managedvirtual.go 131 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package regiondrivers
  15. import (
  16. "context"
  17. "database/sql"
  18. "fmt"
  19. "strings"
  20. "time"
  21. "yunion.io/x/cloudmux/pkg/cloudprovider"
  22. "yunion.io/x/jsonutils"
  23. "yunion.io/x/log"
  24. "yunion.io/x/pkg/errors"
  25. "yunion.io/x/pkg/gotypes"
  26. "yunion.io/x/pkg/util/billing"
  27. "yunion.io/x/pkg/util/netutils"
  28. "yunion.io/x/pkg/util/regutils"
  29. "yunion.io/x/pkg/util/secrules"
  30. "yunion.io/x/pkg/utils"
  31. "yunion.io/x/sqlchemy"
  32. "yunion.io/x/onecloud/pkg/apis"
  33. billing_api "yunion.io/x/onecloud/pkg/apis/billing"
  34. api "yunion.io/x/onecloud/pkg/apis/compute"
  35. "yunion.io/x/onecloud/pkg/cloudcommon/db"
  36. "yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
  37. "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
  38. "yunion.io/x/onecloud/pkg/cloudcommon/validators"
  39. "yunion.io/x/onecloud/pkg/compute/models"
  40. "yunion.io/x/onecloud/pkg/compute/sshkeys"
  41. "yunion.io/x/onecloud/pkg/httperrors"
  42. "yunion.io/x/onecloud/pkg/mcclient"
  43. "yunion.io/x/onecloud/pkg/util/logclient"
  44. "yunion.io/x/onecloud/pkg/util/seclib2"
  45. )
  46. type SManagedVirtualizationRegionDriver struct {
  47. SVirtualizationRegionDriver
  48. }
  49. func (self *SManagedVirtualizationRegionDriver) IsSupportedElasticcacheSecgroup() bool {
  50. return false
  51. }
  52. func (self *SManagedVirtualizationRegionDriver) GetMaxElasticcacheSecurityGroupCount() int {
  53. return 0
  54. }
  55. func (self *SManagedVirtualizationRegionDriver) ValidateCreateLoadbalancerData(ctx context.Context, userCred mcclient.TokenCredential, owerId mcclient.IIdentityProvider, input *api.LoadbalancerCreateInput) (*api.LoadbalancerCreateInput, error) {
  56. if len(input.ManagerId) == 0 {
  57. return nil, httperrors.NewMissingParameterError("manager_id")
  58. }
  59. return input, nil
  60. }
  61. func (self *SManagedVirtualizationRegionDriver) ValidateManagerId(ctx context.Context, userCred mcclient.TokenCredential, data *jsonutils.JSONDict) (*jsonutils.JSONDict, error) {
  62. if managerId, _ := data.GetString("manager_id"); len(managerId) == 0 {
  63. return nil, httperrors.NewMissingParameterError("manager")
  64. }
  65. return data, nil
  66. }
  67. func (self *SManagedVirtualizationRegionDriver) ValidateCreateLoadbalancerCertificateData(ctx context.Context, userCred mcclient.TokenCredential, data *jsonutils.JSONDict) (*jsonutils.JSONDict, error) {
  68. return self.ValidateManagerId(ctx, userCred, data)
  69. }
  70. func (self *SManagedVirtualizationRegionDriver) ValidateCreateLoadbalancerBackendData(ctx context.Context, userCred mcclient.TokenCredential,
  71. lb *models.SLoadbalancer, lbbg *models.SLoadbalancerBackendGroup,
  72. input *api.LoadbalancerBackendCreateInput) (*api.LoadbalancerBackendCreateInput, error) {
  73. if input.BackendType != api.LB_BACKEND_GUEST {
  74. return nil, httperrors.NewUnsupportOperationError("internal error: unexpected backend type %s", input.BackendType)
  75. }
  76. return input, nil
  77. }
  78. func (self *SManagedVirtualizationRegionDriver) ValidateUpdateLoadbalancerBackendData(ctx context.Context, userCred mcclient.TokenCredential, lbbg *models.SLoadbalancerBackendGroup, input *api.LoadbalancerBackendUpdateInput) (*api.LoadbalancerBackendUpdateInput, error) {
  79. return input, nil
  80. }
  81. func (self *SManagedVirtualizationRegionDriver) ValidateCreateLoadbalancerBackendGroupData(ctx context.Context, userCred mcclient.TokenCredential, lb *models.SLoadbalancer, input *api.LoadbalancerBackendGroupCreateInput) (*api.LoadbalancerBackendGroupCreateInput, error) {
  82. for _, backend := range input.Backends {
  83. if len(backend.ExternalId) == 0 && backend.BackendType == api.LB_BACKEND_GUEST {
  84. return nil, httperrors.NewInputParameterError("invalid guest %s", backend.Name)
  85. }
  86. }
  87. return input, nil
  88. }
  89. func (self *SManagedVirtualizationRegionDriver) IsSupportLoadbalancerListenerRuleRedirect() bool {
  90. return false
  91. }
  92. func validateUniqueById(ctx context.Context, userCred mcclient.TokenCredential, man db.IResourceModelManager, id string) error {
  93. q := man.Query().Equals("id", id)
  94. q = man.FilterByOwner(ctx, q, man, userCred, userCred, man.NamespaceScope())
  95. count, err := q.CountWithError()
  96. if err != nil {
  97. if err == sql.ErrNoRows {
  98. return httperrors.NewResourceNotFoundError("failed to find %s %s", man.Keyword(), id)
  99. }
  100. return httperrors.NewGeneralError(err)
  101. }
  102. if count > 1 {
  103. return httperrors.NewDuplicateResourceError("%s", id)
  104. }
  105. return nil
  106. }
  107. func (self *SManagedVirtualizationRegionDriver) ValidateUpdateLoadbalancerListenerData(ctx context.Context, userCred mcclient.TokenCredential,
  108. lblis *models.SLoadbalancerListener, input *api.LoadbalancerListenerUpdateInput) (*api.LoadbalancerListenerUpdateInput, error) {
  109. return input, nil
  110. }
  111. func (self *SManagedVirtualizationRegionDriver) GetBackendStatusForAdd() []string {
  112. return []string{api.VM_RUNNING}
  113. }
  114. func (self *SManagedVirtualizationRegionDriver) RequestCreateLoadbalancerInstance(ctx context.Context, userCred mcclient.TokenCredential, lb *models.SLoadbalancer, input *api.LoadbalancerCreateInput, task taskman.ITask) error {
  115. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  116. iRegion, err := lb.GetIRegion(ctx)
  117. if err != nil {
  118. return nil, errors.Wrapf(err, "GetIRegion")
  119. }
  120. params := &cloudprovider.SLoadbalancerCreateOptions{
  121. Name: lb.Name,
  122. Desc: lb.Description,
  123. Address: lb.Address,
  124. AddressType: lb.AddressType,
  125. ChargeType: string(lb.ChargeType),
  126. EgressMbps: lb.EgressMbps,
  127. LoadbalancerSpec: lb.LoadbalancerSpec,
  128. }
  129. params.Tags, _ = lb.GetAllUserMetadata()
  130. if len(input.EipId) > 0 {
  131. eipObj, err := models.ElasticipManager.FetchById(input.EipId)
  132. if err != nil {
  133. return nil, errors.Wrapf(err, "eip.FetchById(%s)", input.EipId)
  134. }
  135. eip := eipObj.(*models.SElasticip)
  136. params.EipId = eip.ExternalId
  137. }
  138. if len(lb.ZoneId) > 0 {
  139. zone, err := lb.GetZone()
  140. if err != nil {
  141. return nil, errors.Wrapf(err, "GetZone")
  142. }
  143. iZone, err := iRegion.GetIZoneById(zone.ExternalId)
  144. if err != nil {
  145. return nil, errors.Wrapf(err, "GetIZoneById(%s)", zone.ExternalId)
  146. }
  147. params.ZoneId = iZone.GetId()
  148. }
  149. if len(lb.Zone1) > 0 {
  150. z1 := models.ZoneManager.FetchZoneById(lb.Zone1)
  151. if z1 == nil {
  152. return nil, fmt.Errorf("failed to find zone 1 for lb %s", lb.Name)
  153. }
  154. iZone, err := iRegion.GetIZoneById(z1.ExternalId)
  155. if err != nil {
  156. return nil, errors.Wrap(err, "GetIZoneById")
  157. }
  158. params.SlaveZoneId = iZone.GetId()
  159. }
  160. if len(lb.VpcId) > 0 {
  161. vpc, err := lb.GetVpc()
  162. if err != nil {
  163. return nil, errors.Wrapf(err, "GetVpc")
  164. }
  165. params.VpcId = vpc.ExternalId
  166. }
  167. networks := []string{input.NetworkId}
  168. networks = append(networks, input.Networks...)
  169. for i := range networks {
  170. if len(networks[i]) > 0 {
  171. netObj, err := validators.ValidateModel(ctx, userCred, models.NetworkManager, &networks[i])
  172. if err != nil {
  173. return nil, err
  174. }
  175. network := netObj.(*models.SNetwork)
  176. if !utils.IsInStringArray(network.ExternalId, params.NetworkIds) {
  177. params.NetworkIds = append(params.NetworkIds, network.ExternalId)
  178. }
  179. }
  180. }
  181. manager := lb.GetCloudprovider()
  182. params.ProjectId, err = manager.SyncProject(ctx, userCred, lb.ProjectId)
  183. if err != nil {
  184. if errors.Cause(err) != cloudprovider.ErrNotSupported && errors.Cause(err) != cloudprovider.ErrNotImplemented {
  185. logclient.AddSimpleActionLog(lb, logclient.ACT_SYNC_CLOUD_PROJECT, err, userCred, false)
  186. }
  187. }
  188. log.Debugf("create lb with params: %s", jsonutils.Marshal(params).String())
  189. iLoadbalancer, err := iRegion.CreateILoadBalancer(params)
  190. if err != nil {
  191. return nil, errors.Wrapf(err, "CreateILoadBalancer")
  192. }
  193. err = db.SetExternalId(lb, userCred, iLoadbalancer.GetGlobalId())
  194. if err != nil {
  195. return nil, errors.Wrapf(err, "SetExternalId")
  196. }
  197. //wait async create result
  198. err = cloudprovider.WaitMultiStatus(iLoadbalancer, []string{api.LB_STATUS_ENABLED, api.LB_STATUS_UNKNOWN}, 10*time.Second, 8*time.Minute)
  199. if err != nil {
  200. return nil, errors.Wrap(err, "cloudprovider.WaitMultiStatus")
  201. }
  202. err = lb.SyncWithCloudLoadbalancer(ctx, userCred, iLoadbalancer, lb.GetCloudprovider())
  203. if err != nil {
  204. return nil, errors.Wrapf(err, "SyncWithCloudLoadbalancer")
  205. }
  206. return nil, nil
  207. })
  208. return nil
  209. }
  210. func (self *SManagedVirtualizationRegionDriver) RequestStartLoadbalancer(ctx context.Context, userCred mcclient.TokenCredential, lb *models.SLoadbalancer, task taskman.ITask) error {
  211. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  212. iRegion, err := lb.GetIRegion(ctx)
  213. if err != nil {
  214. return nil, err
  215. }
  216. iLoadbalancer, err := iRegion.GetILoadBalancerById(lb.ExternalId)
  217. if err != nil {
  218. return nil, err
  219. }
  220. return nil, iLoadbalancer.Start()
  221. })
  222. return nil
  223. }
  224. func (self *SManagedVirtualizationRegionDriver) RequestStopLoadbalancer(ctx context.Context, userCred mcclient.TokenCredential, lb *models.SLoadbalancer, task taskman.ITask) error {
  225. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  226. iRegion, err := lb.GetIRegion(ctx)
  227. if err != nil {
  228. return nil, err
  229. }
  230. iLoadbalancer, err := iRegion.GetILoadBalancerById(lb.ExternalId)
  231. if err != nil {
  232. return nil, err
  233. }
  234. return nil, iLoadbalancer.Stop()
  235. })
  236. return nil
  237. }
  238. func (self *SManagedVirtualizationRegionDriver) RequestSyncstatusLoadbalancer(ctx context.Context, userCred mcclient.TokenCredential, lb *models.SLoadbalancer, task taskman.ITask) error {
  239. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  240. iLb, err := lb.GetILoadbalancer(ctx)
  241. if err != nil {
  242. return nil, errors.Wrapf(err, "GetILoadbalancer")
  243. }
  244. provider := lb.GetCloudprovider()
  245. return nil, lb.SyncWithCloudLoadbalancer(ctx, userCred, iLb, provider)
  246. })
  247. return nil
  248. }
  249. func (self *SManagedVirtualizationRegionDriver) RequestRemoteUpdateLoadbalancer(ctx context.Context, userCred mcclient.TokenCredential, lb *models.SLoadbalancer, replaceTags bool, task taskman.ITask) error {
  250. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  251. iLb, err := lb.GetILoadbalancer(ctx)
  252. if err != nil {
  253. return nil, errors.Wrapf(err, "GetILoadbalancer")
  254. }
  255. oldTags, err := iLb.GetTags()
  256. if err != nil {
  257. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  258. return nil, nil
  259. }
  260. return nil, errors.Wrap(err, "iLoadbalancer.GetTags()")
  261. }
  262. tags, err := lb.GetAllUserMetadata()
  263. if err != nil {
  264. return nil, errors.Wrapf(err, "lb.GetAllUserMetadata")
  265. }
  266. tagsUpdateInfo := cloudprovider.TagsUpdateInfo{OldTags: oldTags, NewTags: tags}
  267. err = cloudprovider.SetTags(ctx, iLb, lb.ManagerId, tags, replaceTags)
  268. if err != nil {
  269. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  270. return nil, nil
  271. }
  272. logclient.AddActionLogWithStartable(task, lb, logclient.ACT_UPDATE_TAGS, err, userCred, false)
  273. return nil, errors.Wrap(err, "iLoadbalancer.SetMetadata")
  274. }
  275. logclient.AddActionLogWithStartable(task, lb, logclient.ACT_UPDATE_TAGS, tagsUpdateInfo, userCred, true)
  276. return nil, nil
  277. })
  278. return nil
  279. }
  280. func (self *SManagedVirtualizationRegionDriver) RequestDeleteLoadbalancer(ctx context.Context, userCred mcclient.TokenCredential, lb *models.SLoadbalancer, task taskman.ITask) error {
  281. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  282. iLb, err := lb.GetILoadbalancer(ctx)
  283. if err != nil {
  284. if errors.Cause(err) == cloudprovider.ErrNotFound {
  285. return nil, nil
  286. }
  287. return nil, errors.Wrapf(err, "GetILoadbalancer")
  288. }
  289. err = iLb.Delete(ctx)
  290. if err != nil {
  291. return nil, errors.Wrapf(err, "iLb.Delete")
  292. }
  293. return nil, nil
  294. })
  295. return nil
  296. }
  297. func (self *SManagedVirtualizationRegionDriver) RequestCreateLoadbalancerAcl(ctx context.Context, userCred mcclient.TokenCredential, lbacl *models.SLoadbalancerAcl, task taskman.ITask) error {
  298. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  299. iRegion, err := lbacl.GetIRegion(ctx)
  300. if err != nil {
  301. return nil, errors.Wrapf(err, "GetIRegion")
  302. }
  303. opts := &cloudprovider.SLoadbalancerAccessControlList{
  304. Name: lbacl.Name,
  305. Entrys: []cloudprovider.SLoadbalancerAccessControlListEntry{},
  306. }
  307. if lbacl.AclEntries != nil {
  308. for _, entry := range *lbacl.AclEntries {
  309. opts.Entrys = append(opts.Entrys, cloudprovider.SLoadbalancerAccessControlListEntry{
  310. Comment: entry.Comment,
  311. CIDR: entry.Cidr,
  312. })
  313. }
  314. }
  315. iAcl, err := iRegion.CreateILoadBalancerAcl(opts)
  316. if err != nil {
  317. return nil, errors.Wrapf(err, "CreateILoadBalancerAcl")
  318. }
  319. _, err = db.Update(lbacl, func() error {
  320. lbacl.ExternalId = iAcl.GetGlobalId()
  321. return nil
  322. })
  323. return nil, err
  324. })
  325. return nil
  326. }
  327. func (self *SManagedVirtualizationRegionDriver) RequestUpdateLoadbalancerAcl(ctx context.Context, userCred mcclient.TokenCredential, lbacl *models.SLoadbalancerAcl, task taskman.ITask) error {
  328. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  329. iAcl, err := lbacl.GetILoadbalancerAcl(ctx)
  330. if err != nil {
  331. return nil, errors.Wrapf(err, "GetILoadbalancerAcl")
  332. }
  333. opts := &cloudprovider.SLoadbalancerAccessControlList{
  334. Name: lbacl.Name,
  335. Entrys: []cloudprovider.SLoadbalancerAccessControlListEntry{},
  336. }
  337. if lbacl.AclEntries != nil {
  338. for _, entry := range *lbacl.AclEntries {
  339. opts.Entrys = append(opts.Entrys, cloudprovider.SLoadbalancerAccessControlListEntry{
  340. Comment: entry.Comment,
  341. CIDR: entry.Cidr,
  342. })
  343. }
  344. }
  345. return nil, iAcl.Sync(opts)
  346. })
  347. return nil
  348. }
  349. func (self *SManagedVirtualizationRegionDriver) RequestLoadbalancerAclSyncstatus(ctx context.Context, userCred mcclient.TokenCredential, lbacl *models.SLoadbalancerAcl, task taskman.ITask) error {
  350. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  351. iAcl, err := lbacl.GetILoadbalancerAcl(ctx)
  352. if err != nil {
  353. return nil, errors.Wrapf(err, "GetILoadbalancerAcl")
  354. }
  355. return nil, lbacl.SyncWithCloudAcl(ctx, userCred, iAcl, lbacl.GetCloudprovider())
  356. })
  357. return nil
  358. }
  359. func (self *SManagedVirtualizationRegionDriver) RequestDeleteLoadbalancerAcl(ctx context.Context, userCred mcclient.TokenCredential, lbacl *models.SLoadbalancerAcl, task taskman.ITask) error {
  360. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  361. iAcl, err := lbacl.GetILoadbalancerAcl(ctx)
  362. if err != nil {
  363. if errors.Cause(err) == cloudprovider.ErrNotFound {
  364. return nil, nil
  365. }
  366. return nil, errors.Wrapf(err, "GetILoadbalancerAcl")
  367. }
  368. return nil, iAcl.Delete()
  369. })
  370. return nil
  371. }
  372. func (self *SManagedVirtualizationRegionDriver) RequestCreateLoadbalancerCertificate(ctx context.Context, userCred mcclient.TokenCredential, lbcert *models.SLoadbalancerCertificate, task taskman.ITask) error {
  373. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  374. iRegion, err := lbcert.GetIRegion(ctx)
  375. if err != nil {
  376. return nil, err
  377. }
  378. opts := &cloudprovider.SLoadbalancerCertificate{
  379. Name: lbcert.Name,
  380. PrivateKey: lbcert.PrivateKey,
  381. Certificate: lbcert.Certificate,
  382. }
  383. iCert, err := iRegion.CreateILoadBalancerCertificate(opts)
  384. if err != nil {
  385. return nil, err
  386. }
  387. _, err = db.Update(lbcert, func() error {
  388. lbcert.ExternalId = iCert.GetGlobalId()
  389. return nil
  390. })
  391. return nil, err
  392. })
  393. return nil
  394. }
  395. func (self *SManagedVirtualizationRegionDriver) RequestDeleteLoadbalancerCertificate(ctx context.Context, userCred mcclient.TokenCredential, lbcert *models.SLoadbalancerCertificate, task taskman.ITask) error {
  396. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  397. iCert, err := lbcert.GetILoadbalancerCertificate(ctx)
  398. if err != nil {
  399. if errors.Cause(err) == cloudprovider.ErrNotFound {
  400. return nil, nil
  401. }
  402. return nil, err
  403. }
  404. return nil, iCert.Delete()
  405. })
  406. return nil
  407. }
  408. func (self *SManagedVirtualizationRegionDriver) RequestLoadbalancerCertificateSyncstatus(ctx context.Context, userCred mcclient.TokenCredential, lbcert *models.SLoadbalancerCertificate, task taskman.ITask) error {
  409. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  410. iCert, err := lbcert.GetILoadbalancerCertificate(ctx)
  411. if err != nil {
  412. return nil, err
  413. }
  414. return nil, lbcert.SyncWithCloudCert(ctx, userCred, iCert, lbcert.GetCloudprovider())
  415. })
  416. return nil
  417. }
  418. func (self *SManagedVirtualizationRegionDriver) RequestCreateLoadbalancerBackendGroup(ctx context.Context, userCred mcclient.TokenCredential, lbbg *models.SLoadbalancerBackendGroup, task taskman.ITask) error {
  419. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  420. lb, err := lbbg.GetLoadbalancer()
  421. if err != nil {
  422. return nil, errors.Wrapf(err, "GetLoadbalancer")
  423. }
  424. iLb, err := lb.GetILoadbalancer(ctx)
  425. if err != nil {
