| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601 |
- // Copyright 2019 Yunion
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package deployserver
- import (
- "context"
- "encoding/json"
- "fmt"
- "io/ioutil"
- "net"
- "os"
- "runtime/debug"
- "sort"
- "strings"
- "time"
- "google.golang.org/grpc"
- execlient "yunion.io/x/executor/client"
- "yunion.io/x/jsonutils"
- "yunion.io/x/log"
- "yunion.io/x/pkg/errors"
- "yunion.io/x/pkg/util/netutils"
- "yunion.io/x/pkg/utils"
- app_common "yunion.io/x/onecloud/pkg/cloudcommon/app"
- commonconsts "yunion.io/x/onecloud/pkg/cloudcommon/consts"
- common_options "yunion.io/x/onecloud/pkg/cloudcommon/options"
- "yunion.io/x/onecloud/pkg/cloudcommon/service"
- "yunion.io/x/onecloud/pkg/hostman/diskutils"
- "yunion.io/x/onecloud/pkg/hostman/diskutils/fsutils"
- "yunion.io/x/onecloud/pkg/hostman/diskutils/libguestfs"
- "yunion.io/x/onecloud/pkg/hostman/diskutils/nbd"
- "yunion.io/x/onecloud/pkg/hostman/diskutils/qemu_kvm"
- "yunion.io/x/onecloud/pkg/hostman/guestfs/fsdriver"
- "yunion.io/x/onecloud/pkg/hostman/guestman/arch"
- deployapi "yunion.io/x/onecloud/pkg/hostman/hostdeployer/apis"
- "yunion.io/x/onecloud/pkg/hostman/hostdeployer/consts"
- "yunion.io/x/onecloud/pkg/hostman/hostdeployer/uefi"
- "yunion.io/x/onecloud/pkg/util/fileutils2"
- "yunion.io/x/onecloud/pkg/util/procutils"
- "yunion.io/x/onecloud/pkg/util/qemuimg"
- "yunion.io/x/onecloud/pkg/util/seclib2"
- "yunion.io/x/onecloud/pkg/util/winutils"
- )
- type DeployerServer struct {
- deployapi.UnimplementedDeployAgentServer
- }
- var _ deployapi.DeployAgentServer = &DeployerServer{}
- func apiDiskInfo(req *deployapi.DiskInfo) qemuimg.SImageInfo {
- if req == nil {
- return qemuimg.SImageInfo{}
- }
- info := qemuimg.SImageInfo{
- Path: req.GetPath(),
- }
- passwd := req.GetEncryptPassword()
- if len(passwd) > 0 {
- info.Password = passwd
- info.EncryptFormat = qemuimg.TEncryptFormat(req.GetEncryptFormat())
- info.EncryptAlg = seclib2.TSymEncAlg(req.GetEncryptAlg())
- }
- return info
- }
- func (*DeployerServer) DeployGuestFs(ctx context.Context, req *deployapi.DeployParams,
- ) (res *deployapi.DeployGuestFsResponse, err error) {
- // There will be some occasional unknown panic, so temporarily capture panic here.
- defer func() {
- if r := recover(); r != nil {
- log.Errorf("DeployGuestFs: %s", r)
- debug.PrintStack()
- msg := "panic: "
- if str, ok := r.(fmt.Stringer); ok {
- msg += str.String()
- }
- res, err = nil, errors.Error(msg)
- }
- }()
- log.Infof("********* Deploy guest fs on %#v", apiDiskInfo(req.DiskInfo))
- disk, err := diskutils.GetIDisk(diskutils.DiskParams{
- Hypervisor: req.GuestDesc.Hypervisor,
- DiskInfo: apiDiskInfo(req.GetDiskInfo()),
- VddkInfo: req.VddkInfo,
- }, DeployOption.ImageDeployDriver, false)
- if err != nil {
- log.Errorf("diskutils.GetIDisk fail %s", err)
- return new(deployapi.DeployGuestFsResponse), errors.Wrap(err, "GetIDisk")
- }
- defer disk.Cleanup()
- if err := disk.Connect(req.GuestDesc); err != nil {
- log.Errorf("Failed to connect %s disk: %s", req.GuestDesc.Hypervisor, err)
- return new(deployapi.DeployGuestFsResponse), errors.Wrap(err, "Connect")
- }
- defer disk.Disconnect()
- ret, err := disk.DeployGuestfs(req)
- if ret == nil {
- ret = new(deployapi.DeployGuestFsResponse)
- }
- if err != nil {
- log.Errorf("failed deploy guest fs: %s", err)
- }
- return ret, err
- }
- func (*DeployerServer) ResizeFs(ctx context.Context, req *deployapi.ResizeFsParams) (res *deployapi.Empty, err error) {
- // There will be some occasional unknown panic, so temporarily capture panic here.
