mirror of
https://github.com/yunionio/cloudpods.git
synced 2026-05-16 12:08:20 +08:00
385 lines
12 KiB
Go
385 lines
12 KiB
Go
// Copyright 2019 Yunion
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package models
|
|
|
|
import (
|
|
"context"
|
|
|
|
"yunion.io/x/cloudmux/pkg/cloudprovider"
|
|
"yunion.io/x/jsonutils"
|
|
"yunion.io/x/pkg/errors"
|
|
"yunion.io/x/pkg/util/compare"
|
|
"yunion.io/x/pkg/util/regutils"
|
|
"yunion.io/x/sqlchemy"
|
|
|
|
api "yunion.io/x/onecloud/pkg/apis/compute"
|
|
"yunion.io/x/onecloud/pkg/cloudcommon/db"
|
|
"yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
|
|
"yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
|
|
"yunion.io/x/onecloud/pkg/cloudcommon/validators"
|
|
"yunion.io/x/onecloud/pkg/httperrors"
|
|
"yunion.io/x/onecloud/pkg/mcclient"
|
|
"yunion.io/x/onecloud/pkg/util/stringutils2"
|
|
)
|
|
|
|
type SNatDEntryManager struct {
|
|
SNatEntryManager
|
|
}
|
|
|
|
var NatDEntryManager *SNatDEntryManager
|
|
|
|
func init() {
|
|
NatDEntryManager = &SNatDEntryManager{
|
|
SNatEntryManager: NewNatEntryManager(
|
|
SNatDEntry{},
|
|
"natdtables_tbl",
|
|
"natdentry",
|
|
"natdentries",
|
|
),
|
|
}
|
|
NatDEntryManager.SetVirtualObject(NatDEntryManager)
|
|
}
|
|
|
|
type SNatDEntry struct {
|
|
SNatEntry
|
|
|
|
ExternalIP string `width:"17" charset:"ascii" list:"user" create:"required"`
|
|
ExternalPort int `list:"user" create:"required"`
|
|
|
|
InternalIP string `width:"17" charset:"ascii" list:"user" create:"required"`
|
|
InternalPort int `list:"user" create:"required"`
|
|
IpProtocol string `width:"8" charset:"ascii" list:"user" create:"required"`
|
|
}
|
|
|
|
// NAT网关的目的地址转换规则列表
|
|
func (man *SNatDEntryManager) ListItemFilter(
|
|
ctx context.Context,
|
|
q *sqlchemy.SQuery,
|
|
userCred mcclient.TokenCredential,
|
|
query api.NatDEntryListInput,
|
|
) (*sqlchemy.SQuery, error) {
|
|
q, err := man.SNatEntryManager.ListItemFilter(ctx, q, userCred, query.NatEntryListInput)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "SNatEntryManager.ListItemFilter")
|
|
}
|
|
|
|
if len(query.ExternalIP) > 0 {
|
|
q = q.In("external_ip", query.ExternalIP)
|
|
}
|
|
if len(query.ExternalPort) > 0 {
|
|
q = q.In("external_port", query.ExternalPort)
|
|
}
|
|
if len(query.InternalIP) > 0 {
|
|
q = q.In("internal_ip", query.InternalIP)
|
|
}
|
|
if len(query.InternalPort) > 0 {
|
|
q = q.In("internal_port", query.InternalPort)
|
|
}
|
|
if len(query.IpProtocol) > 0 {
|
|
q = q.In("ip_protocol", query.IpProtocol)
|
|
}
|
|
|
|
return q, nil
|
|
}
|
|
|
|
func (manager *SNatDEntryManager) OrderByExtraFields(
|
|
ctx context.Context,
|
|
q *sqlchemy.SQuery,
|
|
userCred mcclient.TokenCredential,
|
|
query api.NatDEntryListInput,
|
|
) (*sqlchemy.SQuery, error) {
|
|
q, err := manager.SNatEntryManager.OrderByExtraFields(ctx, q, userCred, query.NatEntryListInput)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "SNatEntryManager.OrderByExtraFields")
|
|
}
|
|
return q, nil
|
|
}
|
|
|
|
func (manager *SNatDEntryManager) QueryDistinctExtraField(q *sqlchemy.SQuery, field string) (*sqlchemy.SQuery, error) {
