storage_lvm.go 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package storageman
  15. import (
  16. "context"
  17. "fmt"
  18. "os"
  19. "path"
  20. "yunion.io/x/jsonutils"
  21. "yunion.io/x/log"
  22. "yunion.io/x/pkg/errors"
  23. "yunion.io/x/pkg/util/qemuimgfmt"
  24. "yunion.io/x/pkg/util/regutils"
  25. "yunion.io/x/onecloud/pkg/apis"
  26. api "yunion.io/x/onecloud/pkg/apis/compute"
  27. hostapi "yunion.io/x/onecloud/pkg/apis/host"
  28. "yunion.io/x/onecloud/pkg/cloudcommon/consts"
  29. "yunion.io/x/onecloud/pkg/hostman/guestman/desc"
  30. deployapi "yunion.io/x/onecloud/pkg/hostman/hostdeployer/apis"
  31. "yunion.io/x/onecloud/pkg/hostman/hostdeployer/deployclient"
  32. "yunion.io/x/onecloud/pkg/hostman/hostutils"
  33. "yunion.io/x/onecloud/pkg/hostman/options"
  34. "yunion.io/x/onecloud/pkg/hostman/storageman/backupstorage"
  35. "yunion.io/x/onecloud/pkg/hostman/storageman/lvmutils"
  36. "yunion.io/x/onecloud/pkg/hostman/storageman/remotefile"
  37. "yunion.io/x/onecloud/pkg/httperrors"
  38. "yunion.io/x/onecloud/pkg/mcclient/auth"
  39. modules "yunion.io/x/onecloud/pkg/mcclient/modules/compute"
  40. identity_modules "yunion.io/x/onecloud/pkg/mcclient/modules/identity"
  41. "yunion.io/x/onecloud/pkg/mcclient/modules/image"
  42. "yunion.io/x/onecloud/pkg/util/procutils"
  43. "yunion.io/x/onecloud/pkg/util/qemuimg"
  44. "yunion.io/x/onecloud/pkg/util/seclib2"
  45. )
  46. type SLVMStorage struct {
  47. SBaseStorage
  48. }
  49. func NewLVMStorage(manager *SStorageManager, vgName string) *SLVMStorage {
  50. var ret = new(SLVMStorage)
  51. ret.SBaseStorage = *NewBaseStorage(manager, vgName)
  52. return ret
  53. }
  54. func (s *SLVMStorage) StorageType() string {
  55. return api.STORAGE_LVM
  56. }
  57. func (s *SLVMStorage) IsLocal() bool {
  58. return true
  59. }
  60. func (s *SLVMStorage) GetComposedName() string {
  61. return fmt.Sprintf("host_%s_%s_storage_%s", s.Manager.host.GetMasterIp(), s.StorageType(), s.Path)
  62. }
  63. func (s *SLVMStorage) GetMediumType() (string, error) {
  64. return api.DISK_TYPE_ROTATE, nil
  65. }
  66. func (s *SLVMStorage) GetFreeSizeMb() int {
  67. vgProps, err := lvmutils.GetVgProps(s.GetPath())
  68. if err != nil {
  69. log.Errorf("failed get vg_free %s", err)
  70. return -1
  71. }
  72. log.Infof("LVM Storage %s sizeMb %d", s.GetPath(), vgProps.VgSize/1024/1024)
  73. return int(vgProps.VgFree / 1024 / 1024)
  74. }
  75. func (s *SLVMStorage) GetAvailSizeMb() int {
  76. avaSize, _ := s.getAvailSizeMb()
  77. return int(avaSize)
  78. }
  79. func (s *SLVMStorage) getAvailSizeMb() (int64, error) {
  80. vgProps, err := lvmutils.GetVgProps(s.GetPath())
  81. if err != nil {
  82. return -1, err
  83. }
  84. log.Debugf("LVM Storage %s sizeMb %d", s.GetPath(), vgProps.VgSize/1024/1024)
  85. return vgProps.VgSize / 1024 / 1024, nil
  86. }
  87. func (s *SLVMStorage) GetUsedSizeMb() (int64, error) {
  88. vgProps, err := lvmutils.GetVgProps(s.GetPath())
  89. if err != nil {
  90. return -1, err
  91. }
  92. return (vgProps.VgSize - vgProps.VgFree) / 1024 / 1024, nil
  93. }
  94. func (s *SLVMStorage) SyncStorageSize() (api.SHostStorageStat, error) {
