deployserver.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package deployserver
  15. import (
  16. "context"
  17. "encoding/json"
  18. "fmt"
  19. "io/ioutil"
  20. "net"
  21. "os"
  22. "runtime/debug"
  23. "sort"
  24. "strings"
  25. "time"
  26. "google.golang.org/grpc"
  27. execlient "yunion.io/x/executor/client"
  28. "yunion.io/x/jsonutils"
  29. "yunion.io/x/log"
  30. "yunion.io/x/pkg/errors"
  31. "yunion.io/x/pkg/util/netutils"
  32. "yunion.io/x/pkg/utils"
  33. app_common "yunion.io/x/onecloud/pkg/cloudcommon/app"
  34. commonconsts "yunion.io/x/onecloud/pkg/cloudcommon/consts"
  35. common_options "yunion.io/x/onecloud/pkg/cloudcommon/options"
  36. "yunion.io/x/onecloud/pkg/cloudcommon/service"
  37. "yunion.io/x/onecloud/pkg/hostman/diskutils"
  38. "yunion.io/x/onecloud/pkg/hostman/diskutils/fsutils"
  39. "yunion.io/x/onecloud/pkg/hostman/diskutils/libguestfs"
  40. "yunion.io/x/onecloud/pkg/hostman/diskutils/nbd"
  41. "yunion.io/x/onecloud/pkg/hostman/diskutils/qemu_kvm"
  42. "yunion.io/x/onecloud/pkg/hostman/guestfs/fsdriver"
  43. "yunion.io/x/onecloud/pkg/hostman/guestman/arch"
  44. deployapi "yunion.io/x/onecloud/pkg/hostman/hostdeployer/apis"
  45. "yunion.io/x/onecloud/pkg/hostman/hostdeployer/consts"
  46. "yunion.io/x/onecloud/pkg/hostman/hostdeployer/uefi"
  47. "yunion.io/x/onecloud/pkg/util/fileutils2"
  48. "yunion.io/x/onecloud/pkg/util/procutils"
  49. "yunion.io/x/onecloud/pkg/util/qemuimg"
  50. "yunion.io/x/onecloud/pkg/util/seclib2"
  51. "yunion.io/x/onecloud/pkg/util/winutils"
  52. )
  53. type DeployerServer struct {
  54. deployapi.UnimplementedDeployAgentServer
  55. }
  56. var _ deployapi.DeployAgentServer = &DeployerServer{}
  57. func apiDiskInfo(req *deployapi.DiskInfo) qemuimg.SImageInfo {
  58. if req == nil {
  59. return qemuimg.SImageInfo{}
  60. }
  61. info := qemuimg.SImageInfo{
  62. Path: req.GetPath(),
  63. }
  64. passwd := req.GetEncryptPassword()
  65. if len(passwd) > 0 {
  66. info.Password = passwd
  67. info.EncryptFormat = qemuimg.TEncryptFormat(req.GetEncryptFormat())
  68. info.EncryptAlg = seclib2.TSymEncAlg(req.GetEncryptAlg())
  69. }
  70. return info
  71. }
  72. func (*DeployerServer) DeployGuestFs(ctx context.Context, req *deployapi.DeployParams,
  73. ) (res *deployapi.DeployGuestFsResponse, err error) {
  74. // There will be some occasional unknown panic, so temporarily capture panic here.
