suse.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package fsdriver
  15. import (
  16. "fmt"
  17. "net"
  18. "path"
  19. "strings"
  20. "yunion.io/x/jsonutils"
  21. "yunion.io/x/log"
  22. "yunion.io/x/pkg/errors"
  23. "yunion.io/x/pkg/utils"
  24. "yunion.io/x/onecloud/pkg/cloudcommon/types"
  25. deployapi "yunion.io/x/onecloud/pkg/hostman/hostdeployer/apis"
  26. "yunion.io/x/onecloud/pkg/util/netutils2"
  27. )
  28. type sSuseLikeRootFs struct {
  29. *sLinuxRootFs
  30. }
  31. func newSuseLikeRootFs(part IDiskPartition) *sSuseLikeRootFs {
  32. return &sSuseLikeRootFs{
  33. sLinuxRootFs: newLinuxRootFs(part),
  34. }
  35. }
  36. func (r *sSuseLikeRootFs) PrepareFsForTemplate(rootFs IDiskPartition) error {
  37. if err := r.sLinuxRootFs.PrepareFsForTemplate(rootFs); err != nil {
  38. return err
  39. }
  40. return r.CleanNetworkScripts(rootFs)
  41. }
  42. func (r *sSuseLikeRootFs) CleanNetworkScripts(rootFs IDiskPartition) error {
  43. networkPath := "/etc/sysconfig/network"
  44. files := rootFs.ListDir(networkPath, false)
  45. for i := 0; i < len(files); i++ {
  46. if strings.HasPrefix(files[i], "ifcfg-") && files[i] != "ifcfg-lo" {
  47. rootFs.Remove(path.Join(networkPath, files[i]), false)
  48. continue
  49. }
  50. if strings.HasPrefix(files[i], "ifroute-") {
  51. rootFs.Remove(path.Join(networkPath, files[i]), false)
  52. }
  53. }
  54. return nil
  55. }
  56. func (r *sSuseLikeRootFs) RootSignatures() []string {
  57. sig := r.sLinuxRootFs.RootSignatures()
  58. return append([]string{"etc/SUSE-brand", "/etc/os-release"}, sig...)
  59. }
  60. func (r *sSuseLikeRootFs) DeployHostname(rootFs IDiskPartition, hn, domain string) error {
  61. if rootFs.Exists("/etc/HOSTNAME", false) {
  62. return rootFs.FilePutContents("/etc/HOSTNAME", getHostname(hn, domain), false, false)
  63. }
  64. return nil
  65. }
  66. func (r *sSuseLikeRootFs) enableBondingModule(rootFs IDiskPartition, bondNics []*types.SServerNic) error {
  67. var content strings.Builder
  68. for i := range bondNics {
  69. content.WriteString("alias ")
  70. content.WriteString(bondNics[i].Name)
  71. content.WriteString(" bonding\n options ")
  72. content.WriteString(bondNics[i].Name)
  73. content.WriteString(" miimon=100 mode=4 lacp_rate=1 xmit_hash_policy=1\n")
  74. }
  75. return rootFs.FilePutContents("/etc/modprobe.d/bonding.conf", content.String(), false, false)
  76. }
  77. func (r *sSuseLikeRootFs) deployVlanNetworkingScripts(rootFs IDiskPartition, scriptPath, mainIp, mainIp6 string, nicCnt int, nicDesc *types.SServerNic) error {
  78. var cmds strings.Builder
  79. var ifname = fmt.Sprintf("%s.%d", nicDesc.Name, nicDesc.Vlan)
  80. cmds.WriteString("STARTMODE=auto\n")
  81. if nicDesc.Mtu > 0 {
  82. cmds.WriteString(fmt.Sprintf("MTU=%d\n", nicDesc.Mtu))
  83. }
  84. cmds.WriteString("BOOTPROTO=static\n")
