esxi.go 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package guestdrivers
  15. import (
  16. "context"
  17. "fmt"
  18. "sort"
  19. "strconv"
  20. "time"
  21. "yunion.io/x/cloudmux/pkg/cloudprovider"
  22. "yunion.io/x/cloudmux/pkg/multicloud/esxi"
  23. "yunion.io/x/jsonutils"
  24. "yunion.io/x/log"
  25. "yunion.io/x/pkg/errors"
  26. "yunion.io/x/pkg/util/billing"
  27. "yunion.io/x/pkg/util/httputils"
  28. "yunion.io/x/pkg/util/rbacscope"
  29. "yunion.io/x/pkg/utils"
  30. api "yunion.io/x/onecloud/pkg/apis/compute"
  31. "yunion.io/x/onecloud/pkg/cloudcommon/db"
  32. "yunion.io/x/onecloud/pkg/cloudcommon/db/quotas"
  33. "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
  34. "yunion.io/x/onecloud/pkg/compute/models"
  35. "yunion.io/x/onecloud/pkg/compute/options"
  36. "yunion.io/x/onecloud/pkg/httperrors"
  37. "yunion.io/x/onecloud/pkg/mcclient"
  38. )
  39. type SESXiGuestDriver struct {
  40. SManagedVirtualizedGuestDriver
  41. }
  42. type SOneCloudGuestDriver struct {
  43. SESXiGuestDriver
  44. }
  45. func (self *SOneCloudGuestDriver) GetProvider() string {
  46. return api.CLOUD_PROVIDER_ONECLOUD
  47. }
  48. func init() {
  49. driver := SESXiGuestDriver{}
  50. models.RegisterGuestDriver(&driver)
  51. driver2 := SOneCloudGuestDriver{}
  52. models.RegisterGuestDriver(&driver2)
  53. }
  54. func (self *SESXiGuestDriver) DoScheduleCPUFilter() bool { return true }
  55. func (self *SESXiGuestDriver) DoScheduleMemoryFilter() bool { return true }
  56. func (self *SESXiGuestDriver) DoScheduleSKUFilter() bool { return false }
  57. func (self *SESXiGuestDriver) DoScheduleStorageFilter() bool { return true }
  58. func (self *SESXiGuestDriver) GetHypervisor() string {
  59. return api.HYPERVISOR_ESXI
  60. }
  61. func (self *SESXiGuestDriver) GetProvider() string {
  62. return api.CLOUD_PROVIDER_VMWARE
  63. }
  64. func (self *SESXiGuestDriver) GetInstanceCapability() cloudprovider.SInstanceCapability {
  65. return cloudprovider.SInstanceCapability{
  66. Hypervisor: self.GetHypervisor(),
  67. Provider: self.GetProvider(),
  68. DefaultAccount: cloudprovider.SDefaultAccount{
  69. Linux: cloudprovider.SOsDefaultAccount{
  70. DefaultAccount: api.VM_DEFAULT_LINUX_LOGIN_USER,
  71. Changeable: true,
  72. },
  73. Windows: cloudprovider.SOsDefaultAccount{
  74. DefaultAccount: api.VM_DEFAULT_WINDOWS_LOGIN_USER,
  75. Changeable: false,
  76. },
  77. },
  78. Storages: cloudprovider.Storage{
  79. SysDisk: []cloudprovider.StorageInfo{
  80. {StorageType: api.STORAGE_LOCAL, MinSizeGb: options.Options.LocalSysDiskMinSizeGB, MaxSizeGb: options.Options.LocalSysDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
  81. {StorageType: api.STORAGE_NAS, MinSizeGb: options.Options.LocalSysDiskMinSizeGB, MaxSizeGb: options.Options.LocalSysDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
  82. {StorageType: api.STORAGE_NFS, MinSizeGb: options.Options.LocalSysDiskMinSizeGB, MaxSizeGb: options.Options.LocalSysDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
  83. {StorageType: api.STORAGE_VSAN, MinSizeGb: options.Options.LocalSysDiskMinSizeGB, MaxSizeGb: options.Options.LocalSysDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
  84. {StorageType: api.STORAGE_CIFS, MinSizeGb: options.Options.LocalSysDiskMinSizeGB, MaxSizeGb: options.Options.LocalSysDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
  85. },
  86. DataDisk: []cloudprovider.StorageInfo{
  87. {StorageType: api.STORAGE_LOCAL, MinSizeGb: options.Options.LocalDataDiskMinSizeGB, MaxSizeGb: options.Options.LocalDataDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
  88. {StorageType: api.STORAGE_NAS, MinSizeGb: options.Options.LocalDataDiskMinSizeGB, MaxSizeGb: options.Options.LocalDataDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
  89. {StorageType: api.STORAGE_NFS, MinSizeGb: options.Options.LocalDataDiskMinSizeGB, MaxSizeGb: options.Options.LocalDataDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