|
|
var err error
|
|
|
|
q, err = manager.SNatEntryManager.QueryDistinctExtraField(q, field)
|
|
if err == nil {
|
|
return q, nil
|
|
}
|
|
|
|
return q, httperrors.ErrNotFound
|
|
}
|
|
|
|
func (self *SNatDEntry) GetUniqValues() jsonutils.JSONObject {
|
|
return jsonutils.Marshal(map[string]string{"natgateway_id": self.NatgatewayId})
|
|
}
|
|
|
|
func (manager *SNatDEntryManager) FetchUniqValues(ctx context.Context, data jsonutils.JSONObject) jsonutils.JSONObject {
|
|
natId, _ := data.GetString("natgateway_id")
|
|
return jsonutils.Marshal(map[string]string{"natgateway_id": natId})
|
|
}
|
|
|
|
func (manager *SNatDEntryManager) FilterByUniqValues(q *sqlchemy.SQuery, values jsonutils.JSONObject) *sqlchemy.SQuery {
|
|
natId, _ := values.GetString("natgateway_id")
|
|
if len(natId) > 0 {
|
|
q = q.Equals("natgateway_id", natId)
|
|
}
|
|
return q
|
|
}
|
|
|
|
func (man *SNatDEntryManager) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, input *api.SNatDCreateInput) (*api.SNatDCreateInput, error) {
|
|
if len(input.NatgatewayId) == 0 {
|
|
return nil, httperrors.NewMissingParameterError("natgateway_id")
|
|
}
|
|
if len(input.Eip) == 0 {
|
|
return nil, httperrors.NewMissingParameterError("eip")
|
|
}
|
|
if input.ExternalPort < 1 || input.ExternalPort > 65535 {
|
|
return nil, httperrors.NewInputParameterError("Port value error")
|
|
}
|
|
if input.InternalPort < 1 || input.InternalPort > 65535 {
|
|
return nil, httperrors.NewInputParameterError("Port value error")
|
|
}
|
|
if !regutils.MatchIPAddr(input.InternalIp) {
|
|
return nil, httperrors.NewInputParameterError("invalid internal ip address: %s", input.InternalIp)
|
|
}
|
|
|
|
_eip, err := validators.ValidateModel(userCred, ElasticipManager, &input.Eip)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
eip := _eip.(*SElasticip)
|
|
input.ExternalIp = eip.IpAddr
|
|
|
|
q := man.Query().Equals("external_ip", input.ExternalIp).Equals("external_port", input.ExternalPort)
|
|
count, err := q.CountWithError()
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "q.CountWithError")
|
|
}
|
|
|
|
if count > 0 {
|
|
return nil, httperrors.NewInputParameterError("there are dnat rules with same external ip and external port")
|
|
}
|
|
|
|
// check that eip is suitable
|
|
if len(eip.AssociateId) > 0 && eip.AssociateId != input.NatgatewayId {
|
|
return nil, httperrors.NewInputParameterError("eip has been binding to another instance")
|
|
}
|
|
return input, nil
|
|
}
|
|
|
|
func (manager *SNatDEntryManager) SyncNatDTable(
|
|
ctx context.Context,
|
|
userCred mcclient.TokenCredential,
|
|
provider *SCloudprovider,
|
|
nat *SNatGateway,
|
|
extDTable []cloudprovider.ICloudNatDEntry,
|
|
xor bool,
|
|
) compare.SyncResult {
|
|
syncOwnerId := provider.GetOwnerId()
|
|
|
|
lockman.LockRawObject(ctx, manager.Keyword(), nat.Id)
|
|
defer lockman.ReleaseRawObject(ctx, manager.Keyword(), nat.Id)
|
|
|
|
result := compare.SyncResult{}
|
|
dbNatDTables, err := nat.GetDTable()
|
|
if err != nil {
|
|
result.Error(err)
|
|
return result
|
|
}
|
|
|
|
removed := make([]SNatDEntry, 0)
|
|
