packer-plugin-xenserver/builder/xenserver/common/step_export.go

279 lines
6.8 KiB
Go
Raw Normal View History

package common
import (
2021-01-03 16:08:24 -06:00
"context"
2014-12-08 09:34:48 -06:00
"crypto/tls"
"fmt"
"io"
"net/http"
"os"
"os/exec"
2020-09-13 03:21:07 -05:00
"github.com/hashicorp/packer-plugin-sdk/multistep"
"github.com/hashicorp/packer-plugin-sdk/packer"
)
type StepExport struct{}
func downloadFile(url, filename string, ui packer.Ui) (err error) {
2014-12-08 09:34:48 -06:00
// Create the file
fh, err := os.Create(filename)
if err != nil {
return err
}
defer fh.Close()
2014-12-08 09:34:48 -06:00
// Define a new transport which allows self-signed certs
tr := &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
}
2014-12-08 09:34:48 -06:00
// Create a client
client := &http.Client{Transport: tr}
2014-12-08 09:34:48 -06:00
// Create request and download file
2014-12-08 09:34:48 -06:00
resp, err := client.Get(url)
if err != nil {
return err
}
2014-12-08 09:34:48 -06:00
defer resp.Body.Close()
var progress uint
var total uint
var percentage uint
var marker_len uint
progress = uint(0)
total = uint(resp.ContentLength)
percentage = uint(0)
marker_len = uint(5)
var buffer [4096]byte
for {
n, err := resp.Body.Read(buffer[:])
if err != nil && err != io.EOF {
return err
}
progress += uint(n)
if _, write_err := fh.Write(buffer[:n]); write_err != nil {
return write_err
}
if err == io.EOF {
break
}
// Increment percentage in multiples of marker_len
cur_percentage := ((progress * 100 / total) / marker_len) * marker_len
if cur_percentage > percentage {
percentage = cur_percentage
ui.Message(fmt.Sprintf("Downloading... %d%%", percentage))
}
}
2014-12-08 09:34:48 -06:00
return nil
}
2021-01-03 16:08:24 -06:00
func (StepExport) Run(ctx context.Context, state multistep.StateBag) multistep.StepAction {
config := state.Get("commonconfig").(CommonConfig)
ui := state.Get("ui").(packer.Ui)
2020-09-13 03:21:07 -05:00
c := state.Get("client").(*Connection)
2014-12-08 09:34:48 -06:00
instance_uuid := state.Get("instance_uuid").(string)
suffix := ".vhd"
extrauri := "&format=vhd"
2014-12-08 09:34:48 -06:00
2020-09-13 03:21:07 -05:00
instance, err := c.client.VM.GetByUUID(c.session, instance_uuid)
2014-12-09 08:02:48 -06:00
if err != nil {
ui.Error(fmt.Sprintf("Could not get VM with UUID '%s': %s", instance_uuid, err.Error()))
return multistep.ActionHalt
}
2014-12-08 09:34:48 -06:00
if len(config.ExportNetworkNames) > 0 {
2020-09-13 03:21:07 -05:00
vifs, err := c.client.VM.GetVIFs(c.session, instance)
if err != nil {
ui.Error(fmt.Sprintf("Error occured getting VIFs: %s", err.Error()))
return multistep.ActionHalt
}
for _, vif := range vifs {
2020-09-13 03:21:07 -05:00
err := c.client.VIF.Destroy(c.session, vif)
if err != nil {
2020-09-13 03:21:07 -05:00
ui.Error(fmt.Sprintf("Destroy vif fail: '%s': %s", vif, err.Error()))
return multistep.ActionHalt
}
}
for i, networkNameLabel := range config.ExportNetworkNames {
2020-09-13 03:21:07 -05:00
networks, err := c.client.Network.GetByNameLabel(c.session, networkNameLabel)
if err != nil {
ui.Error(fmt.Sprintf("Error occured getting Network by name-label: %s", err.Error()))
return multistep.ActionHalt
}
switch {
case len(networks) == 0:
ui.Error(fmt.Sprintf("Couldn't find a network with the specified name-label '%s'. Aborting.", networkNameLabel))
return multistep.ActionHalt
case len(networks) > 1:
ui.Error(fmt.Sprintf("Found more than one network with the name '%s'. The name must be unique. Aborting.", networkNameLabel))
return multistep.ActionHalt
}
//we need the VIF index string
vifIndexString := fmt.Sprintf("%d", i)
2020-09-13 03:21:07 -05:00
_, err = ConnectNetwork(c, networks[0], instance, vifIndexString)
if err != nil {
ui.Say(err.Error())
}
}
}
ui.Say("Step: export artifact")