  426. return nil, errors.Wrapf(err, "GetILoadBalancer(%s)", lb.ExternalId)
  427. }
  428. group := &cloudprovider.SLoadbalancerBackendGroup{
  429. Name: lbbg.Name,
  430. GroupType: lbbg.Type,
  431. Scheduler: lbbg.Scheduler,
  432. Backends: []cloudprovider.SLoadbalancerBackend{},
  433. }
  434. if hc, err := lbbg.GetHealthCheck(); err == nil {
  435. group.HealthCheckId = hc.ExternalId
  436. }
  437. backends, err := lbbg.GetBackends()
  438. if err != nil {
  439. return nil, errors.Wrapf(err, "GetBackends")
  440. }
  441. for i := range backends {
  442. group.Backends = append(group.Backends, cloudprovider.SLoadbalancerBackend{
  443. Weight: backends[i].Weight,
  444. Port: backends[i].Port,
  445. Name: backends[i].Name,
  446. BackendType: backends[i].BackendType,
  447. BackendRole: backends[i].BackendRole,
  448. Address: backends[i].Address,
  449. })
  450. }
  451. iLbbg, err := iLb.CreateILoadBalancerBackendGroup(group)
  452. if err != nil {
  453. return nil, err
  454. }
  455. err = db.SetExternalId(lbbg, userCred, iLbbg.GetGlobalId())
  456. if err != nil {
  457. return nil, errors.Wrapf(err, "db.SetExternalId")
  458. }
  459. iBackends, err := iLbbg.GetILoadbalancerBackends()
  460. if err != nil {
  461. return nil, errors.Wrapf(err, "GetILoadBalancerBackends")
  462. }
  463. for i := 0; i < len(backends) && i < len(iBackends); i++ {
  464. db.Update(&backends[i], func() error {
  465. backends[i].ExternalId = iBackends[i].GetGlobalId()
  466. return nil
  467. })
  468. }
  469. return nil, nil
  470. })
  471. return nil
  472. }
  473. func (self *SManagedVirtualizationRegionDriver) RequestDeleteLoadbalancerBackendGroup(ctx context.Context, userCred mcclient.TokenCredential, lbbg *models.SLoadbalancerBackendGroup, task taskman.ITask) error {
  474. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  475. if jsonutils.QueryBoolean(task.GetParams(), "purge", false) {
  476. return nil, nil
  477. }
  478. iRegion, err := lbbg.GetIRegion(ctx)
  479. if err != nil {
  480. return nil, err
  481. }
  482. loadbalancer, err := lbbg.GetLoadbalancer()
  483. if err != nil {
  484. return nil, err
  485. }
  486. iLoadbalancer, err := iRegion.GetILoadBalancerById(loadbalancer.ExternalId)
  487. if err != nil {
  488. if errors.Cause(err) == cloudprovider.ErrNotFound {
  489. return nil, nil
  490. }
  491. return nil, err
  492. }
  493. if len(lbbg.ExternalId) == 0 {
  494. return nil, nil
  495. }
  496. iLoadbalancerBackendGroup, err := iLoadbalancer.GetILoadBalancerBackendGroupById(lbbg.ExternalId)
  497. if err != nil {
  498. if errors.Cause(err) == cloudprovider.ErrNotFound {
  499. return nil, nil
  500. }
  501. return nil, err
  502. }
  503. err = iLoadbalancerBackendGroup.Delete(ctx)
  504. if err != nil {
  505. return nil, err
  506. }
  507. return nil, nil
  508. })
  509. return nil
  510. }
  511. func (self *SManagedVirtualizationRegionDriver) RequestCreateLoadbalancerBackend(ctx context.Context, userCred mcclient.TokenCredential, lbb *models.SLoadbalancerBackend, task taskman.ITask) error {
  512. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  513. lbbg, err := lbb.GetLoadbalancerBackendGroup()
  514. if err != nil {
  515. return nil, err
  516. }
  517. lb, err := lbbg.GetLoadbalancer()
  518. if err != nil {
  519. return nil, err
  520. }
  521. iRegion, err := lb.GetIRegion(ctx)
  522. if err != nil {
  523. return nil, err
  524. }
  525. iLoadbalancer, err := iRegion.GetILoadBalancerById(lb.ExternalId)
  526. if err != nil {
  527. return nil, err
  528. }
  529. iLoadbalancerBackendGroup, err := iLoadbalancer.GetILoadBalancerBackendGroupById(lbbg.ExternalId)
  530. if err != nil {
  531. return nil, err
  532. }
  533. opts := &cloudprovider.SLoadbalancerBackend{
  534. Name: lbb.Name,
  535. Weight: lbb.Weight,
  536. Port: lbb.Port,
  537. Address: lbb.Address,
  538. }
  539. if lbb.BackendType == api.LB_BACKEND_GUEST {
  540. guest := lbb.GetGuest()
  541. if guest == nil {
  542. return nil, fmt.Errorf("failed to find guest for lbb %s", lbb.Name)
  543. }
  544. opts.ExternalId = guest.ExternalId
  545. }
  546. iLoadbalancerBackend, err := iLoadbalancerBackendGroup.AddBackendServer(opts)
  547. if err != nil {
  548. return nil, err
  549. }
  550. if err := db.SetExternalId(lbb, userCred, iLoadbalancerBackend.GetGlobalId()); err != nil {
  551. return nil, err
  552. }
  553. return nil, lbb.SyncWithCloudLoadbalancerBackend(ctx, userCred, iLoadbalancerBackend, lb.GetCloudprovider())
  554. })
  555. return nil
  556. }
  557. func (self *SManagedVirtualizationRegionDriver) RequestDeleteLoadbalancerBackend(ctx context.Context, userCred mcclient.TokenCredential, lbb *models.SLoadbalancerBackend, task taskman.ITask) error {
  558. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  559. if jsonutils.QueryBoolean(task.GetParams(), "purge", false) {
  560. return nil, nil
  561. }
  562. lbbg, err := lbb.GetLoadbalancerBackendGroup()
  563. if err != nil {
  564. return nil, err
  565. }
  566. lb, err := lbbg.GetLoadbalancer()
  567. if err != nil {
  568. return nil, err
  569. }
  570. iRegion, err := lb.GetIRegion(ctx)
  571. if err != nil {
  572. return nil, err
  573. }
  574. iLoadbalancer, err := iRegion.GetILoadBalancerById(lb.ExternalId)
  575. if err != nil {
  576. return nil, err
  577. }
  578. iLoadbalancerBackendGroup, err := iLoadbalancer.GetILoadBalancerBackendGroupById(lbbg.ExternalId)
  579. if err != nil {
  580. return nil, err
  581. }
  582. opts := &cloudprovider.SLoadbalancerBackend{
  583. Weight: lbb.Weight,
  584. Port: lbb.Port,
  585. Name: lbb.Name,
  586. Address: lbb.Address,
  587. ExternalId: lbb.ExternalId,
  588. }
  589. if lbb.BackendType == api.LB_BACKEND_GUEST {
  590. guest := lbb.GetGuest()
  591. if guest == nil {
  592. log.Warningf("failed to find guest for lbb %s", lbb.Name)
  593. return nil, nil
  594. }
  595. _, err = guest.GetIVM(ctx)
  596. if err != nil {
  597. if errors.Cause(err) == cloudprovider.ErrNotFound {
  598. return nil, nil
  599. }
  600. return nil, err
  601. }
  602. opts.ExternalId = guest.ExternalId
  603. }
  604. return nil, iLoadbalancerBackendGroup.RemoveBackendServer(opts)
  605. })
  606. return nil
  607. }
  608. func (self *SManagedVirtualizationRegionDriver) RequestSyncLoadbalancerBackend(ctx context.Context, userCred mcclient.TokenCredential, lbb *models.SLoadbalancerBackend, task taskman.ITask) error {
  609. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  610. lbbg, err := lbb.GetLoadbalancerBackendGroup()
  611. if err != nil {
  612. return nil, err
  613. }
  614. lb, err := lbbg.GetLoadbalancer()
  615. if err != nil {
  616. return nil, err
  617. }
  618. iLb, err := lb.GetILoadbalancer(ctx)
  619. if err != nil {
  620. return nil, errors.Wrap(err, "GetILoadbalancer")
  621. }
  622. iLoadbalancerBackendGroup, err := iLb.GetILoadBalancerBackendGroupById(lbbg.ExternalId)
  623. if err != nil {
  624. return nil, errors.Wrap(err, "GetILoadBalancerBackendGroupById")
  625. }
  626. iBackend, err := iLoadbalancerBackendGroup.GetILoadbalancerBackendById(lbb.ExternalId)
  627. if err != nil {
  628. return nil, errors.Wrap(err, "GetILoadbalancerBackendById")
  629. }
  630. opts := &cloudprovider.SLoadbalancerBackend{
  631. Weight: lbb.Weight,
  632. Port: lbb.Port,
  633. ExternalId: lbb.ExternalId,
  634. BackendType: lbb.BackendType,
  635. BackendRole: lbb.BackendRole,
  636. Address: lbb.Address,
  637. }
  638. opts.Enabled = jsonutils.QueryBoolean(task.GetParams(), "enabled", true)
  639. err = iBackend.Update(ctx, opts)
  640. if err != nil {
  641. return nil, errors.Wrap(err, "Update")
  642. }
  643. iBackend, err = iLoadbalancerBackendGroup.GetILoadbalancerBackendById(lbb.ExternalId)
  644. if err != nil {
  645. return nil, errors.Wrap(err, "regionDriver.RequestSyncLoadbalancerBackend.GetILoadbalancerBackendById")
  646. }
  647. return nil, lbb.SyncWithCloudLoadbalancerBackend(ctx, userCred, iBackend, lb.GetCloudprovider())
  648. })
  649. return nil
  650. }
  651. func (self *SManagedVirtualizationRegionDriver) RequestCreateLoadbalancerListener(ctx context.Context, userCred mcclient.TokenCredential, lblis *models.SLoadbalancerListener, task taskman.ITask) error {
  652. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  653. provider := lblis.GetCloudprovider()
  654. if provider == nil {
  655. return nil, fmt.Errorf("failed to find provider for lblis %s", lblis.Name)
  656. }
  657. params, err := lblis.GetLoadbalancerListenerParams()
  658. if err != nil {
  659. return nil, errors.Wrapf(err, "lblis.GetLoadbalancerListenerParams")
  660. }
  661. {
  662. if lblis.ListenerType == api.LB_LISTENER_TYPE_HTTPS && len(lblis.CertificateId) > 0 {
  663. cert, err := lblis.GetCertificate()
  664. if err != nil {
  665. return nil, errors.Wrapf(err, "GetCertificate")
  666. }
  667. params.CertificateId = cert.ExternalId
  668. }
  669. }
  670. {
  671. if len(lblis.AclId) > 0 {
  672. acl, err := lblis.GetAcl()
  673. if err != nil {
  674. return nil, errors.Wrap(err, "GetAcl")
  675. }
  676. params.AccessControlListId = acl.ExternalId
  677. params.AccessControlListType = lblis.AclType
  678. params.AccessControlListStatus = lblis.AclStatus
  679. }
  680. }
  681. loadbalancer, err := lblis.GetLoadbalancer()
  682. if err != nil {
  683. return nil, err
  684. }
  685. iRegion, err := loadbalancer.GetIRegion(ctx)
  686. if err != nil {
  687. return nil, errors.Wrap(err, "loadbalancer.GetIRegion")
  688. }
  689. iLoadbalancer, err := iRegion.GetILoadBalancerById(loadbalancer.ExternalId)
  690. if err != nil {
  691. return nil, errors.Wrapf(err, "iRegion.GetILoadBalancerById(%s)", loadbalancer.ExternalId)
  692. }
  693. iListener, err := iLoadbalancer.CreateILoadBalancerListener(ctx, params)
  694. if err != nil {
  695. return nil, errors.Wrap(err, "iLoadbalancer.CreateILoadBalancerListener")
  696. }
  697. if err := db.SetExternalId(lblis, userCred, iListener.GetGlobalId()); err != nil {
  698. return nil, errors.Wrap(err, "db.SetExternalId")
  699. }
  700. return nil, lblis.SyncWithCloudLoadbalancerListener(ctx, userCred, loadbalancer, iListener, loadbalancer.GetOwnerId(), lblis.GetCloudprovider())
  701. })
  702. return nil
  703. }
  704. func (self *SManagedVirtualizationRegionDriver) RequestDeleteLoadbalancerListener(ctx context.Context, userCred mcclient.TokenCredential, lblis *models.SLoadbalancerListener, task taskman.ITask) error {
  705. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  706. if len(lblis.ExternalId) == 0 {
  707. return nil, nil
  708. }
  709. lb, err := lblis.GetLoadbalancer()
  710. if err != nil {
  711. return nil, err
  712. }
  713. iLb, err := lb.GetILoadbalancer(ctx)
  714. if err != nil {
  715. return nil, errors.Wrapf(err, "GetILoadbalancer")
  716. }
  717. iListener, err := iLb.GetILoadBalancerListenerById(lblis.ExternalId)
  718. if err != nil {
  719. if errors.Cause(err) == cloudprovider.ErrNotFound {
  720. return nil, nil
  721. }
  722. return nil, errors.Wrapf(err, "GetILoadBalancerListenerById(%s)", lblis.ExternalId)
  723. }
  724. return nil, iListener.Delete(ctx)
  725. })
  726. return nil
  727. }
  728. func (self *SManagedVirtualizationRegionDriver) RequestStartLoadbalancerListener(ctx context.Context, userCred mcclient.TokenCredential, lblis *models.SLoadbalancerListener, task taskman.ITask) error {
  729. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  730. loadbalancer, err := lblis.GetLoadbalancer()
  731. if err != nil {
  732. return nil, err
  733. }
  734. iRegion, err := loadbalancer.GetIRegion(ctx)
  735. if err != nil {
  736. return nil, err
  737. }
  738. iLoadbalancer, err := iRegion.GetILoadBalancerById(loadbalancer.ExternalId)
  739. if err != nil {
  740. return nil, err
  741. }
  742. iListener, err := iLoadbalancer.GetILoadBalancerListenerById(lblis.ExternalId)
  743. if err != nil {
  744. return nil, err
  745. }
  746. return nil, iListener.Start()
  747. })
  748. return nil
  749. }
  750. func (self *SManagedVirtualizationRegionDriver) RequestSyncLoadbalancerListener(ctx context.Context, userCred mcclient.TokenCredential, lblis *models.SLoadbalancerListener, input *api.LoadbalancerListenerUpdateInput, task taskman.ITask) error {
  751. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  752. iLis, err := lblis.GetILoadbalancerListener(ctx)
  753. if err != nil {
  754. return nil, errors.Wrapf(err, "GetILoadbalancerListener")
  755. }
  756. provider := lblis.GetCloudprovider()
  757. if provider == nil {
  758. return nil, fmt.Errorf("failed to find provider for lblis %s", lblis.Name)
  759. }
  760. {
  761. if lblis.ListenerType == api.LB_LISTENER_TYPE_HTTPS && input.CertificateId != nil {
  762. cert, err := lblis.GetCertificate()
  763. if err != nil {
  764. return nil, errors.Wrapf(err, "GetCertificate")
  765. }
  766. err = iLis.ChangeCertificate(ctx, &cloudprovider.ListenerCertificateOptions{
  767. CertificateId: cert.ExternalId,
  768. })
  769. if err != nil && errors.Cause(err) != cloudprovider.ErrNotSupported && errors.Cause(err) != cloudprovider.ErrNotImplemented {
  770. return nil, errors.Wrapf(err, "ChangeCertificate")
  771. }
  772. }
  773. }
  774. {
  775. if input.AclStatus != nil {
  776. opts := &cloudprovider.ListenerAclOptions{AclStatus: *input.AclStatus, AclType: lblis.AclType}
  777. if *input.AclStatus == api.LB_BOOL_ON {
  778. acl, err := lblis.GetAcl()
  779. if err != nil {
  780. return nil, errors.Wrapf(err, "GetAcl")
  781. }
  782. opts.AclId = acl.ExternalId
  783. }
  784. err := iLis.SetAcl(ctx, opts)
  785. if err != nil && errors.Cause(err) != cloudprovider.ErrNotSupported {
  786. return nil, errors.Wrapf(err, "SetAcl")
  787. }
  788. }
  789. }
  790. if iLis.GetScheduler() != lblis.Scheduler {
  791. err := iLis.ChangeScheduler(ctx, &cloudprovider.ChangeListenerSchedulerOptions{
  792. Scheduler: lblis.Scheduler,
  793. ListenerStickySessionOptions: cloudprovider.ListenerStickySessionOptions{
  794. StickySession: lblis.StickySession,
  795. StickySessionCookie: lblis.StickySessionCookie,
  796. StickySessionType: lblis.StickySessionType,
  797. StickySessionCookieTimeout: lblis.StickySessionCookieTimeout,
  798. },
  799. })
  800. if err != nil && errors.Cause(err) != cloudprovider.ErrNotSupported && errors.Cause(err) != cloudprovider.ErrNotImplemented {
  801. return nil, errors.Wrapf(err, "ChangeScheduler")
  802. }
  803. }
  804. if input.HealthCheck != nil {
  805. err := iLis.SetHealthCheck(ctx, &cloudprovider.ListenerHealthCheckOptions{
  806. HealthCheckReq: lblis.HealthCheckReq,
  807. HealthCheckExp: lblis.HealthCheckExp,
  808. HealthCheck: lblis.HealthCheck,
  809. HealthCheckType: lblis.HealthCheckType,
  810. HealthCheckTimeout: lblis.HealthCheckTimeout,
  811. HealthCheckDomain: lblis.HealthCheckDomain,
  812. HealthCheckHttpCode: lblis.HealthCheckHttpCode,
  813. HealthCheckURI: lblis.HealthCheckURI,
  814. HealthCheckInterval: lblis.HealthCheckInterval,
  815. HealthCheckRise: lblis.HealthCheckRise,
  816. HealthCheckFail: lblis.HealthCheckFall,
  817. })
  818. if err != nil && errors.Cause(err) != cloudprovider.ErrNotSupported && errors.Cause(err) != cloudprovider.ErrNotImplemented {
  819. return nil, errors.Wrapf(err, "SetHealthCheck")
  820. }
  821. }
  822. return nil, nil
  823. })
  824. return nil
  825. }
  826. func (self *SManagedVirtualizationRegionDriver) RequestStopLoadbalancerListener(ctx context.Context, userCred mcclient.TokenCredential, lblis *models.SLoadbalancerListener, task taskman.ITask) error {
  827. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  828. loadbalancer, err := lblis.GetLoadbalancer()
  829. if err != nil {
  830. return nil, err
  831. }
  832. iRegion, err := loadbalancer.GetIRegion(ctx)
  833. if err != nil {
  834. return nil, err
  835. }
  836. iLoadbalancer, err := iRegion.GetILoadBalancerById(loadbalancer.ExternalId)
  837. if err != nil {
  838. return nil, err
  839. }
  840. iListener, err := iLoadbalancer.GetILoadBalancerListenerById(lblis.ExternalId)
  841. if err != nil {
  842. return nil, err
  843. }
  844. return nil, iListener.Stop()
  845. })
  846. return nil
  847. }
  848. func (self *SManagedVirtualizationRegionDriver) RequestSyncstatusLoadbalancerListener(ctx context.Context, userCred mcclient.TokenCredential, lblis *models.SLoadbalancerListener, task taskman.ITask) error {
  849. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  850. loadbalancer, err := lblis.GetLoadbalancer()
  851. if err != nil {
  852. return nil, err
  853. }
  854. iRegion, err := loadbalancer.GetIRegion(ctx)
  855. if err != nil {
  856. return nil, err
  857. }
  858. iLoadbalancer, err := iRegion.GetILoadBalancerById(loadbalancer.ExternalId)
  859. if err != nil {
  860. return nil, err
  861. }
  862. iListener, err := iLoadbalancer.GetILoadBalancerListenerById(lblis.ExternalId)
  863. if err != nil {
  864. return nil, err
  865. }
  866. status := iListener.GetStatus()
  867. if utils.IsInStringArray(status, []string{api.LB_STATUS_ENABLED, api.LB_STATUS_DISABLED}) {
  868. return nil, lblis.SetStatus(ctx, userCred, status, "")
  869. }
  870. return nil, fmt.Errorf("Unknown loadbalancer listener status %s", status)
  871. })
  872. return nil
  873. }
  874. func (self *SManagedVirtualizationRegionDriver) RequestCreateLoadbalancerListenerRule(ctx context.Context, userCred mcclient.TokenCredential, lbr *models.SLoadbalancerListenerRule, task taskman.ITask) error {
  875. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  876. listener, err := lbr.GetLoadbalancerListener()
  877. if err != nil {
  878. return nil, err
  879. }
  880. loadbalancer, err := listener.GetLoadbalancer()
  881. if err != nil {
  882. return nil, err
  883. }
  884. iLb, err := loadbalancer.GetILoadbalancer(ctx)
  885. if err != nil {
  886. return nil, err
  887. }
  888. iListener, err := iLb.GetILoadBalancerListenerById(listener.ExternalId)
  889. if err != nil {
  890. return nil, err
  891. }
  892. opts := &cloudprovider.SLoadbalancerListenerRule{
  893. Name: lbr.Name,
  894. Domain: lbr.Domain,
  895. Path: lbr.Path,
  896. BackendGroups: []string{},
  897. }