  75. defer func() {
  76. if r := recover(); r != nil {
  77. log.Errorf("DeployGuestFs: %s", r)
  78. debug.PrintStack()
  79. msg := "panic: "
  80. if str, ok := r.(fmt.Stringer); ok {
  81. msg += str.String()
  82. }
  83. res, err = nil, errors.Error(msg)
  84. }
  85. }()
  86. log.Infof("********* Deploy guest fs on %#v", apiDiskInfo(req.DiskInfo))
  87. disk, err := diskutils.GetIDisk(diskutils.DiskParams{
  88. Hypervisor: req.GuestDesc.Hypervisor,
  89. DiskInfo: apiDiskInfo(req.GetDiskInfo()),
  90. VddkInfo: req.VddkInfo,
  91. }, DeployOption.ImageDeployDriver, false)
  92. if err != nil {
  93. log.Errorf("diskutils.GetIDisk fail %s", err)
  94. return new(deployapi.DeployGuestFsResponse), errors.Wrap(err, "GetIDisk")
  95. }
  96. defer disk.Cleanup()
  97. if err := disk.Connect(req.GuestDesc); err != nil {
  98. log.Errorf("Failed to connect %s disk: %s", req.GuestDesc.Hypervisor, err)
  99. return new(deployapi.DeployGuestFsResponse), errors.Wrap(err, "Connect")
  100. }
  101. defer disk.Disconnect()
  102. ret, err := disk.DeployGuestfs(req)
  103. if ret == nil {
  104. ret = new(deployapi.DeployGuestFsResponse)
  105. }
  106. if err != nil {
  107. log.Errorf("failed deploy guest fs: %s", err)
  108. }
  109. return ret, err
  110. }
  111. func (*DeployerServer) ResizeFs(ctx context.Context, req *deployapi.ResizeFsParams) (res *deployapi.Empty, err error) {
  112. // There will be some occasional unknown panic, so temporarily capture panic here.
  113. defer func() {
  114. if r := recover(); r != nil {
  115. log.Errorf("DeployGuestFs: %s, stack:\n %s", req.String(), debug.Stack())
  116. msg := "panic: "
  117. if str, ok := r.(fmt.Stringer); ok {
  118. msg += str.String()
  119. }
  120. res, err = nil, errors.Error(msg)
  121. }
  122. }()
  123. log.Infof("********* Resize fs on %#v", req.DiskInfo)
  124. if strings.HasPrefix(req.DiskInfo.Path, "/dev/loop") {
  125. // HACK: container loop device, do resize locally
  126. if err := fsutils.ResizeDiskFs(req.DiskInfo.Path, 0, true); err != nil {
  127. return new(deployapi.Empty), errors.Wrap(err, "fsutils.ResizeDiskFs")
  128. }
  129. return new(deployapi.Empty), nil
  130. }
  131. disk, err := diskutils.GetIDisk(diskutils.DiskParams{
  132. Hypervisor: req.Hypervisor,
  133. DiskInfo: apiDiskInfo(req.GetDiskInfo()),
  134. VddkInfo: req.VddkInfo,
  135. }, DeployOption.ImageDeployDriver, false)
  136. if err != nil {
  137. return new(deployapi.Empty), errors.Wrap(err, "GetIDisk fail")
  138. }
  139. defer disk.Cleanup()
  140. var diskId string
  141. if req.DiskInfo != nil {
  142. diskId = req.DiskInfo.DiskId
  143. }
  144. if err := disk.ConnectWithDiskId(req.GuestDesc, diskId); err != nil {
  145. return new(deployapi.Empty), errors.Wrap(err, "disk connect failed")
  146. }
  147. defer disk.Disconnect()
  148. return disk.ResizeFs(req)
  149. }
  150. func (*DeployerServer) FormatFs(ctx context.Context, req *deployapi.FormatFsParams) (*deployapi.Empty, error) {
  151. log.Infof("********* Format fs on %#v", apiDiskInfo(req.DiskInfo))
  152. gd, err := diskutils.NewKVMGuestDisk(apiDiskInfo(req.GetDiskInfo()), DeployOption.ImageDeployDriver, false)
  153. if err != nil {
  154. return new(deployapi.Empty), errors.Wrap(err, "NewKVMGuestDisk")
  155. }
  156. defer gd.Cleanup()
  157. if err := gd.Connect(nil); err == nil {
  158. defer gd.Disconnect()
