base.go 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package guestdrivers
  15. import (
  16. "context"
  17. "fmt"
  18. "net/http"
  19. "strings"
  20. "time"
  21. "yunion.io/x/cloudmux/pkg/cloudprovider"
  22. "yunion.io/x/jsonutils"
  23. "yunion.io/x/log"
  24. "yunion.io/x/pkg/errors"
  25. "yunion.io/x/pkg/util/billing"
  26. "yunion.io/x/pkg/util/fileutils"
  27. "yunion.io/x/pkg/util/osprofile"
  28. "yunion.io/x/pkg/util/regutils"
  29. "yunion.io/x/pkg/utils"
  30. api "yunion.io/x/onecloud/pkg/apis/compute"
  31. "yunion.io/x/onecloud/pkg/cloudcommon/consts"
  32. "yunion.io/x/onecloud/pkg/cloudcommon/db/quotas"
  33. "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
  34. "yunion.io/x/onecloud/pkg/cloudcommon/tsdb"
  35. guestdriver_types "yunion.io/x/onecloud/pkg/compute/guestdrivers/types"
  36. "yunion.io/x/onecloud/pkg/compute/models"
  37. "yunion.io/x/onecloud/pkg/compute/options"
  38. "yunion.io/x/onecloud/pkg/httperrors"
  39. "yunion.io/x/onecloud/pkg/mcclient"
  40. "yunion.io/x/onecloud/pkg/mcclient/auth"
  41. "yunion.io/x/onecloud/pkg/mcclient/modules/scheduler"
  42. )
  43. type SBaseGuestScheduleDriver struct{}
  44. func (d SBaseGuestScheduleDriver) DoScheduleSKUFilter() bool { return true }
  45. func (d SBaseGuestScheduleDriver) DoScheduleCPUFilter() bool { return true }
  46. func (d SBaseGuestScheduleDriver) DoScheduleMemoryFilter() bool { return true }
  47. func (d SBaseGuestScheduleDriver) DoScheduleStorageFilter() bool { return true }
  48. func (d SBaseGuestScheduleDriver) DoScheduleCloudproviderTagFilter() bool { return false }
  49. type SBaseGuestDriver struct {
  50. SBaseGuestScheduleDriver
  51. }
  52. func (drv *SBaseGuestDriver) IsAllowSaveImageOnRunning() bool {
  53. return false
  54. }
  55. func (drv *SBaseGuestDriver) StartGuestCreateTask(guest *models.SGuest, ctx context.Context, userCred mcclient.TokenCredential, data *jsonutils.JSONDict, pendingUsage quotas.IQuota, parentTaskId string) error {
  56. task, err := taskman.TaskManager.NewTask(ctx, "GuestCreateTask", guest, userCred, data, parentTaskId, "", pendingUsage)
  57. if err != nil {
  58. return err
  59. }
  60. task.ScheduleRun(nil)
  61. return nil
  62. }
  63. func (drv *SBaseGuestDriver) OnGuestCreateTaskComplete(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  64. duration, _ := task.GetParams().GetString("duration")
  65. if len(duration) > 0 {
  66. bc, err := billing.ParseBillingCycle(duration)
  67. if err == nil && guest.ExpiredAt.IsZero() {
  68. models.SaveRenewInfo(ctx, task.GetUserCred(), guest, &bc, nil, "")
  69. }
  70. if jsonutils.QueryBoolean(task.GetParams(), "auto_prepaid_recycle", false) {
  71. err := guest.CanPerformPrepaidRecycle()
  72. if err == nil {
  73. task.SetStageComplete(ctx, nil)
  74. guest.DoPerformPrepaidRecycle(ctx, task.GetUserCred(), true)
  75. return nil
  76. }
  77. }
  78. }
  79. if jsonutils.QueryBoolean(task.GetParams(), "auto_start", false) {
  80. task.SetStage("OnAutoStartGuest", nil)
  81. return guest.StartGueststartTask(ctx, task.GetUserCred(), nil, task.GetTaskId())
  82. } else {
  83. task.SetStage("OnSyncStatusComplete", nil)
  84. return guest.StartSyncstatus(ctx, task.GetUserCred(), task.GetTaskId())
  85. }
  86. }
  87. func (drv *SBaseGuestDriver) StartDeleteGuestTask(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, params *jsonutils.JSONDict, parentTaskId string) error {
  88. task, err := taskman.TaskManager.NewTask(ctx, "GenericGuestDeleteTask", guest, userCred, params, parentTaskId, "", nil)
  89. if err != nil {
  90. return err
  91. }
  92. task.ScheduleRun(nil)
  93. return nil
  94. }
  95. func (drv *SBaseGuestDriver) ValidateImage(ctx context.Context, image *cloudprovider.SImage) error {
  96. return nil
  97. }
