groups.go 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package models
  15. import (
  16. "context"
  17. "database/sql"
  18. "golang.org/x/sync/errgroup"
  19. "yunion.io/x/jsonutils"
  20. "yunion.io/x/log"
  21. "yunion.io/x/pkg/errors"
  22. "yunion.io/x/pkg/tristate"
  23. "yunion.io/x/pkg/util/netutils"
  24. "yunion.io/x/pkg/util/rbacscope"
  25. "yunion.io/x/pkg/util/sets"
  26. "yunion.io/x/sqlchemy"
  27. "yunion.io/x/onecloud/pkg/apis"
  28. billing_api "yunion.io/x/onecloud/pkg/apis/billing"
  29. api "yunion.io/x/onecloud/pkg/apis/compute"
  30. "yunion.io/x/onecloud/pkg/cloudcommon/db"
  31. "yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
  32. "yunion.io/x/onecloud/pkg/cloudcommon/db/quotas"
  33. "yunion.io/x/onecloud/pkg/cloudcommon/policy"
  34. "yunion.io/x/onecloud/pkg/httperrors"
  35. "yunion.io/x/onecloud/pkg/mcclient"
  36. "yunion.io/x/onecloud/pkg/util/logclient"
  37. "yunion.io/x/onecloud/pkg/util/stringutils2"
  38. )
  39. const (
  40. REDIS_TYPE = "REDIS"
  41. RDS_TYPE = "RDS"
  42. )
  43. // +onecloud:swagger-gen-model-singular=instancegroup
  44. // +onecloud:swagger-gen-model-plural=instancegroups
  45. type SGroupManager struct {
  46. db.SVirtualResourceBaseManager
  47. db.SEnabledResourceBaseManager
  48. SZoneResourceBaseManager
  49. }
  50. var GroupManager *SGroupManager
  51. func init() {
  52. // GroupManager's Keyword and KeywordPlural is instancegroup and instancegroups because group has been used by
  53. // keystone.
  54. GroupManager = &SGroupManager{
  55. SVirtualResourceBaseManager: db.NewVirtualResourceBaseManager(
  56. SGroup{},
  57. "groups_tbl",
  58. "instancegroup",
  59. "instancegroups",
  60. ),
  61. }
  62. GroupManager.SetVirtualObject(GroupManager)
  63. }
  64. type SGroup struct {
  65. db.SVirtualResourceBase
  66. SZoneResourceBase `width:"36" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  67. db.SEnabledResourceBase `nullable:"false" default:"true" create:"optional" list:"user" update:"user"`
  68. // 服务类型
  69. ServiceType string `width:"36" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  70. ParentId string `width:"36" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  71. // 可用区Id
  72. // example: zone1
  73. // ZoneId string `width:"36" charset:"ascii" nullable:"true" list:"user" update:"user" create:"optional"`
  74. // 调度策略
  75. SchedStrategy string `width:"16" charset:"ascii" nullable:"true" default:"" list:"user" update:"user" create:"optional"`
  76. // the upper limit number of guests with this group in a host
  77. Granularity int `nullable:"false" list:"user" get:"user" create:"optional" update:"user" default:"1"`
  78. ForceDispersion tristate.TriState `list:"user" get:"user" create:"optional" update:"user" default:"true"`
  79. // 是否启用
  80. // Enabled tristate.TriState `default:"true" create:"optional" list:"user" update:"user"`
  81. }
  82. // 主机组列表
  83. func (sm *SGroupManager) ListItemFilter(
  84. ctx context.Context,
  85. q *sqlchemy.SQuery,
  86. userCred mcclient.TokenCredential,
  87. input api.InstanceGroupListInput,
  88. ) (*sqlchemy.SQuery, error) {
  89. var err error
  90. q, err = sm.SVirtualResourceBaseManager.ListItemFilter(ctx, q, userCred, input.VirtualResourceListInput)
  91. if err != nil {
  92. return nil, errors.Wrap(err, "SVirtualResourceBaseManager.ListItemFilter")
  93. }
  94. q, err = sm.SEnabledResourceBaseManager.ListItemFilter(ctx, q, userCred, input.EnabledResourceBaseListInput)
  95. if err != nil {
  96. return nil, errors.Wrap(err, "SEnabledResourceBaseManager.ListItemFilter")
  97. }
  98. q, err = sm.SZoneResourceBaseManager.ListItemFilter(ctx, q, userCred, input.ZonalFilterListInput)
  99. if err != nil {
  100. return nil, errors.Wrap(err, "SZoneResourceBaseManager.ListItemFilter")
  101. }
  102. guestFilter := input.ServerId
  103. if len(guestFilter) != 0 {
  104. guestObj, err := GuestManager.FetchByIdOrName(ctx, userCred, guestFilter)
  105. if err != nil {
