| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package guestdrivers
- import (
- "context"
- "encoding/base64"
- "fmt"
- "net/http"
- "strconv"
- "strings"
- "time"
- "yunion.io/x/cloudmux/pkg/cloudprovider"
- "yunion.io/x/jsonutils"
- "yunion.io/x/log"
- "yunion.io/x/pkg/errors"
- "yunion.io/x/pkg/util/httputils"
- "yunion.io/x/pkg/util/rbacscope"
- "yunion.io/x/pkg/utils"
- "yunion.io/x/sqlchemy"
- "yunion.io/x/onecloud/pkg/apis"
- api "yunion.io/x/onecloud/pkg/apis/compute"
- host_api "yunion.io/x/onecloud/pkg/apis/host"
- "yunion.io/x/onecloud/pkg/cloudcommon/db"
- "yunion.io/x/onecloud/pkg/cloudcommon/db/lockman"
- "yunion.io/x/onecloud/pkg/cloudcommon/db/quotas"
- "yunion.io/x/onecloud/pkg/cloudcommon/db/taskman"
- "yunion.io/x/onecloud/pkg/cloudcommon/validators"
- guestdriver_types "yunion.io/x/onecloud/pkg/compute/guestdrivers/types"
- "yunion.io/x/onecloud/pkg/compute/models"
- "yunion.io/x/onecloud/pkg/compute/options"
- "yunion.io/x/onecloud/pkg/httperrors"
- "yunion.io/x/onecloud/pkg/mcclient"
- "yunion.io/x/onecloud/pkg/util/logclient"
- )
- type SKVMGuestDriver struct {
- SVirtualizedGuestDriver
- }
- func init() {
- driver := SKVMGuestDriver{}
- models.RegisterGuestDriver(&driver)
- }
- func (self *SKVMGuestDriver) GetHypervisor() string {
- return api.HYPERVISOR_KVM
- }
- func (self *SKVMGuestDriver) GetProvider() string {
- return api.CLOUD_PROVIDER_ONECLOUD
- }
- func (self *SKVMGuestDriver) GetComputeQuotaKeys(scope rbacscope.TRbacScope, ownerId mcclient.IIdentityProvider, brand string) models.SComputeResourceKeys {
- keys := models.SComputeResourceKeys{}
- keys.SBaseProjectQuotaKeys = quotas.OwnerIdProjectQuotaKeys(scope, ownerId)
- keys.CloudEnv = api.CLOUD_ENV_ON_PREMISE
- keys.Provider = api.CLOUD_PROVIDER_ONECLOUD
- keys.Brand = api.ONECLOUD_BRAND_ONECLOUD
- keys.Hypervisor = api.HYPERVISOR_KVM
- return keys
- }
- func (self *SKVMGuestDriver) GetInstanceCapability() cloudprovider.SInstanceCapability {
- return cloudprovider.SInstanceCapability{
- Hypervisor: self.GetHypervisor(),
- Provider: self.GetProvider(),
- DefaultAccount: cloudprovider.SDefaultAccount{
- Linux: cloudprovider.SOsDefaultAccount{
- DefaultAccount: api.VM_DEFAULT_LINUX_LOGIN_USER,
- Changeable: true,
- },
- Windows: cloudprovider.SOsDefaultAccount{
- DefaultAccount: api.VM_DEFAULT_WINDOWS_LOGIN_USER,
- },
- },
- Storages: cloudprovider.Storage{
- SysDisk: []cloudprovider.StorageInfo{
- {StorageType: api.STORAGE_LOCAL, MinSizeGb: options.Options.LocalSysDiskMinSizeGB, MaxSizeGb: options.Options.LocalSysDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
- {StorageType: api.STORAGE_RBD, MinSizeGb: options.Options.LocalSysDiskMinSizeGB, MaxSizeGb: options.Options.LocalSysDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
- {StorageType: api.STORAGE_NFS, MinSizeGb: options.Options.LocalSysDiskMinSizeGB, MaxSizeGb: options.Options.LocalSysDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
- {StorageType: api.STORAGE_GPFS, MinSizeGb: options.Options.LocalSysDiskMinSizeGB, MaxSizeGb: options.Options.LocalSysDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
- },
- DataDisk: []cloudprovider.StorageInfo{
- {StorageType: api.STORAGE_LOCAL, MinSizeGb: options.Options.LocalDataDiskMinSizeGB, MaxSizeGb: options.Options.LocalDataDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
- {StorageType: api.STORAGE_RBD, MinSizeGb: options.Options.LocalDataDiskMinSizeGB, MaxSizeGb: options.Options.LocalDataDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
- {StorageType: api.STORAGE_NFS, MinSizeGb: options.Options.LocalDataDiskMinSizeGB, MaxSizeGb: options.Options.LocalDataDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
- {StorageType: api.STORAGE_GPFS, MinSizeGb: options.Options.LocalDataDiskMinSizeGB, MaxSizeGb: options.Options.LocalDataDiskMaxSizeGB, StepSizeGb: 1, Resizable: true},
- },
- },
- }
- }
- func (self *SKVMGuestDriver) GetDefaultSysDiskBackend() string {
- return api.STORAGE_LOCAL
- }
- func (self *SKVMGuestDriver) GetMinimalSysDiskSizeGb() int {
- return options.Options.DefaultDiskSizeMB / 1024
- }
- func (self *SKVMGuestDriver) RequestDetachDisksFromGuestForDelete(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- subtask, err := taskman.TaskManager.NewTask(ctx, "GuestDetachAllDisksTask", guest, task.GetUserCred(), task.GetParams(), task.GetTaskId(), "", nil)
- if err != nil {
- return err
- }
- subtask.ScheduleRun(nil)
- return nil
- }
- func (self *SKVMGuestDriver) DoGuestCreateDisksTask(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- subtask, err := taskman.TaskManager.NewTask(ctx, "KVMGuestCreateDiskTask", guest, task.GetUserCred(), task.GetParams(), task.GetTaskId(), "", nil)
- if err != nil {
- return err
- }
- subtask.ScheduleRun(nil)
- return nil
- }
- func (self *SKVMGuestDriver) RequestDiskSnapshot(ctx context.Context, guest *models.SGuest, task taskman.ITask, snapshotId, diskId string) error {
- obj, err := models.SnapshotManager.FetchById(snapshotId)
- if err != nil {
- return errors.Wrapf(err, "failed to find snapshot %s", snapshotId)
- }
- snapshot := obj.(*models.SSnapshot)
- host, _ := guest.GetHost()
- url := fmt.Sprintf("%s/servers/%s/snapshot", host.ManagerUri, guest.Id)
- body := jsonutils.NewDict()
- body.Set("disk_id", jsonutils.NewString(diskId))
- body.Set("snapshot_id", jsonutils.NewString(snapshotId))
- if snapshot.DiskBackupId != "" {
- backupObj, err := models.DiskBackupManager.FetchById(snapshot.DiskBackupId)
- if err != nil {
- return errors.Wrapf(err, "failed to find backup %s", snapshot.DiskBackupId)
- }
- backup := backupObj.(*models.SDiskBackup)
- body.Set("backup_disk_config", jsonutils.Marshal(backup.DiskConfig))
- }
- header := self.getTaskRequestHeader(task)
- _, _, err = httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, body, false)
- return err
- }
- func (self *SKVMGuestDriver) RequestDeleteSnapshot(ctx context.Context, guest *models.SGuest, task taskman.ITask, params *jsonutils.JSONDict) error {
- host, _ := guest.GetHost()
- url := fmt.Sprintf("%s/servers/%s/delete-snapshot", host.ManagerUri, guest.Id)
- header := self.getTaskRequestHeader(task)
- _, _, err := httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, params, false)
- return err
- }