- defer func() {
- if r := recover(); r != nil {
- log.Errorf("DeployGuestFs: %s, stack:\n %s", req.String(), debug.Stack())
- msg := "panic: "
- if str, ok := r.(fmt.Stringer); ok {
- msg += str.String()
- }
- res, err = nil, errors.Error(msg)
- }
- }()
- log.Infof("********* Resize fs on %#v", req.DiskInfo)
- if strings.HasPrefix(req.DiskInfo.Path, "/dev/loop") {
- // HACK: container loop device, do resize locally
- if err := fsutils.ResizeDiskFs(req.DiskInfo.Path, 0, true); err != nil {
- return new(deployapi.Empty), errors.Wrap(err, "fsutils.ResizeDiskFs")
- }
- return new(deployapi.Empty), nil
- }
- disk, err := diskutils.GetIDisk(diskutils.DiskParams{
- Hypervisor: req.Hypervisor,
- DiskInfo: apiDiskInfo(req.GetDiskInfo()),
- VddkInfo: req.VddkInfo,
- }, DeployOption.ImageDeployDriver, false)
- if err != nil {
- return new(deployapi.Empty), errors.Wrap(err, "GetIDisk fail")
- }
- defer disk.Cleanup()
- var diskId string
- if req.DiskInfo != nil {
- diskId = req.DiskInfo.DiskId
- }
- if err := disk.ConnectWithDiskId(req.GuestDesc, diskId); err != nil {
- return new(deployapi.Empty), errors.Wrap(err, "disk connect failed")
- }
- defer disk.Disconnect()
- return disk.ResizeFs(req)
- }
- func (*DeployerServer) FormatFs(ctx context.Context, req *deployapi.FormatFsParams) (*deployapi.Empty, error) {
- log.Infof("********* Format fs on %#v", apiDiskInfo(req.DiskInfo))
- gd, err := diskutils.NewKVMGuestDisk(apiDiskInfo(req.GetDiskInfo()), DeployOption.ImageDeployDriver, false)
- if err != nil {
- return new(deployapi.Empty), errors.Wrap(err, "NewKVMGuestDisk")
- }
- defer gd.Cleanup()
- if err := gd.Connect(nil); err == nil {
- defer gd.Disconnect()
- return gd.FormatFs(req)
- } else {
- log.Errorf("failed connect kvm disk %#v: %s", apiDiskInfo(req.DiskInfo), err)
- }
- return new(deployapi.Empty), nil
- }
- func (*DeployerServer) SaveToGlance(ctx context.Context, req *deployapi.SaveToGlanceParams) (*deployapi.SaveToGlanceResponse, error) {
- log.Infof("********* %#v save to glance", apiDiskInfo(req.DiskInfo))
- kvmDisk, err := diskutils.NewKVMGuestDisk(apiDiskInfo(req.GetDiskInfo()), DeployOption.ImageDeployDriver, false)
- if err != nil {
- return new(deployapi.SaveToGlanceResponse), errors.Wrap(err, "NewKVMGuestDisk")
- }
- defer kvmDisk.Cleanup()
- err = kvmDisk.Connect(nil)
- if err != nil {