  159. return gd.FormatFs(req)
  160. } else {
  161. log.Errorf("failed connect kvm disk %#v: %s", apiDiskInfo(req.DiskInfo), err)
  162. }
  163. return new(deployapi.Empty), nil
  164. }
  165. func (*DeployerServer) SaveToGlance(ctx context.Context, req *deployapi.SaveToGlanceParams) (*deployapi.SaveToGlanceResponse, error) {
  166. log.Infof("********* %#v save to glance", apiDiskInfo(req.DiskInfo))
  167. kvmDisk, err := diskutils.NewKVMGuestDisk(apiDiskInfo(req.GetDiskInfo()), DeployOption.ImageDeployDriver, false)
  168. if err != nil {
  169. return new(deployapi.SaveToGlanceResponse), errors.Wrap(err, "NewKVMGuestDisk")
  170. }
  171. defer kvmDisk.Cleanup()
  172. err = kvmDisk.Connect(nil)
  173. if err != nil {
  174. return new(deployapi.SaveToGlanceResponse), errors.Wrapf(err, "kvmDisk.Connect %#v", apiDiskInfo(req.DiskInfo))
  175. }
  176. defer kvmDisk.Disconnect()
  177. return kvmDisk.SaveToGlance(req)
  178. }
  179. func (s *DeployerServer) ProbeImageInfo(ctx context.Context, req *deployapi.ProbeImageInfoPramas) (*deployapi.ImageInfo, error) {
  180. log.Infof("********* %#v probe image info", apiDiskInfo(req.DiskInfo))
  181. kvmDisk, err := diskutils.NewKVMGuestDisk(apiDiskInfo(req.GetDiskInfo()), DeployOption.ImageDeployDriver, true)
  182. if err != nil {
  183. return new(deployapi.ImageInfo), errors.Wrap(err, "NewKVMGuestDisk")
  184. }
  185. defer kvmDisk.Cleanup()
  186. if err := kvmDisk.Connect(nil); err != nil {
  187. log.Errorf("Failed to connect kvm disk %#v: %s", apiDiskInfo(req.DiskInfo), err)
  188. return new(deployapi.ImageInfo), errors.Wrap(err, "Disk connector failed to connect image")
  189. }
  190. defer kvmDisk.Disconnect()
  191. return kvmDisk.ProbeImageInfo(req)
  192. }
  193. var connectedEsxiDisks = map[string]*diskutils.VDDKDisk{}
  194. func (*DeployerServer) ConnectEsxiDisks(
  195. ctx context.Context, req *deployapi.ConnectEsxiDisksParams,
  196. ) (*deployapi.EsxiDisksConnectionInfo, error) {
  197. log.Infof("********* Connect esxi disks ...")
  198. var (
  199. err error
  200. flatFilePath string
  201. ret = new(deployapi.EsxiDisksConnectionInfo)
  202. )
  203. ret.Disks = make([]*deployapi.EsxiDiskInfo, len(req.AccessInfo))
  204. for i := 0; i < len(req.AccessInfo); i++ {
  205. disk, _ := diskutils.NewVDDKDisk(req.VddkInfo, req.AccessInfo[i].DiskPath, DeployOption.ImageDeployDriver, false)
  206. flatFilePath, err = disk.ConnectBlockDevice()
  207. if err != nil {
  208. err = errors.Wrapf(err, "disk %s connect block device", req.AccessInfo[i].DiskPath)
  209. break
  210. }
  211. connectedEsxiDisks[flatFilePath] = disk
  212. ret.Disks[i] = &deployapi.EsxiDiskInfo{DiskPath: flatFilePath}
  213. }
  214. if err != nil {
  215. for i := 0; i < len(req.AccessInfo); i++ {
  216. if disk, ok := connectedEsxiDisks[req.AccessInfo[i].DiskPath]; ok {
  217. if e := disk.DisconnectBlockDevice(); e != nil {
  218. log.Errorf("disconnect disk %s: %s", req.AccessInfo[i].DiskPath, e)
  219. } else {
  220. delete(connectedEsxiDisks, req.AccessInfo[i].DiskPath)
  221. }
  222. }
  223. }
  224. return ret, err
  225. }
  226. return ret, nil
  227. }
  228. func (*DeployerServer) DisconnectEsxiDisks(
  229. ctx context.Context, req *deployapi.EsxiDisksConnectionInfo,
  230. ) (*deployapi.Empty, error) {
  231. log.Infof("********* Disconnect esxi disks ...")