  98. func (drv *SBaseGuestDriver) RequestDetachDisksFromGuestForDelete(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  99. task.ScheduleRun(nil)
  100. return nil
  101. }
  102. func (drv *SBaseGuestDriver) OnDeleteGuestFinalCleanup(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential) error {
  103. return guest.DeleteAllDisksInDB(ctx, userCred)
  104. }
  105. func (drv *SBaseGuestDriver) RequestDetachDisk(ctx context.Context, guest *models.SGuest, disk *models.SDisk, task taskman.ITask) error {
  106. task.ScheduleRun(nil)
  107. return nil
  108. }
  109. func (drv *SBaseGuestDriver) RequestChangeBillingType(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  110. return errors.Wrapf(cloudprovider.ErrNotImplemented, "RequestChangeBillingType")
  111. }
  112. func (drv *SBaseGuestDriver) RequestAttachDisk(ctx context.Context, guest *models.SGuest, disk *models.SDisk, task taskman.ITask) error {
  113. task.ScheduleRun(nil)
  114. return nil
  115. }
  116. func (drv *SBaseGuestDriver) RequestOpenForward(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, req *guestdriver_types.OpenForwardRequest) (*guestdriver_types.OpenForwardResponse, error) {
  117. return nil, cloudprovider.ErrNotImplemented
  118. }
  119. func (drv *SBaseGuestDriver) RequestListForward(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, req *guestdriver_types.ListForwardRequest) (*guestdriver_types.ListForwardResponse, error) {
  120. return nil, cloudprovider.ErrNotImplemented
  121. }
  122. func (drv *SBaseGuestDriver) RequestCloseForward(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, req *guestdriver_types.CloseForwardRequest) (*guestdriver_types.CloseForwardResponse, error) {
  123. return nil, cloudprovider.ErrNotImplemented
  124. }
  125. func (drv *SBaseGuestDriver) RequestSaveImage(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, task taskman.ITask) error {
  126. return errors.Wrapf(cloudprovider.ErrNotImplemented, "RequestSaveImage")
  127. }
  128. func (drv *SBaseGuestDriver) RequestGuestCreateAllDisks(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  129. return fmt.Errorf("Not Implement")
  130. }
  131. func (drv *SBaseGuestDriver) GetDetachDiskStatus() ([]string, error) {
  132. return []string{}, fmt.Errorf("This Guest driver dose not implement GetDetachDiskStatus")
  133. }
  134. func (drv *SBaseGuestDriver) GetAttachDiskStatus() ([]string, error) {
  135. return []string{}, fmt.Errorf("This Guest driver dose not implement GetAttachDiskStatus")
  136. }
  137. func (drv *SBaseGuestDriver) GetRebuildRootStatus() ([]string, error) {
  138. return []string{}, fmt.Errorf("This Guest driver dose not implement GetRebuildRootStatus")
  139. }
  140. func (drv *SBaseGuestDriver) IsRebuildRootSupportChangeImage() bool {
  141. return true
  142. }
  143. func (drv *SBaseGuestDriver) IsRebuildRootSupportChangeUEFI() bool {
  144. return true
  145. }
  146. func (drv *SBaseGuestDriver) GetChangeInstanceTypeStatus() ([]string, error) {
  147. return []string{}, fmt.Errorf("This Guest driver dose not implement GetChangeInstanceTypeStatus")
  148. }
  149. func (drv *SBaseGuestDriver) ValidateDetachDisk(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, disk *models.SDisk) error {
  150. return nil
  151. }
  152. func (drv *SBaseGuestDriver) ValidateCreateEip(ctx context.Context, userCred mcclient.TokenCredential, input api.ServerCreateEipInput) error {
  153. return httperrors.NewInputParameterError("Not Implement ValidateCreateEip")
  154. }
  155. func (drv *SBaseGuestDriver) ValidateResizeDisk(guest *models.SGuest, disk *models.SDisk, storage *models.SStorage) error {
  156. return fmt.Errorf("This Guest driver dose not implement ValidateResizeDisk")
  157. }
  158. func (drv *SBaseGuestDriver) GetDeployStatus() ([]string, error) {