  106. return nil, err
  107. }
  108. ggSub := GroupguestManager.Query("group_id").Equals("guest_id", guestObj.GetId()).SubQuery()
  109. q = q.Join(ggSub, sqlchemy.Equals(ggSub.Field("group_id"), q.Field("id")))
  110. }
  111. if len(input.ParentId) > 0 {
  112. q = q.Equals("parent_id", input.ParentId)
  113. }
  114. if len(input.ServiceType) > 0 {
  115. q = q.Equals("service_type", input.ServiceType)
  116. }
  117. if len(input.SchedStrategy) > 0 {
  118. q = q.Equals("sched_strategy", input.SchedStrategy)
  119. }
  120. return q, nil
  121. }
  122. func (sm *SGroupManager) OrderByExtraFields(
  123. ctx context.Context,
  124. q *sqlchemy.SQuery,
  125. userCred mcclient.TokenCredential,
  126. input api.InstanceGroupListInput,
  127. ) (*sqlchemy.SQuery, error) {
  128. var err error
  129. q, err = sm.SVirtualResourceBaseManager.OrderByExtraFields(ctx, q, userCred, input.VirtualResourceListInput)
  130. if err != nil {
  131. return nil, errors.Wrap(err, "SVirtualResourceBaseManager.OrderByExtraFields")
  132. }
  133. q, err = sm.SZoneResourceBaseManager.OrderByExtraFields(ctx, q, userCred, input.ZonalFilterListInput)
  134. if err != nil {
  135. return nil, errors.Wrap(err, "SZoneResourceBaseManager.OrderByExtraFields")
  136. }
  137. if db.NeedOrderQuery([]string{input.OrderByVips}) {
  138. gnQ := GroupnetworkManager.Query()
  139. gnQ = gnQ.AppendField(gnQ.Field("group_id"), sqlchemy.COUNT("vips", gnQ.Field("ip_addr")))
  140. gnQ = gnQ.GroupBy("group_id")
  141. gnSQ := gnQ.SubQuery()
  142. q = q.LeftJoin(gnSQ, sqlchemy.Equals(gnSQ.Field("group_id"), q.Field("id")))
  143. q.AppendField(q.QueryFields()...)
  144. q.AppendField(gnSQ.Field("vips"))
  145. q = db.OrderByFields(q, []string{input.OrderByVips}, []sqlchemy.IQueryField{q.Field("vips")})
  146. }
  147. if db.NeedOrderQuery([]string{input.OrderByGuestCount}) {
  148. ggQ := GroupguestManager.Query()
  149. ggQ = ggQ.AppendField(ggQ.Field("group_id"), sqlchemy.COUNT("guest_count"))
  150. ggQ = ggQ.GroupBy("group_id")
  151. ggSQ := ggQ.SubQuery()
  152. q = q.LeftJoin(ggSQ, sqlchemy.Equals(ggSQ.Field("group_id"), q.Field("id")))
  153. q.AppendField(q.QueryFields()...)
  154. q.AppendField(ggSQ.Field("guest_count"))
  155. q = db.OrderByFields(q, []string{input.OrderByGuestCount}, []sqlchemy.IQueryField{q.Field("guest_count")})
  156. }
  157. return q, nil
  158. }
  159. func (sm *SGroupManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
  160. var err error
  161. q, err = sm.SVirtualResourceBaseManager.QueryDistinctExtraField(q, field)
  162. if err == nil {
  163. return q, nil
  164. }
  165. q, err = sm.SZoneResourceBaseManager.QueryDistinctExtraField(q, field)
  166. if err == nil {
  167. return q, nil
  168. }
  169. return q, httperrors.ErrNotFound
  170. }
  171. func (sm *SGroupManager) FetchCustomizeColumns(
  172. ctx context.Context,
  173. userCred mcclient.TokenCredential,
  174. query jsonutils.JSONObject,
  175. objs []interface{},
  176. fields stringutils2.SSortedStrings,
  177. isList bool,
  178. ) []api.InstanceGroupDetail {
  179. rows := make([]api.InstanceGroupDetail, len(objs))
  180. virtRows := sm.SVirtualResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  181. zoneRows := sm.SZoneResourceBaseManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
  182. for i := range rows {
  183. rows[i] = api.InstanceGroupDetail{
  184. VirtualResourceDetails: virtRows[i],
  185. ZoneResourceInfo: zoneRows[i],
  186. }
  187. rows[i].GuestCount = objs[i].(*SGroup).GetGuestCount()
  188. rows[i].Vips, _ = GroupnetworkManager.getVips(objs[i].(*SGroup).Id)
  189. net, _ := objs[i].(*SGroup).getAttachedNetwork()
  190. if net != nil {
  191. rows[i].NetworkId = net.Id
  192. rows[i].Network = net.Name
  193. }
  194. eip, _ := objs[i].(*SGroup).getElasticIp()
  195. if eip != nil {
  196. rows[i].VipEip = eip.IpAddr
  197. }
  198. }
  199. return rows
  200. }
  201. func (group *SGroup) GetGuestCount() int {