  232. for i := 0; i < len(req.Disks); i++ {
  233. if disk, ok := connectedEsxiDisks[req.Disks[i].DiskPath]; ok {
  234. if e := disk.DisconnectBlockDevice(); e != nil {
  235. return new(deployapi.Empty), errors.Wrapf(e, "disconnect disk %s", req.Disks[i].DiskPath)
  236. } else {
  237. delete(connectedEsxiDisks, req.Disks[i].DiskPath)
  238. }
  239. } else {
  240. log.Warningf("esxi disk %s not connected", req.Disks[i].DiskPath)
  241. continue
  242. }
  243. }
  244. return new(deployapi.Empty), nil
  245. }
  246. func (*DeployerServer) SetOvmfBootOrder(ctx context.Context, req *deployapi.OvmfBootOrderParams) (*deployapi.Empty, error) {
  247. log.Infof("Request SetOvmfBootOrder of %s", req.OvmfVarsPath)
  248. if !fileutils2.Exists(req.OvmfVarsPath) {
  249. return new(deployapi.Empty), errors.Errorf("ovmf %s not found", req.OvmfVarsPath)
  250. }
  251. // parse boot entry from ovmf vars
  252. bootEntries, bootOrder, ovmfJsonTmpPath, err := uefi.ParseUefiVars(req.OvmfVarsPath)
  253. if err != nil {
  254. return new(deployapi.Empty), errors.Wrapf(err, "failed parse uefi vars %s", req.OvmfVarsPath)
  255. }
  256. sort.Slice(req.Devs, func(i, j int) bool {
  257. return req.Devs[i].AttachOrder < req.Devs[j].AttachOrder
  258. })
  259. bootEntryIdx := map[string]*deployapi.BootDevices{}
  260. bootentryOrder := map[int32]string{}
  261. findBootentry := func(dev *deployapi.BootDevices) {
  262. for x, bootEntry := range bootEntries {
  263. if _, ok := bootEntryIdx[bootEntry.ID]; ok {
  264. continue
  265. }
  266. log.Errorf("bootentry %v type %v", x, bootEntry.GetType())
  267. if bootEntry.GetType() == uefi.OvmfDevicePathType(dev.DevType) {
  268. bootEntryIdx[bootEntry.ID] = dev
  269. bootentryOrder[dev.BootOrder] = bootEntry.ID
  270. break
  271. }
  272. }
  273. }
  274. for i := range req.Devs {
  275. findBootentry(req.Devs[i])
  276. }
  277. sort.Slice(req.Devs, func(i, j int) bool {
  278. return req.Devs[i].BootOrder < req.Devs[j].BootOrder
  279. })
  280. newBootOrder := []uint16{}
  281. for i := range req.Devs {
  282. bentry, ok := bootentryOrder[req.Devs[i].BootOrder]
  283. if !ok {
  284. continue
  285. }
  286. order, err := uefi.ParseBootentryToBootorder(bentry)
  287. if err != nil {
  288. log.Errorf("failed ParseBootentryToBootorder %s %s", bentry, err)
  289. continue
  290. }
  291. newBootOrder = append(newBootOrder, order)
  292. }
  293. for i := range bootOrder {
  294. if utils.IsInArray(bootOrder[i], newBootOrder) {
  295. continue
  296. }
  297. newBootOrder = append(newBootOrder, bootOrder[i])
  298. }
  299. if err := uefi.UpdateBootOrderInJson(ovmfJsonTmpPath, newBootOrder); err != nil {
  300. log.Errorf("failed UpdateBootOrderInJson %s", err)
  301. return new(deployapi.Empty), errors.Wrapf(err, "failed UpdateBootOrderInJson %v", newBootOrder)
  302. }
  303. out, err := uefi.ApplyJsonToVars(ovmfJsonTmpPath, req.OvmfVarsPath, req.OvmfVarsPath)