  90. {StorageType: api.STORAGE_VSAN, MinSizeGb: options.Options.LocalDataDiskMinSizeGB, MaxSizeGb: options.Options.LocalDataDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
  91. {StorageType: api.STORAGE_CIFS, MinSizeGb: options.Options.LocalDataDiskMinSizeGB, MaxSizeGb: options.Options.LocalDataDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
  92. },
  93. },
  94. }
  95. }
  96. func (self *SESXiGuestDriver) GetComputeQuotaKeys(scope rbacscope.TRbacScope, ownerId mcclient.IIdentityProvider, brand string) models.SComputeResourceKeys {
  97. keys := models.SComputeResourceKeys{}
  98. keys.SBaseProjectQuotaKeys = quotas.OwnerIdProjectQuotaKeys(scope, ownerId)
  99. keys.CloudEnv = api.CLOUD_ENV_ON_PREMISE
  100. keys.Provider = api.CLOUD_PROVIDER_VMWARE
  101. keys.Brand = api.CLOUD_PROVIDER_VMWARE
  102. keys.Hypervisor = api.HYPERVISOR_ESXI
  103. return keys
  104. }
  105. func (self *SESXiGuestDriver) GetDefaultSysDiskBackend() string {
  106. return ""
  107. }
  108. func (self *SESXiGuestDriver) ChooseHostStorage(host *models.SHost, guest *models.SGuest, diskConfig *api.DiskConfig, storageIds []string) (*models.SStorage, error) {
  109. switch {
  110. case !options.Options.LockStorageFromCachedimage:
  111. return self.SVirtualizedGuestDriver.ChooseHostStorage(host, guest, diskConfig, storageIds)
  112. case len(diskConfig.ImageId) > 0:
  113. var (
  114. image *cloudprovider.SImage
  115. err error
  116. )
  117. obj, err := models.CachedimageManager.FetchById(diskConfig.ImageId)
  118. if err != nil {
  119. return nil, errors.Wrapf(err, "unable to fetch cachedimage %s", diskConfig.ImageId)
  120. }
  121. cachedimage := obj.(*models.SCachedimage)
  122. if len(cachedimage.ExternalId) > 0 || cloudprovider.TImageType(cachedimage.ImageType) != cloudprovider.ImageTypeSystem {
  123. return self.SVirtualizedGuestDriver.ChooseHostStorage(host, guest, diskConfig, storageIds)
  124. }
  125. storages, err := cachedimage.GetStorages()
  126. if err != nil {
  127. return nil, errors.Wrapf(err, "unable to GetStorages of cachedimage %s", diskConfig.ImageId)
  128. }
  129. if len(storages) == 0 {
  130. log.Warningf("there no storage associated with cachedimage %q", image.Id)
  131. return self.SVirtualizedGuestDriver.ChooseHostStorage(host, guest, diskConfig, storageIds)
  132. }
  133. if len(storages) > 1 {
  134. log.Warningf("there are multiple storageCache associated with caheimage %q", image.Id)
  135. }
  136. wantStorageIds := make([]string, len(storages))
  137. for i := range wantStorageIds {
  138. wantStorageIds[i] = storages[i].GetId()
  139. }
  140. for i := range wantStorageIds {
  141. if utils.IsInStringArray(wantStorageIds[i], storageIds) {
  142. log.Infof("use storage %q in where cachedimage %q", wantStorageIds[i], image.Id)
  143. return &storages[i], nil
  144. }
  145. }
  146. return self.SVirtualizedGuestDriver.ChooseHostStorage(host, guest, diskConfig, storageIds)
  147. default:
  148. ispId := guest.GetMetadata(context.Background(), "__base_instance_snapshot_id", nil)
  149. if len(ispId) == 0 {
  150. return self.SVirtualizedGuestDriver.ChooseHostStorage(host, guest, diskConfig, storageIds)
  151. }
  152. obj, err := models.InstanceSnapshotManager.FetchById(ispId)
  153. if err != nil {
  154. return nil, errors.Wrapf(err, "unable to fetch InstanceSnapshot %q", ispId)
  155. }
  156. isp := obj.(*models.SInstanceSnapshot)
  157. ispGuest, err := isp.GetGuest()
  158. if err != nil {
  159. return nil, errors.Wrapf(err, "unable to fetch Guest of InstanceSnapshot %q", ispId)
  160. }
  161. storages, err := ispGuest.GetStorages()
  162. if err != nil {
  163. return nil, errors.Wrapf(err, "GetStorages")
  164. }
  165. if len(storages) == 0 {
  166. return self.SVirtualizedGuestDriver.ChooseHostStorage(host, guest, diskConfig, storageIds)
  167. }
  168. if utils.IsInStringArray(storages[0].GetId(), storageIds) {
  169. return &storages[0], nil
  170. }
  171. return self.SVirtualizedGuestDriver.ChooseHostStorage(host, guest, diskConfig, storageIds)
  172. }
  173. }