  202. q := GroupguestManager.Query().Equals("group_id", group.Id)
  203. count, _ := q.CountWithError()
  204. return count
  205. }
  206. func (group *SGroup) GetGuests() []SGuest {
  207. ggm := GroupguestManager.Query().SubQuery()
  208. q := GuestManager.Query()
  209. q = q.Join(ggm, sqlchemy.Equals(q.Field("id"), ggm.Field("guest_id")))
  210. q = q.Filter(sqlchemy.Equals(ggm.Field("group_id"), group.Id))
  211. guests := make([]SGuest, 0)
  212. err := db.FetchModelObjects(GuestManager, q, &guests)
  213. if err != nil && errors.Cause(err) != sql.ErrNoRows {
  214. return nil
  215. }
  216. return guests
  217. }
  218. func (group *SGroup) ValidateDeleteCondition(ctx context.Context, info jsonutils.JSONObject) error {
  219. eip, err := group.getElasticIp()
  220. if err != nil {
  221. return errors.Wrap(err, "getElasticIp")
  222. }
  223. if eip != nil {
  224. return errors.Wrapf(httperrors.ErrNotEmpty, "group associate with eip %s", eip.IpAddr)
  225. }
  226. q := GroupguestManager.Query().Equals("group_id", group.Id)
  227. count, err := q.CountWithError()
  228. if err != nil {
  229. return errors.Wrapf(err, "fail to check that if there are any guest in this group %s", group.Name)
  230. }
  231. if count > 0 {
  232. return httperrors.NewUnsupportOperationError("please retry after unbind all guests in group")
  233. }
  234. return nil
  235. }
  236. func (group *SGroup) GetNetworks() ([]SGroupnetwork, error) {
  237. q := GroupnetworkManager.Query().Equals("group_id", group.Id)
  238. groupnets := make([]SGroupnetwork, 0)
  239. err := db.FetchModelObjects(GroupnetworkManager, q, &groupnets)
  240. if err != nil {
  241. return nil, err
  242. }
  243. return groupnets, nil
  244. }
  245. func (group *SGroup) PerformBindGuests(ctx context.Context, userCred mcclient.TokenCredential,
  246. query jsonutils.JSONObject, data jsonutils.JSONObject) (jsonutils.JSONObject, error) {
  247. if group.Enabled.IsFalse() {
  248. return nil, httperrors.NewForbiddenError("can not bind guest from disabled guest")
  249. }
  250. guestIdSet, hostIds, err := group.checkGuests(ctx, userCred, query, data)
  251. if err != nil {
  252. return nil, err
  253. }
  254. groupGuests, err := GroupguestManager.FetchByGroupId(group.Id)
  255. if err != nil {
  256. logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_ASSOCIATE, nil, userCred, false)
  257. return nil, err
  258. }
  259. for i := range groupGuests {
  260. guestId := groupGuests[i].GuestId
  261. if guestIdSet.Has(guestId) {
  262. guestIdSet.Delete(guestId)
  263. }
  264. }
  265. var networkId string
  266. gns, err := group.GetNetworks()
  267. if err != nil {
  268. return nil, errors.Wrap(err, "GetNetworks")
  269. }
  270. if len(gns) > 0 {
  271. networkId = gns[0].NetworkId
  272. }
  273. for _, guestId := range guestIdSet.UnsortedList() {
  274. if len(networkId) > 0 {
  275. // need to check consistency of network
  276. gns, err := GuestnetworkManager.FetchByGuestId(guestId)
  277. if err != nil {
  278. return nil, errors.Wrap(err, "")
  279. }
  280. if len(gns) != 1 {
  281. return nil, errors.Wrap(httperrors.ErrNotSupported, "cannot join a guest without network or with more than one network to a group with VIP")
  282. }
  283. if gns[0].NetworkId != networkId {
  284. return nil, errors.Wrap(httperrors.ErrConflict, "cannot join a guest with network inconsist with VIP")
  285. }
  286. }
  287. _, err := GroupguestManager.Attach(ctx, group.Id, guestId)
  288. if err != nil {
  289. logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_ASSOCIATE, nil, userCred, false)
  290. return nil, errors.Wrapf(err, "fail to attch guest %s to group %s", guestId, group.Id)
  291. }
  292. }
  293. err = group.clearSchedDescCache(hostIds)
  294. if err != nil {
  295. log.Errorf("fail to clear scheduler desc cache after binding guests successfully: %s", err.Error())
  296. }
  297. logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_ASSOCIATE, nil, userCred, true)
  298. return nil, nil