- func (self *SKVMGuestDriver) RequestReloadDiskSnapshot(ctx context.Context, guest *models.SGuest, task taskman.ITask, params *jsonutils.JSONDict) error {
- host, _ := guest.GetHost()
- url := fmt.Sprintf("%s/servers/%s/reload-disk-snapshot", host.ManagerUri, guest.Id)
- header := self.getTaskRequestHeader(task)
- _, _, err := httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, params, false)
- return err
- }
- func findVNCPort(results string) int {
- vncInfo := strings.Split(results, "\n")
- addrParts := strings.Split(vncInfo[1], ":")
- port, _ := strconv.Atoi(strings.TrimSpace(addrParts[len(addrParts)-1]))
- return port
- }
- func findVNCPort2(results string) int {
- vncInfo := strings.Split(results, "\n")
- for i := 0; i < len(vncInfo); i++ {
- lineStr := strings.TrimSpace(vncInfo[i])
- if strings.HasSuffix(lineStr, "(ipv4)") {
- addrParts := strings.Split(lineStr, ":")
- v := addrParts[len(addrParts)-1]
- port, _ := strconv.Atoi(v[0 : len(v)-7])
- return port
- }
- }
- return -1
- }
- func (self *SKVMGuestDriver) GetGuestVncInfo(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, host *models.SHost, input *cloudprovider.ServerVncInput) (*cloudprovider.ServerVncOutput, error) {
- url := fmt.Sprintf("/servers/%s/monitor", guest.Id)
- body := jsonutils.NewDict()
- var cmd string
- if guest.GetVdi() == "spice" {
- cmd = "info spice"
- } else {
- cmd = "info vnc"
- }
- body.Add(jsonutils.NewString(cmd), "cmd")
- ret, err := host.Request(ctx, userCred, "POST", url, nil, body)
- if err != nil {
- return nil, errors.Wrapf(err, "Fail to request VNC info")
- }
- results, err := ret.GetString("results")
- if len(results) == 0 {
- return nil, errors.Wrapf(err, "Can't get vnc information from host.")
- }
- // info_vnc = result['results'].split('\n')
- // port = int(info_vnc[1].split(':')[-1].split()[0])
- /* $ QEMU 2.9.1
- info spice $ QEMU 2.12.1 monitor Server:
- Server: (qemu) info vnc address: 0.0.0.0:5901
- address: *:5921 info vnc auth: none
- migrated: false default: Client: none
- auth: spice Server: :::5902 (ipv6) $ QEMU 2.12.1 monitor without ipv6
- compiled: 0.13.3 Auth: none (Sub: none) (qemu) info vnc
- mouse-mode: server Server: 0.0.0.0:5902 (ipv4) info vnc
- Channels: none Auth: none (Sub: none) default:
- Server: 0.0.0.0:5902 (ipv4)
- Auth: none (Sub: none)
- */
- var port int
- if guest.CheckQemuVersion(guest.GetMetadata(ctx, "__qemu_version", userCred), "2.12.1") && strings.HasSuffix(cmd, "vnc") {
- port = findVNCPort2(results)
- } else {
- port = findVNCPort(results)
- }
- if port < 5900 {
- return nil, httperrors.NewResourceNotReadyError("invalid vnc port %d", port)
- }
- if len(host.AccessIp) == 0 {
- return nil, httperrors.NewResourceNotReadyError("the host %s loses its ip address", host.Name)
- }
- password := guest.GetMetadata(ctx, "__vnc_password", userCred)
- result := &cloudprovider.ServerVncOutput{
- Host: host.AccessIp,
- Protocol: guest.GetVdi(),
- Port: int64(port),
- Hypervisor: api.HYPERVISOR_KVM,
- Password: password,
- }
- return result, nil
- }
- func (self *SKVMGuestDriver) RequestStopOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, task taskman.ITask, syncStatus bool) error {
- body := jsonutils.NewDict()
- params := task.GetParams()
- timeout, err := params.Int("timeout")
- if err != nil {
- timeout = 30
- }
- isForce, err := params.Bool("is_force")
- if isForce {
- timeout = 0
- }
- body.Add(jsonutils.NewInt(timeout), "timeout")
- header := self.getTaskRequestHeader(task)
- url := fmt.Sprintf("%s/servers/%s/stop", host.ManagerUri, guest.Id)
- _, _, err = httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, body, false)
- return err
- }
- func (self *SKVMGuestDriver) RequestUndeployGuestOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, task taskman.ITask) error {
- url := fmt.Sprintf("%s/servers/%s", host.ManagerUri, guest.Id)
- header := self.getTaskRequestHeader(task)
- body := jsonutils.NewDict()
- if guest.HostId != host.Id {
- body.Set("migrated", jsonutils.JSONTrue)
- }
- _, res, err := httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "DELETE", url, header, body, false)
- if err != nil {
- return err
- }
- delayClean := jsonutils.QueryBoolean(res, "delay_clean", false)
- if res != nil && delayClean {
- return nil
- }
- task.ScheduleRun(nil)
- return nil
- }
- func (self *SKVMGuestDriver) GetJsonDescAtHost(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, host *models.SHost, params *jsonutils.JSONDict) (jsonutils.JSONObject, error) {
- desc := guest.GetJsonDescAtHypervisor(ctx, host)
- if len(desc.UserData) > 0 {
- // host 需要加密后的user-data以提供 http://169.254.169.254/latest/user-data 解密访问
- desc.UserData = base64.StdEncoding.EncodeToString([]byte(desc.UserData))
- }
- return jsonutils.Marshal(desc), nil
- }
- func (self *SKVMGuestDriver) RequestDeployGuestOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, task taskman.ITask) error {
- config, err := guest.GetDeployConfigOnHost(ctx, task.GetUserCred(), host, task.GetParams())
- if err != nil {
- log.Errorf("GetDeployConfigOnHost error: %v", err)
- return err
- }
- log.Debugf("RequestDeployGuestOnHost: %s", config)
- action, err := config.GetString("action")
- if err != nil {
- return err
- }
- url := fmt.Sprintf("%s/servers/%s/%s", host.ManagerUri, guest.Id, action)
- header := self.getTaskRequestHeader(task)
- _, _, err = httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, config, false)
- if err != nil {
- return err
- }
- return nil
- }
- func (self *SKVMGuestDriver) OnGuestDeployTaskDataReceived(ctx context.Context, guest *models.SGuest, task taskman.ITask, data jsonutils.JSONObject) error {
- guest.SaveDeployInfo(ctx, task.GetUserCred(), data)
- return nil
- }
- func (self *SKVMGuestDriver) RequestStartOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, userCred mcclient.TokenCredential, task taskman.ITask) error {
- header := self.getTaskRequestHeader(task)
- config := jsonutils.NewDict()
- drv, err := guest.GetDriver()
- if err != nil {
- return err
- }
- desc, err := drv.GetJsonDescAtHost(ctx, userCred, guest, host, nil)
- if err != nil {
- return errors.Wrapf(err, "GetJsonDescAtHost")
- }
- config.Add(desc, "desc")
- params := task.GetParams()
- if params.Length() > 0 {
- config.Add(params, "params")
- }