  174. func (self *SESXiGuestDriver) GetGuestVncInfo(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, host *models.SHost, input *cloudprovider.ServerVncInput) (*cloudprovider.ServerVncOutput, error) {
  175. iVM, err := guest.GetIVM(ctx)
  176. if err != nil {
  177. return nil, err
  178. }
  179. return iVM.GetVNCInfo(input)
  180. }
  181. func (self *SESXiGuestDriver) GetMinimalSysDiskSizeGb() int {
  182. return options.Options.DefaultDiskSizeMB / 1024
  183. }
  184. func (self *SESXiGuestDriver) RequestSyncSecgroupsOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, task taskman.ITask) error {
  185. return nil // do nothing, not support securitygroup
  186. }
  187. func (self *SESXiGuestDriver) GetMaxSecurityGroupCount() int {
  188. //暂不支持绑定安全组
  189. return 0
  190. }
  191. func (self *SESXiGuestDriver) GetDetachDiskStatus() ([]string, error) {
  192. return []string{api.VM_READY, api.VM_RUNNING}, nil
  193. }
  194. func (self *SESXiGuestDriver) GetAttachDiskStatus() ([]string, error) {
  195. return []string{api.VM_READY, api.VM_RUNNING}, nil
  196. }
  197. func (self *SESXiGuestDriver) GetChangeInstanceTypeStatus() ([]string, error) {
  198. return []string{api.VM_READY, api.VM_RUNNING}, nil
  199. }
  200. func (self *SESXiGuestDriver) CanKeepDetachDisk() bool {
  201. return false
  202. }
  203. // func (self *SESXiGuestDriver) RequestDeleteDetachedDisk(ctx context.Context, disk *models.SDisk, task taskman.ITask, isPurge bool) error {
  204. // err := disk.RealDelete(ctx, task.GetUserCred())
  205. // if err != nil {
  206. // return err
  207. // }
  208. // task.ScheduleRun(nil)
  209. // return nil
  210. // }
  211. func (self *SESXiGuestDriver) RequestGuestHotAddIso(ctx context.Context, guest *models.SGuest, path string, boot bool, task taskman.ITask) error {
  212. task.ScheduleRun(nil)
  213. return nil
  214. }
  215. func (self *SESXiGuestDriver) GetRebuildRootStatus() ([]string, error) {
  216. return []string{api.VM_READY}, nil
  217. }
  218. func (self *SESXiGuestDriver) GetDeployStatus() ([]string, error) {
  219. return []string{api.VM_READY}, nil
  220. }
  221. func (self *SESXiGuestDriver) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, data *api.ServerCreateInput) (*api.ServerCreateInput, error) {
  222. for i := 0; i < len(data.Disks); i++ {
  223. data.Disks[i].Format = "vmdk"
  224. }
  225. if data.CpuSockets > data.VcpuCount {
  226. return nil, httperrors.NewInputParameterError("The number of cpu sockets cannot be greater than the number of cpus")
  227. }
  228. // check disk config
  229. if len(data.Disks) == 0 {
  230. return data, nil
  231. }
  232. rootDisk := data.Disks[0]
  233. if len(rootDisk.ImageId) == 0 {
  234. return data, nil
  235. }
  236. image, err := models.CachedimageManager.GetImageInfo(ctx, userCred, rootDisk.ImageId, false)
  237. if err != nil {
  238. return nil, errors.Wrapf(err, "unable to GetImageInfo of image %q", rootDisk.ImageId)
  239. }
  240. if len(image.SubImages) <= 1 {
  241. return data, nil
  242. }
  243. sort.Slice(image.SubImages, func(i, j int) bool {
  244. return image.SubImages[i].Index < image.SubImages[j].Index
  245. })
  246. newDataDisks := make([]*api.DiskConfig, 0, len(image.SubImages)+len(data.Disks)-1)
  247. for i, subImage := range image.SubImages {
  248. nDataDisk := *rootDisk
  249. nDataDisk.SizeMb = subImage.MinDiskMB
  250. nDataDisk.Format = "vmdk"
  251. nDataDisk.Index = i
  252. if i > 0 {
  253. nDataDisk.ImageId = ""
  254. }
  255. newDataDisks = append(newDataDisks, &nDataDisk)
  256. }
  257. for i := 1; i < len(data.Disks); i++ {
  258. data.Disks[i].Index += len(image.SubImages) - 1
  259. newDataDisks = append(newDataDisks, data.Disks[i])
  260. }
  261. data.Disks = newDataDisks
  262. return data, nil
  263. }
  264. func (self *SESXiGuestDriver) ValidateCreateEip(ctx context.Context, userCred mcclient.TokenCredential, input api.ServerCreateEipInput) error {
  265. return httperrors.NewInputParameterError("%s not support create eip", self.GetHypervisor())