commondb := make([]SNatDEntry, 0)
|
|
commonext := make([]cloudprovider.ICloudNatDEntry, 0)
|
|
added := make([]cloudprovider.ICloudNatDEntry, 0)
|
|
if err := compare.CompareSets(dbNatDTables, extDTable, &removed, &commondb, &commonext, &added); err != nil {
|
|
result.Error(err)
|
|
return result
|
|
}
|
|
|
|
for i := 0; i < len(removed); i += 1 {
|
|
err := removed[i].syncRemoveCloudNatDTable(ctx, userCred)
|
|
if err != nil {
|
|
result.DeleteError(err)
|
|
} else {
|
|
result.Delete()
|
|
}
|
|
}
|
|
|
|
if !xor {
|
|
for i := 0; i < len(commondb); i += 1 {
|
|
err := commondb[i].SyncWithCloudNatDTable(ctx, userCred, commonext[i], syncOwnerId)
|
|
if err != nil {
|
|
result.UpdateError(err)
|
|
continue
|
|
}
|
|
result.Update()
|
|
}
|
|
}
|
|
|
|
for i := 0; i < len(added); i += 1 {
|
|
_, err := manager.newFromCloudNatDTable(ctx, userCred, syncOwnerId, nat, added[i])
|
|
if err != nil {
|
|
result.AddError(err)
|
|
continue
|
|
}
|
|
result.Add()
|
|
}
|
|
return result
|
|
}
|
|
|
|
func (self *SNatDEntry) GetCloudproviderId() string {
|
|
nat, _ := self.GetNatgateway()
|
|
if nat != nil {
|
|
return nat.GetCloudproviderId()
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (self *SNatDEntry) syncRemoveCloudNatDTable(ctx context.Context, userCred mcclient.TokenCredential) error {
|
|
lockman.LockObject(ctx, self)
|
|
defer lockman.ReleaseObject(ctx, self)
|
|
|
|
err := self.ValidateDeleteCondition(ctx, nil)
|
|
if err != nil { // cannot delete
|
|
return self.SetStatus(userCred, api.VPC_STATUS_UNKNOWN, "sync to delete")
|
|
}
|
|
return self.RealDelete(ctx, userCred)
|
|
}
|
|
|
|
func (self *SNatDEntry) SyncWithCloudNatDTable(ctx context.Context, userCred mcclient.TokenCredential, extEntry cloudprovider.ICloudNatDEntry, syncOwnerId mcclient.IIdentityProvider) error {
|
|
diff, err := db.UpdateWithLock(ctx, self, func() error {
|
|
self.Status = extEntry.GetStatus()
|
|
self.ExternalIP = extEntry.GetExternalIp()
|
|
self.ExternalPort = extEntry.GetExternalPort()
|
|
self.InternalIP = extEntry.GetInternalIp()
|
|
self.InternalPort = extEntry.GetInternalPort()
|
|
self.IpProtocol = extEntry.GetIpProtocol()
|
|
return nil
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
SyncCloudDomain(userCred, self, syncOwnerId)
|
|
|
|
syncMetadata(ctx, userCred, self, extEntry)
|
|
db.OpsLog.LogSyncUpdate(self, diff, userCred)
|
|
return nil
|
|
}
|
|
|
|
func (manager *SNatDEntryManager) newFromCloudNatDTable(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, nat *SNatGateway, extEntry cloudprovider.ICloudNatDEntry) (*SNatDEntry, error) {
|
|
table := SNatDEntry{}
|
|
table.SetModelManager(manager, &table)
|
|
|
|
table.Status = extEntry.GetStatus()
|
|
table.ExternalId = extEntry.GetGlobalId()
|
|
table.IsEmulated = extEntry.IsEmulated()
|
|
table.NatgatewayId = nat.Id
|
|
table.ExternalIP = extEntry.GetExternalIp()
|
|
table.ExternalPort = extEntry.GetExternalPort()
|
|
table.InternalIP = extEntry.GetInternalIp()
|
|
table.InternalPort = extEntry.GetInternalPort()
|
|
table.IpProtocol = extEntry.GetIpProtocol()
|
|
|
|
var err = func() error {
|
|