- url := fmt.Sprintf("%s/servers/%s/start", host.ManagerUri, guest.Id)
- _, body, err := httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, config, false)
- if err != nil {
- return err
- }
- if jsonutils.QueryBoolean(body, "is_running", false) {
- taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
- return body, nil
- })
- }
- return nil
- }
- func (self *SKVMGuestDriver) RequestSyncstatusOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, userCred mcclient.TokenCredential, task taskman.ITask) error {
- header := self.getTaskRequestHeader(task)
- url := fmt.Sprintf("%s/servers/%s/status", host.ManagerUri, guest.Id)
- _, res, err := httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "GET", url, header, nil, false)
- if err != nil {
- return err
- }
- statusStr, _ := res.GetString("status")
- if len(statusStr) > 0 {
- // may be an old version host, use sync request
- taskman.LocalTaskRun(task, func() (jsonutils.JSONObject, error) {
- // delay response to ensure event order
- time.Sleep(time.Second)
- return res, nil
- })
- }
- return nil
- }
- func (self *SKVMGuestDriver) OnDeleteGuestFinalCleanup(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential) error {
- if ispId := guest.GetMetadata(ctx, api.BASE_INSTANCE_SNAPSHOT_ID, userCred); len(ispId) > 0 {
- ispM, err := models.InstanceSnapshotManager.FetchById(ispId)
- if err == nil {
- isp := ispM.(*models.SInstanceSnapshot)
- isp.DecRefCount(ctx, userCred)
- }
- guest.SetMetadata(ctx, api.BASE_INSTANCE_SNAPSHOT_ID, "", userCred)
- }
- return nil
- }
- func (self *SKVMGuestDriver) IsSupportEip() bool {
- return true
- }
- func (self *SKVMGuestDriver) IsSupportShutdownMode() bool {
- return true
- }
- func (self *SKVMGuestDriver) ValidateCreateEip(ctx context.Context, userCred mcclient.TokenCredential, input api.ServerCreateEipInput) error {
- return nil
- }
- func (self *SKVMGuestDriver) RequestAssociateEip(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, eip *models.SElasticip, task taskman.ITask) error {
- defer task.ScheduleRun(nil)
- lockman.LockObject(ctx, guest)
- defer lockman.ReleaseObject(ctx, guest)
- var guestnics []models.SGuestnetwork
- {
- netq := models.NetworkManager.Query().SubQuery()
- wirq := models.WireManager.Query().SubQuery()
- vpcq := models.VpcManager.Query().SubQuery()
- gneq := models.GuestnetworkManager.Query()
- q := gneq.Equals("guest_id", guest.Id).
- IsNullOrEmpty("eip_id")
- q = q.Join(netq, sqlchemy.Equals(netq.Field("id"), gneq.Field("network_id")))
- q = q.Join(wirq, sqlchemy.Equals(wirq.Field("id"), netq.Field("wire_id")))
- q = q.Join(vpcq, sqlchemy.Equals(vpcq.Field("id"), wirq.Field("vpc_id")))
- q = q.Filter(sqlchemy.NotEquals(vpcq.Field("id"), api.DEFAULT_VPC_ID))
- if err := db.FetchModelObjects(models.GuestnetworkManager, q, &guestnics); err != nil {
- return err
- }
- if len(guestnics) == 0 {
- return errors.Errorf("guest has no nics to associate eip")
- }
- }
- guestnic := &guestnics[0]
- lockman.LockObject(ctx, guestnic)
- defer lockman.ReleaseObject(ctx, guestnic)
- if _, err := db.Update(guestnic, func() error {
- guestnic.EipId = eip.Id
- return nil
- }); err != nil {
- return errors.Wrapf(err, "set associated eip for guestnic %s (guest:%s, network:%s)",
- guestnic.Ifname, guestnic.GuestId, guestnic.NetworkId)
- }
- if err := eip.AssociateInstance(ctx, userCred, api.EIP_ASSOCIATE_TYPE_SERVER, guest); err != nil {
- return errors.Wrapf(err, "associate eip %s(%s) to vm %s(%s)", eip.Name, eip.Id, guest.Name, guest.Id)
- }
- if err := eip.SetStatus(ctx, userCred, api.EIP_STATUS_READY, api.EIP_STATUS_ASSOCIATE); err != nil {
- return errors.Wrapf(err, "set eip status to %s", api.EIP_STATUS_ALLOCATE)
- }
- return nil
- }
- func (self *SKVMGuestDriver) RequestChangeVmConfig(ctx context.Context, guest *models.SGuest, task taskman.ITask, instanceType string, vcpuCount, cpuSockets, vmemSize int64) error {
- taskParams := task.GetParams()
- if jsonutils.QueryBoolean(taskParams, "guest_online", false) {
- addCpu := vcpuCount - int64(guest.VcpuCount)
- addMem := vmemSize - int64(guest.VmemSize)
- if addCpu < 0 || addMem < 0 {
- return fmt.Errorf("KVM guest doesn't support online reduce cpu or mem")
- }
- header := task.GetTaskRequestHeader()
- body := jsonutils.NewDict()
- if vcpuCount > int64(guest.VcpuCount) {
- body.Set("add_cpu", jsonutils.NewInt(addCpu))
- body.Set("total_cpu", jsonutils.NewInt(int64(guest.VcpuCount)))
- }
- if vmemSize > int64(guest.VmemSize) {
- body.Set("add_mem", jsonutils.NewInt(addMem))
- body.Set("total_mem", jsonutils.NewInt(int64(guest.VmemSize)))
- }
- if taskParams.Contains("cpu_numa_pin") {
- cpuNumaPin, _ := taskParams.Get("cpu_numa_pin")
- body.Set("cpu_numa_pin", cpuNumaPin)
- }
- host, _ := guest.GetHost()
- url := fmt.Sprintf("%s/servers/%s/hotplug-cpu-mem", host.ManagerUri, guest.Id)
- _, _, err := httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, body, false)
- return err
- } else {
- task.ScheduleRun(nil)
- return nil
- }
- }
- func (self *SKVMGuestDriver) RequestSoftReset(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- _, err := guest.SendMonitorCommand(
- ctx, task.GetUserCred(),
- &api.ServerMonitorInput{COMMAND: "system_reset"},
- )
- return err
- }
- func (self *SKVMGuestDriver) RequestDetachDisk(ctx context.Context, guest *models.SGuest, disk *models.SDisk, task taskman.ITask) error {
- host, _ := guest.GetHost()
- header := task.GetTaskRequestHeader()
- url := fmt.Sprintf("%s/servers/%s/status", host.ManagerUri, guest.Id)
- task.SetStage("OnGetGuestStatus", nil)
- _, _, err := httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "GET", url, header, nil, false)
- return err
- }
- func (self *SKVMGuestDriver) RequestAttachDisk(ctx context.Context, guest *models.SGuest, disk *models.SDisk, task taskman.ITask) error {
- return guest.StartSyncTaskWithoutSyncstatus(
- ctx,
- task.GetUserCred(),
- jsonutils.QueryBoolean(task.GetParams(), "sync_desc_only", false),
- task.GetTaskId(),
- )
- }
- func (self *SKVMGuestDriver) RequestSaveImage(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, task taskman.ITask) error {
- disks := guest.CategorizeDisks()
- opts := api.DiskSaveInput{}
- task.GetParams().Unmarshal(&opts)
- return disks.Root.StartDiskSaveTask(ctx, userCred, opts, task.GetTaskId())
- }
