networks.go 133 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package models
  15. import (
  16. "context"
  17. "database/sql"
  18. "fmt"
  19. "math"
  20. "math/big"
  21. "sort"
  22. "strings"
  23. "time"
  24. "yunion.io/x/cloudmux/pkg/cloudprovider"
  25. "yunion.io/x/jsonutils"
  26. "yunion.io/x/log"
  27. "yunion.io/x/pkg/errors"
  28. "yunion.io/x/pkg/gotypes"
  29. "yunion.io/x/pkg/tristate"
  30. "yunion.io/x/pkg/util/billing"
  31. "yunion.io/x/pkg/util/compare"
  32. "yunion.io/x/pkg/util/netutils"
  33. "yunion.io/x/pkg/util/rand"
  34. "yunion.io/x/pkg/util/rbacscope"
  35. "yunion.io/x/pkg/util/regutils"
  36. "yunion.io/x/pkg/util/sets"
  37. "yunion.io/x/pkg/utils"
  38. "yunion.io/x/sqlchemy"
  39. "yunion.io/x/onecloud/pkg/apis"
  40. billing_api "yunion.io/x/onecloud/pkg/apis/billing"
  41. api "yunion.io/x/onecloud/pkg/apis/compute"
  42. "yunion.io/x/onecloud/pkg/cloudcommon/consts"
  43. "yunion.io/x/onecloud/pkg/cloudcommon/db"
  44. "yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
  45. "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
  46. "yunion.io/x/onecloud/pkg/cloudcommon/notifyclient"
  47. "yunion.io/x/onecloud/pkg/cloudcommon/policy"
  48. "yunion.io/x/onecloud/pkg/cloudcommon/types"
  49. "yunion.io/x/onecloud/pkg/cloudcommon/validators"
  50. "yunion.io/x/onecloud/pkg/compute/options"
  51. "yunion.io/x/onecloud/pkg/httperrors"
  52. "yunion.io/x/onecloud/pkg/mcclient"
  53. "yunion.io/x/onecloud/pkg/mcclient/auth"
  54. "yunion.io/x/onecloud/pkg/util/logclient"
  55. "yunion.io/x/onecloud/pkg/util/rbacutils"
  56. "yunion.io/x/onecloud/pkg/util/stringutils2"
  57. )
  58. type SNetworkManager struct {
  59. db.SSharableVirtualResourceBaseManager
  60. db.SExternalizedResourceBaseManager
  61. SWireResourceBaseManager
  62. }
  63. var NetworkManager *SNetworkManager
  64. func GetNetworkManager() *SNetworkManager {
  65. if NetworkManager != nil {
  66. return NetworkManager
  67. }
  68. NetworkManager = &SNetworkManager{
  69. SSharableVirtualResourceBaseManager: db.NewSharableVirtualResourceBaseManager(
  70. SNetwork{},
  71. "networks_tbl",
  72. "network",
  73. "networks",
  74. ),
  75. }
  76. NetworkManager.SetVirtualObject(NetworkManager)
  77. return NetworkManager
  78. }
  79. func init() {
  80. GetNetworkManager()
  81. }
  82. type SNetwork struct {
  83. db.SSharableVirtualResourceBase
  84. db.SExternalizedResourceBase
  85. SWireResourceBase
  86. IfnameHint string `width:"9" charset:"ascii" nullable:"true" list:"user" create:"optional"`
  87. // 起始IP地址
  88. GuestIpStart string `width:"16" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  89. // 结束IP地址
  90. GuestIpEnd string `width:"16" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  91. // 掩码
  92. GuestIpMask int8 `nullable:"true" list:"user" update:"user" create:"optional"`
  93. // 网关地址
  94. GuestGateway string `width:"16" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  95. // DNS, allow multiple dns, seperated by ","
  96. GuestDns string `width:"64" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  97. // allow multiple dhcp, seperated by ","
  98. GuestDhcp string `width:"64" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  99. // allow mutiple ntp, seperated by ","
  100. GuestNtp string `width:"64" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  101. // search domain
  102. GuestDomain string `width:"128" charset:"ascii" nullable:"true" get:"user" update:"user"`
  103. // 起始IPv6地址
  104. GuestIp6Start string `width:"64" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  105. // 结束IPv6地址
  106. GuestIp6End string `width:"64" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  107. // IPv6子网掩码
  108. GuestIp6Mask uint8 `nullable:"true" list:"user" update:"user" create:"optional"`
  109. // IPv6网关
  110. GuestGateway6 string `width:"64" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  111. // IPv6域名服务器
  112. // GuestDns6 string `width:"64" charset:"ascii" nullable:"true"`
  113. // GuestDomain6 string `width:"128" charset:"ascii" nullable:"true"`
  114. VlanId int `nullable:"false" default:"1" list:"user" update:"user" create:"optional"`
  115. // 服务器类型
  116. // example: server
  117. ServerType api.TNetworkType `width:"16" charset:"ascii" default:"guest" nullable:"true" list:"user" update:"admin" create:"optional"`
  118. // 分配策略
  119. AllocPolicy string `width:"16" charset:"ascii" nullable:"true" get:"user" update:"user" create:"optional"`
  120. AllocTimoutSeconds int `default:"0" nullable:"true" get:"admin"`
  121. // 该网段是否用于自动分配IP地址,如果为false,则用户需要明确选择该网段,才会使用该网段分配IP,
  122. // 如果为true,则用户不指定网段时,则自动从该值为true的网络中选择一个分配地址
  123. IsAutoAlloc tristate.TriState `list:"user" get:"user" update:"user" create:"optional"`
  124. // 线路类型
  125. BgpType string `width:"64" charset:"utf8" nullable:"false" list:"user" get:"user" update:"user" create:"optional"`
  126. }
  127. func (manager *SNetworkManager) GetContextManagers() [][]db.IModelManager {
  128. return [][]db.IModelManager{
  129. {WireManager},
  130. }
  131. }
  132. func (snet *SNetwork) getMtu(wire *SWire) int16 {
  133. baseMtu := options.Options.DefaultMtu
  134. if wire == nil {
  135. wire, _ = snet.GetWire()
  136. }
  137. if wire != nil {
  138. if IsOneCloudVpcResource(wire) {
  139. return int16(options.Options.OvnUnderlayMtu - api.VPC_OVN_ENCAP_COST)
  140. } else if wire.Mtu != 0 {
  141. return int16(wire.Mtu)
  142. } else {
  143. return int16(baseMtu)
  144. }
  145. }
  146. return int16(baseMtu)
  147. }
  148. func (snet *SNetwork) GetNetworkInterfaces() ([]SNetworkInterface, error) {
  149. sq := NetworkinterfacenetworkManager.Query().SubQuery()
  150. q := NetworkInterfaceManager.Query()
  151. q = q.Join(sq, sqlchemy.Equals(q.Field("id"), sq.Field("networkinterface_id"))).
  152. Filter(sqlchemy.Equals(sq.Field("network_id"), snet.Id))
  153. networkinterfaces := []SNetworkInterface{}
  154. err := db.FetchModelObjects(NetworkInterfaceManager, q, &networkinterfaces)
  155. if err != nil {
  156. return nil, err
  157. }
  158. return networkinterfaces, nil
  159. }
  160. func (snet *SNetwork) ValidateDeleteCondition(ctx context.Context, data *api.NetworkDetails) error {
  161. if data == nil {
  162. data = &api.NetworkDetails{}
  163. nics, err := NetworkManager.TotalNicCount([]string{snet.Id})
  164. if err != nil {
  165. return errors.Wrapf(err, "TotalNicCount")
  166. }
  167. if cnt, ok := nics[snet.Id]; ok {
  168. data.SNetworkNics = cnt
  169. }
  170. }
  171. if data.Total-data.ReserveVnics4-data.NetworkinterfaceVnics > 0 || data.Total6-data.ReserveVnics6 > 0 {
  172. return httperrors.NewNotEmptyError("not an empty network %s", jsonutils.Marshal(data.SNetworkNics).String())
  173. }
  174. return snet.SSharableVirtualResourceBase.ValidateDeleteCondition(ctx, nil)
  175. }
  176. func (snet *SNetwork) GetGuestnetworks() ([]SGuestnetwork, error) {
  177. q := GuestnetworkManager.Query().Equals("network_id", snet.Id)
  178. gns := []SGuestnetwork{}
  179. err := db.FetchModelObjects(GuestnetworkManager, q, &gns)
  180. if err != nil {
  181. return nil, errors.Wrapf(err, "db.FetchModelObjects")
  182. }
  183. return gns, nil
  184. }
  185. func (snet *SNetwork) GetDBInstanceNetworks() ([]SDBInstanceNetwork, error) {
  186. q := DBInstanceNetworkManager.Query().Equals("network_id", snet.Id)
  187. networks := []SDBInstanceNetwork{}
  188. err := db.FetchModelObjects(DBInstanceNetworkManager, q, &networks)
  189. if err != nil {
  190. return nil, errors.Wrapf(err, "db.FetchModelObjects")
  191. }
  192. return networks, nil
  193. }
  194. func (manager *SNetworkManager) GetOrCreateClassicNetwork(ctx context.Context, wire *SWire) (*SNetwork, error) {
  195. _network, err := db.FetchByExternalIdAndManagerId(manager, wire.Id, func(q *sqlchemy.SQuery) *sqlchemy.SQuery {
  196. v, _ := wire.GetVpc()
  197. if v != nil {
  198. wire := WireManager.Query().SubQuery()
  199. vpc := VpcManager.Query().SubQuery()
  200. return q.Join(wire, sqlchemy.Equals(wire.Field("id"), q.Field("wire_id"))).
  201. Join(vpc, sqlchemy.Equals(vpc.Field("id"), wire.Field("vpc_id"))).
  202. Filter(sqlchemy.Equals(vpc.Field("manager_id"), v.ManagerId))
  203. }
  204. return q
  205. })
  206. if err == nil {
  207. return _network.(*SNetwork), nil
  208. }
  209. if errors.Cause(err) != sql.ErrNoRows {
  210. return nil, errors.Wrap(err, "db.FetchByExternalId")
  211. }
  212. network := SNetwork{
  213. GuestIpStart: "0.0.0.0",
  214. GuestIpEnd: "255.255.255.255",
  215. GuestIpMask: 0,
  216. GuestGateway: "0.0.0.0",
  217. ServerType: api.NETWORK_TYPE_GUEST,
  218. }
  219. network.WireId = wire.Id
  220. network.SetModelManager(manager, &network)
  221. network.Name = fmt.Sprintf("emulate network for classic network with wire %s", wire.Id)
  222. network.ExternalId = wire.Id
  223. network.IsEmulated = true
  224. network.IsPublic = true
  225. network.PublicScope = "system"
  226. admin := auth.AdminCredential()
  227. network.DomainId = admin.GetProjectDomainId()
  228. network.ProjectId = admin.GetProjectId()
  229. network.Status = api.NETWORK_STATUS_UNAVAILABLE
  230. err = manager.TableSpec().Insert(ctx, &network)
  231. if err != nil {
  232. return nil, errors.Wrap(err, "Insert classic network")
  233. }
  234. return &network, nil
  235. }
  236. func (snet *SNetwork) GetUsedAddresses(ctx context.Context) map[string]bool {
  237. used := make(map[string]bool)
  238. q := snet.getUsedAddressQuery(ctx, nil, nil, rbacscope.ScopeSystem, true)
  239. results, err := q.AllStringMap()
  240. if err != nil {
  241. log.Errorf("GetUsedAddresses fail %s", err)
  242. return used
  243. }
  244. for _, result := range results {
  245. used[result["ip_addr"]] = true
  246. }
  247. return used
  248. }
  249. func (snet *SNetwork) GetUsedAddresses6(ctx context.Context) map[string]bool {
  250. used := make(map[string]bool)
  251. q := snet.getUsedAddressQuery6(ctx, nil, nil, rbacscope.ScopeSystem, true)
  252. results, err := q.AllStringMap()
  253. if err != nil {
  254. log.Errorf("GetUsedAddresses fail %s", err)
  255. return used
  256. }
  257. for _, result := range results {
  258. used[result["ip6_addr"]] = true
  259. }
  260. return used
  261. }
  262. func (snet *SNetwork) GetIPRange() *netutils.IPV4AddrRange {
  263. return snet.getIPRange()
  264. }
  265. func (net *SNetwork) getIPRange() *netutils.IPV4AddrRange {
  266. if len(net.GuestIpStart) == 0 || len(net.GuestIpEnd) == 0 {
  267. return nil
  268. }
  269. start, _ := netutils.NewIPV4Addr(net.GuestIpStart)
  270. end, _ := netutils.NewIPV4Addr(net.GuestIpEnd)
  271. ipRange := netutils.NewIPV4AddrRange(start, end)
  272. return &ipRange
  273. }
  274. func (net *SNetwork) getIPRange6() *netutils.IPV6AddrRange {
  275. if len(net.GuestIp6Start) == 0 || len(net.GuestIp6End) == 0 {
  276. return nil
  277. }
  278. start, _ := netutils.NewIPV6Addr(net.GuestIp6Start)
  279. end, _ := netutils.NewIPV6Addr(net.GuestIp6End)
  280. ipRange := netutils.NewIPV6AddrRange(start, end)
  281. return &ipRange
  282. }
  283. func (net *SNetwork) getNetRange() netutils.IPV4AddrRange {
  284. start, _ := netutils.NewIPV4Addr(net.GuestIpStart)
  285. return netutils.NewIPV4AddrRange(start.NetAddr(net.GuestIpMask), start.BroadcastAddr(net.GuestIpMask))
  286. }
  287. func isIpUsed(ipstr string, addrTable map[string]bool, recentUsedAddrTable map[string]bool) bool {
  288. _, ok := addrTable[ipstr]
  289. if !ok {
  290. recentUsed := false
  291. if recentUsedAddrTable != nil {
  292. if _, ok := recentUsedAddrTable[ipstr]; ok {
  293. recentUsed = true
  294. }
  295. }
  296. return recentUsed
  297. } else {
  298. return true
  299. }
  300. }
  301. func (snet *SNetwork) getFreeIP6(addrTable map[string]bool, recentUsedAddrTable map[string]bool, candidate string) (string, error) {
  302. if !snet.IsSupportIPv6() {
  303. return "", errors.Wrapf(cloudprovider.ErrNotSupported, "ipv6")
  304. }
  305. iprange := snet.getIPRange6()
  306. // Try candidate first
  307. if len(candidate) > 0 {
  308. candIP, err := netutils.NewIPV6Addr(candidate)
  309. if err != nil {
  310. return "", errors.Wrap(err, "NewIPV6Addr")
  311. }
  312. if !iprange.Contains(candIP) {
  313. return "", httperrors.NewInputParameterError("candidate %s out of range %s", candidate, iprange.String())
  314. }
  315. if _, ok := addrTable[candidate]; !ok {
  316. return candidate, nil
  317. }
  318. }
  319. // ipv6 support random address allocation only
  320. const MAX_TRIES = 5
  321. for i := 0; i < MAX_TRIES; i += 1 {
  322. ip := iprange.Random()
  323. if !isIpUsed(ip.String(), addrTable, recentUsedAddrTable) {
  324. return ip.String(), nil
  325. }
  326. }
  327. // failed, fallback to IPAllocationStepup
  328. return "", httperrors.NewInsufficientResourceError("Out of IP address")
  329. }
  330. func (snet *SNetwork) getFreeIP(addrTable map[string]bool, recentUsedAddrTable map[string]bool, candidate string, allocDir api.IPAllocationDirection) (string, error) {
  331. iprange := snet.getIPRange()
  332. // Try candidate first
  333. if len(candidate) > 0 {
  334. candIP, err := netutils.NewIPV4Addr(candidate)
  335. if err != nil {
  336. return "", err
  337. }
  338. if !iprange.Contains(candIP) {
  339. return "", httperrors.NewInputParameterError("candidate %s out of range %s", candidate, iprange.String())
  340. }
  341. if _, ok := addrTable[candidate]; !ok {
  342. return candidate, nil
  343. }
  344. }
  345. // If network's alloc_policy is not none, then use network's alloc_policy
  346. if len(snet.AllocPolicy) > 0 && api.IPAllocationDirection(snet.AllocPolicy) != api.IPAllocationNone {
  347. allocDir = api.IPAllocationDirection(snet.AllocPolicy)
  348. }
  349. // if alloc_dir is not speicified, and network's alloc_policy is not either, use default
  350. if len(allocDir) == 0 {
  351. allocDir = api.IPAllocationDirection(options.Options.DefaultIPAllocationDirection)
  352. }
  353. if allocDir == api.IPAllocationStepdown {
  354. ip, _ := netutils.NewIPV4Addr(snet.GuestIpEnd)
  355. for iprange.Contains(ip) {
  356. if !isIpUsed(ip.String(), addrTable, recentUsedAddrTable) {
  357. return ip.String(), nil
  358. }
  359. ip = ip.StepDown()
  360. }
  361. } else {
  362. if allocDir == api.IPAllocationRandom {
  363. const MAX_TRIES = 5
  364. for i := 0; i < MAX_TRIES; i += 1 {
  365. ip := iprange.Random()
  366. if !isIpUsed(ip.String(), addrTable, recentUsedAddrTable) {
  367. return ip.String(), nil
  368. }
  369. }
  370. // failed, fallback to IPAllocationStepup
  371. }
  372. ip, _ := netutils.NewIPV4Addr(snet.GuestIpStart)
  373. for iprange.Contains(ip) {
  374. if !isIpUsed(ip.String(), addrTable, recentUsedAddrTable) {
  375. return ip.String(), nil
  376. }
  377. ip = ip.StepUp()
  378. }
  379. }
  380. return "", httperrors.NewInsufficientResourceError("Out of IP address")
  381. }
  382. func (snet *SNetwork) GetFreeIPWithLock(ctx context.Context, userCred mcclient.TokenCredential, addrTable map[string]bool, recentUsedAddrTable map[string]bool, candidate string, allocDir api.IPAllocationDirection, reserved bool, addrType api.TAddressType) (string, error) {
  383. lockman.LockObject(ctx, snet)
  384. defer lockman.ReleaseObject(ctx, snet)
  385. return snet.GetFreeIP(ctx, userCred, addrTable, recentUsedAddrTable, candidate, allocDir, reserved, addrType)
  386. }
  387. func (snet *SNetwork) GetFreeIP(ctx context.Context, userCred mcclient.TokenCredential, addrTable map[string]bool, recentUsedAddrTable map[string]bool, candidate string, allocDir api.IPAllocationDirection, reserved bool, addrType api.TAddressType) (string, error) {
  388. // if reserved true, first try find IP in reserved IP pool
  389. if reserved {
  390. rip := ReservedipManager.GetReservedIP(snet, candidate, addrType)
  391. if rip != nil {
  392. rip.Release(ctx, userCred, snet)
  393. return candidate, nil
  394. }
  395. // return "", httperrors.NewInsufficientResourceError("Reserved address %s not found", candidate)
  396. // if not find, warning, then fallback to normal procedure
  397. log.Warningf("Reserved address %s not found", candidate)
  398. }
  399. if addrType == api.AddressTypeIPv6 {
  400. if addrTable == nil {
  401. addrTable = snet.GetUsedAddresses6(ctx)
  402. }
  403. if recentUsedAddrTable == nil {
  404. recentUsedAddrTable = GuestnetworkManager.getRecentlyReleasedIPAddresses6(snet.Id, snet.getAllocTimoutDuration())
  405. }
  406. cand, err := snet.getFreeIP6(addrTable, recentUsedAddrTable, candidate)
  407. if err != nil {
  408. return "", errors.Wrap(err, "getFreeIP6")
  409. }
  410. return cand, nil
  411. } else {
  412. if addrTable == nil {
  413. addrTable = snet.GetUsedAddresses(ctx)
  414. }
  415. if recentUsedAddrTable == nil {
  416. recentUsedAddrTable = GuestnetworkManager.getRecentlyReleasedIPAddresses(snet.Id, snet.getAllocTimoutDuration())
  417. }
  418. cand, err := snet.getFreeIP(addrTable, recentUsedAddrTable, candidate, allocDir)
  419. if err != nil {
  420. return "", errors.Wrap(err, "getFreeIP")
  421. }
  422. return cand, nil
  423. }
  424. }
  425. func (snet *SNetwork) GetNetAddr() netutils.IPV4Addr {
  426. startIp, _ := netutils.NewIPV4Addr(snet.GuestIpStart)
  427. return startIp.NetAddr(snet.GuestIpMask)
  428. }
  429. func (snet *SNetwork) GetDNS(zoneName string) string {
  430. if len(snet.GuestDns) > 0 {
  431. return snet.GuestDns
  432. }
  433. if len(zoneName) == 0 {
  434. wire, _ := snet.GetWire()
  435. if wire != nil {
  436. zone, _ := wire.GetZone()
  437. if zone != nil {
  438. zoneName = zone.Name
  439. }
  440. }
  441. }
  442. srvs, _ := auth.GetDNSServers(options.Options.Region, zoneName)
  443. if len(srvs) > 0 {
  444. return strings.Join(srvs, ",")
  445. }
  446. if len(options.Options.DNSServer) > 0 {
  447. return options.Options.DNSServer
  448. }
  449. return ""
  450. }
  451. func (snet *SNetwork) GetNTP() string {
  452. if len(snet.GuestNtp) > 0 {
  453. return snet.GuestNtp
  454. } else {
  455. zoneName := ""
  456. wire, _ := snet.GetWire()
  457. if wire != nil {
  458. zone, _ := wire.GetZone()
  459. if zone != nil {
  460. zoneName = zone.Name
  461. }
  462. }
  463. srvs, _ := auth.GetNTPServers(options.Options.Region, zoneName)
  464. if len(srvs) > 0 {
  465. return strings.Join(srvs, ",")
  466. }
  467. return ""
  468. }
  469. }
  470. func (snet *SNetwork) GetDomain() string {
  471. if len(snet.GuestDomain) > 0 {
  472. return snet.GuestDomain
  473. } else if !apis.IsIllegalSearchDomain(options.Options.DNSDomain) {
  474. return options.Options.DNSDomain
  475. } else {
  476. return ""
  477. }
  478. }
  479. func (snet *SNetwork) GetRoutes() []types.SRoute {
  480. ret := make([]types.SRoute, 0)
  481. routes := snet.GetMetadataJson(context.Background(), "static_routes", nil)
  482. if routes != nil {
  483. routesMap, err := routes.GetMap()
  484. if err != nil {
  485. return nil
  486. }
  487. for net, routeJson := range routesMap {
  488. route, _ := routeJson.GetString()
  489. ret = append(ret, types.SRoute{net, route})
  490. }
  491. }
  492. return ret
  493. }
  494. func (snet *SNetwork) updateDnsRecord(nic *SGuestnetwork, isAdd bool) {
  495. guest := nic.GetGuest()
  496. if !gotypes.IsNil(guest) {
  497. snet._updateDnsRecord(guest.Name, nic.IpAddr, isAdd)
  498. }
  499. }
  500. func (snet *SNetwork) _updateDnsRecord(name string, ipAddr string, isAdd bool) {
  501. if len(snet.GuestDns) > 0 && len(snet.GuestDomain) > 0 && len(ipAddr) > 0 {
  502. keyName := snet.GetMetadata(context.Background(), "dns_update_key_name", nil)
  503. keySecret := snet.GetMetadata(context.Background(), "dns_update_key_secret", nil)
  504. dnsSrv := snet.GetMetadata(context.Background(), "dns_update_server", nil)
  505. if len(dnsSrv) == 0 || !regutils.MatchIPAddr(dnsSrv) {
  506. dnsSrv = snet.GuestDns
  507. }
  508. log.Infof("dns update %s %s isAdd=%t", ipAddr, dnsSrv, isAdd)
  509. if len(keyName) > 0 && len(keySecret) > 0 {
  510. /* netman.get_manager().dns_update(name,
  511. snet.guest_domain, ip_addr, None,
  512. dns_srv, snet.guest_dns6, key_name, key_secret,
  513. is_add) */
  514. }
  515. targets := snet.getDnsUpdateTargets()
  516. if targets != nil {
  517. for srv, keys := range targets {
  518. for _, key := range keys {
  519. log.Debugf("Register %s %s", srv, key)
  520. /*
  521. netman.get_manager().dns_update(name,
  522. snet.guest_domain, ip_addr, None,
  523. srv, None,
  524. key.get('key', None),
  525. key.get('secret', None),
  526. is_add)
  527. */
  528. }
  529. }
  530. }
  531. }
  532. }
  533. type DNSUpdateKeySecret struct {
  534. Key string
  535. Secret string
  536. }
  537. func (snet *SNetwork) getDnsUpdateTargets() map[string][]DNSUpdateKeySecret {
  538. targets := make(map[string][]DNSUpdateKeySecret)
  539. targetsJson := snet.GetMetadataJson(context.Background(), api.EXTRA_DNS_UPDATE_TARGETS, nil)
  540. if targetsJson == nil {
  541. return nil
  542. } else {
  543. err := targetsJson.Unmarshal(&targets)
  544. if err != nil {
  545. return nil
  546. }
  547. return targets
  548. }
  549. }
  550. func (snet *SNetwork) GetGuestIpv4StartAddress() netutils.IPV4Addr {
