kubernetes/vendor/github.com/vmware/govmomi/simulator/container.go
Madhav Jivrajani 8b064fa4be *: Bump version of vmware/govmomi
Bumping version to include changes that
better handle TLS errors. Bump nescessary
to prepare for when the version of Go is
bumped to 1.20

Signed-off-by: Madhav Jivrajani <madhav.jiv@gmail.com>
2023-01-12 15:08:45 +05:30

572 lines
14 KiB
Go

/*
Copyright (c) 2018 VMware, Inc. All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package simulator
import (
"archive/tar"
"bytes"
"encoding/hex"
"encoding/json"
"fmt"
"io"
"log"
"net/http"
"os"
"os/exec"
"path"
"regexp"
"strconv"
"strings"
"time"
"github.com/google/uuid"
"github.com/vmware/govmomi/vim25/methods"
"github.com/vmware/govmomi/vim25/types"
)
var (
shell = "/bin/sh"
)
func init() {
if sh, err := exec.LookPath("bash"); err != nil {
shell = sh
}
}
// container provides methods to manage a container within a simulator VM lifecycle.
type container struct {
id string
name string
}
type networkSettings struct {
Gateway string
IPAddress string
IPPrefixLen int
MacAddress string
}
// inspect applies container network settings to vm.Guest properties.
func (c *container) inspect(vm *VirtualMachine) error {
if c.id == "" {
return nil
}
var objects []struct {
State struct {
Running bool
Paused bool
}
NetworkSettings struct {
networkSettings
Networks map[string]networkSettings
}
}
cmd := exec.Command("docker", "inspect", c.id)
out, err := cmd.Output()
if err != nil {
return err
}
if err = json.NewDecoder(bytes.NewReader(out)).Decode(&objects); err != nil {
return err
}
vm.Config.Annotation = strings.Join(cmd.Args, " ")
vm.logPrintf("%s: %s", vm.Config.Annotation, string(out))
for _, o := range objects {
s := o.NetworkSettings.networkSettings
for _, n := range o.NetworkSettings.Networks {
s = n
break
}
if o.State.Paused {
vm.Runtime.PowerState = types.VirtualMachinePowerStateSuspended
} else if o.State.Running {
vm.Runtime.PowerState = types.VirtualMachinePowerStatePoweredOn
} else {
vm.Runtime.PowerState = types.VirtualMachinePowerStatePoweredOff
}
vm.Guest.IpAddress = s.IPAddress
vm.Summary.Guest.IpAddress = s.IPAddress
if len(vm.Guest.Net) != 0 {
net := &vm.Guest.Net[0]
net.IpAddress = []string{s.IPAddress}
net.MacAddress = s.MacAddress
}
}
return nil
}
func (c *container) prepareGuestOperation(
vm *VirtualMachine,
auth types.BaseGuestAuthentication) types.BaseMethodFault {
if c.id == "" {
return new(types.GuestOperationsUnavailable)
}
if vm.Runtime.PowerState != types.VirtualMachinePowerStatePoweredOn {
return &types.InvalidPowerState{
RequestedState: types.VirtualMachinePowerStatePoweredOn,
ExistingState: vm.Runtime.PowerState,
}
}
switch creds := auth.(type) {
case *types.NamePasswordAuthentication:
if creds.Username == "" || creds.Password == "" {
return new(types.InvalidGuestLogin)
}
default:
return new(types.InvalidGuestLogin)
}
return nil
}
var sanitizeNameRx = regexp.MustCompile(`[\(\)\s]`)
func sanitizeName(name string) string {
return sanitizeNameRx.ReplaceAllString(name, "-")
}
// createDMI writes BIOS UUID DMI files to a container volume
func (c *container) createDMI(vm *VirtualMachine, name string) error {
image := os.Getenv("VCSIM_BUSYBOX")