  95. stat := api.SHostStorageStat{
  96. StorageId: s.StorageId,
  97. }
  98. sizeMb, err := s.getAvailSizeMb()
  99. if err != nil {
  100. return stat, err
  101. }
  102. stat.CapacityMb = sizeMb
  103. stat.ActualCapacityUsedMb = 0
  104. return stat, nil
  105. }
  106. func (s *SLVMStorage) SyncStorageInfo() (jsonutils.JSONObject, error) {
  107. content := jsonutils.NewDict()
  108. name := s.GetName(s.GetComposedName)
  109. content.Set("name", jsonutils.NewString(name))
  110. sizeMb, err := s.getAvailSizeMb()
  111. if err != nil {
  112. return nil, errors.Wrap(err, "GetAvailSizeMb")
  113. }
  114. usedSizeMb, err := s.GetUsedSizeMb()
  115. if err != nil {
  116. return nil, errors.Wrap(err, "GetUsedSizeMb")
  117. }
  118. content.Set("capacity", jsonutils.NewInt(sizeMb))
  119. content.Set("actual_capacity_used", jsonutils.NewInt(usedSizeMb))
  120. content.Set("storage_type", jsonutils.NewString(s.StorageType()))
  121. content.Set("zone", jsonutils.NewString(s.GetZoneId()))
  122. var (
  123. res jsonutils.JSONObject
  124. )
  125. log.Infof("Sync storage info %s/%s", s.StorageId, name)
  126. if len(s.StorageId) > 0 {
  127. res, err = modules.Storages.Put(
  128. hostutils.GetComputeSession(context.Background()),
  129. s.StorageId, content)
  130. } else {
  131. mediumType, err := s.GetMediumType()
  132. if err != nil {
  133. log.Errorf("failed get medium type %s %s", s.GetPath(), err)
  134. } else {
  135. content.Set("medium_type", jsonutils.NewString(mediumType))
  136. }
  137. // reserved for imagecache
  138. reserved := sizeMb / 10
  139. if reserved > 1024*1024 {
  140. reserved = 1024 * 1024
  141. }
  142. content.Set("reserved", jsonutils.NewInt(reserved))
  143. res, err = modules.Storages.Create(hostutils.GetComputeSession(context.Background()), content)
  144. if err == nil {
  145. log.Errorf("storage created %s", res)
  146. storageCacheId, _ := res.GetString("storagecache_id")
  147. storageManager.InitLVMStorageImageCache(storageCacheId, s.GetPath(), s)
  148. s.SetStoragecacheId(storageCacheId)
  149. }
  150. }
  151. if err != nil {
  152. log.Errorf("SyncStorageInfo Failed: %s: %s", content, err)
  153. }
  154. return res, err
  155. }
  156. func (s *SLVMStorage) SetStorageInfo(storageId, storageName string, conf jsonutils.JSONObject) error {
  157. s.StorageId = storageId
  158. s.StorageName = storageName
  159. if dconf, ok := conf.(*jsonutils.JSONDict); ok {
  160. s.StorageConf = dconf
  161. }
  162. return nil
  163. }
  164. func (s *SLVMStorage) GetSnapshotDir() string {
  165. return ""
  166. }
  167. func (s *SLVMStorage) GetSnapshotPathByIds(diskId, snapshotId string) string {
  168. disk, err := s.GetDiskById(diskId)
  169. if err != nil {
  170. log.Errorf("lvm failed get disk by id %s: %s", diskId, err)
  171. return ""
  172. }
  173. return disk.GetSnapshotPath(snapshotId)
  174. }
  175. func (s *SLVMStorage) DeleteSnapshots(ctx context.Context, params interface{}) (jsonutils.JSONObject, error) {
  176. input := params.(*SStorageDeleteSnapshots)
  177. for i := range input.SnapshotIds {