  266. }
  267. func (self *SESXiGuestDriver) ValidateResizeDisk(guest *models.SGuest, disk *models.SDisk, storage *models.SStorage) error {
  268. if !utils.IsInStringArray(guest.Status, []string{api.VM_READY, api.VM_RUNNING, api.VM_START_RESIZE_DISK, api.VM_RESIZE_DISK}) {
  269. return fmt.Errorf("Cannot resize disk when guest in status %s", guest.Status)
  270. }
  271. count, err := guest.GetInstanceSnapshotCount()
  272. if err != nil {
  273. return errors.Wrapf(err, "unable to GetInstanceSnapshotCount for guest %q", guest.GetId())
  274. }
  275. if count > 0 {
  276. return httperrors.NewForbiddenError("can't resize disk for guest with instance snapshots")
  277. }
  278. /*if !utils.IsInStringArray(storage.StorageType, []string{models.STORAGE_PUBLIC_CLOUD, models.STORAGE_CLOUD_SSD, models.STORAGE_CLOUD_EFFICIENCY}) {
  279. return fmt.Errorf("Cannot resize %s disk", storage.StorageType)
  280. }*/
  281. return nil
  282. }
  283. type SEsxiImageInfo struct {
  284. ImageType string
  285. ImageExternalId string
  286. StorageCacheHostIp string
  287. }
  288. type SEsxiInstanceSnapshotInfo struct {
  289. InstanceSnapshotId string
  290. InstanceId string
  291. }
  292. func (self *SESXiGuestDriver) GetJsonDescAtHost(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, host *models.SHost, params *jsonutils.JSONDict) (jsonutils.JSONObject, error) {
  293. desc := guest.GetJsonDescAtHypervisor(ctx, host)
  294. // add image_info
  295. if len(desc.Disks) == 0 {
  296. return jsonutils.Marshal(desc), nil
  297. }
  298. for i := range desc.Disks {
  299. diskId := desc.Disks[i].DiskId
  300. disk := models.DiskManager.FetchDiskById(diskId)
  301. if disk == nil {
  302. return nil, fmt.Errorf("unable to fetch disk %s", diskId)
  303. }
  304. storage, err := disk.GetStorage()
  305. if storage == nil {
  306. return nil, errors.Wrapf(err, "unable to fetch storage of disk %s", diskId)
  307. }
  308. desc.Disks[i].StorageId = storage.GetExternalId()
  309. desc.Disks[i].Preallocation = disk.Preallocation
  310. }
  311. templateId := desc.Disks[0].TemplateId
  312. if len(templateId) == 0 {
  313. // try to check instance_snapshot_id
  314. ispId := guest.GetMetadata(ctx, "__base_instance_snapshot_id", userCred)
  315. if len(ispId) == 0 {
  316. return jsonutils.Marshal(desc), nil
  317. }
  318. obj, err := models.InstanceSnapshotManager.FetchById(ispId)
  319. if err != nil {
  320. return nil, errors.Wrapf(err, "unable to fetch InstanceSnapshot %q", ispId)
  321. }
  322. isp := obj.(*models.SInstanceSnapshot)
  323. ispGuest, err := isp.GetGuest()
  324. if err != nil {
  325. return nil, errors.Wrapf(err, "unable to fetch Guest of InstanceSnapshot %q", ispId)
  326. }
  327. desc.InstanceSnapshotInfo.InstanceSnapshotId = isp.GetExternalId()
  328. desc.InstanceSnapshotInfo.InstanceId = ispGuest.GetExternalId()
  329. return jsonutils.Marshal(desc), nil
  330. }
  331. model, err := models.CachedimageManager.FetchById(templateId)
  332. if err != nil {
  333. return jsonutils.Marshal(desc), errors.Wrapf(err, "CachedimageManager.FetchById(%s)", templateId)
  334. }
  335. img := model.(*models.SCachedimage)
  336. if cloudprovider.TImageType(img.ImageType) != cloudprovider.ImageTypeSystem {
  337. return jsonutils.Marshal(desc), nil
  338. }
  339. sciSubQ := models.StoragecachedimageManager.Query("storagecache_id").Equals("cachedimage_id", templateId).Equals("status", api.CACHED_IMAGE_STATUS_ACTIVE).SubQuery()
  340. scQ := models.StoragecacheManager.Query().In("id", sciSubQ)
  341. storageCaches := make([]models.SStoragecache, 0, 1)
  342. err = db.FetchModelObjects(models.StoragecacheManager, scQ, &storageCaches)
  343. if err != nil {
  344. return jsonutils.Marshal(desc), errors.Wrapf(err, "fetch storageCache associated with cacheimage %s", templateId)
  345. }
  346. if len(storageCaches) == 0 {
  347. return jsonutils.Marshal(desc), errors.Errorf("no such storage cache associated with cacheimage %s", templateId)
  348. }