  551. addr, _ := netutils.NewIPV4Addr(snet.GuestIpStart)
  552. return addr
  553. }
  554. func (snet *SNetwork) IsExitNetwork() bool {
  555. if len(snet.GuestIpStart) == 0 {
  556. return false
  557. }
  558. return len(snet.ExternalId) == 0 && netutils.IsExitAddress(snet.GetGuestIpv4StartAddress())
  559. }
  560. func (manager *SNetworkManager) getNetworksByWire(ctx context.Context, wire *SWire) ([]SNetwork, error) {
  561. return wire.getNetworks(ctx, nil, nil, rbacscope.ScopeNone)
  562. }
  563. func (manager *SNetworkManager) SyncNetworks(
  564. ctx context.Context,
  565. userCred mcclient.TokenCredential,
  566. wire *SWire,
  567. nets []cloudprovider.ICloudNetwork,
  568. provider *SCloudprovider,
  569. xor bool,
  570. ) ([]SNetwork, []cloudprovider.ICloudNetwork, compare.SyncResult) {
  571. syncOwnerId := provider.GetOwnerId()
  572. lockman.LockRawObject(ctx, manager.Keyword(), wire.Id)
  573. defer lockman.ReleaseRawObject(ctx, manager.Keyword(), wire.Id)
  574. localNets := make([]SNetwork, 0)
  575. remoteNets := make([]cloudprovider.ICloudNetwork, 0)
  576. syncResult := compare.SyncResult{}
  577. dbNets, err := manager.getNetworksByWire(ctx, wire)
  578. if err != nil {
  579. syncResult.Error(err)
  580. return nil, nil, syncResult
  581. }
  582. for i := range dbNets {
  583. if taskman.TaskManager.IsInTask(&dbNets[i]) {
  584. syncResult.Error(fmt.Errorf("object in task"))
  585. return nil, nil, syncResult
  586. }
  587. }
  588. removed := make([]SNetwork, 0)
  589. commondb := make([]SNetwork, 0)
  590. commonext := make([]cloudprovider.ICloudNetwork, 0)
  591. added := make([]cloudprovider.ICloudNetwork, 0)
  592. err = compare.CompareSets(dbNets, nets, &removed, &commondb, &commonext, &added)
  593. if err != nil {
  594. syncResult.Error(err)
  595. return nil, nil, syncResult
  596. }
  597. for i := 0; i < len(removed); i += 1 {
  598. err = removed[i].syncRemoveCloudNetwork(ctx, userCred)
  599. if err != nil {
  600. syncResult.DeleteError(err)
  601. } else {
  602. syncResult.Delete()
  603. }
  604. }
  605. if !xor {
  606. for i := 0; i < len(commondb); i += 1 {
  607. err = commondb[i].SyncWithCloudNetwork(ctx, userCred, commonext[i])
  608. if err != nil {
  609. syncResult.UpdateError(err)
  610. continue
  611. }
  612. localNets = append(localNets, commondb[i])
  613. remoteNets = append(remoteNets, commonext[i])
  614. syncResult.Update()
  615. }
  616. }
  617. for i := 0; i < len(added); i += 1 {
  618. new, err := manager.newFromCloudNetwork(ctx, userCred, added[i], wire, syncOwnerId, provider)
  619. if err != nil {
  620. syncResult.AddError(err)
  621. } else {
  622. localNets = append(localNets, *new)
  623. remoteNets = append(remoteNets, added[i])
  624. syncResult.Add()
  625. }
  626. }
  627. return localNets, remoteNets, syncResult
  628. }
  629. func (snet *SNetwork) syncRemoveCloudNetwork(ctx context.Context, userCred mcclient.TokenCredential) error {
  630. lockman.LockObject(ctx, snet)
  631. defer lockman.ReleaseObject(ctx, snet)
  632. if snet.ExternalId == snet.WireId {
  633. return nil
  634. }
  635. err := snet.ValidateDeleteCondition(ctx, nil)
  636. if err != nil { // cannot delete
  637. err = snet.SetStatus(ctx, userCred, api.NETWORK_STATUS_UNKNOWN, "Sync to remove")
  638. } else {
  639. err = snet.RealDelete(ctx, userCred)
  640. if err == nil {
  641. notifyclient.EventNotify(ctx, userCred, notifyclient.SEventNotifyParam{
  642. Obj: snet,
  643. Action: notifyclient.ActionSyncDelete,
  644. })
  645. }
  646. }
  647. return err
  648. }
  649. func (snet *SNetwork) SyncWithCloudNetwork(ctx context.Context, userCred mcclient.TokenCredential, extNet cloudprovider.ICloudNetwork) error {
  650. diff, err := db.UpdateWithLock(ctx, snet, func() error {
  651. if options.Options.EnableSyncName {
  652. newName, _ := db.GenerateAlterName(snet, extNet.GetName())
  653. if len(newName) > 0 {
  654. snet.Name = newName
  655. }
  656. }
  657. snet.Status = extNet.GetStatus()
  658. snet.GuestIpStart = extNet.GetIpStart()
  659. snet.GuestIpEnd = extNet.GetIpEnd()
  660. snet.GuestIpMask = extNet.GetIpMask()
  661. snet.GuestGateway = extNet.GetGateway()
  662. snet.ServerType = api.TNetworkType(extNet.GetServerType())
  663. snet.GuestIp6Start = extNet.GetIp6Start()
  664. snet.GuestIp6End = extNet.GetIp6End()
  665. snet.GuestIp6Mask = extNet.GetIp6Mask()
  666. snet.GuestGateway6 = extNet.GetGateway6()
  667. snet.AllocTimoutSeconds = extNet.GetAllocTimeoutSeconds()
  668. if createdAt := extNet.GetCreatedAt(); !createdAt.IsZero() {
  669. snet.CreatedAt = createdAt
  670. }
  671. return nil
  672. })
  673. if err != nil {
  674. log.Errorf("syncWithCloudNetwork error %s", err)
  675. return err
  676. }
  677. db.OpsLog.LogSyncUpdate(snet, diff, userCred)
  678. if len(diff) > 0 {
  679. notifyclient.EventNotify(ctx, userCred, notifyclient.SEventNotifyParam{
  680. Obj: snet,
  681. Action: notifyclient.ActionSyncUpdate,
  682. })
  683. }
  684. vpc, err := snet.GetVpc()
  685. if err != nil {
  686. return errors.Wrapf(err, "GetVpc")
  687. }
  688. provider := vpc.GetCloudprovider()
  689. if provider != nil {
  690. if account, _ := provider.GetCloudaccount(); account != nil {
  691. syncVirtualResourceMetadata(ctx, userCred, snet, extNet, account.ReadOnly)
  692. }
  693. SyncCloudProject(ctx, userCred, snet, provider.GetOwnerId(), extNet, provider)
  694. shareInfo := provider.getAccountShareInfo()
  695. if utils.IsInStringArray(provider.Provider, api.PRIVATE_CLOUD_PROVIDERS) && extNet.GetPublicScope() == rbacscope.ScopeNone {
  696. shareInfo = apis.SAccountShareInfo{
  697. IsPublic: false,
  698. PublicScope: rbacscope.ScopeNone,
  699. }
  700. }
  701. snet.SyncShareState(ctx, userCred, shareInfo)
  702. }
  703. return nil
  704. }
  705. func (manager *SNetworkManager) newFromCloudNetwork(ctx context.Context, userCred mcclient.TokenCredential, extNet cloudprovider.ICloudNetwork, wire *SWire, syncOwnerId mcclient.IIdentityProvider, provider *SCloudprovider) (*SNetwork, error) {
  706. net := &SNetwork{}
  707. net.SetModelManager(manager, net)
  708. net.Status = extNet.GetStatus()
  709. net.ExternalId = extNet.GetGlobalId()
  710. net.WireId = wire.Id
  711. net.GuestIpStart = extNet.GetIpStart()
  712. net.GuestIpEnd = extNet.GetIpEnd()
  713. net.GuestIpMask = extNet.GetIpMask()
  714. net.GuestGateway = extNet.GetGateway()
  715. net.ServerType = api.TNetworkType(extNet.GetServerType())
  716. net.GuestIp6Start = extNet.GetIp6Start()
  717. net.GuestIp6End = extNet.GetIp6End()
  718. net.GuestIp6Mask = extNet.GetIp6Mask()
  719. net.GuestGateway6 = extNet.GetGateway6()
  720. // net.IsPublic = extNet.GetIsPublic()
  721. // extScope := extNet.GetPublicScope()
  722. // if extScope == rbacutils.ScopeDomain && !consts.GetNonDefaultDomainProjects() {
  723. // extScope = rbacutils.ScopeSystem
  724. // }
  725. // net.PublicScope = string(extScope)
  726. net.AllocTimoutSeconds = extNet.GetAllocTimeoutSeconds()
  727. if createdAt := extNet.GetCreatedAt(); !createdAt.IsZero() {
  728. net.CreatedAt = createdAt
  729. }
  730. var err = func() error {
  731. lockman.LockRawObject(ctx, manager.Keyword(), "name")
  732. defer lockman.ReleaseRawObject(ctx, manager.Keyword(), "name")
  733. newName, err := db.GenerateName(ctx, manager, syncOwnerId, extNet.GetName())
  734. if err != nil {
  735. return err
  736. }
  737. net.Name = newName
  738. return manager.TableSpec().Insert(ctx, net)
  739. }()
  740. if err != nil {
  741. return nil, errors.Wrapf(err, "Insert")
  742. }
  743. syncVirtualResourceMetadata(ctx, userCred, net, extNet, false)
  744. if provider != nil {
  745. SyncCloudProject(ctx, userCred, net, syncOwnerId, extNet, provider)
  746. shareInfo := provider.getAccountShareInfo()
  747. if utils.IsInStringArray(provider.Provider, api.PRIVATE_CLOUD_PROVIDERS) && extNet.GetPublicScope() == rbacscope.ScopeNone {
  748. shareInfo = apis.SAccountShareInfo{
  749. IsPublic: false,
  750. PublicScope: rbacscope.ScopeNone,
  751. }
  752. }
  753. net.SyncShareState(ctx, userCred, shareInfo)
  754. }
  755. db.OpsLog.LogEvent(net, db.ACT_CREATE, net.GetShortDesc(ctx), userCred)
  756. notifyclient.EventNotify(ctx, userCred, notifyclient.SEventNotifyParam{
  757. Obj: net,
  758. Action: notifyclient.ActionSyncCreate,
  759. })
  760. return net, nil
  761. }
  762. func (net *SNetwork) IsAddressInRange(address netutils.IPV4Addr) bool {
  763. ipRange := net.getIPRange()
  764. if ipRange == nil {
  765. return false
  766. }
  767. return ipRange.Contains(address)
  768. }
  769. func (net *SNetwork) IsAddress6InRange(address netutils.IPV6Addr) bool {
  770. addrRange := net.getIPRange6()
  771. if addrRange == nil {
  772. return false
  773. }
  774. return addrRange.Contains(address)
  775. }
  776. func (net *SNetwork) IsAddressInNet(address netutils.IPV4Addr) bool {
  777. return net.getNetRange().Contains(address)
  778. }
  779. func (snet *SNetwork) isAddressUsed(ctx context.Context, address string) (bool, error) {
  780. q := snet.getUsedAddressQuery(ctx, nil, nil, rbacscope.ScopeSystem, true)
  781. q = q.Equals("ip_addr", address)
  782. count, err := q.CountWithError()
  783. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  784. return false, errors.Wrap(err, "Query")
  785. }
  786. if count > 0 {
  787. return true, nil
  788. } else {
  789. return false, nil
  790. }
  791. }
  792. func (snet *SNetwork) isAddress6Used(ctx context.Context, address string) (bool, error) {
  793. q := snet.getUsedAddressQuery6(ctx, nil, nil, rbacscope.ScopeSystem, true)
  794. q = q.Equals("ip6_addr", address)
  795. count, err := q.CountWithError()
  796. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  797. return false, errors.Wrap(err, "Query")
  798. }
  799. if count > 0 {
  800. return true, nil
  801. } else {
  802. return false, nil
  803. }
  804. }
  805. func (manager *SNetworkManager) fetchAllOnpremiseNetworks(serverType string, isPublic tristate.TriState) ([]SNetwork, error) {
  806. q := manager.Query()
  807. wires := WireManager.Query().SubQuery()
  808. q = q.Join(wires, sqlchemy.Equals(q.Field("wire_id"), wires.Field("id")))
  809. q = q.Filter(sqlchemy.Equals(wires.Field("vpc_id"), api.DEFAULT_VPC_ID))
  810. if len(serverType) > 0 {
  811. q = q.Filter(sqlchemy.Equals(q.Field("server_type"), serverType))
  812. }
  813. if isPublic.IsTrue() {
  814. q = q.Filter(sqlchemy.IsTrue(q.Field("is_public")))
  815. } else if isPublic.IsFalse() {
  816. q = q.Filter(sqlchemy.IsFalse(q.Field("is_public")))
  817. }
  818. nets := make([]SNetwork, 0)
  819. err := db.FetchModelObjects(manager, q, &nets)
  820. if err != nil {
  821. return nil, errors.Wrap(err, "FetchModelObjects")
  822. }
  823. return nets, nil
  824. }
  825. func (manager *SNetworkManager) GetOnPremiseNetworkOfIP(ipAddr string, serverType string, isPublic tristate.TriState) (*SNetwork, error) {
  826. var addr4 netutils.IPV4Addr
  827. var addr6 netutils.IPV6Addr
  828. var isIpv6Addr = false
  829. var err error
  830. if strings.Contains(ipAddr, ":") {
  831. isIpv6Addr = true
  832. }
  833. if isIpv6Addr {
  834. addr6, err = netutils.NewIPV6Addr(ipAddr)
  835. if err != nil {
  836. return nil, errors.Wrap(err, "NewIPV6Addr")
  837. }
  838. } else {
  839. addr4, err = netutils.NewIPV4Addr(ipAddr)
  840. if err != nil {
  841. return nil, errors.Wrap(err, "NewIPV4Addr")
  842. }
  843. }
  844. nets, err := manager.fetchAllOnpremiseNetworks(serverType, isPublic)
  845. if err != nil {
  846. return nil, errors.Wrap(err, "fetchAllOnpremiseNetworks")
  847. }
  848. for _, n := range nets {
  849. if isIpv6Addr {
  850. if n.IsAddress6InRange(addr6) {
  851. return &n, nil
  852. }
  853. } else {
  854. if n.IsAddressInRange(addr4) {
  855. return &n, nil
  856. }
  857. }
  858. }
  859. return nil, sql.ErrNoRows
  860. }
  861. func (manager *SNetworkManager) GetOnPremiseNetworkOfIP6(ip6Addr string, serverType string, isPublic tristate.TriState) (*SNetwork, error) {
  862. address, err := netutils.NewIPV6Addr(ip6Addr)
  863. if err != nil {
  864. return nil, errors.Wrap(err, "NewIPV6Addr")
  865. }
  866. nets, err := manager.fetchAllOnpremiseNetworks(serverType, isPublic)
  867. if err != nil {
  868. return nil, errors.Wrap(err, "fetchAllOnpremiseNetworks")
  869. }
  870. for _, n := range nets {
  871. if n.IsAddress6InRange(address) {
  872. return &n, nil
  873. }
  874. }
  875. return nil, sql.ErrNoRows
  876. }
  877. func (manager *SNetworkManager) allNetworksQ(providers []string, brands []string, cloudEnv string, rangeObjs []db.IStandaloneModel) *sqlchemy.SQuery {
  878. networks := manager.Query().SubQuery()
  879. wires := WireManager.Query().SubQuery()
  880. vpcs := VpcManager.Query().SubQuery()
  881. q := networks.Query(networks.Field("id"))
  882. q = q.Join(wires, sqlchemy.Equals(q.Field("wire_id"), wires.Field("id")))
  883. q = q.Join(vpcs, sqlchemy.Equals(wires.Field("vpc_id"), vpcs.Field("id")))
  884. q = CloudProviderFilter(q, vpcs.Field("manager_id"), providers, brands, cloudEnv)
  885. q = RangeObjectsFilter(q, rangeObjs, vpcs.Field("cloudregion_id"), wires.Field("zone_id"), vpcs.Field("manager_id"), nil, nil)
  886. return q
  887. }
  888. func (manager *SNetworkManager) totalPortCountQ(
  889. ctx context.Context,
  890. scope rbacscope.TRbacScope,
  891. userCred mcclient.IIdentityProvider,
  892. providers []string,
  893. brands []string,
  894. cloudEnv string,
  895. rangeObjs []db.IStandaloneModel,
  896. policyResult rbacutils.SPolicyResult,
  897. ) *sqlchemy.SQuery {
  898. q := manager.allNetworksQ(providers, brands, cloudEnv, rangeObjs)
  899. switch scope {
  900. case rbacscope.ScopeSystem:
  901. case rbacscope.ScopeDomain:
  902. q = q.Equals("domain_id", userCred.GetProjectDomainId())
  903. case rbacscope.ScopeProject:
  904. q = q.Equals("tenant_id", userCred.GetProjectId())
  905. }
  906. q = db.ObjectIdQueryWithPolicyResult(ctx, q, manager, policyResult)
  907. return manager.Query().In("id", q.Distinct().SubQuery())
  908. }
  909. type NetworkPortStat struct {
  910. Count int
  911. CountExt int
  912. }
  913. func (manager *SNetworkManager) TotalPortCount(
  914. ctx context.Context,
  915. scope rbacscope.TRbacScope,
  916. userCred mcclient.IIdentityProvider,
  917. providers []string, brands []string, cloudEnv string,
  918. rangeObjs []db.IStandaloneModel,
  919. policyResult rbacutils.SPolicyResult,
  920. ) map[api.TNetworkType]NetworkPortStat {
  921. nets := make([]SNetwork, 0)
  922. err := manager.totalPortCountQ(
  923. ctx,
  924. scope,
  925. userCred,
  926. providers, brands, cloudEnv,
  927. rangeObjs,
  928. policyResult,
  929. ).All(&nets)
  930. if err != nil {
  931. log.Errorf("TotalPortCount: %v", err)
  932. }
  933. ret := make(map[api.TNetworkType]NetworkPortStat)
  934. for _, net := range nets {
  935. var stat NetworkPortStat
  936. var allStat NetworkPortStat
  937. if len(net.ServerType) > 0 {
  938. stat, _ = ret[net.ServerType]
  939. }
  940. allStat, _ = ret[""]
  941. count := net.GetTotalAddressCount()
  942. if net.IsExitNetwork() {
  943. if len(net.ServerType) > 0 {
  944. stat.CountExt += count
  945. }
  946. allStat.CountExt += count
  947. } else {
  948. if len(net.ServerType) > 0 {
  949. stat.Count += count
  950. }
  951. allStat.Count += count
  952. }
  953. if len(net.ServerType) > 0 {
  954. ret[net.ServerType] = stat
  955. }
  956. ret[""] = allStat
  957. }
  958. return ret
  959. }
  960. type SNicConfig struct {
  961. Mac string
  962. Index int
  963. Ifname string
  964. }
  965. func parseNetworkInfo(ctx context.Context, userCred mcclient.TokenCredential, info *api.NetworkConfig) (*api.NetworkConfig, error) {
  966. if info.Network != "" {
  967. netObj, err := NetworkManager.FetchByIdOrName(ctx, userCred, info.Network)
  968. if err != nil {
  969. if err == sql.ErrNoRows {
  970. return nil, httperrors.NewResourceNotFoundError2(NetworkManager.Keyword(), info.Network)
  971. } else {
  972. return nil, err
  973. }
  974. }
  975. net := netObj.(*SNetwork)
  976. if net.ProjectId == userCred.GetProjectId() ||
  977. (db.IsDomainAllowGet(ctx, userCred, net) && net.DomainId == userCred.GetProjectDomainId()) ||
  978. db.IsAdminAllowGet(ctx, userCred, net) ||
  979. net.IsSharable(userCred) {
  980. info.Network = netObj.GetId()
  981. } else {
  982. return nil, httperrors.NewForbiddenError("no allow to access network %s", info.Network)
  983. }
  984. }
  985. if info.BwLimit == 0 {
  986. info.BwLimit = options.Options.DefaultBandwidth
  987. }
  988. return info, nil
  989. }
  990. func (snet *SNetwork) GetFreeAddressCount() (int, error) {
  991. return snet.getFreeAddressCount()
  992. }
  993. func (snet *SNetwork) GetTotalAddressCount() int {
  994. ipRange := snet.getIPRange()
  995. if ipRange != nil {
  996. return ipRange.AddressCount()
  997. }
  998. ip6Range := snet.getIPRange6()
  999. if ip6Range == nil {
  1000. return 0
  1001. }
  1002. cnt := ip6Range.AddressCount()
  1003. if cnt.Cmp(big.NewInt(math.MaxInt32)) > 0 {
  1004. return math.MaxInt32
  1005. }
  1006. return int(cnt.Int64())
  1007. }
  1008. func (snet *SNetwork) getFreeAddressCount() (int, error) {
  1009. vnics, err := NetworkManager.TotalNicCount([]string{snet.Id})
  1010. if err != nil {
  1011. return -1, errors.Wrapf(err, "TotalNicCount")
  1012. }
  1013. used := 0
  1014. if nics, ok := vnics[snet.Id]; ok {
  1015. used = nics.Total
  1016. }
  1017. return snet.GetTotalAddressCount() - used, nil
  1018. }
  1019. func isValidNetworkInfo(ctx context.Context, userCred mcclient.TokenCredential, netConfig *api.NetworkConfig, reuseAddr, reuseAddr6 string) error {
  1020. if len(netConfig.Network) > 0 {
  1021. netObj, err := NetworkManager.FetchByIdOrName(ctx, userCred, netConfig.Network)
  1022. if err != nil {
  1023. return httperrors.NewResourceNotFoundError("Network %s not found: %v", netConfig.Network, err)
  1024. }
  1025. net := netObj.(*SNetwork)
  1026. /*
  1027. // scheduler do the check
  1028. if !netConfig.Vip && !netConfig.Reserved && net.getFreeAddressCount() == 0 {
  1029. return fmt.Errorf("Address exhausted in network %s")
  1030. }*/
  1031. if len(netConfig.Address) > 0 {
  1032. ipAddr, err := netutils.NewIPV4Addr(netConfig.Address)
  1033. if err != nil {
  1034. return errors.Wrap(err, "NewIPV4Addr")
  1035. }
  1036. if !net.IsAddressInRange(ipAddr) {
  1037. return httperrors.NewInputParameterError("Address %s not in range", netConfig.Address)
  1038. }
  1039. if netConfig.Reserved {
  1040. // the privilege to access reserved ip
  1041. if db.IsAdminAllowList(userCred, ReservedipManager).Result.IsDeny() {
  1042. return httperrors.NewForbiddenError("Only system admin allowed to use reserved ip")
  1043. }
  1044. if ReservedipManager.GetReservedIP(net, netConfig.Address, api.AddressTypeIPv4) == nil {
  1045. return httperrors.NewInputParameterError("Address %s not reserved", netConfig.Address)
  1046. }
  1047. } else {
  1048. used, err := net.isAddressUsed(ctx, netConfig.Address)
  1049. if err != nil {
  1050. return httperrors.NewInternalServerError("isAddressUsed fail %s", err)
  1051. }
  1052. if used && netConfig.Address != reuseAddr {
  1053. return httperrors.NewInputParameterError("Address %s has been used", netConfig.Address)
  1054. }
  1055. }
  1056. }
  1057. if len(netConfig.Address6) > 0 {
  1058. if !net.IsSupportIPv6() {
  1059. return errors.Wrap(httperrors.ErrNotSupported, "network not enable ipv6")
  1060. }
  1061. ipAddr, err := netutils.NewIPV6Addr(netConfig.Address6)
  1062. if err != nil {
  1063. return errors.Wrap(err, "NewIPV6Addr")
  1064. }
  1065. netConfig.Address6 = ipAddr.String()
  1066. if !net.IsAddress6InRange(ipAddr) {
  1067. return httperrors.NewInputParameterError("Address v6 %s not in range", netConfig.Address6)
  1068. }
  1069. if netConfig.Reserved {
  1070. // the privilege to access reserved ip
  1071. if db.IsAdminAllowList(userCred, ReservedipManager).Result.IsDeny() {
  1072. return httperrors.NewForbiddenError("Only system admin allowed to use reserved ip")
  1073. }
  1074. if ReservedipManager.GetReservedIP(net, netConfig.Address6, api.AddressTypeIPv6) == nil {
  1075. return httperrors.NewInputParameterError("Address v6 %s not reserved", netConfig.Address6)
  1076. }
  1077. } else {
  1078. used, err := net.isAddress6Used(ctx, netConfig.Address6)
  1079. if err != nil {
  1080. return httperrors.NewInternalServerError("isAddress6Used fail %s", err)
  1081. }
  1082. if used && netConfig.Address6 != reuseAddr6 {
  1083. return httperrors.NewInputParameterError("v6 address %s has been used", netConfig.Address6)
  1084. }
  1085. }
  1086. }
  1087. if netConfig.RequireIPv6 && !net.IsSupportIPv6() {
  1088. return errors.Wrap(httperrors.ErrNotSupported, "network not enable ipv6")
  1089. }
  1090. if netConfig.BwLimit > api.MAX_BANDWIDTH {
  1091. return httperrors.NewInputParameterError("Bandwidth limit cannot exceed %dMbps", api.MAX_BANDWIDTH)
  1092. }
  1093. if net.ServerType == api.NETWORK_TYPE_BAREMETAL {
  1094. // not check baremetal network free address here
  1095. // TODO: find better solution ?