  299. }
  300. func (group *SGroup) PerformUnbindGuests(ctx context.Context, userCred mcclient.TokenCredential,
  301. query jsonutils.JSONObject, data jsonutils.JSONObject) (jsonutils.JSONObject, error) {
  302. if group.Enabled.IsFalse() {
  303. return nil, httperrors.NewForbiddenError("can not unbind guest from disabled guest")
  304. }
  305. guestIdSet, hostIds, err := group.checkGuests(ctx, userCred, query, data)
  306. if err != nil {
  307. return nil, err
  308. }
  309. groupGuests, err := GroupguestManager.FetchByGroupId(group.Id)
  310. if err != nil {
  311. logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_DISSOCIATE, nil, userCred, false)
  312. return nil, err
  313. }
  314. for i := range groupGuests {
  315. joint := groupGuests[i]
  316. if !guestIdSet.Has(joint.GuestId) {
  317. continue
  318. }
  319. err := joint.Detach(ctx, userCred)
  320. if err != nil {
  321. logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_DISSOCIATE, nil, userCred, false)
  322. return nil, errors.Wrapf(err, "fail to detach guest %s to group %s", joint.GuestId, group.Id)
  323. }
  324. }
  325. err = group.clearSchedDescCache(hostIds)
  326. if err != nil {
  327. log.Errorf("fail to clear scheduler desc cache after unbinding guests successfully: %s", err.Error())
  328. }
  329. logclient.AddActionLogWithContext(ctx, group, logclient.ACT_VM_DISSOCIATE, nil, userCred, true)
  330. return nil, nil
  331. }
  332. func (group *SGroup) checkGuests(ctx context.Context, userCred mcclient.TokenCredential,
  333. query jsonutils.JSONObject, data jsonutils.JSONObject) (guestIdSet sets.String, hostIds []string, err error) {
  334. guestIdArr := jsonutils.GetArrayOfPrefix(data, "guest")
  335. if len(guestIdArr) == 0 {
  336. return nil, nil, httperrors.NewMissingParameterError("guest.0 guest.1 ... ")
  337. }
  338. guestIdSet = sets.NewString()
  339. hostIdSet := sets.NewString()
  340. for i := range guestIdArr {
  341. guestIdStr, _ := guestIdArr[i].GetString()
  342. model, err := GuestManager.FetchByIdOrName(ctx, userCred, guestIdStr)
  343. if err == sql.ErrNoRows {
  344. return nil, nil, httperrors.NewInputParameterError("no such model %s", guestIdStr)
  345. }
  346. if err != nil {
  347. return nil, nil, errors.Wrapf(err, "fail to fetch model by id or name %s", guestIdStr)
  348. }
  349. guest := model.(*SGuest)
  350. if guest.ProjectId != group.ProjectId {
  351. return nil, nil, httperrors.NewForbiddenError("guest and instance group should belong to same project")
  352. }
  353. guestIdSet.Insert(guest.GetId())
  354. hostIdSet.Insert(guest.HostId)
  355. }
  356. hostIds = hostIdSet.List()
  357. return
  358. }
  359. func (group *SGroup) PerformEnable(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input apis.PerformEnableInput) (jsonutils.JSONObject, error) {
  360. err := db.EnabledPerformEnable(group, ctx, userCred, true)
  361. if err != nil {
  362. return nil, errors.Wrap(err, "EnabledPerformEnable")
  363. }
  364. return nil, nil
  365. }
  366. func (group *SGroup) PerformDisable(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input apis.PerformDisableInput) (jsonutils.JSONObject, error) {
  367. err := db.EnabledPerformEnable(group, ctx, userCred, false)
  368. if err != nil {
  369. return nil, errors.Wrap(err, "EnabledPerformEnable")
  370. }
  371. return nil, nil
  372. }
  373. func (group *SGroup) ClearAllScheDescCache() error {
  374. guests, err := group.fetchAllGuests()
  375. if err != nil {
  376. return errors.Wrapf(err, "fail to fetch all guest of group %s", group.Id)
  377. }
  378. hostIdSet := sets.NewString()
  379. for i := range guests {
  380. hostIdSet.Insert(guests[i].HostId)
  381. }
  382. return group.clearSchedDescCache(hostIdSet.List())
  383. }
  384. func (group *SGroup) clearSchedDescCache(hostIds []string) error {
  385. var g errgroup.Group
  386. for i := range hostIds {
  387. hostId := hostIds[i]
  388. g.Go(func() error {
  389. return HostManager.ClearSchedDescCache(hostId)