  178. lvPath := path.Join("/dev", s.GetPath(), "snap_"+input.SnapshotIds[i])
  179. if err := lvmutils.LvRemove(lvPath); err != nil {
  180. return nil, err
  181. }
  182. }
  183. return nil, nil
  184. }
  185. func (s *SLVMStorage) DeleteSnapshot(ctx context.Context, params interface{}) (jsonutils.JSONObject, error) {
  186. input, ok := params.(*SStorageDeleteSnapshot)
  187. if !ok {
  188. return nil, hostutils.ParamsError
  189. }
  190. if input.BlockStream {
  191. if err := ConvertLVMDisk(s.GetPath(), input.DiskId, input.EncryptInfo); err != nil {
  192. return nil, err
  193. }
  194. } else if len(input.ConvertSnapshot) > 0 {
  195. convertSnapshotName := "snap_" + input.ConvertSnapshot
  196. if err := ConvertLVMDisk(s.GetPath(), convertSnapshotName, input.EncryptInfo); err != nil {
  197. return nil, err
  198. }
  199. }
  200. snapName := "snap_" + input.SnapshotId
  201. snapId := path.Join("/dev", s.GetPath(), snapName)
  202. err := lvmutils.LvRemove(snapId)
  203. if err != nil {
  204. return nil, err
  205. }
  206. res := jsonutils.NewDict()
  207. res.Set("deleted", jsonutils.JSONTrue)
  208. return res, nil
  209. }
  210. func (s *SLVMStorage) IsSnapshotExist(diskId, snapshotId string) (bool, error) {
  211. return false, errors.Errorf("unsupported operation")
  212. }
  213. func (s *SLVMStorage) GetDiskById(diskId string) (IDisk, error) {
  214. s.DiskLock.Lock()
  215. defer s.DiskLock.Unlock()
  216. for i := 0; i < len(s.Disks); i++ {
  217. if s.Disks[i].GetId() == diskId {
  218. err := s.Disks[i].Probe()
  219. if err != nil {
  220. return nil, errors.Wrapf(err, "disk.Prob")
  221. }
  222. return s.Disks[i], nil
  223. }
  224. }
  225. var disk = NewLVMDisk(s, diskId)
  226. if disk.Probe() == nil {
  227. s.Disks = append(s.Disks, disk)
  228. return disk, nil
  229. }
  230. return nil, errors.ErrNotFound
  231. }
  232. func (s *SLVMStorage) CreateDisk(diskId string) IDisk {
  233. s.DiskLock.Lock()
  234. defer s.DiskLock.Unlock()
  235. disk := NewLVMDisk(s, diskId)
  236. s.Disks = append(s.Disks, disk)
  237. return disk
  238. }
  239. func (s *SLVMStorage) SaveToGlance(ctx context.Context, input interface{}) (jsonutils.JSONObject, error) {
  240. info, ok := input.(SStorageSaveToGlanceInfo)
  241. if !ok {
  242. return nil, hostutils.ParamsError
  243. }
  244. data := info.DiskInfo
  245. var (
  246. imageId, _ = data.GetString("image_id")
  247. imagePath, _ = data.GetString("image_path")
  248. compress = jsonutils.QueryBoolean(data, "compress", true)
  249. encKeyId, _ = data.GetString("encrypt_key_id")
  250. err error
  251. )
  252. var (
  253. encKey string
  254. encFormat qemuimg.TEncryptFormat
  255. encAlg seclib2.TSymEncAlg
  256. )
  257. if len(encKeyId) > 0 {
  258. session := auth.GetSession(ctx, info.UserCred, consts.GetRegion())
  259. key, err := identity_modules.Credentials.GetEncryptKey(session, encKeyId)
  260. if err != nil {
  261. return nil, errors.Wrap(err, "GetEncryptKey")
  262. }
  263. encKey = key.Key
  264. encFormat = qemuimg.EncryptFormatLuks
  265. encAlg = key.Alg
  266. }
  267. if err = s.saveToGlance(ctx, imageId, imagePath, compress, encKey, encFormat, encAlg); err != nil {