  1096. return nil
  1097. }
  1098. freeCnt, err := net.getFreeAddressCount()
  1099. if err != nil {
  1100. return httperrors.NewInternalServerError("getFreeAddressCount fail %s", err)
  1101. }
  1102. if reuseAddr != "" {
  1103. freeCnt += 1
  1104. }
  1105. if freeCnt < 1 {
  1106. return httperrors.NewInputParameterError("network %s(%s) has no free addresses", net.Name, net.Id)
  1107. }
  1108. }
  1109. /* scheduler to the check
  1110. else if ! netConfig.Vip {
  1111. ct, ctExit := NetworkManager.to
  1112. }
  1113. */
  1114. // billing update
  1115. if netConfig.TxTrafficLimit > 0 || netConfig.RxTrafficLimit > 0 {
  1116. if len(netConfig.BillingType) == 0 {
  1117. netConfig.BillingType = billing_api.BILLING_TYPE_PREPAID
  1118. } else if netConfig.BillingType != billing_api.BILLING_TYPE_PREPAID {
  1119. return httperrors.NewInputParameterError("nic is limited by traffic, only support prepaid billing type")
  1120. }
  1121. if len(netConfig.ChargeType) == 0 {
  1122. netConfig.ChargeType = billing_api.NET_CHARGE_TYPE_BY_TRAFFIC
  1123. } else if netConfig.ChargeType != billing_api.NET_CHARGE_TYPE_BY_TRAFFIC {
  1124. return httperrors.NewInputParameterError("nic is limited by traffic, only support charge traffic")
  1125. }
  1126. } else {
  1127. if netConfig.BillingType == billing_api.BILLING_TYPE_PREPAID && netConfig.ChargeType == billing_api.NET_CHARGE_TYPE_BY_TRAFFIC {
  1128. return httperrors.NewInputParameterError("nic traffic limited should be set for prepaid traffic billing type")
  1129. }
  1130. }
  1131. if len(netConfig.PortMappings) != 0 {
  1132. for i := range netConfig.PortMappings {
  1133. if err := validatePortMapping(netConfig.PortMappings[i]); err != nil {
  1134. return errors.Wrapf(err, "validate port mapping %s", jsonutils.Marshal(netConfig.PortMappings[i]))
  1135. }
  1136. }
  1137. }
  1138. return nil
  1139. }
  1140. func validatePortRange(portRange *api.GuestPortMappingPortRange) error {
  1141. if portRange != nil {
  1142. if portRange.Start > portRange.End {
  1143. return httperrors.NewInputParameterError("port range start %d is large than %d", portRange.Start, portRange.End)
  1144. }
  1145. if portRange.Start <= api.GUEST_PORT_MAPPING_RANGE_START {
  1146. return httperrors.NewInputParameterError("port range start %d <= %d", api.GUEST_PORT_MAPPING_RANGE_START, portRange.Start)
  1147. }
  1148. if portRange.End > api.GUEST_PORT_MAPPING_RANGE_END {
  1149. return httperrors.NewInputParameterError("port range end %d > %d", api.GUEST_PORT_MAPPING_RANGE_END, portRange.End)
  1150. }
  1151. }
  1152. return nil
  1153. }
  1154. func validatePort(port int, start int, end int) error {
  1155. if port < start || port > end {
  1156. return httperrors.NewInputParameterError("port number %d isn't within %d to %d", port, start, end)
  1157. }
  1158. return nil
  1159. }
  1160. func validatePortMapping(pm *api.GuestPortMapping) error {
  1161. if err := validatePortRange(pm.HostPortRange); err != nil {
  1162. return err
  1163. }
  1164. if pm.HostPort != nil {
  1165. if err := validatePort(*pm.HostPort, api.GUEST_PORT_MAPPING_RANGE_START, api.GUEST_PORT_MAPPING_RANGE_END); err != nil {
  1166. return errors.Wrap(err, "validate host_port")
  1167. }
  1168. }
  1169. // -1 端口表示自动分配
  1170. if pm.Port != -1 {
  1171. if err := validatePort(pm.Port, 1, 65535); err != nil {
  1172. return errors.Wrap(err, "validate port")
  1173. }
  1174. }
  1175. if pm.Protocol == "" {
  1176. pm.Protocol = api.GuestPortMappingProtocolTCP
  1177. }
  1178. if !sets.NewString(string(api.GuestPortMappingProtocolUDP), string(api.GuestPortMappingProtocolTCP)).Has(string(pm.Protocol)) {
  1179. return httperrors.NewInputParameterError("unsupported protocol %s", pm.Protocol)
  1180. }
  1181. if len(pm.RemoteIps) != 0 {
  1182. for _, ip := range pm.RemoteIps {
  1183. if !regutils.MatchIPAddr(ip) && !regutils.MatchCIDR(ip) {
  1184. return httperrors.NewInputParameterError("invalid ip or prefix %s", ip)
  1185. }
  1186. }
  1187. }
  1188. if pm.Rule != nil {
  1189. if pm.Rule.FirstPortOffset != nil {
  1190. if *pm.Rule.FirstPortOffset < 0 {
  1191. return httperrors.NewInputParameterError("first port offset %d is less than 0", *pm.Rule.FirstPortOffset)
  1192. }
  1193. }
  1194. }
  1195. for _, env := range pm.Envs {
  1196. if env.ValueFrom != api.GuestPortMappingEnvValueFromPort && env.ValueFrom != api.GuestPortMappingEnvValueFromHostPort {
  1197. return httperrors.NewInputParameterError("invalid value from %s", env.ValueFrom)
  1198. }
  1199. }
  1200. return nil
  1201. }
  1202. func IsExitNetworkInfo(ctx context.Context, userCred mcclient.TokenCredential, netConfig *api.NetworkConfig) bool {
  1203. if len(netConfig.Network) > 0 {
  1204. netObj, _ := NetworkManager.FetchByIdOrName(ctx, userCred, netConfig.Network)
  1205. net := netObj.(*SNetwork)
  1206. if net.IsExitNetwork() {
  1207. return true
  1208. }
  1209. } else if netConfig.Exit {
  1210. return true
  1211. }
  1212. return false
  1213. }
  1214. func (manager *SNetworkManager) FetchCustomizeColumns(
  1215. ctx context.Context,
  1216. userCred mcclient.TokenCredential,
  1217. query jsonutils.JSONObject,
  1218. objs []interface{},
  1219. fields stringutils2.SSortedStrings,
  1220. isList bool,
  1221. ) []api.NetworkDetails {
  1222. rows := make([]api.NetworkDetails, len(objs))
  1223. virtRows := manager.SSharableVirtualResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  1224. wireRows := manager.SWireResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  1225. netIds := make([]string, len(objs))
  1226. for i := range rows {
  1227. rows[i] = api.NetworkDetails{
  1228. SharableVirtualResourceDetails: virtRows[i],
  1229. WireResourceInfo: wireRows[i],
  1230. }
  1231. network := objs[i].(*SNetwork)
  1232. rows[i].Exit = false
  1233. if network.IsExitNetwork() {
  1234. rows[i].Exit = true
  1235. }
  1236. if network.IsClassic() {
  1237. rows[i].IsClassic = true
  1238. }
  1239. rows[i].Ports = network.GetTotalAddressCount()
  1240. rows[i].Routes = network.GetRoutes()
  1241. rows[i].Schedtags = GetSchedtagsDetailsToResourceV2(network, ctx)
  1242. rows[i].Dns = network.GetDNS(rows[i].Zone)
  1243. rows[i].AdditionalWires = network.fetchAdditionalWires()
  1244. netIds[i] = network.Id
  1245. }
  1246. vnics, err := manager.TotalNicCount(netIds)
  1247. if err != nil {
  1248. return rows
  1249. }
  1250. for i := range rows {
  1251. rows[i].SNetworkNics, _ = vnics[netIds[i]]
  1252. }
  1253. return rows
  1254. }
  1255. func (manager *SNetworkManager) GetTotalNicCount(netIds []string) (map[string]int, error) {
  1256. vnics, err := manager.TotalNicCount(netIds)
  1257. if err != nil {
  1258. return nil, errors.Wrapf(err, "TotalNicCount")
  1259. }
  1260. result := map[string]int{}
  1261. for _, id := range netIds {
  1262. result[id] = 0
  1263. if nics, ok := vnics[id]; ok {
  1264. result[id] = nics.Total
  1265. }
  1266. }
  1267. return result, nil
  1268. }
  1269. type SNetworkNics struct {
  1270. Id string
  1271. api.SNetworkNics
  1272. }
  1273. func (nm *SNetworkManager) query(manager db.IModelManager, field string, netIds []string, filter func(*sqlchemy.SQuery) *sqlchemy.SQuery) *sqlchemy.SSubQuery {
  1274. q := manager.Query()
  1275. if filter != nil {
  1276. q = filter(q)
  1277. }
  1278. sq := q.SubQuery()
  1279. return sq.Query(
  1280. sq.Field("network_id"),
  1281. sqlchemy.COUNT(field),
  1282. ).In("network_id", netIds).GroupBy(sq.Field("network_id")).SubQuery()
  1283. }
  1284. func (nm *SNetworkManager) TotalNicCount(netIds []string) (map[string]api.SNetworkNics, error) {
  1285. // guest vnic
  1286. vnicSQ := nm.query(GuestnetworkManager, "vnic", netIds, func(q *sqlchemy.SQuery) *sqlchemy.SQuery {
  1287. return q.IsFalse("virtual")
  1288. })
  1289. vnic4SQ := nm.query(GuestnetworkManager, "vnic4", netIds, func(q *sqlchemy.SQuery) *sqlchemy.SQuery {
  1290. return q.IsNotEmpty("ip_addr")
  1291. })
  1292. vnic6SQ := nm.query(GuestnetworkManager, "vnic6", netIds, func(q *sqlchemy.SQuery) *sqlchemy.SQuery {
  1293. return q.IsNotEmpty("ip6_addr")
  1294. })
  1295. // bm vnic
  1296. bmSQ := nm.query(HostnetworkManager, "bm_vnic", netIds, nil)
  1297. // lb vnic
  1298. lbSQ := nm.query(LoadbalancernetworkManager, "lb_vnic", netIds, nil)
  1299. // eip vnic
  1300. eipSQ := nm.query(ElasticipManager, "eip_vnic", netIds, nil)
  1301. // group vnic
  1302. groupSQ := nm.query(GroupnetworkManager, "group_vnic", netIds, nil)
  1303. // reserved vnics
  1304. reserve4SQ := nm.query(ReservedipManager, "reserve_vnic4", netIds, filterExpiredReservedIp4s)
  1305. reserve6SQ := nm.query(ReservedipManager, "reserve_vnic6", netIds, filterExpiredReservedIp6s)
  1306. // rds vnics
  1307. rdsSQ := nm.query(DBInstanceNetworkManager, "rds_vnic", netIds, nil)
  1308. // nat vnics
  1309. natSQ := nm.query(NatGatewayManager, "nat_vnic", netIds, func(q *sqlchemy.SQuery) *sqlchemy.SQuery {
  1310. return q.IsNotEmpty("ip_addr")
  1311. })
  1312. // networkinterface vncis
  1313. nisSQ := nm.query(NetworkinterfacenetworkManager, "networkinterface_vnic", netIds, nil)
  1314. // bm reused vnics
  1315. bmReusedSQ := nm.query(GuestnetworkManager, "bm_reused_vnic", netIds, func(q *sqlchemy.SQuery) *sqlchemy.SQuery {
  1316. guest := GuestManager.Query().SubQuery()
  1317. bmn := HostnetworkManager.Query().SubQuery()
  1318. return q.Join(guest, sqlchemy.Equals(guest.Field("id"), q.Field("guest_id"))).Join(bmn, sqlchemy.AND(
  1319. sqlchemy.Equals(q.Field("ip_addr"), bmn.Field("ip_addr")),
  1320. sqlchemy.Equals(guest.Field("host_id"), bmn.Field("baremetal_id")),
  1321. ))
  1322. })
  1323. nets := nm.Query().SubQuery()
  1324. netQ := nets.Query(
  1325. sqlchemy.SUM("vnics", vnicSQ.Field("vnic")),
  1326. sqlchemy.SUM("vnics4", vnic4SQ.Field("vnic4")),
  1327. sqlchemy.SUM("vnics6", vnic6SQ.Field("vnic6")),
  1328. sqlchemy.SUM("bm_vnics", bmSQ.Field("bm_vnic")),
  1329. sqlchemy.SUM("lb_vnics", lbSQ.Field("lb_vnic")),
  1330. sqlchemy.SUM("eip_vnics", eipSQ.Field("eip_vnic")),
  1331. sqlchemy.SUM("group_vnics", groupSQ.Field("group_vnic")),
  1332. sqlchemy.SUM("reserve_vnics4", reserve4SQ.Field("reserve_vnic4")),
  1333. sqlchemy.SUM("reserve_vnics6", reserve6SQ.Field("reserve_vnic6")),
  1334. sqlchemy.SUM("rds_vnics", rdsSQ.Field("rds_vnic")),
  1335. sqlchemy.SUM("nat_vnics", natSQ.Field("nat_vnic")),
  1336. sqlchemy.SUM("networkinterface_vnics", nisSQ.Field("networkinterface_vnic")),
  1337. sqlchemy.SUM("bm_reused_vnics", bmReusedSQ.Field("bm_reused_vnic")),
  1338. )
  1339. netQ.AppendField(netQ.Field("id"))
  1340. netQ = netQ.LeftJoin(vnicSQ, sqlchemy.Equals(netQ.Field("id"), vnicSQ.Field("network_id")))
  1341. netQ = netQ.LeftJoin(vnic4SQ, sqlchemy.Equals(netQ.Field("id"), vnic4SQ.Field("network_id")))
  1342. netQ = netQ.LeftJoin(vnic6SQ, sqlchemy.Equals(netQ.Field("id"), vnic6SQ.Field("network_id")))
  1343. netQ = netQ.LeftJoin(bmSQ, sqlchemy.Equals(netQ.Field("id"), bmSQ.Field("network_id")))
  1344. netQ = netQ.LeftJoin(lbSQ, sqlchemy.Equals(netQ.Field("id"), lbSQ.Field("network_id")))
  1345. netQ = netQ.LeftJoin(eipSQ, sqlchemy.Equals(netQ.Field("id"), eipSQ.Field("network_id")))
  1346. netQ = netQ.LeftJoin(groupSQ, sqlchemy.Equals(netQ.Field("id"), groupSQ.Field("network_id")))
  1347. netQ = netQ.LeftJoin(reserve4SQ, sqlchemy.Equals(netQ.Field("id"), reserve4SQ.Field("network_id")))
  1348. netQ = netQ.LeftJoin(reserve6SQ, sqlchemy.Equals(netQ.Field("id"), reserve6SQ.Field("network_id")))
  1349. netQ = netQ.LeftJoin(rdsSQ, sqlchemy.Equals(netQ.Field("id"), rdsSQ.Field("network_id")))
  1350. netQ = netQ.LeftJoin(natSQ, sqlchemy.Equals(netQ.Field("id"), natSQ.Field("network_id")))
  1351. netQ = netQ.LeftJoin(nisSQ, sqlchemy.Equals(netQ.Field("id"), nisSQ.Field("network_id")))
  1352. netQ = netQ.LeftJoin(bmReusedSQ, sqlchemy.Equals(netQ.Field("id"), bmReusedSQ.Field("network_id")))
  1353. netQ = netQ.Filter(sqlchemy.In(netQ.Field("id"), netIds)).GroupBy(netQ.Field("id"))
  1354. nics := []SNetworkNics{}
  1355. err := netQ.All(&nics)
  1356. if err != nil {
  1357. return nil, errors.Wrapf(err, "netQ.All")
  1358. }
  1359. result := map[string]api.SNetworkNics{}
  1360. for i := range nics {
  1361. nics[i].SumTotal()
  1362. result[nics[i].Id] = nics[i].SNetworkNics
  1363. }
  1364. return result, nil
  1365. }
  1366. // 预留IP
  1367. // 预留的IP不会被调度使用
  1368. func (snet *SNetwork) PerformReserveIp(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.NetworkReserveIpInput) (jsonutils.JSONObject, error) {
  1369. if len(input.Ips) == 0 {
  1370. return nil, httperrors.NewMissingParameterError("ips")
  1371. }
  1372. var duration time.Duration
  1373. if len(input.Duration) > 0 {
  1374. bc, err := billing.ParseBillingCycle(input.Duration)
  1375. if err != nil {
  1376. return nil, httperrors.NewInputParameterError("Duration %s invalid", input.Duration)
  1377. }
  1378. duration = bc.Duration()
  1379. }
  1380. errs := make([]error, 0)
  1381. for _, ip := range input.Ips {
  1382. err := snet.reserveIpWithDurationAndStatus(ctx, userCred, ip, input.Notes, duration, input.Status)
  1383. if err != nil {
  1384. errs = append(errs, errors.Wrap(err, "reserveIpWithDurationAndStatus"))
  1385. }
  1386. }
  1387. if len(errs) > 0 {
  1388. return nil, errors.NewAggregate(errs)
  1389. }
  1390. return nil, nil
  1391. }
  1392. func (net *SNetwork) reserveIpWithDuration(ctx context.Context, userCred mcclient.TokenCredential, ipstr string, notes string, duration time.Duration) error {
  1393. return net.reserveIpWithDurationAndStatus(ctx, userCred, ipstr, notes, duration, "")
  1394. }
  1395. func (net *SNetwork) reserveIpWithDurationAndStatus(ctx context.Context, userCred mcclient.TokenCredential, ipstr string, notes string, duration time.Duration, status string) error {
  1396. var used bool
  1397. var addrType api.TAddressType
  1398. if regutils.MatchIP6Addr(ipstr) {
  1399. addr6, err := netutils.NewIPV6Addr(ipstr)
  1400. if err != nil {
  1401. return httperrors.NewInputParameterError("not a valid ipv6 address %s: %s", ipstr, err)
  1402. }
  1403. if !net.IsSupportIPv6() {
  1404. return httperrors.NewInputParameterError("network is not ipv6 enabled")
  1405. }
  1406. if !net.IsAddress6InRange(addr6) {
  1407. return httperrors.NewInputParameterError("Address %s not in network", ipstr)
  1408. }
  1409. used, err = net.isAddress6Used(ctx, addr6.String())
  1410. if err != nil {
  1411. return httperrors.NewInternalServerError("isAddress6Used fail %s", err)
  1412. }
  1413. addrType = api.AddressTypeIPv6
  1414. ipstr = addr6.String()
  1415. } else if regutils.MatchIP4Addr(ipstr) {
  1416. ipAddr, err := netutils.NewIPV4Addr(ipstr)
  1417. if err != nil {
  1418. return httperrors.NewInputParameterError("not a valid ip address %s: %s", ipstr, err)
  1419. }
  1420. if !net.IsAddressInRange(ipAddr) {
  1421. return httperrors.NewInputParameterError("Address %s not in network", ipstr)
  1422. }
  1423. used, err = net.isAddressUsed(ctx, ipstr)
  1424. if err != nil {
  1425. return httperrors.NewInternalServerError("isAddressUsed fail %s", err)
  1426. }
  1427. addrType = api.AddressTypeIPv4
  1428. } else {
  1429. return errors.Wrapf(httperrors.ErrInvalidFormat, "ip %s is neither ipv4 nor ipv6", ipstr)
  1430. }
  1431. if used {
  1432. rip := ReservedipManager.getReservedIP(net, ipstr, addrType)
  1433. if rip != nil {
  1434. err := rip.extendWithDuration(notes, duration, status)
  1435. if err != nil {
  1436. return errors.Wrap(err, "extendWithDuration")
  1437. }
  1438. return nil
  1439. }
  1440. return httperrors.NewConflictError("Address %s has been used", ipstr)
  1441. }
  1442. err := ReservedipManager.ReserveIPWithDurationAndStatus(ctx, userCred, net, ipstr, notes, duration, status, addrType)
  1443. if err != nil {
  1444. return errors.Wrap(err, "ReservedipManager.ReserveIPWithDurationAndStatus")
  1445. }
  1446. return nil
  1447. }
  1448. // 释放预留IP
  1449. func (snet *SNetwork) PerformReleaseReservedIp(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.NetworkReleaseReservedIpInput) (jsonutils.JSONObject, error) {
  1450. if len(input.Ip) == 0 {
  1451. return nil, httperrors.NewMissingParameterError("ip")
  1452. }
  1453. addrType := api.AddressTypeIPv4
  1454. if regutils.MatchIP6Addr(input.Ip) {
  1455. addr, err := netutils.NewIPV6Addr(input.Ip)
  1456. if err != nil {
  1457. return nil, errors.Wrap(httperrors.ErrInvalidFormat, err.Error())
  1458. }
  1459. input.Ip = addr.String()
  1460. }
  1461. rip := ReservedipManager.getReservedIP(snet, input.Ip, addrType)
  1462. if rip == nil {
  1463. return nil, httperrors.NewInvalidStatusError("Address %s not reserved", input.Ip)
  1464. }
  1465. rip.Release(ctx, userCred, snet)
  1466. return nil, nil
  1467. }
  1468. func (snet *SNetwork) GetDetailsReservedIps(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject) (jsonutils.JSONObject, error) {
  1469. rips := ReservedipManager.GetReservedIPs(snet)
  1470. if rips == nil {
  1471. return nil, httperrors.NewInternalServerError("get reserved ip error")
  1472. }
  1473. ripV4 := make([]string, 0)
  1474. ripV6 := make([]string, 0)
  1475. for i := 0; i < len(rips); i += 1 {
  1476. if len(rips[i].IpAddr) > 0 {
  1477. ripV4 = append(ripV4, rips[i].IpAddr)
  1478. }
  1479. if len(rips[i].Ip6Addr) > 0 {
  1480. ripV6 = append(ripV6, rips[i].Ip6Addr)
  1481. }
  1482. }
  1483. ret := jsonutils.NewDict()
  1484. if len(ripV4) > 0 {
  1485. ret.Add(jsonutils.Marshal(ripV4), "reserved_ips")
  1486. }
  1487. if len(ripV6) > 0 {
  1488. ret.Add(jsonutils.Marshal(ripV6), "reserved_ip6s")
  1489. }
  1490. return ret, nil
  1491. }
  1492. func isValidIpv4MaskLen(maskLen int8) bool {
  1493. if maskLen < 12 || maskLen > 30 {
  1494. return false
  1495. } else {
  1496. return true
  1497. }
  1498. }
  1499. func isValidIpv6MaskLen(maskLen uint8) bool {
  1500. if maskLen < 48 || maskLen > 126 {
  1501. return false
  1502. } else {
  1503. return true
  1504. }
  1505. }
  1506. func (snet *SNetwork) ensureIfnameHint() {
  1507. if snet.IfnameHint != "" {
  1508. return
  1509. }
  1510. hint, err := NetworkManager.newIfnameHint(snet.Name)
  1511. if err != nil {
  1512. panic(errors.Wrap(err, "ensureIfnameHint: allocate hint"))
  1513. }
  1514. _, err = db.Update(snet, func() error {
  1515. snet.IfnameHint = hint
  1516. return nil
  1517. })
  1518. if err != nil {