  898. if lbr.RedirectPool != nil {
  899. opts.RedirectPool = cloudprovider.SRedirectPool{
  900. CountryPools: map[string][]string{},
  901. RegionPools: map[string][]string{},
  902. }
  903. for poolName, pools := range lbr.RedirectPool.CountryPools {
  904. poolIds := []string{}
  905. for _, pool := range pools {
  906. poolIds = append(poolIds, pool.ExternalId)
  907. }
  908. opts.RedirectPool.CountryPools[poolName] = poolIds
  909. }
  910. for poolName, pools := range lbr.RedirectPool.RegionPools {
  911. poolIds := []string{}
  912. for _, pool := range pools {
  913. poolIds = append(poolIds, pool.ExternalId)
  914. }
  915. opts.RedirectPool.RegionPools[poolName] = poolIds
  916. }
  917. }
  918. if lbr.BackendGroups != nil {
  919. for _, backendGroup := range *lbr.BackendGroups {
  920. opts.BackendGroups = append(opts.BackendGroups, backendGroup.ExternalId)
  921. }
  922. }
  923. if len(lbr.BackendGroupId) > 0 {
  924. group := lbr.GetLoadbalancerBackendGroup()
  925. if group == nil {
  926. return nil, fmt.Errorf("failed to find backend group for listener rule %s", lbr.Name)
  927. }
  928. opts.BackendGroupId = group.ExternalId
  929. opts.BackendGroupType = group.Type
  930. }
  931. iListenerRule, err := iListener.CreateILoadBalancerListenerRule(opts)
  932. if err != nil {
  933. return nil, err
  934. }
  935. if err := db.SetExternalId(lbr, userCred, iListenerRule.GetGlobalId()); err != nil {
  936. return nil, err
  937. }
  938. return nil, lbr.SyncWithCloudLoadbalancerListenerRule(ctx, userCred, iListenerRule, listener.GetOwnerId(), loadbalancer.GetCloudprovider())
  939. })
  940. return nil
  941. }
  942. func (self *SManagedVirtualizationRegionDriver) RequestDeleteLoadbalancerListenerRule(ctx context.Context, userCred mcclient.TokenCredential, lbr *models.SLoadbalancerListenerRule, task taskman.ITask) error {
  943. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  944. if jsonutils.QueryBoolean(task.GetParams(), "purge", false) {
  945. return nil, nil
  946. }
  947. listener, err := lbr.GetLoadbalancerListener()
  948. if err != nil {
  949. return nil, err
  950. }
  951. loadbalancer, err := listener.GetLoadbalancer()
  952. if err != nil {
  953. return nil, err
  954. }
  955. iRegion, err := loadbalancer.GetIRegion(ctx)
  956. if err != nil {
  957. return nil, err
  958. }
  959. iLoadbalancer, err := iRegion.GetILoadBalancerById(loadbalancer.ExternalId)
  960. if err != nil {
  961. return nil, err
  962. }
  963. iListener, err := iLoadbalancer.GetILoadBalancerListenerById(listener.ExternalId)
  964. if err != nil {
  965. return nil, err
  966. }
  967. if len(lbr.ExternalId) == 0 {
  968. return nil, nil
  969. }
  970. iListenerRule, err := iListener.GetILoadBalancerListenerRuleById(lbr.ExternalId)
  971. if err != nil {
  972. if errors.Cause(err) == cloudprovider.ErrNotFound {
  973. return nil, nil
  974. }
  975. return nil, err
  976. }
  977. return nil, iListenerRule.Delete(ctx)
  978. })
  979. return nil
  980. }
  981. func (self *SManagedVirtualizationRegionDriver) ValidateCreateVpcData(ctx context.Context, userCred mcclient.TokenCredential, input api.VpcCreateInput) (api.VpcCreateInput, error) {
  982. return input, nil
  983. }
  984. func (self *SManagedVirtualizationRegionDriver) GetEipDefaultChargeType() billing_api.TNetChargeType {
  985. return billing_api.NET_CHARGE_TYPE_BY_TRAFFIC
  986. }
  987. func (self *SManagedVirtualizationRegionDriver) ValidateEipChargeType(chargeType billing_api.TNetChargeType) error {
  988. return nil
  989. }
  990. func (self *SManagedVirtualizationRegionDriver) ValidateCreateEipData(ctx context.Context, userCred mcclient.TokenCredential, input *api.SElasticipCreateInput) error {
  991. return nil
  992. }
  993. func (self *SManagedVirtualizationRegionDriver) RequestCreateVpc(ctx context.Context, userCred mcclient.TokenCredential, region *models.SCloudregion, vpc *models.SVpc, task taskman.ITask) error {
  994. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  995. iregion, err := vpc.GetIRegion(ctx)
  996. if err != nil {
  997. return nil, errors.Wrap(err, "vpc.GetIRegion")
  998. }
  999. opts := &cloudprovider.VpcCreateOptions{
  1000. NAME: vpc.Name,
  1001. CIDR: vpc.CidrBlock,
  1002. Desc: vpc.Description,
  1003. }
  1004. ivpc, err := iregion.CreateIVpc(opts)
  1005. if err != nil {
  1006. return nil, errors.Wrap(err, "iregion.CreateIVpc")
  1007. }
  1008. db.SetExternalId(vpc, userCred, ivpc.GetGlobalId())
  1009. err = cloudprovider.WaitStatus(ivpc, api.VPC_STATUS_AVAILABLE, 10*time.Second, 300*time.Second)
  1010. if err != nil {
  1011. return nil, errors.Wrap(err, "cloudprovider.WaitStatus")
  1012. }
  1013. if ivpc.IsSupportSetExternalAccess() && vpc.ExternalAccessMode == api.VPC_EXTERNAL_ACCESS_MODE_EIP {
  1014. igw, err := iregion.CreateInternetGateway()
  1015. if err != nil {
  1016. return nil, errors.Wrap(err, "vpc.AttachInternetGateway")
  1017. }
  1018. err = ivpc.AttachInternetGateway(igw.GetId())
  1019. if err != nil {
  1020. return nil, errors.Wrap(err, "vpc.AttachInternetGateway")
  1021. }
  1022. }
  1023. err = vpc.SyncRemoteWires(ctx, userCred)
  1024. if err != nil {
  1025. return nil, errors.Wrap(err, "vpc.SyncRemoteWires")
  1026. }
  1027. err = vpc.SyncWithCloudVpc(ctx, userCred, ivpc, nil)
  1028. if err != nil {
  1029. return nil, errors.Wrap(err, "vpc.SyncWithCloudVpc")
  1030. }
  1031. return nil, nil
  1032. })
  1033. return nil
  1034. }
  1035. func (self *SManagedVirtualizationRegionDriver) RequestDeleteVpc(ctx context.Context, userCred mcclient.TokenCredential, region *models.SCloudregion, vpc *models.SVpc, task taskman.ITask) error {
  1036. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  1037. secgroups, err := vpc.GetSecurityGroups()
  1038. if err != nil {
  1039. return nil, errors.Wrapf(err, "GetSecurityGroups")
  1040. }
  1041. for i := range secgroups {
  1042. iGroup, err := secgroups[i].GetISecurityGroup(ctx)
  1043. if err != nil {
  1044. if errors.Cause(err) == cloudprovider.ErrNotFound {
  1045. continue
  1046. }
  1047. return nil, errors.Wrapf(err, "GetISecurityGroup")
  1048. }
  1049. err = iGroup.Delete()
  1050. if err != nil && errors.Cause(err) != cloudprovider.ErrNotSupported {
  1051. return nil, errors.Wrapf(err, "delete secgroup %s", secgroups[i].Name)
  1052. }
  1053. err = secgroups[i].RealDelete(ctx, userCred)
  1054. if err != nil {
  1055. return nil, errors.Wrapf(err, "real delete secgroup %s", secgroups[i].Name)
  1056. }
  1057. }
  1058. ivpc, err := vpc.GetIVpc(ctx)
  1059. if err != nil {
  1060. if errors.Cause(err) == cloudprovider.ErrNotFound {
  1061. // already deleted, do nothing
  1062. return nil, nil
  1063. }
  1064. return nil, errors.Wrap(err, "GetIVpc")
  1065. }
  1066. err = ivpc.Delete()
  1067. if err != nil {
  1068. return nil, errors.Wrap(err, "Delete")
  1069. }
  1070. err = cloudprovider.WaitDeleted(ivpc, 10*time.Second, 300*time.Second)
  1071. if err != nil {
  1072. return nil, errors.Wrap(err, "cloudprovider.WaitDeleted")
  1073. }
  1074. return nil, nil
  1075. })
  1076. return nil
  1077. }
  1078. func (self *SManagedVirtualizationRegionDriver) ValidateSnapshotDelete(ctx context.Context, snapshot *models.SSnapshot) error {
  1079. return nil
  1080. }
  1081. func (self *SManagedVirtualizationRegionDriver) RequestDeleteSnapshot(ctx context.Context, snapshot *models.SSnapshot, task taskman.ITask) error {
  1082. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  1083. cloudRegion, err := snapshot.GetISnapshotRegion(ctx)
  1084. if err != nil {
  1085. return nil, err
  1086. }
  1087. cloudSnapshot, err := cloudRegion.GetISnapshotById(snapshot.ExternalId)
  1088. if err != nil {
  1089. if errors.Cause(err) == cloudprovider.ErrNotFound {
  1090. return nil, nil
  1091. }
  1092. return nil, err
  1093. }
  1094. if err := cloudSnapshot.Delete(); err != nil {
  1095. return nil, err
  1096. }
  1097. if err := cloudprovider.WaitDeleted(cloudSnapshot, 10*time.Second, 300*time.Second); err != nil {
  1098. return nil, err
  1099. }
  1100. return nil, nil
  1101. })
  1102. return nil
  1103. }
  1104. func (self *SManagedVirtualizationRegionDriver) ValidateCreateSnapshotData(ctx context.Context, userCred mcclient.TokenCredential, disk *models.SDisk, storage *models.SStorage, input *api.SnapshotCreateInput) error {
  1105. return nil
  1106. }
  1107. func (self *SManagedVirtualizationRegionDriver) RequestCreateSnapshot(ctx context.Context, snapshot *models.SSnapshot, task taskman.ITask) error {
  1108. disk, err := snapshot.GetDisk()
  1109. if err != nil {
  1110. return err
  1111. }
  1112. iDisk, err := disk.GetIDisk(ctx)
  1113. if err != nil {
  1114. return err
  1115. }
  1116. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  1117. iSnapshot, err := iDisk.CreateISnapshot(ctx, snapshot.Name, "")
  1118. if err != nil {
  1119. return nil, err
  1120. }
  1121. _, err = db.Update(snapshot, func() error {
  1122. snapshot.Size = int(iSnapshot.GetSizeMb())
  1123. snapshot.VirtualSize = int(iSnapshot.GetSizeMb())
  1124. snapshot.ExternalId = iSnapshot.GetGlobalId()
  1125. return nil
  1126. })
  1127. return nil, err
  1128. })
  1129. return nil
  1130. }
  1131. func (self *SManagedVirtualizationRegionDriver) RequestCreateInstanceSnapshot(ctx context.Context, guest *models.SGuest, isp *models.SInstanceSnapshot, task taskman.ITask, params *jsonutils.JSONDict) error {
  1132. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  1133. return nil, nil
  1134. })
  1135. return nil
  1136. }
  1137. func (self *SManagedVirtualizationRegionDriver) RequestDeleteInstanceSnapshot(ctx context.Context, isp *models.SInstanceSnapshot, task taskman.ITask) error {
  1138. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  1139. return nil, nil
  1140. })
  1141. return nil
  1142. }
  1143. func (self *SManagedVirtualizationRegionDriver) RequestResetToInstanceSnapshot(ctx context.Context, guest *models.SGuest, isp *models.SInstanceSnapshot, task taskman.ITask, params *jsonutils.JSONDict) error {
  1144. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  1145. return nil, nil
  1146. })
  1147. return nil
  1148. }
  1149. func (self *SManagedVirtualizationRegionDriver) GetDiskResetParams(snapshot *models.SSnapshot) *jsonutils.JSONDict {
  1150. params := jsonutils.NewDict()
  1151. params.Set("snapshot_id", jsonutils.NewString(snapshot.ExternalId))
  1152. return params
  1153. }
  1154. func (self *SManagedVirtualizationRegionDriver) OnDiskReset(ctx context.Context, userCred mcclient.TokenCredential,
  1155. disk *models.SDisk, snapshot *models.SSnapshot, data jsonutils.JSONObject) error {
  1156. return nil
  1157. }
  1158. func (self *SManagedVirtualizationRegionDriver) OnSnapshotDelete(ctx context.Context, snapshot *models.SSnapshot, task taskman.ITask, data jsonutils.JSONObject) error {
  1159. task.SetStage("OnManagedSnapshotDelete", nil)
  1160. task.ScheduleRun(data)
  1161. return nil
  1162. }
  1163. func (self *SManagedVirtualizationRegionDriver) RequestAssociateEipForNAT(ctx context.Context, userCred mcclient.TokenCredential, nat *models.SNatGateway, eip *models.SElasticip, task taskman.ITask) error {
  1164. opts := api.ElasticipAssociateInput{
  1165. InstanceType: api.EIP_ASSOCIATE_TYPE_NAT_GATEWAY,
  1166. InstanceId: nat.Id,
  1167. }
  1168. return eip.StartEipAssociateTask(ctx, userCred, jsonutils.Marshal(opts).(*jsonutils.JSONDict), task.GetTaskId())
  1169. }
  1170. func (self *SManagedVirtualizationRegionDriver) RequestCreateDBInstance(ctx context.Context, userCred mcclient.TokenCredential, dbinstance *models.SDBInstance, task taskman.ITask) error {
  1171. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  1172. iregion, err := dbinstance.GetIRegion(ctx)
  1173. if err != nil {
  1174. return nil, errors.Wrap(err, "GetIRegionAndProvider")
  1175. }
  1176. vpc, err := dbinstance.GetVpc()
  1177. if err != nil {
  1178. return nil, errors.Wrap(err, "dbinstance.GetVpc()")
  1179. }
  1180. input := api.DBInstanceCreateInput{}
  1181. task.GetParams().Unmarshal(&input)
  1182. if len(input.Password) == 0 && jsonutils.QueryBoolean(task.GetParams(), "reset_password", true) {
  1183. input.Password = seclib2.RandomPassword2(12)
  1184. }
  1185. desc := cloudprovider.SManagedDBInstanceCreateConfig{
  1186. Name: dbinstance.Name,
  1187. Description: dbinstance.Description,
  1188. StorageType: dbinstance.StorageType,
  1189. DiskSizeGB: dbinstance.DiskSizeGB,
  1190. VcpuCount: dbinstance.VcpuCount,
  1191. VmemSizeMb: dbinstance.VmemSizeMb,
  1192. VpcId: vpc.ExternalId,
  1193. Engine: dbinstance.Engine,
  1194. EngineVersion: dbinstance.EngineVersion,
  1195. Category: dbinstance.Category,
  1196. Port: dbinstance.Port,
  1197. Password: input.Password,
  1198. MultiAz: input.MultiAZ,
  1199. }
  1200. desc.Tags, _ = dbinstance.GetAllUserMetadata()
  1201. networks, err := dbinstance.GetDBNetworks()
  1202. if err != nil {
  1203. return nil, errors.Wrapf(err, "dbinstance.GetDBNetworks")
  1204. }
  1205. if len(networks) > 0 {
  1206. net, err := networks[0].GetNetwork()
  1207. if err != nil {
  1208. return nil, errors.Wrapf(err, "GetNetwork")
  1209. }
  1210. desc.NetworkId, desc.Address = net.ExternalId, networks[0].IpAddr
  1211. }
  1212. _cloudprovider := dbinstance.GetCloudprovider()
  1213. desc.ProjectId, err = _cloudprovider.SyncProject(ctx, userCred, dbinstance.ProjectId)
  1214. if err != nil {
  1215. if errors.Cause(err) != cloudprovider.ErrNotSupported && errors.Cause(err) != cloudprovider.ErrNotImplemented {
  1216. logclient.AddSimpleActionLog(dbinstance, logclient.ACT_SYNC_CLOUD_PROJECT, err, userCred, false)
  1217. }
  1218. }
  1219. region, err := dbinstance.GetRegion()
  1220. if err != nil {
  1221. return nil, err
  1222. }
  1223. err = region.GetDriver().InitDBInstanceUser(ctx, dbinstance, task, &desc)
  1224. if err != nil {
  1225. return nil, err
  1226. }
  1227. secgroups, err := dbinstance.GetSecgroups()
  1228. if err != nil {
  1229. return nil, errors.Wrapf(err, "GetSecgroups")
  1230. }
  1231. driver := region.GetDriver()
  1232. ownerId := dbinstance.GetOwnerId()
  1233. for i := range secgroups {
  1234. if secgroups[i].Id == api.SECGROUP_DEFAULT_ID {
  1235. filter, err := driver.GetSecurityGroupFilter(vpc)
  1236. if err != nil {
  1237. return nil, errors.Wrapf(err, "GetSecurityGroupFilter")
  1238. }
  1239. group, err := vpc.GetDefaultSecurityGroup(ownerId, filter)
  1240. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  1241. return nil, err
  1242. }
  1243. if gotypes.IsNil(group) {
  1244. group, err = driver.CreateDefaultSecurityGroup(ctx, userCred, ownerId, vpc)
  1245. if err != nil {
  1246. return nil, errors.Wrapf(err, "CreateDefaultSecurityGroup")
  1247. }
  1248. }
  1249. if !utils.IsInStringArray(group.ExternalId, desc.SecgroupIds) {
  1250. desc.SecgroupIds = append(desc.SecgroupIds, group.ExternalId)
  1251. }
  1252. continue
  1253. }
  1254. if !utils.IsInStringArray(secgroups[i].ExternalId, desc.SecgroupIds) {
  1255. desc.SecgroupIds = append(desc.SecgroupIds, secgroups[i].ExternalId)
  1256. }
  1257. }
  1258. if dbinstance.BillingType == billing_api.BILLING_TYPE_PREPAID {
  1259. bc, err := billing.ParseBillingCycle(dbinstance.BillingCycle)
  1260. if err != nil {
  1261. log.Errorf("failed to parse billing cycle %s: %v", dbinstance.BillingCycle, err)
  1262. } else if bc.IsValid() {
  1263. desc.BillingCycle = &bc
  1264. desc.BillingCycle.AutoRenew = dbinstance.AutoRenew
  1265. }
  1266. }
  1267. if len(dbinstance.MasterInstanceId) > 0 {
  1268. master, err := dbinstance.GetMasterInstance()
  1269. if err != nil {
  1270. return nil, errors.Wrap(err, "dbinstnace.GetMasterInstance()")
  1271. }
  1272. desc.MasterInstanceId = master.ExternalId
  1273. }
  1274. instanceTypes, err := dbinstance.GetAvailableInstanceTypes()
  1275. if err != nil {
  1276. return nil, errors.Wrapf(err, "GetAvailableInstanceTypes")
  1277. }
  1278. if len(instanceTypes) == 0 {
  1279. return nil, fmt.Errorf("no avaiable sku for create")
  1280. }
  1281. var createFunc = func() (cloudprovider.ICloudDBInstance, error) {
  1282. errMsgs := []string{}
  1283. for i := range instanceTypes {
  1284. desc.SInstanceType = instanceTypes[i]
  1285. log.Debugf("create dbinstance params: %s", jsonutils.Marshal(desc).String())
  1286. iRds, err := iregion.CreateIDBInstance(&desc)
  1287. if err != nil {
  1288. errMsgs = append(errMsgs, err.Error())
  1289. continue
  1290. }
  1291. return iRds, nil
  1292. }
  1293. if len(errMsgs) > 0 {
  1294. return nil, fmt.Errorf("%s", strings.Join(errMsgs, "\n"))
  1295. }
  1296. return nil, fmt.Errorf("no avaiable skus %s(%dC%d) for create", dbinstance.InstanceType, desc.VcpuCount, desc.VmemSizeMb)
  1297. }
  1298. iRds, err := createFunc()
  1299. if err != nil {
  1300. return nil, errors.Wrapf(err, "create")
  1301. }
  1302. err = db.SetExternalId(dbinstance, userCred, iRds.GetGlobalId())
  1303. if err != nil {
  1304. return nil, errors.Wrapf(err, "db.SetExternalId")
  1305. }
  1306. err = cloudprovider.WaitStatus(iRds, api.DBINSTANCE_RUNNING, time.Second*10, time.Hour*1)
  1307. if err != nil {
  1308. return nil, errors.Wrapf(err, "cloudprovider.WaitStatus runing")
  1309. }
  1310. secgroupIds, err := iRds.GetSecurityGroupIds()
  1311. if err == nil && len(secgroupIds) != len(desc.SecgroupIds) {
  1312. err = iRds.SetSecurityGroups(desc.SecgroupIds)
  1313. if err != nil && errors.Cause(err) != cloudprovider.ErrNotImplemented {
  1314. logclient.AddSimpleActionLog(dbinstance, logclient.ACT_SYNC_CONF, map[string][]string{"secgroup_ids": desc.SecgroupIds}, userCred, false)
  1315. }
  1316. }
  1317. return nil, nil
  1318. })
  1319. return nil
  1320. }
  1321. func (self *SManagedVirtualizationRegionDriver) RequestCreateDBInstanceFromBackup(ctx context.Context, userCred mcclient.TokenCredential, rds *models.SDBInstance, task taskman.ITask) error {
  1322. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  1323. _backup, err := models.DBInstanceBackupManager.FetchById(rds.DBInstancebackupId)
  1324. if err != nil {
  1325. return nil, errors.Wrapf(err, "DBInstanceBackupManager.FetchById(%s)", rds.DBInstancebackupId)