if image == "" {
image = "busybox"
}
cmd := exec.Command("docker", "run", "--rm", "-i", "-v", name+":"+"/"+name, image, "tar", "-C", "/"+name, "-xf", "-")
stdin, err := cmd.StdinPipe()
if err != nil {
return err
}
err = cmd.Start()
if err != nil {
return err
}
tw := tar.NewWriter(stdin)
dmi := []struct {
name string
val func(uuid.UUID) string
}{
{"product_uuid", productUUID},
{"product_serial", productSerial},
}
for _, file := range dmi {
val := file.val(vm.uid)
_ = tw.WriteHeader(&tar.Header{
Name: file.name,
Size: int64(len(val) + 1),
Mode: 0444,
ModTime: time.Now(),
})
_, _ = fmt.Fprintln(tw, val)
}
_ = tw.Close()
_ = stdin.Close()
if err := cmd.Wait(); err != nil {
stderr := ""
if xerr, ok := err.(*exec.ExitError); ok {
stderr = string(xerr.Stderr)
}
log.Printf("%s %s: %s %s", vm.Name, cmd.Args, err, stderr)
return err
}
return nil
}
var (
toolsRunning = []types.PropertyChange{
{Name: "guest.toolsStatus", Val: types.VirtualMachineToolsStatusToolsOk},
{Name: "guest.toolsRunningStatus", Val: string(types.VirtualMachineToolsRunningStatusGuestToolsRunning)},
}
toolsNotRunning = []types.PropertyChange{
{Name: "guest.toolsStatus", Val: types.VirtualMachineToolsStatusToolsNotRunning},
{Name: "guest.toolsRunningStatus", Val: string(types.VirtualMachineToolsRunningStatusGuestToolsNotRunning)},
}
)
// start runs the container if specified by the RUN.container extraConfig property.
func (c *container) start(ctx *Context, vm *VirtualMachine) {
if c.id != "" {
start := "start"
if vm.Runtime.PowerState == types.VirtualMachinePowerStateSuspended {
start = "unpause"
}
cmd := exec.Command("docker", start, c.id)
err := cmd.Run()
if err != nil {
log.Printf("%s %s: %s", vm.Name, cmd.Args, err)
} else {
ctx.Map.Update(vm, toolsRunning)
}
return
}
var args []string
var env []string
for _, opt := range vm.Config.ExtraConfig {
val := opt.GetOptionValue()
if val.Key == "RUN.container" {
run := val.Value.(string)
err := json.Unmarshal([]byte(run), &args)
if err != nil {
args = []string{run}
}
continue
}
if strings.HasPrefix(val.Key, "guestinfo.") {
key := strings.Replace(strings.ToUpper(val.Key), ".", "_", -1)
env = append(env, "--env", fmt.Sprintf("VMX_%s=%s", key, val.Value.(string)))
}
}
if len(args) == 0 {
return
}
if len(env) != 0 {
// Configure env as the data access method for cloud-init-vmware-guestinfo
env = append(env, "--env", "VMX_GUESTINFO=true")
}
c.name = fmt.Sprintf("vcsim-%s-%s", sanitizeName(vm.Name), vm.uid)
run := append([]string{"docker", "run", "-d", "--name", c.name}, env...)
if err := c.createDMI(vm, c.name); err != nil {
return
}
run = append(run, "-v", fmt.Sprintf("%s:%s:ro", c.name, "/sys/class/dmi/id"))
args = append(run, args...)
cmd := exec.Command(shell, "-c", strings.Join(args, " "))
out, err := cmd.Output()
if err != nil {
stderr := ""
if xerr, ok := err.(*exec.ExitError); ok {
stderr = string(xerr.Stderr)
}
log.Printf("%s %s: %s %s", vm.Name, cmd.Args, err, stderr)
return
}
ctx.Map.Update(vm, toolsRunning)
c.id = strings.TrimSpace(string(out))
vm.logPrintf("%s %s: %s", cmd.Path, cmd.Args, c.id)
if err = c.inspect(vm); err != nil {
log.Printf("%s inspect %s: %s", vm.Name, c.id, err)
}
// Start watching the container resource.