  85. cmds.WriteString(fmt.Sprintf("IPADDR=%s/%d\n", nicDesc.Ip, nicDesc.Masklen))
  86. if len(nicDesc.Ip6) > 0 {
  87. cmds.WriteString("IPV6INIT=yes\n")
  88. cmds.WriteString("IPV6_AUTOCONF=no\n")
  89. cmds.WriteString(fmt.Sprintf("IPADDR_V6=%s/%d\n", nicDesc.Ip6, nicDesc.Masklen6))
  90. }
  91. cmds.WriteString(fmt.Sprintf("VLAN_ID=%d\n", nicDesc.Vlan))
  92. cmds.WriteString(fmt.Sprintf("ETHERDEVICE=%s\n", nicDesc.Name))
  93. var routes4 = make([]netutils2.SRouteInfo, 0)
  94. var routes6 = make([]netutils2.SRouteInfo, 0)
  95. var dnsSrv []string
  96. routes4, routes6 = netutils2.AddNicRoutes(routes4, routes6, nicDesc, mainIp, mainIp6, nicCnt)
  97. if len(nicDesc.Gateway) > 0 && nicDesc.Ip == mainIp {
  98. routes4 = append(routes4, netutils2.SRouteInfo{
  99. SPrefixInfo: netutils2.SPrefixInfo{
  100. Prefix: net.ParseIP("0.0.0.0"),
  101. PrefixLen: 0,
  102. },
  103. Gateway: net.ParseIP(nicDesc.Gateway),
  104. })
  105. }
  106. if len(nicDesc.Gateway6) > 0 && nicDesc.Ip6 == mainIp6 {
  107. routes6 = append(routes6, netutils2.SRouteInfo{
  108. SPrefixInfo: netutils2.SPrefixInfo{
  109. Prefix: net.ParseIP("::"),
  110. PrefixLen: 0,
  111. },
  112. Gateway: net.ParseIP(nicDesc.Gateway6),
  113. })
  114. }
  115. var rtbl strings.Builder
  116. for _, r := range routes4 {
  117. rtbl.WriteString(fmt.Sprintf("%s/%d", r.Prefix, r.PrefixLen))
  118. rtbl.WriteString(" ")
  119. rtbl.WriteString(r.Gateway.String())
  120. rtbl.WriteString(" - ")
  121. rtbl.WriteString(nicDesc.Name)
  122. rtbl.WriteString("\n")
  123. }
  124. for _, r := range routes6 {
  125. rtbl.WriteString(fmt.Sprintf("%s/%d", r.Prefix, r.PrefixLen))
  126. rtbl.WriteString(" ")
  127. rtbl.WriteString(r.Gateway.String())
  128. rtbl.WriteString(" - ")
  129. rtbl.WriteString(nicDesc.Name)
  130. rtbl.WriteString("\n")
  131. }
  132. rtblStr := rtbl.String()
  133. if len(rtblStr) > 0 {
  134. var fn = fmt.Sprintf("/etc/sysconfig/network/ifroute-%s", ifname)
  135. if err := rootFs.FilePutContents(fn, rtblStr, false, false); err != nil {
  136. return err
  137. }
  138. }
  139. dns4list, dns6list := netutils2.GetNicDns(nicDesc)
  140. for i := 0; i < len(dns4list); i++ {
  141. if !utils.IsInArray(dns4list[i], dnsSrv) {
  142. dnsSrv = append(dnsSrv, dns4list[i])
  143. }
  144. }
  145. for i := 0; i < len(dns6list); i++ {
  146. if !utils.IsInArray(dns6list[i], dnsSrv) {
  147. dnsSrv = append(dnsSrv, dns6list[i])
  148. }
  149. }
  150. var fn = fmt.Sprintf("/etc/sysconfig/network/ifcfg-%s", ifname)
  151. log.Debugf("%s: %s", fn, cmds.String())
  152. if err := rootFs.FilePutContents(fn, cmds.String(), false, false); err != nil {
  153. return err
  154. }
  155. if len(dnsSrv) > 0 {
  156. cont, err := rootFs.FileGetContents("/etc/sysconfig/network/config", false)
  157. if err != nil {
  158. return errors.Wrap(err, "FileGetContents config")
  159. }