  390. })
  391. }
  392. return g.Wait()
  393. }
  394. func (group *SGroup) fetchAllGuests() ([]SGuest, error) {
  395. ggSub := GroupguestManager.Query("guest_id").Equals("group_id", group.GetId()).SubQuery()
  396. guestSub := GuestManager.Query().SubQuery()
  397. q := guestSub.Query().Join(ggSub, sqlchemy.Equals(ggSub.Field("guest_id"), guestSub.Field("id")))
  398. guests := make([]SGuest, 0, 2)
  399. err := db.FetchModelObjects(GuestManager, q, &guests)
  400. if err != nil {
  401. return nil, err
  402. }
  403. return guests, nil
  404. }
  405. func (manager *SGroupManager) ListItemExportKeys(ctx context.Context,
  406. q *sqlchemy.SQuery,
  407. userCred mcclient.TokenCredential,
  408. keys stringutils2.SSortedStrings,
  409. ) (*sqlchemy.SQuery, error) {
  410. var err error
  411. q, err = manager.SVirtualResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  412. if err != nil {
  413. return nil, errors.Wrap(err, "SVirtualResourceBaseManager.ListItemExportKeys")
  414. }
  415. if keys.ContainsAny(manager.SZoneResourceBaseManager.GetExportKeys()...) {
  416. q, err = manager.SZoneResourceBaseManager.ListItemExportKeys(ctx, q, userCred, keys)
  417. if err != nil {
  418. return nil, errors.Wrap(err, "SZoneResourceBaseManager.ListItemExportKeys")
  419. }
  420. }
  421. return q, nil
  422. }
  423. func (grp *SGroup) getAttachedNetwork() (*SNetwork, error) {
  424. var netId string
  425. guests := grp.GetGuests()
  426. for i := range guests {
  427. guest := guests[i]
  428. nets, err := guest.GetNetworks("")
  429. if err != nil {
  430. return nil, errors.Wrapf(err, "guest.GestNetworks(%s)", guest.Name)
  431. }
  432. if len(nets) != 1 {
  433. return nil, errors.Wrapf(httperrors.ErrInvalidStatus, "guest (%s) has %d networks", guest.Name, len(nets))
  434. }
  435. if len(netId) == 0 {
  436. netId = nets[0].NetworkId
  437. } else if netId != nets[0].NetworkId {
  438. return nil, errors.Wrapf(httperrors.ErrInvalidStatus, "inconsistent networkId for member servers")
  439. }
  440. }
  441. if len(netId) == 0 {
  442. gns, err := GroupnetworkManager.FetchByGroupId(grp.Id)
  443. if err != nil {
  444. return nil, errors.Wrap(err, "GroupnetworkManager.FetchByGroupId")
  445. }
  446. for _, gn := range gns {
  447. netId = gn.NetworkId
  448. }
  449. }
  450. if len(netId) == 0 {
  451. return nil, nil
  452. }
  453. netObj, err := NetworkManager.FetchById(netId)
  454. if err != nil {
  455. return nil, errors.Wrapf(err, "NetworkManager.FetchById %s", netId)
  456. }
  457. return netObj.(*SNetwork), nil
  458. }
  459. func (net *SNetwork) GetRegionalQuotaKeys(ownerId mcclient.IIdentityProvider) (quotas.IQuotaKeys, error) {
  460. vpc, err := net.GetVpc()
  461. if err != nil {
  462. return nil, errors.Wrap(err, "getVpc")
  463. }
  464. provider := vpc.GetCloudprovider()
  465. if provider == nil && len(vpc.ManagerId) > 0 {
  466. return nil, errors.Wrap(httperrors.ErrInvalidStatus, "no valid manager")
  467. }
  468. region, _ := net.GetRegion()
  469. if region == nil {
  470. return nil, errors.Wrap(httperrors.ErrInvalidStatus, "no valid region")
  471. }
  472. return fetchRegionalQuotaKeys(rbacscope.ScopeProject, ownerId, region, provider), nil
  473. }
  474. func (grp *SGroup) PerformDetachnetwork(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.GroupDetachNetworkInput) (*api.SGroup, error) {
  475. net, err := grp.getAttachedNetwork()
  476. if err != nil {
  477. return nil, errors.Wrap(err, "getAttachedNetwork")
  478. }
  479. if net == nil {
  480. // no guest and no attached network
  481. return nil, nil
  482. }
  483. gns, err := GroupnetworkManager.FetchByGroupId(grp.Id)
  484. if err != nil {
  485. return nil, errors.Wrap(err, "GroupnetworkManager.FetchByGroupId")
  486. }
  487. if len(gns) == 0 {
  488. return nil, nil
  489. }
  490. for _, gn := range gns {
  491. if len(input.IpAddr) == 0 || gn.IpAddr == input.IpAddr || gn.Ip6Addr == input.IpAddr {