  1326. }
  1327. backup := _backup.(*models.SDBInstanceBackup)
  1328. iBackup, err := backup.GetIDBInstanceBackup(ctx)
  1329. if err != nil {
  1330. return nil, errors.Wrapf(err, "backup.GetIDBInstanceBackup")
  1331. }
  1332. vpc, err := rds.GetVpc()
  1333. if err != nil {
  1334. return nil, errors.Wrap(err, "rds.GetVpc()")
  1335. }
  1336. params := task.GetParams()
  1337. passwd, _ := params.GetString("password")
  1338. if len(passwd) == 0 && jsonutils.QueryBoolean(params, "reset_password", true) {
  1339. passwd = seclib2.RandomPassword2(12)
  1340. }
  1341. desc := cloudprovider.SManagedDBInstanceCreateConfig{
  1342. Name: rds.Name,
  1343. Description: rds.Description,
  1344. StorageType: rds.StorageType,
  1345. DiskSizeGB: rds.DiskSizeGB,
  1346. VcpuCount: rds.VcpuCount,
  1347. VmemSizeMb: rds.VmemSizeMb,
  1348. VpcId: vpc.ExternalId,
  1349. Engine: rds.Engine,
  1350. EngineVersion: rds.EngineVersion,
  1351. Category: rds.Category,
  1352. Port: rds.Port,
  1353. Password: passwd,
  1354. }
  1355. if len(backup.DBInstanceId) > 0 {
  1356. parentRds, err := backup.GetDBInstance()
  1357. if err != nil {
  1358. return nil, errors.Wrapf(err, "backup.GetDBInstance")
  1359. }
  1360. desc.RdsId = parentRds.ExternalId
  1361. }
  1362. log.Debugf("create from backup params: %s", jsonutils.Marshal(desc).String())
  1363. networks, err := rds.GetDBNetworks()
  1364. if err != nil {
  1365. return nil, errors.Wrapf(err, "dbinstance.GetDBNetworks")
  1366. }
  1367. if len(networks) > 0 {
  1368. net, err := networks[0].GetNetwork()
  1369. if err != nil {
  1370. return nil, errors.Wrapf(err, "GetNetwork")
  1371. }
  1372. desc.NetworkId, desc.Address = net.ExternalId, networks[0].IpAddr
  1373. }
  1374. _cloudprovider := rds.GetCloudprovider()
  1375. desc.ProjectId, err = _cloudprovider.SyncProject(ctx, userCred, rds.ProjectId)
  1376. if err != nil {
  1377. if errors.Cause(err) != cloudprovider.ErrNotSupported && errors.Cause(err) != cloudprovider.ErrNotImplemented {
  1378. logclient.AddSimpleActionLog(rds, logclient.ACT_SYNC_CLOUD_PROJECT, err, userCred, false)
  1379. }
  1380. }
  1381. region, err := rds.GetRegion()
  1382. if err != nil {
  1383. return nil, err
  1384. }
  1385. err = region.GetDriver().InitDBInstanceUser(ctx, rds, task, &desc)
  1386. if err != nil {
  1387. return nil, err
  1388. }
  1389. secgroups, err := rds.GetSecgroups()
  1390. if err != nil {
  1391. return nil, errors.Wrapf(err, "GetSecgroups")
  1392. }
  1393. driver := region.GetDriver()
  1394. ownerId := rds.GetOwnerId()
  1395. for i := range secgroups {
  1396. if secgroups[i].Id == api.SECGROUP_DEFAULT_ID {
  1397. filter, err := driver.GetSecurityGroupFilter(vpc)
  1398. if err != nil {
  1399. return nil, errors.Wrapf(err, "GetSecurityGroupFilter")
  1400. }
  1401. group, err := vpc.GetDefaultSecurityGroup(ownerId, filter)
  1402. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  1403. return nil, err
  1404. }
  1405. if gotypes.IsNil(group) {
  1406. group, err = driver.CreateDefaultSecurityGroup(ctx, userCred, ownerId, vpc)
  1407. if err != nil {
  1408. return nil, errors.Wrapf(err, "CreateDefaultSecurityGroup")
  1409. }
  1410. }
  1411. if !utils.IsInStringArray(group.ExternalId, desc.SecgroupIds) {
  1412. desc.SecgroupIds = append(desc.SecgroupIds, group.ExternalId)
  1413. }
  1414. continue
  1415. }
  1416. if !utils.IsInStringArray(secgroups[i].ExternalId, desc.SecgroupIds) {
  1417. desc.SecgroupIds = append(desc.SecgroupIds, secgroups[i].ExternalId)
  1418. }
  1419. }
  1420. if rds.BillingType == billing_api.BILLING_TYPE_PREPAID {
  1421. bc, err := billing.ParseBillingCycle(rds.BillingCycle)
  1422. if err != nil {
  1423. log.Errorf("failed to parse billing cycle %s: %v", rds.BillingCycle, err)
  1424. } else if bc.IsValid() {
  1425. desc.BillingCycle = &bc
  1426. desc.BillingCycle.AutoRenew = rds.AutoRenew
  1427. }
  1428. }
  1429. instanceTypes, err := rds.GetAvailableInstanceTypes()
  1430. if err != nil {
  1431. return nil, errors.Wrapf(err, "GetAvailableInstanceTypes")
  1432. }
  1433. if len(instanceTypes) == 0 {
  1434. return nil, fmt.Errorf("no avaiable sku for create")
  1435. }
  1436. var createFunc = func() (cloudprovider.ICloudDBInstance, error) {
  1437. errMsgs := []string{}
  1438. for i := range instanceTypes {
  1439. desc.SInstanceType = instanceTypes[i]
  1440. log.Debugf("create dbinstance params: %s", jsonutils.Marshal(desc).String())
  1441. iRds, err := iBackup.CreateICloudDBInstance(&desc)
  1442. if err != nil {
  1443. errMsgs = append(errMsgs, err.Error())
  1444. continue
  1445. }
  1446. return iRds, nil
  1447. }
  1448. if len(errMsgs) > 0 {
  1449. return nil, fmt.Errorf("%s", strings.Join(errMsgs, "\n"))
  1450. }
  1451. return nil, fmt.Errorf("no avaiable skus %s(%dC%d) for create", rds.InstanceType, desc.VcpuCount, desc.VmemSizeMb)
  1452. }
  1453. iRds, err := createFunc()
  1454. if err != nil {
  1455. return nil, errors.Wrapf(err, "create")
  1456. }
  1457. err = db.SetExternalId(rds, userCred, iRds.GetGlobalId())
  1458. if err != nil {
  1459. return nil, errors.Wrapf(err, "db.SetExternalId")
  1460. }
  1461. err = cloudprovider.WaitStatus(iRds, api.DBINSTANCE_RUNNING, time.Second*5, time.Hour*1)
  1462. if err != nil {
  1463. return nil, errors.Wrapf(err, "cloudprovider.WaitStatus runing")
  1464. }
  1465. return nil, nil
  1466. })
  1467. return nil
  1468. }
  1469. func (self *SManagedVirtualizationRegionDriver) RequestCreateElasticcache(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask, data *jsonutils.JSONDict) error {
  1470. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  1471. iRegion, err := ec.GetIRegion(ctx)
  1472. if err != nil {
  1473. return nil, errors.Wrap(err, "GetIRegion")
  1474. }
  1475. iprovider, err := db.FetchById(models.CloudproviderManager, ec.GetCloudproviderId())
  1476. if err != nil {
  1477. return nil, errors.Wrap(err, "GetProvider")
  1478. }
  1479. vpc, err := ec.GetVpc()
  1480. if err != nil {
  1481. return nil, errors.Wrapf(err, "GetVpc")
  1482. }
  1483. networkObj, err := db.FetchById(models.NetworkManager, ec.NetworkId)
  1484. if err != nil {
  1485. return nil, errors.Wrap(err, "GetNetwork")
  1486. }
  1487. network := networkObj.(*models.SNetwork)
  1488. params := &cloudprovider.SCloudElasticCacheInput{
  1489. InstanceType: ec.InstanceType,
  1490. InstanceName: ec.Name,
  1491. Engine: ec.Engine,
  1492. EngineVersion: ec.EngineVersion,
  1493. PrivateIpAddress: ec.PrivateIpAddr,
  1494. CapacityGB: int64(ec.CapacityMB / 1024),
  1495. NodeType: ec.NodeType,
  1496. NetworkType: ec.NetworkType,
  1497. VpcId: vpc.ExternalId,
  1498. NetworkId: network.ExternalId,
  1499. MaintainBegin: ec.MaintainStartTime,
  1500. MaintainEnd: ec.MaintainEndTime,
  1501. }
  1502. params.Password, _ = task.GetParams().GetString("password")
  1503. if ec.BillingType == billing_api.BILLING_TYPE_PREPAID {
  1504. bc, err := billing.ParseBillingCycle(ec.BillingCycle)
  1505. if err != nil {
  1506. return nil, errors.Wrapf(err, "ParseBillingCycle(%s)", ec.BillingCycle)
  1507. }
  1508. bc.AutoRenew = ec.AutoRenew
  1509. params.BillingCycle = &bc
  1510. }
  1511. params.Tags, _ = ec.GetAllUserMetadata()
  1512. zone, err := ec.GetZone()
  1513. if zone != nil {
  1514. izone, err := iRegion.GetIZoneById(zone.ExternalId)
  1515. if err != nil {
  1516. return nil, errors.Wrapf(err, "GetIZoneById(%s)", zone.ExternalId)
  1517. }
  1518. params.ZoneIds = []string{izone.GetId()}
  1519. }
  1520. slaveZones, err := ec.GetSlaveZones()
  1521. if err != nil {
  1522. return nil, errors.Wrapf(err, "GetSlaveZones")
  1523. }
  1524. for i := range slaveZones {
  1525. izone, err := iRegion.GetIZoneById(slaveZones[i].ExternalId)
  1526. if err != nil {
  1527. return nil, errors.Wrapf(err, "GetSlaveZoneBy(%s)", slaveZones[i].ExternalId)
  1528. }
  1529. if !utils.IsInStringArray(izone.GetId(), params.ZoneIds) {
  1530. params.ZoneIds = append(params.ZoneIds, izone.GetId())
  1531. }
  1532. }
  1533. data.Unmarshal(&params.SecurityGroupIds, "ext_secgroup_ids")
  1534. provider := iprovider.(*models.SCloudprovider)
  1535. params.ProjectId, err = provider.SyncProject(ctx, userCred, ec.ProjectId)
  1536. if err != nil {
  1537. if errors.Cause(err) != cloudprovider.ErrNotSupported && errors.Cause(err) != cloudprovider.ErrNotImplemented {
  1538. logclient.AddSimpleActionLog(ec, logclient.ACT_SYNC_CLOUD_PROJECT, err, userCred, false)
  1539. }
  1540. }
  1541. iec, err := iRegion.CreateIElasticcaches(params)
  1542. if err != nil {
  1543. return nil, errors.Wrap(err, "CreateIElasticcaches")
  1544. }
  1545. err = db.SetExternalId(ec, userCred, iec.GetGlobalId())
  1546. if err != nil {
  1547. return nil, errors.Wrap(err, "SetExternalId")
  1548. }
  1549. err = cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 30*time.Second, 15*time.Second, 30*time.Minute)
  1550. if err != nil {
  1551. return nil, errors.Wrap(err, "WaitStatusWithDelay")
  1552. }
  1553. err = ec.SyncWithCloudElasticcache(ctx, userCred, provider, iec)
  1554. if err != nil {
  1555. return nil, errors.Wrap(err, "SyncWithCloudElasticcache")
  1556. }
  1557. // sync accounts
  1558. {
  1559. iaccounts, err := iec.GetICloudElasticcacheAccounts()
  1560. if err != nil {
  1561. return nil, errors.Wrap(err, "GetICloudElasticcacheAccounts")
  1562. }
  1563. models.ElasticcacheAccountManager.SyncElasticcacheAccounts(ctx, userCred, ec, iaccounts)
  1564. account, err := ec.GetAdminAccount()
  1565. if err == nil {
  1566. account.SavePassword(params.Password)
  1567. }
  1568. }
  1569. // sync acl
  1570. {
  1571. iacls, err := iec.GetICloudElasticcacheAcls()
  1572. if err != nil {
  1573. if !(errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented) {
  1574. return nil, errors.Wrap(err, "GetICloudElasticcacheAcls")
  1575. }
  1576. models.ElasticcacheAclManager.SyncElasticcacheAcls(ctx, userCred, ec, iacls)
  1577. }
  1578. }
  1579. // sync parameters
  1580. {
  1581. iparams, err := iec.GetICloudElasticcacheParameters()
  1582. if err != nil {
  1583. if !(errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotSupported) {
  1584. return nil, errors.Wrap(err, "GetICloudElasticcacheParameters")
  1585. }
  1586. models.ElasticcacheParameterManager.SyncElasticcacheParameters(ctx, userCred, ec, iparams)
  1587. }
  1588. }
  1589. return nil, nil
  1590. })
  1591. return nil
  1592. }
  1593. func (self *SManagedVirtualizationRegionDriver) ValidateCreateElasticcacheData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, input *api.ElasticcacheCreateInput) (*api.ElasticcacheCreateInput, error) {
  1594. if len(input.ManagerId) == 0 {
  1595. return nil, httperrors.NewMissingParameterError("manager_id")
  1596. }
  1597. if len(input.NetworkType) == 0 {
  1598. input.NetworkType = api.LB_NETWORK_TYPE_VPC
  1599. }
  1600. return input, nil
  1601. }
  1602. func (self *SManagedVirtualizationRegionDriver) RequestRestartElasticcache(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1603. iregion, err := ec.GetIRegion(ctx)
  1604. if err != nil {
  1605. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestRestartElasticcache.GetIRegion")
  1606. }
  1607. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1608. if err != nil {
  1609. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestRestartElasticcache.GetIElasticcacheById")
  1610. }
  1611. err = iec.Restart()
  1612. if err != nil {
  1613. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestRestartElasticcache.Restart")
  1614. }
  1615. err = cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 10*time.Second, 10*time.Second, 1800*time.Second)
  1616. if err != nil {
  1617. return err
  1618. }
  1619. return ec.SetStatus(ctx, userCred, api.ELASTIC_CACHE_STATUS_RUNNING, "")
  1620. }
  1621. func (self *SManagedVirtualizationRegionDriver) RequestSyncElasticcache(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1622. iregion, err := ec.GetIRegion(ctx)
  1623. if err != nil {
  1624. return errors.Wrap(err, "GetIRegion")
  1625. }
  1626. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1627. if err != nil {
  1628. return errors.Wrap(err, "GetIElasticcacheById")
  1629. }
  1630. provider := ec.GetCloudprovider()
  1631. if provider == nil {
  1632. return errors.Wrap(fmt.Errorf("provider is nil"), "GetCloudprovider")
  1633. }
  1634. lockman.LockRawObject(ctx, "elastic-cache", ec.Id)
  1635. defer lockman.ReleaseRawObject(ctx, "elastic-cache", ec.Id)
  1636. err = ec.SyncWithCloudElasticcache(ctx, userCred, provider, iec)
  1637. if err != nil {
  1638. return errors.Wrap(err, "SyncWithCloudElasticcache")
  1639. }
  1640. if fullsync, _ := task.GetParams().Bool("full"); fullsync {
  1641. lockman.LockObject(ctx, ec)
  1642. defer lockman.ReleaseObject(ctx, ec)
  1643. parameters, err := iec.GetICloudElasticcacheParameters()
  1644. if err != nil {
  1645. if !(errors.Cause(err) == cloudprovider.ErrNotImplemented || errors.Cause(err) == cloudprovider.ErrNotSupported) {
  1646. return errors.Wrapf(err, "GetICloudElasticcacheParameters")
  1647. }
  1648. result := models.ElasticcacheParameterManager.SyncElasticcacheParameters(ctx, userCred, ec, parameters)
  1649. log.Infof("SyncElasticcacheParameters %s", result.Result())
  1650. }
  1651. // acl
  1652. acls, err := iec.GetICloudElasticcacheAcls()
  1653. if err != nil {
  1654. if !(errors.Cause(err) == cloudprovider.ErrNotImplemented || errors.Cause(err) == cloudprovider.ErrNotSupported) {
  1655. return errors.Wrapf(err, "GetICloudElasticcacheAcls")
  1656. }
  1657. result := models.ElasticcacheAclManager.SyncElasticcacheAcls(ctx, userCred, ec, acls)
  1658. log.Infof("SyncElasticcacheAcls %s", result.Result())
  1659. }
  1660. // account
  1661. accounts, err := iec.GetICloudElasticcacheAccounts()
  1662. if err != nil {
  1663. if !(errors.Cause(err) == cloudprovider.ErrNotImplemented || errors.Cause(err) == cloudprovider.ErrNotSupported) {
  1664. return errors.Wrapf(err, "GetICloudElasticcacheAccounts")
  1665. }
  1666. result := models.ElasticcacheAccountManager.SyncElasticcacheAccounts(ctx, userCred, ec, accounts)
  1667. log.Infof("SyncElasticcacheAccounts %s", result.Result())
  1668. }
  1669. // backups
  1670. backups, err := iec.GetICloudElasticcacheBackups()
  1671. if err != nil {
  1672. if !(errors.Cause(err) == cloudprovider.ErrNotImplemented || errors.Cause(err) == cloudprovider.ErrNotSupported) {
  1673. return errors.Wrapf(err, "GetICloudElasticcacheAccounts")
  1674. }
  1675. result := models.ElasticcacheBackupManager.SyncElasticcacheBackups(ctx, userCred, ec, backups)
  1676. log.Infof("SyncElasticcacheBackups %s", result.Result())
  1677. }
  1678. }
  1679. return nil
  1680. }
  1681. func (self *SManagedVirtualizationRegionDriver) RequestDeleteElasticcache(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1682. if len(ec.ExternalId) == 0 {
  1683. return nil
  1684. }
  1685. iregion, err := ec.GetIRegion(ctx)
  1686. if err != nil {
  1687. return errors.Wrap(err, "GetIRegion")
  1688. }
  1689. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1690. if errors.Cause(err) == cloudprovider.ErrNotFound {
  1691. return nil
  1692. } else if err != nil {
  1693. return errors.Wrap(err, "GetIElasticcacheById")
  1694. }
  1695. err = iec.Delete()
  1696. if err != nil {
  1697. return errors.Wrap(err, "Delete")
  1698. }
  1699. return cloudprovider.WaitDeleted(iec, 10*time.Second, 10*time.Minute)
  1700. }
  1701. func (self *SManagedVirtualizationRegionDriver) RequestSetElasticcacheMaintainTime(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1702. mStart, err := task.GetParams().GetString("maintain_start_time")
  1703. if err != nil {
  1704. return errors.Wrap(fmt.Errorf("missing parameter maintain_start_time"), "managedVirtualizationRegionDriver.RequestSetElasticcacheMaintainTime")
  1705. }
  1706. mEnd, err := task.GetParams().GetString("maintain_end_time")
  1707. if err != nil {
  1708. return errors.Wrap(fmt.Errorf("missing parameter maintain_end_time"), "managedVirtualizationRegionDriver.RequestSetElasticcacheMaintainTime")
  1709. }
  1710. iregion, err := ec.GetIRegion(ctx)
  1711. if err != nil {
  1712. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestSetElasticcacheMaintainTime.GetIRegion")
  1713. }
  1714. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1715. if err != nil {
  1716. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestSetElasticcacheMaintainTime.GetIElasticcacheById")
  1717. }
  1718. err = iec.SetMaintainTime(mStart, mEnd)
  1719. if err != nil {
  1720. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestSetElasticcacheMaintainTime.SetMaintainTime")
  1721. }
  1722. return cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 10*time.Second, 10*time.Second, 300*time.Second)
  1723. }
  1724. func (self *SManagedVirtualizationRegionDriver) RequestElasticcacheChangeSpec(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1725. sku, err := task.GetParams().GetString("sku_ext_id")
  1726. if err != nil {
  1727. return errors.Wrap(fmt.Errorf("missing parameter sku"), "managedVirtualizationRegionDriver.RequestElasticcacheChangeSpec")
  1728. }
  1729. provider := ec.GetCloudprovider()
  1730. if provider == nil {
  1731. return errors.Wrap(fmt.Errorf("provider is nil"), "managedVirtualizationRegionDriver.RequestElasticcacheChangeSpec.GetCloudprovider")
  1732. }
  1733. iregion, err := ec.GetIRegion(ctx)
  1734. if err != nil {
  1735. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheChangeSpec.GetIRegion")
  1736. }
  1737. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1738. if err != nil {
  1739. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheChangeSpec.GetIElasticcacheById")
  1740. }
  1741. err = iec.ChangeInstanceSpec(sku)
  1742. if err != nil {
  1743. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheChangeSpec.ChangeInstanceSpec")
  1744. }
  1745. err = cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 10*time.Second, 10*time.Second, 1800*time.Second)
  1746. if err != nil {