  268. log.Errorf("Save to glance failed: %s", err)
  269. s.onSaveToGlanceFailed(ctx, imageId, err.Error())
  270. }
  271. imagecacheManager := s.Manager.LocalStorageImagecacheManager
  272. if err != nil || len(imagecacheManager.GetId()) > 0 {
  273. return nil, procutils.NewCommand("rm", "-f", imagePath).Run()
  274. } else {
  275. dstPath := path.Join(imagecacheManager.GetPath(), imageId)
  276. if err := procutils.NewCommand("mv", imagePath, dstPath).Run(); err != nil {
  277. log.Errorf("Fail to move saved image to cache: %s", err)
  278. }
  279. imagecacheManager.LoadImageCache(imageId)
  280. _, err := hostutils.RemoteStoragecacheCacheImage(ctx,
  281. imagecacheManager.GetId(), imageId, "active", dstPath)
  282. if err != nil {
  283. log.Errorf("Fail to remote cache image: %s", err)
  284. }
  285. }
  286. return nil, nil
  287. }
  288. func (s *SLVMStorage) saveToGlance(
  289. ctx context.Context, imageId, imagePath string, compress bool,
  290. encryptKey string, encFormat qemuimg.TEncryptFormat, encAlg seclib2.TSymEncAlg,
  291. ) error {
  292. log.Infof("saveToGlance %s", imagePath)
  293. diskInfo := &deployapi.DiskInfo{
  294. Path: imagePath,
  295. }
  296. if len(encryptKey) > 0 {
  297. diskInfo.EncryptPassword = encryptKey
  298. diskInfo.EncryptFormat = string(encFormat)
  299. diskInfo.EncryptAlg = string(encAlg)
  300. }
  301. ret, err := deployclient.GetDeployClient().SaveToGlance(ctx,
  302. &deployapi.SaveToGlanceParams{DiskInfo: diskInfo, Compress: compress})
  303. if err != nil {
  304. log.Errorf("GetDeployClient.SaveToGlance fail %s", err)
  305. return errors.Wrap(err, "deployclient.GetDeployClient().SaveToGlance")
  306. }
  307. f, err := os.Open(imagePath)
  308. if err != nil {
  309. return errors.Wrap(err, "open image")
  310. }
  311. defer f.Close()
  312. finfo, err := f.Stat()
  313. if err != nil {
  314. return errors.Wrap(err, "f.Stat image")
  315. }
  316. size := finfo.Size()
  317. var params = jsonutils.NewDict()
  318. if len(ret.OsInfo) > 0 {
  319. params.Set("os_type", jsonutils.NewString(ret.OsInfo))
  320. }
  321. releaseInfoToParams(ret.ReleaseInfo, params)
  322. params.Set("image_id", jsonutils.NewString(imageId))
  323. _, err = image.Images.Upload(hostutils.GetImageSession(ctx),
  324. params, f, size)
  325. if err != nil {
  326. return errors.Wrap(err, "image upload")
  327. }
  328. return nil
  329. }
  330. func (s *SLVMStorage) DestinationPrepareMigrate(
  331. ctx context.Context, liveMigrate bool, disksUri string, snapshotsUri string,
  332. disksBackingFile, diskSnapsChain, outChainSnaps jsonutils.JSONObject,
  333. rebaseDisks bool,
  334. diskinfo *desc.SGuestDisk,
  335. serverId string, idx, totalDiskCount int,
  336. encInfo *apis.SEncryptInfo, sysDiskHasTemplate bool,
  337. ) error {
  338. var (
  339. diskId = diskinfo.DiskId
  340. snapshots, _ = diskSnapsChain.GetArray(diskId)
  341. disk = s.CreateDisk(diskId)
  342. diskOutChainSnaps, _ = outChainSnaps.GetArray(diskId)
  343. )
  344. if disk == nil {
  345. return fmt.Errorf(
  346. "Storage %s create disk %s failed", s.GetId(), diskId)
  347. }