- return new(deployapi.SaveToGlanceResponse), errors.Wrapf(err, "kvmDisk.Connect %#v", apiDiskInfo(req.DiskInfo))
- }
- defer kvmDisk.Disconnect()
- return kvmDisk.SaveToGlance(req)
- }
- func (s *DeployerServer) ProbeImageInfo(ctx context.Context, req *deployapi.ProbeImageInfoPramas) (*deployapi.ImageInfo, error) {
- log.Infof("********* %#v probe image info", apiDiskInfo(req.DiskInfo))
- kvmDisk, err := diskutils.NewKVMGuestDisk(apiDiskInfo(req.GetDiskInfo()), DeployOption.ImageDeployDriver, true)
- if err != nil {
- return new(deployapi.ImageInfo), errors.Wrap(err, "NewKVMGuestDisk")
- }
- defer kvmDisk.Cleanup()
- if err := kvmDisk.Connect(nil); err != nil {
- log.Errorf("Failed to connect kvm disk %#v: %s", apiDiskInfo(req.DiskInfo), err)
- return new(deployapi.ImageInfo), errors.Wrap(err, "Disk connector failed to connect image")
- }
- defer kvmDisk.Disconnect()
- return kvmDisk.ProbeImageInfo(req)
- }
- var connectedEsxiDisks = map[string]*diskutils.VDDKDisk{}
- func (*DeployerServer) ConnectEsxiDisks(
- ctx context.Context, req *deployapi.ConnectEsxiDisksParams,
- ) (*deployapi.EsxiDisksConnectionInfo, error) {
- log.Infof("********* Connect esxi disks ...")
- var (
- err error
- flatFilePath string
- ret = new(deployapi.EsxiDisksConnectionInfo)
- )
- ret.Disks = make([]*deployapi.EsxiDiskInfo, len(req.AccessInfo))
- for i := 0; i < len(req.AccessInfo); i++ {
- disk, _ := diskutils.NewVDDKDisk(req.VddkInfo, req.AccessInfo[i].DiskPath, DeployOption.ImageDeployDriver, false)
- flatFilePath, err = disk.ConnectBlockDevice()
- if err != nil {
- err = errors.Wrapf(err, "disk %s connect block device", req.AccessInfo[i].DiskPath)
- break
- }
- connectedEsxiDisks[flatFilePath] = disk
- ret.Disks[i] = &deployapi.EsxiDiskInfo{DiskPath: flatFilePath}
- }
- if err != nil {
- for i := 0; i < len(req.AccessInfo); i++ {
- if disk, ok := connectedEsxiDisks[req.AccessInfo[i].DiskPath]; ok {
- if e := disk.DisconnectBlockDevice(); e != nil {
- log.Errorf("disconnect disk %s: %s", req.AccessInfo[i].DiskPath, e)
- } else {
- delete(connectedEsxiDisks, req.AccessInfo[i].DiskPath)
- }
- }
- }
- return ret, err
- }
- return ret, nil
- }
- func (*DeployerServer) DisconnectEsxiDisks(
- ctx context.Context, req *deployapi.EsxiDisksConnectionInfo,
- ) (*deployapi.Empty, error) {
- log.Infof("********* Disconnect esxi disks ...")