  1747. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheChangeSpec.ChangeInstanceSpec")
  1748. }
  1749. err = ec.SyncWithCloudElasticcache(ctx, userCred, provider, iec)
  1750. if err != nil {
  1751. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheChangeSpec.SyncWithCloudElasticcache")
  1752. }
  1753. return nil
  1754. }
  1755. func (self *SManagedVirtualizationRegionDriver) RequestUpdateElasticcacheAuthMode(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1756. authMode, err := task.GetParams().GetString("auth_mode")
  1757. if err != nil {
  1758. return errors.Wrap(fmt.Errorf("missing parameter auth_mode"), "managedVirtualizationRegionDriver.RequestUpdateElasticcacheAuthMode")
  1759. }
  1760. iregion, err := ec.GetIRegion(ctx)
  1761. if err != nil {
  1762. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestUpdateElasticcacheAuthMode.GetIRegion")
  1763. }
  1764. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1765. if err != nil {
  1766. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestUpdateElasticcacheAuthMode.GetIElasticcacheById")
  1767. }
  1768. noPassword := true
  1769. if authMode == "on" {
  1770. noPassword = false
  1771. }
  1772. err = iec.UpdateAuthMode(noPassword, "")
  1773. if err != nil {
  1774. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestUpdateElasticcacheAuthMode.UpdateAuthMode")
  1775. }
  1776. _, err = db.Update(ec, func() error {
  1777. ec.AuthMode = authMode
  1778. return nil
  1779. })
  1780. if err != nil {
  1781. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestUpdateElasticcacheAuthMode.UpdatedbAuthMode")
  1782. }
  1783. return cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 10*time.Second, 10*time.Second, 600*time.Second)
  1784. }
  1785. func (self *SManagedVirtualizationRegionDriver) RequestUpdateElasticcacheSecgroups(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1786. // todo: finish me
  1787. return nil
  1788. }
  1789. func (self *SManagedVirtualizationRegionDriver) RequestElasticcacheSetMaintainTime(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1790. startTime, err := task.GetParams().GetString("maintain_start_time")
  1791. if err != nil {
  1792. return errors.Wrap(fmt.Errorf("missing parameter maintain_start_time"), "managedVirtualizationRegionDriver.RequestElasticcacheSetMaintainTime")
  1793. }
  1794. endTime, err := task.GetParams().GetString("maintain_end_time")
  1795. if err != nil {
  1796. return errors.Wrap(fmt.Errorf("missing parameter maintain_end_time"), "managedVirtualizationRegionDriver.RequestElasticcacheSetMaintainTime")
  1797. }
  1798. iregion, err := ec.GetIRegion(ctx)
  1799. if err != nil {
  1800. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheSetMaintainTime.GetIRegion")
  1801. }
  1802. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1803. if err != nil {
  1804. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheSetMaintainTime.GetIElasticcacheById")
  1805. }
  1806. err = iec.SetMaintainTime(startTime, endTime)
  1807. if err != nil {
  1808. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheSetMaintainTime.SetMaintainTime")
  1809. }
  1810. // todo: sync instance spec
  1811. return cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 10*time.Second, 10*time.Second, 300*time.Second)
  1812. }
  1813. func (self *SManagedVirtualizationRegionDriver) RequestElasticcacheAllocatePublicConnection(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1814. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  1815. port, _ := task.GetParams().Int("port")
  1816. iregion, err := ec.GetIRegion(ctx)
  1817. if err != nil {
  1818. return nil, errors.Wrap(err, "GerIRegion")
  1819. }
  1820. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1821. if err != nil {
  1822. return nil, errors.Wrapf(err, "GetIElasticcacheById(%s)", ec.ExternalId)
  1823. }
  1824. _, err = iec.AllocatePublicConnection(int(port))
  1825. if err != nil {
  1826. return nil, errors.Wrapf(err, "AllocatePublicConnection(%d)", port)
  1827. }
  1828. err = cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 10*time.Second, 10*time.Second, 300*time.Second)
  1829. if err != nil {
  1830. return nil, errors.Wrap(err, "WaitStatusWithDelay")
  1831. }
  1832. err = ec.SyncWithCloudElasticcache(ctx, task.GetUserCred(), ec.GetCloudprovider(), iec)
  1833. if err != nil {
  1834. return nil, errors.Wrap(err, "SyncWithCloudElasticcache")
  1835. }
  1836. return nil, nil
  1837. })
  1838. return nil
  1839. }
  1840. func (self *SManagedVirtualizationRegionDriver) RequestElasticcacheReleasePublicConnection(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1841. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  1842. iregion, err := ec.GetIRegion(ctx)
  1843. if err != nil {
  1844. return nil, errors.Wrap(err, "GetIRegion")
  1845. }
  1846. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1847. if err != nil {
  1848. return nil, errors.Wrapf(err, "GetIElasticcacheById(%s)", ec.ExternalId)
  1849. }
  1850. err = iec.ReleasePublicConnection()
  1851. if err != nil {
  1852. return nil, errors.Wrap(err, "ReleasePublicConnection")
  1853. }
  1854. err = cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 10*time.Second, 10*time.Second, 300*time.Second)
  1855. if err != nil {
  1856. return nil, errors.Wrap(errors.ErrTimeout, "WaitStatusWithDelay")
  1857. }
  1858. err = ec.SyncWithCloudElasticcache(ctx, task.GetUserCred(), ec.GetCloudprovider(), iec)
  1859. if err != nil {
  1860. return nil, errors.Wrap(err, "SyncWithCloudElasticcache")
  1861. }
  1862. return nil, nil
  1863. })
  1864. return nil
  1865. }
  1866. func (self *SManagedVirtualizationRegionDriver) RequestElasticcacheFlushInstance(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1867. iregion, err := ec.GetIRegion(ctx)
  1868. if err != nil {
  1869. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheFlushInstance.GetIRegion")
  1870. }
  1871. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1872. if err != nil {
  1873. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheFlushInstance.GetIElasticcacheById")
  1874. }
  1875. password, _ := task.GetParams().GetString("password")
  1876. input := cloudprovider.SCloudElasticCacheFlushInstanceInput{}
  1877. if len(password) > 0 {
  1878. input.Password = password
  1879. } else {
  1880. if info, err := ec.GetDetailsLoginInfo(ctx, userCred, jsonutils.NewDict()); err == nil && info != nil {
  1881. pwd, _ := info.GetString("password")
  1882. input.Password = pwd
  1883. }
  1884. }
  1885. err = iec.FlushInstance(input)
  1886. if err != nil {
  1887. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheFlushInstance.FlushInstance")
  1888. }
  1889. // todo: sync instance spec
  1890. return cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 10*time.Second, 10*time.Second, 300*time.Second)
  1891. }
  1892. func (self *SManagedVirtualizationRegionDriver) RequestElasticcacheUpdateInstanceParameters(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1893. parameters, err := task.GetParams().Get("parameters")
  1894. if err != nil {
  1895. return errors.Wrap(fmt.Errorf("missing parameter parameters"), "managedVirtualizationRegionDriver.RequestElasticcacheUpdateInstanceParameters")
  1896. }
  1897. iregion, err := ec.GetIRegion(ctx)
  1898. if err != nil {
  1899. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheUpdateInstanceParameters.GetIRegion")
  1900. }
  1901. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1902. if err != nil {
  1903. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheUpdateInstanceParameters.GetIElasticcacheById")
  1904. }
  1905. err = iec.UpdateInstanceParameters(parameters)
  1906. if err != nil {
  1907. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheUpdateInstanceParameters.UpdateInstanceParameters")
  1908. }
  1909. // todo: sync instance spec
  1910. return cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 10*time.Second, 10*time.Second, 300*time.Second)
  1911. }
  1912. func (self *SManagedVirtualizationRegionDriver) RequestElasticcacheUpdateBackupPolicy(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  1913. backupType, _ := task.GetParams().GetString("backup_type")
  1914. backupReservedDays, _ := task.GetParams().Int("backup_reserved_days")
  1915. preferredBackupPeriod, _ := task.GetParams().GetString("preferred_backup_period")
  1916. preferredBackupTime, _ := task.GetParams().GetString("preferred_backup_time")
  1917. config := cloudprovider.SCloudElasticCacheBackupPolicyUpdateInput{
  1918. BackupType: backupType,
  1919. BackupReservedDays: int(backupReservedDays),
  1920. PreferredBackupPeriod: preferredBackupPeriod,
  1921. PreferredBackupTime: preferredBackupTime,
  1922. }
  1923. iregion, err := ec.GetIRegion(ctx)
  1924. if err != nil {
  1925. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheUpdateBackupPolicy.GetIRegion")
  1926. }
  1927. iec, err := iregion.GetIElasticcacheById(ec.ExternalId)
  1928. if err != nil {
  1929. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheUpdateBackupPolicy.GetIElasticcacheById")
  1930. }
  1931. err = iec.UpdateBackupPolicy(config)
  1932. if err != nil {
  1933. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheUpdateBackupPolicy.UpdateBackupPolicy")
  1934. }
  1935. // todo: sync instance spec
  1936. return cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 10*time.Second, 10*time.Second, 300*time.Second)
  1937. }
  1938. func (self *SManagedVirtualizationRegionDriver) ValidateCreateElasticcacheAccountData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, data *jsonutils.JSONDict) (*jsonutils.JSONDict, error) {
  1939. reservedNames := []string{
  1940. "add", "admin", "all", "alter", "analyze", "and", "as", "asc",
  1941. "asensitive", "aurora", "before", "between", "bigint", "binary",
  1942. "blob", "both", "by", "call", "cascade", "case", "change",
  1943. "char", "character", "check", "collate", "column", "condition",
  1944. "connection", "constraint", "continue", "convert", "create",
  1945. "cross", "current_date", "current_time", "current_timestamp",
  1946. "current_user", "cursor", " database", "databases", "day_hour",
  1947. "day_microsecond", "day_minute", "day_second", "dec", "decimal",
  1948. "declare", "default", "delayed", "delete", "desc", "describe",
  1949. "deterministic", "distinct", "distinctrow", "div", "double",
  1950. "drc_rds", "drop", "dual", "each", "eagleye", "else", "elseif",
  1951. "enclosed", "escaped", "exists", "exit", "explain", "false",
  1952. "fetch", "float", "float4", "float8", "for", "force", "foreign",
  1953. "from", "fulltext", " goto", "grant", "group", "guest", "having",
  1954. "high_priority", "hour_microsecond", "hour_minute", "hour_second",
  1955. "if", "ignore", "in", "index", "infile", "information_schema", "inner",
  1956. "inout", "insensitive", "insert", "int", "int1", "int2", "int3", "int4",
  1957. "int8", "integer", "interval", "into", "is", "iterate", "join", "key", "keys",
  1958. "kill", "label", "leading", "leave", "left", "like", "limit", "linear", "lines",
  1959. "load", "localtime", "localtimestamp", "lock", "long", "longblob", "longtext",
  1960. "loop", "low_priority", " match", "mediumblob", "mediumint", "mediumtext",
  1961. "middleint", "minute_microsecond", "minute_second", "mod", "modifies",
  1962. "mysql", "natural", "no_write_to_binlog", "not", "null", "numeric",
  1963. "on", "optimize", "option", "optionally", "or", "order", "out", "outer",
  1964. "outfile", "precision", "primary", "procedure", "purge",
  1965. "raid0", "range", "read", "reads", "real",
  1966. "references", "regexp", "release", "rename", "repeat",
  1967. "replace", "replicator", "require", "restrict", "return", "revoke", "right",
  1968. "rlike", "root", "schema", "schemas", "second_microsecond", "select", "sensitive",
  1969. "separator", "set", "show", "smallint", "spatial", "specific", "sql", "sql_big_result",
  1970. "sql_calc_found_rows", "sql_small_result", "sqlexception", "sqlstate", "sqlwarning",
  1971. "ssl", "starting", "straight_join", "table", "terminated", "test", "then", "tinyblob",
  1972. "tinyint", "tinytext", "to", "trailing", "trigger", "true", "undo",
  1973. "union", "unique", "unlock", "unsigned", "update", "usage", "use", "using",
  1974. "utc_date", "utc_time", "utc_timestamp", "values", "varbinary", "varchar",
  1975. "varcharacter", "varying", "when", "where", "while", "with", "write", "x509",
  1976. "xor", "xtrabak", "year_month", "zerofill"}
  1977. if name, _ := data.GetString("name"); utils.IsInStringArray(name, reservedNames) {
  1978. return nil, httperrors.NewConflictError("account name '%s' is not allowed", name)
  1979. }
  1980. return data, nil
  1981. }
  1982. func (self *SManagedVirtualizationRegionDriver) ValidateCreateElasticcacheAclData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, data *jsonutils.JSONDict) (*jsonutils.JSONDict, error) {
  1983. ips, err := data.GetString("ip_list")
  1984. if err != nil || ips == "" {
  1985. return nil, httperrors.NewMissingParameterError("ip_list")
  1986. }
  1987. ipV := validators.NewIPv4AddrValidator("ip")
  1988. cidrV := validators.NewIPv4PrefixValidator("ip")
  1989. _ips := strings.Split(ips, ",")
  1990. for _, ip := range _ips {
  1991. params := jsonutils.NewDict()
  1992. params.Set("ip", jsonutils.NewString(ip))
  1993. if strings.Contains(ip, "/") {
  1994. if err := cidrV.Validate(ctx, params); err != nil {
  1995. return nil, err
  1996. }
  1997. } else {
  1998. if err := ipV.Validate(ctx, params); err != nil {
  1999. return nil, err
  2000. }
  2001. }
  2002. }
  2003. elasticcacheV := validators.NewModelIdOrNameValidator("elasticcache", "elasticcache", ownerId)
  2004. if err := elasticcacheV.Validate(ctx, data); err != nil {
  2005. return nil, err
  2006. }
  2007. return data, nil
  2008. }
  2009. func (self *SManagedVirtualizationRegionDriver) AllowCreateElasticcacheBackup(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, elasticcache *models.SElasticcache) error {
  2010. return nil
  2011. }
  2012. func (self *SManagedVirtualizationRegionDriver) ValidateCreateElasticcacheBackupData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, data *jsonutils.JSONDict) (*jsonutils.JSONDict, error) {
  2013. elasticcacheV := validators.NewModelIdOrNameValidator("elasticcache", "elasticcache", ownerId)
  2014. if err := elasticcacheV.Validate(ctx, data); err != nil {
  2015. return nil, err
  2016. }
  2017. ec := elasticcacheV.Model.(*models.SElasticcache)
  2018. if !utils.IsInStringArray(ec.Status, []string{api.ELASTIC_CACHE_STATUS_RUNNING}) {
  2019. return nil, httperrors.NewInputParameterError("can not make backup in status %s", ec.Status)
  2020. }
  2021. data.Set("backup_mode", jsonutils.NewString(api.BACKUP_MODE_MANUAL))
  2022. return data, nil
  2023. }
  2024. func (self *SManagedVirtualizationRegionDriver) RequestCreateElasticcacheAccount(ctx context.Context, userCred mcclient.TokenCredential, elasticcacheAccount *models.SElasticcacheAccount, task taskman.ITask) error {
  2025. return nil
  2026. }
  2027. func (self *SManagedVirtualizationRegionDriver) RequestCreateElasticcacheAcl(ctx context.Context, userCred mcclient.TokenCredential, ea *models.SElasticcacheAcl, task taskman.ITask) error {
  2028. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2029. _ec, err := db.FetchById(models.ElasticcacheManager, ea.ElasticcacheId)
  2030. if err != nil {
  2031. return nil, errors.Wrap(nil, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.GetElasticcache")
  2032. }
  2033. ec := _ec.(*models.SElasticcache)
  2034. iregion, err := ec.GetIRegion(ctx)
  2035. if err != nil {
  2036. return nil, errors.Wrap(nil, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.GetIRegion")
  2037. }
  2038. iec, err := iregion.GetIElasticcacheById(ec.GetExternalId())
  2039. if err != nil {
  2040. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.GetIElasticcacheById")
  2041. }
  2042. iea, err := iec.CreateAcl(ea.Name, ea.IpList)
  2043. if err != nil {
  2044. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.CreateAcl")
  2045. }
  2046. // todo: wait elastic cache instance running
  2047. ea.SetModelManager(models.ElasticcacheAclManager, ea)
  2048. if err := db.SetExternalId(ea, userCred, iea.GetGlobalId()); err != nil {
  2049. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.SetExternalId")
  2050. }
  2051. if err := ea.SyncWithCloudElasticcacheAcl(ctx, userCred, iea); err != nil {
  2052. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.SyncWithCloudElasticcache")
  2053. }
  2054. return nil, nil
  2055. })
  2056. return nil
  2057. }
  2058. func (self *SManagedVirtualizationRegionDriver) RequestChangeDBInstanceConfig(ctx context.Context, userCred mcclient.TokenCredential, rds *models.SDBInstance, input *api.SDBInstanceChangeConfigInput, task taskman.ITask) error {
  2059. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2060. conf := cloudprovider.SManagedDBInstanceChangeConfig{}
  2061. if input.DiskSizeGB > 0 && input.DiskSizeGB != rds.DiskSizeGB {
  2062. conf.DiskSizeGB = input.DiskSizeGB
  2063. }
  2064. if len(input.InstanceType) > 0 && input.InstanceType != rds.InstanceType {
  2065. conf.InstanceType = input.InstanceType
  2066. }
  2067. iRds, err := rds.GetIDBInstance(ctx)
  2068. if err != nil {
  2069. return nil, errors.Wrap(err, "rds.GetIDBInstance")
  2070. }
  2071. log.Infof("change config: %s", jsonutils.Marshal(conf).String())
  2072. err = iRds.ChangeConfig(ctx, &conf)
  2073. if err != nil {
  2074. return nil, errors.Wrapf(err, "iRds.ChangeConfig")
  2075. }
  2076. err = cloudprovider.WaitStatus(iRds, api.DBINSTANCE_RUNNING, time.Second*10, time.Minute*40)
  2077. if err != nil {
  2078. return nil, errors.Wrapf(err, "cloudprovider.WaitStatus")
  2079. }
  2080. err = iRds.Refresh()
  2081. if err != nil {
  2082. return nil, errors.Wrapf(err, "iRds.Refresh")
  2083. }
  2084. _, err = db.Update(rds, func() error {
  2085. rds.InstanceType = iRds.GetInstanceType()
  2086. rds.Category = iRds.GetCategory()
  2087. rds.VcpuCount = iRds.GetVcpuCount()
  2088. rds.VmemSizeMb = iRds.GetVmemSizeMB()