  159. return []string{}, fmt.Errorf("This Guest driver dose not implement GetDeployStatus")
  160. }
  161. func (drv *SBaseGuestDriver) IsNeedRestartForResetLoginInfo() bool {
  162. return true
  163. }
  164. func (drv *SBaseGuestDriver) RequestDeleteDetachedDisk(ctx context.Context, disk *models.SDisk, task taskman.ITask, isPurge bool) error {
  165. return fmt.Errorf("Not Implement")
  166. }
  167. func (drv *SBaseGuestDriver) RequestSuspendOnHost(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  168. return fmt.Errorf("Not Implement")
  169. }
  170. func (drv *SBaseGuestDriver) RequestResumeOnHost(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  171. return fmt.Errorf("Not Implement")
  172. }
  173. func (drv *SBaseGuestDriver) StartGuestResetTask(guest *models.SGuest, ctx context.Context, userCred mcclient.TokenCredential, isHard bool, parentTaskId string) error {
  174. return fmt.Errorf("Not Implement")
  175. }
  176. func (drv *SBaseGuestDriver) StartGuestRestartTask(guest *models.SGuest, ctx context.Context, userCred mcclient.TokenCredential, isForce bool, parentTaskId string) error {
  177. data := jsonutils.NewDict()
  178. data.Set("is_force", jsonutils.NewBool(isForce))
  179. if err := guest.SetStatus(ctx, userCred, api.VM_STOPPING, ""); err != nil {
  180. return err
  181. }
  182. task, err := taskman.TaskManager.NewTask(ctx, "GuestRestartTask", guest, userCred, nil, parentTaskId, "", nil)
  183. if err != nil {
  184. return err
  185. }
  186. task.ScheduleRun(nil)
  187. return nil
  188. }
  189. func (drv *SBaseGuestDriver) RequestSoftReset(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  190. return fmt.Errorf("Not Implement")
  191. }
  192. func (drv *SBaseGuestDriver) AllowReconfigGuest() bool {
  193. return true
  194. }
  195. func (drv *SBaseGuestDriver) DoGuestCreateDisksTask(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  196. return fmt.Errorf("Not Implement")
  197. }
  198. func (drv *SBaseGuestDriver) RequestChangeVmConfig(ctx context.Context, guest *models.SGuest, task taskman.ITask, instanceType string, vcpuCount, cpuSockets, vmemSize int64) error {
  199. return errors.Wrapf(cloudprovider.ErrNotImplemented, "RequestChangeVmConfig")
  200. }
  201. func (drv *SBaseGuestDriver) NeedRequestGuestHotAddIso(ctx context.Context, guest *models.SGuest) bool {
  202. return false
  203. }
  204. func (drv *SBaseGuestDriver) RequestGuestHotAddIso(ctx context.Context, guest *models.SGuest, path string, boot bool, task taskman.ITask) error {
  205. return fmt.Errorf("Not Implement")
  206. }
  207. func (drv *SBaseGuestDriver) RequestGuestHotRemoveIso(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  208. return fmt.Errorf("Not Implement")
  209. }
  210. func (drv *SBaseGuestDriver) RequestRebuildRootDisk(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  211. return fmt.Errorf("Not Implement")
  212. }
  213. func (drv *SBaseGuestDriver) NeedRequestGuestHotAddVfd(ctx context.Context, guest *models.SGuest) bool {
  214. return false
  215. }
  216. func (drv *SBaseGuestDriver) RequestGuestHotAddVfd(ctx context.Context, guest *models.SGuest, path string, boot bool, task taskman.ITask) error {
  217. return fmt.Errorf("Not Implement")
  218. }
  219. func (drv *SBaseGuestDriver) RequestGuestHotRemoveVfd(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  220. return fmt.Errorf("Not Implement")
  221. }
  222. func (drv *SBaseGuestDriver) RequestDiskSnapshot(ctx context.Context, guest *models.SGuest, task taskman.ITask, snapshotId, diskId string) error {
  223. return fmt.Errorf("Not Implement")
  224. }
  225. func (drv *SBaseGuestDriver) RequestDeleteSnapshot(ctx context.Context, guest *models.SGuest, task taskman.ITask, params *jsonutils.JSONDict) error {
  226. return fmt.Errorf("Not Implement")
  227. }