  349. if len(storageCaches) > 1 {
  350. log.Warningf("there are multiple storageCache associated with caheimage '%s' ??!!", templateId)
  351. }
  352. var storageCacheHost *models.SHost
  353. // select storagecacheHost
  354. for i := range storageCaches {
  355. hosts, err := storageCaches[i].GetHosts()
  356. if err != nil {
  357. return jsonutils.Marshal(desc), errors.Wrap(err, "storageCaches.GetHosts")
  358. }
  359. for i := range hosts {
  360. if host.GetId() == hosts[i].GetId() {
  361. storageCacheHost = &hosts[i]
  362. }
  363. }
  364. }
  365. if storageCacheHost == nil {
  366. storageCacheHost, err = storageCaches[0].GetMasterHost()
  367. if err != nil {
  368. return jsonutils.Marshal(desc), errors.Wrapf(err, "unable to GetHost of storageCache %s", storageCaches[0].Id)
  369. }
  370. if storageCacheHost == nil {
  371. return jsonutils.Marshal(desc), fmt.Errorf("unable to GetHost of storageCache %s: result is nil", storageCaches[0].Id)
  372. }
  373. }
  374. desc.Disks[0].ImageInfo.ImageType = img.ImageType
  375. desc.Disks[0].ImageInfo.ImageExternalId = img.ExternalId
  376. desc.Disks[0].ImageInfo.StorageCacheHostIp = storageCacheHost.AccessIp
  377. return jsonutils.Marshal(desc), nil
  378. }
  379. func (self *SESXiGuestDriver) RequestDeployGuestOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, task taskman.ITask) error {
  380. config, err := guest.GetDeployConfigOnHost(ctx, task.GetUserCred(), host, task.GetParams())
  381. if err != nil {
  382. log.Errorf("GetDeployConfigOnHost error: %v", err)
  383. return err
  384. }
  385. log.Debugf("RequestDeployGuestOnHost: %s", config)
  386. if !host.IsEsxiAgentReady() {
  387. return fmt.Errorf("No ESXi agent host")
  388. }
  389. diskCat := guest.CategorizeDisks()
  390. if diskCat.Root == nil {
  391. return fmt.Errorf("no root disk???")
  392. }
  393. storage, _ := diskCat.Root.GetStorage()
  394. if storage == nil {
  395. return fmt.Errorf("root disk has no storage???")
  396. }
  397. config.Add(jsonutils.NewString(host.AccessIp), "host_ip")
  398. config.Add(jsonutils.NewString(guest.Id), "guest_id")
  399. extId := guest.Id
  400. if len(guest.ExternalId) > 0 {
  401. extId = guest.ExternalId
  402. }
  403. config.Add(jsonutils.NewString(extId), "guest_ext_id")
  404. tags, _ := guest.GetAllUserMetadata()
  405. config.Set("tags", jsonutils.Marshal(tags))
  406. account := host.GetCloudaccount()
  407. accessInfo, err := account.GetVCenterAccessInfo(storage.ExternalId)
  408. if err != nil {
  409. return err
  410. }
  411. provider := host.GetCloudprovider()
  412. action, _ := config.GetString("action")
  413. if action == "create" {
  414. projectId, _ := provider.SyncProject(ctx, task.GetUserCred(), guest.ProjectId)
  415. if len(projectId) > 0 {
  416. config.Add(jsonutils.NewString(projectId), "desc", "project_id")
  417. }
  418. if len(guest.ResourcePool) > 0 {
  419. config.Add(jsonutils.NewString(guest.ResourcePool), "desc", "resource_pool")
  420. }
  421. }
  422. config.Add(jsonutils.Marshal(accessInfo), "datastore")
  423. url := "/disks/agent/deploy"
  424. body := jsonutils.NewDict()
  425. body.Add(config, "disk")
  426. header := task.GetTaskRequestHeader()
  427. _, err = host.EsxiRequest(ctx, httputils.POST, url, header, body)
  428. return err
  429. }
  430. func (self *SESXiGuestDriver) RequestSuspendOnHost(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  431. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  432. ivm, err := guest.GetIVM(ctx)
  433. if err != nil {
  434. return nil, err
  435. }
  436. vm := ivm.(*esxi.SVirtualMachine)
  437. err = vm.SuspendVM(ctx)
  438. if err != nil {
  439. return nil, errors.Wrap(err, "VM.SuspendVM for vmware")
  440. }
  441. return nil, nil
  442. })
  443. return nil
  444. }
  445. func (self *SESXiGuestDriver) RequestResumeOnHost(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  446. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  447. ivm, err := guest.GetIVM(ctx)
  448. if err != nil {