- func (self *SKVMGuestDriver) RequestOpenForward(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, req *guestdriver_types.OpenForwardRequest) (*guestdriver_types.OpenForwardResponse, error) {
- var (
- host, _ = guest.GetHost()
- url = fmt.Sprintf("%s/servers/%s/open-forward", host.ManagerUri, guest.Id)
- httpClient = httputils.GetDefaultClient()
- header = mcclient.GetTokenHeaders(userCred)
- hostreq = &host_api.GuestOpenForwardRequest{
- NetworkId: req.NetworkId,
- Proto: req.Proto,
- Addr: req.Addr,
- Port: req.Port,
- }
- body = jsonutils.Marshal(hostreq)
- )
- _, respBody, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, body, false)
- if err != nil {
- return nil, errors.Wrap(err, "host request")
- }
- hostresp := &host_api.GuestOpenForwardResponse{}
- if err := respBody.Unmarshal(hostresp); err != nil {
- return nil, errors.Wrap(err, "unmarshal host response")
- }
- resp := &guestdriver_types.OpenForwardResponse{
- Proto: hostresp.Proto,
- ProxyAddr: hostresp.ProxyAddr,
- ProxyPort: hostresp.ProxyPort,
- Addr: hostresp.Addr,
- Port: hostresp.Port,
- }
- return resp, nil
- }
- func (self *SKVMGuestDriver) RequestCloseForward(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, req *guestdriver_types.CloseForwardRequest) (*guestdriver_types.CloseForwardResponse, error) {
- var (
- host, _ = guest.GetHost()
- url = fmt.Sprintf("%s/servers/%s/close-forward", host.ManagerUri, guest.Id)
- httpClient = httputils.GetDefaultClient()
- header = mcclient.GetTokenHeaders(userCred)
- hostreq = &host_api.GuestCloseForwardRequest{
- NetworkId: req.NetworkId,
- Proto: req.Proto,
- ProxyAddr: req.ProxyAddr,
- ProxyPort: req.ProxyPort,
- }
- body = jsonutils.Marshal(hostreq)
- )
- _, respBody, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, body, false)
- if err != nil {
- return nil, errors.Wrap(err, "host request")
- }
- hostresp := &host_api.GuestCloseForwardResponse{}
- if err := respBody.Unmarshal(hostresp); err != nil {
- return nil, errors.Wrap(err, "unmarshal host response")
- }
- resp := &guestdriver_types.CloseForwardResponse{
- Proto: hostresp.Proto,
- ProxyAddr: hostresp.ProxyAddr,
- ProxyPort: hostresp.ProxyPort,
- }
- return resp, nil
- }
- func (self *SKVMGuestDriver) RequestListForward(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, req *guestdriver_types.ListForwardRequest) (*guestdriver_types.ListForwardResponse, error) {
- var (
- host, _ = guest.GetHost()
- url = fmt.Sprintf("%s/servers/%s/list-forward", host.ManagerUri, guest.Id)
- httpClient = httputils.GetDefaultClient()
- header = mcclient.GetTokenHeaders(userCred)
- hostreq = &host_api.GuestListForwardRequest{
- NetworkId: req.NetworkId,
- Proto: req.Proto,
- Addr: req.Addr,
- Port: req.Port,
- }
- body = jsonutils.Marshal(hostreq)
- )
- _, respBody, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, body, false)
- if err != nil {
- return nil, errors.Wrap(err, "host request")
- }
- hostresp := &host_api.GuestListForwardResponse{}
- if err := respBody.Unmarshal(hostresp); err != nil {
- return nil, errors.Wrap(err, "unmarshal host response")
- }
- var respForwards []guestdriver_types.OpenForwardResponse
- for i := range hostresp.Forwards {
- respForwards = append(respForwards, guestdriver_types.OpenForwardResponse{
- Proto: hostresp.Forwards[i].Proto,
- ProxyAddr: hostresp.Forwards[i].ProxyAddr,
- ProxyPort: hostresp.Forwards[i].ProxyPort,
- Addr: hostresp.Forwards[i].Addr,
- Port: hostresp.Forwards[i].Port,
- })
- }
- resp := &guestdriver_types.ListForwardResponse{
- Forwards: respForwards,
- }
- return resp, nil
- }
- func (self *SKVMGuestDriver) GetDetachDiskStatus() ([]string, error) {
- return []string{api.VM_READY, api.VM_RUNNING}, nil
- }
- func (self *SKVMGuestDriver) GetAttachDiskStatus() ([]string, error) {
- return []string{api.VM_READY, api.VM_RUNNING}, nil
- }
- func (self *SKVMGuestDriver) GetRebuildRootStatus() ([]string, error) {
- return []string{api.VM_READY}, nil
- }
- func (self *SKVMGuestDriver) GetChangeInstanceTypeStatus() ([]string, error) {
- return []string{api.VM_READY, api.VM_RUNNING}, nil
- }
- func (self *SKVMGuestDriver) GetDeployStatus() ([]string, error) {
- return []string{api.VM_READY, api.VM_ADMIN}, nil
- }
- func (self *SKVMGuestDriver) ValidateResizeDisk(guest *models.SGuest, disk *models.SDisk, storage *models.SStorage) error {
- if guest.Hypervisor == api.HYPERVISOR_KVM {
- if guest.GetDiskIndex(disk.Id) <= 0 && guest.Status == api.VM_RUNNING {
- return fmt.Errorf("Cann't online resize root disk")
- }
- if guest.Status == api.VM_RUNNING && storage.StorageType == api.STORAGE_SLVM {
- return fmt.Errorf("shared lvm storage cann't online resize")
- }
- }
- if !utils.IsInStringArray(guest.Status, []string{api.VM_READY, api.VM_RUNNING}) {
- return fmt.Errorf("Cannot resize disk when guest in status %s", guest.Status)
- }
- return nil
- }
- func (self *SKVMGuestDriver) RequestSyncConfigOnHost(ctx context.Context, guest *models.SGuest, host *models.SHost, task taskman.ITask) error {
- drv, err := guest.GetDriver()
- if err != nil {
- return err
- }
- desc, err := drv.GetJsonDescAtHost(ctx, task.GetUserCred(), guest, host, nil)
- if err != nil {
- return errors.Wrapf(err, "GetJsonDescAtHost")
- }
- body := jsonutils.NewDict()
- body.Add(desc, "desc")
- if fw_only, _ := task.GetParams().Bool("fw_only"); fw_only {
- body.Add(jsonutils.JSONTrue, "fw_only")
- }
- if setUefiBootOrder, _ := task.GetParams().Bool("set_uefi_boot_order"); setUefiBootOrder {
- body.Add(jsonutils.JSONTrue, "set_uefi_boot_order")
- }
- url := fmt.Sprintf("%s/servers/%s/sync", host.ManagerUri, guest.Id)
- header := self.getTaskRequestHeader(task)
- _, _, err = httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, body, false)
- return err
- }
- func (self *SKVMGuestDriver) RequestSuspendOnHost(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- host, _ := guest.GetHost()
- url := fmt.Sprintf("%s/servers/%s/suspend", host.ManagerUri, guest.Id)
- header := self.getTaskRequestHeader(task)
- _, _, err := httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, nil, false)
- return err
- }
- func (self *SKVMGuestDriver) RequestResumeOnHost(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- host, _ := guest.GetHost()
- url := fmt.Sprintf("%s/servers/%s/start", host.ManagerUri, guest.Id)