  304. if err != nil {
  305. log.Errorf("failed ApplyJsonToVars %s %s", out, err)
  306. return new(deployapi.Empty), errors.Wrapf(err, "failed ApplyJsonToVars %v", out)
  307. }
  308. return new(deployapi.Empty), nil
  309. }
  310. type SDeployService struct {
  311. *service.SServiceBase
  312. grpcServer *grpc.Server
  313. }
  314. func NewDeployService() *SDeployService {
  315. deployer := &SDeployService{}
  316. deployer.SServiceBase = service.NewBaseService(deployer)
  317. return deployer
  318. }
  319. func (s *SDeployService) RunService() {
  320. if DeployOption.DeployAction != "" {
  321. res, err := StartLocalDeploy(DeployOption.DeployAction)
  322. if err != nil {
  323. if e := fileutils2.FilePutContents("/error", err.Error(), false); e != nil {
  324. log.Errorf("failed put errors to file: %s", e)
  325. }
  326. }
  327. if res != nil {
  328. resStr, _ := json.Marshal(res)
  329. if e := fileutils2.FilePutContents("/response", string(resStr), false); e != nil {
  330. log.Errorf("failed put response to file: %s", e)
  331. }
  332. }
  333. return
  334. }
  335. s.grpcServer = grpc.NewServer()
  336. deployapi.RegisterDeployAgentServer(s.grpcServer, &DeployerServer{})
  337. if fileutils2.Exists(DeployOption.DeployServerSocketPath) {
  338. if conn, err := net.Dial("unix", DeployOption.DeployServerSocketPath); err == nil {
  339. conn.Close()
  340. log.Fatalf("socket %s already listening", DeployOption.DeployServerSocketPath)
  341. }
  342. if err := os.Remove(DeployOption.DeployServerSocketPath); err != nil {
  343. log.Fatalln(err)
  344. }
  345. }
  346. listener, err := net.Listen("unix", DeployOption.DeployServerSocketPath)
  347. if err != nil {
  348. log.Fatalln(err)
  349. }
  350. defer listener.Close()
  351. log.Infof("Init net listener on %s succ", DeployOption.DeployServerSocketPath)
  352. s.grpcServer.Serve(listener)
  353. }
  354. func (s *SDeployService) FixPathEnv() error {
  355. var paths = []string{
  356. "/usr/bin",
  357. "/usr/local/sbin",
  358. "/usr/local/bin",
  359. "/sbin",
  360. "/bin",
  361. "/usr/sbin",
  362. }
  363. return os.Setenv("PATH", strings.Join(paths, ":"))
  364. }
  365. func InitEnvCommon() error {
  366. commonconsts.SetAllowVmSELinux(DeployOption.AllowVmSELinux)
  367. fsutils.SetExt4UsageTypeThresholds(
  368. int64(DeployOption.Ext4LargefileSizeGb)*1024*1024*1024,
  369. int64(DeployOption.Ext4HugefileSizeGb)*1024*1024*1024,
  370. )
  371. if err := fsdriver.Init(DeployOption.CloudrootDir); err != nil {
  372. return errors.Wrap(err, "init fsdriver")
  373. }
  374. netutils.SetPrivatePrefixes(DeployOption.CustomizedPrivatePrefixes)
  375. return nil
  376. }
  377. func (s *SDeployService) PrepareEnv() error {
  378. if !fileutils2.Exists(DeployOption.DeployTempDir) {
  379. err := os.MkdirAll(DeployOption.DeployTempDir, 0755)
  380. if err != nil {