  449. return nil, err
  450. }
  451. vm := ivm.(*esxi.SVirtualMachine)
  452. err = vm.ResumeVM(ctx)
  453. if err != nil {
  454. return nil, errors.Wrap(err, "VM.Resume for VMware")
  455. }
  456. return nil, nil
  457. })
  458. return nil
  459. }
  460. func (self *SESXiGuestDriver) OnGuestDeployTaskDataReceived(ctx context.Context, guest *models.SGuest, task taskman.ITask, data jsonutils.JSONObject) error {
  461. if data.Contains("host_ip") {
  462. oldHost, _ := guest.GetHost()
  463. hostIp, _ := data.GetString("host_ip")
  464. host, err := models.HostManager.GetHostByIp(oldHost.ManagerId, api.HOST_TYPE_ESXI, hostIp)
  465. if err != nil {
  466. return err
  467. }
  468. if host.Id != guest.HostId {
  469. models.HostManager.ClearSchedDescCache(host.Id)
  470. models.HostManager.ClearSchedDescCache(guest.HostId)
  471. guest.OnScheduleToHost(ctx, task.GetUserCred(), host.Id)
  472. }
  473. }
  474. err := self.SManagedVirtualizedGuestDriver.OnGuestDeployTaskDataReceived(ctx, guest, task, data)
  475. if err != nil {
  476. return nil
  477. }
  478. osInfo := struct {
  479. Arch string
  480. Distro string
  481. Os string
  482. Version string
  483. }{}
  484. data.Unmarshal(&osInfo)
  485. osinfo := map[string]interface{}{}
  486. for k, v := range map[string]string{
  487. "os_arch": osInfo.Arch,
  488. "os_distribution": osInfo.Distro,
  489. "os_type": osInfo.Os,
  490. "os_name": osInfo.Os,
  491. "os_version": osInfo.Version,
  492. } {
  493. if len(v) > 0 {
  494. osinfo[k] = v
  495. }
  496. }
  497. if len(osinfo) > 0 {
  498. err := guest.SetAllMetadata(ctx, osinfo, task.GetUserCred())
  499. if err != nil {
  500. return errors.Wrap(err, "SetAllMetadata")
  501. }
  502. }
  503. return nil
  504. }
  505. func (self *SESXiGuestDriver) AllowReconfigGuest() bool {
  506. return true
  507. }
  508. func (self *SESXiGuestDriver) RequestSaveImage(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, task taskman.ITask) error {
  509. disks := guest.CategorizeDisks()
  510. opts := api.DiskSaveInput{}
  511. task.GetParams().Unmarshal(&opts)
  512. return disks.Root.StartDiskSaveTask(ctx, userCred, opts, task.GetTaskId())
  513. }
  514. func (self *SESXiGuestDriver) DoGuestCreateDisksTask(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
  515. subtask, err := taskman.TaskManager.NewTask(ctx, "ESXiGuestCreateDiskTask", guest, task.GetUserCred(), task.GetParams(), task.GetTaskId(), "", nil)
  516. if err != nil {
  517. return err
  518. }
  519. subtask.ScheduleRun(nil)
  520. return nil
  521. }
  522. func (self *SESXiGuestDriver) RequestRenewInstance(ctx context.Context, guest *models.SGuest, bc billing.SBillingCycle) (time.Time, error) {
  523. return time.Time{}, nil
  524. }
  525. func (self *SESXiGuestDriver) IsSupportEip() bool {
  526. return false
  527. }
  528. func (self *SESXiGuestDriver) IsSupportCdrom(guest *models.SGuest) (bool, error) {
  529. return false, nil
  530. }
  531. func (self *SESXiGuestDriver) IsSupportMigrate() bool {
  532. return true
  533. }
  534. func (self *SESXiGuestDriver) IsSupportLiveMigrate() bool {
  535. return true
  536. }
  537. func (self *SESXiGuestDriver) CheckMigrate(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential, input api.GuestMigrateInput) error {
  538. return nil
  539. }
  540. func (self *SESXiGuestDriver) CheckLiveMigrate(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential, input api.GuestLiveMigrateInput) error {
  541. return nil
  542. }
  543. func (self *SESXiGuestDriver) RequestStartOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, userCred mcclient.TokenCredential, task taskman.ITask) error {
  544. ivm, err := guest.GetIVM(ctx)
  545. if err != nil {
  546. return errors.Wrapf(err, "GetIVM")
  547. }
  548. result := jsonutils.NewDict()
  549. if ivm.GetStatus() != api.VM_RUNNING {
  550. err := ivm.StartVM(ctx)
  551. if err != nil {
  552. return errors.Wrapf(err, "StartVM")
  553. }
  554. err = cloudprovider.WaitStatus(ivm, api.VM_RUNNING, time.Second*5, time.Minute*10)