  348. templateId := diskinfo.TemplateId
  349. // create snapshots form remote url
  350. var (
  351. diskStorageId = diskinfo.StorageId
  352. baseImagePath string
  353. )
  354. for i, snapshotId := range snapshots {
  355. snapId, _ := snapshotId.GetString()
  356. snapshotUrl := fmt.Sprintf("%s/%s/%s/%s",
  357. snapshotsUri, diskStorageId, diskId, snapId)
  358. snapshotPath := path.Join("/dev", s.GetPath(), "snap_"+snapId)
  359. log.Infof("Disk %s snapshot %s url: %s", diskId, snapId, snapshotUrl)
  360. if err := s.CreateSnapshotFormUrl(ctx, snapshotUrl, diskId, snapshotPath); err != nil {
  361. return errors.Wrap(err, "create from snapshot url failed")
  362. }
  363. if i == 0 && len(templateId) > 0 && sysDiskHasTemplate {
  364. templatePath := path.Join("/dev", s.GetPath(), "imagecache_"+templateId)
  365. // check if template is encrypted
  366. img, err := qemuimg.NewQemuImage(templatePath)
  367. if err != nil {
  368. return errors.Wrap(err, "template image probe fail")
  369. }
  370. if img.Encrypted {
  371. templatePath = qemuimg.GetQemuFilepath(templatePath, "sec0", qemuimg.EncryptFormatLuks)
  372. }
  373. if err := doRebaseDisk(snapshotPath, templatePath, encInfo); err != nil {
  374. return err
  375. }
  376. } else if rebaseDisks && len(baseImagePath) > 0 {
  377. if encInfo != nil {
  378. baseImagePath = qemuimg.GetQemuFilepath(baseImagePath, "sec0", qemuimg.EncryptFormatLuks)
  379. }
  380. if err := doRebaseDisk(snapshotPath, baseImagePath, encInfo); err != nil {
  381. return err
  382. }
  383. }
  384. baseImagePath = snapshotPath
  385. }
  386. for _, snapshotId := range diskOutChainSnaps {
  387. snapId, _ := snapshotId.GetString()
  388. snapshotUrl := fmt.Sprintf("%s/%s/%s/%s",
  389. snapshotsUri, diskStorageId, diskId, snapId)
  390. snapshotPath := disk.GetSnapshotPath(snapId)
  391. log.Infof("Disk %s snapshot %s url: %s", diskId, snapId, snapshotUrl)
  392. if err := s.CreateSnapshotFormUrl(ctx, snapshotUrl, diskId, snapshotPath); err != nil {
  393. return errors.Wrap(err, "create from snapshot url failed")
  394. }
  395. }
  396. if liveMigrate {
  397. // create local disk
  398. backingFile, _ := disksBackingFile.GetString(diskId)
  399. _, err := disk.CreateRaw(ctx, int(diskinfo.Size), "qcow2", "", nil, encInfo, "", backingFile)
  400. if err != nil {
  401. log.Errorln(err)
  402. return err
  403. }
  404. } else {
  405. // download disk form remote url
  406. diskUrl := fmt.Sprintf("%s/%s/%s", disksUri, diskStorageId, diskId)
  407. err := disk.CreateFromUrl(ctx, diskUrl, 0, func(progress, progressMbps float64, totalSizeMb int64) {
  408. log.Debugf("[%.2f / %d] disk %s create %.2f with speed %.2fMbps", progress*float64(totalSizeMb)/100, totalSizeMb, disk.GetId(), progress, progressMbps)
  409. newProgress := float64(idx-1)/float64(totalDiskCount)*100.0 + 1/float64(totalDiskCount)*progress
  410. if len(serverId) > 0 {
  411. log.Debugf("server %s migrate %.2f with speed %.2fMbps", serverId, newProgress, progressMbps)
  412. hostutils.UpdateServerProgress(context.Background(), serverId, newProgress, progressMbps)
  413. }
  414. })
  415. if err != nil {