- header := self.getTaskRequestHeader(task)
- _, _, err := httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, nil, false)
- return err
- }
- func (self *SKVMGuestDriver) RequestGuestCreateAllDisks(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- input := new(api.ServerCreateInput)
- task.GetParams().Unmarshal(input)
- return guest.StartGuestCreateDiskTask(ctx, task.GetUserCred(), input.Disks, task.GetTaskId())
- }
- func (self *SKVMGuestDriver) NeedRequestGuestHotAddIso(ctx context.Context, guest *models.SGuest) bool {
- return guest.Status == api.VM_RUNNING
- }
- func (self *SKVMGuestDriver) RequestGuestHotAddIso(ctx context.Context, guest *models.SGuest, path string, boot bool, task taskman.ITask) error {
- return guest.StartSyncTask(ctx, task.GetUserCred(), false, task.GetTaskId())
- }
- func (self *SKVMGuestDriver) RequestGuestHotRemoveIso(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- return guest.StartSyncTask(ctx, task.GetUserCred(), false, task.GetTaskId())
- }
- func (self *SKVMGuestDriver) NeedRequestGuestHotAddVfd(ctx context.Context, guest *models.SGuest) bool {
- return guest.Status == api.VM_RUNNING
- }
- func (self *SKVMGuestDriver) RequestGuestHotAddVfd(ctx context.Context, guest *models.SGuest, path string, boot bool, task taskman.ITask) error {
- return guest.StartSyncTask(ctx, task.GetUserCred(), false, task.GetTaskId())
- }
- func (self *SKVMGuestDriver) RequestGuestHotRemoveVfd(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- return guest.StartSyncTask(ctx, task.GetUserCred(), false, task.GetTaskId())
- }
- func (self *SKVMGuestDriver) RequestRebuildRootDisk(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- subtask, err := taskman.TaskManager.NewTask(ctx, "KVMGuestRebuildRootTask", guest, task.GetUserCred(), task.GetParams(), task.GetTaskId(), "", nil)
- if err != nil {
- return err
- }
- subtask.ScheduleRun(nil)
- return nil
- }
- func (self *SKVMGuestDriver) RequestSyncToBackup(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- host, err := guest.GetHost()
- if err != nil {
- return err
- }
- drv, err := guest.GetDriver()
- if err != nil {
- return err
- }
- desc, err := drv.GetJsonDescAtHost(ctx, task.GetUserCred(), guest, host, nil)
- if err != nil {
- return errors.Wrapf(err, "GetJsonDescAtHost")
- }
- body := jsonutils.NewDict()
- body.Add(desc, "desc")
- body.Set("backup_nbd_server_uri", jsonutils.NewString(guest.GetMetadata(ctx, "backup_nbd_server_uri", task.GetUserCred())))
- url := fmt.Sprintf("%s/servers/%s/block-replication", host.ManagerUri, guest.Id)
- header := self.getTaskRequestHeader(task)
- _, _, err = httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, body, false)
- if err != nil {
- return err
- }
- return nil
- }
- func (self *SKVMGuestDriver) RequestSlaveBlockStreamDisks(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- host := models.HostManager.FetchHostById(guest.BackupHostId)
- body := jsonutils.NewDict()
- url := fmt.Sprintf("%s/servers/%s/slave-block-stream-disks", host.ManagerUri, guest.Id)
- header := self.getTaskRequestHeader(task)
- _, _, err := httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, body, false)
- return err
- }
- // kvm guest must add cpu first
- // if body has add_cpu_failed indicate dosen't exec add mem
- // 1. cpu added part of request --> add_cpu_failed: true && added_cpu: count
- // 2. cpu added all of request add mem failed --> add_mem_failed: true
- func (self *SKVMGuestDriver) OnGuestChangeCpuMemFailed(ctx context.Context, guest *models.SGuest, data *jsonutils.JSONDict, task taskman.ITask) error {
- var cpuAdded int64
- if jsonutils.QueryBoolean(data, "add_cpu_failed", false) {
- cpuAdded, _ = data.Int("added_cpu")
- } else if jsonutils.QueryBoolean(data, "add_mem_failed", false) {
- vcpuCount, _ := task.GetParams().Int("vcpu_count")
- if vcpuCount-int64(guest.VcpuCount) > 0 {
- cpuAdded = vcpuCount - int64(guest.VcpuCount)
- }
- }
- if cpuAdded > 0 {
- _, err := db.Update(guest, func() error {
- guest.VcpuCount = guest.VcpuCount + int(cpuAdded)
- return nil
- })
- if err != nil {
- return err
- }
- db.OpsLog.LogEvent(guest, db.ACT_CHANGE_FLAVOR,
- fmt.Sprintf("Change config task failed but added cpu count %d", cpuAdded), task.GetUserCred())
- logclient.AddActionLogWithContext(ctx, guest, logclient.ACT_VM_CHANGE_FLAVOR,
- fmt.Sprintf("Change config task failed but added cpu count %d", cpuAdded), task.GetUserCred(), false)
- models.HostManager.ClearSchedDescCache(guest.HostId)
- }
- return nil
- }
- func (self *SKVMGuestDriver) IsSupportCdrom(guest *models.SGuest) (bool, error) {
- return true, nil
- }
- func (self *SKVMGuestDriver) IsSupportFloppy(guest *models.SGuest) (bool, error) {
- return true, nil
- }
- func (self *SKVMGuestDriver) IsSupportMigrate() bool {
- return true
- }
- func (self *SKVMGuestDriver) IsSupportLiveMigrate() bool {
- return true
- }
- func checkAssignHost(ctx context.Context, userCred mcclient.TokenCredential, preferHost string) error {
- iHost, _ := models.HostManager.FetchByIdOrName(ctx, userCred, preferHost)
- if iHost == nil {
- return httperrors.NewBadRequestError("Host %s not found", preferHost)
- }
- host := iHost.(*models.SHost)
- err := host.IsAssignable(ctx, userCred)
- if err != nil {
- return errors.Wrap(err, "IsAssignable")
- }
- return nil
- }
- func (self *SKVMGuestDriver) CheckMigrate(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential, input api.GuestMigrateInput) error {
- if len(guest.BackupHostId) > 0 {
- return httperrors.NewBadRequestError("Guest have backup, can't migrate")
- }
- if !input.IsRescueMode && guest.Status != api.VM_READY {
- return httperrors.NewServerStatusError("Cannot normal migrate guest in status %s, try rescue mode or server-live-migrate?", guest.Status)
- }
- if input.IsRescueMode {
- host, err := guest.GetHost()
- if err != nil {
- return err
- }
- if host.HostStatus != api.HOST_OFFLINE {
- return httperrors.NewBadRequestError("Host status %s, can't do rescue mode migration", host.HostStatus)
- }
- disks, err := guest.GetDisks()
- if err != nil {
- return errors.Wrapf(err, "GetDisks")
- }
- for _, disk := range disks {
- storage, _ := disk.GetStorage()
- if utils.IsInStringArray(
- storage.StorageType, api.STORAGE_LOCAL_TYPES) {