  160. lines := strings.Split(string(cont), "\n")
  161. for i := range lines {
  162. line := strings.TrimSpace(lines[i])
  163. if strings.HasPrefix(line, "NETCONFIG_DNS_STATIC_SERVERS=") {
  164. lines[i] = fmt.Sprintf("NETCONFIG_DNS_STATIC_SERVERS=\"%s\"", strings.Join(dnsSrv, " "))
  165. }
  166. }
  167. err = rootFs.FilePutContents("/etc/sysconfig/network/config", strings.Join(lines, "\n"), false, false)
  168. if err != nil {
  169. return errors.Wrap(err, "FilePutContents config")
  170. }
  171. }
  172. return nil
  173. }
  174. func (r *sSuseLikeRootFs) deployNetworkingScripts(rootFs IDiskPartition, nics []*types.SServerNic) error {
  175. if err := r.sLinuxRootFs.DeployNetworkingScripts(rootFs, nics); err != nil {
  176. return err
  177. }
  178. // ToServerNics(nics)
  179. allNics, bondNics := convertNicConfigs(nics)
  180. if len(bondNics) > 0 {
  181. err := r.enableBondingModule(rootFs, bondNics)
  182. if err != nil {
  183. return err
  184. }
  185. }
  186. nicCnt := len(allNics) - len(bondNics)
  187. var dnsSrv []string
  188. mainNic := getMainNic(allNics)
  189. var mainIp string
  190. if mainNic != nil {
  191. mainIp = mainNic.Ip
  192. }
  193. mainNic6 := getMainNic6(allNics)
  194. var mainIp6 string
  195. if mainNic6 != nil {
  196. mainIp6 = mainNic6.Ip6
  197. }
  198. for i := range allNics {
  199. nicDesc := allNics[i]
  200. var cmds strings.Builder
  201. cmds.WriteString("STARTMODE=auto\n")
  202. if nicDesc.Mtu > 0 {
  203. cmds.WriteString(fmt.Sprintf("MTU=%d\n", nicDesc.Mtu))
  204. }
  205. if len(nicDesc.Mac) > 0 {
  206. cmds.WriteString("LLADDR=")
  207. cmds.WriteString(nicDesc.Mac)
  208. cmds.WriteString("\n")
  209. }
  210. if len(nicDesc.TeamingSlaves) != 0 {
  211. cmds.WriteString(`BONDING_OPTS="mode=4 miimon=100"\n`)
  212. }
  213. if nicDesc.TeamingMaster != nil {
  214. cmds.WriteString("BOOTPROTO=none\n")
  215. cmds.WriteString("MASTER=")
  216. cmds.WriteString(nicDesc.TeamingMaster.Name)
  217. cmds.WriteString("\n")
  218. cmds.WriteString("SLAVE=yes\n")
  219. } else if nicDesc.Virtual {
  220. cmds.WriteString("BOOTPROTO=none\n")
  221. cmds.WriteString("NETMASK=255.255.255.255\n")
  222. cmds.WriteString("IPADDR=")
  223. cmds.WriteString(netutils2.PSEUDO_VIP)
  224. cmds.WriteString("\n")
  225. } else if nicDesc.Manual {
  226. if nicDesc.VlanInterface {
  227. if err := r.deployVlanNetworkingScripts(rootFs, "", mainIp, mainIp6, nicCnt, nicDesc); err != nil {
  228. return err
  229. }
  230. } else {
  231. cmds.WriteString("STARTMODE=auto\n")
  232. cmds.WriteString("BOOTPROTO=static\n")
  233. if len(nicDesc.Ip) > 0 {
  234. cmds.WriteString(fmt.Sprintf("IPADDR=%s/%d\n", nicDesc.Ip, nicDesc.Masklen))
  235. }
  236. if len(nicDesc.Ip6) > 0 {
  237. cmds.WriteString("IPV6INIT=yes\n")
  238. cmds.WriteString("IPV6_AUTOCONF=no\n")
  239. cmds.WriteString(fmt.Sprintf("IPADDR_V6=%s/%d\n", nicDesc.Ip6, nicDesc.Masklen6))