  2089. rds.StorageType = iRds.GetStorageType()
  2090. rds.DiskSizeGB = iRds.GetDiskSizeGB()
  2091. return nil
  2092. })
  2093. if err != nil {
  2094. return nil, errors.Wrapf(err, "db.Update(instance)")
  2095. }
  2096. return nil, nil
  2097. })
  2098. return nil
  2099. }
  2100. func (self *SManagedVirtualizationRegionDriver) RequestCreateDBInstanceBackup(ctx context.Context, userCred mcclient.TokenCredential, instance *models.SDBInstance, backup *models.SDBInstanceBackup, task taskman.ITask) error {
  2101. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2102. iRds, err := instance.GetIDBInstance(ctx)
  2103. if err != nil {
  2104. return nil, errors.Wrap(err, "instance.GetIDBInstance")
  2105. }
  2106. desc := &cloudprovider.SDBInstanceBackupCreateConfig{
  2107. Name: backup.Name,
  2108. }
  2109. if len(backup.DBNames) > 0 {
  2110. desc.Databases = strings.Split(backup.DBNames, ",")
  2111. }
  2112. backupId, err := iRds.CreateIBackup(desc)
  2113. if err != nil {
  2114. return nil, errors.Wrap(err, "iRds.CreateBackup")
  2115. }
  2116. err = db.SetExternalId(backup, userCred, backupId)
  2117. if err != nil {
  2118. return nil, errors.Wrapf(err, "db.SetExternalId")
  2119. }
  2120. err = cloudprovider.Wait(time.Second*5, time.Minute*15, func() (bool, error) {
  2121. iBackup, err := backup.GetIDBInstanceBackup(ctx)
  2122. if err != nil {
  2123. if errors.Cause(err) == cloudprovider.ErrNotFound {
  2124. log.Warningf("GetIDBInstanceBackup: %v", err)
  2125. return false, nil
  2126. }
  2127. return false, errors.Wrapf(err, "GetIDBInstanceBackup")
  2128. }
  2129. err = backup.SyncWithCloudDBInstanceBackup(ctx, userCred, iBackup, instance.GetCloudprovider())
  2130. if err != nil {
  2131. log.Warningf("sync backup info error: %v", err)
  2132. }
  2133. return true, nil
  2134. })
  2135. if err != nil {
  2136. return nil, errors.Wrapf(err, "cloudprovider.Wait backup sync")
  2137. }
  2138. instance.SetStatus(ctx, userCred, api.DBINSTANCE_RUNNING, "")
  2139. return nil, nil
  2140. })
  2141. return nil
  2142. }
  2143. func (self *SManagedVirtualizationRegionDriver) ValidateResetDBInstancePassword(ctx context.Context, userCred mcclient.TokenCredential, instance *models.SDBInstance, account string) error {
  2144. return nil
  2145. }
  2146. func (self *SManagedVirtualizationRegionDriver) RequestRemoteUpdateDBInstance(ctx context.Context, userCred mcclient.TokenCredential, instance *models.SDBInstance, replaceTags bool, task taskman.ITask) error {
  2147. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2148. iRds, err := instance.GetIDBInstance(ctx)
  2149. if err != nil {
  2150. return nil, errors.Wrap(err, "instance.GetIDBInstance")
  2151. }
  2152. oldTags, err := iRds.GetTags()
  2153. if err != nil {
  2154. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  2155. return nil, nil
  2156. }
  2157. return nil, errors.Wrap(err, "iRds.GetTags()")
  2158. }
  2159. tags, err := instance.GetAllUserMetadata()
  2160. if err != nil {
  2161. return nil, errors.Wrapf(err, "instance.GetAllUserMetadata")
  2162. }
  2163. tagsUpdateInfo := cloudprovider.TagsUpdateInfo{OldTags: oldTags, NewTags: tags}
  2164. err = cloudprovider.SetTags(ctx, iRds, instance.ManagerId, tags, replaceTags)
  2165. if err != nil {
  2166. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  2167. return nil, nil
  2168. }
  2169. logclient.AddActionLogWithStartable(task, instance, logclient.ACT_UPDATE_TAGS, err, userCred, false)
  2170. return nil, errors.Wrap(err, "iRds.SetTags")
  2171. }
  2172. logclient.AddActionLogWithStartable(task, instance, logclient.ACT_UPDATE_TAGS, tagsUpdateInfo, userCred, true)
  2173. err = iRds.Update(ctx, cloudprovider.SDBInstanceUpdateOptions{NAME: instance.Name, Description: instance.Description})
  2174. if err != nil {
  2175. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  2176. return nil, nil
  2177. }
  2178. return nil, errors.Wrap(err, "iRds.Update")
  2179. }
  2180. return nil, nil
  2181. })
  2182. return nil
  2183. }
  2184. func (self *SManagedVirtualizationRegionDriver) RequestCreateElasticcacheBackup(ctx context.Context, userCred mcclient.TokenCredential, eb *models.SElasticcacheBackup, task taskman.ITask) error {
  2185. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2186. _ec, err := db.FetchById(models.ElasticcacheManager, eb.ElasticcacheId)
  2187. if err != nil {
  2188. return nil, errors.Wrap(nil, "managedVirtualizationRegionDriver.CreateElasticcacheBackup.GetElasticcache")
  2189. }
  2190. ec := _ec.(*models.SElasticcache)
  2191. iregion, err := ec.GetIRegion(ctx)
  2192. if err != nil {
  2193. return nil, errors.Wrap(nil, "managedVirtualizationRegionDriver.CreateElasticcacheBackup.GetIRegion")
  2194. }
  2195. iec, err := iregion.GetIElasticcacheById(ec.GetExternalId())
  2196. if err != nil {
  2197. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheBackup.GetIElasticcacheById")
  2198. }
  2199. ieb, err := iec.CreateBackup(eb.Name)
  2200. if err != nil {
  2201. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheBackup.CreateBackup")
  2202. }
  2203. err = cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 30*time.Second, 30*time.Second, 1800*time.Second)
  2204. if err != nil {
  2205. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheBackup.WaitStatusWithDelay")
  2206. }
  2207. eb.SetModelManager(models.ElasticcacheBackupManager, eb)
  2208. if err := db.SetExternalId(eb, userCred, ieb.GetGlobalId()); err != nil {
  2209. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheBackup.SetExternalId")
  2210. }
  2211. if err := eb.SyncWithCloudElasticcacheBackup(ctx, userCred, ieb); err != nil {
  2212. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheBackup.SyncWithCloudElasticcacheBackup")
  2213. }
  2214. return nil, nil
  2215. })
  2216. return nil
  2217. }
  2218. func (self *SManagedVirtualizationRegionDriver) RequestDeleteElasticcacheAccount(ctx context.Context, userCred mcclient.TokenCredential, ea *models.SElasticcacheAccount, task taskman.ITask) error {
  2219. iregion, err := ea.GetIRegion(ctx)
  2220. if err != nil {
  2221. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheAccount.GetIRegion")
  2222. }
  2223. _ec, err := db.FetchById(models.ElasticcacheManager, ea.ElasticcacheId)
  2224. if err != nil {
  2225. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheAccount.FetchById")
  2226. }
  2227. ec := _ec.(*models.SElasticcache)
  2228. iec, err := iregion.GetIElasticcacheById(ec.GetExternalId())
  2229. if errors.Cause(err) == cloudprovider.ErrNotFound {
  2230. return nil
  2231. } else if err != nil {
  2232. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheAccount.GetIElasticcacheById")
  2233. }
  2234. iea, err := iec.GetICloudElasticcacheAccount(ea.GetExternalId())
  2235. if errors.Cause(err) == cloudprovider.ErrNotFound {
  2236. return nil
  2237. } else if err != nil {
  2238. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheAccount.GetICloudElasticcacheAccount")
  2239. }
  2240. err = iea.Delete()
  2241. if err != nil {
  2242. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheAccount.Delete")
  2243. }
  2244. err = cloudprovider.WaitDeleted(iea, 10*time.Second, 300*time.Second)
  2245. if err != nil {
  2246. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheAccount.WaitDeleted")
  2247. }
  2248. return nil
  2249. }
  2250. func (self *SManagedVirtualizationRegionDriver) RequestDeleteElasticcacheAcl(ctx context.Context, userCred mcclient.TokenCredential, ea *models.SElasticcacheAcl, task taskman.ITask) error {
  2251. iregion, err := ea.GetIRegion(ctx)
  2252. if err != nil {
  2253. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheAcl.GetIRegion")
  2254. }
  2255. _ec, err := db.FetchById(models.ElasticcacheManager, ea.ElasticcacheId)
  2256. if err != nil {
  2257. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheAcl.FetchElasticcacheById")
  2258. }
  2259. ec := _ec.(*models.SElasticcache)
  2260. iec, err := iregion.GetIElasticcacheById(ec.GetExternalId())
  2261. if errors.Cause(err) == cloudprovider.ErrNotFound {
  2262. return nil
  2263. } else if err != nil {
  2264. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheAcl.GetIElasticcacheById")
  2265. }
  2266. iea, err := iec.GetICloudElasticcacheAcl(ea.GetExternalId())
  2267. if err != nil {
  2268. if errors.Cause(err) == cloudprovider.ErrNotFound {
  2269. return nil
  2270. }
  2271. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheAcl.GetICloudElasticcacheAccount")
  2272. }
  2273. err = iea.Delete()
  2274. if err != nil {
  2275. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheAcl.Delete")
  2276. }
  2277. return cloudprovider.WaitDeleted(iea, 10*time.Second, 300*time.Second)
  2278. }
  2279. func (self *SManagedVirtualizationRegionDriver) RequestDeleteElasticcacheBackup(ctx context.Context, userCred mcclient.TokenCredential, eb *models.SElasticcacheBackup, task taskman.ITask) error {
  2280. iregion, err := eb.GetIRegion(ctx)
  2281. if err != nil {
  2282. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheBackup.GetIRegion")
  2283. }
  2284. _ec, err := db.FetchById(models.ElasticcacheAclManager, eb.ElasticcacheId)
  2285. if err != nil {
  2286. return err
  2287. }
  2288. ec := _ec.(*models.SElasticcache)
  2289. iec, err := iregion.GetIElasticcacheById(ec.GetExternalId())
  2290. if errors.Cause(err) == cloudprovider.ErrNotFound {
  2291. return nil
  2292. } else if err != nil {
  2293. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheBackup.GetIElasticcacheById")
  2294. }
  2295. ieb, err := iec.GetICloudElasticcacheBackup(eb.GetExternalId())
  2296. if err != nil {
  2297. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheBackup.GetICloudElasticcacheBackup")
  2298. }
  2299. err = ieb.Delete()
  2300. if err != nil {
  2301. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestDeleteElasticcacheBackup.Delete")
  2302. }
  2303. return cloudprovider.WaitDeleted(ieb, 10*time.Second, 300*time.Second)
  2304. }
  2305. func (self *SManagedVirtualizationRegionDriver) RequestElasticcacheAccountResetPassword(ctx context.Context, userCred mcclient.TokenCredential, ea *models.SElasticcacheAccount, task taskman.ITask) error {
  2306. iregion, err := ea.GetIRegion(ctx)
  2307. if err != nil {
  2308. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheAccountResetPassword.GetIRegion")
  2309. }
  2310. _ec, err := db.FetchById(models.ElasticcacheManager, ea.ElasticcacheId)
  2311. if err != nil {
  2312. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheAccountResetPassword.FetchById")
  2313. }
  2314. ec := _ec.(*models.SElasticcache)
  2315. iec, err := iregion.GetIElasticcacheById(ec.GetExternalId())
  2316. if errors.Cause(err) == cloudprovider.ErrNotFound {
  2317. return nil
  2318. } else if err != nil {
  2319. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheAccountResetPassword.GetIElasticcacheById")
  2320. }
  2321. iea, err := iec.GetICloudElasticcacheAccount(ea.GetExternalId())
  2322. if err != nil {
  2323. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheAccountResetPassword.GetICloudElasticcacheBackup")
  2324. }
  2325. input := cloudprovider.SCloudElasticCacheAccountUpdateInput{}
  2326. passwd, _ := task.GetParams().GetString("password")
  2327. input.Password = &passwd
  2328. err = iea.UpdateAccount(input)
  2329. if err != nil {
  2330. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheAccountResetPassword.UpdateAccount")
  2331. }
  2332. err = ea.SavePassword(passwd)
  2333. if err != nil {
  2334. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheAccountResetPassword.SavePassword")
  2335. }
  2336. return ea.SetStatus(ctx, userCred, api.ELASTIC_CACHE_ACCOUNT_STATUS_AVAILABLE, "")
  2337. }
  2338. func (self *SManagedVirtualizationRegionDriver) RequestElasticcacheAclUpdate(ctx context.Context, userCred mcclient.TokenCredential, ea *models.SElasticcacheAcl, task taskman.ITask) error {
  2339. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2340. _ec, err := db.FetchById(models.ElasticcacheManager, ea.ElasticcacheId)
  2341. if err != nil {
  2342. return nil, errors.Wrap(nil, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.GetElasticcache")
  2343. }
  2344. ec := _ec.(*models.SElasticcache)
  2345. iregion, err := ec.GetIRegion(ctx)
  2346. if err != nil {
  2347. return nil, errors.Wrap(nil, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.GetIRegion")
  2348. }
  2349. iec, err := iregion.GetIElasticcacheById(ec.GetExternalId())
  2350. if err != nil {
  2351. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.GetIElasticcacheById")
  2352. }
  2353. iea, err := iec.GetICloudElasticcacheAcl(ea.ExternalId)
  2354. if err != nil {
  2355. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.GetICloudElasticcacheAcl")
  2356. }
  2357. ipList, _ := task.GetParams().GetString("ip_list")
  2358. err = iea.UpdateAcl(ipList)
  2359. if err != nil {
  2360. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.UpdateAcl")
  2361. }
  2362. err = ea.SetStatus(ctx, userCred, api.ELASTIC_CACHE_ACL_STATUS_AVAILABLE, "")
  2363. if err != nil {
  2364. return nil, errors.Wrap(err, "managedVirtualizationRegionDriver.CreateElasticcacheAcl.UpdateAclStatus")
  2365. }
  2366. return nil, nil
  2367. })
  2368. return nil
  2369. }
  2370. func (self *SManagedVirtualizationRegionDriver) RequestElasticcacheBackupRestoreInstance(ctx context.Context, userCred mcclient.TokenCredential, eb *models.SElasticcacheBackup, task taskman.ITask) error {
  2371. iregion, err := eb.GetIRegion(ctx)
  2372. if err != nil {
  2373. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheBackupRestoreInstance.GetIRegion")
  2374. }
  2375. _ec, err := db.FetchById(models.ElasticcacheManager, eb.ElasticcacheId)
  2376. if err != nil {
  2377. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheBackupRestoreInstance.FetchById")
  2378. }
  2379. ec := _ec.(*models.SElasticcache)
  2380. iec, err := iregion.GetIElasticcacheById(ec.GetExternalId())
  2381. if errors.Cause(err) == cloudprovider.ErrNotFound {
  2382. return nil
  2383. } else if err != nil {
  2384. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheBackupRestoreInstance.GetIElasticcacheById")
  2385. }
  2386. ieb, err := iec.GetICloudElasticcacheBackup(eb.GetExternalId())
  2387. if err != nil {
  2388. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheBackupRestoreInstance.GetICloudElasticcacheBackup")
  2389. }
  2390. err = ieb.RestoreInstance(ec.ExternalId)
  2391. if err != nil {
  2392. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheBackupRestoreInstance.RestoreInstance")
  2393. }
  2394. _, err = db.Update(ec, func() error {
  2395. ec.Status = api.ELASTIC_CACHE_STATUS_BACKUPRECOVERING
  2396. return nil
  2397. })
  2398. if err != nil {
  2399. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheBackupRestoreInstance.UpdateStatus")
  2400. }
  2401. err = cloudprovider.WaitStatusWithDelay(iec, api.ELASTIC_CACHE_STATUS_RUNNING, 30*time.Second, 30*time.Second, 1800*time.Second)
  2402. if err != nil {
  2403. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheBackupRestoreInstance.WaitStatusWithDelay")
  2404. }
  2405. _, err = db.Update(ec, func() error {
  2406. ec.Status = api.ELASTIC_CACHE_STATUS_RUNNING
  2407. return nil
  2408. })
  2409. if err != nil {
  2410. return errors.Wrap(err, "managedVirtualizationRegionDriver.RequestElasticcacheBackupRestoreInstance.UpdateStatus")
  2411. }
  2412. return nil
  2413. }
  2414. func (self *SManagedVirtualizationRegionDriver) AllowUpdateElasticcacheAuthMode(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, elasticcache *models.SElasticcache) error {
  2415. return nil
  2416. }
  2417. func (self *SManagedVirtualizationRegionDriver) RequestSyncDiskStatus(ctx context.Context, userCred mcclient.TokenCredential, disk *models.SDisk, task taskman.ITask) error {
  2418. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2419. iDisk, err := disk.GetIDisk(ctx)
  2420. if err != nil {
  2421. return nil, errors.Wrap(err, "disk.GetIDisk")
  2422. }
  2423. return nil, disk.SetStatus(ctx, userCred, iDisk.GetStatus(), "syncstatus")
  2424. })
  2425. return nil
  2426. }
  2427. func (self *SManagedVirtualizationRegionDriver) RequestSyncDiskBackupStatus(ctx context.Context, userCred mcclient.TokenCredential, backup *models.SDiskBackup, task taskman.ITask) error {
  2428. return fmt.Errorf("Not Implement RequestSyncDiskBackupStatus")
  2429. }
  2430. func (self *SManagedVirtualizationRegionDriver) RequestSyncSnapshotStatus(ctx context.Context, userCred mcclient.TokenCredential, snapshot *models.SSnapshot, task taskman.ITask) error {
  2431. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2432. iRegion, err := snapshot.GetISnapshotRegion(ctx)
  2433. if err != nil {
  2434. return nil, errors.Wrap(err, "snapshot.GetISnapshotRegion")
  2435. }
  2436. iSnapshot, err := iRegion.GetISnapshotById(snapshot.ExternalId)
  2437. if err != nil {
  2438. return nil, errors.Wrapf(err, "iRegion.GetISnapshotById(%s)", snapshot.ExternalId)
  2439. }
  2440. return nil, snapshot.SetStatus(ctx, userCred, iSnapshot.GetStatus(), "syncstatus")
  2441. })
  2442. return nil
  2443. }
  2444. func (self *SManagedVirtualizationRegionDriver) RequestSyncNatGatewayStatus(ctx context.Context, userCred mcclient.TokenCredential, nat *models.SNatGateway, task taskman.ITask) error {
  2445. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2446. iNat, err := nat.GetINatGateway(ctx)
  2447. if err != nil {
  2448. return nil, errors.Wrap(err, "nat.GetINatGateway")
  2449. }
  2450. return nil, nat.SyncWithCloudNatGateway(ctx, userCred, nat.GetCloudprovider(), iNat)
  2451. })
  2452. return nil
  2453. }
  2454. func (self *SManagedVirtualizationRegionDriver) RequestSyncBucketStatus(ctx context.Context, userCred mcclient.TokenCredential, bucket *models.SBucket, task taskman.ITask) error {
  2455. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2456. iBucket, err := bucket.GetIBucket(ctx)
  2457. if err != nil {
  2458. return nil, errors.Wrap(err, "bucket.GetIBucket")
  2459. }
  2460. return nil, bucket.SyncWithCloudBucket(ctx, userCred, iBucket, false)