  228. func (drv *SBaseGuestDriver) RequestReloadDiskSnapshot(ctx context.Context, guest *models.SGuest, task taskman.ITask, params *jsonutils.JSONDict) error {
  229. return fmt.Errorf("Not Implement")
  230. }
  231. func (drv *SBaseGuestDriver) RequestSyncToBackup(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  232. return fmt.Errorf("Not Implement")
  233. }
  234. func (drv *SBaseGuestDriver) RequestSlaveBlockStreamDisks(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  235. return fmt.Errorf("Not Implement")
  236. }
  237. func (drv *SBaseGuestDriver) GetMaxSecurityGroupCount() int {
  238. return 5
  239. }
  240. func (drv *SBaseGuestDriver) getTaskRequestHeader(task taskman.ITask) http.Header {
  241. return task.GetTaskRequestHeader()
  242. }
  243. func (drv *SBaseGuestDriver) IsSupportedBillingCycle(bc billing.SBillingCycle) bool {
  244. return true
  245. }
  246. func (drv *SBaseGuestDriver) IsSupportPostpaidExpire() bool {
  247. return true
  248. }
  249. func (drv *SBaseGuestDriver) IsSupportShutdownMode() bool {
  250. return false
  251. }
  252. func (drv *SBaseGuestDriver) RequestRenewInstance(ctx context.Context, guest *models.SGuest, bc billing.SBillingCycle) (time.Time, error) {
  253. return time.Time{}, nil
  254. }
  255. func (drv *SBaseGuestDriver) IsSupportEip() bool {
  256. return false
  257. }
  258. func (drv *SBaseGuestDriver) IsSupportPublicIp() bool {
  259. return false
  260. }
  261. func (drv *SBaseGuestDriver) RemoteDeployGuestForCreate(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, host *models.SHost, desc cloudprovider.SManagedVMCreateConfig) (jsonutils.JSONObject, error) {
  262. return nil, cloudprovider.ErrNotSupported
  263. }
  264. func (drv *SBaseGuestDriver) RemoteDeployGuestSyncHost(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, host *models.SHost, iVM cloudprovider.ICloudVM) (cloudprovider.ICloudHost, error) {
  265. return nil, cloudprovider.ErrNotSupported
  266. }
  267. func (drv *SBaseGuestDriver) RemoteActionAfterGuestCreated(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, host *models.SHost, ivm cloudprovider.ICloudVM, desc *cloudprovider.SManagedVMCreateConfig) {
  268. return
  269. }
  270. func (drv *SBaseGuestDriver) RemoteDeployGuestForDeploy(ctx context.Context, guest *models.SGuest, ihost cloudprovider.ICloudHost, task taskman.ITask, desc cloudprovider.SManagedVMCreateConfig) (jsonutils.JSONObject, error) {
  271. return nil, cloudprovider.ErrNotSupported
  272. }
  273. func (drv *SBaseGuestDriver) RemoteDeployGuestForRebuildRoot(ctx context.Context, guest *models.SGuest, ihost cloudprovider.ICloudHost, task taskman.ITask, desc cloudprovider.SManagedVMCreateConfig) (jsonutils.JSONObject, error) {
  274. return nil, cloudprovider.ErrNotSupported
  275. }
  276. func (drv *SBaseGuestDriver) GetGuestInitialStateAfterCreate() string {
  277. return api.VM_READY
  278. }
  279. func (drv *SBaseGuestDriver) GetGuestInitialStateAfterRebuild() string {
  280. return api.VM_READY
  281. }
  282. func (drv *SBaseGuestDriver) IsNeedInjectPasswordByCloudInit() bool {
  283. return false
  284. }
  285. func (drv *SBaseGuestDriver) GetWindowsUserDataType() string {
  286. return cloudprovider.CLOUD_POWER_SHELL
  287. }
  288. func (drv *SBaseGuestDriver) IsWindowsUserDataTypeNeedEncode() bool {
  289. return false
  290. }
  291. func (drv *SBaseGuestDriver) IsSupportdDcryptPasswordFromSecretKey() bool {
  292. return true
  293. }
  294. func (drv *SBaseGuestDriver) GetUserDataType() string {
  295. return cloudprovider.CLOUD_CONFIG
  296. }
  297. func (drv *SBaseGuestDriver) GetDefaultAccount(osType, osDist, imageType string) string {
  298. if strings.ToLower(osType) == strings.ToLower(osprofile.OS_TYPE_WINDOWS) {
  299. return api.VM_DEFAULT_WINDOWS_LOGIN_USER