  416. return errors.Wrap(err, "CreateFromUrl")
  417. }
  418. }
  419. if rebaseDisks && len(templateId) > 0 && len(baseImagePath) == 0 {
  420. templatePath := path.Join(storageManager.LocalStorageImagecacheManager.GetPath(), templateId)
  421. // check if template is encrypted
  422. img, err := qemuimg.NewQemuImage(templatePath)
  423. if err != nil {
  424. return errors.Wrap(err, "template image probe fail")
  425. }
  426. if img.Encrypted {
  427. templatePath = qemuimg.GetQemuFilepath(templatePath, "sec0", qemuimg.EncryptFormatLuks)
  428. }
  429. if err := doRebaseDisk(disk.GetPath(), templatePath, encInfo); err != nil {
  430. return err
  431. }
  432. } else if rebaseDisks && len(baseImagePath) > 0 {
  433. if encInfo != nil {
  434. baseImagePath = qemuimg.GetQemuFilepath(baseImagePath, "sec0", qemuimg.EncryptFormatLuks)
  435. }
  436. if err := doRebaseDisk(disk.GetPath(), baseImagePath, encInfo); err != nil {
  437. return err
  438. }
  439. }
  440. diskinfo.Path = disk.GetPath()
  441. return nil
  442. }
  443. func (s *SLVMStorage) CreateDiskFromSnapshot(ctx context.Context, disk IDisk, input *SDiskCreateByDiskinfo) (jsonutils.JSONObject, error) {
  444. info := input.DiskInfo
  445. if info.Protocol == "fuse" {
  446. var encryptInfo *apis.SEncryptInfo
  447. if info.Encryption {
  448. encryptInfo = &info.EncryptInfo
  449. }
  450. err := disk.CreateFromRemoteHostImage(ctx, info.SnapshotUrl, int64(info.DiskSizeMb), encryptInfo)
  451. if err != nil {
  452. return nil, errors.Wrapf(err, "CreateFromRemoteHostImage")
  453. }
  454. return disk.GetDiskDesc(), nil
  455. }
  456. return nil, httperrors.NewUnsupportOperationError("Unsupport protocol %s for lvm storage", info.Protocol)
  457. }
  458. func (s *SLVMStorage) CreateDiskFromExistingPath(context.Context, IDisk, *SDiskCreateByDiskinfo) error {
  459. return errors.Errorf("unsupported operation")
  460. }
  461. func (s *SLVMStorage) CreateDiskFromBackup(ctx context.Context, disk IDisk, input *SDiskCreateByDiskinfo) error {
  462. lvSizeMb := lvmutils.GetQcow2LvSize(int64(input.DiskInfo.DiskSizeMb))
  463. if err := lvmutils.LvCreate(s.GetPath(), disk.GetId(), lvSizeMb*1024*1024); err != nil {
  464. return errors.Wrap(err, "CreateRaw")
  465. }
  466. err := doRestoreDisk(ctx, s, input, disk, disk.GetPath())
  467. if err != nil {
  468. return errors.Wrap(err, "doRestoreDisk")
  469. }
  470. return nil
  471. }
  472. func (s *SLVMStorage) GetFuseTmpPath() string {
  473. localPath := options.HostOptions.ImageCachePath
  474. if len(options.HostOptions.LocalImagePath) > 0 {
  475. localPath = options.HostOptions.LocalImagePath[0]
  476. }
  477. return path.Join(localPath, _FUSE_TMP_PATH_)
  478. }
  479. func (s *SLVMStorage) GetFuseMountPath() string {
  480. localPath := options.HostOptions.ImageCachePath
  481. if len(options.HostOptions.LocalImagePath) > 0 {
  482. localPath = options.HostOptions.LocalImagePath[0]
  483. }
  484. return path.Join(localPath, _FUSE_MOUNT_PATH_)
  485. }
  486. func (s *SLVMStorage) CreateSnapshotFormUrl(ctx context.Context, snapshotUrl, diskId, snapshotPath string) error {
  487. remoteFile := remotefile.NewRemoteFile(ctx, snapshotUrl, snapshotPath,