  381. return errors.Errorf("fail to create %s: %s", DeployOption.DeployTempDir, err)
  382. }
  383. }
  384. commonconsts.SetDeployTempDir(DeployOption.DeployTempDir)
  385. if err := InitEnvCommon(); err != nil {
  386. return err
  387. }
  388. if err := s.FixPathEnv(); err != nil {
  389. return err
  390. }
  391. if DeployOption.ImageDeployDriver == consts.DEPLOY_DRIVER_LIBGUESTFS {
  392. if err := libguestfs.Init(3); err != nil {
  393. log.Fatalln(err)
  394. }
  395. }
  396. if DeployOption.ImageDeployDriver != consts.DEPLOY_DRIVER_QEMU_KVM {
  397. if err := nbd.Init(); err != nil {
  398. return errors.Wrap(err, "nbd.Init")
  399. }
  400. } else {
  401. cpuArch, err := procutils.NewCommand("uname", "-m").Output()
  402. if err != nil {
  403. return errors.Wrap(err, "get cpu architecture")
  404. }
  405. cpuArchStr := strings.TrimSpace(string(cpuArch))
  406. // prepare for yunionos don't have but necessary files
  407. out, err := procutils.NewCommand("mkdir", "-p", "/opt/yunion/bin/bundles").Output()
  408. if err != nil {
  409. return errors.Wrapf(err, "cp files failed %s", out)
  410. }
  411. copyFiles := map[string]string{
  412. "/usr/bin/chntpw.static": "/opt/yunion/bin/chntpw.static",
  413. "/usr/bin/.chntpw.static.bin": "/opt/yunion/bin/.chntpw.static.bin",
  414. "/usr/bin/bundles/chntpw.static": "/opt/yunion/bin/bundles/chntpw.static",
  415. "/usr/bin/growpart": "/opt/yunion/bin/growpart",
  416. "/usr/bin/zerofree": "/opt/yunion/bin/zerofree",
  417. }
  418. // x86_64 or aarch64
  419. switch cpuArchStr {
  420. case qemu_kvm.OS_ARCH_AARCH64:
  421. copyFiles["/yunionos/aarch64/qemu-ga"] = fsdriver.QGA_BINARY_PATH
  422. case arch.Arch_x86_64:
  423. copyFiles["/yunionos/x86_64/qemu-ga"] = fsdriver.QGA_BINARY_PATH
  424. copyFiles["/yunionos/x86_64/qemu-ga-x86_64.msi"] = fsdriver.QGA_WIN_MSI_INSTALLER_PATH
  425. case "riscv64":
  426. copyFiles["/yunionos/riscv64/qemu-ga"] = fsdriver.QGA_BINARY_PATH
  427. }
  428. for k, v := range copyFiles {
  429. out, err = procutils.NewCommand("cp", "-rf", k, v).Output()
  430. if err != nil {
  431. return errors.Wrapf(err, "cp files failed %s", out)
  432. }
  433. }
  434. {
  435. newOptions := DeployOption
  436. newOptions.CommonConfigFile = ""
  437. // save runtime options to /opt/yunion/host.conf
  438. conf := jsonutils.Marshal(newOptions).YAMLString()
  439. log.Debugf("deploy options: %s", conf)
  440. err := ioutil.WriteFile("/opt/yunion/host.conf", []byte(conf), 0600)
  441. if err != nil {
  442. return errors.Wrapf(err, "save host.conf failed %s", out)
  443. }
  444. }
  445. err = procutils.NewCommand("mkdir", "-p", qemu_kvm.RUN_ON_HOST_ROOT_PATH).Run()
  446. if err != nil {
  447. return errors.Wrap(err, "Failed to mkdir RUN_ON_HOST_ROOT_PATH: %s")
  448. }
  449. mkisofsArgs := []string{"-l", "-J", "-L", "-R", "-r", "-v", "-hide-rr-moved", "-o", qemu_kvm.DEPLOY_ISO, "-graft-points", "vmware-vddk=/opt/vmware-vddk", "yunion=/opt/yunion"}