  300. }
  301. return api.VM_DEFAULT_LINUX_LOGIN_USER
  302. }
  303. func (drv *SBaseGuestDriver) OnGuestChangeCpuMemFailed(ctx context.Context, guest *models.SGuest, data *jsonutils.JSONDict, task taskman.ITask) error {
  304. return nil
  305. }
  306. func (drv *SBaseGuestDriver) RequestSyncConfigOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, task taskman.ITask) error {
  307. return fmt.Errorf("SBaseGuestDriver: Not Implement")
  308. }
  309. func (drv *SBaseGuestDriver) IsSupportGuestClone() bool {
  310. return true
  311. }
  312. func (drv *SBaseGuestDriver) RequestSyncSecgroupsOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, task taskman.ITask) error {
  313. return nil // do nothing
  314. }
  315. func (drv *SBaseGuestDriver) IsSupportPublicipToEip() bool {
  316. return false
  317. }
  318. func (drv *SBaseGuestDriver) RequestConvertPublicipToEip(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, task taskman.ITask) error {
  319. return fmt.Errorf("Not Implement RequestConvertPublicipToEip")
  320. }
  321. func (drv *SBaseGuestDriver) IsSupportSetAutoRenew() bool {
  322. return false
  323. }
  324. func (drv *SBaseGuestDriver) RequestSetAutoRenewInstance(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, input api.GuestAutoRenewInput, task taskman.ITask) error {
  325. return fmt.Errorf("Not Implement RequestSetAutoRenewInstance")
  326. }
  327. func (drv *SBaseGuestDriver) IsSupportMigrate() bool {
  328. return false
  329. }
  330. func (drv *SBaseGuestDriver) IsSupportLiveMigrate() bool {
  331. return false
  332. }
  333. func (drv *SBaseGuestDriver) CheckMigrate(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential, input api.GuestMigrateInput) error {
  334. return nil
  335. }
  336. func (drv *SBaseGuestDriver) CheckLiveMigrate(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential, input api.GuestLiveMigrateInput) error {
  337. return nil
  338. }
  339. func (drv *SBaseGuestDriver) RequestMigrate(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential, input api.GuestMigrateInput, task taskman.ITask) error {
  340. return errors.Wrapf(cloudprovider.ErrNotImplemented, "RequestMigrate")
  341. }
  342. func (drv *SBaseGuestDriver) RequestLiveMigrate(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential, input api.GuestLiveMigrateInput, task taskman.ITask) error {
  343. return errors.Wrapf(cloudprovider.ErrNotImplemented, "RequestLiveMigrate")
  344. }
  345. func (drv *SBaseGuestDriver) RequestCancelLiveMigrate(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential) error {
  346. return errors.Wrapf(cloudprovider.ErrNotImplemented, "RequestCancelLiveMigrate")
  347. }
  348. func (drv *SVirtualizedGuestDriver) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, input *api.ServerCreateInput) (*api.ServerCreateInput, error) {
  349. return input, nil
  350. }
  351. func (drv *SBaseGuestDriver) ValidateUpdateData(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential, input api.ServerUpdateInput) (api.ServerUpdateInput, error) {
  352. return input, nil
  353. }
  354. func (drv *SBaseGuestDriver) RequestRemoteUpdate(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential, replaceTags bool) error {
  355. // nil ops
  356. return nil
  357. }
  358. func (drv *SBaseGuestDriver) ValidateRebuildRoot(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, input *api.ServerRebuildRootInput) (*api.ServerRebuildRootInput, error) {
  359. return input, nil
  360. }
  361. func (drv *SBaseGuestDriver) ValidateDetachNetwork(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest) error {
  362. return nil
  363. }
  364. func (drv *SBaseGuestDriver) ValidateChangeDiskStorage(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, targetStorageId string) error {