  488. false, "", -1, nil, "", "")
  489. err := remoteFile.Fetch(nil)
  490. return errors.Wrapf(err, "fetch snapshot from %s", snapshotUrl)
  491. }
  492. func (s *SLVMStorage) GetImgsaveBackupPath() string {
  493. return path.Join(options.HostOptions.ImageCachePath, "image_save")
  494. }
  495. func (s *SLVMStorage) Accessible() error {
  496. out, err := procutils.NewRemoteCommandAsFarAsPossible("pvscan", "--cache").Output()
  497. if err != nil {
  498. return errors.Wrapf(err, "pvscan --cache failed %s", out)
  499. }
  500. if err := lvmutils.VgDisplay(s.Path); err != nil {
  501. return err
  502. }
  503. return nil
  504. }
  505. func (s *SLVMStorage) Detach() error {
  506. return nil
  507. }
  508. func (s *SLVMStorage) StorageBackup(ctx context.Context, params *SStorageBackup) (jsonutils.JSONObject, error) {
  509. backupStorage, err := backupstorage.GetBackupStorage(params.BackupStorageId, params.BackupStorageAccessInfo)
  510. if err != nil {
  511. return nil, err
  512. }
  513. backupPath := params.BackupLocalPath
  514. err = backupstorage.SaveBackupFromFile(ctx, backupPath, params.BackupId, backupStorage)
  515. if err != nil {
  516. return nil, err
  517. }
  518. // remove local backup
  519. if err = lvmutils.LvRemove(backupPath); err != nil {
  520. return nil, errors.Wrap(err, "On backuped lvremove")
  521. }
  522. return nil, nil
  523. }
  524. func (s *SLVMStorage) CloneDiskFromStorage(ctx context.Context, srcStorage IStorage, srcDisk IDisk, targetDiskId string, fullCopy bool, encInfo apis.SEncryptInfo) (*hostapi.ServerCloneDiskFromStorageResponse, error) {
  525. srcDiskPath := srcDisk.GetPath()
  526. srcImg, err := qemuimg.NewQemuImage(srcDiskPath)
  527. if err != nil {
  528. return nil, errors.Wrapf(err, "Get source image %q info", srcDiskPath)
  529. }
  530. if encInfo.Id != "" {
  531. srcImg.SetPassword(encInfo.Key)
  532. }
  533. // create target disk lv
  534. lvSize := lvmutils.GetQcow2LvSize(srcImg.SizeBytes/1024/1024) * 1024 * 1024
  535. if err = lvmutils.LvCreate(s.GetPath(), targetDiskId, lvSize); err != nil {
  536. return nil, errors.Wrap(err, "lvcreate")
  537. }
  538. // start create target disk. if full copy is false, just create
  539. // empty target disk with same size and format
  540. accessPath := path.Join("/dev", s.GetPath(), targetDiskId)
  541. if fullCopy {
  542. _, err = srcImg.Clone(accessPath, qemuimgfmt.QCOW2, false)
  543. } else {
  544. newImg, err := qemuimg.NewQemuImage(accessPath)
  545. if err != nil {
  546. return nil, errors.Wrap(err, "failed new qemu image")
  547. }
  548. err = newImg.CreateQcow2(srcImg.GetSizeMB(), false, "", encInfo.Key, qemuimg.EncryptFormatLuks, encInfo.Alg)
  549. }
  550. if err != nil {
  551. return nil, errors.Wrap(err, "Clone source disk to target local storage")
  552. }
  553. return &hostapi.ServerCloneDiskFromStorageResponse{
  554. TargetAccessPath: accessPath,
  555. TargetFormat: qemuimgfmt.QCOW2.String(),
  556. }, nil
  557. }
  558. func (s *SLVMStorage) CleanRecycleDiskfiles(ctx context.Context) {
  559. log.Infof("SLVMStorage CleanRecycleDiskfiles do nothing!")