  240. }
  241. }
  242. var routes4 = make([]netutils2.SRouteInfo, 0)
  243. var routes6 = make([]netutils2.SRouteInfo, 0)
  244. routes4, routes6 = netutils2.AddNicRoutes(routes4, routes6, nicDesc, mainIp, mainIp6, nicCnt)
  245. if len(nicDesc.Gateway) > 0 && nicDesc.Ip == mainIp {
  246. routes4 = append(routes4, netutils2.SRouteInfo{
  247. SPrefixInfo: netutils2.SPrefixInfo{
  248. Prefix: net.ParseIP("0.0.0.0"),
  249. PrefixLen: 0,
  250. },
  251. Gateway: net.ParseIP(nicDesc.Gateway),
  252. })
  253. }
  254. if len(nicDesc.Gateway6) > 0 && nicDesc.Ip6 == mainIp6 {
  255. routes6 = append(routes6, netutils2.SRouteInfo{
  256. SPrefixInfo: netutils2.SPrefixInfo{
  257. Prefix: net.ParseIP("::"),
  258. PrefixLen: 0,
  259. },
  260. Gateway: net.ParseIP(nicDesc.Gateway6),
  261. })
  262. }
  263. var rtbl strings.Builder
  264. for _, r := range routes4 {
  265. rtbl.WriteString(fmt.Sprintf("%s/%d", r.Prefix, r.PrefixLen))
  266. rtbl.WriteString(" ")
  267. rtbl.WriteString(r.Gateway.String())
  268. rtbl.WriteString(" - ")
  269. rtbl.WriteString(nicDesc.Name)
  270. rtbl.WriteString("\n")
  271. }
  272. for _, r := range routes6 {
  273. rtbl.WriteString(fmt.Sprintf("%s/%d", r.Prefix, r.PrefixLen))
  274. rtbl.WriteString(" ")
  275. rtbl.WriteString(r.Gateway.String())
  276. rtbl.WriteString(" - ")
  277. rtbl.WriteString(nicDesc.Name)
  278. rtbl.WriteString("\n")
  279. }
  280. rtblStr := rtbl.String()
  281. if len(rtblStr) > 0 {
  282. var fn = fmt.Sprintf("/etc/sysconfig/network/ifroute-%s", nicDesc.Name)
  283. if err := rootFs.FilePutContents(fn, rtblStr, false, false); err != nil {
  284. return err
  285. }
  286. }
  287. dns4list, dns6list := netutils2.GetNicDns(nicDesc)
  288. for i := 0; i < len(dns4list); i++ {
  289. if !utils.IsInArray(dns4list[i], dnsSrv) {
  290. dnsSrv = append(dnsSrv, dns4list[i])
  291. }
  292. }
  293. for i := 0; i < len(dns6list); i++ {
  294. if !utils.IsInArray(dns6list[i], dnsSrv) {
  295. dnsSrv = append(dnsSrv, dns6list[i])
  296. }
  297. }
  298. } else {
  299. cmds.WriteString("STARTMODE=auto\n")
  300. if len(nicDesc.Ip) > 0 && len(nicDesc.Ip6) == 0 {
  301. cmds.WriteString("BOOTPROTO=dhcp4\n")
  302. } else if len(nicDesc.Ip) == 0 && len(nicDesc.Ip6) > 0 {
  303. cmds.WriteString("BOOTPROTO=dhcp6\n")
  304. } else if len(nicDesc.Ip) > 0 && len(nicDesc.Ip6) > 0 {
  305. cmds.WriteString("BOOTPROTO=dhcp\n")
  306. } else {
  307. cmds.WriteString("BOOTPROTO=none\n")
  308. }
  309. }
  310. var fn = fmt.Sprintf("/etc/sysconfig/network/ifcfg-%s", nicDesc.Name)
  311. log.Debugf("%s: %s", fn, cmds.String())
  312. if err := rootFs.FilePutContents(fn, cmds.String(), false, false); err != nil {
  313. return err
  314. }
  315. }
  316. if len(dnsSrv) > 0 {
  317. cont, err := rootFs.FileGetContents("/etc/sysconfig/network/config", false)