  555. if err != nil {
  556. return errors.Wrapf(err, "Wait vm running")
  557. }
  558. guest.SetStatus(ctx, userCred, api.VM_RUNNING, "StartOnHost")
  559. return task.ScheduleRun(result)
  560. }
  561. return guest.SetStatus(ctx, userCred, api.VM_RUNNING, "StartOnHost")
  562. }
  563. func (self *SESXiGuestDriver) RequestStopOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, task taskman.ITask, syncStatus bool) error {
  564. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  565. ivm, err := guest.GetIVM(ctx)
  566. if err != nil {
  567. return nil, errors.Wrapf(err, "guest.GetIVM")
  568. }
  569. opts := &cloudprovider.ServerStopOptions{}
  570. task.GetParams().Unmarshal(opts)
  571. err = ivm.StopVM(ctx, opts)
  572. if err != nil {
  573. return nil, errors.Wrapf(err, "ivm.StopVM")
  574. }
  575. err = cloudprovider.WaitStatus(ivm, api.VM_READY, time.Second*3, time.Minute*5)
  576. if err != nil {
  577. return nil, errors.Wrapf(err, "wait server stop after 5 miniutes")
  578. }
  579. return nil, nil
  580. })
  581. return nil
  582. }
  583. func (self *SESXiGuestDriver) RequestSyncstatusOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, userCred mcclient.TokenCredential, task taskman.ITask) error {
  584. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  585. ihost, err := host.GetIHost(ctx)
  586. if err != nil {
  587. return nil, errors.Wrap(err, "host.GetIHost")
  588. }
  589. ivm, err := ihost.GetIVMById(guest.GetExternalId())
  590. if err != nil {
  591. if errors.Cause(err) != errors.ErrNotFound {
  592. return nil, errors.Wrap(err, "ihost.GetIVMById")
  593. }
  594. // VM may be migrated by Vcenter, try to find VM from whole datacenter.
  595. ehost := ihost.(*esxi.SHost)
  596. dc, err := ehost.GetDatacenter()
  597. if err != nil {
  598. return nil, errors.Wrapf(err, "ehost.GetDatacenter")
  599. }
  600. vm, err := dc.FetchVMById(guest.GetExternalId())
  601. if err != nil {
  602. log.Errorf("fail to find ivm by id %q in dc %q: %v", guest.GetExternalId(), dc.GetName(), err)
  603. return nil, errors.Wrap(err, "dc.FetchVMById")
  604. }
  605. ihost = vm.GetIHost()
  606. host = models.HostManager.FetchHostByExtId(ihost.GetGlobalId())
  607. if host == nil {
  608. return nil, errors.Wrapf(errors.ErrNotFound, "find ivm %q in ihost %q which is not existed here", guest.GetExternalId(), ihost.GetGlobalId())
  609. }
  610. ivm = vm
  611. }
  612. err = guest.SyncAllWithCloudVM(ctx, userCred, host, ivm, true)
  613. if err != nil {
  614. return nil, errors.Wrap(err, "guest.SyncAllWithCloudVM")
  615. }
  616. status := GetCloudVMStatus(ivm)
  617. body := jsonutils.NewDict()
  618. body.Add(jsonutils.NewString(status), "status")
  619. return body, nil
  620. })
  621. return nil
  622. }
  623. func (self *SESXiGuestDriver) ValidateRebuildRoot(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, input *api.ServerRebuildRootInput) (*api.ServerRebuildRootInput, error) {
  624. // check snapshot
  625. count, err := guest.GetInstanceSnapshotCount()
  626. if err != nil {
  627. return nil, errors.Wrapf(err, "unable to GetInstanceSnapshotCount for guest %q", guest.GetId())
  628. }
  629. if count > 0 {
  630. return input, httperrors.NewForbiddenError("can't rebuild root for a guest with instance snapshots")
  631. }
  632. return input, nil
  633. }
  634. func (self *SESXiGuestDriver) StartDeleteGuestTask(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, params *jsonutils.JSONDict, parentTaskId string) error {
  635. params.Add(jsonutils.JSONTrue, "delete_snapshots")
  636. return self.SBaseGuestDriver.StartDeleteGuestTask(ctx, userCred, guest, params, parentTaskId)
  637. }
  638. func (self *SESXiGuestDriver) SyncOsInfo(ctx context.Context, userCred mcclient.TokenCredential, g *models.SGuest, extVM cloudprovider.IOSInfo) error {
  639. ometa, err := g.GetAllMetadata(ctx, userCred)
  640. if err != nil {
  641. return errors.Wrap(err, "GetAllMetadata")
  642. }
  643. // save os info