- for i := 0; i < len(req.Disks); i++ {
- if disk, ok := connectedEsxiDisks[req.Disks[i].DiskPath]; ok {
- if e := disk.DisconnectBlockDevice(); e != nil {
- return new(deployapi.Empty), errors.Wrapf(e, "disconnect disk %s", req.Disks[i].DiskPath)
- } else {
- delete(connectedEsxiDisks, req.Disks[i].DiskPath)
- }
- } else {
- log.Warningf("esxi disk %s not connected", req.Disks[i].DiskPath)
- continue
- }
- }
- return new(deployapi.Empty), nil
- }
- func (*DeployerServer) SetOvmfBootOrder(ctx context.Context, req *deployapi.OvmfBootOrderParams) (*deployapi.Empty, error) {
- log.Infof("Request SetOvmfBootOrder of %s", req.OvmfVarsPath)
- if !fileutils2.Exists(req.OvmfVarsPath) {
- return new(deployapi.Empty), errors.Errorf("ovmf %s not found", req.OvmfVarsPath)
- }
- // parse boot entry from ovmf vars
- bootEntries, bootOrder, ovmfJsonTmpPath, err := uefi.ParseUefiVars(req.OvmfVarsPath)
- if err != nil {
- return new(deployapi.Empty), errors.Wrapf(err, "failed parse uefi vars %s", req.OvmfVarsPath)
- }
- sort.Slice(req.Devs, func(i, j int) bool {
- return req.Devs[i].AttachOrder < req.Devs[j].AttachOrder
- })
- bootEntryIdx := map[string]*deployapi.BootDevices{}
- bootentryOrder := map[int32]string{}
- findBootentry := func(dev *deployapi.BootDevices) {
- for x, bootEntry := range bootEntries {
- if _, ok := bootEntryIdx[bootEntry.ID]; ok {
- continue
- }
- log.Errorf("bootentry %v type %v", x, bootEntry.GetType())
- if bootEntry.GetType() == uefi.OvmfDevicePathType(dev.DevType) {
- bootEntryIdx[bootEntry.ID] = dev
- bootentryOrder[dev.BootOrder] = bootEntry.ID
- break
- }
- }
- }
- for i := range req.Devs {
- findBootentry(req.Devs[i])
- }
- sort.Slice(req.Devs, func(i, j int) bool {
- return req.Devs[i].BootOrder < req.Devs[j].BootOrder
- })
- newBootOrder := []uint16{}
- for i := range req.Devs {
- bentry, ok := bootentryOrder[req.Devs[i].BootOrder]
- if !ok {
- continue
- }
- order, err := uefi.ParseBootentryToBootorder(bentry)
- if err != nil {
- log.Errorf("failed ParseBootentryToBootorder %s %s", bentry, err)
- continue
- }
- newBootOrder = append(newBootOrder, order)
- }
- for i := range bootOrder {
- if utils.IsInArray(bootOrder[i], newBootOrder) {
- continue
- }
- newBootOrder = append(newBootOrder, bootOrder[i])
- }
- if err := uefi.UpdateBootOrderInJson(ovmfJsonTmpPath, newBootOrder); err != nil {
- log.Errorf("failed UpdateBootOrderInJson %s", err)
- return new(deployapi.Empty), errors.Wrapf(err, "failed UpdateBootOrderInJson %v", newBootOrder)
- }
- out, err := uefi.ApplyJsonToVars(ovmfJsonTmpPath, req.OvmfVarsPath, req.OvmfVarsPath)
- if err != nil {
- log.Errorf("failed ApplyJsonToVars %s %s", out, err)
- return new(deployapi.Empty), errors.Wrapf(err, "failed ApplyJsonToVars %v", out)
- }
- return new(deployapi.Empty), nil
- }
- type SDeployService struct {
- *service.SServiceBase
- grpcServer *grpc.Server
- }
- func NewDeployService() *SDeployService {
- deployer := &SDeployService{}
- deployer.SServiceBase = service.NewBaseService(deployer)
- return deployer
- }
- func (s *SDeployService) RunService() {
- if DeployOption.DeployAction != "" {
- res, err := StartLocalDeploy(DeployOption.DeployAction)
- if err != nil {
- if e := fileutils2.FilePutContents("/error", err.Error(), false); e != nil {
- log.Errorf("failed put errors to file: %s", e)
- }
- }
- if res != nil {
- resStr, _ := json.Marshal(res)