  560. }
  561. func (d *SLVMStorage) GetDisksPath() ([]string, error) {
  562. spath := d.GetPath()
  563. lvNames, err := lvmutils.GetLvNames(spath)
  564. if err != nil {
  565. return nil, err
  566. }
  567. disksPath := make([]string, 0)
  568. for _, f := range lvNames {
  569. if regutils.MatchUUIDExact(f) {
  570. disksPath = append(disksPath, path.Join("/dev", spath, f))
  571. }
  572. }
  573. return disksPath, nil
  574. }
  575. func ConvertLVMDiskNeedReload(vgName, lvName string, encryptInfo apis.SEncryptInfo) (func() error, error) {
  576. return convertLVMDisk(vgName, lvName, encryptInfo)
  577. }
  578. func convertLVMDisk(vgName, lvName string, encryptInfo apis.SEncryptInfo) (func() error, error) {
  579. diskPath := path.Join("/dev", vgName, lvName)
  580. qemuImg, err := qemuimg.NewQemuImage(diskPath)
  581. if err != nil {
  582. log.Errorln(err)
  583. return nil, err
  584. }
  585. lvSize, err := lvmutils.GetLvSize(diskPath)
  586. if err != nil {
  587. return nil, err
  588. }
  589. tmpVolume := lvName + "-convert.tmp"
  590. tmpVolumePath := path.Join("/dev", vgName, tmpVolume)
  591. // create /dev/vg/disk-convert.tmp
  592. if err := lvmutils.LvCreate(vgName, tmpVolume, lvSize); err != nil {
  593. return nil, errors.Wrap(err, "delete snapshot LvCreate")
  594. }
  595. srcInfo := qemuimg.SImageInfo{
  596. Path: diskPath,
  597. Format: qemuImg.Format,
  598. IoLevel: qemuimg.IONiceNone,
  599. Password: encryptInfo.Key,
  600. EncryptAlg: encryptInfo.Alg,
  601. EncryptFormat: qemuimg.EncryptFormatLuks,
  602. ClusterSize: qemuImg.ClusterSize,
  603. }
  604. destInfo := qemuimg.SImageInfo{
  605. Path: tmpVolumePath,
  606. Format: qemuimgfmt.QCOW2,
  607. IoLevel: qemuimg.IONiceNone,
  608. Password: encryptInfo.Key,
  609. EncryptAlg: encryptInfo.Alg,
  610. EncryptFormat: qemuimg.EncryptFormatLuks,
  611. }
  612. // convert /dev/vg/disk to /dev/vg/disk-convert.tmp
  613. if err = qemuimg.Convert(srcInfo, destInfo, false, nil); err != nil {
  614. if e := lvmutils.LvRemove(tmpVolumePath); e != nil {
  615. log.Errorf("failed remote lvm convert tmp volume %s", tmpVolumePath)
  616. }
  617. return nil, errors.Wrap(err, "failed convert tmp disk")
  618. }
  619. tmpVolume2 := lvName + "-convert.tmp2"
  620. tmpVolume2Path := path.Join("/dev", vgName, tmpVolume2)
  621. // rename /dev/vg/disk to /dev/vg/disk-convert.tmp2
  622. err = lvmutils.LvRename(vgName, diskPath, tmpVolume2)
  623. if err != nil {
  624. return nil, errors.Wrap(err, "failed rename disk to tmp")
  625. }
  626. // rename /dev/vg/disk-convert.tmp to /dev/vg/disk
  627. err = lvmutils.LvRename(vgName, tmpVolume, diskPath)
  628. if err != nil {
  629. return nil, errors.Wrap(err, "failed rename tmp to disk")
  630. }
  631. return func() error {
  632. // delete /dev/vg/disk-convert.tmp2
  633. e1 := lvmutils.LvRemove(tmpVolume2Path)
  634. if e1 != nil {
  635. return errors.Wrap(err, "failed remove tmp disk")
  636. }
  637. return nil
  638. }, nil
  639. }
  640. func ConvertLVMDisk(vgName, lvName string, encryptInfo apis.SEncryptInfo) error {
  641. delTmpVolume2Disk, err := convertLVMDisk(vgName, lvName, encryptInfo)
  642. if err != nil {
  643. return err
  644. }
  645. err = delTmpVolume2Disk()
  646. if err != nil {
  647. return err
  648. }
  649. return nil
  650. }