  365. return cloudprovider.ErrNotImplemented
  366. }
  367. func (drv *SBaseGuestDriver) StartChangeDiskStorageTask(guest *models.SGuest, ctx context.Context, userCred mcclient.TokenCredential, params *api.ServerChangeDiskStorageInternalInput, parentTaskId string) error {
  368. task, err := taskman.TaskManager.NewTask(ctx, "GuestChangeDiskStorageTask", guest, userCred, jsonutils.Marshal(params).(*jsonutils.JSONDict), parentTaskId, "", nil)
  369. if err != nil {
  370. return err
  371. }
  372. task.ScheduleRun(nil)
  373. return nil
  374. }
  375. func (drv *SBaseGuestDriver) RequestChangeDiskStorage(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, input *api.ServerChangeDiskStorageInternalInput, task taskman.ITask) error {
  376. return cloudprovider.ErrNotImplemented
  377. }
  378. func (drv *SBaseGuestDriver) RequestSwitchToTargetStorageDisk(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, input *api.ServerChangeDiskStorageInternalInput, task taskman.ITask) error {
  379. return cloudprovider.ErrNotImplemented
  380. }
  381. func (drv *SBaseGuestDriver) RequestSyncIsolatedDevice(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  382. task.ScheduleRun(nil)
  383. return nil
  384. }
  385. func (drv *SBaseGuestDriver) RequestCPUSet(ctx context.Context, userCred mcclient.TokenCredential, host *models.SHost, guest *models.SGuest, input *api.ServerCPUSetInput) (*api.ServerCPUSetResp, error) {
  386. return nil, httperrors.ErrNotImplemented
  387. }
  388. func (drv *SBaseGuestDriver) RequestCPUSetRemove(ctx context.Context, userCred mcclient.TokenCredential, host *models.SHost, guest *models.SGuest, input *api.ServerCPUSetRemoveInput) error {
  389. return httperrors.ErrNotImplemented
  390. }
  391. func (drv *SBaseGuestDriver) QgaRequestGuestPing(ctx context.Context, header http.Header, host *models.SHost, guest *models.SGuest, async bool, input *api.ServerQgaTimeoutInput) error {
  392. return httperrors.ErrNotImplemented
  393. }
  394. func (drv *SBaseGuestDriver) QgaRequestSetUserPassword(ctx context.Context, task taskman.ITask, host *models.SHost, guest *models.SGuest, input *api.ServerQgaSetPasswordInput) error {
  395. return httperrors.ErrNotImplemented
  396. }
  397. func (self *SBaseGuestDriver) QgaRequestGuestInfoTask(ctx context.Context, userCred mcclient.TokenCredential, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
  398. return nil, httperrors.ErrNotImplemented
  399. }
  400. func (self *SBaseGuestDriver) QgaRequestSetNetwork(ctx context.Context, task taskman.ITask, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
  401. return nil, httperrors.ErrNotImplemented
  402. }
  403. func (self *SBaseGuestDriver) QgaRequestGetNetwork(ctx context.Context, userCred mcclient.TokenCredential, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
  404. return nil, httperrors.ErrNotImplemented
  405. }
  406. func (drv *SBaseGuestDriver) QgaRequestGetOsInfo(ctx context.Context, userCred mcclient.TokenCredential, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
  407. return nil, httperrors.ErrNotImplemented
  408. }
  409. func (drv *SBaseGuestDriver) RequestQgaCommand(ctx context.Context, userCred mcclient.TokenCredential, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
  410. return nil, httperrors.ErrNotImplemented
  411. }
  412. func (self *SBaseGuestDriver) RequestGuestScreenDump(ctx context.Context, userCred mcclient.TokenCredential, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
  413. return nil, httperrors.ErrNotImplemented
  414. }
  415. func (drv *SBaseGuestDriver) FetchMonitorUrl(ctx context.Context, guest *models.SGuest) string {
  416. s := auth.GetAdminSessionWithPublic(ctx, consts.GetRegion())
  417. tsdbURL, err := tsdb.GetDefaultServiceSourceURL(s, options.Options.MonitorEndpointType)