  1519. panic(errors.Wrap(err, "ensureIfnameHint: db update"))
  1520. }
  1521. log.Infof("network %s(%s): initialized ifname hint: %s", snet.Name, snet.Id, hint)
  1522. }
  1523. func (manager *SNetworkManager) NewIfnameHint(hint string) (string, error) {
  1524. return manager.newIfnameHint(hint)
  1525. }
  1526. func (manager *SNetworkManager) newIfnameHint(hint string) (string, error) {
  1527. isa := func(c byte) bool {
  1528. return (c >= 'a' && c <= 'z') || (c >= 'A' && c <= 'Z')
  1529. }
  1530. isn := func(c byte) bool {
  1531. return (c >= '0' && c <= '9')
  1532. }
  1533. sani := func(r string) string {
  1534. if r != "" && !isa(r[0]) {
  1535. r = "a" + r
  1536. }
  1537. if len(r) > MAX_HINT_LEN {
  1538. r = r[:MAX_HINT_LEN]
  1539. }
  1540. return r
  1541. }
  1542. rand := func(base string) (string, error) {
  1543. if len(base) > HINT_BASE_LEN {
  1544. base = base[:HINT_BASE_LEN]
  1545. }
  1546. for i := 0; i < 3; i++ {
  1547. r := sani(base + rand.String(HINT_RAND_LEN))
  1548. cnt, err := manager.Query().Equals("ifname_hint", r).CountWithError()
  1549. if err == nil && cnt == 0 {
  1550. return r, nil
  1551. }
  1552. }
  1553. /* generate ifname by ifname hint failed
  1554. * try generate from rand string */
  1555. for i := 0; i < 3; i++ {
  1556. r := sani(rand.String(MAX_HINT_LEN))
  1557. cnt, err := manager.Query().Equals("ifname_hint", r).CountWithError()
  1558. if err == nil && cnt == 0 {
  1559. return r, nil
  1560. }
  1561. }
  1562. return "", fmt.Errorf("failed finding ifname hint")
  1563. }
  1564. r := ""
  1565. for i := range hint {
  1566. c := hint[i]
  1567. if isa(c) || isn(c) || c == '_' {
  1568. r += string(c)
  1569. }
  1570. }
  1571. r = sani(r)
  1572. if len(r) < 3 {
  1573. return rand(r)
  1574. }
  1575. if cnt, err := manager.Query().Equals("ifname_hint", r).CountWithError(); err != nil {
  1576. return "", err
  1577. } else if cnt > 0 {
  1578. return rand(r)
  1579. }
  1580. return r, nil
  1581. }
  1582. func (manager *SNetworkManager) validateEnsureWire(ctx context.Context, userCred mcclient.TokenCredential, input api.NetworkCreateInput) (w *SWire, v *SVpc, cr *SCloudregion, err error) {
  1583. wObj, err := WireManager.FetchByIdOrName(ctx, userCred, input.Wire)
  1584. if err != nil {
  1585. err = errors.Wrapf(err, "wire %s", input.Wire)
  1586. return
  1587. }
  1588. w = wObj.(*SWire)
  1589. v, _ = w.GetVpc()
  1590. crObj, err := CloudregionManager.FetchById(v.CloudregionId)
  1591. if err != nil {
  1592. err = errors.Wrapf(err, "cloudregion %s", v.CloudregionId)
  1593. return
  1594. }
  1595. cr = crObj.(*SCloudregion)
  1596. return
  1597. }
  1598. func (manager *SNetworkManager) validateEnsureZoneVpc(ctx context.Context, userCred mcclient.TokenCredential, input api.NetworkCreateInput) (*SWire, *SVpc, *SCloudregion, error) {
  1599. zObj, err := validators.ValidateModel(ctx, userCred, ZoneManager, &input.Zone)
  1600. if err != nil {
  1601. return nil, nil, nil, err
  1602. }
  1603. z := zObj.(*SZone)
  1604. vObj, err := validators.ValidateModel(ctx, userCred, VpcManager, &input.Vpc)
  1605. if err != nil {
  1606. return nil, nil, nil, err
  1607. }
  1608. v := vObj.(*SVpc)
  1609. cr, err := z.GetRegion()
  1610. if err != nil {
  1611. return nil, nil, nil, err
  1612. }
  1613. // 华为云,ucloud wire zone_id 为空
  1614. var wires []SWire
  1615. if utils.IsInStringArray(cr.Provider, api.REGIONAL_NETWORK_PROVIDERS) {
  1616. wires, err = WireManager.getWiresByVpcAndZone(v, nil)
  1617. } else {
  1618. wires, err = WireManager.getWiresByVpcAndZone(v, z)
  1619. }
  1620. if err != nil {
  1621. return nil, nil, nil, err
  1622. }
  1623. if len(wires) > 1 {
  1624. return nil, nil, nil, httperrors.NewConflictError("found %d wires for zone %s and vpc %s", len(wires), input.Zone, input.Vpc)
  1625. }
  1626. if len(wires) == 1 {
  1627. return &wires[0], v, cr, nil
  1628. }
  1629. externalId := ""
  1630. if cr.Provider == api.CLOUD_PROVIDER_CLOUDPODS {
  1631. iVpc, err := v.GetIVpc(ctx)
  1632. if err != nil {
  1633. return nil, nil, nil, err
  1634. }
  1635. iWire, err := iVpc.CreateIWire(&cloudprovider.SWireCreateOptions{
  1636. Name: fmt.Sprintf("vpc-%s", v.Name),
  1637. ZoneId: z.ExternalId,
  1638. Bandwidth: 10000,
  1639. Mtu: 1500,
  1640. })
  1641. if err != nil {
  1642. return nil, nil, nil, errors.Wrapf(err, "CreateIWire")
  1643. }
  1644. externalId = iWire.GetGlobalId()
  1645. }
  1646. // wire not found. We auto create one for OneCloud vpc
  1647. if cr.Provider == api.CLOUD_PROVIDER_ONECLOUD || cr.Provider == api.CLOUD_PROVIDER_CLOUDPODS {
  1648. w, err := v.initWire(ctx, z, externalId)
  1649. if err != nil {
  1650. return nil, nil, nil, errors.Wrapf(err, "vpc %s init wire", v.Id)
  1651. }
  1652. return w, v, cr, nil
  1653. }
  1654. return nil, nil, nil, httperrors.NewNotFoundError("wire not found for zone %s and vpc %s", input.Zone, input.Vpc)
  1655. }
  1656. func (manager *SNetworkManager) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, input api.NetworkCreateInput) (api.NetworkCreateInput, error) {
  1657. if input.ServerType == "" {
  1658. input.ServerType = api.NETWORK_TYPE_GUEST
  1659. } else if !api.IsInNetworkTypes(input.ServerType, api.ALL_NETWORK_TYPES) {
  1660. return input, httperrors.NewInputParameterError("Invalid server_type: %s", input.ServerType)
  1661. }
  1662. var (
  1663. wire *SWire
  1664. vpc *SVpc
  1665. region *SCloudregion
  1666. err error
  1667. )
  1668. if input.WireId != "" {
  1669. input.Wire = input.WireId
  1670. }
  1671. if input.Wire != "" {
  1672. wire, vpc, region, err = manager.validateEnsureWire(ctx, userCred, input)
  1673. if err != nil {
  1674. return input, err
  1675. }
  1676. } else if input.Zone != "" && input.Vpc != "" {
  1677. wire, vpc, region, err = manager.validateEnsureZoneVpc(ctx, userCred, input)
  1678. if err != nil {
  1679. return input, err
  1680. }
  1681. } else {
  1682. return input, httperrors.NewInputParameterError("zone and vpc info required when wire is absent")
  1683. }
  1684. {
  1685. if wire.Id == api.DEFAULT_HOST_LOCAL_WIRE_ID {
  1686. input.ServerType = api.NETWORK_TYPE_HOSTLOCAL
  1687. }
  1688. }
  1689. input.WireId = wire.Id
  1690. if vpc.Status != api.VPC_STATUS_AVAILABLE {
  1691. return input, httperrors.NewInvalidStatusError("VPC not ready")
  1692. }
  1693. if input.ServerType == api.NETWORK_TYPE_EIP && vpc.Id != api.DEFAULT_VPC_ID {
  1694. return input, httperrors.NewInputParameterError("eip network can only exist in default vpc, got %s(%s)", vpc.Name, vpc.Id)
  1695. }
  1696. // if input.ServerType != api.NETWORK_TYPE_EIP {
  1697. // input.BgpType = ""
  1698. // }
  1699. // check class metadata
  1700. { // wire != nil
  1701. var projectId string
  1702. if len(input.ProjectId) > 0 {
  1703. projectId = input.ProjectId
  1704. } else {
  1705. projectId = ownerId.GetProjectId()
  1706. }
  1707. project, err := db.TenantCacheManager.FetchTenantById(ctx, projectId)
  1708. if err != nil {
  1709. return input, errors.Wrapf(err, "unable to fetch tenant by id %s", projectId)
  1710. }
  1711. ok, err := db.IsInSameClass(ctx, wire, project)
  1712. if err != nil {
  1713. return input, errors.Wrapf(err, "unable to check if wire and project is in same class")
  1714. }
  1715. if !ok {
  1716. return input, httperrors.NewForbiddenError("the wire %s and project %s has different class metadata", wire.GetName(), project.GetName())
  1717. }
  1718. }
  1719. if vpc.Id != api.DEFAULT_VPC_ID {
  1720. // require prefix
  1721. if len(input.GuestIpPrefix) == 0 && len(input.GuestIp6Start) > 0 && len(input.GuestIp6End) > 0 {
  1722. return input, errors.Wrap(httperrors.ErrInputParameter, "guest_ip_prefix is required")
  1723. }
  1724. if len(input.GuestIp6Prefix) == 0 && len(input.GuestIp6Start) > 0 && len(input.GuestIp6End) > 0 {
  1725. return input, errors.Wrap(httperrors.ErrInputParameter, "guest_ip6_prefix is required")
  1726. }
  1727. }
  1728. {
  1729. defaultVlanId := 1
  1730. if input.VlanId == nil {
  1731. input.VlanId = &defaultVlanId
  1732. } else if *input.VlanId < 1 {
  1733. input.VlanId = &defaultVlanId
  1734. }
  1735. if *input.VlanId > 4095 {
  1736. return input, httperrors.NewInputParameterError("valid vlan id")
  1737. }
  1738. }
  1739. {
  1740. if len(input.IfnameHint) == 0 {
  1741. input.IfnameHint = input.Name
  1742. }
  1743. var err error
  1744. input.IfnameHint, err = manager.newIfnameHint(input.IfnameHint)
  1745. if err != nil {
  1746. return input, httperrors.NewBadRequestError("cannot derive valid ifname hint: %v", err)
  1747. }
  1748. }
  1749. var (
  1750. ipRange *netutils.IPV4AddrRange
  1751. masklen int8
  1752. netAddr netutils.IPV4Addr
  1753. )
  1754. if len(input.GuestIpPrefix) > 0 {
  1755. prefix, err := netutils.NewIPV4Prefix(input.GuestIpPrefix)
  1756. if err != nil {
  1757. return input, httperrors.NewInputParameterError("ip_prefix error: %s", err)
  1758. }
  1759. ipRangeTmp := prefix.ToIPRange()
  1760. ipRange = &ipRangeTmp
  1761. masklen = prefix.MaskLen
  1762. netAddr = prefix.Address.NetAddr(masklen)
  1763. input.GuestIpMask = prefix.MaskLen
  1764. if !isValidIpv4MaskLen(masklen) {
  1765. return input, httperrors.NewInputParameterError("subnet masklen should be smaller than 30")
  1766. }
  1767. // 根据掩码得到合法的GuestIpPrefix
  1768. input.GuestIpPrefix = prefix.String()
  1769. if region.Provider == api.CLOUD_PROVIDER_ONECLOUD && vpc.Id != api.DEFAULT_VPC_ID {
  1770. // reserve addresses for onecloud vpc networks
  1771. gateway := netAddr.StepUp()
  1772. brdAddr := gateway.BroadcastAddr(masklen)
  1773. // NOTE
  1774. //
  1775. // - reserve the 1st addr as gateway
  1776. // - reserve the last ip for broadcasting
  1777. // - reserve the 2nd-to-last for possible future use
  1778. //
  1779. // We do not allow split 192.168.1.0/24 into multiple ranges
  1780. // like
  1781. //
  1782. // - 192.168.1.50-192.168.1.100,
  1783. // - 192.168.1.100-192.168.1.200
  1784. //
  1785. // This could complicate gateway setting and topology
  1786. // management without much benefit to end users
  1787. ipStart := gateway.StepUp()
  1788. ipEnd := brdAddr.StepDown().StepDown()
  1789. ipRange.Set(ipStart, ipEnd)
  1790. input.GuestGateway = gateway.String()
  1791. }
  1792. } else if len(input.GuestIpStart) > 0 && len(input.GuestIpEnd) > 0 {
  1793. if !isValidIpv4MaskLen(input.GuestIpMask) {
  1794. return input, httperrors.NewInputParameterError("Invalid masklen %d", input.GuestIpMask)
  1795. }
  1796. ipStart, err := netutils.NewIPV4Addr(input.GuestIpStart)
  1797. if err != nil {
  1798. return input, httperrors.NewInputParameterError("Invalid start ip: %s %s", input.GuestIpStart, err)
  1799. }
  1800. ipEnd, err := netutils.NewIPV4Addr(input.GuestIpEnd)
  1801. if err != nil {
  1802. return input, httperrors.NewInputParameterError("invalid end ip: %s %s", input.GuestIpEnd, err)
  1803. }
  1804. ipRangeTpm := netutils.NewIPV4AddrRange(ipStart, ipEnd)
  1805. ipRange = &ipRangeTpm
  1806. masklen = input.GuestIpMask
  1807. netAddr = ipStart.NetAddr(masklen)
  1808. if ipEnd.NetAddr(masklen) != netAddr {
  1809. return input, httperrors.NewInputParameterError("start and end ip not in the same subnet")
  1810. }
  1811. if wire.Id == api.DEFAULT_HOST_LOCAL_WIRE_ID && len(input.GuestGateway) == 0 {
  1812. return input, httperrors.NewInputParameterError("host local wire only support gateway ip")
  1813. }
  1814. }
  1815. var (
  1816. ipRange6 *netutils.IPV6AddrRange
  1817. masklen6 uint8
  1818. netAddr6 netutils.IPV6Addr
  1819. )
  1820. if len(input.GuestIp6Prefix) > 0 {
  1821. prefix, err := netutils.NewIPV6Prefix(input.GuestIp6Prefix)
  1822. if err != nil {
  1823. return input, httperrors.NewInputParameterError("ip_prefix error: %s", err)
  1824. }
  1825. ipRange6tmp := prefix.ToIPRange()
  1826. ipRange6 = &ipRange6tmp
  1827. masklen6 = prefix.MaskLen
  1828. netAddr6 = prefix.Address.NetAddr(masklen6)
  1829. input.GuestIp6Mask = prefix.MaskLen
  1830. if !isValidIpv6MaskLen(masklen6) {
  1831. return input, httperrors.NewInputParameterError("ipv6 subnet masklen should be between 48~126")
  1832. }
  1833. // 根据掩码得到合法的GuestIp6Prefix
  1834. input.GuestIp6Prefix = prefix.String()
  1835. if region.Provider == api.CLOUD_PROVIDER_ONECLOUD && vpc.Id != api.DEFAULT_VPC_ID {
  1836. // reserve addresses for onecloud vpc networks
  1837. gateway := netAddr6.StepUp()
  1838. brdAddr := gateway.BroadcastAddr(masklen6)
  1839. // NOTE
  1840. //
  1841. // - reserve the 1st addr as gateway
  1842. // - reserve the last ip for broadcasting
  1843. // - reserve the 2nd-to-last for possible future use
  1844. //
  1845. // This could complicate gateway setting and topology
  1846. // management without much benefit to end users
  1847. ipStart := gateway.StepUp()
  1848. ipEnd := brdAddr.StepDown().StepDown()
  1849. ipRange6.Set(ipStart, ipEnd)
  1850. input.GuestGateway6 = gateway.String()
  1851. }
  1852. } else if len(input.GuestIp6Start) > 0 && len(input.GuestIp6End) > 0 {
  1853. if !isValidIpv6MaskLen(input.GuestIp6Mask) {
  1854. return input, httperrors.NewInputParameterError("Invalid ipv6 masklen %d", input.GuestIp6Mask)
  1855. }
  1856. ip6Start, err := netutils.NewIPV6Addr(input.GuestIp6Start)
  1857. if err != nil {
  1858. return input, httperrors.NewInputParameterError("Invalid start v6 ip: %s %s", input.GuestIp6Start, err)
  1859. }
  1860. ip6End, err := netutils.NewIPV6Addr(input.GuestIp6End)
  1861. if err != nil {
  1862. return input, httperrors.NewInputParameterError("invalid end v6 ip: %s %s", input.GuestIp6End, err)
  1863. }
  1864. ipRange6tmp := netutils.NewIPV6AddrRange(ip6Start, ip6End)
  1865. ipRange6 = &ipRange6tmp
  1866. masklen6 = input.GuestIp6Mask
  1867. netAddr6 = ip6Start.NetAddr(masklen6)
  1868. if !ip6End.NetAddr(masklen6).Equals(netAddr6) {
  1869. return input, httperrors.NewInputParameterError("v6 start and end ip not in the same subnet")
  1870. }
  1871. if wire.Id == api.DEFAULT_HOST_LOCAL_WIRE_ID && len(input.GuestGateway6) == 0 {
  1872. return input, httperrors.NewInputParameterError("host local wire only support gateway v6 ip")
  1873. }
  1874. }
  1875. if ipRange == nil && ipRange6 == nil {
  1876. return input, httperrors.NewBadRequestError("No valid ipv4/ipv6 address input")
  1877. }
  1878. // do not set default dns
  1879. // if len(input.GuestDns) == 0 {
  1880. // input.GuestDns = options.Options.DNSServer
  1881. // }
  1882. for key, ipStr := range map[string]string{
  1883. "guest_gateway": input.GuestGateway,
  1884. "guest_dns": input.GuestDns,
  1885. "guest_dhcp": input.GuestDHCP,
  1886. "guest_ntp": input.GuestNtp,
  1887. "guest_gateway6": input.GuestGateway6,
  1888. } {
  1889. if ipStr == "" {
  1890. continue
  1891. }
  1892. if key == "guest_dhcp" || key == "guest_dns" {
  1893. ipList := strings.Split(ipStr, ",")
  1894. for _, ipstr := range ipList {
  1895. if !regutils.MatchIPAddr(ipstr) {
  1896. return input, httperrors.NewInputParameterError("%s: Invalid IP address %s", key, ipstr)
  1897. }
  1898. }
  1899. } else if key == "guest_ntp" {
  1900. ipList := strings.Split(ipStr, ",")
  1901. for _, ipstr := range ipList {
  1902. if !regutils.MatchDomainName(ipstr) && !regutils.MatchIPAddr(ipstr) {
  1903. return input, httperrors.NewInputParameterError("%s: Invalid domain name or IP address %s", key, ipstr)
  1904. }
  1905. }
  1906. } else if !regutils.MatchIPAddr(ipStr) {
  1907. return input, httperrors.NewInputParameterError("%s: Invalid IP address %s", key, ipStr)
  1908. }
  1909. }
  1910. if input.GuestGateway != "" {
  1911. addr, err := netutils.NewIPV4Addr(input.GuestGateway)
  1912. if err != nil {
  1913. return input, httperrors.NewInputParameterError("bad gateway ip: %v", err)
  1914. }
  1915. if addr.NetAddr(masklen) != netAddr {
  1916. return input, httperrors.NewInputParameterError("gateway ip must be in the same subnet as start, end ip")
  1917. }
  1918. }
  1919. if input.GuestGateway6 != "" {
  1920. addr, err := netutils.NewIPV6Addr(input.GuestGateway6)
  1921. if err != nil {
  1922. return input, httperrors.NewInputParameterError("bad v6 gateway ip: %v", err)
  1923. }
  1924. if !addr.NetAddr(masklen6).Equals(netAddr6) {
  1925. return input, httperrors.NewInputParameterError("ipv6 gateway ip must be in the same subnet as start, end v6 ip")
  1926. }
  1927. }
  1928. {
  1929. if ipRange != nil && !vpc.containsIPV4Range(*ipRange) {
  1930. return input, httperrors.NewInputParameterError("Network not in range of VPC cidrblock %s", vpc.CidrBlock)
  1931. }
  1932. if ipRange6 != nil {
  1933. if !vpc.containsIPV6Range(*ipRange6) {
  1934. return input, httperrors.NewInputParameterError("Network not in range of VPC ipv6 cidrblock %s", vpc.CidrBlock6)
  1935. }
  1936. }
  1937. }
  1938. {
  1939. provider := wire.GetProviderName()
  1940. nets, err := vpc.GetNetworksByProvider(provider)
  1941. if err != nil {
  1942. return input, httperrors.NewInternalServerError("fail to GetNetworks of vpc: %v", err)
  1943. }
  1944. if ipRange != nil && isOverlapNetworks(nets, *ipRange) {
  1945. return input, httperrors.NewInputParameterError("Conflict address space with existing networks in vpc %q", vpc.GetName())
  1946. }
  1947. if ipRange6 != nil && isOverlapNetworks6(nets, *ipRange6) {
  1948. return input, httperrors.NewInputParameterError("Conflict address space with existing networks in vpc %q", vpc.GetName())
  1949. }
  1950. }
  1951. if ipRange != nil {
  1952. input.GuestIpStart = ipRange.StartIp().String()
  1953. input.GuestIpEnd = ipRange.EndIp().String()
  1954. }
  1955. if ipRange6 != nil {
  1956. // validate v6 ip addr
  1957. input.GuestIp6Start = ipRange6.StartIp().String()
  1958. input.GuestIp6End = ipRange6.EndIp().String()
  1959. }
  1960. input.SharableVirtualResourceCreateInput, err = manager.SSharableVirtualResourceBaseManager.ValidateCreateData(ctx, userCred, ownerId, query, input.SharableVirtualResourceCreateInput)
  1961. if err != nil {
  1962. return input, err
  1963. }
  1964. return input, nil
  1965. }
  1966. func (snet *SNetwork) validateUpdateData(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.NetworkUpdateInput) (api.NetworkUpdateInput, error) {
  1967. var (
  1968. netAddr netutils.IPV4Addr
  1969. masklen int8
  1970. netAddr6 netutils.IPV6Addr
  1971. masklen6 uint8
  1972. err error
  1973. )
  1974. if input.GuestIpMask > 0 {