  644. osinfo := map[string]interface{}{}
  645. for k, v := range map[string]string{
  646. "os_full_name": extVM.GetFullOsName(),
  647. "os_name": string(extVM.GetOsType()),
  648. "os_arch": extVM.GetOsArch(),
  649. "os_type": string(extVM.GetOsType()),
  650. "os_distribution": extVM.GetOsDist(),
  651. "os_version": extVM.GetOsVersion(),
  652. "os_language": extVM.GetOsLang(),
  653. } {
  654. if len(v) == 0 || len(ometa[k]) > 0 {
  655. continue
  656. }
  657. osinfo[k] = v
  658. }
  659. if len(osinfo) > 0 {
  660. err := g.SetAllMetadata(ctx, osinfo, userCred)
  661. if err != nil {
  662. return errors.Wrap(err, "SetAllMetadata")
  663. }
  664. }
  665. return nil
  666. }
  667. func (drv *SESXiGuestDriver) RequestUndeployGuestOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, task taskman.ITask) error {
  668. taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
  669. iVm, err := guest.GetIVM(ctx)
  670. if err != nil {
  671. if errors.Cause(err) == cloudprovider.ErrNotFound {
  672. return nil, nil
  673. }
  674. return nil, errors.Wrapf(err, "GetIVM")
  675. }
  676. err = iVm.DeleteVM(ctx)
  677. if err != nil {
  678. return nil, errors.Wrapf(err, "DeleteVM")
  679. }
  680. return nil, cloudprovider.WaitDeleted(iVm, time.Second*10, time.Minute*3)
  681. })
  682. return nil
  683. }
  684. func (drv *SESXiGuestDriver) ValidateGuestHotChangeConfigInput(ctx context.Context, guest *models.SGuest, confs *api.ServerChangeConfigSettings) (*api.ServerChangeConfigSettings, error) {
  685. // cannot chagne esxi VM CPU cores per sockets
  686. corePerSocket := guest.VcpuCount / guest.CpuSockets
  687. if confs.VcpuCount%corePerSocket != 0 {
  688. return confs, errors.Wrapf(httperrors.ErrInputParameter, "cpu count %d should be times of %d", confs.VcpuCount, corePerSocket)
  689. }
  690. confs.CpuSockets = confs.VcpuCount / corePerSocket
  691. // https://kb.vmware.com/s/article/2008405
  692. // cannot increase memory beyond 3G if the initial CPU memory is lower than 3G
  693. startVmem := guest.VmemSize
  694. vmemMbStr := guest.GetMetadata(ctx, api.VM_METADATA_START_VMEM_MB, nil)
  695. if len(vmemMbStr) > 0 {
  696. vmemMb, _ := strconv.Atoi(vmemMbStr)
  697. if vmemMb > 0 {
  698. startVmem = int(vmemMb)
  699. }
  700. }
  701. maxAllowVmem := 16 * startVmem
  702. if startVmem <= 3*1024 {
  703. maxAllowVmem = 3 * 1024
  704. }
  705. if confs.VmemSize > maxAllowVmem {
  706. return confs, errors.Wrapf(httperrors.ErrInputParameter, "memory cannot be resized beyond %dMB", maxAllowVmem)
  707. }
  708. return confs, nil
  709. }
  710. func (esxi *SESXiGuestDriver) ValidateGuestChangeConfigInput(ctx context.Context, guest *models.SGuest, input api.ServerChangeConfigInput) (*api.ServerChangeConfigSettings, error) {
  711. confs, err := esxi.SBaseGuestDriver.ValidateGuestChangeConfigInput(ctx, guest, input)
  712. if err != nil {
  713. return nil, errors.Wrap(err, "SBaseGuestDriver.ValidateGuestChangeConfigInput")
  714. }
  715. if input.CpuSockets != nil && *input.CpuSockets > 0 {
  716. confs.CpuSockets = *input.CpuSockets
  717. }
  718. defaultStorageId := ""
  719. if root, _ := guest.GetSystemDisk(); root != nil {
  720. defaultStorageId = root.StorageId
  721. }
  722. storages, err := guest.GetStorages()
  723. if err != nil {
  724. return nil, errors.Wrapf(err, "GetStorages")
  725. }
  726. storageMap := map[string]string{}
  727. for _, storage := range storages {
  728. storageMap[storage.StorageType] = storage.Id
  729. if len(defaultStorageId) == 0 {
  730. defaultStorageId = storage.Id
  731. }
  732. }
  733. for i := range confs.Create {
  734. confs.Create[i].Format = "vmdk"
  735. if len(confs.Create[i].Storage) == 0 {
  736. // 若不指定存储类型,默认和系统盘一致
  737. if len(confs.Create[i].Backend) == 0 {
  738. confs.Create[i].Storage = defaultStorageId
  739. } else if storageId, ok := storageMap[confs.Create[i].Backend]; ok { // 否则和已有磁盘存储保持一致
  740. confs.Create[i].Storage = storageId
  741. }
  742. }
  743. }
  744. return confs, nil
  745. }