  418. if err != nil {
  419. log.Errorf("FetchMonitorUrl fail %s", err)
  420. return ""
  421. }
  422. return tsdbURL
  423. }
  424. func (drv *SBaseGuestDriver) RequestResetNicTrafficLimit(ctx context.Context, task taskman.ITask, host *models.SHost, guest *models.SGuest, input []api.ServerNicTrafficLimit) error {
  425. return httperrors.ErrNotImplemented
  426. }
  427. func (drv *SBaseGuestDriver) RequestSetNicTrafficLimit(ctx context.Context, task taskman.ITask, host *models.SHost, guest *models.SGuest, input []api.ServerNicTrafficLimit) error {
  428. return httperrors.ErrNotImplemented
  429. }
  430. func (drv *SBaseGuestDriver) SyncOsInfo(ctx context.Context, userCred mcclient.TokenCredential, g *models.SGuest, extVM cloudprovider.IOSInfo) error {
  431. return nil
  432. }
  433. func (self *SBaseGuestDriver) ValidateSetOSInfo(ctx context.Context, userCred mcclient.TokenCredential, _ *models.SGuest, _ *api.ServerSetOSInfoInput) error {
  434. return nil
  435. }
  436. func (self *SBaseGuestDriver) ValidateSyncOSInfo(ctx context.Context, userCred mcclient.TokenCredential, _ *models.SGuest) error {
  437. return httperrors.ErrNotImplemented
  438. }
  439. func (self *SBaseGuestDriver) RequestStartRescue(ctx context.Context, task taskman.ITask, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) error {
  440. return httperrors.ErrNotImplemented
  441. }
  442. func (base *SBaseGuestDriver) ValidateGuestChangeConfigInput(ctx context.Context, guest *models.SGuest, input api.ServerChangeConfigInput) (*api.ServerChangeConfigSettings, error) {
  443. confs := api.ServerChangeConfigSettings{}
  444. confs.Old.InstanceType = guest.InstanceType
  445. confs.Old.VcpuCount = guest.VcpuCount
  446. confs.Old.CpuSockets = guest.CpuSockets
  447. confs.Old.VmemSize = guest.VmemSize
  448. confs.Old.ExtraCpuCount = guest.ExtraCpuCount
  449. region, err := guest.GetRegion()
  450. if err != nil {
  451. return nil, err
  452. }
  453. if len(input.InstanceType) > 0 {
  454. sku, err := models.ServerSkuManager.FetchSkuByNameAndProvider(input.InstanceType, region.Provider, true)
  455. if err != nil {
  456. return nil, errors.Wrap(err, "FetchSkuByNameAndProvider")
  457. }
  458. confs.InstanceTypeFamily = sku.InstanceTypeFamily
  459. confs.InstanceType = sku.GetName()
  460. confs.VcpuCount = sku.CpuCoreCount
  461. confs.VmemSize = sku.MemorySizeMB
  462. } else {
  463. if input.VcpuCount != nil {
  464. confs.VcpuCount = *input.VcpuCount
  465. } else {
  466. confs.VcpuCount = guest.VcpuCount
  467. }
  468. if input.ExtraCpuCount != nil {
  469. confs.ExtraCpuCount = *input.ExtraCpuCount
  470. }
  471. if len(input.VmemSize) > 0 {
  472. if !regutils.MatchSize(input.VmemSize) {
  473. return nil, httperrors.NewBadRequestError("Memory size %q must be number[+unit], like 256M, 1G or 256", input.VmemSize)
  474. }
  475. nVmem, err := fileutils.GetSizeMb(input.VmemSize, 'M', 1024)
  476. if err != nil {
  477. return nil, httperrors.NewBadRequestError("Params vmem_size parse error")
  478. }
  479. confs.VmemSize = nVmem
  480. } else {
  481. confs.VmemSize = guest.VmemSize
  482. }
  483. }
  484. disks, err := guest.GetGuestDisks()
  485. if err != nil {
  486. return nil, errors.Wrap(err, "GetGuestDisks")
  487. }
  488. var newDisks = make([]*api.DiskConfig, 0)
  489. var resizeDisks = make([]*api.DiskResizeSpec, 0)
  490. var schedInputDisks = make([]*api.DiskConfig, 0)
  491. // input.Disks start from index 1
  492. for i := range input.Disks {
  493. disk := input.Disks[i]
  494. if len(disk.SnapshotId) > 0 {
  495. snapObj, err := models.SnapshotManager.FetchById(disk.SnapshotId)
  496. if err != nil {
  497. return nil, httperrors.NewResourceNotFoundError("snapshot %s not found", disk.SnapshotId)
  498. }
  499. snap := snapObj.(*models.SSnapshot)