- return httperrors.NewBadRequestError("Rescue mode requires all disk store in shared storages")
- }
- }
- }
- devices, err := guest.GetIsolatedDevices()
- if err != nil {
- return errors.Wrapf(err, "GetIsolatedDevices")
- }
- if len(devices) > 0 {
- return httperrors.NewBadRequestError("Cannot migrate with isolated devices")
- }
- if len(input.PreferHostId) > 0 {
- err := checkAssignHost(ctx, userCred, input.PreferHostId)
- if err != nil {
- return errors.Wrap(err, "checkAssignHost")
- }
- }
- return nil
- }
- func (self *SKVMGuestDriver) CheckLiveMigrate(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential, input api.GuestLiveMigrateInput) error {
- if len(guest.BackupHostId) > 0 {
- return httperrors.NewBadRequestError("Guest have backup, can't migrate")
- }
- if utils.IsInStringArray(guest.Status, []string{api.VM_RUNNING, api.VM_SUSPEND}) {
- if input.MaxBandwidthMb != nil && *input.MaxBandwidthMb < 50 {
- return httperrors.NewBadRequestError("max bandwidth must gratethan 100M")
- }
- cdrom := guest.GetCdrom()
- if cdrom != nil && len(cdrom.ImageId) > 0 {
- return httperrors.NewBadRequestError("Cannot live migrate with cdrom")
- }
- devices, err := guest.GetIsolatedDevices()
- if err != nil {
- return errors.Wrapf(err, "GetIsolatedDevices")
- }
- if len(devices) > 0 {
- return httperrors.NewBadRequestError("Cannot live migrate with isolated devices")
- }
- if !guest.CheckQemuVersion(guest.GetQemuVersion(userCred), "1.1.2") {
- return httperrors.NewBadRequestError("Cannot do live migrate, too low qemu version")
- }
- if len(input.PreferHost) > 0 {
- err := checkAssignHost(ctx, userCred, input.PreferHost)
- if err != nil {
- return errors.Wrap(err, "checkAssignHost")
- }
- }
- }
- return nil
- }
- func (self *SKVMGuestDriver) RequestCancelLiveMigrate(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential) error {
- host, _ := guest.GetHost()
- url := fmt.Sprintf("%s/servers/%s/cancel-live-migrate", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := mcclient.GetTokenHeaders(userCred)
- _, _, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, jsonutils.NewDict(), false)
- if err != nil {
- return errors.Wrap(err, "host request")
- }
- return nil
- }
- func (self *SKVMGuestDriver) ValidateDetachNetwork(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest) error {
- if guest.Status == api.VM_RUNNING && guest.GetMetadata(ctx, api.VM_METADATA_HOT_REMOVE_NIC, nil) != "enable" {
- return httperrors.NewBadRequestError("Guest %s can't hot remove nic", guest.GetName())
- }
- return nil
- }
- func (self *SKVMGuestDriver) ValidateChangeDiskStorage(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, targetStorageId string) error {
- if !utils.IsInStringArray(guest.Status, []string{api.VM_READY, api.VM_RUNNING, api.VM_BLOCK_STREAM, api.VM_DISK_CHANGE_STORAGE}) {
- return httperrors.NewBadRequestError("Cannot change disk storage in status %s", guest.Status)
- }
- // backup guest not supported
- if guest.BackupHostId != "" {
- return httperrors.NewBadRequestError("Cannot change disk storage in backup guest %s", guest.GetName())
- }
- // storage must attached on guest's host
- host, err := guest.GetHost()
- if err != nil {
- return errors.Wrapf(err, "Get guest %s host", guest.GetName())
- }
- attachedStorages := host.GetAttachedEnabledHostStorages(nil)
- foundStorage := false
- for _, storage := range attachedStorages {
- if storage.GetId() == targetStorageId {
- foundStorage = true
- }
- }
- if !foundStorage {
- return httperrors.NewBadRequestError("Storage %s not attached or enabled on host %s", targetStorageId, host.GetName())
- }
- return nil
- }
- func (self *SKVMGuestDriver) RequestChangeDiskStorage(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, input *api.ServerChangeDiskStorageInternalInput, task taskman.ITask) error {
- host, err := guest.GetHost()
- if err != nil {
- return err
- }
- body := jsonutils.Marshal(input)
- header := self.getTaskRequestHeader(task)
- url := fmt.Sprintf("%s/servers/%s/storage-clone-disk", host.ManagerUri, guest.GetId())
- _, _, err = httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, body, false)
- return err
- }
- func (self *SKVMGuestDriver) RequestSwitchToTargetStorageDisk(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest, input *api.ServerChangeDiskStorageInternalInput, task taskman.ITask) error {
- host, err := guest.GetHost()
- if err != nil {
- return err
- }
- body := jsonutils.Marshal(input)
- header := self.getTaskRequestHeader(task)
- url := fmt.Sprintf("%s/servers/%s/live-change-disk", host.ManagerUri, guest.GetId())
- _, _, err = httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, body, false)
- return err
- }
- func (self *SKVMGuestDriver) validateVdiProtocol(vdi string) error {
- if !utils.IsInStringArray(vdi, []string{api.VM_VDI_PROTOCOL_VNC, api.VM_VDI_PROTOCOL_SPICE}) {
- return httperrors.NewInputParameterError("unsupported vdi protocol %s", vdi)
- }
- return nil
- }
- func (self *SKVMGuestDriver) validateVGA(ovdi, ovga string, nvdi, nvga *string) (vdi, vga string) {
- vdi = ovdi
- if nvdi != nil {
- vdi = *nvdi
- }
- if vdi != api.VM_VDI_PROTOCOL_VNC && vdi != api.VM_VDI_PROTOCOL_SPICE {
- vdi = api.VM_VDI_PROTOCOL_VNC
- }
- var candidateVga []string
- switch vdi {
- case api.VM_VDI_PROTOCOL_VNC:
- candidateVga = []string{api.VM_VIDEO_STANDARD, api.VM_VIDEO_QXL, api.VM_VIDEO_VIRTIO}
- case api.VM_VDI_PROTOCOL_SPICE:
- candidateVga = []string{api.VM_VIDEO_QXL, api.VM_VIDEO_VIRTIO}
- }
- vga = ovga
- if nvga != nil {
- vga = *nvga
- }
- if !utils.IsInStringArray(vga, candidateVga) {
- vga = candidateVga[0]
- }
- return
- }
- func (self *SKVMGuestDriver) validateMachineType(machine string, osArch string) error {
- var candidate []string
- if apis.IsARM(osArch) || apis.IsRISCV(osArch) {
- candidate = []string{api.VM_MACHINE_TYPE_VIRT}
- } else {
- candidate = []string{api.VM_MACHINE_TYPE_PC, api.VM_MACHINE_TYPE_Q35}
- }
- if !utils.IsInStringArray(machine, candidate) {
- return httperrors.NewInputParameterError("Invalid machine type %q for arch %q", machine, osArch)
- }
- return nil
- }
- func (self *SKVMGuestDriver) ValidateCreateData(ctx context.Context, userCred mcclient.TokenCredential, input *api.ServerCreateInput) (*api.ServerCreateInput, error) {