  492. if len(gn.EipId) > 0 {
  493. logclient.AddSimpleActionLog(grp, logclient.ACT_DETACH_NETWORK, "eip associated", userCred, false)
  494. return nil, errors.Wrap(httperrors.ErrInvalidStatus, "cannot detach network with eip")
  495. }
  496. // delete
  497. notes := gn.GetShortDesc(ctx)
  498. err := gn.Detach(ctx, userCred)
  499. if err != nil {
  500. logclient.AddSimpleActionLog(grp, logclient.ACT_DETACH_NETWORK, notes, userCred, false)
  501. return nil, errors.Wrap(err, "Detach")
  502. }
  503. logclient.AddSimpleActionLog(grp, logclient.ACT_DETACH_NETWORK, notes, userCred, true)
  504. }
  505. }
  506. return nil, nil
  507. }
  508. func (grp *SGroup) PerformAttachnetwork(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input *api.GroupAttachNetworkInput) (*api.SGroup, error) {
  509. net, err := grp.getAttachedNetwork()
  510. if err != nil {
  511. return nil, errors.Wrap(err, "getAttachedNetwork")
  512. }
  513. if len(input.NetworkId) > 0 {
  514. netObj, err := NetworkManager.FetchByIdOrName(ctx, userCred, input.NetworkId)
  515. if err != nil {
  516. if errors.Cause(err) == sql.ErrNoRows {
  517. return nil, httperrors.NewResourceNotFoundError2(NetworkManager.Keyword(), input.NetworkId)
  518. } else {
  519. return nil, errors.Wrap(err, "NetworkManager.FetchByIdOrName")
  520. }
  521. }
  522. if net != nil {
  523. if net.Id != netObj.GetId() {
  524. return nil, errors.Wrap(httperrors.ErrConflict, "provided network inconsistent with existing network")
  525. }
  526. } else {
  527. net = netObj.(*SNetwork)
  528. }
  529. } else if net == nil {
  530. return nil, errors.Wrap(httperrors.ErrInputParameter, "please specify network")
  531. }
  532. if len(input.IpAddr) > 0 {
  533. addr, err := netutils.NewIPV4Addr(input.IpAddr)
  534. if err != nil {
  535. return nil, errors.Wrapf(httperrors.ErrInputParameter, "invalid ip_addr %s", input.IpAddr)
  536. }
  537. if !net.GetIPRange().Contains(addr) {
  538. return nil, errors.Wrapf(httperrors.ErrInputParameter, "ip_addr %s not in range", input.IpAddr)
  539. }
  540. }
  541. if (len(input.Ip6Addr) > 0 || input.RequireIPv6) && !net.IsSupportIPv6() {
  542. return nil, errors.Wrap(httperrors.ErrInputParameter, "network is not ipv6 enabled")
  543. }
  544. if len(input.Ip6Addr) > 0 {
  545. addr6, err := netutils.NewIPV6Addr(input.Ip6Addr)
  546. if err != nil {
  547. return nil, errors.Wrapf(httperrors.ErrInputParameter, "invalid ip6_addr %s", input.Ip6Addr)
  548. }
  549. if !net.getIPRange6().Contains(addr6) {
  550. return nil, errors.Wrapf(httperrors.ErrInputParameter, "ip6_addr %s not in range", input.Ip6Addr)
  551. }
  552. input.Ip6Addr = addr6.String()
  553. }
  554. // check quota
  555. var inicCnt, enicCnt int
  556. var saveQuota bool
  557. if net.IsExitNetwork() {
  558. enicCnt = 1
  559. } else {
  560. inicCnt = 1
  561. }
  562. pendingUsage := &SRegionQuota{
  563. Port: inicCnt,
  564. Eport: enicCnt,
  565. }
  566. keys, err := net.GetRegionalQuotaKeys(grp.GetOwnerId())
  567. if err != nil {
  568. return nil, errors.Wrap(err, "GetRegionalQuotaKeys")
  569. }
  570. pendingUsage.SetKeys(keys)
  571. err = quotas.CheckSetPendingQuota(ctx, userCred, pendingUsage)
  572. if err != nil {
  573. return nil, httperrors.NewOutOfQuotaError("%v", err)
  574. }
  575. defer quotas.CancelPendingUsage(ctx, userCred, pendingUsage, pendingUsage, saveQuota)
  576. lockman.LockObject(ctx, net)
  577. defer lockman.ReleaseObject(ctx, net)
  578. ipAddr, err := net.GetFreeIP(ctx, userCred, nil, nil, input.IpAddr, input.AllocDir, input.Reserved != nil && *input.Reserved, api.AddressTypeIPv4)
  579. if err != nil {
  580. return nil, errors.Wrap(err, "GetFreeIPv4")
  581. }
  582. if len(input.IpAddr) > 0 && ipAddr != input.IpAddr && input.RequireDesignatedIp != nil && *input.RequireDesignatedIp {
  583. return nil, errors.Wrapf(httperrors.ErrConflict, "candidate ip %s is occupied!", input.IpAddr)
  584. }
  585. var ip6Addr string