  318. if err != nil {
  319. return errors.Wrap(err, "FileGetContents config")
  320. }
  321. lines := strings.Split(string(cont), "\n")
  322. for i := range lines {
  323. line := strings.TrimSpace(lines[i])
  324. if strings.HasPrefix(line, "NETCONFIG_DNS_STATIC_SERVERS=") {
  325. lines[i] = fmt.Sprintf("NETCONFIG_DNS_STATIC_SERVERS=\"%s\"", strings.Join(dnsSrv, " "))
  326. }
  327. }
  328. err = rootFs.FilePutContents("/etc/sysconfig/network/config", strings.Join(lines, "\n"), false, false)
  329. if err != nil {
  330. return errors.Wrap(err, "FilePutContents config")
  331. }
  332. }
  333. return nil
  334. }
  335. func (r *sSuseLikeRootFs) DeployStandbyNetworkingScripts(rootFs IDiskPartition, nics, nicsStandby []*types.SServerNic) error {
  336. if err := r.sLinuxRootFs.DeployStandbyNetworkingScripts(rootFs, nics, nicsStandby); err != nil {
  337. return err
  338. }
  339. for _, nic := range nicsStandby {
  340. var cmds string
  341. if len(nic.NicType) == 0 || nic.NicType != "ipmi" {
  342. cmds += fmt.Sprintf("LLADDR=%s\n", nic.Mac)
  343. cmds += "STARTMODE=off\n"
  344. var fn = fmt.Sprintf("/etc/sysconfig/network/ifcfg-%s%d", NetDevPrefix, nic.Index)
  345. if err := rootFs.FilePutContents(fn, cmds, false, false); err != nil {
  346. return err
  347. }
  348. }
  349. }
  350. return nil
  351. }
  352. func (r *sSuseLikeRootFs) enableSerialConsole(drv IRootFsDriver, rootFs IDiskPartition, sysInfo *jsonutils.JSONDict) error {
  353. return r.enableSerialConsoleSystemd(rootFs)
  354. }
  355. func (r *sSuseLikeRootFs) disableSerialConcole(drv IRootFsDriver, rootFs IDiskPartition) error {
  356. r.disableSerialConsoleSystemd(rootFs)
  357. return nil
  358. }
  359. type SOpenSuseRootFs struct {
  360. *sSuseLikeRootFs
  361. }
  362. func NewOpenSuseRootFs(part IDiskPartition) IRootFsDriver {
  363. return &SOpenSuseRootFs{sSuseLikeRootFs: newSuseLikeRootFs(part)}
  364. }
  365. func (c *SOpenSuseRootFs) String() string {
  366. return "OpenSuseRootFs"
  367. }
  368. func (c *SOpenSuseRootFs) GetName() string {
  369. return "OpenSUSE"
  370. }
  371. func (c *SOpenSuseRootFs) GetReleaseInfo(rootFs IDiskPartition) *deployapi.ReleaseInfo {
  372. rel, _ := rootFs.FileGetContents("/etc/os-release", false)
  373. var version string
  374. if len(rel) > 0 {
  375. lines := strings.Split(string(rel), "\n")
  376. for _, line := range lines {
  377. if strings.HasPrefix(line, "VERSION=") {
  378. version = strings.Trim(line[len("VERSION="):], " \"'")
  379. break
  380. }
  381. }
  382. }
  383. return deployapi.NewReleaseInfo(c.GetName(), version, c.GetArch(rootFs))
  384. }
  385. func (c *SOpenSuseRootFs) DeployNetworkingScripts(rootFs IDiskPartition, nics []*types.SServerNic) error {
  386. if err := c.sSuseLikeRootFs.deployNetworkingScripts(rootFs, nics); err != nil {
  387. return err
  388. }
  389. return nil
  390. }