- input, err := self.SVirtualizedGuestDriver.ValidateCreateData(ctx, userCred, input)
- if err != nil {
- return input, errors.Wrap(err, "SVirtualizedGuestDriver.ValidateCreateData")
- }
- if input.Vdi != "" {
- err = self.validateVdiProtocol(input.Vdi)
- if err != nil {
- return nil, errors.Wrap(err, "validateVdiProtocol")
- }
- }
- if input.Vdi != "" || input.Vga != "" {
- input.Vdi, input.Vga = self.validateVGA("", "", &input.Vdi, &input.Vga)
- }
- if input.Machine != "" {
- if err := self.validateMachineType(input.Machine, input.OsArch); err != nil {
- return nil, errors.Wrap(err, "validateMachineType")
- }
- }
- for i := range input.Secgroups {
- if input.Secgroups[i] == api.SECGROUP_DEFAULT_ID {
- continue
- }
- secObj, err := validators.ValidateModel(ctx, userCred, models.SecurityGroupManager, &input.Secgroups[i])
- if err != nil {
- return nil, err
- }
- secgroup := secObj.(*models.SSecurityGroup)
- if secgroup.CloudregionId != api.DEFAULT_REGION_ID {
- return nil, httperrors.NewInputParameterError("invalid secgroup %s", secgroup.Name)
- }
- }
- return input, nil
- }
- func (self *SKVMGuestDriver) ValidateUpdateData(ctx context.Context, guest *models.SGuest, userCred mcclient.TokenCredential, input api.ServerUpdateInput) (api.ServerUpdateInput, error) {
- input, err := self.SVirtualizedGuestDriver.ValidateUpdateData(ctx, guest, userCred, input)
- if err != nil {
- return input, errors.Wrap(err, "SVirtualizedGuestDriver.ValidateUpdateData")
- }
- if input.Vdi != nil {
- err = self.validateVdiProtocol(*input.Vdi)
- if err != nil {
- return input, errors.Wrap(err, "validateVdiProtocol")
- }
- }
- if input.Vga != nil || input.Vdi != nil {
- vdi, vga := self.validateVGA(guest.Vdi, guest.Vga, input.Vdi, input.Vga)
- input.Vdi = &vdi
- input.Vga = &vga
- }
- if input.Machine != nil {
- err := self.validateMachineType(*input.Machine, guest.OsArch)
- if err != nil {
- return input, errors.Wrap(err, "ValidateMachineType")
- }
- }
- return input, nil
- }
- func (self *SKVMGuestDriver) RequestSyncIsolatedDevice(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- return guest.StartSyncTask(ctx, task.GetUserCred(), false, task.GetTaskId())
- }
- func (self *SKVMGuestDriver) RequestCPUSet(ctx context.Context, userCred mcclient.TokenCredential, host *models.SHost, guest *models.SGuest, input *api.ServerCPUSetInput) (*api.ServerCPUSetResp, error) {
- url := fmt.Sprintf("%s/servers/%s/cpuset", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := mcclient.GetTokenHeaders(userCred)
- body := jsonutils.Marshal(input)
- _, respBody, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, body, false)
- if err != nil {
- return nil, errors.Wrap(err, "host request")
- }
- resp := new(api.ServerCPUSetResp)
- if respBody == nil {
- return resp, nil
- }
- if err := respBody.Unmarshal(resp); err != nil {
- return nil, errors.Wrap(err, "unmarshal response")
- }
- return resp, nil
- }
- func (self *SKVMGuestDriver) RequestCPUSetRemove(ctx context.Context, userCred mcclient.TokenCredential, host *models.SHost, guest *models.SGuest, input *api.ServerCPUSetRemoveInput) error {
- url := fmt.Sprintf("%s/servers/%s/cpuset-remove", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := mcclient.GetTokenHeaders(userCred)
- body := jsonutils.Marshal(input)
- _, _, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, body, false)
- if err != nil {
- return errors.Wrap(err, "host request")
- }
- return nil
- }
- func (self *SKVMGuestDriver) QgaRequestGuestPing(ctx context.Context, header http.Header, host *models.SHost, guest *models.SGuest, async bool, input *api.ServerQgaTimeoutInput) error {
- url := fmt.Sprintf("%s/servers/%s/qga-guest-ping", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- body := jsonutils.NewDict()
- if input != nil {
- body.Set("timeout", jsonutils.NewInt(int64(input.Timeout)))
- }
- body.Set("async", jsonutils.NewBool(async))
- _, _, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, body, false)
- if err != nil {
- return errors.Wrap(err, "host request")
- }
- return nil
- }
- func (self *SKVMGuestDriver) QgaRequestGuestInfoTask(ctx context.Context, userCred mcclient.TokenCredential, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
- url := fmt.Sprintf("%s/servers/%s/qga-guest-info-task", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := mcclient.GetTokenHeaders(userCred)
- _, res, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, nil, false)
- if err != nil {
- return nil, errors.Wrap(err, "host request")
- }
- return res, nil
- }
- func (self *SKVMGuestDriver) QgaRequestSetNetwork(ctx context.Context, task taskman.ITask, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
- url := fmt.Sprintf("%s/servers/%s/qga-set-network", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := task.GetTaskRequestHeader()
- _, res, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, body, false)
- if err != nil {
- return nil, errors.Wrap(err, "host request")
- }
- return res, nil
- }
- func (self *SKVMGuestDriver) QgaRequestGetNetwork(ctx context.Context, userCred mcclient.TokenCredential, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
- url := fmt.Sprintf("%s/servers/%s/qga-get-network", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := mcclient.GetTokenHeaders(userCred)
- _, res, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, nil, false)
- if err != nil {
- return nil, errors.Wrap(err, "host request")
- }
- return res, nil
- }
- func (self *SKVMGuestDriver) QgaRequestGetOsInfo(ctx context.Context, userCred mcclient.TokenCredential, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
- url := fmt.Sprintf("%s/servers/%s/qga-get-os-info", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := mcclient.GetTokenHeaders(userCred)
- _, res, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, nil, false)
- if err != nil {
- return nil, errors.Wrap(err, "host request")
- }
- return res, nil
- }
- func (self *SKVMGuestDriver) QgaRequestSetUserPassword(ctx context.Context, task taskman.ITask, host *models.SHost, guest *models.SGuest, input *api.ServerQgaSetPasswordInput) error {
- url := fmt.Sprintf("%s/servers/%s/qga-set-password", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := task.GetTaskRequestHeader()
- body := jsonutils.Marshal(input)