  1975. if !snet.isManaged() && !isValidIpv4MaskLen(input.GuestIpMask) {
  1976. return input, httperrors.NewInputParameterError("Invalid masklen %d", input.GuestIpMask)
  1977. }
  1978. masklen = input.GuestIpMask
  1979. } else {
  1980. masklen = snet.GuestIpMask
  1981. }
  1982. if input.GuestIp6Mask != nil && *input.GuestIp6Mask > 0 {
  1983. if !snet.isManaged() && !isValidIpv6MaskLen(*input.GuestIp6Mask) {
  1984. return input, httperrors.NewInputParameterError("Invalid ipv6 masklen %d", *input.GuestIp6Mask)
  1985. }
  1986. masklen6 = *input.GuestIp6Mask
  1987. } else {
  1988. masklen6 = snet.GuestIp6Mask
  1989. }
  1990. if input.GuestIpStart != "" || input.GuestIpEnd != "" {
  1991. var (
  1992. startIp netutils.IPV4Addr
  1993. endIp netutils.IPV4Addr
  1994. )
  1995. if input.GuestIpStart != "" {
  1996. startIp, err = netutils.NewIPV4Addr(input.GuestIpStart)
  1997. if err != nil {
  1998. return input, httperrors.NewInputParameterError("Invalid start ip: %s %s", input.GuestIpStart, err)
  1999. }
  2000. } else {
  2001. startIp, _ = netutils.NewIPV4Addr(snet.GuestIpStart)
  2002. }
  2003. if input.GuestIpEnd != "" {
  2004. endIp, err = netutils.NewIPV4Addr(input.GuestIpEnd)
  2005. if err != nil {
  2006. return input, httperrors.NewInputParameterError("invalid end ip: %s %s", input.GuestIpEnd, err)
  2007. }
  2008. } else {
  2009. endIp, _ = netutils.NewIPV4Addr(snet.GuestIpEnd)
  2010. }
  2011. netRange := netutils.NewIPV4AddrRange(startIp, endIp)
  2012. nets := NetworkManager.getAllNetworks(snet.WireId, snet.Id)
  2013. if nets == nil {
  2014. return input, httperrors.NewInternalServerError("query all networks fail")
  2015. }
  2016. if isOverlapNetworks(nets, netRange) {
  2017. return input, httperrors.NewInputParameterError("Conflict address space with existing networks")
  2018. }
  2019. vpc, _ := snet.GetVpc()
  2020. if !vpc.containsIPV4Range(netRange) {
  2021. return input, httperrors.NewInputParameterError("Network not in range of VPC cidrblock %s", vpc.CidrBlock)
  2022. }
  2023. usedMap := snet.GetUsedAddresses(ctx)
  2024. for usedIpStr := range usedMap {
  2025. if usedIp, err := netutils.NewIPV4Addr(usedIpStr); err == nil && !netRange.Contains(usedIp) {
  2026. return input, httperrors.NewInputParameterError("Address %s been assigned out of new range", usedIpStr)
  2027. }
  2028. }
  2029. input.GuestIpStart = netRange.StartIp().String()
  2030. input.GuestIpEnd = netRange.EndIp().String()
  2031. netAddr = startIp.NetAddr(masklen)
  2032. if endIp.NetAddr(masklen) != netAddr {
  2033. return input, httperrors.NewInputParameterError("start, end ip must be in the same subnet")
  2034. }
  2035. if snet.WireId == api.DEFAULT_HOST_LOCAL_WIRE_ID && input.GuestGateway != nil && len(*input.GuestGateway) == 0 {
  2036. return input, httperrors.NewInputParameterError("host local wire only support gateway ip")
  2037. }
  2038. } else {
  2039. startIp, _ := netutils.NewIPV4Addr(snet.GuestIpStart)
  2040. netAddr = startIp.NetAddr(masklen)
  2041. }
  2042. if (input.GuestIp6Start != nil && len(*input.GuestIp6Start) > 0) || (input.GuestIp6End != nil && len(*input.GuestIp6End) > 0) {
  2043. var (
  2044. startIp netutils.IPV6Addr
  2045. endIp netutils.IPV6Addr
  2046. )
  2047. if input.GuestIp6Start != nil && len(*input.GuestIp6Start) > 0 {
  2048. startIp, err = netutils.NewIPV6Addr(*input.GuestIp6Start)
  2049. if err != nil {
  2050. return input, httperrors.NewInputParameterError("Invalid start v6 ip: %s %s", *input.GuestIp6Start, err)
  2051. }
  2052. } else if len(snet.GuestIp6Start) > 0 {
  2053. startIp, _ = netutils.NewIPV6Addr(snet.GuestIp6Start)
  2054. } else {
  2055. return input, httperrors.NewInputParameterError("no start v6 ip")
  2056. }
  2057. if input.GuestIp6End != nil && len(*input.GuestIp6End) > 0 {
  2058. endIp, err = netutils.NewIPV6Addr(*input.GuestIp6End)
  2059. if err != nil {
  2060. return input, httperrors.NewInputParameterError("invalid end v6 ip: %s %s", *input.GuestIp6End, err)
  2061. }
  2062. } else if len(snet.GuestIp6End) > 0 {
  2063. endIp, _ = netutils.NewIPV6Addr(snet.GuestIp6End)
  2064. } else {
  2065. return input, httperrors.NewInputParameterError("no end v6 ip")
  2066. }
  2067. netRange := netutils.NewIPV6AddrRange(startIp, endIp)
  2068. nets := NetworkManager.getAllNetworks(snet.WireId, snet.Id)
  2069. if nets == nil {
  2070. return input, httperrors.NewInternalServerError("query all networks fail")
  2071. }
  2072. if isOverlapNetworks6(nets, netRange) {
  2073. return input, httperrors.NewInputParameterError("Conflict v6 address space with existing networks")
  2074. }
  2075. vpc, _ := snet.GetVpc()
  2076. if !vpc.containsIPV6Range(netRange) {
  2077. return input, httperrors.NewInputParameterError("Network not in range of VPC v6 cidrblock %s", vpc.CidrBlock6)
  2078. }
  2079. usedMap := snet.GetUsedAddresses6(ctx)
  2080. for usedIpStr := range usedMap {
  2081. if usedIp, err := netutils.NewIPV6Addr(usedIpStr); err == nil && !netRange.Contains(usedIp) {
  2082. return input, httperrors.NewInputParameterError("v6 address %s been assigned out of new range", usedIpStr)
  2083. }
  2084. }
  2085. startIpStr := netRange.StartIp().String()
  2086. endIpStr := netRange.EndIp().String()
  2087. input.GuestIp6Start = &startIpStr
  2088. input.GuestIp6End = &endIpStr
  2089. netAddr6 = netRange.StartIp().NetAddr(masklen6)
  2090. if !netRange.EndIp().NetAddr(masklen6).Equals(netAddr6) {
  2091. return input, httperrors.NewInputParameterError("start, end v6 ip must be in the same subnet")
  2092. }
  2093. if snet.WireId == api.DEFAULT_HOST_LOCAL_WIRE_ID && input.GuestGateway6 != nil && len(*input.GuestGateway6) == 0 {
  2094. return input, httperrors.NewInputParameterError("host local wire only support gateway ip")
  2095. }
  2096. } else if len(snet.GuestIp6Start) > 0 {
  2097. startIp, _ := netutils.NewIPV6Addr(snet.GuestIp6Start)
  2098. netAddr6 = startIp.NetAddr(masklen6)
  2099. }
  2100. for key, ipStr := range map[string]*string{
  2101. "guest_gateway": input.GuestGateway,
  2102. "guest_dns": input.GuestDns,
  2103. "guest_dhcp": input.GuestDhcp,
  2104. "guest_ntp": input.GuestNtp,
  2105. "guest_gateway6": input.GuestGateway6,
  2106. } {
  2107. if ipStr == nil || len(*ipStr) == 0 {
  2108. continue
  2109. }
  2110. if key == "guest_dhcp" || key == "guest_dns" {
  2111. ipList := strings.Split(*ipStr, ",")
  2112. for _, ipstr := range ipList {
  2113. if !regutils.MatchIPAddr(ipstr) {
  2114. return input, httperrors.NewInputParameterError("%s: Invalid IP address %s", key, ipstr)
  2115. }
  2116. }
  2117. } else if key == "guest_ntp" {
  2118. ipList := strings.Split(*ipStr, ",")
  2119. for _, ipstr := range ipList {
  2120. if !regutils.MatchDomainName(ipstr) && !regutils.MatchIPAddr(ipstr) {
  2121. return input, httperrors.NewInputParameterError("%s: Invalid domain name or IP address %s", key, ipstr)
  2122. }
  2123. }
  2124. } else if !regutils.MatchIPAddr(*ipStr) {
  2125. return input, httperrors.NewInputParameterError("%s: Invalid IP address %s", key, *ipStr)
  2126. }
  2127. }
  2128. if input.GuestGateway != nil && len(*input.GuestGateway) > 0 {
  2129. addr, err := netutils.NewIPV4Addr(*input.GuestGateway)
  2130. if err != nil {
  2131. return input, httperrors.NewInputParameterError("bad gateway ip: %v", err)
  2132. }
  2133. if addr.NetAddr(masklen) != netAddr {
  2134. return input, httperrors.NewInputParameterError("gateway ip must be in the same subnet as start, end ip")
  2135. }
  2136. }
  2137. if input.GuestGateway6 != nil && len(*input.GuestGateway6) > 0 {
  2138. addr, err := netutils.NewIPV6Addr(*input.GuestGateway6)
  2139. if err != nil {
  2140. return input, httperrors.NewInputParameterError("bad ipv6 gateway ip: %v", err)
  2141. }
  2142. if !addr.NetAddr(masklen6).Equals(netAddr6) {
  2143. return input, httperrors.NewInputParameterError("ipv6 gateway ip must be in the same subnet as start, end v6 ip")
  2144. }
  2145. }
  2146. if input.IsAutoAlloc != nil && *input.IsAutoAlloc {
  2147. if snet.ServerType != api.NETWORK_TYPE_GUEST && snet.ServerType != api.NETWORK_TYPE_HOSTLOCAL {
  2148. return input, httperrors.NewInputParameterError("network server_type %s not support auto alloc", snet.ServerType)
  2149. }
  2150. }
  2151. if len(input.ServerType) > 0 {
  2152. if !api.IsInNetworkTypes(input.ServerType, api.ALL_NETWORK_TYPES) {
  2153. return input, errors.Wrapf(httperrors.ErrInputParameter, "invalid server_type %q", input.ServerType)
  2154. }
  2155. if snet.WireId == api.DEFAULT_HOST_LOCAL_WIRE_ID && input.ServerType != api.NETWORK_TYPE_HOSTLOCAL {
  2156. return input, httperrors.NewInputParameterError("host local wire only support hostlocal server_type")
  2157. }
  2158. }
  2159. return input, nil
  2160. }
  2161. func (snet *SNetwork) ValidateUpdateData(
  2162. ctx context.Context,
  2163. userCred mcclient.TokenCredential,
  2164. query jsonutils.JSONObject,
  2165. input api.NetworkUpdateInput,
  2166. ) (api.NetworkUpdateInput, error) {
  2167. if snet.isManaged() {
  2168. // managed network, not allow to update
  2169. input.GuestIpStart = ""
  2170. input.GuestIpEnd = ""
  2171. input.GuestIpMask = 0
  2172. input.GuestGateway = nil
  2173. input.GuestDns = nil
  2174. input.GuestDomain = nil
  2175. input.GuestDhcp = nil
  2176. input.GuestNtp = nil
  2177. input.GuestIp6Start = nil
  2178. input.GuestIp6End = nil
  2179. input.GuestIp6Mask = nil
  2180. input.GuestGateway6 = nil
  2181. }
  2182. var err error
  2183. input, err = snet.validateUpdateData(ctx, userCred, query, input)
  2184. if err != nil {
  2185. return input, errors.Wrap(err, "validateUpdateData")
  2186. }
  2187. input.SharableVirtualResourceBaseUpdateInput, err = snet.SSharableVirtualResourceBase.ValidateUpdateData(ctx, userCred, query, input.SharableVirtualResourceBaseUpdateInput)
  2188. if err != nil {
  2189. return input, errors.Wrap(err, "SSharableVirtualResourceBase.ValidateUpdateData")
  2190. }
  2191. return input, nil
  2192. }
  2193. func (manager *SNetworkManager) getAllNetworks(wireId, excludeId string) []SNetwork {
  2194. nets := make([]SNetwork, 0)
  2195. q := manager.Query().Equals("wire_id", wireId)
  2196. if len(excludeId) > 0 {
  2197. q = q.NotEquals("id", excludeId)
  2198. }
  2199. err := db.FetchModelObjects(manager, q, &nets)
  2200. if err != nil {
  2201. log.Errorf("getAllNetworks fail %s", err)
  2202. return nil
  2203. }
  2204. return nets
  2205. }
  2206. func isOverlapNetworksAddr(nets []SNetwork, startIp, endIp netutils.IPV4Addr) bool {
  2207. ipRange := netutils.NewIPV4AddrRange(startIp, endIp)
  2208. for i := 0; i < len(nets); i += 1 {
  2209. ipRange2 := nets[i].getIPRange()
  2210. if ipRange2 != nil && ipRange2.IsOverlap(ipRange) {
  2211. return true
  2212. }
  2213. }
  2214. return false
  2215. }
  2216. func isOverlapNetworks(nets []SNetwork, ipRange netutils.IPV4AddrRange) bool {
  2217. for i := 0; i < len(nets); i += 1 {
  2218. ipRange2 := nets[i].getIPRange()
  2219. if ipRange2 != nil && ipRange2.IsOverlap(ipRange) {
  2220. return true
  2221. }
  2222. }
  2223. return false
  2224. }
  2225. func isOverlapNetworks6(nets []SNetwork, ipRange netutils.IPV6AddrRange) bool {
  2226. for i := 0; i < len(nets); i += 1 {
  2227. ipRange2 := nets[i].getIPRange6()
  2228. if ipRange2 != nil && ipRange2.IsOverlap(ipRange) {
  2229. return true
  2230. }
  2231. }
  2232. return false
  2233. }
  2234. func (snet *SNetwork) IsManaged() bool {
  2235. wire, _ := snet.GetWire()
  2236. if wire == nil {
  2237. return false
  2238. }
  2239. return wire.IsManaged()
  2240. }
  2241. func (snet *SNetwork) CustomizeCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) error {
  2242. if !data.Contains("public_scope") {
  2243. if snet.ServerType == api.NETWORK_TYPE_GUEST && !snet.IsManaged() {
  2244. wire, _ := snet.GetWire()
  2245. if db.IsAdminAllowPerform(ctx, userCred, snet, "public") && ownerId.GetProjectDomainId() == userCred.GetProjectDomainId() && wire != nil && wire.IsPublic && wire.PublicScope == string(rbacscope.ScopeSystem) {
  2246. snet.SetShare(rbacscope.ScopeSystem)
  2247. } else if db.IsDomainAllowPerform(ctx, userCred, snet, "public") && ownerId.GetProjectId() == userCred.GetProjectId() && consts.GetNonDefaultDomainProjects() {
  2248. // only if non_default_domain_projects turned on, share to domain
  2249. snet.SetShare(rbacscope.ScopeDomain)
  2250. } else {
  2251. snet.SetShare(rbacscope.ScopeNone)
  2252. }
  2253. } else {
  2254. snet.SetShare(rbacscope.ScopeNone)
  2255. }
  2256. data.(*jsonutils.JSONDict).Set("public_scope", jsonutils.NewString(snet.PublicScope))
  2257. }
  2258. return snet.SSharableVirtualResourceBase.CustomizeCreate(ctx, userCred, ownerId, query, data)
  2259. }
  2260. func (net *SNetwork) PostCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) {
  2261. net.SSharableVirtualResourceBase.PostCreate(ctx, userCred, ownerId, query, data)
  2262. vpc, _ := net.GetVpc()
  2263. if vpc != nil && vpc.IsManaged() {
  2264. task, err := taskman.TaskManager.NewTask(ctx, "NetworkCreateTask", net, userCred, data.(*jsonutils.JSONDict), "", "", nil)
  2265. if err != nil {
  2266. net.SetStatus(ctx, userCred, apis.STATUS_CREATE_FAILED, err.Error())
  2267. return
  2268. }
  2269. task.ScheduleRun(nil)
  2270. } else {
  2271. {
  2272. err := net.syncAdditionalWires(ctx, nil)
  2273. if err != nil {
  2274. log.Errorf("syncAdditionalWires error: %s", err)
  2275. }
  2276. }
  2277. net.SetStatus(ctx, userCred, api.NETWORK_STATUS_AVAILABLE, "")
  2278. if err := net.ClearSchedDescCache(); err != nil {
  2279. log.Errorf("network post create clear schedcache error: %v", err)
  2280. }
  2281. notifyclient.EventNotify(ctx, userCred, notifyclient.SEventNotifyParam{
  2282. Obj: net,
  2283. Action: notifyclient.ActionCreate,
  2284. })
  2285. }
  2286. // reserve gateway IP
  2287. {
  2288. err := net.reserveGuestGateway(ctx, userCred)
  2289. if err != nil {
  2290. log.Errorf("reserveGuestGateway fail %s", err)
  2291. }
  2292. }
  2293. }
  2294. func (snet *SNetwork) reserveGuestGateway(ctx context.Context, userCred mcclient.TokenCredential) error {
  2295. ipRange := snet.GetIPRange()
  2296. if snet.GuestGateway != "" {
  2297. gatewayIp, _ := netutils.NewIPV4Addr(snet.GuestGateway)
  2298. if ipRange.Contains(gatewayIp) {
  2299. err := snet.reserveIpWithDurationAndStatus(ctx, userCred, snet.GuestGateway, "Reserve GuestGateway IP", 0, api.RESERVEDIP_STATUS_ONLINE)
  2300. if err != nil {
  2301. return errors.Wrap(err, "reserveIpWithDurationAndStatus")
  2302. }
  2303. }
  2304. }
  2305. return nil
  2306. }
  2307. func (snet *SNetwork) GetPrefix() (netutils.IPV4Prefix, error) {
  2308. addr, err := netutils.NewIPV4Addr(snet.GuestIpStart)
  2309. if err != nil {
  2310. return netutils.IPV4Prefix{}, err
  2311. }
  2312. addr = addr.NetAddr(snet.GuestIpMask)
  2313. return netutils.IPV4Prefix{Address: addr, MaskLen: snet.GuestIpMask}, nil
  2314. }
  2315. func (snet *SNetwork) Delete(ctx context.Context, userCred mcclient.TokenCredential) error {
  2316. log.Infof("SNetwork delete do nothing")
  2317. snet.SetStatus(ctx, userCred, api.NETWORK_STATUS_START_DELETE, "")
  2318. return nil
  2319. }
  2320. func (snet *SNetwork) CustomizeDelete(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) error {
  2321. if len(snet.ExternalId) > 0 {
  2322. return snet.StartDeleteNetworkTask(ctx, userCred)
  2323. } else {
  2324. return snet.RealDelete(ctx, userCred)
  2325. }
  2326. }
  2327. func (snet *SNetwork) RealDelete(ctx context.Context, userCred mcclient.TokenCredential) error {
  2328. DeleteResourceJointSchedtags(snet, ctx, userCred)
  2329. db.OpsLog.LogEvent(snet, db.ACT_DELOCATE, snet.GetShortDesc(ctx), userCred)
  2330. snet.SetStatus(ctx, userCred, api.NETWORK_STATUS_DELETED, "real delete")
  2331. networkinterfaces, err := snet.GetNetworkInterfaces()
  2332. if err != nil {
  2333. return errors.Wrap(err, "GetNetworkInterfaces")
  2334. }
  2335. for i := range networkinterfaces {
  2336. err = networkinterfaces[i].purge(ctx, userCred)
  2337. if err != nil {
  2338. return errors.Wrapf(err, "networkinterface.purge %s(%s)", networkinterfaces[i].Name, networkinterfaces[i].Id)
  2339. }
  2340. }
  2341. reservedIps := ReservedipManager.GetReservedIPs(snet)
  2342. for i := range reservedIps {
  2343. err = reservedIps[i].Release(ctx, userCred, snet)
  2344. if err != nil {
  2345. return errors.Wrapf(err, "reservedIps.Release %s/%s(%d)", reservedIps[i].IpAddr, reservedIps[i].Ip6Addr, reservedIps[i].Id)
  2346. }
  2347. }
  2348. gns, err := snet.GetGuestnetworks() // delete virtual nics
  2349. if err != nil {
  2350. return errors.Wrapf(err, "GetGuestnetworks")
  2351. }
  2352. for i := range gns {
  2353. err = gns[i].Delete(ctx, userCred)
  2354. if err != nil {
  2355. return errors.Wrapf(err, "delete virtual nic %s(%d)", gns[i].Ifname, gns[i].RowId)
  2356. }
  2357. }
  2358. if err := snet.SSharableVirtualResourceBase.Delete(ctx, userCred); err != nil {
  2359. return err
  2360. }
  2361. if err := NetworkAdditionalWireManager.DeleteNetwork(ctx, snet.Id); err != nil {
  2362. return errors.Wrap(err, "NetworkAdditionalWireManager.DeleteNetwork")
  2363. }
  2364. snet.ClearSchedDescCache()
  2365. return nil
  2366. }
  2367. func (snet *SNetwork) StartDeleteNetworkTask(ctx context.Context, userCred mcclient.TokenCredential) error {
  2368. task, err := taskman.TaskManager.NewTask(ctx, "NetworkDeleteTask", snet, userCred, nil, "", "", nil)
  2369. if err != nil {
  2370. log.Errorf("Start NetworkDeleteTask fail %s", err)
  2371. return err
  2372. }
  2373. task.ScheduleRun(nil)
  2374. return nil
  2375. }
  2376. func (snet *SNetwork) GetINetwork(ctx context.Context) (cloudprovider.ICloudNetwork, error) {
  2377. wire, err := snet.GetWire()
  2378. if err != nil {
  2379. return nil, errors.Wrapf(err, "GetWire")
  2380. }
  2381. iwire, err := wire.GetIWire(ctx)
  2382. if err != nil {
  2383. return nil, err
  2384. }
  2385. return iwire.GetINetworkById(snet.GetExternalId())
  2386. }
  2387. func (snet *SNetwork) isManaged() bool {
  2388. if len(snet.ExternalId) > 0 {
  2389. return true
  2390. } else {
  2391. return false
  2392. }
  2393. }
  2394. func (snet *SNetwork) isOneCloudVpcNetwork() bool {
  2395. return IsOneCloudVpcResource(snet)
  2396. }
  2397. /*func parseIpToIntArray(ip string) ([]int, error) {
  2398. ipSp := strings.Split(strings.Trim(ip, "."), ".")