- if e := fileutils2.FilePutContents("/response", string(resStr), false); e != nil {
- log.Errorf("failed put response to file: %s", e)
- }
- }
- return
- }
- s.grpcServer = grpc.NewServer()
- deployapi.RegisterDeployAgentServer(s.grpcServer, &DeployerServer{})
- if fileutils2.Exists(DeployOption.DeployServerSocketPath) {
- if conn, err := net.Dial("unix", DeployOption.DeployServerSocketPath); err == nil {
- conn.Close()
- log.Fatalf("socket %s already listening", DeployOption.DeployServerSocketPath)
- }
- if err := os.Remove(DeployOption.DeployServerSocketPath); err != nil {
- log.Fatalln(err)
- }
- }
- listener, err := net.Listen("unix", DeployOption.DeployServerSocketPath)
- if err != nil {
- log.Fatalln(err)
- }
- defer listener.Close()
- log.Infof("Init net listener on %s succ", DeployOption.DeployServerSocketPath)
- s.grpcServer.Serve(listener)
- }
- func (s *SDeployService) FixPathEnv() error {
- var paths = []string{
- "/usr/bin",
- "/usr/local/sbin",
- "/usr/local/bin",
- "/sbin",
- "/bin",
- "/usr/sbin",
- }
- return os.Setenv("PATH", strings.Join(paths, ":"))
- }
- func InitEnvCommon() error {
- commonconsts.SetAllowVmSELinux(DeployOption.AllowVmSELinux)
- fsutils.SetExt4UsageTypeThresholds(
- int64(DeployOption.Ext4LargefileSizeGb)*1024*1024*1024,
- int64(DeployOption.Ext4HugefileSizeGb)*1024*1024*1024,
- )
- if err := fsdriver.Init(DeployOption.CloudrootDir); err != nil {
- return errors.Wrap(err, "init fsdriver")
- }
- netutils.SetPrivatePrefixes(DeployOption.CustomizedPrivatePrefixes)
- return nil
- }
- func (s *SDeployService) PrepareEnv() error {
- if !fileutils2.Exists(DeployOption.DeployTempDir) {
- err := os.MkdirAll(DeployOption.DeployTempDir, 0755)
- if err != nil {
- return errors.Errorf("fail to create %s: %s", DeployOption.DeployTempDir, err)
- }
- }
- commonconsts.SetDeployTempDir(DeployOption.DeployTempDir)
- if err := InitEnvCommon(); err != nil {
- return err
- }
- if err := s.FixPathEnv(); err != nil {
- return err
- }
- if DeployOption.ImageDeployDriver == consts.DEPLOY_DRIVER_LIBGUESTFS {
- if err := libguestfs.Init(3); err != nil {
- log.Fatalln(err)
- }
- }
- if DeployOption.ImageDeployDriver != consts.DEPLOY_DRIVER_QEMU_KVM {
- if err := nbd.Init(); err != nil {
- return errors.Wrap(err, "nbd.Init")
- }
- } else {
- cpuArch, err := procutils.NewCommand("uname", "-m").Output()
- if err != nil {
- return errors.Wrap(err, "get cpu architecture")
- }
- cpuArchStr := strings.TrimSpace(string(cpuArch))
- // prepare for yunionos don't have but necessary files
- out, err := procutils.NewCommand("mkdir", "-p", "/opt/yunion/bin/bundles").Output()
- if err != nil {
- return errors.Wrapf(err, "cp files failed %s", out)
- }
- copyFiles := map[string]string{
- "/usr/bin/chntpw.static": "/opt/yunion/bin/chntpw.static",
- "/usr/bin/.chntpw.static.bin": "/opt/yunion/bin/.chntpw.static.bin",
- "/usr/bin/bundles/chntpw.static": "/opt/yunion/bin/bundles/chntpw.static",
- "/usr/bin/growpart": "/opt/yunion/bin/growpart",
- "/usr/bin/zerofree": "/opt/yunion/bin/zerofree",
- }
- // x86_64 or aarch64
- switch cpuArchStr {
- case qemu_kvm.OS_ARCH_AARCH64:
- copyFiles["/yunionos/aarch64/qemu-ga"] = fsdriver.QGA_BINARY_PATH
- case arch.Arch_x86_64:
- copyFiles["/yunionos/x86_64/qemu-ga"] = fsdriver.QGA_BINARY_PATH
- copyFiles["/yunionos/x86_64/qemu-ga-x86_64.msi"] = fsdriver.QGA_WIN_MSI_INSTALLER_PATH
- case "riscv64":