  2461. })
  2462. return nil
  2463. }
  2464. func (self *SManagedVirtualizationRegionDriver) RequestSyncDBInstanceBackupStatus(ctx context.Context, userCred mcclient.TokenCredential, backup *models.SDBInstanceBackup, task taskman.ITask) error {
  2465. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2466. iDBInstanceBackup, err := backup.GetIDBInstanceBackup(ctx)
  2467. if err != nil {
  2468. return nil, errors.Wrap(err, "backup.GetIDBInstanceBackup")
  2469. }
  2470. return nil, backup.SetStatus(ctx, userCred, iDBInstanceBackup.GetStatus(), "syncstatus")
  2471. })
  2472. return nil
  2473. }
  2474. func (self *SManagedVirtualizationRegionDriver) RequestSyncElasticcacheStatus(ctx context.Context, userCred mcclient.TokenCredential, elasticcache *models.SElasticcache, task taskman.ITask) error {
  2475. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2476. iRegion, err := elasticcache.GetIRegion(ctx)
  2477. if err != nil {
  2478. return nil, errors.Wrap(err, "elasticcache.GetIRegion")
  2479. }
  2480. iElasticcache, err := iRegion.GetIElasticcacheById(elasticcache.ExternalId)
  2481. if err != nil {
  2482. return nil, errors.Wrap(err, "elasticcache.GetIElasticcache")
  2483. }
  2484. if account := elasticcache.GetCloudaccount(); account != nil {
  2485. models.SyncVirtualResourceMetadata(ctx, userCred, elasticcache, iElasticcache, account.ReadOnly)
  2486. }
  2487. return nil, elasticcache.SetStatus(ctx, userCred, iElasticcache.GetStatus(), "syncstatus")
  2488. })
  2489. return nil
  2490. }
  2491. func (self *SManagedVirtualizationRegionDriver) RequestRemoteUpdateElasticcache(ctx context.Context, userCred mcclient.TokenCredential, elasticcache *models.SElasticcache, replaceTags bool, task taskman.ITask) error {
  2492. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2493. iRegion, err := elasticcache.GetIRegion(ctx)
  2494. if err != nil {
  2495. return nil, errors.Wrap(err, "elasticcache.GetIRegion")
  2496. }
  2497. iElasticcache, err := iRegion.GetIElasticcacheById(elasticcache.ExternalId)
  2498. if err != nil {
  2499. return nil, errors.Wrapf(err, "GetIElasticcacheById(%s)", elasticcache.ExternalId)
  2500. }
  2501. oldTags, err := iElasticcache.GetTags()
  2502. if err != nil {
  2503. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  2504. return nil, nil
  2505. }
  2506. return nil, errors.Wrap(err, "iElasticcache.GetTags()")
  2507. }
  2508. tags, err := elasticcache.GetAllUserMetadata()
  2509. if err != nil {
  2510. return nil, errors.Wrapf(err, "GetAllUserMetadata")
  2511. }
  2512. tagsUpdateInfo := cloudprovider.TagsUpdateInfo{OldTags: oldTags, NewTags: tags}
  2513. mangerId := ""
  2514. if vpc, _ := elasticcache.GetVpc(); vpc != nil {
  2515. mangerId = vpc.ManagerId
  2516. }
  2517. err = cloudprovider.SetTags(ctx, iElasticcache, mangerId, tags, replaceTags)
  2518. if err != nil {
  2519. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  2520. return nil, nil
  2521. }
  2522. logclient.AddActionLogWithStartable(task, elasticcache, logclient.ACT_UPDATE_TAGS, err, userCred, false)
  2523. return nil, errors.Wrap(err, "iElasticcache.SetTags")
  2524. }
  2525. logclient.AddActionLogWithStartable(task, elasticcache, logclient.ACT_UPDATE_TAGS, tagsUpdateInfo, userCred, true)
  2526. return nil, nil
  2527. })
  2528. return nil
  2529. }
  2530. func (self *SManagedVirtualizationRegionDriver) RequestSyncSecgroupsForElasticcache(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, task taskman.ITask) error {
  2531. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2532. // sync secgroups to cloud
  2533. secgroupExternalIds := []string{}
  2534. {
  2535. vpc, err := ec.GetVpc()
  2536. if err != nil {
  2537. return nil, errors.Wrapf(err, "GetVpc")
  2538. }
  2539. region, err := vpc.GetRegion()
  2540. if err != nil {
  2541. return nil, errors.Wrapf(err, "GetRegion")
  2542. }
  2543. secgroups, err := ec.GetSecgroups()
  2544. if err != nil {
  2545. return nil, errors.Wrapf(err, "GetSecgroups")
  2546. }
  2547. driver := region.GetDriver()
  2548. ownerId := ec.GetOwnerId()
  2549. for i := range secgroups {
  2550. if secgroups[i].Id == api.SECGROUP_DEFAULT_ID {
  2551. filter, err := driver.GetSecurityGroupFilter(vpc)
  2552. if err != nil {
  2553. return nil, errors.Wrapf(err, "GetSecurityGroupFilter")
  2554. }
  2555. group, err := vpc.GetDefaultSecurityGroup(ownerId, filter)
  2556. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  2557. return nil, err
  2558. }
  2559. if gotypes.IsNil(group) {
  2560. group, err = driver.CreateDefaultSecurityGroup(ctx, userCred, ownerId, vpc)
  2561. if err != nil {
  2562. return nil, errors.Wrapf(err, "CreateDefaultSecurityGroup")
  2563. }
  2564. }
  2565. if !utils.IsInStringArray(group.ExternalId, secgroupExternalIds) {
  2566. secgroupExternalIds = append(secgroupExternalIds, group.ExternalId)
  2567. }
  2568. continue
  2569. }
  2570. if !utils.IsInStringArray(secgroups[i].ExternalId, secgroupExternalIds) {
  2571. secgroupExternalIds = append(secgroupExternalIds, secgroups[i].ExternalId)
  2572. }
  2573. }
  2574. }
  2575. ret := jsonutils.NewDict()
  2576. ret.Set("ext_secgroup_ids", jsonutils.NewStringArray(secgroupExternalIds))
  2577. return ret, nil
  2578. })
  2579. return nil
  2580. }
  2581. func (self *SManagedVirtualizationRegionDriver) RequestRenewElasticcache(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, bc billing.SBillingCycle) error {
  2582. iregion, err := ec.GetIRegion(ctx)
  2583. if err != nil {
  2584. return errors.Wrap(err, "GetIRegion")
  2585. }
  2586. if len(ec.GetExternalId()) == 0 {
  2587. return errors.Wrap(err, "ExternalId is empty")
  2588. }
  2589. iec, err := iregion.GetIElasticcacheById(ec.GetExternalId())
  2590. if err != nil {
  2591. return errors.Wrap(err, "GetIElasticcacheById")
  2592. }
  2593. oldExpired := iec.GetExpiredAt()
  2594. err = iec.Renew(bc)
  2595. if err != nil {
  2596. return err
  2597. }
  2598. //避免有些云续费后过期时间刷新比较慢问题
  2599. cloudprovider.WaitCreated(15*time.Second, 5*time.Minute, func() bool {
  2600. err := iec.Refresh()
  2601. if err != nil {
  2602. log.Errorf("failed refresh instance %s error: %v", ec.Name, err)
  2603. }
  2604. newExipred := iec.GetExpiredAt()
  2605. if newExipred.After(oldExpired) {
  2606. return true
  2607. }
  2608. return false
  2609. })
  2610. db.Update(ec, func() error {
  2611. ec.ExpiredAt = iec.GetExpiredAt()
  2612. return nil
  2613. })
  2614. return nil
  2615. }
  2616. func (self *SManagedVirtualizationRegionDriver) IsSupportedElasticcacheAutoRenew() bool {
  2617. return true
  2618. }
  2619. func (self *SManagedVirtualizationRegionDriver) RequestElasticcacheSetAutoRenew(ctx context.Context, userCred mcclient.TokenCredential, ec *models.SElasticcache, autoRenew bool, task taskman.ITask) error {
  2620. iregion, err := ec.GetIRegion(ctx)
  2621. if err != nil {
  2622. return errors.Wrap(err, "GetIRegion")
  2623. }
  2624. if len(ec.GetExternalId()) == 0 {
  2625. return errors.Wrap(err, "ExternalId is empty")
  2626. }
  2627. iec, err := iregion.GetIElasticcacheById(ec.GetExternalId())
  2628. if err != nil {
  2629. return errors.Wrap(err, "GetIElasticcacheById")
  2630. }
  2631. bc := billing.SBillingCycle{}
  2632. bc.AutoRenew = autoRenew
  2633. err = iec.SetAutoRenew(bc)
  2634. if err != nil {
  2635. return errors.Wrap(err, "SetAutoRenew")
  2636. }
  2637. return ec.SetAutoRenew(autoRenew)
  2638. }
  2639. func IsInPrivateIpRange(ar netutils.IPV4AddrRange) error {
  2640. iprs := netutils.GetPrivateIPRanges()
  2641. match := false
  2642. for _, ipr := range iprs {
  2643. if ipr.ContainsRange(ar) {
  2644. match = true
  2645. break
  2646. }
  2647. }
  2648. if !match {
  2649. return httperrors.NewInputParameterError("invalid cidr range %s", ar.String())
  2650. }
  2651. return nil
  2652. }
  2653. func (self *SManagedVirtualizationRegionDriver) RequestSyncRdsSecurityGroups(ctx context.Context, userCred mcclient.TokenCredential, rds *models.SDBInstance, task taskman.ITask) error {
  2654. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2655. secgroups, err := rds.GetSecgroups()
  2656. if err != nil {
  2657. return nil, errors.Wrapf(err, "GetSecgroups")
  2658. }
  2659. vpc, err := rds.GetVpc()
  2660. if err != nil {
  2661. return nil, errors.Wrapf(err, "GetVpc")
  2662. }
  2663. region, err := vpc.GetRegion()
  2664. if err != nil {
  2665. return nil, errors.Wrapf(err, "GetRegion")
  2666. }
  2667. driver := region.GetDriver()
  2668. ownerId := rds.GetOwnerId()
  2669. secgroupIds := []string{}
  2670. for i := range secgroups {
  2671. if secgroups[i].Id == api.SECGROUP_DEFAULT_ID {
  2672. filter, err := driver.GetSecurityGroupFilter(vpc)
  2673. if err != nil {
  2674. return nil, errors.Wrapf(err, "GetSecurityGroupFilter")
  2675. }
  2676. group, err := vpc.GetDefaultSecurityGroup(ownerId, filter)
  2677. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  2678. return nil, err
  2679. }
  2680. if gotypes.IsNil(group) {
  2681. group, err = driver.CreateDefaultSecurityGroup(ctx, userCred, ownerId, vpc)
  2682. if err != nil {
  2683. return nil, errors.Wrapf(err, "CreateDefaultSecurityGroup")
  2684. }
  2685. }
  2686. if !utils.IsInStringArray(group.ExternalId, secgroupIds) {
  2687. secgroupIds = append(secgroupIds, group.ExternalId)
  2688. }
  2689. continue
  2690. }
  2691. if !utils.IsInStringArray(secgroups[i].ExternalId, secgroupIds) {
  2692. secgroupIds = append(secgroupIds, secgroups[i].ExternalId)
  2693. }
  2694. }
  2695. iRds, err := rds.GetIDBInstance(ctx)
  2696. if err != nil {
  2697. return nil, errors.Wrapf(err, "GetIDBInstance")
  2698. }
  2699. err = iRds.SetSecurityGroups(secgroupIds)
  2700. if err != nil {
  2701. return nil, errors.Wrapf(err, "SetSecurityGroups")
  2702. }
  2703. return nil, nil
  2704. })
  2705. return nil
  2706. }
  2707. func (self *SManagedVirtualizationRegionDriver) RequestAssociateEip(ctx context.Context, userCred mcclient.TokenCredential, eip *models.SElasticip, input api.ElasticipAssociateInput, obj db.IStatusStandaloneModel, task taskman.ITask) error {
  2708. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2709. iEip, err := eip.GetIEip(ctx)
  2710. if err != nil {
  2711. return nil, errors.Wrapf(err, "eip.GetIEip")
  2712. }
  2713. conf := &cloudprovider.AssociateConfig{
  2714. InstanceId: input.InstanceExternalId,
  2715. Bandwidth: eip.Bandwidth,
  2716. AssociateType: input.InstanceType,
  2717. ChargeType: string(eip.ChargeType),
  2718. }
  2719. err = iEip.Associate(conf)
  2720. if err != nil {
  2721. return nil, errors.Wrapf(err, "iEip.Associate")
  2722. }
  2723. err = cloudprovider.WaitStatus(iEip, api.EIP_STATUS_READY, 3*time.Second, 60*time.Second)
  2724. if err != nil {
  2725. return nil, errors.Wrap(err, "cloudprovider.WaitStatus")
  2726. }
  2727. if obj.GetStatus() != api.INSTANCE_ASSOCIATE_EIP {
  2728. db.StatusBaseSetStatus(ctx, obj, userCred, api.INSTANCE_ASSOCIATE_EIP, "associate eip")
  2729. }
  2730. err = eip.AssociateInstance(ctx, userCred, input.InstanceType, obj)
  2731. if err != nil {
  2732. return nil, errors.Wrapf(err, "eip.AssociateVM")
  2733. }
  2734. eip.SetStatus(ctx, userCred, api.EIP_STATUS_READY, api.EIP_STATUS_ASSOCIATE)
  2735. return nil, nil
  2736. })
  2737. return nil
  2738. }
  2739. func (self *SManagedVirtualizationRegionDriver) RequestCreateNetwork(ctx context.Context, userCred mcclient.TokenCredential, net *models.SNetwork, task taskman.ITask) error {
  2740. wire, err := net.GetWire()
  2741. if err != nil {
  2742. return errors.Wrapf(err, "GetWire")
  2743. }
  2744. iwire, err := wire.GetIWire(ctx)
  2745. if err != nil {
  2746. return errors.Wrapf(err, "GetIWire")
  2747. }
  2748. prefix, err := net.GetPrefix()
  2749. if err != nil {
  2750. return errors.Wrapf(err, "GetPrefix")
  2751. }
  2752. opts := cloudprovider.SNetworkCreateOptions{
  2753. Name: net.Name,
  2754. Cidr: prefix.String(),
  2755. Desc: net.Description,
  2756. }
  2757. opts.AssignPublicIp, _ = task.GetParams().Bool("assign_public_ip")
  2758. provider := wire.GetCloudprovider()
  2759. opts.ProjectId, err = provider.SyncProject(ctx, userCred, net.ProjectId)
  2760. if err != nil {
  2761. if errors.Cause(err) != cloudprovider.ErrNotSupported && errors.Cause(err) != cloudprovider.ErrNotImplemented {
  2762. logclient.AddSimpleActionLog(net, logclient.ACT_SYNC_CLOUD_PROJECT, err, userCred, false)
  2763. }
  2764. }
  2765. inet, err := iwire.CreateINetwork(&opts)
  2766. if err != nil {
  2767. return errors.Wrapf(err, "CreateINetwork")
  2768. }
  2769. err = db.SetExternalId(net, userCred, inet.GetGlobalId())
  2770. if err != nil {
  2771. return errors.Wrapf(err, "db.SetExternalId")
  2772. }
  2773. err = cloudprovider.WaitStatus(inet, api.NETWORK_STATUS_AVAILABLE, 10*time.Second, 5*time.Minute)
  2774. if err != nil {
  2775. return errors.Wrapf(err, "wait network available after 5 minutes, current status: %s", inet.GetStatus())
  2776. }
  2777. return net.SyncWithCloudNetwork(ctx, userCred, inet)
  2778. }
  2779. func (self *SManagedVirtualizationRegionDriver) RequestRemoteUpdateElasticSearch(ctx context.Context, userCred mcclient.TokenCredential, instance *models.SElasticSearch, replaceTags bool, task taskman.ITask) error {
  2780. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2781. ies, err := instance.GetIElasticSearch(ctx)
  2782. if err != nil {
  2783. return nil, errors.Wrap(err, "instance.GetIESInstance")
  2784. }
  2785. oldTags, err := ies.GetTags()
  2786. if err != nil {
  2787. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  2788. return nil, nil
  2789. }
  2790. return nil, errors.Wrap(err, "ies.GetTags()")
  2791. }
  2792. tags, err := instance.GetAllUserMetadata()
  2793. if err != nil {
  2794. return nil, errors.Wrapf(err, "instance.GetAllUserMetadata")
  2795. }
  2796. tagsUpdateInfo := cloudprovider.TagsUpdateInfo{OldTags: oldTags, NewTags: tags}
  2797. err = cloudprovider.SetTags(ctx, ies, instance.ManagerId, tags, replaceTags)
  2798. if err != nil {
  2799. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  2800. return nil, nil
  2801. }
  2802. logclient.AddActionLogWithStartable(task, instance, logclient.ACT_UPDATE_TAGS, err, userCred, false)
  2803. return nil, errors.Wrap(err, "ies.SetTags")
  2804. }
  2805. logclient.AddActionLogWithStartable(task, instance, logclient.ACT_UPDATE_TAGS, tagsUpdateInfo, userCred, true)
  2806. return nil, nil
  2807. })
  2808. return nil
  2809. }
  2810. func (self *SManagedVirtualizationRegionDriver) RequestRemoteUpdateKafka(ctx context.Context, userCred mcclient.TokenCredential, instance *models.SKafka, replaceTags bool, task taskman.ITask) error {
  2811. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2812. kafka, err := instance.GetIKafka(ctx)
  2813. if err != nil {
  2814. return nil, errors.Wrap(err, "instance.GetIKafka")
  2815. }
  2816. oldTags, err := kafka.GetTags()
  2817. if err != nil {
  2818. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  2819. return nil, nil
  2820. }
  2821. return nil, errors.Wrap(err, "ies.GetTags()")
  2822. }
  2823. tags, err := instance.GetAllUserMetadata()
  2824. if err != nil {
  2825. return nil, errors.Wrapf(err, "instance.GetAllUserMetadata")
  2826. }
  2827. tagsUpdateInfo := cloudprovider.TagsUpdateInfo{OldTags: oldTags, NewTags: tags}
  2828. err = cloudprovider.SetTags(ctx, kafka, instance.ManagerId, tags, replaceTags)
  2829. if err != nil {
  2830. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  2831. return nil, nil
  2832. }
  2833. logclient.AddActionLogWithStartable(task, instance, logclient.ACT_UPDATE_TAGS, err, userCred, false)
  2834. return nil, errors.Wrap(err, "ies.SetTags")
  2835. }
  2836. logclient.AddActionLogWithStartable(task, instance, logclient.ACT_UPDATE_TAGS, tagsUpdateInfo, userCred, true)
  2837. return nil, nil
  2838. })
  2839. return nil
  2840. }
  2841. func (self *SManagedVirtualizationRegionDriver) ValidateCreateKubeClusterData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, input *api.KubeClusterCreateInput) (*api.KubeClusterCreateInput, error) {
  2842. return input, nil
  2843. }
  2844. func (self *SManagedVirtualizationRegionDriver) RequestCreateKubeCluster(ctx context.Context, userCred mcclient.TokenCredential, cluster *models.SKubeCluster, task taskman.ITask) error {
  2845. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2846. opts := &cloudprovider.KubeClusterCreateOptions{
  2847. NAME: cluster.Name,
  2848. Desc: cluster.Description,
  2849. Version: cluster.Version,
  2850. NetworkIds: []string{},
  2851. }
  2852. vpc, err := cluster.GetVpc()
  2853. if err != nil {
  2854. return nil, errors.Wrapf(err, "cluster.GetVpc")
  2855. }
  2856. opts.VpcId = vpc.ExternalId
  2857. networks, err := cluster.GetNetworks()
  2858. if err != nil {
  2859. return nil, errors.Wrapf(err, "GetNetworks")
  2860. }
  2861. for _, net := range networks {
  2862. opts.NetworkIds = append(opts.NetworkIds, net.ExternalId)
  2863. }
  2864. opts.Tags, _ = cluster.GetAllUserMetadata()
  2865. params := task.GetParams()
  2866. opts.ServiceCIDR, _ = params.GetString("service_cidr")
  2867. opts.RoleName, _ = params.GetString("role_name")
  2868. opts.PrivateAccess, _ = params.Bool("private_access")
  2869. opts.PublicAccess, _ = params.Bool("public_access")
  2870. _, opts.PublicKey, _ = sshkeys.GetSshAdminKeypair(ctx)
  2871. iregion, err := cluster.GetIRegion(ctx)
  2872. if err != nil {
  2873. return nil, errors.Wrapf(err, "GetIRegion")
  2874. }
  2875. icluster, err := iregion.CreateIKubeCluster(opts)
  2876. if err != nil {
  2877. return nil, errors.Wrapf(err, "CreateIKubeCluster")
  2878. }
  2879. err = db.SetExternalId(cluster, userCred, icluster.GetGlobalId())
  2880. if err != nil {
  2881. return nil, errors.Wrapf(err, "db.SetExternalId")
  2882. }
  2883. err = cloudprovider.WaitStatusWithSync(icluster, api.KUBE_CLUSTER_STATUS_RUNNING, func(status string) {
  2884. cluster.SetStatus(ctx, userCred, status, "")
  2885. }, time.Second*30, time.Hour*1)
  2886. if err != nil {