  2399. if len(ipSp) > 4 {
  2400. return nil, httperrors.NewInputParameterError("Parse Ip Failed")
  2401. }
  2402. ipIa := []int{}
  2403. for i := 0; i < len(ipSp); i++ {
  2404. val, err := strconv.Atoi(ipSp[i])
  2405. if err != nil {
  2406. return nil, httperrors.NewInputParameterError("Parse Ip Failed")
  2407. }
  2408. if val < 0 || val > 255 {
  2409. return nil, httperrors.NewInputParameterError("Parse Ip Failed")
  2410. }
  2411. ipIa = append(ipIa, val)
  2412. }
  2413. return ipIa, nil
  2414. }*/
  2415. // IP子网列表
  2416. func (manager *SNetworkManager) ListItemFilter(
  2417. ctx context.Context,
  2418. q *sqlchemy.SQuery,
  2419. userCred mcclient.TokenCredential,
  2420. input api.NetworkListInput,
  2421. ) (*sqlchemy.SQuery, error) {
  2422. var err error
  2423. q, err = manager.SSharableVirtualResourceBaseManager.ListItemFilter(ctx, q, userCred, input.SharableVirtualResourceListInput)
  2424. if err != nil {
  2425. return nil, errors.Wrap(err, "SSharableVirtualResourceBaseManager.ListItemFilter")
  2426. }
  2427. q, err = manager.SExternalizedResourceBaseManager.ListItemFilter(ctx, q, userCred, input.ExternalizedResourceBaseListInput)
  2428. if err != nil {
  2429. return nil, errors.Wrap(err, "SExternalizedResourceBaseManager.ListItemFilter")
  2430. }
  2431. {
  2432. wireFilter := input.WireResourceInput
  2433. input.Wire = ""
  2434. input.WireId = ""
  2435. q, err = manager.SWireResourceBaseManager.ListItemFilter(ctx, q, userCred, input.WireFilterListInput)
  2436. if err != nil {
  2437. return nil, errors.Wrap(err, "SWireResourceBaseManager.ListItemFilter")
  2438. }
  2439. if len(wireFilter.WireId) > 0 {
  2440. wireObj, err := WireManager.FetchByIdOrName(ctx, userCred, wireFilter.WireId)
  2441. if err != nil {
  2442. if errors.Cause(err) == sql.ErrNoRows {
  2443. return nil, httperrors.NewResourceNotFoundError2(WireManager.Keyword(), wireFilter.WireId)
  2444. } else {
  2445. return nil, errors.Wrapf(err, "WireManager.FetchByIdOrName %s", wireFilter.WireId)
  2446. }
  2447. }
  2448. wireFilter.WireId = wireObj.GetId()
  2449. wireFilter.Wire = wireObj.GetName()
  2450. q = q.Filter(sqlchemy.OR(
  2451. sqlchemy.Equals(q.Field("wire_id"), wireFilter.WireId),
  2452. sqlchemy.In(q.Field("id"), NetworkAdditionalWireManager.networkIdQuery(wireFilter.WireId).SubQuery()),
  2453. ))
  2454. }
  2455. input.WireResourceInput = wireFilter
  2456. }
  2457. if len(input.RouteTableId) > 0 {
  2458. sq := RouteTableAssociationManager.Query("associated_resource_id").Equals("route_table_id", input.RouteTableId).Equals("association_type", string(cloudprovider.RouteTableAssociaToSubnet))
  2459. q = q.In("id", sq.SubQuery())
  2460. }
  2461. if input.Usable != nil && *input.Usable {
  2462. regions := CloudregionManager.Query("id").Equals("status", api.CLOUD_REGION_STATUS_INSERVER)
  2463. zones := ZoneManager.Query("id").Equals("status", api.ZONE_ENABLE).In("cloudregion_id", regions)
  2464. providerSQ := usableCloudProviders()
  2465. _vpcs := VpcManager.Query("id").Equals("status", api.VPC_STATUS_AVAILABLE)
  2466. vpcs := _vpcs.Filter(sqlchemy.OR(
  2467. sqlchemy.In(_vpcs.Field("manager_id"), providerSQ),
  2468. sqlchemy.IsNullOrEmpty(_vpcs.Field("manager_id")),
  2469. ))
  2470. wires := WireManager.Query("id")
  2471. wires = wires.In("vpc_id", vpcs).
  2472. Filter(sqlchemy.OR(sqlchemy.IsNullOrEmpty(wires.Field("zone_id")), sqlchemy.In(wires.Field("zone_id"), zones)))
  2473. q = q.In("wire_id", wires).Equals("status", api.NETWORK_STATUS_AVAILABLE)
  2474. }
  2475. if len(input.HostType) > 0 || len(input.HostId) > 0 {
  2476. classicWiresIdQ := WireManager.Query("id").Equals("vpc_id", api.DEFAULT_VPC_ID)
  2477. netifs := NetInterfaceManager.Query("wire_id", "baremetal_id").SubQuery()
  2478. classicWiresIdQ = classicWiresIdQ.Join(netifs, sqlchemy.Equals(netifs.Field("wire_id"), classicWiresIdQ.Field("id")))
  2479. hosts := HostManager.Query("id")
  2480. if len(input.HostType) > 0 {
  2481. hosts = hosts.Equals("host_type", input.HostType)
  2482. }
  2483. if len(input.HostId) > 0 {
  2484. hosts = hosts.In("id", input.HostId)
  2485. }
  2486. hostsQ := hosts.SubQuery()
  2487. classicWiresIdQ = classicWiresIdQ.Join(hostsQ, sqlchemy.Equals(netifs.Field("baremetal_id"), hostsQ.Field("id")))
  2488. wireIdQueries := []sqlchemy.IQuery{
  2489. classicWiresIdQ,
  2490. }
  2491. if input.HostType == api.HOST_TYPE_HYPERVISOR || input.HostType == api.HOST_TYPE_CONTAINER {
  2492. vpcHostQ := HostManager.Query().Equals("host_type", input.HostType)
  2493. if len(input.HostId) > 0 {
  2494. vpcHostQ = vpcHostQ.In("id", input.HostId)
  2495. }
  2496. hostCnt, err := vpcHostQ.CountWithError()
  2497. if err != nil {
  2498. return nil, errors.Wrap(err, "vpcHostQ.CountWithError")
  2499. }
  2500. if hostCnt > 0 {
  2501. // should consider host local wire
  2502. hostLocalWireQ := WireManager.Query("id").Equals("id", api.DEFAULT_HOST_LOCAL_WIRE_ID)
  2503. wireIdQueries = append(wireIdQueries, hostLocalWireQ)
  2504. }
  2505. vpcHostQ = vpcHostQ.IsNotEmpty("ovn_version")
  2506. vpcHostCnt, err := vpcHostQ.CountWithError()
  2507. if err != nil {
  2508. return nil, errors.Wrap(err, "vpcHostQ.CountWithError")
  2509. }
  2510. if vpcHostCnt > 0 {
  2511. // should consider VPC network wire
  2512. vpcWiresIdQ := WireManager.Query("id").NotEquals("vpc_id", api.DEFAULT_VPC_ID)
  2513. wireIdQueries = append(wireIdQueries, vpcWiresIdQ)
  2514. }
  2515. }
  2516. var wireIdQ *sqlchemy.SSubQuery
  2517. if len(wireIdQueries) > 1 {
  2518. wireIdQ = sqlchemy.Union(wireIdQueries...).Query().SubQuery()
  2519. } else {
  2520. wireIdQ = classicWiresIdQ.SubQuery()
  2521. }
  2522. additionalQ := NetworkAdditionalWireManager.Query("network_id")
  2523. additionalQ = additionalQ.Join(wireIdQ, sqlchemy.Equals(wireIdQ.Field("id"), additionalQ.Field("wire_id")))
  2524. q = q.Filter(sqlchemy.OR(
  2525. sqlchemy.In(q.Field("wire_id"), wireIdQ),
  2526. sqlchemy.In(q.Field("id"), additionalQ.SubQuery()),
  2527. ))
  2528. }
  2529. storageStr := input.StorageId
  2530. if len(storageStr) > 0 {
  2531. storage, err := StorageManager.FetchByIdOrName(ctx, userCred, storageStr)
  2532. if err != nil {
  2533. return nil, errors.Wrapf(err, "unable to fetch storage %q", storageStr)
  2534. }
  2535. hoststorages := HoststorageManager.Query("host_id").Equals("storage_id", storage.GetId()).SubQuery()
  2536. hostSq := HostManager.Query("id").In("id", hoststorages).SubQuery()
  2537. sq := NetInterfaceManager.Query("wire_id").In("baremetal_id", hostSq)
  2538. ovnHosts := HostManager.Query().In("id", hoststorages).IsNotEmpty("ovn_version")
  2539. if n, _ := ovnHosts.CountWithError(); n > 0 {
  2540. wireQuery := WireManager.Query("id").IsNotNull("vpc_id")
  2541. q = q.Filter(sqlchemy.OR(
  2542. sqlchemy.In(q.Field("wire_id"), wireQuery.SubQuery()),
  2543. sqlchemy.In(q.Field("wire_id"), sq.SubQuery())),
  2544. )
  2545. } else {
  2546. q = q.Filter(sqlchemy.In(q.Field("wire_id"), sq.SubQuery()))
  2547. }
  2548. }
  2549. ips := []string{}
  2550. exactIpMatch := false
  2551. if len(input.Ip) > 0 {
  2552. exactIpMatch = true
  2553. ips = input.Ip
  2554. } else if len(input.IpMatch) > 0 {
  2555. ips = input.IpMatch
  2556. }
  2557. if len(ips) > 0 {
  2558. conditions := []sqlchemy.ICondition{}
  2559. for _, ipstr := range ips {
  2560. if len(ipstr) == 0 {
  2561. continue
  2562. }
  2563. var ipCondtion sqlchemy.ICondition
  2564. if ip4Addr, err := netutils.NewIPV4Addr(ipstr); err == nil {
  2565. // ipv4 address, exactly
  2566. ipStart := sqlchemy.INET_ATON(q.Field("guest_ip_start"))
  2567. ipEnd := sqlchemy.INET_ATON(q.Field("guest_ip_end"))
  2568. ipConst := sqlchemy.INET_ATON(q.StringField(ip4Addr.String()))
  2569. ipCondtion = sqlchemy.AND(
  2570. sqlchemy.IsNotNull(q.Field("guest_ip_start")),
  2571. sqlchemy.IsNotNull(q.Field("guest_ip_end")),
  2572. sqlchemy.IsNotEmpty(q.Field("guest_ip_start")),
  2573. sqlchemy.IsNotEmpty(q.Field("guest_ip_end")),
  2574. sqlchemy.GE(ipEnd, ipConst),
  2575. sqlchemy.LE(ipStart, ipConst),
  2576. )
  2577. if !exactIpMatch {
  2578. ipCondtion = sqlchemy.OR(
  2579. ipCondtion,
  2580. sqlchemy.Contains(q.Field("guest_ip_start"), ipstr),
  2581. sqlchemy.Contains(q.Field("guest_ip_end"), ipstr),
  2582. )
  2583. }
  2584. } else if ip6Addr, err := netutils.NewIPV6Addr(ipstr); err == nil {
  2585. // ipv6 address, exactly
  2586. ipStart := sqlchemy.INET6_ATON(q.Field("guest_ip6_start"))
  2587. ipEnd := sqlchemy.INET6_ATON(q.Field("guest_ip6_end"))
  2588. ipConst := sqlchemy.INET6_ATON(q.StringField(ip6Addr.String()))
  2589. ipCondtion = sqlchemy.AND(
  2590. sqlchemy.IsNotNull(q.Field("guest_ip6_start")),
  2591. sqlchemy.IsNotNull(q.Field("guest_ip6_end")),
  2592. sqlchemy.IsNotEmpty(q.Field("guest_ip6_start")),
  2593. sqlchemy.IsNotEmpty(q.Field("guest_ip6_end")),
  2594. sqlchemy.GE(ipEnd, ipConst),
  2595. sqlchemy.LE(ipStart, ipConst),
  2596. )
  2597. if !exactIpMatch {
  2598. ipCondtion = sqlchemy.OR(
  2599. ipCondtion,
  2600. sqlchemy.Contains(q.Field("guest_ip6_start"), ip6Addr.String()),
  2601. sqlchemy.Contains(q.Field("guest_ip6_end"), ip6Addr.String()),
  2602. )
  2603. }
  2604. } else {
  2605. ipCondtion = sqlchemy.OR(
  2606. sqlchemy.Contains(q.Field("guest_ip_start"), ipstr),
  2607. sqlchemy.Contains(q.Field("guest_ip_end"), ipstr),
  2608. sqlchemy.Contains(q.Field("guest_ip6_start"), ipstr),
  2609. sqlchemy.Contains(q.Field("guest_ip6_end"), ipstr),
  2610. )
  2611. }
  2612. conditions = append(conditions, ipCondtion)
  2613. }
  2614. q = q.Filter(sqlchemy.OR(conditions...))
  2615. }
  2616. if len(input.SchedtagId) > 0 {
  2617. schedTag, err := SchedtagManager.FetchByIdOrName(ctx, nil, input.SchedtagId)
  2618. if err != nil {
  2619. if errors.Cause(err) == sql.ErrNoRows {
  2620. return nil, httperrors.NewResourceNotFoundError2(SchedtagManager.Keyword(), input.SchedtagId)
  2621. }
  2622. return nil, httperrors.NewGeneralError(err)
  2623. }
  2624. sq := NetworkschedtagManager.Query("network_id").Equals("schedtag_id", schedTag.GetId()).SubQuery()
  2625. q = q.In("id", sq)
  2626. }
  2627. if len(input.IfnameHint) > 0 {
  2628. q = q.In("ifname_hint", input.IfnameHint)
  2629. }
  2630. if len(input.GuestIpStart) > 0 {
  2631. q = q.Filter(sqlchemy.ContainsAny(q.Field("guest_ip_start"), input.GuestIpStart))
  2632. }
  2633. if len(input.GuestIpEnd) > 0 {
  2634. q = q.Filter(sqlchemy.ContainsAny(q.Field("guest_ip_end"), input.GuestIpEnd))
  2635. }
  2636. if len(input.GuestIpMask) > 0 {
  2637. q = q.In("guest_ip_mask", input.GuestIpMask)
  2638. }
  2639. if len(input.GuestGateway) > 0 {
  2640. q = q.In("guest_gateway", input.GuestGateway)
  2641. }
  2642. if len(input.GuestDns) > 0 {
  2643. q = q.In("guest_dns", input.GuestDns)
  2644. }
  2645. if len(input.GuestDhcp) > 0 {
  2646. q = q.In("guest_dhcp", input.GuestDhcp)
  2647. }
  2648. if len(input.GuestNtp) > 0 {
  2649. q = q.In("guest_ntp", input.GuestNtp)
  2650. }
  2651. if len(input.GuestDomain) > 0 {
  2652. q = q.In("guest_domain", input.GuestDomain)
  2653. }
  2654. if len(input.GuestIp6Start) > 0 {
  2655. q = q.In("guest_ip6_start", input.GuestIp6Start)
  2656. }
  2657. if len(input.GuestIp6End) > 0 {
  2658. q = q.In("guest_ip6_end", input.GuestIp6End)
  2659. }
  2660. if len(input.GuestIp6Mask) > 0 {
  2661. q = q.In("guest_ip6_mask", input.GuestIp6Mask)
  2662. }
  2663. if len(input.GuestGateway6) > 0 {
  2664. q = q.In("guest_gateway6", input.GuestGateway6)
  2665. }
  2666. if len(input.GuestDns6) > 0 {
  2667. q = q.In("guest_dns6", input.GuestDns6)
  2668. }
  2669. if len(input.GuestDomain6) > 0 {
  2670. q = q.In("guest_domain6", input.GuestDomain6)
  2671. }
  2672. if len(input.VlanId) > 0 {
  2673. q = q.In("vlan_id", input.VlanId)
  2674. }
  2675. if len(input.ServerType) > 0 {
  2676. q = q.In("server_type", input.ServerType)
  2677. }
  2678. if len(input.AllocPolicy) > 0 {
  2679. q = q.In("alloc_policy", input.AllocPolicy)
  2680. }
  2681. if len(input.BgpType) > 0 {
  2682. q = q.In("bgp_type", input.BgpType)
  2683. }
  2684. if input.IsAutoAlloc != nil {
  2685. if *input.IsAutoAlloc {
  2686. q = q.IsTrue("is_auto_alloc")
  2687. } else {
  2688. q = q.IsFalse("is_auto_alloc")
  2689. }
  2690. }
  2691. if input.IsClassic != nil {
  2692. subq := manager.Query("id")
  2693. wires := WireManager.Query("id", "vpc_id").SubQuery()
  2694. subq = subq.Join(wires, sqlchemy.Equals(wires.Field("id"), subq.Field("wire_id")))
  2695. if *input.IsClassic {
  2696. subq = subq.Filter(sqlchemy.Equals(wires.Field("vpc_id"), api.DEFAULT_VPC_ID))
  2697. } else {
  2698. subq = subq.Filter(sqlchemy.NotEquals(wires.Field("vpc_id"), api.DEFAULT_VPC_ID))
  2699. }
  2700. q = q.In("id", subq.SubQuery())
  2701. }
  2702. if len(input.HostSchedtagId) > 0 {
  2703. schedTagObj, err := SchedtagManager.FetchByIdOrName(ctx, userCred, input.HostSchedtagId)
  2704. if err != nil {
  2705. if errors.Cause(err) == sql.ErrNoRows {
  2706. return nil, errors.Wrapf(httperrors.ErrResourceNotFound, "%s %s", SchedtagManager.Keyword(), input.HostSchedtagId)
  2707. } else {
  2708. return nil, errors.Wrap(err, "SchedtagManager.FetchByIdOrName")
  2709. }
  2710. }
  2711. subq := NetInterfaceManager.Query("wire_id")
  2712. hostschedtags := HostschedtagManager.Query().Equals("schedtag_id", schedTagObj.GetId()).SubQuery()
  2713. subq = subq.Join(hostschedtags, sqlchemy.Equals(hostschedtags.Field("host_id"), subq.Field("baremetal_id")))
  2714. q = q.In("wire_id", subq.SubQuery())
  2715. }
  2716. return q, nil
  2717. }
  2718. func (manager *SNetworkManager) OrderByExtraFields(
  2719. ctx context.Context,
  2720. q *sqlchemy.SQuery,
  2721. userCred mcclient.TokenCredential,
  2722. input api.NetworkListInput,
  2723. ) (*sqlchemy.SQuery, error) {
  2724. var err error
  2725. q, err = manager.SSharableVirtualResourceBaseManager.OrderByExtraFields(ctx, q, userCred, input.SharableVirtualResourceListInput)
  2726. if err != nil {
  2727. return nil, errors.Wrap(err, "SSharableVirtualResourceBaseManager.OrderByExtraFields")
  2728. }
  2729. q, err = manager.SWireResourceBaseManager.OrderByExtraFields(ctx, q, userCred, input.WireFilterListInput)
  2730. if err != nil {
  2731. return nil, errors.Wrap(err, "SWireResourceBaseManager.OrderByExtraFields")
  2732. }
  2733. if db.NeedOrderQuery([]string{input.OrderByIpStart}) {
  2734. q = db.OrderByFields(q, []string{input.OrderByIpStart}, []sqlchemy.IQueryField{sqlchemy.INET_ATON(q.Field("guest_ip_start"))})
  2735. }
  2736. if db.NeedOrderQuery([]string{input.OrderByIpEnd}) {
  2737. q = db.OrderByFields(q, []string{input.OrderByIpEnd}, []sqlchemy.IQueryField{sqlchemy.INET_ATON(q.Field("guest_ip_end"))})
  2738. }
  2739. return q, nil
  2740. }
  2741. func (manager *SNetworkManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
  2742. var err error
  2743. q, err = manager.SSharableVirtualResourceBaseManager.QueryDistinctExtraField(q, field)
  2744. if err == nil {
  2745. return q, nil
  2746. }
  2747. q, err = manager.SWireResourceBaseManager.QueryDistinctExtraField(q, field)
  2748. if err == nil {
  2749. return q, nil
  2750. }
  2751. return q, httperrors.ErrNotFound
  2752. }
  2753. func (manager *SNetworkManager) InitializeData() error {
  2754. // set network status
  2755. networks := make([]SNetwork, 0)
  2756. q := manager.Query()
  2757. err := db.FetchModelObjects(manager, q, &networks)
  2758. if err != nil {
  2759. return err
  2760. }
  2761. for _, n := range networks {
  2762. if n.ExternalId != "" {
  2763. var statusNew string
  2764. if n.WireId != "" && n.Status == api.NETWORK_STATUS_INIT {
  2765. statusNew = api.NETWORK_STATUS_AVAILABLE
  2766. }
  2767. db.Update(&n, func() error {
  2768. if statusNew != "" {
  2769. n.Status = statusNew
  2770. }
  2771. return nil
  2772. })
  2773. } else {
  2774. var ifnameHintNew string
  2775. if n.IfnameHint == "" {
  2776. ifnameHintNew = n.Name
  2777. }
  2778. db.Update(&n, func() error {
  2779. if ifnameHintNew != "" {
  2780. n.IfnameHint = ifnameHintNew
  2781. }
  2782. return nil
  2783. })
  2784. }
  2785. if n.IsAutoAlloc.IsNone() {
  2786. db.Update(&n, func() error {
  2787. if n.IsPublic && n.ServerType == api.NETWORK_TYPE_GUEST {
  2788. n.IsAutoAlloc = tristate.True
  2789. } else {
  2790. n.IsAutoAlloc = tristate.False
  2791. }
  2792. return nil
  2793. })
  2794. }
  2795. }
  2796. return nil
  2797. }
  2798. func (snet *SNetwork) ValidateUpdateCondition(ctx context.Context) error {
  2799. /*if len(snet.ExternalId) > 0 {
  2800. return httperrors.NewConflictError("Cannot update external resource")
  2801. }*/
  2802. return snet.SSharableVirtualResourceBase.ValidateUpdateCondition(ctx)
  2803. }
  2804. func (net *SNetwork) PostUpdate(ctx context.Context, userCred mcclient.TokenCredential, query, data jsonutils.JSONObject) {
  2805. net.SSharableVirtualResourceBase.PostUpdate(ctx, userCred, query, data)
  2806. // reserve guest gateway IP
  2807. {
  2808. input := api.NetworkUpdateInput{}
  2809. err := data.Unmarshal(&input)
  2810. if err != nil {
  2811. log.Errorf("Unmarshal NetworkUpdateInput fail %s", err)
  2812. } else if input.GuestGateway != nil && len(*input.GuestGateway) > 0 {
  2813. err := net.reserveGuestGateway(ctx, userCred)
  2814. if err != nil {
  2815. log.Errorf("reserveGuestGateway fail %s", err)
  2816. }
  2817. }
  2818. }
  2819. net.ClearSchedDescCache()
  2820. if net.IsClassic() {
  2821. err := net.syncAdditionalWires(ctx, nil)
  2822. if err != nil {
  2823. log.Errorf("syncAdditionalWires error %s", err)
  2824. }
  2825. }
  2826. }
  2827. // 清除IP子网数据
  2828. // 要求IP子网内没有被分配IP,若清除接入云,要求接入云账号处于禁用状态
  2829. func (snet *SNetwork) PerformPurge(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.NetworkPurgeInput) (jsonutils.JSONObject, error) {
  2830. err := snet.ValidateDeleteCondition(ctx, nil)
  2831. if err != nil {
  2832. return nil, err
  2833. }
  2834. wire, _ := snet.GetWire()
  2835. if wire != nil && len(wire.ExternalId) > 0 {
  2836. provider := wire.GetCloudprovider()
  2837. if provider != nil && provider.GetEnabled() {
  2838. return nil, httperrors.NewInvalidStatusError("Cannot purge network on enabled cloud provider")
  2839. }
  2840. }
  2841. err = snet.RealDelete(ctx, userCred)
  2842. return nil, err
  2843. }
  2844. func (manager *SNetworkManager) handleNetworkIdChange(ctx context.Context, args *networkIdChangeArgs) error {
  2845. var handlers = []networkIdChangeHandler{
  2846. GuestnetworkManager,
  2847. HostnetworkManager,
  2848. ReservedipManager,
  2849. GroupnetworkManager,
  2850. LoadbalancernetworkManager,
  2851. LoadbalancerManager,
  2852. }
  2853. errs := []error{}
  2854. for _, h := range handlers {
  2855. if err := h.handleNetworkIdChange(ctx, args); err != nil {
  2856. errs = append(errs, err)
  2857. }
  2858. }
  2859. if len(errs) > 0 {
  2860. err := errors.NewAggregate(errs)
  2861. return httperrors.NewGeneralError(err)
  2862. }
  2863. return nil
  2864. }
  2865. // 合并IP子网
  2866. // 将两个相连的IP子网合并成一个IP子网