  586. if len(input.Ip6Addr) > 0 || input.RequireIPv6 {
  587. ip6Addr, err = net.GetFreeIP(ctx, userCred, nil, nil, input.Ip6Addr, input.AllocDir, input.Reserved != nil && *input.Reserved, api.AddressTypeIPv6)
  588. if err != nil {
  589. return nil, errors.Wrap(err, "GetFreeIPv6")
  590. }
  591. if len(input.Ip6Addr) > 0 && ip6Addr != input.Ip6Addr && input.RequireDesignatedIp != nil && *input.RequireDesignatedIp {
  592. return nil, errors.Wrapf(httperrors.ErrConflict, "candidate v6 ip %s is occupied!", input.Ip6Addr)
  593. }
  594. }
  595. gn := SGroupnetwork{}
  596. gn.NetworkId = net.Id
  597. gn.GroupId = grp.Id
  598. gn.IpAddr = ipAddr
  599. gn.Ip6Addr = ip6Addr
  600. gn.SetModelManager(GroupnetworkManager, &gn)
  601. err = GroupnetworkManager.TableSpec().Insert(ctx, &gn)
  602. if err != nil {
  603. return nil, errors.Wrap(err, "Insert")
  604. }
  605. notes := gn.GetShortDesc(ctx)
  606. db.OpsLog.LogAttachEvent(ctx, grp, net, userCred, notes)
  607. logclient.AddActionLogWithContext(ctx, grp, logclient.ACT_ATTACH_NETWORK, notes, userCred, true)
  608. saveQuota = true
  609. guests := grp.GetGuests()
  610. for _, g := range guests {
  611. host, _ := g.GetHost()
  612. host.ClearSchedDescCache()
  613. g.StartSyncTask(ctx, userCred, false, "")
  614. }
  615. return nil, nil
  616. }
  617. func (grp *SGroup) GetVpc() (*SVpc, error) {
  618. net, err := grp.getAttachedNetwork()
  619. if err != nil {
  620. return nil, errors.Wrap(err, "getAttachedNetwork")
  621. }
  622. return net.GetVpc()
  623. }
  624. func (grp *SGroup) isEipAssociable() (*SNetwork, error) {
  625. err := ValidateAssociateEip(grp)
  626. if err != nil {
  627. return nil, err
  628. }
  629. net, err := grp.getAttachedNetwork()
  630. if err != nil {
  631. return nil, errors.Wrap(err, "getAttachedNetwork")
  632. }
  633. if net == nil {
  634. return nil, errors.Wrap(httperrors.ErrInvalidStatus, "group no attached network")
  635. }
  636. if !IsOneCloudVpcResource(net) {
  637. return nil, errors.Wrap(httperrors.ErrInvalidStatus, "group network is not a VPC network")
  638. }
  639. gns, err := grp.GetNetworks()
  640. if err != nil {
  641. return nil, errors.Wrap(err, "GetNetworks")
  642. }
  643. if len(gns) == 0 {
  644. return nil, errors.Wrap(httperrors.ErrInvalidStatus, "group no vips")
  645. }
  646. return net, nil
  647. }
  648. func (grp *SGroup) PerformAssociateEip(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.ServerAssociateEipInput) (jsonutils.JSONObject, error) {
  649. net, err := grp.isEipAssociable()
  650. if err != nil {
  651. return nil, errors.Wrap(err, "grp.isEipAssociable")
  652. }
  653. eipStr := input.EipId
  654. if len(eipStr) == 0 {
  655. return nil, httperrors.NewMissingParameterError("eip_id")
  656. }
  657. eipObj, err := ElasticipManager.FetchByIdOrName(ctx, userCred, eipStr)
  658. if err != nil {
  659. if err == sql.ErrNoRows {
  660. return nil, httperrors.NewResourceNotFoundError("eip %s not found", eipStr)
  661. } else {
  662. return nil, httperrors.NewGeneralError(err)
  663. }
  664. }
  665. eip := eipObj.(*SElasticip)
  666. if eip.Mode == api.EIP_MODE_INSTANCE_PUBLICIP {
  667. return nil, httperrors.NewUnsupportOperationError("fixed eip cannot be associated")
  668. }
  669. if eip.IsAssociated() {
  670. return nil, httperrors.NewConflictError("eip has been associated")
  671. }
  672. if net.Id == eip.NetworkId {
  673. return nil, httperrors.NewInputParameterError("cannot associate eip with same network")
  674. }
  675. eipZone, _ := eip.GetZone()
  676. if eipZone != nil {
  677. insZone, _ := net.GetZone()
  678. if eipZone.Id != insZone.Id {
  679. return nil, httperrors.NewInputParameterError("cannot associate eip and instance in different zone")
  680. }
  681. }
  682. grp.SetStatus(ctx, userCred, api.INSTANCE_ASSOCIATE_EIP, "associate eip")
  683. params := jsonutils.NewDict()
  684. params.Add(jsonutils.NewString(grp.Id), "instance_id")
  685. params.Add(jsonutils.NewString(api.EIP_ASSOCIATE_TYPE_INSTANCE_GROUP), "instance_type")