lockman.LockRawObject(ctx, manager.Keyword(), "name")
|
|
defer lockman.ReleaseRawObject(ctx, manager.Keyword(), "name")
|
|
|
|
var err error
|
|
table.Name, err = db.GenerateName(ctx, manager, ownerId, extEntry.GetName())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return manager.TableSpec().Insert(ctx, &table)
|
|
}()
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "Insert")
|
|
}
|
|
|
|
SyncCloudDomain(userCred, &table, ownerId)
|
|
syncMetadata(ctx, userCred, &table, extEntry)
|
|
|
|
db.OpsLog.LogEvent(&table, db.ACT_CREATE, table.GetShortDesc(ctx), userCred)
|
|
|
|
return &table, nil
|
|
}
|
|
|
|
func (manager *SNatDEntryManager) FetchCustomizeColumns(
|
|
ctx context.Context,
|
|
userCred mcclient.TokenCredential,
|
|
query jsonutils.JSONObject,
|
|
objs []interface{},
|
|
fields stringutils2.SSortedStrings,
|
|
isList bool,
|
|
) []api.NatDEntryDetails {
|
|
rows := make([]api.NatDEntryDetails, len(objs))
|
|
entryRows := manager.SNatEntryManager.FetchCustomizeColumns(ctx, userCred, query, objs, fields, isList)
|
|
for i := range rows {
|
|
rows[i] = api.NatDEntryDetails{
|
|
NatEntryDetails: entryRows[i],
|
|
}
|
|
}
|
|
return rows
|
|
}
|
|
|
|
func (self *SNatDEntry) PostCreate(ctx context.Context, userCred mcclient.TokenCredential, ownerId mcclient.IIdentityProvider, query jsonutils.JSONObject, data jsonutils.JSONObject) {
|
|
var err = func() error {
|
|
task, err := taskman.TaskManager.NewTask(ctx, "SNatDEntryCreateTask", self, userCred, nil, "", "", nil)
|
|
if err != nil {
|
|
return errors.Wrapf(err, "NewTask")
|
|
}
|
|
return task.ScheduleRun(nil)
|
|
}()
|
|
if err != nil {
|
|
self.SetStatus(userCred, api.NAT_STATUS_CREATE_FAILED, err.Error())
|
|
return
|
|
}
|
|
self.SetStatus(userCred, api.NAT_STATUS_ALLOCATE, "")
|
|
}
|
|
|
|
func (self *SNatDEntry) CustomizeDelete(ctx context.Context, userCred mcclient.TokenCredential, query jsonutils.JSONObject, data jsonutils.JSONObject) error {
|
|
return self.StartDeleteDNatTask(ctx, userCred)
|
|
}
|
|
|
|
func (self *SNatDEntry) StartDeleteDNatTask(ctx context.Context, userCred mcclient.TokenCredential) error {
|
|
var err = func() error {
|
|
task, err := taskman.TaskManager.NewTask(ctx, "SNatDEntryDeleteTask", self, userCred, nil, "", "", nil)
|
|
if err != nil {
|
|
return errors.Wrapf(err, "NewTask")
|
|
}
|
|
return task.ScheduleRun(nil)
|
|
}()
|
|
if err != nil {
|
|
self.SetStatus(userCred, api.NAT_STATUS_DELETE_FAILED, err.Error())
|
|
return err
|
|
}
|
|
self.SetStatus(userCred, api.NAT_STATUS_DELETING, "")
|
|
return nil
|
|
}
|
|
|
|
func (self *SNatDEntry) GetEip() (*SElasticip, error) {
|
|
q := ElasticipManager.Query().Equals("ip_addr", self.ExternalIP)
|
|
eips := []SElasticip{}
|
|
err := db.FetchModelObjects(ElasticipManager, q, &eips)
|
|
if err != nil {
|
|
return nil, errors.Wrapf(err, "db.FetchModelObjects")
|
|
}
|
|
if len(eips) == 1 {
|
|
return &eips[0], nil
|
|
}
|
|
if len(eips) == 0 {
|
|
return nil, errors.Wrapf(cloudprovider.ErrNotFound, self.ExternalIP)
|
|
}
|
|
return nil, errors.Wrapf(cloudprovider.ErrDuplicateId, self.ExternalIP)
|
|
}
|