go c.watchContainer(vm)
}
// watchContainer monitors the underlying container and updates the VM
// properties based on the container status. This occurs until either
// the container or the VM is removed.
func (c *container) watchContainer(vm *VirtualMachine) {
inspectInterval := time.Duration(5 * time.Second)
if d, err := time.ParseDuration(os.Getenv("VCSIM_INSPECT_INTERVAL")); err == nil {
inspectInterval = d
}
var (
ctx = SpoofContext()
done = make(chan struct{})
ticker = time.NewTicker(inspectInterval)
)
stopUpdatingVmFromContainer := func() {
ticker.Stop()
close(done)
}
destroyVm := func() {
// If the container cannot be found then destroy this VM.
taskRef := vm.DestroyTask(ctx, &types.Destroy_Task{
This: vm.Self,
}).(*methods.Destroy_TaskBody).Res.Returnval
task := ctx.Map.Get(taskRef).(*Task)
// Wait for the task to complete and see if there is an error.
task.Wait()
if task.Info.Error != nil {
vm.logPrintf("failed to destroy vm: err=%v", *task.Info.Error)
}
}
updateVmFromContainer := func() {
// Exit the monitor loop if the VM was removed from the API side.
if c.id == "" {
stopUpdatingVmFromContainer()
return
}
if err := c.inspect(vm); err != nil {
// If there is an error inspecting the container because it no
// longer exists, then destroy the VM as well. Please note the
// reason this logic does not invoke stopUpdatingVmFromContainer
// is because that will be handled the next time this function
// is entered and c.id is empty.
if err, ok := err.(*exec.ExitError); ok {
if strings.Contains(string(err.Stderr), "No such object") {
destroyVm()
}
}
}
}
// Update the VM from the container at regular intervals until the done
// channel is closed.
for {
select {
case <-ticker.C:
ctx.WithLock(vm, updateVmFromContainer)
case <-done:
return
}
}
}
// stop the container (if any) for the given vm.
func (c *container) stop(ctx *Context, vm *VirtualMachine) {
if c.id == "" {
return
}
cmd := exec.Command("docker", "stop", c.id)
err := cmd.Run()
if err != nil {
log.Printf("%s %s: %s", vm.Name, cmd.Args, err)
} else {
ctx.Map.Update(vm, toolsNotRunning)
}
}
// pause the container (if any) for the given vm.
func (c *container) pause(ctx *Context, vm *VirtualMachine) {
if c.id == "" {
return
}
cmd := exec.Command("docker", "pause", c.id)
err := cmd.Run()
if err != nil {
log.Printf("%s %s: %s", vm.Name, cmd.Args, err)
} else {
ctx.Map.Update(vm, toolsNotRunning)
}
}
// restart the container (if any) for the given vm.
func (c *container) restart(ctx *Context, vm *VirtualMachine) {
if c.id == "" {
return
}
cmd := exec.Command("docker", "restart", c.id)
err := cmd.Run()
if err != nil {
log.Printf("%s %s: %s", vm.Name, cmd.Args, err)
} else {
ctx.Map.Update(vm, toolsRunning)
}
}
// remove the container (if any) for the given vm.
func (c *container) remove(vm *VirtualMachine) {
if c.id == "" {
return
}
args := [][]string{
{"rm", "-v", "-f", c.id},
{"volume", "rm", "-f", c.name},
}
for i := range args {
cmd := exec.Command("docker", args[i]...)
err := cmd.Run()
if err != nil {
log.Printf("%s %s: %s", vm.Name, cmd.Args, err)
}
}
c.id = ""
}
func (c *container) exec(ctx *Context, vm *VirtualMachine, auth types.BaseGuestAuthentication, args []string) (string, types.BaseMethodFault) {
fault := vm.run.prepareGuestOperation(vm, auth)
if fault != nil {
return "", fault
}
args = append([]string{"exec", vm.run.id}, args...)
cmd := exec.Command("docker", args...)
res, err := cmd.CombinedOutput()
if err != nil {
log.Printf("%s: %s (%s)", vm.Self, cmd.Args, string(res))
return "", new(types.GuestOperationsFault)
}
return strings.TrimSpace(string(res)), nil
}
// From https://docs.docker.com/engine/reference/commandline/cp/ :
// > It is not possible to copy certain system files such as resources under /proc, /sys, /dev, tmpfs, and mounts created by the user in the container.