compress_option_xe := "compress=false"
compress_option_url := ""
switch config.Format {
2015-01-07 04:40:01 -06:00
case "none":
ui.Say("Skipping export")
return multistep.ActionContinue
case "xva_compressed":
compress_option_xe = "compress=true"
compress_option_url = "use_compression=true&"
fallthrough
case "xva":
// export the VM
2014-12-08 09:34:48 -06:00
export_filename := fmt.Sprintf("%s/%s.xva", config.OutputDir, config.VMName)
use_xe := os.Getenv("USE_XE") == "1"
if xe, e := exec.LookPath("xe"); e == nil && use_xe {
cmd := exec.Command(
xe,
2020-09-13 03:21:07 -05:00
"-s", c.Host,
"-p", "443",
2020-09-13 03:21:07 -05:00
"-u", c.Username,
"-pw", c.Password,
"vm-export",
"vm="+instance_uuid,
compress_option_xe,
"filename="+export_filename,
)
ui.Say(fmt.Sprintf("Getting XVA %+v %+v", cmd.Path, cmd.Args))
err = cmd.Run()
} else {
export_url := fmt.Sprintf("https://%s/export?%suuid=%s&session_id=%s",
2020-09-13 03:21:07 -05:00
c.Host,
compress_option_url,
instance_uuid,
2020-09-13 03:21:07 -05:00
c.GetSession(),
)
ui.Say("Getting XVA " + export_url)
err = downloadFile(export_url, export_filename, ui)
}
if err != nil {
ui.Error(fmt.Sprintf("Could not download XVA: %s", err.Error()))
return multistep.ActionHalt
}
2014-12-08 09:34:48 -06:00
case "vdi_raw":
suffix = ".raw"
extrauri = ""
fallthrough
case "vdi_vhd":
// export the disks
2020-09-13 03:21:07 -05:00
disks, err := GetDisks(c, instance)
2014-12-09 08:02:48 -06:00
if err != nil {
ui.Error(fmt.Sprintf("Could not get VM disks: %s", err.Error()))
2014-12-09 08:02:48 -06:00
return multistep.ActionHalt
}
for _, disk := range disks {
2020-09-13 03:21:07 -05:00
disk_uuid, err := c.client.VDI.GetUUID(c.session, disk)
if err != nil {
ui.Error(fmt.Sprintf("Could not get disk with UUID '%s': %s", disk_uuid, err.Error()))
return multistep.ActionHalt
}
// Work out XenServer version
2020-09-13 03:21:07 -05:00
hosts, err := c.client.Host.GetAll(c.session)
if err != nil {
ui.Error(fmt.Sprintf("Could not retrieve hosts in the pool: %s", err.Error()))
return multistep.ActionHalt
}
host := hosts[0]
2020-09-13 03:21:07 -05:00
host_software_versions, err := c.client.Host.GetSoftwareVersion(c.session, host)
xs_version := host_software_versions["product_version"]
if err != nil {
ui.Error(fmt.Sprintf("Could not get the software version: %s", err.Error()))
return multistep.ActionHalt
}
var disk_export_url string
// @todo: check for 6.5 SP1
if xs_version <= "6.5.0" && config.Format == "vdi_vhd" {
// Export the VHD using a Transfer VM
2020-09-13 03:21:07 -05:00
disk_export_url, err = Expose(c, disk, "vhd")
if err != nil {
ui.Error(fmt.Sprintf("Failed to expose disk %s: %s", disk_uuid, err.Error()))
return multistep.ActionHalt
}
} else {
// Use the preferred direct export from XAPI
// Basic auth in URL request is required as session token is not
// accepted for some reason.
// @todo: raise with XAPI team.
disk_export_url = fmt.Sprintf("https://%s:%s@%s/export_raw_vdi?vdi=%s%s",
2020-09-13 03:21:07 -05:00
c.Username,
c.Password,
c.Host,
disk_uuid,
extrauri)
}
disk_export_filename := fmt.Sprintf("%s/%s%s", config.OutputDir, disk_uuid, suffix)
ui.Say("Getting VDI " + disk_export_url)
err = downloadFile(disk_export_url, disk_export_filename, ui)
if err != nil {
ui.Error(fmt.Sprintf("Could not download VDI: %s", err.Error()))
return multistep.ActionHalt
}
// Call unexpose in case a TVM was used. The call is harmless
// if that is not the case.
2020-09-13 03:21:07 -05:00
Unexpose(c, disk)
}
2014-12-08 09:34:48 -06:00
default:
panic(fmt.Sprintf("Unknown export format '%s'", config.Format))
2014-12-08 09:34:48 -06:00
}
2014-12-08 09:37:16 -06:00
ui.Say("Download completed: " + config.OutputDir)
return multistep.ActionContinue
}
func (StepExport) Cleanup(state multistep.StateBag) {}