- _, _, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, body, false)
- if err != nil {
- return errors.Wrap(err, "host request")
- }
- return nil
- }
- func (self *SKVMGuestDriver) RequestQgaCommand(ctx context.Context, userCred mcclient.TokenCredential, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
- url := fmt.Sprintf("%s/servers/%s/qga-command", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := mcclient.GetTokenHeaders(userCred)
- _, res, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, body, false)
- if err != nil {
- return nil, errors.Wrap(err, "host request")
- }
- return res, nil
- }
- func (self *SKVMGuestDriver) RequestGuestScreenDump(ctx context.Context, userCred mcclient.TokenCredential, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) (jsonutils.JSONObject, error) {
- url := fmt.Sprintf("%s/servers/%s/guest-screen-dump", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := mcclient.GetTokenHeaders(userCred)
- _, res, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, nil, false)
- if err != nil {
- return nil, errors.Wrap(err, "host request")
- }
- return res, nil
- }
- func (self *SKVMGuestDriver) FetchMonitorUrl(ctx context.Context, guest *models.SGuest) string {
- if options.Options.KvmMonitorAgentUseMetadataService && !guest.IsSriov() {
- var metadataIp string
- strictIpv6, err := guest.IsStrictIpv6()
- if err != nil {
- log.Errorf("IsStrictIpv6 for guest %s error: %v", guest.Id, err)
- }
- if strictIpv6 {
- metadataIp = "[" + options.Options.MetadataServerIp6s[0] + "]"
- } else {
- metadataIp = options.Options.MetadataServerIp4s[0]
- }
- return fmt.Sprintf(apis.MetaServiceMonitorAgentUrl, metadataIp)
- }
- return self.SVirtualizedGuestDriver.FetchMonitorUrl(ctx, guest)
- }
- func (self *SKVMGuestDriver) RequestResetNicTrafficLimit(ctx context.Context, task taskman.ITask, host *models.SHost, guest *models.SGuest, input []api.ServerNicTrafficLimit) error {
- url := fmt.Sprintf("%s/servers/%s/reset-nic-traffic-limit", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := task.GetTaskRequestHeader()
- body := jsonutils.Marshal(input)
- _, _, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, body, false)
- if err != nil {
- return errors.Wrap(err, "host request")
- }
- return nil
- }
- func (self *SKVMGuestDriver) RequestSetNicTrafficLimit(ctx context.Context, task taskman.ITask, host *models.SHost, guest *models.SGuest, input []api.ServerNicTrafficLimit) error {
- url := fmt.Sprintf("%s/servers/%s/set-nic-traffic-limit", host.ManagerUri, guest.Id)
- httpClient := httputils.GetDefaultClient()
- header := task.GetTaskRequestHeader()
- body := jsonutils.Marshal(input)
- _, _, err := httputils.JSONRequest(httpClient, ctx, "POST", url, header, body, false)
- if err != nil {
- return errors.Wrap(err, "host request")
- }
- return nil
- }
- func (self *SKVMGuestDriver) RequestStartRescue(ctx context.Context, task taskman.ITask, body jsonutils.JSONObject, host *models.SHost, guest *models.SGuest) error {
- header := self.getTaskRequestHeader(task)
- client := httputils.GetDefaultClient()
- url := fmt.Sprintf("%s/servers/%s/start-rescue", host.ManagerUri, guest.Id)
- _, _, err := httputils.JSONRequest(client, ctx, "POST", url, header, body, false)
- if err != nil {
- return err
- }
- return nil
- }
- func (self *SKVMGuestDriver) ValidateSyncOSInfo(ctx context.Context, userCred mcclient.TokenCredential, guest *models.SGuest) error {
- if !utils.IsInStringArray(guest.Status, []string{api.VM_RUNNING, api.VM_READY}) {
- return httperrors.NewBadRequestError("can't sync guest os info in status %s", guest.Status)
- }
- return nil
- }
- func (kvm *SKVMGuestDriver) ValidateGuestChangeConfigInput(ctx context.Context, guest *models.SGuest, input api.ServerChangeConfigInput) (*api.ServerChangeConfigSettings, error) {
- confs, err := kvm.SBaseGuestDriver.ValidateGuestChangeConfigInput(ctx, guest, input)
- if err != nil {
- return nil, errors.Wrap(err, "SBaseGuestDriver.ValidateGuestChangeConfigInput")
- }
- if confs.ExtraCpuChanged() && guest.Status != api.VM_READY {
- return nil, httperrors.NewInvalidStatusError("Can't change extra cpus on vm status %s", guest.Status)
- }
- var resetNics []api.ServerNicTrafficLimit
- var setNics []api.ServerNicTrafficLimit
- for i := range input.ResetTrafficLimits {
- input, needResetTraffic, err := guest.ValidateChangeNicBillingModeInput(ctx, input.ResetTrafficLimits[i], true)
- if err != nil {
- return nil, errors.Wrap(err, "ValidateChangeNicBillingModeInput")
- }
- if needResetTraffic {
- resetNics = append(resetNics, input)
- } else {
- setNics = append(setNics, input)
- }
- }
- for i := range input.SetTrafficLimits {
- input, needResetTraffic, err := guest.ValidateChangeNicBillingModeInput(ctx, input.ResetTrafficLimits[i], false)
- if err != nil {
- return nil, errors.Wrap(err, "ValidateChangeNicBillingModeInput")
- }
- if needResetTraffic {
- resetNics = append(resetNics, input)
- } else {
- setNics = append(setNics, input)
- }
- }
- if len(resetNics) > 0 {
- confs.ResetTrafficLimits = resetNics
- }
- if len(setNics) > 0 {
- confs.SetTrafficLimits = setNics
- }
- return confs, nil
- }
- func (kvm *SKVMGuestDriver) ValidateGuestHotChangeConfigInput(ctx context.Context, guest *models.SGuest, confs *api.ServerChangeConfigSettings) (*api.ServerChangeConfigSettings, error) {
- if guest.GetMetadata(ctx, api.VM_METADATA_HOTPLUG_CPU_MEM, nil) != "enable" {
- return confs, errors.Wrap(errors.ErrInvalidStatus, "host plug cpu memory is disabled")
- }
- if apis.IsARM(guest.OsArch) || apis.IsRISCV(guest.OsArch) {
- return confs, errors.Wrapf(errors.ErrInvalidStatus, "cpu architecture is %s", guest.OsArch)
- }
- return confs, nil
- }
- func (kvm *SKVMGuestDriver) GetRandomNetworkTypes() []api.TNetworkType {
- return []api.TNetworkType{api.NETWORK_TYPE_GUEST, api.NETWORK_TYPE_HOSTLOCAL}
- }
- func (kvm *SKVMGuestDriver) RequestUploadGuestStatus(ctx context.Context, guest *models.SGuest, task taskman.ITask) error {
- host, _ := guest.GetHost()
- url := fmt.Sprintf("%s/servers/%s/upload-status", host.ManagerUri, guest.Id)
- body := jsonutils.NewDict()
- header := kvm.getTaskRequestHeader(task)
- _, _, err := httputils.JSONRequest(httputils.GetDefaultClient(), ctx, "POST", url, header, body, false)
- return err
- }
|