// > However, you can still copy such files by manually running tar in docker exec.
func guestUpload(id string, file string, r *http.Request) error {
cmd := exec.Command("docker", "exec", "-i", id, "tar", "Cxf", path.Dir(file), "-")
cmd.Stderr = os.Stderr
stdin, err := cmd.StdinPipe()
if err != nil {
return err
}
if err = cmd.Start(); err != nil {
return err
}
tw := tar.NewWriter(stdin)
_ = tw.WriteHeader(&tar.Header{
Name: path.Base(file),
Size: r.ContentLength,
Mode: 0444,
ModTime: time.Now(),
})
_, _ = io.Copy(tw, r.Body)
_ = tw.Close()
_ = stdin.Close()
_ = r.Body.Close()
return cmd.Wait()
}
func guestDownload(id string, file string, w http.ResponseWriter) error {
cmd := exec.Command("docker", "exec", id, "tar", "Ccf", path.Dir(file), "-", path.Base(file))
cmd.Stderr = os.Stderr
stdout, err := cmd.StdoutPipe()
if err != nil {
return err
}
if err = cmd.Start(); err != nil {
return err
}
tr := tar.NewReader(stdout)
header, err := tr.Next()
if err != nil {
return err
}
w.Header().Set("Content-Length", strconv.FormatInt(header.Size, 10))
_, _ = io.Copy(w, tr)
return cmd.Wait()
}
const guestPrefix = "/guestFile/"
// ServeGuest handles container guest file upload/download
func ServeGuest(w http.ResponseWriter, r *http.Request) {
// Real vCenter form: /guestFile?id=139&token=...
// vcsim form: /guestFile/tmp/foo/bar?id=ebc8837b8cb6&token=...
id := r.URL.Query().Get("id")
file := strings.TrimPrefix(r.URL.Path, guestPrefix[:len(guestPrefix)-1])
var err error
switch r.Method {
case http.MethodPut:
err = guestUpload(id, file, r)
case http.MethodGet:
err = guestDownload(id, file, w)
default:
w.WriteHeader(http.StatusMethodNotAllowed)
return
}
if err != nil {
log.Printf("%s %s: %s", r.Method, r.URL, err)
w.WriteHeader(http.StatusInternalServerError)
}
}
// productSerial returns the uuid in /sys/class/dmi/id/product_serial format
func productSerial(id uuid.UUID) string {
var dst [len(id)*2 + len(id) - 1]byte
j := 0
for i := 0; i < len(id); i++ {
hex.Encode(dst[j:j+2], id[i:i+1])
j += 3
if j < len(dst) {
s := j - 1
if s == len(dst)/2 {
dst[s] = '-'
} else {
dst[s] = ' '
}
}
}
return fmt.Sprintf("VMware-%s", string(dst[:]))
}
// productUUID returns the uuid in /sys/class/dmi/id/product_uuid format
func productUUID(id uuid.UUID) string {
var dst [36]byte
hex.Encode(dst[0:2], id[3:4])
hex.Encode(dst[2:4], id[2:3])
hex.Encode(dst[4:6], id[1:2])
hex.Encode(dst[6:8], id[0:1])
dst[8] = '-'
hex.Encode(dst[9:11], id[5:6])
hex.Encode(dst[11:13], id[4:5])
dst[13] = '-'
hex.Encode(dst[14:16], id[7:8])
hex.Encode(dst[16:18], id[6:7])
dst[18] = '-'
hex.Encode(dst[19:23], id[8:10])
dst[23] = '-'
hex.Encode(dst[24:], id[10:])
return strings.ToUpper(string(dst[:]))
}