- copyFiles["/yunionos/riscv64/qemu-ga"] = fsdriver.QGA_BINARY_PATH
- }
- for k, v := range copyFiles {
- out, err = procutils.NewCommand("cp", "-rf", k, v).Output()
- if err != nil {
- return errors.Wrapf(err, "cp files failed %s", out)
- }
- }
- {
- newOptions := DeployOption
- newOptions.CommonConfigFile = ""
- // save runtime options to /opt/yunion/host.conf
- conf := jsonutils.Marshal(newOptions).YAMLString()
- log.Debugf("deploy options: %s", conf)
- err := ioutil.WriteFile("/opt/yunion/host.conf", []byte(conf), 0600)
- if err != nil {
- return errors.Wrapf(err, "save host.conf failed %s", out)
- }
- }
- err = procutils.NewCommand("mkdir", "-p", qemu_kvm.RUN_ON_HOST_ROOT_PATH).Run()
- if err != nil {
- return errors.Wrap(err, "Failed to mkdir RUN_ON_HOST_ROOT_PATH: %s")
- }
- mkisofsArgs := []string{"-l", "-J", "-L", "-R", "-r", "-v", "-hide-rr-moved", "-o", qemu_kvm.DEPLOY_ISO, "-graft-points", "vmware-vddk=/opt/vmware-vddk", "yunion=/opt/yunion"}
- out, err = procutils.NewCommand("mkisofs", mkisofsArgs...).Output()
- if err != nil {
- return errors.Wrapf(err, "mkisofs failed %s", out)
- }
- err = qemu_kvm.InitQemuDeployManager(
- cpuArchStr,
- DeployOption.DefaultQemuVersion,
- DeployOption.EnableRemoteExecutor,
- DeployOption.HugepagesOption == "native",
- DeployOption.HugepageSizeMb*1024,
- DeployOption.DeployGuestMemSizeMb,
- DeployOption.DeployConcurrent,
- )
- if err != nil {
- return err
- }
- }
- // create /dev/lvm_remote
- if err := s.checkLvmRemote(); err != nil {
- return errors.Wrap(err, "unable to checkLvmRemote")
- }
- if !winutils.CheckTool(DeployOption.ChntpwPath) {
- if winutils.CheckTool("/usr/bin/chntpw.static") {
- winutils.SetChntpwPath("/usr/bin/chntpw.static")
- } else {
- log.Errorf("Failed to find chntpw tool")
- }
- } else {
- winutils.SetChntpwPath(DeployOption.ChntpwPath)
- }
- return nil
- }
- func (s *SDeployService) checkLvmRemote() error {
- _, err := os.Stat("/dev/lvm_remote")
- if err == nil {
- return nil
- }
- if os.IsNotExist(err) {
- err := os.Mkdir("/dev/lvm_remote", os.ModePerm)
- if err != nil {
- return err
- }
- return nil
- }
- return err
- }
- func (s *SDeployService) InitService() {
- s.SignalTrap(func() {
- for {
- if len(connectedEsxiDisks) > 0 {
- log.Warningf("Waiting for esxi disks %d disconnect !!!", len(connectedEsxiDisks))
- time.Sleep(time.Second * 1)
- } else {
- if s.grpcServer != nil {
- s.grpcServer.Stop()
- } else {
- os.Exit(0)
- }
- }
- }
- })
- optionsInit()
- if len(DeployOption.DeployAction) > 0 {
- if err := LocalInitEnv(); err != nil {
- log.Fatalf("local init env %s", err)
- }
- return
- }
- if DeployOption.EnableRemoteExecutor {
- log.Infof("exec socket path: %s", DeployOption.ExecutorSocketPath)
- execlient.Init(DeployOption.ExecutorSocketPath)
- execlient.SetTimeoutSeconds(DeployOption.ExecutorConnectTimeoutSeconds)
- procutils.SetRemoteExecutor()
- }
- app_common.InitAuth(&DeployOption.CommonOptions, func() {
- log.Infof("Auth complete!!")
- })
- common_options.StartOptionManager(&DeployOption.CommonOptions, DeployOption.ConfigSyncPeriodSeconds, "", "", common_options.OnCommonOptionsChange)
- if err := s.PrepareEnv(); err != nil {
- log.Fatalln(err)
- }
- s.O = &DeployOption.BaseOptions
- if len(DeployOption.DeployServerSocketPath) == 0 {
- log.Fatalf("missing deploy server socket path")
- }
- }
- func (s *SDeployService) OnExitService() {}
|