  686. if len(input.IpAddr) > 0 {
  687. params.Add(jsonutils.NewString(input.IpAddr), "ip_addr")
  688. }
  689. err = eip.StartEipAssociateTask(ctx, userCred, params, "")
  690. return nil, err
  691. }
  692. func (grp *SGroup) PerformCreateEip(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.ServerCreateEipInput) (jsonutils.JSONObject, error) {
  693. net, err := grp.isEipAssociable()
  694. if err != nil {
  695. return nil, errors.Wrap(err, "grp.isEipAssociable")
  696. }
  697. var (
  698. region, _ = net.GetRegion()
  699. regionDriver = region.GetDriver()
  700. bw = input.Bandwidth
  701. chargeType = input.ChargeType
  702. bgpType = input.BgpType
  703. autoDellocate = (input.AutoDellocate != nil && *input.AutoDellocate)
  704. )
  705. if len(chargeType) == 0 {
  706. chargeType = billing_api.TNetChargeType(regionDriver.GetEipDefaultChargeType())
  707. }
  708. if chargeType == billing_api.NET_CHARGE_TYPE_BY_BANDWIDTH {
  709. if bw == 0 {
  710. return nil, httperrors.NewMissingParameterError("bandwidth")
  711. }
  712. }
  713. eipPendingUsage := &SRegionQuota{Eip: 1}
  714. keys, err := net.GetRegionalQuotaKeys(grp.GetOwnerId())
  715. if err != nil {
  716. return nil, errors.Wrap(err, "")
  717. }
  718. eipPendingUsage.SetKeys(keys)
  719. err = quotas.CheckSetPendingQuota(ctx, userCred, eipPendingUsage)
  720. if err != nil {
  721. return nil, httperrors.NewOutOfQuotaError("Out of eip quota: %s", err)
  722. }
  723. eip, err := ElasticipManager.NewEipForVMOnHost(ctx, userCred, &NewEipForVMOnHostArgs{
  724. Bandwidth: int(bw),
  725. BgpType: bgpType,
  726. ChargeType: chargeType,
  727. AutoDellocate: autoDellocate,
  728. Group: grp,
  729. PendingUsage: eipPendingUsage,
  730. })
  731. if err != nil {
  732. quotas.CancelPendingUsage(ctx, userCred, eipPendingUsage, eipPendingUsage, false)
  733. return nil, httperrors.NewGeneralError(err)
  734. }
  735. opts := api.ElasticipAssociateInput{
  736. InstanceId: grp.Id,
  737. InstanceType: api.EIP_ASSOCIATE_TYPE_INSTANCE_GROUP,
  738. IpAddr: input.IpAddr,
  739. }
  740. err = eip.AllocateAndAssociateInstance(ctx, userCred, grp, opts, "")
  741. if err != nil {
  742. return nil, httperrors.NewGeneralError(err)
  743. }
  744. return nil, nil
  745. }
  746. func (grp *SGroup) getElasticIp() (*SElasticip, error) {
  747. return ElasticipManager.getEip(api.EIP_ASSOCIATE_TYPE_INSTANCE_GROUP, grp.Id, api.EIP_MODE_STANDALONE_EIP)
  748. }
  749. func (grp *SGroup) PerformDissociateEip(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, input api.ServerDissociateEipInput) (jsonutils.JSONObject, error) {
  750. eip, err := grp.getElasticIp()
  751. if err != nil {
  752. log.Errorf("Fail to get Eip %s", err)
  753. return nil, httperrors.NewGeneralError(err)
  754. }
  755. if eip == nil {
  756. return nil, httperrors.NewInvalidStatusError("No eip to dissociate")
  757. }
  758. err = db.IsObjectRbacAllowed(ctx, eip, userCred, policy.PolicyActionGet)
  759. if err != nil {
  760. return nil, errors.Wrap(err, "eip is not accessible")
  761. }
  762. grp.SetStatus(ctx, userCred, api.INSTANCE_DISSOCIATE_EIP, "associate eip")
  763. autoDelete := (input.AudoDelete != nil && *input.AudoDelete)
  764. err = eip.StartEipDissociateTask(ctx, userCred, autoDelete, "")
  765. if err != nil {
  766. log.Errorf("fail to start dissociate task %s", err)
  767. return nil, httperrors.NewGeneralError(err)
  768. }
  769. return nil, nil
  770. }
  771. func (grp *SGroup) Delete(ctx context.Context, userCred mcclient.TokenCredential) error {
  772. // cleanup groupnetwork
  773. grpnets, err := grp.GetNetworks()
  774. if err != nil {
  775. return errors.Wrap(err, "GetNetworks")
  776. }
  777. for i := range grpnets {
  778. err := grpnets[i].Delete(ctx, userCred)
  779. if err != nil {
  780. return errors.Wrap(err, "groupnetwork.Delete")
  781. }
  782. }
  783. return grp.SVirtualResourceBase.Delete(ctx, userCred)
  784. }