  2867. func (snet *SNetwork) PerformMerge(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.NetworkMergeInput) (jsonutils.JSONObject, error) {
  2868. if len(input.Target) == 0 {
  2869. return nil, httperrors.NewMissingParameterError("target")
  2870. }
  2871. iNet, err := NetworkManager.FetchByIdOrName(ctx, userCred, input.Target)
  2872. if err == sql.ErrNoRows {
  2873. err = httperrors.NewNotFoundError("Network %s not found", input.Target)
  2874. logclient.AddActionLogWithContext(ctx, snet, logclient.ACT_MERGE, err.Error(), userCred, false)
  2875. return nil, err
  2876. } else if err != nil {
  2877. logclient.AddActionLogWithContext(ctx, snet, logclient.ACT_MERGE, err.Error(), userCred, false)
  2878. return nil, err
  2879. }
  2880. net := iNet.(*SNetwork)
  2881. if net == nil {
  2882. err = fmt.Errorf("Network is nil")
  2883. logclient.AddActionLogWithContext(ctx, snet, logclient.ACT_MERGE, err.Error(), userCred, false)
  2884. return nil, err
  2885. }
  2886. startIp, endIp, err := snet.CheckInvalidToMerge(ctx, net, nil)
  2887. if err != nil {
  2888. logclient.AddActionLogWithContext(ctx, snet, logclient.ACT_MERGE, err.Error(), userCred, false)
  2889. return nil, err
  2890. }
  2891. return nil, snet.MergeToNetworkAfterCheck(ctx, userCred, net, startIp, endIp)
  2892. }
  2893. func (snet *SNetwork) MergeToNetworkAfterCheck(ctx context.Context, userCred mcclient.TokenCredential, net *SNetwork, startIp string, endIp string) error {
  2894. lockman.LockClass(ctx, NetworkManager, db.GetLockClassKey(NetworkManager, userCred))
  2895. defer lockman.ReleaseClass(ctx, NetworkManager, db.GetLockClassKey(NetworkManager, userCred))
  2896. _, err := db.Update(net, func() error {
  2897. net.GuestIpStart = startIp
  2898. net.GuestIpEnd = endIp
  2899. return nil
  2900. })
  2901. if err != nil {
  2902. logclient.AddActionLogWithContext(ctx, snet, logclient.ACT_MERGE, err.Error(), userCred, false)
  2903. return err
  2904. }
  2905. if err := NetworkManager.handleNetworkIdChange(ctx, &networkIdChangeArgs{
  2906. action: logclient.ACT_MERGE,
  2907. oldNet: snet,
  2908. newNet: net,
  2909. userCred: userCred,
  2910. }); err != nil {
  2911. return err
  2912. }
  2913. note := map[string]string{"start_ip": startIp, "end_ip": endIp}
  2914. db.OpsLog.LogEvent(snet, db.ACT_MERGE, note, userCred)
  2915. logclient.AddActionLogWithContext(ctx, snet, logclient.ACT_MERGE, note, userCred, true)
  2916. if err = snet.RealDelete(ctx, userCred); err != nil {
  2917. return err
  2918. }
  2919. note = map[string]string{"network": snet.Id}
  2920. db.OpsLog.LogEvent(snet, db.ACT_DELETE, note, userCred)
  2921. logclient.AddActionLogWithContext(ctx, snet, logclient.ACT_DELOCATE, note, userCred, true)
  2922. return nil
  2923. }
  2924. func (snet *SNetwork) CheckInvalidToMerge(ctx context.Context, net *SNetwork, allNets []*SNetwork) (string, string, error) {
  2925. failReason := make([]string, 0)
  2926. if snet.WireId != net.WireId {
  2927. failReason = append(failReason, "wire_id")
  2928. }
  2929. if snet.GuestGateway != net.GuestGateway {
  2930. failReason = append(failReason, "guest_gateway")
  2931. }
  2932. if snet.VlanId != net.VlanId {
  2933. failReason = append(failReason, "vlan_id")
  2934. }
  2935. // Qiujian: allow merge networks of different server_type
  2936. /*if snet.ServerType != net.ServerType {
  2937. failReason = append(failReason, "server_type")
  2938. }*/
  2939. if len(failReason) > 0 {
  2940. err := httperrors.NewInputParameterError("Invalid Target Network %s: inconsist %s", net.GetId(), strings.Join(failReason, ","))
  2941. return "", "", err
  2942. }
  2943. var startIp, endIp string
  2944. ipNE, _ := netutils.NewIPV4Addr(net.GuestIpEnd)
  2945. ipNS, _ := netutils.NewIPV4Addr(net.GuestIpStart)
  2946. ipSS, _ := netutils.NewIPV4Addr(snet.GuestIpStart)
  2947. ipSE, _ := netutils.NewIPV4Addr(snet.GuestIpEnd)
  2948. var wireNets []SNetwork
  2949. if allNets == nil {
  2950. wireSubq := WireManager.Query("vpc_id").Equals("id", snet.WireId).SubQuery()
  2951. wiresQ := WireManager.Query("id")
  2952. wiresSubQ := wiresQ.Join(wireSubq, sqlchemy.Equals(wiresQ.Field("vpc_id"), wireSubq.Field("vpc_id"))).SubQuery()
  2953. q := NetworkManager.Query().In("wire_id", wiresSubQ).NotEquals("id", snet.Id).NotEquals("id", net.Id)
  2954. err := db.FetchModelObjects(NetworkManager, q, &wireNets)
  2955. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  2956. return "", "", errors.Wrap(err, "Query nets of same wire")
  2957. }
  2958. } else {
  2959. wireNets = make([]SNetwork, len(allNets))
  2960. for i := range wireNets {
  2961. wireNets[i] = *allNets[i]
  2962. }
  2963. }
  2964. if ipNE.StepUp() == ipSS || (ipNE.StepUp() < ipSS && !isOverlapNetworksAddr(wireNets, ipNE.StepUp(), ipSS.StepDown())) {
  2965. startIp, endIp = net.GuestIpStart, snet.GuestIpEnd
  2966. } else if ipSE.StepUp() == ipNS || (ipSE.StepUp() < ipNS && !isOverlapNetworksAddr(wireNets, ipSE.StepUp(), ipNS.StepDown())) {
  2967. startIp, endIp = snet.GuestIpStart, net.GuestIpEnd
  2968. } else {
  2969. note := "Incontinuity Network for %s and %s"
  2970. return "", "", httperrors.NewBadRequestError(note, snet.Name, net.Name)
  2971. }
  2972. return startIp, endIp, nil
  2973. }
  2974. // 分割IP子网
  2975. // 将一个IP子网分割成两个子网,仅本地IDC支持此操作
  2976. func (snet *SNetwork) PerformSplit(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.NetworkSplitInput) (jsonutils.JSONObject, error) {
  2977. if len(snet.ExternalId) > 0 {
  2978. return nil, httperrors.NewNotSupportedError("only on premise support this operation")
  2979. }
  2980. if !snet.IsClassic() {
  2981. return nil, httperrors.NewNotSupportedError("only on premise classic network support this operation")
  2982. }
  2983. if snet.IsSupportIPv6() {
  2984. return nil, httperrors.NewNotSupportedError("only on premise pure-ipv4 classic network support this operation")
  2985. }
  2986. if len(input.SplitIp) == 0 {
  2987. return nil, httperrors.NewMissingParameterError("split_ip")
  2988. }
  2989. if !regutils.MatchIPAddr(input.SplitIp) {
  2990. return nil, httperrors.NewInputParameterError("Invalid IP %s", input.SplitIp)
  2991. }
  2992. if input.SplitIp == snet.GuestIpStart {
  2993. return nil, httperrors.NewInputParameterError("Split IP %s is the start ip", input.SplitIp)
  2994. }
  2995. iSplitIp, err := netutils.NewIPV4Addr(input.SplitIp)
  2996. if err != nil {
  2997. return nil, err
  2998. }
  2999. if !snet.IsAddressInRange(iSplitIp) {
  3000. return nil, httperrors.NewInputParameterError("Split IP %s out of range", input.SplitIp)
  3001. }
  3002. network := &SNetwork{}
  3003. network.GuestIpStart = input.SplitIp
  3004. network.GuestIpEnd = snet.GuestIpEnd
  3005. network.GuestIpMask = snet.GuestIpMask
  3006. network.GuestGateway = snet.GuestGateway
  3007. network.GuestDns = snet.GuestDns
  3008. network.GuestDhcp = snet.GuestDhcp
  3009. network.GuestNtp = snet.GuestNtp
  3010. network.GuestDomain = snet.GuestDomain
  3011. network.VlanId = snet.VlanId
  3012. network.WireId = snet.WireId
  3013. network.ServerType = snet.ServerType
  3014. network.IsPublic = snet.IsPublic
  3015. network.Status = snet.Status
  3016. network.ProjectId = snet.ProjectId
  3017. network.DomainId = snet.DomainId
  3018. // network.UserId = snet.UserId
  3019. network.IsSystem = snet.IsSystem
  3020. network.Description = snet.Description
  3021. network.IsAutoAlloc = snet.IsAutoAlloc
  3022. err = func() error {
  3023. lockman.LockRawObject(ctx, NetworkManager.Keyword(), "name")
  3024. defer lockman.ReleaseRawObject(ctx, NetworkManager.Keyword(), "name")
  3025. if len(input.Name) > 0 {
  3026. if err := db.NewNameValidator(ctx, NetworkManager, userCred, input.Name, nil); err != nil {
  3027. return httperrors.NewInputParameterError("Duplicate name %s", input.Name)
  3028. }
  3029. } else {
  3030. input.Name, err = db.GenerateName(ctx, NetworkManager, userCred, fmt.Sprintf("%s#", snet.Name))
  3031. if err != nil {
  3032. return httperrors.NewInternalServerError("GenerateName fail %s", err)
  3033. }
  3034. }
  3035. network.Name = input.Name
  3036. network.IfnameHint, err = NetworkManager.newIfnameHint(input.Name)
  3037. if err != nil {
  3038. return httperrors.NewBadRequestError("Generate ifname hint failed %s", err)
  3039. }
  3040. return NetworkManager.TableSpec().Insert(ctx, network)
  3041. }()
  3042. if err != nil {
  3043. return nil, err
  3044. }
  3045. network.SetModelManager(NetworkManager, network)
  3046. db.Update(snet, func() error {
  3047. snet.GuestIpEnd = iSplitIp.StepDown().String()
  3048. return nil
  3049. })
  3050. if err := NetworkManager.handleNetworkIdChange(ctx, &networkIdChangeArgs{
  3051. action: logclient.ACT_SPLIT,
  3052. oldNet: snet,
  3053. newNet: network,
  3054. userCred: userCred,
  3055. }); err != nil {
  3056. return nil, err
  3057. }
  3058. note := map[string]string{"split_ip": input.SplitIp, "end_ip": network.GuestIpEnd}
  3059. db.OpsLog.LogEvent(snet, db.ACT_SPLIT, note, userCred)
  3060. logclient.AddActionLogWithContext(ctx, snet, logclient.ACT_SPLIT, note, userCred, true)
  3061. db.OpsLog.LogEvent(network, db.ACT_CREATE, map[string]string{"network": snet.Id}, userCred)
  3062. return nil, nil
  3063. }
  3064. func (manager *SNetworkManager) PerformTryCreateNetwork(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.NetworkTryCreateNetworkInput) (jsonutils.JSONObject, error) {
  3065. if len(input.Ip) == 0 {
  3066. return nil, httperrors.NewMissingParameterError("ip")
  3067. }
  3068. var ipV4, ipV4NetAddr netutils.IPV4Addr
  3069. var ipV6, ipV6NetAddr netutils.IPV6Addr
  3070. var err error
  3071. if input.Mask == 0 {
  3072. return nil, httperrors.NewMissingParameterError("mask")
  3073. }
  3074. if regutils.MatchIP4Addr(input.Ip) {
  3075. ipV4, err = netutils.NewIPV4Addr(input.Ip)
  3076. if err != nil {
  3077. return nil, errors.Wrapf(err, "invalid ipv4 address %s", input.Ip)
  3078. }
  3079. if ipV4.IsZero() {
  3080. return nil, errors.Wrapf(errors.ErrInvalidFormat, "invalid ipv4 address %s", input.Ip)
  3081. }
  3082. ipV4NetAddr = ipV4.NetAddr(int8(input.Mask))
  3083. } else if regutils.MatchIP6Addr(input.Ip) {
  3084. ipV6, err = netutils.NewIPV6Addr(input.Ip)
  3085. if err != nil {
  3086. return nil, errors.Wrapf(err, "invalid ipv6 address %s", input.Ip)
  3087. }
  3088. if ipV6.IsZero() {
  3089. return nil, errors.Wrapf(errors.ErrInvalidFormat, "invalid ipv6 address %s", input.Ip)
  3090. }
  3091. ipV6NetAddr = ipV6.NetAddr(uint8(input.Mask))
  3092. } else {
  3093. return nil, errors.Wrapf(errors.ErrInvalidFormat, "invalid ip address %s", input.Ip)
  3094. }
  3095. if len(input.ServerType) == 0 {
  3096. return nil, httperrors.NewMissingParameterError("server_type")
  3097. }
  3098. if input.ServerType != api.NETWORK_TYPE_BAREMETAL {
  3099. return nil, httperrors.NewBadRequestError("Only support server type %s", api.NETWORK_TYPE_BAREMETAL)
  3100. }
  3101. if !input.IsOnPremise {
  3102. return nil, httperrors.NewBadRequestError("Only support on premise network")
  3103. }
  3104. var (
  3105. nm *SNetwork
  3106. matched bool
  3107. )
  3108. q := NetworkManager.Query().Equals("server_type", input.ServerType)
  3109. if !ipV4.IsZero() {
  3110. q = q.Equals("guest_ip_mask", input.Mask)
  3111. } else if !ipV6.IsZero() {
  3112. q = q.Equals("guest_ip6_mask", input.Mask)
  3113. }
  3114. listQuery := api.NetworkListInput{}
  3115. err = query.Unmarshal(&listQuery)
  3116. if err != nil {
  3117. return nil, errors.Wrap(err, "query.Unmarshal")
  3118. }
  3119. q, err = managedResourceFilterByAccount(ctx, q, listQuery.ManagedResourceListInput, "wire_id", func() *sqlchemy.SQuery {
  3120. wires := WireManager.Query().SubQuery()
  3121. vpcs := VpcManager.Query().SubQuery()
  3122. subq := wires.Query(wires.Field("id"))
  3123. subq = subq.Join(vpcs, sqlchemy.Equals(vpcs.Field("id"), wires.Field("vpc_id")))
  3124. return subq
  3125. })
  3126. if err != nil {
  3127. return nil, errors.Wrap(err, "managedResourceFilterByAccount")
  3128. }
  3129. rows, err := q.Rows()
  3130. if err != nil {
  3131. return nil, err
  3132. }
  3133. defer rows.Close()
  3134. for rows.Next() {
  3135. item, err := db.NewModelObject(NetworkManager)
  3136. if err != nil {
  3137. return nil, err
  3138. }
  3139. err = q.Row2Struct(rows, item)
  3140. if err != nil {
  3141. return nil, err
  3142. }
  3143. n := item.(*SNetwork)
  3144. if !ipV4.IsZero() {
  3145. if n.getIPRange().Contains(ipV4) {
  3146. nm = n
  3147. matched = true
  3148. break
  3149. } else if nIpV4, _ := netutils.NewIPV4Addr(n.GuestIpStart); nIpV4.NetAddr(n.GuestIpMask) == ipV4NetAddr {
  3150. nm = n
  3151. matched = false
  3152. break
  3153. }
  3154. } else if !ipV6.IsZero() {
  3155. if n.getIPRange6().Contains(ipV6) {
  3156. nm = n
  3157. matched = true
  3158. break
  3159. } else if nIpV6, _ := netutils.NewIPV6Addr(n.GuestIp6Start); nIpV6.NetAddr(n.GuestIp6Mask) == ipV6NetAddr {
  3160. nm = n
  3161. matched = false
  3162. break
  3163. }
  3164. }
  3165. }
  3166. ret := jsonutils.NewDict()
  3167. if nm == nil {
  3168. ret.Set("find_matched", jsonutils.JSONFalse)
  3169. return ret, nil
  3170. }
  3171. ret.Set("find_matched", jsonutils.JSONTrue)
  3172. ret.Set("wire_id", jsonutils.NewString(nm.WireId))
  3173. if !matched {
  3174. log.Infof("Find same subnet network %s %s/%d %s/%d", nm.Name, nm.GuestGateway, nm.GuestIpMask, nm.GuestGateway6, nm.GuestIp6Mask)
  3175. newNetwork := new(SNetwork)
  3176. newNetwork.SetModelManager(NetworkManager, newNetwork)
  3177. if !ipV4.IsZero() {
  3178. newNetwork.GuestIpStart = ipV4.String()
  3179. newNetwork.GuestIpEnd = ipV4.String()
  3180. newNetwork.GuestGateway = nm.GuestGateway
  3181. newNetwork.GuestIpMask = int8(input.Mask)
  3182. } else if !ipV6.IsZero() {
  3183. newNetwork.GuestIp6Start = ipV6.String()
  3184. newNetwork.GuestIp6End = ipV6.String()
  3185. newNetwork.GuestGateway6 = nm.GuestGateway6
  3186. newNetwork.GuestIp6Mask = uint8(input.Mask)
  3187. }
  3188. newNetwork.GuestDns = nm.GuestDns
  3189. newNetwork.GuestDhcp = nm.GuestDhcp
  3190. newNetwork.GuestNtp = nm.GuestNtp
  3191. newNetwork.WireId = nm.WireId
  3192. newNetwork.ServerType = input.ServerType
  3193. newNetwork.IsPublic = nm.IsPublic
  3194. newNetwork.ProjectId = userCred.GetProjectId()
  3195. newNetwork.DomainId = userCred.GetProjectDomainId()
  3196. err = func() error {
  3197. lockman.LockRawObject(ctx, NetworkManager.Keyword(), "name")
  3198. defer lockman.ReleaseRawObject(ctx, NetworkManager.Keyword(), "name")
  3199. newNetwork.Name, err = db.GenerateName(ctx, NetworkManager, userCred, fmt.Sprintf("%s#", nm.Name))
  3200. if err != nil {
  3201. return httperrors.NewInternalServerError("GenerateName fail %s", err)
  3202. }
  3203. return NetworkManager.TableSpec().Insert(ctx, newNetwork)
  3204. }()
  3205. if err != nil {
  3206. return nil, err
  3207. }
  3208. err = newNetwork.CustomizeCreate(ctx, userCred, userCred, query, input.JSON(input))
  3209. if err != nil {
  3210. return nil, err
  3211. }
  3212. newNetwork.PostCreate(ctx, userCred, userCred, query, input.JSON(input))
  3213. // inherit wire's class metadata
  3214. wire, err := newNetwork.GetWire()
  3215. if err != nil {
  3216. return nil, errors.Wrap(err, "unable to get wire")
  3217. }
  3218. err = db.InheritFromTo(ctx, userCred, wire, newNetwork)
  3219. if err != nil {
  3220. return nil, errors.Wrap(err, "unable to inherit wire")
  3221. }
  3222. }
  3223. return ret, nil
  3224. }
  3225. func (network *SNetwork) getAllocTimoutDuration() time.Duration {
  3226. tos := network.AllocTimoutSeconds
  3227. if tos < options.Options.MinimalIpAddrReusedIntervalSeconds {
  3228. tos = options.Options.MinimalIpAddrReusedIntervalSeconds
  3229. }
  3230. return time.Duration(tos) * time.Second
  3231. }
  3232. func (network *SNetwork) GetSchedtags() []SSchedtag {
  3233. return GetSchedtags(NetworkschedtagManager, network.Id)
  3234. }
  3235. func (network *SNetwork) GetDynamicConditionInput() *jsonutils.JSONDict {
  3236. return jsonutils.Marshal(network).(*jsonutils.JSONDict)
  3237. }
  3238. func (network *SNetwork) PerformSetSchedtag(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) (jsonutils.JSONObject, error) {
  3239. return PerformSetResourceSchedtag(network, ctx, userCred, query, data)
  3240. }
  3241. func (network *SNetwork) GetSchedtagJointManager() ISchedtagJointManager {
  3242. return NetworkschedtagManager
  3243. }
  3244. func (network *SNetwork) ClearSchedDescCache() error {
  3245. wire, _ := network.GetWire()
  3246. if wire == nil {
  3247. return nil
  3248. }
  3249. return wire.clearHostSchedDescCache()
  3250. }
  3251. func (network *SNetwork) PerformChangeOwner(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input apis.PerformChangeProjectOwnerInput) (jsonutils.JSONObject, error) {
  3252. wire, err := network.GetWire()
  3253. if err != nil {
  3254. return nil, errors.Wrap(err, "unable to get wire")
  3255. }
  3256. project, err := db.TenantCacheManager.FetchTenantById(ctx, input.ProjectId)
  3257. if err != nil {
  3258. return nil, errors.Wrapf(err, "unable to get project %s", input.ProjectId)
  3259. }
  3260. ok, err := db.IsInSameClass(ctx, wire, project)
  3261. if err != nil {
  3262. return nil, errors.Wrap(err, "unable to check if the wire and project is in same class")
  3263. }
  3264. if !ok {
  3265. return nil, httperrors.NewForbiddenError("the wire %s and the project %s has different class metadata", wire.GetName(), project.GetName())
  3266. }
  3267. ret, err := network.SSharableVirtualResourceBase.PerformChangeOwner(ctx, userCred, query, input)
  3268. if err != nil {
  3269. return nil, err
  3270. }
  3271. network.ClearSchedDescCache()
  3272. return ret, nil
  3273. }
  3274. func (network *SNetwork) getUsedAddressQuery(ctx context.Context, userCred mcclient.TokenCredential, owner mcclient.IIdentityProvider, scope rbacscope.TRbacScope, addrOnly bool) *sqlchemy.SQuery {
  3275. usedAddressQueryProviders := getUsedAddressQueryProviders()
  3276. var (
  3277. args = &usedAddressQueryArgs{
  3278. network: network,
  3279. userCred: userCred,
  3280. owner: owner,
  3281. scope: scope,
  3282. addrOnly: addrOnly,
  3283. addrType: api.AddressTypeIPv4,
  3284. }
  3285. queries = make([]sqlchemy.IQuery, 0, len(usedAddressQueryProviders))
  3286. )
  3287. for _, provider := range usedAddressQueryProviders {
  3288. q := provider.usedAddressQuery(ctx, args)
  3289. queries = append(queries, q)
  3290. }
  3291. return sqlchemy.Union(queries...).Query()
  3292. }
  3293. func (network *SNetwork) getUsedAddressQuery6(ctx context.Context, userCred mcclient.TokenCredential, owner mcclient.IIdentityProvider, scope rbacscope.TRbacScope, addrOnly bool) *sqlchemy.SQuery {
  3294. usedAddress6QueryProviders := getUsedAddress6QueryProviders()
  3295. var (
  3296. args = &usedAddressQueryArgs{
  3297. network: network,
  3298. userCred: userCred,
  3299. owner: owner,
  3300. scope: scope,
  3301. addrOnly: addrOnly,
  3302. addrType: api.AddressTypeIPv6,