  450. out, err = procutils.NewCommand("mkisofs", mkisofsArgs...).Output()
  451. if err != nil {
  452. return errors.Wrapf(err, "mkisofs failed %s", out)
  453. }
  454. err = qemu_kvm.InitQemuDeployManager(
  455. cpuArchStr,
  456. DeployOption.DefaultQemuVersion,
  457. DeployOption.EnableRemoteExecutor,
  458. DeployOption.HugepagesOption == "native",
  459. DeployOption.HugepageSizeMb*1024,
  460. DeployOption.DeployGuestMemSizeMb,
  461. DeployOption.DeployConcurrent,
  462. )
  463. if err != nil {
  464. return err
  465. }
  466. }
  467. // create /dev/lvm_remote
  468. if err := s.checkLvmRemote(); err != nil {
  469. return errors.Wrap(err, "unable to checkLvmRemote")
  470. }
  471. if !winutils.CheckTool(DeployOption.ChntpwPath) {
  472. if winutils.CheckTool("/usr/bin/chntpw.static") {
  473. winutils.SetChntpwPath("/usr/bin/chntpw.static")
  474. } else {
  475. log.Errorf("Failed to find chntpw tool")
  476. }
  477. } else {
  478. winutils.SetChntpwPath(DeployOption.ChntpwPath)
  479. }
  480. return nil
  481. }
  482. func (s *SDeployService) checkLvmRemote() error {
  483. _, err := os.Stat("/dev/lvm_remote")
  484. if err == nil {
  485. return nil
  486. }
  487. if os.IsNotExist(err) {
  488. err := os.Mkdir("/dev/lvm_remote", os.ModePerm)
  489. if err != nil {
  490. return err
  491. }
  492. return nil
  493. }
  494. return err
  495. }
  496. func (s *SDeployService) InitService() {
  497. s.SignalTrap(func() {
  498. for {
  499. if len(connectedEsxiDisks) > 0 {
  500. log.Warningf("Waiting for esxi disks %d disconnect !!!", len(connectedEsxiDisks))
  501. time.Sleep(time.Second * 1)
  502. } else {
  503. if s.grpcServer != nil {
  504. s.grpcServer.Stop()
  505. } else {
  506. os.Exit(0)
  507. }
  508. }
  509. }
  510. })
  511. optionsInit()
  512. if len(DeployOption.DeployAction) > 0 {
  513. if err := LocalInitEnv(); err != nil {
  514. log.Fatalf("local init env %s", err)
  515. }
  516. return
  517. }
  518. if DeployOption.EnableRemoteExecutor {
  519. log.Infof("exec socket path: %s", DeployOption.ExecutorSocketPath)
  520. execlient.Init(DeployOption.ExecutorSocketPath)
  521. execlient.SetTimeoutSeconds(DeployOption.ExecutorConnectTimeoutSeconds)
  522. procutils.SetRemoteExecutor()
  523. }
  524. app_common.InitAuth(&DeployOption.CommonOptions, func() {
  525. log.Infof("Auth complete!!")
  526. })
  527. common_options.StartOptionManager(&DeployOption.CommonOptions, DeployOption.ConfigSyncPeriodSeconds, "", "", common_options.OnCommonOptionsChange)
  528. if err := s.PrepareEnv(); err != nil {
  529. log.Fatalln(err)
  530. }
  531. s.O = &DeployOption.BaseOptions
  532. if len(DeployOption.DeployServerSocketPath) == 0 {
  533. log.Fatalf("missing deploy server socket path")
  534. }
  535. }
  536. func (s *SDeployService) OnExitService() {}