntry.GetInternalIp()
- table.InternalPort = extEntry.GetInternalPort()
- table.IpProtocol = extEntry.GetIpProtocol()
- var err = func() error {
- lockman.LockRawObject(ctx, manager.Keyword(), "name")
- defer lockman.ReleaseRawObject(ctx, manager.Keyword(), "name")
- var err error
- table.Name, err = db.GenerateName(ctx, manager, ownerId, extEntry.GetName())
- if err != nil {
- return err
- }
- return manager.TableSpec().Insert(ctx, &table)
- }()
- if err != nil {
- return nil, errors.Wrapf(err, "Insert")
- }
- SyncCloudDomain(userCred, &table, ownerId)
- syncMetadata(ctx, userCred, &table, extEntry, false)
- db.OpsLog.LogEvent(&table, db.ACT_CREATE, table.GetShortDesc(ctx), userCred)
- return &table, nil
- }
- func (manager *SNatDEntryManager) FetchCustomizeColumns(
- ctx context.Context,
- userCred mcclient.TokenCredential,
- query jsonutils.JSONObject,
- objs []interface{},
- fields stringutils2.SSortedStrings,
- isList bool,
- ) []api.NatDEntryDetails {
- rows := make([]api.NatDEntryDetails, len(objs))
- entryRows := manager.SNatEntryManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
- for i := range rows {
- rows[i] = api.NatDEntryDetails{
- NatEntryDetails: entryRows[i],
- }
- }
- return rows
- }
- func (self *SNatDEntry) PostCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) {
- var err = func() error {
- task, err := taskman.TaskManager.NewTask(ctx, "SNatDEntryCreateTask", self, userCred, nil, "", "", nil)
- if err != nil {
- return errors.Wrapf(err, "NewTask")
- }
- return task.ScheduleRun(nil)
- }()
- if err != nil {
- self.SetStatus(ctx, userCred, api.NAT_STATUS_CREATE_FAILED, err.Error())
- return
- }
- self.SetStatus(ctx, userCred, api.NAT_STATUS_ALLOCATE, "")
- }
- func (self *SNatDEntry) CustomizeDelete(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) error {
- return self.StartDeleteDNatTask(ctx, userCred)
- }
- func (self *SNatDEntry) StartDeleteDNatTask(ctx context.Context, userCred mcclient.TokenCredential) error {
- var err = func() error {
- task, err := taskman.TaskManager.NewTask(ctx, "SNatDEntryDeleteTask", self, userCred, nil, "", "", nil)
- if err != nil {
- return errors.Wrapf(err, "NewTask")
- }
- return task.ScheduleRun(nil)
- }()
- if err != nil {
- self.SetStatus(ctx, userCred, api.NAT_STATUS_DELETE_FAILED, err.Error())
- return err
- }
- self.SetStatus(ctx, userCred, api.NAT_STATUS_DELETING, "")
- return nil
- }
- func (self *SNatDEntry) GetEip() (*SElasticip, error) {
- q := ElasticipManager.Query().Equals("ip_addr", self.ExternalIP)
- eips := []SElasticip{}
- err := db.FetchModelObjects(ElasticipManager, q, &eips)
- if err != nil {
- return nil, errors.Wrapf(err, "db.FetchModelObjects")
- }
- if len(eips) == 1 {
- return &eips[0], nil
- }
- if len(eips) == 0 {
- return nil, errors.Wrapf(cloudprovider.ErrNotFound, "%v", self.ExternalIP)
- }
- return nil, errors.Wrapf(cloudprovider.ErrDuplicateId, "%v", self.ExternalIP)
- }
|