  3303. }
  3304. queries = make([]sqlchemy.IQuery, 0, len(usedAddress6QueryProviders))
  3305. )
  3306. for _, provider := range usedAddress6QueryProviders {
  3307. q := provider.usedAddressQuery(ctx, args)
  3308. queries = append(queries, q)
  3309. }
  3310. return sqlchemy.Union(queries...).Query()
  3311. }
  3312. func (snet *SNetwork) Contains(ip string) bool {
  3313. start, _ := netutils.NewIPV4Addr(snet.GuestIpStart)
  3314. end, _ := netutils.NewIPV4Addr(snet.GuestIpEnd)
  3315. addr, _ := netutils.NewIPV4Addr(ip)
  3316. return netutils.NewIPV4AddrRange(start, end).Contains(addr)
  3317. }
  3318. type SNetworkUsedAddressList []api.SNetworkUsedAddress
  3319. func (a SNetworkUsedAddressList) Len() int { return len(a) }
  3320. func (a SNetworkUsedAddressList) Swap(i, j int) { a[i], a[j] = a[j], a[i] }
  3321. func (a SNetworkUsedAddressList) Less(i, j int) bool {
  3322. ipI, _ := netutils.NewIPV4Addr(a[i].IpAddr)
  3323. ipJ, _ := netutils.NewIPV4Addr(a[j].IpAddr)
  3324. return ipI < ipJ
  3325. }
  3326. type SNetworkUsedAddress6List []api.SNetworkUsedAddress
  3327. func (a SNetworkUsedAddress6List) Len() int { return len(a) }
  3328. func (a SNetworkUsedAddress6List) Swap(i, j int) { a[i], a[j] = a[j], a[i] }
  3329. func (a SNetworkUsedAddress6List) Less(i, j int) bool {
  3330. ipI, _ := netutils.NewIPV6Addr(a[i].Ip6Addr)
  3331. ipJ, _ := netutils.NewIPV6Addr(a[j].Ip6Addr)
  3332. return ipI.Lt(ipJ)
  3333. }
  3334. func (network *SNetwork) GetDetailsAddresses(
  3335. ctx context.Context,
  3336. userCred mcclient.TokenCredential,
  3337. input api.GetNetworkAddressesInput,
  3338. ) (api.GetNetworkAddressesOutput, error) {
  3339. output := api.GetNetworkAddressesOutput{}
  3340. allowScope, _ := policy.PolicyManager.AllowScope(userCred, api.SERVICE_TYPE, network.KeywordPlural(), policy.PolicyActionGet, "addresses")
  3341. scope := rbacscope.String2ScopeDefault(input.Scope, allowScope)
  3342. if scope.HigherThan(allowScope) {
  3343. return output, errors.Wrapf(httperrors.ErrNotSufficientPrivilege, "require %s allow %s", scope, allowScope)
  3344. }
  3345. output, err := network.fetchAddressDetails(ctx, userCred, userCred, scope)
  3346. if err != nil {
  3347. return output, errors.Wrap(err, "fetchAddressDetails")
  3348. }
  3349. return output, nil
  3350. }
  3351. func (network *SNetwork) GetUsedAddressDetails(ctx context.Context, addr string) (*api.SNetworkUsedAddress, error) {
  3352. address, err := network.GetAddressDetails(ctx, nil, nil, rbacscope.ScopeSystem)
  3353. if err != nil {
  3354. return nil, errors.Wrapf(err, "GetAddressDetails")
  3355. }
  3356. for i := range address {
  3357. if address[i].IpAddr == addr || address[i].Ip6Addr == addr {
  3358. return &address[i], nil
  3359. }
  3360. }
  3361. return nil, errors.Wrapf(errors.ErrNotFound, "%s", addr)
  3362. }
  3363. func (network *SNetwork) GetAddressDetails(ctx context.Context, userCred mcclient.TokenCredential, owner mcclient.IIdentityProvider, scope rbacscope.TRbacScope) ([]api.SNetworkUsedAddress, error) {
  3364. netAddrs := make([]api.SNetworkUsedAddress, 0)
  3365. q := network.getUsedAddressQuery(ctx, userCred, owner, scope, false)
  3366. err := q.All(&netAddrs)
  3367. if err != nil {
  3368. return nil, httperrors.NewGeneralError(err)
  3369. }
  3370. sort.Sort(SNetworkUsedAddressList(netAddrs))
  3371. return netAddrs, nil
  3372. }
  3373. func (network *SNetwork) fetchAddressDetails(ctx context.Context, userCred mcclient.TokenCredential, owner mcclient.IIdentityProvider, scope rbacscope.TRbacScope) (api.GetNetworkAddressesOutput, error) {
  3374. output := api.GetNetworkAddressesOutput{}
  3375. {
  3376. var err error
  3377. output.Addresses, err = network.GetAddressDetails(ctx, userCred, owner, scope)
  3378. if err != nil {
  3379. return output, err
  3380. }
  3381. }
  3382. {
  3383. netAddrs6 := make([]api.SNetworkUsedAddress, 0)
  3384. q := network.getUsedAddressQuery6(ctx, userCred, owner, scope, false)
  3385. err := q.All(&netAddrs6)
  3386. if err != nil {
  3387. return output, httperrors.NewGeneralError(err)
  3388. }
  3389. sort.Sort(SNetworkUsedAddress6List(netAddrs6))
  3390. output.Addresses6 = netAddrs6
  3391. }
  3392. return output, nil
  3393. }
  3394. func (network *SNetwork) GetDetailsAvailableAddresses(
  3395. ctx context.Context,
  3396. userCred mcclient.TokenCredential,
  3397. input api.GetNetworkAvailableAddressesInput,
  3398. ) (api.GetNetworkAvailableAddressesOutput, error) {
  3399. const maxCount = 1024
  3400. var availables []string
  3401. var availables6 []string
  3402. {
  3403. addrTable := network.GetUsedAddresses(ctx)
  3404. recentUsedAddrTable := GuestnetworkManager.getRecentlyReleasedIPAddresses(network.Id, network.getAllocTimoutDuration())
  3405. addrRange := network.getIPRange()
  3406. for addr := addrRange.StartIp(); addr <= addrRange.EndIp() && len(availables) < maxCount; addr = addr.StepUp() {
  3407. addrStr := addr.String()
  3408. if _, ok := addrTable[addrStr]; !ok {
  3409. if _, ok := recentUsedAddrTable[addrStr]; !ok {
  3410. availables = append(availables, addrStr)
  3411. }
  3412. }
  3413. }
  3414. }
  3415. if network.IsSupportIPv6() {
  3416. addrTable6 := network.GetUsedAddresses6(ctx)
  3417. recentUsedAddrTable6 := GuestnetworkManager.getRecentlyReleasedIPAddresses6(network.Id, network.getAllocTimoutDuration())
  3418. addrRange6 := network.getIPRange6()
  3419. for addr6 := addrRange6.StartIp(); addr6.Le(addrRange6.EndIp()) && len(availables6) < maxCount; addr6 = addr6.StepUp() {
  3420. addrStr6 := addr6.String()
  3421. if _, ok := addrTable6[addrStr6]; !ok {
  3422. if _, ok := recentUsedAddrTable6[addrStr6]; !ok {
  3423. availables6 = append(availables6, addrStr6)
  3424. }
  3425. }
  3426. }
  3427. }
  3428. return api.GetNetworkAvailableAddressesOutput{
  3429. Addresses: availables,
  3430. Addresses6: availables6,
  3431. }, nil
  3432. }
  3433. // 同步接入云IP子网状态
  3434. // 本地IDC不支持此操作
  3435. func (net *SNetwork) PerformSyncstatus(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.NetworkSyncInput) (jsonutils.JSONObject, error) {
  3436. return net.PerformSync(ctx, userCred, query, input)
  3437. }
  3438. // 同步接入云IP子网状态
  3439. // 本地IDC不支持此操作
  3440. func (net *SNetwork) PerformSync(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.NetworkSyncInput) (jsonutils.JSONObject, error) {
  3441. vpc, _ := net.GetVpc()
  3442. if vpc != nil && vpc.IsManaged() {
  3443. return nil, net.StartSyncstatusTask(ctx, userCred, "")
  3444. }
  3445. return nil, httperrors.NewUnsupportOperationError("on-premise network cannot sync status")
  3446. }
  3447. func (net *SNetwork) StartSyncstatusTask(ctx context.Context, userCred mcclient.TokenCredential, parentTaskId string) error {
  3448. return StartResourceSyncStatusTask(ctx, userCred, net, "NetworkSyncstatusTask", parentTaskId)
  3449. }
  3450. // 更改IP子网状态
  3451. func (net *SNetwork) PerformStatus(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input apis.PerformStatusInput) (jsonutils.JSONObject, error) {
  3452. if len(input.Status) == 0 {
  3453. return nil, httperrors.NewMissingParameterError("status")
  3454. }
  3455. vpc, _ := net.GetVpc()
  3456. if vpc != nil && vpc.IsManaged() {
  3457. return nil, httperrors.NewUnsupportOperationError("managed network cannot change status")
  3458. }
  3459. if !utils.IsInStringArray(input.Status, []string{api.NETWORK_STATUS_AVAILABLE, api.NETWORK_STATUS_UNAVAILABLE}) {
  3460. return nil, httperrors.NewInputParameterError("invalid status %s", input.Status)
  3461. }
  3462. return net.SSharableVirtualResourceBase.PerformStatus(ctx, userCred, query, input)
  3463. }
  3464. func (net *SNetwork) GetChangeOwnerCandidateDomainIds() []string {
  3465. candidates := [][]string{}
  3466. wire, _ := net.GetWire()
  3467. if wire != nil {
  3468. vpc, _ := wire.GetVpc()
  3469. if vpc != nil {
  3470. candidates = append(candidates, vpc.GetChangeOwnerCandidateDomainIds())
  3471. }
  3472. candidates = append(candidates, db.ISharableChangeOwnerCandidateDomainIds(wire))
  3473. }
  3474. return db.ISharableMergeChangeOwnerCandidateDomainIds(net, candidates...)
  3475. }
  3476. func (manager *SNetworkManager) ListItemExportKeys(ctx context.Context,
  3477. q *sqlchemy.SQuery,
  3478. userCred mcclient.TokenCredential,
  3479. keys stringutils2.SSortedStrings,
  3480. ) (*sqlchemy.SQuery, error) {
  3481. var err error
  3482. q, err = manager.SSharableVirtualResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  3483. if err != nil {
  3484. return nil, errors.Wrap(err, "SSharableVirtualResourceBaseManager.ListItemExportKeys")
  3485. }
  3486. if keys.ContainsAny(manager.SWireResourceBaseManager.GetExportKeys()...) {
  3487. q, err = manager.SWireResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  3488. if err != nil {
  3489. return nil, errors.Wrap(err, "SWireResourceBaseManager.ListItemExportKeys")
  3490. }
  3491. }
  3492. return q, nil
  3493. }
  3494. func (manager *SNetworkManager) AllowScope(userCred mcclient.TokenCredential) rbacscope.TRbacScope {
  3495. scope, _ := policy.PolicyManager.AllowScope(userCred, api.SERVICE_TYPE, NetworkManager.KeywordPlural(), policy.PolicyActionGet)
  3496. return scope
  3497. }
  3498. func (snet *SNetwork) PerformSetBgpType(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.NetworkSetBgpTypeInput) (jsonutils.JSONObject, error) {
  3499. if snet.BgpType == input.BgpType {
  3500. return nil, nil
  3501. }
  3502. if snet.ServerType != api.NETWORK_TYPE_EIP {
  3503. return nil, httperrors.NewInputParameterError("BgpType attribute is only useful for eip network")
  3504. }
  3505. {
  3506. var eips []SElasticip
  3507. q := ElasticipManager.Query().
  3508. Equals("network_id", snet.Id).
  3509. NotEquals("bgp_type", input.BgpType)
  3510. if err := db.FetchModelObjects(ElasticipManager, q, &eips); err != nil {
  3511. return nil, err
  3512. }
  3513. for i := range eips {
  3514. eip := &eips[i]
  3515. if diff, err := db.UpdateWithLock(ctx, eip, func() error {
  3516. eip.BgpType = input.BgpType
  3517. return nil
  3518. }); err != nil {
  3519. // no need to retry/restore here. return error
  3520. // and retry after user resolves the error
  3521. return nil, err
  3522. } else {
  3523. db.OpsLog.LogEvent(eip, db.ACT_UPDATE, diff, userCred)
  3524. }
  3525. }
  3526. }
  3527. if diff, err := db.Update(snet, func() error {
  3528. snet.BgpType = input.BgpType
  3529. return nil
  3530. }); err != nil {
  3531. return nil, err
  3532. } else {
  3533. logclient.AddActionLogWithContext(ctx, snet, logclient.ACT_UPDATE, diff, userCred, true)
  3534. db.OpsLog.LogEvent(snet, db.ACT_UPDATE, diff, userCred)
  3535. }
  3536. return nil, nil
  3537. }
  3538. func (net *SNetwork) IsClassic() bool {
  3539. vpc, _ := net.GetVpc()
  3540. if vpc != nil && vpc.Id == api.DEFAULT_VPC_ID {
  3541. return true
  3542. }
  3543. return false
  3544. }
  3545. func (net *SNetwork) getAttachedHosts() ([]SHost, error) {
  3546. guestsQ := GuestManager.Query()
  3547. gnsQ := GuestnetworkManager.Query().Equals("network_id", net.Id).SubQuery()
  3548. guestsQ = guestsQ.Join(gnsQ, sqlchemy.Equals(guestsQ.Field("id"), gnsQ.Field("guest_id")))
  3549. guestsQ = guestsQ.IsNotEmpty("host_id")
  3550. guestsQ = guestsQ.AppendField(guestsQ.Field("host_id"))
  3551. guestsSubQ := guestsQ.SubQuery()
  3552. // unionQ := sqlchemy.Union(hns, guestsQ).Query().SubQuery()
  3553. q := HostManager.Query()
  3554. q = q.Join(guestsSubQ, sqlchemy.Equals(q.Field("id"), guestsSubQ.Field("host_id")))
  3555. q = q.Distinct()
  3556. hosts := make([]SHost, 0)
  3557. err := db.FetchModelObjects(HostManager, q, &hosts)
  3558. if err != nil {
  3559. return nil, errors.Wrap(err, "FetchModelObjects")
  3560. }
  3561. return hosts, nil
  3562. }
  3563. func (net *SNetwork) PerformSwitchWire(
  3564. ctx context.Context,
  3565. userCred mcclient.TokenCredential,
  3566. query jsonutils.JSONObject,
  3567. input *api.NetworkSwitchWireInput,
  3568. ) (jsonutils.JSONObject, error) {
  3569. if !net.IsClassic() {
  3570. return nil, errors.Wrap(httperrors.ErrNotSupported, "default vpc only")
  3571. }
  3572. wireObj, err := WireManager.FetchByIdOrName(ctx, userCred, input.WireId)
  3573. if err != nil {
  3574. if errors.Cause(err) == sql.ErrNoRows {
  3575. return nil, httperrors.NewResourceNotFoundError2(WireManager.Keyword(), input.WireId)
  3576. } else {
  3577. return nil, errors.Wrapf(err, "WireManager.FetchByIdOrName %s", input.WireId)
  3578. }
  3579. }
  3580. wire := wireObj.(*SWire)
  3581. if net.WireId == wire.Id {
  3582. return nil, nil
  3583. }
  3584. oldWire, _ := net.GetWire()
  3585. if oldWire.VpcId != wire.VpcId {
  3586. return nil, errors.Wrapf(httperrors.ErrConflict, "cannot switch wires of other vpc")
  3587. }
  3588. hosts, err := net.getAttachedHosts()
  3589. if err != nil {
  3590. return nil, errors.Wrap(err, "getAttachedHosts")
  3591. }
  3592. unreachedHost := make([]string, 0)
  3593. for i := range hosts {
  3594. if hosts[i].HostType == api.HOST_TYPE_ESXI {
  3595. continue
  3596. }
  3597. if !hosts[i].IsAttach2Wire(wire.Id) {
  3598. unreachedHost = append(unreachedHost, hosts[i].Name)
  3599. }
  3600. }
  3601. if len(unreachedHost) > 0 {
  3602. return nil, errors.Wrapf(httperrors.ErrConflict, "wire %s not reachable for hosts %s", wire.Name, strings.Join(unreachedHost, ","))
  3603. }
  3604. diff, err := db.Update(net, func() error {
  3605. net.WireId = wire.Id
  3606. return nil
  3607. })
  3608. if err != nil {
  3609. return nil, errors.Wrap(err, "update wire_id")
  3610. }
  3611. {
  3612. err := net.syncAdditionalWires(ctx, nil)
  3613. if err != nil {
  3614. log.Errorf("syncAdditionalWires fail %s", err)
  3615. }
  3616. }
  3617. logclient.AddActionLogWithContext(ctx, net, logclient.ACT_UPDATE, diff, userCred, true)
  3618. db.OpsLog.LogEvent(net, db.ACT_UPDATE, diff, userCred)
  3619. // fix vmware hostnics wire
  3620. hns, err := HostnetworkManager.fetchHostnetworksByNetwork(net.Id)
  3621. if err != nil {
  3622. return nil, errors.Wrap(err, "HostnetworkManager.fetchHostnetworksByNetwork")
  3623. }
  3624. for i := range hns {
  3625. nic, err := hns[i].GetNetInterface()
  3626. if err != nil {
  3627. return nil, errors.Wrap(err, "Hostnetwork.GetNetInterface")
  3628. }
  3629. log.Errorf("PerformSwitchWire: change wireId for nic %s for hostnetwork %s", jsonutils.Marshal(nic), jsonutils.Marshal(hns[i]))
  3630. if len(nic.Bridge) > 0 {
  3631. log.Warningf("PerformSwitchWire: non-empty wireId %s for hostnetwork %s", jsonutils.Marshal(nic), jsonutils.Marshal(hns[i]))
  3632. continue
  3633. }
  3634. if nic.WireId != wire.Id {
  3635. _, err := db.Update(nic, func() error {
  3636. nic.WireId = wire.Id
  3637. return nil
  3638. })
  3639. if err != nil {
  3640. return nil, errors.Wrap(err, "Update NetInterface")
  3641. }
  3642. }
  3643. }
  3644. return nil, nil
  3645. }
  3646. func (net *SNetwork) fetchAdditionalWires() []api.SSimpleWire {
  3647. wires, err := NetworkAdditionalWireManager.FetchNetworkAdditionalWires(net.Id)
  3648. if err != nil {
  3649. log.Errorf("NetworkAdditionalWireManager.FetchNetworkAdditionalWires error %s", err)
  3650. }
  3651. return wires
  3652. }
  3653. func (net *SNetwork) PerformSyncAdditionalWires(
  3654. ctx context.Context,
  3655. userCred mcclient.TokenCredential,
  3656. query jsonutils.JSONObject,
  3657. input *api.NetworSyncAdditionalWiresInput,
  3658. ) (jsonutils.JSONObject, error) {
  3659. if !net.IsClassic() {
  3660. return nil, errors.Wrap(httperrors.ErrNotSupported, "default vpc only")
  3661. }
  3662. wireIds := make([]string, 0)
  3663. errs := make([]error, 0)
  3664. for _, wireId := range input.WireIds {
  3665. wireObj, err := WireManager.FetchByIdOrName(ctx, userCred, wireId)
  3666. if err != nil {
  3667. if errors.Cause(err) == sql.ErrNoRows {
  3668. errs = append(errs, httperrors.NewResourceNotFoundError2(WireManager.Keyword(), wireId))
  3669. } else {
  3670. errs = append(errs, errors.Wrapf(err, "WireManager.FetchByIdOrNam %s", wireId))
  3671. }
  3672. }
  3673. wireIds = append(wireIds, wireObj.GetId())
  3674. }
  3675. if len(errs) > 0 {
  3676. return nil, errors.NewAggregate(errs)
  3677. }
  3678. err := net.syncAdditionalWires(ctx, wireIds)
  3679. if err != nil {
  3680. return nil, errors.Wrap(err, "syncAdditionalWires")
  3681. }
  3682. return nil, nil
  3683. }
  3684. func (net *SNetwork) IsSupportIPv4() bool {
  3685. return len(net.GuestIpStart) > 0 && len(net.GuestIpEnd) > 0
  3686. }
  3687. func (net *SNetwork) IsSupportIPv6() bool {
  3688. return len(net.GuestIp6Start) > 0 && len(net.GuestIp6End) > 0
  3689. }
  3690. func (net *SNetwork) OnMetadataUpdated(ctx context.Context, userCred mcclient.TokenCredential) {
  3691. if len(net.ExternalId) == 0 || options.Options.KeepTagLocalization {
  3692. return
  3693. }
  3694. vpc, err := net.GetVpc()
  3695. if err != nil {
  3696. return
  3697. }
  3698. if account := vpc.GetCloudaccount(); account != nil && account.ReadOnly {
  3699. return
  3700. }
  3701. err = net.StartRemoteUpdateTask(ctx, userCred, true, "")
  3702. if err != nil {
  3703. log.Errorf("StartRemoteUpdateTask fail: %s", err)
  3704. }
  3705. }
  3706. func (net *SNetwork) StartRemoteUpdateTask(ctx context.Context, userCred mcclient.TokenCredential, replaceTags bool, parentTaskId string) error {
  3707. data := jsonutils.NewDict()
  3708. if replaceTags {
  3709. data.Add(jsonutils.JSONTrue, "replace_tags")
  3710. }
  3711. task, err := taskman.TaskManager.NewTask(ctx, "NetworkRemoteUpdateTask", net, userCred, data, parentTaskId, "", nil)
  3712. if err != nil {
  3713. return errors.Wrap(err, "Start NetworkRemoteUpdateTask")
  3714. }
  3715. net.SetStatus(ctx, userCred, apis.STATUS_UPDATE_TAGS, "StartRemoteUpdateTask")
  3716. return task.ScheduleRun(nil)
  3717. }
  3718. func (net SNetwork) HasIPv4Addr() bool {
  3719. return len(net.GuestIpStart) > 0 && len(net.GuestIpEnd) > 0
  3720. }
  3721. func (net SNetwork) HasIPv6Addr() bool {
  3722. return len(net.GuestIp6Start) > 0 && len(net.GuestIp6End) > 0
  3723. }
  3724. func (manager *SNetworkManager) CustomizeFilterList(ctx context.Context, q *sqlchemy.SQuery, userCred mcclient.TokenCredential, query jsonutils.JSONObject) (*db.CustomizeListFilters, error) {
  3725. filters := db.NewCustomizeListFilters()
  3726. if query.Contains("usable") {
  3727. isUsable := jsonutils.QueryBoolean(query, "usable", false)
  3728. addrCountFilter := func(obj jsonutils.JSONObject) (bool, error) {
  3729. portsStats := struct {
  3730. PortsUsed int
  3731. Ports6Used int
  3732. Ports int
  3733. Ports6 int
  3734. }{}
  3735. err := obj.Unmarshal(&portsStats)
  3736. if err != nil {
  3737. return false, err
  3738. }
  3739. if portsStats.PortsUsed < portsStats.Ports || portsStats.Ports6Used < portsStats.Ports6 {
  3740. return true, nil
  3741. }
  3742. return false, nil
  3743. }
  3744. if isUsable {
  3745. filters.Append(addrCountFilter)
  3746. }
  3747. }
  3748. return filters, nil
  3749. }