  500. disk.Storage = snap.StorageId
  501. }
  502. var guestDisk models.SGuestdisk
  503. if disk.Index >= len(disks) {
  504. // last disk
  505. guestDisk = disks[len(disks)-1]
  506. } else {
  507. guestDisk = disks[disk.Index]
  508. }
  509. diskObj := guestDisk.GetDisk()
  510. if diskObj == nil {
  511. return nil, errors.Wrapf(errors.ErrInvalidStatus, "fail to fetch disk at %d", disk.Index)
  512. }
  513. storage, err := diskObj.GetStorage()
  514. if err != nil {
  515. return nil, errors.Wrap(err, "GetStorage")
  516. }
  517. if len(disk.Backend) == 0 && len(disk.Storage) == 0 {
  518. disk.Backend = storage.StorageType
  519. disk.Storage = storage.Id
  520. }
  521. if disk.SizeMb > 0 {
  522. if disk.Index >= len(disks) {
  523. // new disk
  524. newDisks = append(newDisks, &disk)
  525. schedInputDisks = append(schedInputDisks, &disk)
  526. } else {
  527. // resize disk
  528. if disk.SizeMb < diskObj.DiskSize {
  529. return nil, httperrors.NewInputParameterError("Cannot reduce disk size for %dth disk", disk.Index)
  530. } else if disk.SizeMb > diskObj.DiskSize {
  531. resizeDisks = append(resizeDisks, &api.DiskResizeSpec{
  532. DiskId: diskObj.Id,
  533. SizeMb: disk.SizeMb,
  534. OldSizeMb: diskObj.DiskSize,
  535. })
  536. schedInputDisks = append(schedInputDisks, &api.DiskConfig{
  537. SizeMb: disk.SizeMb - diskObj.DiskSize,
  538. Index: disk.Index,
  539. Storage: storage.Id,
  540. })
  541. }
  542. }
  543. }
  544. }
  545. if len(resizeDisks) > 0 {
  546. confs.Resize = resizeDisks
  547. }
  548. if len(newDisks) > 0 {
  549. confs.Create = newDisks
  550. }
  551. if guest.Status != api.VM_RUNNING && input.AutoStart {
  552. confs.AutoStart = true
  553. }
  554. if guest.Status == api.VM_RUNNING {
  555. confs.GuestOnline = true
  556. }
  557. // schedulr forecast
  558. schedDesc := guest.ChangeConfToSchedDesc(confs.AddedCpu(), confs.AddedExtraCpu(), confs.AddedMem(), schedInputDisks)
  559. s := auth.GetAdminSession(ctx, options.Options.Region)
  560. canChangeConf, res, err := scheduler.SchedManager.DoScheduleForecast(s, schedDesc, 1)
  561. if err != nil {
  562. return nil, errors.Wrap(err, "SchedManager.DoScheduleForecast")
  563. }
  564. if !canChangeConf {
  565. return nil, httperrors.NewInsufficientResourceError("%s", res.String())
  566. }
  567. confs.SchedDesc = jsonutils.Marshal(schedDesc)
  568. return &confs, nil
  569. }
  570. func (base *SBaseGuestDriver) ValidateGuestHotChangeConfigInput(ctx context.Context, guest *models.SGuest, confs *api.ServerChangeConfigSettings) (*api.ServerChangeConfigSettings, error) {
  571. return confs, nil
  572. }
  573. func (base *SBaseGuestDriver) BeforeDetachIsolatedDevice(ctx context.Context, cred mcclient.TokenCredential, guest *models.SGuest, dev *models.SIsolatedDevice) error {
  574. return nil
  575. }
  576. func (base *SBaseGuestDriver) BeforeAttachIsolatedDevice(ctx context.Context, cred mcclient.TokenCredential, guest *models.SGuest, dev *models.SIsolatedDevice) error {
  577. return nil
  578. }
  579. func (base *SBaseGuestDriver) RequestUploadGuestStatus(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  580. return errors.Wrapf(cloudprovider.ErrNotImplemented, "RequestUploadGuestStatus")
  581. }
  582. func (base *SBaseGuestDriver) CanStop(guest *models.SGuest) error {
  583. if utils.IsInStringArray(guest.Status, []string{api.VM_RUNNING, api.VM_STOP_FAILED, api.POD_STATUS_CRASH_LOOP_BACK_OFF, api.POD_STATUS_CONTAINER_EXITED, api.VM_KICKSTART_INSTALLING, api.VM_KICKSTART_FAILED, api.VM_KICKSTART_COMPLETED}) {
  584. return nil
  585. }
  586. return errors.Wrapf(errors.ErrInvalidStatus, "Cannot stop server in status %s", guest.Status)
  587. }
  588. func (base *SBaseGuestDriver) IsNeedCleanDisksAfterUndeploy() bool {
  589. return true
  590. }