  2887. return nil, errors.Wrapf(err, "wait cluster status timeout, current status: %s", icluster.GetStatus())
  2888. }
  2889. return nil, nil
  2890. })
  2891. return nil
  2892. }
  2893. func (self *SManagedVirtualizationRegionDriver) ValidateCreateKubeNodePoolData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, input *api.KubeNodePoolCreateInput) (*api.KubeNodePoolCreateInput, error) {
  2894. return input, nil
  2895. }
  2896. func (self *SManagedVirtualizationRegionDriver) RequestCreateKubeNodePool(ctx context.Context, userCred mcclient.TokenCredential, pool *models.SKubeNodePool, task taskman.ITask) error {
  2897. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2898. opts := &cloudprovider.KubeNodePoolCreateOptions{
  2899. NAME: pool.Name,
  2900. Desc: pool.Description,
  2901. MinInstanceCount: pool.MinInstanceCount,
  2902. MaxInstanceCount: pool.MaxInstanceCount,
  2903. DesiredInstanceCount: pool.DesiredInstanceCount,
  2904. RootDiskSizeGb: pool.RootDiskSizeGb,
  2905. NetworkIds: []string{},
  2906. InstanceTypes: []string{},
  2907. }
  2908. opts.PublicKey, _ = task.GetParams().GetString("public_key")
  2909. if pool.InstanceTypes != nil {
  2910. for _, instanceType := range *pool.InstanceTypes {
  2911. opts.InstanceTypes = append(opts.InstanceTypes, instanceType)
  2912. }
  2913. }
  2914. networks, err := pool.GetNetworks()
  2915. if err != nil {
  2916. return nil, errors.Wrapf(err, "GetNetworks")
  2917. }
  2918. for _, net := range networks {
  2919. opts.NetworkIds = append(opts.NetworkIds, net.ExternalId)
  2920. }
  2921. opts.Tags, _ = pool.GetAllUserMetadata()
  2922. icluster, err := pool.GetIKubeCluster(ctx)
  2923. if err != nil {
  2924. return nil, errors.Wrapf(err, "GetIKubeCluster")
  2925. }
  2926. ipool, err := icluster.CreateIKubeNodePool(opts)
  2927. if err != nil {
  2928. return nil, errors.Wrapf(err, "CreateIKubeNodePool")
  2929. }
  2930. err = db.SetExternalId(pool, userCred, ipool.GetGlobalId())
  2931. if err != nil {
  2932. return nil, errors.Wrapf(err, "db.SetExternalId")
  2933. }
  2934. err = cloudprovider.WaitStatus(ipool, api.KUBE_CLUSTER_STATUS_RUNNING, time.Second*30, time.Hour*1)
  2935. if err != nil {
  2936. return nil, errors.Wrapf(err, "wait node pool status timeout, current status: %s", icluster.GetStatus())
  2937. }
  2938. return nil, pool.SetStatus(ctx, userCred, api.KUBE_CLUSTER_STATUS_RUNNING, "")
  2939. })
  2940. return nil
  2941. }
  2942. func (self *SManagedVirtualizationRegionDriver) RequestDeleteSecurityGroup(ctx context.Context, userCred mcclient.TokenCredential, secgroup *models.SSecurityGroup, task taskman.ITask) error {
  2943. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  2944. iGroup, err := secgroup.GetISecurityGroup(ctx)
  2945. if err != nil {
  2946. if errors.Cause(err) == cloudprovider.ErrNotFound || errors.Cause(err) == sql.ErrNoRows {
  2947. return nil, nil
  2948. }
  2949. return nil, errors.Wrapf(err, "GetISecurityGroup")
  2950. }
  2951. return nil, iGroup.Delete()
  2952. })
  2953. return nil
  2954. }
  2955. func (self *SManagedVirtualizationRegionDriver) RequestCreateSecurityGroup(
  2956. ctx context.Context,
  2957. userCred mcclient.TokenCredential,
  2958. secgroup *models.SSecurityGroup,
  2959. rules api.SSecgroupRuleResourceSet,
  2960. ) error {
  2961. vpcId := ""
  2962. if len(secgroup.VpcId) > 0 {
  2963. vpc, err := secgroup.GetVpc()
  2964. if err != nil {
  2965. return errors.Wrapf(err, "GetVpc")
  2966. }
  2967. vpcId = vpc.ExternalId
  2968. }
  2969. provider, err := secgroup.GetCloudprovider()
  2970. if err != nil {
  2971. return errors.Wrapf(err, "GetCloudprovider")
  2972. }
  2973. iRegion, err := secgroup.GetIRegion(ctx)
  2974. if err != nil {
  2975. return errors.Wrapf(err, "GetIRegion")
  2976. }
  2977. opts := &cloudprovider.SecurityGroupCreateInput{
  2978. Name: secgroup.Name,
  2979. Desc: secgroup.Description,
  2980. VpcId: vpcId,
  2981. }
  2982. opts.Tags, _ = secgroup.GetAllUserMetadata()
  2983. opts.ProjectId, err = provider.SyncProject(ctx, userCred, secgroup.ProjectId)
  2984. if err != nil {
  2985. if errors.Cause(err) != cloudprovider.ErrNotSupported && errors.Cause(err) != cloudprovider.ErrNotImplemented {
  2986. logclient.AddSimpleActionLog(secgroup, logclient.ACT_SYNC_CLOUD_PROJECT, err, userCred, false)
  2987. }
  2988. }
  2989. iGroup, err := iRegion.CreateISecurityGroup(opts)
  2990. if err != nil {
  2991. return errors.Wrapf(err, "CreateISecurityGroup")
  2992. }
  2993. _, err = db.Update(secgroup, func() error {
  2994. secgroup.ExternalId = iGroup.GetGlobalId()
  2995. if len(iGroup.GetVpcId()) == 0 {
  2996. secgroup.VpcId = ""
  2997. }
  2998. return nil
  2999. })
  3000. if err != nil {
  3001. return errors.Wrapf(err, "SetExternalId")
  3002. }
  3003. for i := range rules {
  3004. opts := cloudprovider.SecurityGroupRuleCreateOptions{
  3005. Desc: rules[i].Description,
  3006. Direction: secrules.TSecurityRuleDirection(rules[i].Direction),
  3007. Action: secrules.TSecurityRuleAction(rules[i].Action),
  3008. Protocol: rules[i].Protocol,
  3009. CIDR: rules[i].CIDR,
  3010. Ports: rules[i].Ports,
  3011. }
  3012. _, err := iGroup.CreateRule(&opts)
  3013. if err != nil {
  3014. return errors.Wrapf(err, "CreateRule")
  3015. }
  3016. }
  3017. iRules, err := iGroup.GetRules()
  3018. if err != nil {
  3019. return errors.Wrapf(err, "GetRules")
  3020. }
  3021. result := secgroup.SyncRules(ctx, userCred, iRules)
  3022. if result.IsError() {
  3023. return result.AllError()
  3024. }
  3025. secgroup.SetStatus(ctx, userCred, api.SECGROUP_STATUS_READY, "")
  3026. return nil
  3027. }
  3028. func (self *SManagedVirtualizationRegionDriver) ValidateCreateSecurityGroupInput(ctx context.Context, userCred mcclient.TokenCredential, input *api.SSecgroupCreateInput) (*api.SSecgroupCreateInput, error) {
  3029. for i := range input.Rules {
  3030. rule := input.Rules[i]
  3031. if !utils.IsInStringArray(rule.Action, []string{string(secrules.SecurityRuleAllow), string(secrules.SecurityRuleDeny)}) {
  3032. return nil, httperrors.NewInputParameterError("invalid action %s", rule.Action)
  3033. }
  3034. if !utils.IsInStringArray(rule.Protocol, []string{
  3035. secrules.PROTO_ANY,
  3036. secrules.PROTO_UDP,
  3037. secrules.PROTO_TCP,
  3038. secrules.PROTO_ICMP,
  3039. }) {
  3040. return nil, httperrors.NewInputParameterError("invalid protocol %s", rule.Protocol)
  3041. }
  3042. if len(rule.Ports) > 0 {
  3043. r := secrules.SecurityRule{}
  3044. err := r.ParsePorts(rule.Ports)
  3045. if err != nil {
  3046. return nil, httperrors.NewInputParameterError("invalid ports %s", rule.Ports)
  3047. }
  3048. }
  3049. if len(rule.CIDR) > 0 && !regutils.MatchCIDR(rule.CIDR) && !regutils.MatchCIDR6(rule.CIDR) && !regutils.MatchIP4Addr(rule.CIDR) && !regutils.MatchIP6Addr(rule.CIDR) {
  3050. return nil, httperrors.NewInputParameterError("invalid cidr %s", rule.CIDR)
  3051. }
  3052. }
  3053. return input, nil
  3054. }
  3055. func (self *SManagedVirtualizationRegionDriver) ValidateUpdateSecurityGroupRuleInput(ctx context.Context, userCred mcclient.TokenCredential, input *api.SSecgroupRuleUpdateInput) (*api.SSecgroupRuleUpdateInput, error) {
  3056. if input.Action != nil {
  3057. if !utils.IsInStringArray(*input.Action, []string{string(secrules.SecurityRuleAllow), string(secrules.SecurityRuleDeny)}) {
  3058. return nil, httperrors.NewInputParameterError("invalid action %s", *input.Action)
  3059. }
  3060. }
  3061. if input.Protocol != nil {
  3062. if !utils.IsInStringArray(*input.Protocol, []string{
  3063. secrules.PROTO_ANY,
  3064. secrules.PROTO_UDP,
  3065. secrules.PROTO_TCP,
  3066. secrules.PROTO_ICMP,
  3067. }) {
  3068. return nil, httperrors.NewInputParameterError("invalid protocol %s", *input.Protocol)
  3069. }
  3070. }
  3071. if input.Ports != nil {
  3072. rule := secrules.SecurityRule{}
  3073. err := rule.ParsePorts(*input.Ports)
  3074. if err != nil {
  3075. return nil, httperrors.NewInputParameterError("invalid ports %s", *input.Ports)
  3076. }
  3077. }
  3078. if input.CIDR != nil && len(*input.CIDR) > 0 && !regutils.MatchCIDR(*input.CIDR) && !regutils.MatchIP4Addr(*input.CIDR) && !regutils.MatchCIDR6(*input.CIDR) && !regutils.MatchIP6Addr(*input.CIDR) {
  3079. return nil, httperrors.NewInputParameterError("invalid cidr %s", *input.CIDR)
  3080. }
  3081. return input, nil
  3082. }
  3083. func (self *SManagedVirtualizationRegionDriver) RequestPrepareSecurityGroups(
  3084. ctx context.Context,
  3085. userCred mcclient.TokenCredential,
  3086. ownerId mcclient.IIdentityProvider,
  3087. secgroups []models.SSecurityGroup,
  3088. vpc *models.SVpc,
  3089. callback func(ids []string) error,
  3090. task taskman.ITask,
  3091. ) error {
  3092. region, err := vpc.GetRegion()
  3093. if err != nil {
  3094. return errors.Wrapf(err, "GetRegion")
  3095. }
  3096. driver := region.GetDriver()
  3097. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  3098. groupIds := []string{}
  3099. for i := range secgroups {
  3100. if secgroups[i].Id == api.SECGROUP_DEFAULT_ID {
  3101. filter, err := driver.GetSecurityGroupFilter(vpc)
  3102. if err != nil {
  3103. return nil, errors.Wrapf(err, "GetSecurityGroupFilter")
  3104. }
  3105. group, err := vpc.GetDefaultSecurityGroup(ownerId, filter)
  3106. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  3107. return nil, err
  3108. }
  3109. if gotypes.IsNil(group) {
  3110. group, err = driver.CreateDefaultSecurityGroup(ctx, userCred, ownerId, vpc)
  3111. if err != nil {
  3112. return nil, errors.Wrapf(err, "CreateDefaultSecurityGroup")
  3113. }
  3114. }
  3115. if !utils.IsInStringArray(group.Id, groupIds) {
  3116. groupIds = append(groupIds, group.Id)
  3117. }
  3118. continue
  3119. }
  3120. if len(secgroups[i].ExternalId) > 0 && !utils.IsInStringArray(secgroups[i].Id, groupIds) {
  3121. groupIds = append(groupIds, secgroups[i].Id)
  3122. }
  3123. }
  3124. if callback != nil {
  3125. return nil, callback(groupIds)
  3126. }
  3127. return nil, nil
  3128. })
  3129. return nil
  3130. }
  3131. func (self *SManagedVirtualizationRegionDriver) GetSecurityGroupFilter(vpc *models.SVpc) (func(q *sqlchemy.SQuery) *sqlchemy.SQuery, error) {
  3132. return func(q *sqlchemy.SQuery) *sqlchemy.SQuery {
  3133. return q.Equals("vpc_id", vpc.Id)
  3134. }, nil
  3135. }
  3136. func (self *SManagedVirtualizationRegionDriver) CreateDefaultSecurityGroup(
  3137. ctx context.Context,
  3138. userCred mcclient.TokenCredential,
  3139. ownerId mcclient.IIdentityProvider,
  3140. vpc *models.SVpc,
  3141. ) (*models.SSecurityGroup, error) {
  3142. region, err := vpc.GetRegion()
  3143. if err != nil {
  3144. return nil, errors.Wrapf(err, "GetRegion")
  3145. }
  3146. driver := region.GetDriver()
  3147. newGroup := &models.SSecurityGroup{}
  3148. newGroup.SetModelManager(models.SecurityGroupManager, newGroup)
  3149. newGroup.Name = fmt.Sprintf("%s-%d", driver.GetDefaultSecurityGroupNamePrefix(), time.Now().Unix())
  3150. newGroup.Description = "auto generage"
  3151. // 部分云可能不需要vpcId, 创建完安全组后会自动置空
  3152. newGroup.VpcId = vpc.Id
  3153. newGroup.ManagerId = vpc.ManagerId
  3154. newGroup.CloudregionId = vpc.CloudregionId
  3155. newGroup.DomainId = ownerId.GetProjectDomainId()
  3156. newGroup.ProjectId = ownerId.GetProjectId()
  3157. newGroup.ProjectSrc = string(apis.OWNER_SOURCE_LOCAL)
  3158. err = models.SecurityGroupManager.TableSpec().Insert(ctx, newGroup)
  3159. if err != nil {
  3160. return nil, errors.Wrapf(err, "insert")
  3161. }
  3162. err = driver.RequestCreateSecurityGroup(ctx, userCred, newGroup, api.SSecgroupRuleResourceSet{})
  3163. if err != nil {
  3164. return nil, errors.Wrapf(err, "RequestCreateSecurityGroup")
  3165. }
  3166. return newGroup, nil
  3167. }
  3168. func (self *SManagedVirtualizationRegionDriver) ValidateCreateSnapshotPolicy(ctx context.Context, userCred mcclient.TokenCredential, region *models.SCloudregion, input *api.SSnapshotPolicyCreateInput) (*api.SSnapshotPolicyCreateInput, error) {
  3169. if len(input.CloudproviderId) == 0 {
  3170. return nil, httperrors.NewMissingParameterError("cloudprovider_id")
  3171. }
  3172. managerObj, err := validators.ValidateModel(ctx, userCred, models.CloudproviderManager, &input.CloudproviderId)
  3173. if err != nil {
  3174. return nil, err
  3175. }
  3176. input.ManagerId = input.CloudproviderId
  3177. manager := managerObj.(*models.SCloudprovider)
  3178. if manager.Provider != region.Provider {
  3179. return nil, httperrors.NewConflictError("manager %s is not %s cloud", manager.Name, region.Provider)
  3180. }
  3181. return input, nil
  3182. }
  3183. func (self *SManagedVirtualizationRegionDriver) RequestCreateSnapshotPolicy(ctx context.Context, userCred mcclient.TokenCredential, region *models.SCloudregion, sp *models.SSnapshotPolicy, task taskman.ITask) error {
  3184. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  3185. iRegion, err := sp.GetIRegion(ctx)
  3186. if err != nil {
  3187. return nil, errors.Wrapf(err, "GetIRegion")
  3188. }
  3189. opts := &cloudprovider.SnapshotPolicyInput{
  3190. Name: sp.Name,
  3191. Desc: sp.Description,
  3192. RetentionDays: sp.RetentionDays,
  3193. TimePoints: sp.TimePoints,
  3194. RepeatWeekdays: sp.RepeatWeekdays,
  3195. }
  3196. opts.Tags, _ = sp.GetAllUserMetadata()
  3197. id, err := iRegion.CreateSnapshotPolicy(opts)
  3198. if err != nil {
  3199. return nil, errors.Wrapf(err, "CreateSnapshotPolicy")
  3200. }
  3201. _, err = db.Update(sp, func() error {
  3202. sp.ExternalId = id
  3203. sp.Status = apis.STATUS_AVAILABLE
  3204. return nil
  3205. })
  3206. return nil, err
  3207. })
  3208. return nil
  3209. }
  3210. func (self *SManagedVirtualizationRegionDriver) RequestDeleteSnapshotPolicy(ctx context.Context, userCred mcclient.TokenCredential, region *models.SCloudregion, sp *models.SSnapshotPolicy, task taskman.ITask) error {
  3211. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  3212. iPolicy, err := sp.GetISnapshotPolicy(ctx)
  3213. if err != nil {
  3214. if errors.Cause(err) == sql.ErrNoRows || errors.Cause(err) == cloudprovider.ErrNotFound {
  3215. return nil, nil
  3216. }
  3217. return nil, errors.Wrapf(err, "GetISnapshotPolicy")
  3218. }
  3219. err = iPolicy.Delete()
  3220. if err != nil {
  3221. return nil, errors.Wrapf(err, "Delete")
  3222. }
  3223. return nil, nil
  3224. })
  3225. return nil
  3226. }
  3227. func (self *SManagedVirtualizationRegionDriver) RequestSnapshotPolicyBindDisks(ctx context.Context, userCred mcclient.TokenCredential, sp *models.SSnapshotPolicy, diskIds []string, task taskman.ITask) error {
  3228. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  3229. iPolicy, err := sp.GetISnapshotPolicy(ctx)
  3230. if err != nil {
  3231. return nil, errors.Wrapf(err, "GetISnapshotPolicy")
  3232. }
  3233. disks, err := sp.GetUnbindDisks(diskIds)
  3234. if err != nil {
  3235. return nil, errors.Wrapf(err, "GetUnbindDisks")
  3236. }
  3237. externalIds := []string{}
  3238. for _, disk := range disks {
  3239. if len(disk.ExternalId) > 0 && !utils.IsInStringArray(disk.ExternalId, externalIds) {
  3240. externalIds = append(externalIds, disk.ExternalId)
  3241. }
  3242. }
  3243. if len(externalIds) > 0 {
  3244. err = iPolicy.ApplyDisks(externalIds)
  3245. if err != nil {
  3246. return nil, errors.Wrapf(err, "ApplyDisks %s", externalIds)
  3247. }
  3248. return nil, sp.BindDisks(ctx, disks)
  3249. }
  3250. return nil, nil
  3251. })
  3252. return nil
  3253. }
  3254. func (self *SManagedVirtualizationRegionDriver) RequestSnapshotPolicyUnbindDisks(ctx context.Context, userCred mcclient.TokenCredential, sp *models.SSnapshotPolicy, diskIds []string, task taskman.ITask) error {
  3255. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  3256. iPolicy, err := sp.GetISnapshotPolicy(ctx)
  3257. if err != nil {
  3258. return nil, errors.Wrapf(err, "GetISnapshotPolicy")
  3259. }
  3260. disks, err := sp.GetBindDisks(diskIds)
  3261. if err != nil {
  3262. return nil, errors.Wrapf(err, "GetBindDisks")
  3263. }
  3264. externalIds := []string{}
  3265. for _, disk := range disks {
  3266. if len(disk.ExternalId) > 0 && !utils.IsInStringArray(disk.ExternalId, externalIds) {
  3267. externalIds = append(externalIds, disk.ExternalId)
  3268. }
  3269. }
  3270. if len(externalIds) > 0 {
  3271. err = iPolicy.CancelDisks(externalIds)
  3272. if err != nil {
  3273. return nil, errors.Wrapf(err, "CancelDisks %s", externalIds)
  3274. }
  3275. return nil, sp.UnbindDisks(diskIds)
  3276. }
  3277. return nil, nil
  3278. })
  3279. return nil
  3280. }
  3281. func (self *SManagedVirtualizationRegionDriver) RequestRemoteUpdateNetwork(ctx context.Context, userCred mcclient.TokenCredential, net *models.SNetwork, replaceTags bool, task taskman.ITask) error {
  3282. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  3283. iNet, err := net.GetINetwork(ctx)
  3284. if err != nil {
  3285. return nil, errors.Wrap(err, "GetINetwork")
  3286. }
  3287. vpc, err := net.GetVpc()
  3288. if err != nil {
  3289. return nil, errors.Wrapf(err, "GetVpc")
  3290. }
  3291. oldTags, err := iNet.GetTags()
  3292. if err != nil {
  3293. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  3294. return nil, nil
  3295. }
  3296. return nil, errors.Wrap(err, "GetTags()")
  3297. }
  3298. tags, err := net.GetAllUserMetadata()
  3299. if err != nil {
  3300. return nil, errors.Wrapf(err, "GetAllUserMetadata")
  3301. }
  3302. tagsUpdateInfo := cloudprovider.TagsUpdateInfo{OldTags: oldTags, NewTags: tags}
  3303. err = cloudprovider.SetTags(ctx, iNet, vpc.ManagerId, tags, replaceTags)
  3304. if err != nil {
  3305. if errors.Cause(err) == cloudprovider.ErrNotSupported || errors.Cause(err) == cloudprovider.ErrNotImplemented {
  3306. return nil, nil
  3307. }
  3308. logclient.AddActionLogWithStartable(task, net, logclient.ACT_UPDATE_TAGS, err, userCred, false)
  3309. return nil, errors.Wrap(err, "SetTags")
  3310. }
  3311. logclient.AddActionLogWithStartable(task, net, logclient.ACT_UPDATE_TAGS, tagsUpdateInfo, userCred, true)
  3312. return nil, nil
  3313. })
  3314. return nil
  3315. }